DejanGrande (OP)
Member
Offline
Activity: 212
Merit: 10
vDinar: Yugoslav miners' coin!
|
|
March 23, 2018, 05:26:44 PM |
|
First Nvidia GPU miner for vDinar and its vCrypt protocol! It has been out for a long time, but due to wrong debugging we thought it didn't work.
|
|
|
|
|
Keppeto
Newbie
Offline
Activity: 3
Merit: 0
|
|
March 26, 2018, 04:38:53 PM |
|
Can someone post a link for the compiled version of GPU miner? Thank you!
|
|
|
|
|
DejanGrande (OP)
Member
Offline
Activity: 212
Merit: 10
vDinar: Yugoslav miners' coin!
|
|
March 26, 2018, 08:14:04 PM |
|
Thank you! We have been promoted for free, but you can support him by sending a little amount to this vDinar address: DFFERRX5uXLMCrnfqYsRX3iKDVwPxAHDRT
|
|
|
|
DejanGrande (OP)
Member
Offline
Activity: 212
Merit: 10
vDinar: Yugoslav miners' coin!
|
|
March 26, 2018, 08:15:49 PM |
|
Can someone post a link for the compiled version of GPU miner? Thank you!
It is now available on github.com/AndreaDejanGrande/Veles/releases Indeed, they did it for us, glad to know this!
|
|
|
|
Jazek
|
|
March 26, 2018, 10:38:45 PM |
|
rpc port?
|
|
|
|
nizzuu
Full Member
Offline
Activity: 187
Merit: 100
Cryptocurrency enthusiast
|
|
March 27, 2018, 07:24:17 AM |
|
Who owns https://svarog.jugoslaven.com ? This is a true hell! User's session ttl seems to be less than several minutes, emails with tokens do not come, I'm unable to change password or update account. When I finally received a single mail, token was not stored for session, so all the fields were left disabled, then this token became expired. Why do we need security instead of usability, bro?
|
|
|
|
RinceWind84
Member
Offline
Activity: 263
Merit: 12
HODL! If it isn't a grudge...
|
|
March 27, 2018, 06:05:23 PM |
|
Who owns https://svarog.jugoslaven.com ? This is a true hell! User's session ttl seems to be less than several minutes, emails with tokens do not come, I'm unable to change password or update account. When I finally received a single mail, token was not stored for session, so all the fields were left disabled, then this token became expired. Why do we need security instead of usability, bro? I am facing the same problem. I had no trouble signing up, creating workers and starting to mine. But I have not received a confirmation e-mail and am therefore unable to change settings, and withdraw or set auto withdraw amount. I am 100% positive that I signed up with the correct e-mail since I am having no trouble logging in to the pool interface. So, has anyone been able to get further than this? Anyone had a payout from the pool yet? I have already contacted the pool operator through the pool interface... EDIT: I made contact with operator on DISCORD. My mistake was that I had to unlock the settings page with my pin. Then the e-mail came to my inbox instantly. Happy mining all :-)
|
|
|
|
0x2fed
Newbie
Offline
Activity: 10
Merit: 3
|
|
March 27, 2018, 08:12:22 PM |
|
I think this is SCAM! this coin is not protected from ASIC!!! Look at the differences from the original algorithm Scrypt! Only the function names differ! Any ASIC chip will extract them!!!! 383 - #define vCRYPT_MAX_WAYS 12 384 - #define HAVE_vCRYPT_3WAY 1 385 - int vcrypt_best_throughput(); 386 - void vcrypt_core(uint32_t *X, uint32_t *V, int N); 387 - void vcrypt_core_3way(uint32_t *X, uint32_t *V, int N); 383 + #define SCRYPT_MAX_WAYS 12 384 + #define HAVE_SCRYPT_3WAY 1 385 + int scrypt_best_throughput(); 386 + void scrypt_core(uint32_t *X, uint32_t *V, int N); 387 + void scrypt_core_3way(uint32_t *X, uint32_t *V, int N);
389 - #undef vCRYPT_MAX_WAYS 390 - #define vCRYPT_MAX_WAYS 24 391 - #define HAVE_vCRYPT_6WAY 1 392 - void vcrypt_core_6way(uint32_t *X, uint32_t *V, int N); 389 + #undef SCRYPT_MAX_WAYS 390 + #define SCRYPT_MAX_WAYS 24 391 + #define HAVE_SCRYPT_6WAY 1 392 + void scrypt_core_6way(uint32_t *X, uint32_t *V, int N);
397 - #define vCRYPT_MAX_WAYS 4 398 - #define vcrypt_best_throughput() 1 399 - void vcrypt_core(uint32_t *X, uint32_t *V, int N); 397 + #define SCRYPT_MAX_WAYS 4 398 + #define scrypt_best_throughput() 1 399 + void scrypt_core(uint32_t *X, uint32_t *V, int N);
414 - #define vCRYPT_MAX_WAYS 4 415 - #define vcrypt_best_throughput() 1 416 - void vcrypt_core(uint32_t *X, uint32_t *V, int N); 414 + #define SCRYPT_MAX_WAYS 4 415 + #define scrypt_best_throughput() 1 416 + void scrypt_core(uint32_t *X, uint32_t *V, int N);
488 - static inline void vcrypt_core(uint32_t *X, uint32_t *V, int N) 488 + static inline void scrypt_core(uint32_t *X, uint32_t *V, int N)
508 - #ifndef vCRYPT_MAX_WAYS 509 - #define vCRYPT_MAX_WAYS 1 510 - #define vcrypt_best_throughput() 1 508 + #ifndef SCRYPT_MAX_WAYS 509 + #define SCRYPT_MAX_WAYS 1 510 + #define scrypt_best_throughput() 1
513 - unsigned char *vcrypt_buffer_alloc(int N) 513 + unsigned char *scrypt_buffer_alloc(int N)
515 - return malloc((size_t)N * vCRYPT_MAX_WAYS * 128 + 63); 515 + return malloc((size_t)N * SCRYPT_MAX_WAYS * 128 + 63);
518 - static void vcrypt_1024_1_1_256(const uint32_t *input, uint32_t *output, 518 + static void scrypt_1024_1_1_256(const uint32_t *input, uint32_t *output,
531 - vcrypt_core(X, V, N); 531 + scrypt_core(X, V, N);
537 - static void vcrypt_1024_1_1_256_4way(const uint32_t *input, 537 + static void scrypt_1024_1_1_256_4way(const uint32_t *input,
560 - vcrypt_core(X + 0 * 32, V, N); 561 - vcrypt_core(X + 1 * 32, V, N); 562 - vcrypt_core(X + 2 * 32, V, N); 563 - vcrypt_core(X + 3 * 32, V, N); 560 + scrypt_core(X + 0 * 32, V, N); 561 + scrypt_core(X + 1 * 32, V, N); 562 + scrypt_core(X + 2 * 32, V, N); 563 + scrypt_core(X + 3 * 32, V, N);
574 - #ifdef HAVE_vCRYPT_3WAY 574 + #ifdef HAVE_SCRYPT_3WAY 576 - static void vcrypt_1024_1_1_256_3way(const uint32_t *input, 576 + static void scrypt_1024_1_1_256_3way(const uint32_t *input,
603 - static void vcrypt_1024_1_1_256_12way(const uint32_t *input, 603 + static void scrypt_1024_1_1_256_12way(const uint32_t *input,
633 - vcrypt_core_3way(X + 0 * 96, V, N); 634 - vcrypt_core_3way(X + 1 * 96, V, N); 635 - vcrypt_core_3way(X + 2 * 96, V, N); 636 - vcrypt_core_3way(X + 3 * 96, V, N); 633 + scrypt_core_3way(X + 0 * 96, V, N); 634 + scrypt_core_3way(X + 1 * 96, V, N); 635 + scrypt_core_3way(X + 2 * 96, V, N); 636 + scrypt_core_3way(X + 3 * 96, V, N);
651 - #endif /* HAVE_vCRYPT_3WAY */ 651 + #endif /* HAVE_SCRYPT_3WAY */
653 - #ifdef HAVE_vCRYPT_6WAY 654 - static void vcrypt_1024_1_1_256_24way(const uint32_t *input, 653 + #ifdef HAVE_SCRYPT_6WAY 654 + static void scrypt_1024_1_1_256_24way(const uint32_t *input,
684 - vcrypt_core_6way(X + 0 * 32, V, N); 685 - vcrypt_core_6way(X + 6 * 32, V, N); 686 - vcrypt_core_6way(X + 12 * 32, V, N); 687 - vcrypt_core_6way(X + 18 * 32, V, N); 684 + scrypt_core_6way(X + 0 * 32, V, N); 685 + scrypt_core_6way(X + 6 * 32, V, N); 686 + scrypt_core_6way(X + 12 * 32, V, N); 687 + scrypt_core_6way(X + 18 * 32, V, N);
700 - #endif /* HAVE_vCRYPT_6WAY */ 700 + #endif /* HAVE_SCRYPT_6WAY */
702 - int scanhash_vcrypt(int thr_id, uint32_t *pdata, 702 + int scanhash_scrypt(int thr_id, uint32_t *pdata,
706 - uint32_t data[vCRYPT_MAX_WAYS * 20], hash[vCRYPT_MAX_WAYS * 8]; 706 + uint32_t data[SCRYPT_MAX_WAYS * 20], hash[SCRYPT_MAX_WAYS * 8];
710 - int throughput = vcrypt_best_throughput(); 710 + int throughput = scrypt_best_throughput();
730 - vcrypt_1024_1_1_256_4way(data, hash, midstate, scratchbuf, N); 730 + scrypt_1024_1_1_256_4way(data, hash, midstate, scratchbuf, N);
733 - #if defined(HAVE_vCRYPT_3WAY) && defined(HAVE_SHA256_4WAY) 733 + #if defined(HAVE_SCRYPT_3WAY) && defined(HAVE_SHA256_4WAY)
735 - vcrypt_1024_1_1_256_12way(data, hash, midstate, scratchbuf, N); 735 + scrypt_1024_1_1_256_12way(data, hash, midstate, scratchbuf, N);
738 - #if defined(HAVE_vCRYPT_6WAY) 738 + #if defined(HAVE_SCRYPT_6WAY)
740 - vcrypt_1024_1_1_256_24way(data, hash, midstate, scratchbuf, N); 740 + scrypt_1024_1_1_256_24way(data, hash, midstate, scratchbuf, N);
743 - #if defined(HAVE_vCRYPT_3WAY) 743 + #if defined(HAVE_SCRYPT_3WAY)
745 - vcrypt_1024_1_1_256_3way(data, hash, midstate, scratchbuf, N); 745 + scrypt_1024_1_1_256_3way(data, hash, midstate, scratchbuf, N);
748 - vcrypt_1024_1_1_256(data, hash, midstate, scratchbuf, N); 748 + scrypt_1024_1_1_256(data, hash, midstate, scratchbuf, N);
|
|
|
|
DejanGrande (OP)
Member
Offline
Activity: 212
Merit: 10
vDinar: Yugoslav miners' coin!
|
|
March 27, 2018, 08:19:18 PM |
|
I think this is SCAM! this coin is not protected from ASIC!!! Look at the differences from the original algorithm Scrypt! Only the function names differ! Any ASIC chip will extract them!!!! 383 - #define vCRYPT_MAX_WAYS 12 384 - #define HAVE_vCRYPT_3WAY 1 385 - int vcrypt_best_throughput(); 386 - void vcrypt_core(uint32_t *X, uint32_t *V, int N); 387 - void vcrypt_core_3way(uint32_t *X, uint32_t *V, int N); 383 + #define SCRYPT_MAX_WAYS 12 384 + #define HAVE_SCRYPT_3WAY 1 385 + int scrypt_best_throughput(); 386 + void scrypt_core(uint32_t *X, uint32_t *V, int N); 387 + void scrypt_core_3way(uint32_t *X, uint32_t *V, int N);
389 - #undef vCRYPT_MAX_WAYS 390 - #define vCRYPT_MAX_WAYS 24 391 - #define HAVE_vCRYPT_6WAY 1 392 - void vcrypt_core_6way(uint32_t *X, uint32_t *V, int N); 389 + #undef SCRYPT_MAX_WAYS 390 + #define SCRYPT_MAX_WAYS 24 391 + #define HAVE_SCRYPT_6WAY 1 392 + void scrypt_core_6way(uint32_t *X, uint32_t *V, int N);
397 - #define vCRYPT_MAX_WAYS 4 398 - #define vcrypt_best_throughput() 1 399 - void vcrypt_core(uint32_t *X, uint32_t *V, int N); 397 + #define SCRYPT_MAX_WAYS 4 398 + #define scrypt_best_throughput() 1 399 + void scrypt_core(uint32_t *X, uint32_t *V, int N);
414 - #define vCRYPT_MAX_WAYS 4 415 - #define vcrypt_best_throughput() 1 416 - void vcrypt_core(uint32_t *X, uint32_t *V, int N); 414 + #define SCRYPT_MAX_WAYS 4 415 + #define scrypt_best_throughput() 1 416 + void scrypt_core(uint32_t *X, uint32_t *V, int N);
488 - static inline void vcrypt_core(uint32_t *X, uint32_t *V, int N) 488 + static inline void scrypt_core(uint32_t *X, uint32_t *V, int N)
508 - #ifndef vCRYPT_MAX_WAYS 509 - #define vCRYPT_MAX_WAYS 1 510 - #define vcrypt_best_throughput() 1 508 + #ifndef SCRYPT_MAX_WAYS 509 + #define SCRYPT_MAX_WAYS 1 510 + #define scrypt_best_throughput() 1
513 - unsigned char *vcrypt_buffer_alloc(int N) 513 + unsigned char *scrypt_buffer_alloc(int N)
515 - return malloc((size_t)N * vCRYPT_MAX_WAYS * 128 + 63); 515 + return malloc((size_t)N * SCRYPT_MAX_WAYS * 128 + 63);
518 - static void vcrypt_1024_1_1_256(const uint32_t *input, uint32_t *output, 518 + static void scrypt_1024_1_1_256(const uint32_t *input, uint32_t *output,
531 - vcrypt_core(X, V, N); 531 + scrypt_core(X, V, N);
537 - static void vcrypt_1024_1_1_256_4way(const uint32_t *input, 537 + static void scrypt_1024_1_1_256_4way(const uint32_t *input,
560 - vcrypt_core(X + 0 * 32, V, N); 561 - vcrypt_core(X + 1 * 32, V, N); 562 - vcrypt_core(X + 2 * 32, V, N); 563 - vcrypt_core(X + 3 * 32, V, N); 560 + scrypt_core(X + 0 * 32, V, N); 561 + scrypt_core(X + 1 * 32, V, N); 562 + scrypt_core(X + 2 * 32, V, N); 563 + scrypt_core(X + 3 * 32, V, N);
574 - #ifdef HAVE_vCRYPT_3WAY 574 + #ifdef HAVE_SCRYPT_3WAY 576 - static void vcrypt_1024_1_1_256_3way(const uint32_t *input, 576 + static void scrypt_1024_1_1_256_3way(const uint32_t *input,
603 - static void vcrypt_1024_1_1_256_12way(const uint32_t *input, 603 + static void scrypt_1024_1_1_256_12way(const uint32_t *input,
633 - vcrypt_core_3way(X + 0 * 96, V, N); 634 - vcrypt_core_3way(X + 1 * 96, V, N); 635 - vcrypt_core_3way(X + 2 * 96, V, N); 636 - vcrypt_core_3way(X + 3 * 96, V, N); 633 + scrypt_core_3way(X + 0 * 96, V, N); 634 + scrypt_core_3way(X + 1 * 96, V, N); 635 + scrypt_core_3way(X + 2 * 96, V, N); 636 + scrypt_core_3way(X + 3 * 96, V, N);
651 - #endif /* HAVE_vCRYPT_3WAY */ 651 + #endif /* HAVE_SCRYPT_3WAY */
653 - #ifdef HAVE_vCRYPT_6WAY 654 - static void vcrypt_1024_1_1_256_24way(const uint32_t *input, 653 + #ifdef HAVE_SCRYPT_6WAY 654 + static void scrypt_1024_1_1_256_24way(const uint32_t *input,
684 - vcrypt_core_6way(X + 0 * 32, V, N); 685 - vcrypt_core_6way(X + 6 * 32, V, N); 686 - vcrypt_core_6way(X + 12 * 32, V, N); 687 - vcrypt_core_6way(X + 18 * 32, V, N); 684 + scrypt_core_6way(X + 0 * 32, V, N); 685 + scrypt_core_6way(X + 6 * 32, V, N); 686 + scrypt_core_6way(X + 12 * 32, V, N); 687 + scrypt_core_6way(X + 18 * 32, V, N);
700 - #endif /* HAVE_vCRYPT_6WAY */ 700 + #endif /* HAVE_SCRYPT_6WAY */
702 - int scanhash_vcrypt(int thr_id, uint32_t *pdata, 702 + int scanhash_scrypt(int thr_id, uint32_t *pdata,
706 - uint32_t data[vCRYPT_MAX_WAYS * 20], hash[vCRYPT_MAX_WAYS * 8]; 706 + uint32_t data[SCRYPT_MAX_WAYS * 20], hash[SCRYPT_MAX_WAYS * 8];
710 - int throughput = vcrypt_best_throughput(); 710 + int throughput = scrypt_best_throughput();
730 - vcrypt_1024_1_1_256_4way(data, hash, midstate, scratchbuf, N); 730 + scrypt_1024_1_1_256_4way(data, hash, midstate, scratchbuf, N);
733 - #if defined(HAVE_vCRYPT_3WAY) && defined(HAVE_SHA256_4WAY) 733 + #if defined(HAVE_SCRYPT_3WAY) && defined(HAVE_SHA256_4WAY)
735 - vcrypt_1024_1_1_256_12way(data, hash, midstate, scratchbuf, N); 735 + scrypt_1024_1_1_256_12way(data, hash, midstate, scratchbuf, N);
738 - #if defined(HAVE_vCRYPT_6WAY) 738 + #if defined(HAVE_SCRYPT_6WAY)
740 - vcrypt_1024_1_1_256_24way(data, hash, midstate, scratchbuf, N); 740 + scrypt_1024_1_1_256_24way(data, hash, midstate, scratchbuf, N);
743 - #if defined(HAVE_vCRYPT_3WAY) 743 + #if defined(HAVE_SCRYPT_3WAY)
745 - vcrypt_1024_1_1_256_3way(data, hash, midstate, scratchbuf, N); 745 + scrypt_1024_1_1_256_3way(data, hash, midstate, scratchbuf, N);
748 - vcrypt_1024_1_1_256(data, hash, midstate, scratchbuf, N); 748 + scrypt_1024_1_1_256(data, hash, midstate, scratchbuf, N); Do you even know what Scrypt:N is? Did you read vCrypt's description? Scrypt:N takes Scrypt and changes the needed memory, making ASICs useless at first N factor change. vCrypt algorithm, or protocol takes Scrypt:N and sets the N factor differently from the original version (based on chain heights instead of hardcoded timestamps).
|
|
|
|
DejanGrande (OP)
Member
Offline
Activity: 212
Merit: 10
vDinar: Yugoslav miners' coin!
|
|
March 27, 2018, 08:22:31 PM |
|
It also looks like you already quoted Scrypt:N instead of Scrypt. Do you know what the N variable stands for? Unless you call that function with a constant N factor, it IS ASIC resistant.
|
|
|
|
0x2fed
Newbie
Offline
Activity: 10
Merit: 3
|
|
March 27, 2018, 08:33:01 PM |
|
It also looks like you already quoted Scrypt:N instead of Scrypt. Do you know what the N variable stands for? Unless you call that function with a constant N factor, it IS ASIC resistant.
I correctly understand that now the coin uses the parameter Scrypt: 1024 and any owner of ASIC can get it?
|
|
|
|
0x2fed
Newbie
Offline
Activity: 10
Merit: 3
|
|
March 27, 2018, 08:39:15 PM |
|
|
|
|
|
DejanGrande (OP)
Member
Offline
Activity: 212
Merit: 10
vDinar: Yugoslav miners' coin!
|
|
March 27, 2018, 08:47:16 PM |
|
It also looks like you already quoted Scrypt:N instead of Scrypt. Do you know what the N variable stands for? Unless you call that function with a constant N factor, it IS ASIC resistant.
I correctly understand that now the coin uses the parameter Scrypt: 1024 and any owner of ASIC can get it? Yes, it could be mined by an edited software for ASICs for this year or two until we reach N factor 10, but farms are not interested in starting projects and won't surely lose so much time in redoing their miners for this little timespan. By the time they could start having any profit with vDinar, it will be too late. Also, this is the same for all Scrypt:N based coins, no one starts with higher factors as it would be too hard to mine for a starting project. You see, you're quoting CPUminer. They have Scrypt:N as the core code for both Scrypt (which is the same as Scrypt:9) and Scrypt:N. Also please, next time just politely ask me such things on Discord, Telegram or wherever. Calling the coin a "scam" on the first doubt forces me to lose a lot of time I should have spent in working on vDinar softwares, as the AMD miner, to answer such attacks.
|
|
|
|
7d2mine
Newbie
Offline
Activity: 80
Merit: 0
|
|
March 30, 2018, 01:27:11 AM |
|
Man I cannot seem to have any luck with the exchanges. If anyone is interested in purchasing some vDinar shoot me a PM - for the next few days only. After 4/1 I won't be selling any.
|
|
|
|
DejanGrande (OP)
Member
Offline
Activity: 212
Merit: 10
vDinar: Yugoslav miners' coin!
|
|
March 30, 2018, 10:15:38 AM |
|
Man I cannot seem to have any luck with the exchanges. If anyone is interested in purchasing some vDinar shoot me a PM - for the next few days only. After 4/1 I won't be selling any.
That JamBTC scam really got me upset. As I said on Discord, if everything goes fine we will blacklist all deposits on the difficulty retarget fork coming soon.
|
|
|
|
Newton90
|
|
March 31, 2018, 09:45:58 AM |
|
need any good exchange.because current exchanges are offline or/and have low liqudity.
|
|
|
|
DejanGrande (OP)
Member
Offline
Activity: 212
Merit: 10
vDinar: Yugoslav miners' coin!
|
|
April 02, 2018, 08:27:56 AM |
|
need any good exchange.because current exchanges are offline or/and have low liqudity.
Indeed, indeed. But it has to be reliable this time so we'll need to work on it. I'm not going to advertise any low-volume exchanges such as JamBTC was, as our users got scammed for it and we won't fall for such a thing again.
|
|
|
|
|
|