Bitcoin Forum
November 18, 2024, 10:55:59 PM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 [39] 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 »
  Print  
Author Topic: [ANN][WEBD][CPU][POW&POS] 🌍 WebDollar - Currency of the Internet | in browser  (Read 43749 times)
This is a self-moderated topic. If you do not want to be moderated by the person who started this topic, create a new topic. (5 posts by 1+ user deleted.)
ildotoress
Newbie
*
Offline Offline

Activity: 77
Merit: 0


View Profile
July 08, 2018, 06:52:20 AM
 #761



Well, these stats look very good indeed, it seems that the experimental pools have already achieved half of the global hashrate.
That is completely wrong!
You have a button there on the right that also includes in the graphs the "Other miners". If you click that you will see the real distribution of mined blocks, not only the top 25 miners.
TakeItEasy
Sr. Member
****
Offline Offline

Activity: 1622
Merit: 270


Undeads.com - P2E Runner Game


View Profile
July 10, 2018, 03:43:25 AM
 #762

Yes, now are stable. We will release this night referral experimental program for preparing the main release.
Did you mean the polar night? Cheesy

💀|.
   ▄▄▄▄█▄▄              ▄▄█▀▀  ▄▄▄▄▄█      ▄▄    ▄█▄
  ▀▀▀████████▄  ▄██    ███▀ ▄████▀▀▀     ▄███   ▄███
    ███▀▄▄███▀ ███▀   ███▀  ▀█████▄     ▄███   ████▄
  ▄███████▀   ███   ▄███       ▀▀████▄▄███████████▀
▀▀███▀▀███    ███ ▄████       ▄▄████▀▀████   ▄███
 ██▀    ▀██▄  ██████▀▀   ▄▄█████▀▀   ███▀   ▄██▀
          ▀▀█  ▀▀▀▀ ▄██████▀▀       ███▀    █▀
                                      ▀
.
.PLAY2EARN.RUNNER.GAME.
||VIRAL
REF.SYSTEM
GAME
|
████████████████████████████
████████████████████████████
████████████████████████████
██████ ▄▀██████████  ███████
███████▄▀▄▀██████  █████████
█████████▄▀▄▀██  ███████████
███████████▄▀▄ █████████████
███████████  ▄▀▄▀███████████
█████████  ████▄▀▄▀█████████
███████  ████████▄▀ ████████
████████████████████████████
████████████████████████████
████████████████████████████
████████████████████████████
████████████████████████████
████████████████████████████
████████▀▀▄██████▄▀▀████████
███████  ▀        ▀  ███████
██████                ██████
█████▌   ███    ███   ▐█████
█████▌   ▀▀▀    ▀▀▀   ▐█████
██████                ██████
███████▄  ▀██████▀  ▄███████
████████████████████████████
████████████████████████████
████████████████████████████
Somz1
Full Member
***
Offline Offline

Activity: 420
Merit: 102



View Profile
July 10, 2018, 03:51:03 AM
 #763

Will the browser minihg use cpu or GPU power and how important is it to have good specifications hardware?
CryptoRobert
Sr. Member
****
Offline Offline

Activity: 1015
Merit: 289



View Profile
July 10, 2018, 11:19:45 PM
 #764



Well, these stats look very good indeed, it seems that the experimental pools have already achieved half of the global hashrate.
That is completely wrong!
You have a button there on the right that also includes in the graphs the "Other miners". If you click that you will see the real distribution of mined blocks, not only the top 25 miners.

You are right. Then my previous analysis may still be right, alas.
By the way I've noticed that the experimental pool has stopped to work, at least on my computer..
AlexandruPanait
Newbie
*
Offline Offline

Activity: 232
Merit: 0


View Profile WWW
July 10, 2018, 11:20:56 PM
 #765



Well, these stats look very good indeed, it seems that the experimental pools have already achieved half of the global hashrate.
That is completely wrong!
You have a button there on the right that also includes in the graphs the "Other miners". If you click that you will see the real distribution of mined blocks, not only the top 25 miners.

You are right. Then my previous analysis may still be right, alas.
By the way I've noticed that the experimental pool has stopped to work, at least on my computer..

Yeah, we had 51% attack and now we're working to improve the network for protecting on this kind of attacks.
insanid
Full Member
***
Offline Offline

Activity: 322
Merit: 100



View Profile
July 10, 2018, 11:32:49 PM
 #766

So this is a testnet, right? The coins don't actually count?
efreeti
Full Member
***
Offline Offline

Activity: 350
Merit: 104


View Profile
July 10, 2018, 11:37:15 PM
 #767

No installations and no downloads but somewhere the coins need to be stored. Only in web wallets then?
AlexandruPanait
Newbie
*
Offline Offline

Activity: 232
Merit: 0


View Profile WWW
July 10, 2018, 11:42:38 PM
 #768

I wish this project will be useful. A rather interesting website, arguable job, flawless website!

Thank you!!

No installations and no downloads but somewhere the coins need to be stored. Only in web wallets then?

The website is creating for you automatically an wallet. But you can create others by yourself. The wallets are stored using indexeDB in your browser and you have the option to download them for cold storage.

So this is a testnet, right? The coins don't actually count?


Nope, is the main net.
CryptoRobert
Sr. Member
****
Offline Offline

Activity: 1015
Merit: 289



View Profile
July 11, 2018, 09:49:00 AM
 #769



Well, these stats look very good indeed, it seems that the experimental pools have already achieved half of the global hashrate.
That is completely wrong!
You have a button there on the right that also includes in the graphs the "Other miners". If you click that you will see the real distribution of mined blocks, not only the top 25 miners.

You are right. Then my previous analysis may still be right, alas.
By the way I've noticed that the experimental pool has stopped to work, at least on my computer..

Yeah, we had 51% attack and now we're working to improve the network for protecting on this kind of attacks.

Ouch, that hurts, I hope this experience can help making the network for secure for the future. How much hashing power must this bad actor have put in place to carry on such an attack? But in fact, if we look closely, the big players (server farms?) who have recently boosted the global hashrate 10X probably have always had the power to launch a 51% attack, if they wanted. I had been warning about them for other reasons, but now this event has raised the problem of possible excessive centralization of mining to a new level.
cristiwn
Newbie
*
Offline Offline

Activity: 42
Merit: 0


View Profile
July 12, 2018, 05:29:27 AM
 #770

Straight out of telegram chat :d

WebDollar.io - Alexandru Budisteanu:
A few days ago we encountered 2 types of attacks.

1. One out of 40 Genesis wallets was stolen - via a malware we believe now.
2. Botnet attack for increasing to ~ 1 GB/s the Global Difficulty blocking network for 2 hours. This had been done by somebody with a powerful Computation Power. After 60 hours of straight coding, we were able to finally solve all the attacks damages. We did an update on experimental pools and now in the main network too. The update contains two updates 1. Hard fork to "cancel" the effect of ALL transactions sent by the attacker using the Stolen Wallet. 2. Network optimizations for preventing other 50%+1 to change the Network Global Hashrate (difficulty). Right before doing the update, someone which was in our intranet did cut our internet connection and then after we connected directly to the internet our computers was attacked with ddos.

The blockchain was secured and resisted all the above attacks. Everything works perfectly fine now and the script that "cancel" the effect of the transactions was in place during this fork. I want to add the fact that the transactions are still on the Blockchain because even we can not alter the Blockchain, but the new set of rules "cancel" the effect of those transactions and recover the entire sum.
wanggq8877
Member
**
Offline Offline

Activity: 236
Merit: 11


View Profile
July 12, 2018, 05:33:05 AM
 #771

The mode of digging coins directly in browsers must be very popular. WebDollar coin project has the opportunity to achieve breakthroughs in this field.
deer_hunter89
Newbie
*
Offline Offline

Activity: 19
Merit: 0


View Profile
July 12, 2018, 08:40:49 AM
 #772

Straight out of telegram chat :d

WebDollar.io - Alexandru Budisteanu:
A few days ago we encountered 2 types of attacks.

1. One out of 40 Genesis wallets was stolen - via a malware we believe now.
2. Botnet attack for increasing to ~ 1 GB/s the Global Difficulty blocking network for 2 hours. This had been done by somebody with a powerful Computation Power. After 60 hours of straight coding, we were able to finally solve all the attacks damages. We did an update on experimental pools and now in the main network too. The update contains two updates 1. Hard fork to "cancel" the effect of ALL transactions sent by the attacker using the Stolen Wallet. 2. Network optimizations for preventing other 50%+1 to change the Network Global Hashrate (difficulty). Right before doing the update, someone which was in our intranet did cut our internet connection and then after we connected directly to the internet our computers was attacked with ddos.

The blockchain was secured and resisted all the above attacks. Everything works perfectly fine now and the script that "cancel" the effect of the transactions was in place during this fork. I want to add the fact that the transactions are still on the Blockchain because even we can not alter the Blockchain, but the new set of rules "cancel" the effect of those transactions and recover the entire sum.

This is bullshit. A 51% attack cannot be used to steal money from a wallet, only the private key owner can sign the transaction. The developers are lying big time.
CryptoRobert
Sr. Member
****
Offline Offline

Activity: 1015
Merit: 289



View Profile
July 12, 2018, 08:54:49 AM
 #773

Straight out of telegram chat :d

WebDollar.io - Alexandru Budisteanu:
A few days ago we encountered 2 types of attacks.

1. One out of 40 Genesis wallets was stolen - via a malware we believe now.
2. Botnet attack for increasing to ~ 1 GB/s the Global Difficulty blocking network for 2 hours. This had been done by somebody with a powerful Computation Power. After 60 hours of straight coding, we were able to finally solve all the attacks damages. We did an update on experimental pools and now in the main network too. The update contains two updates 1. Hard fork to "cancel" the effect of ALL transactions sent by the attacker using the Stolen Wallet. 2. Network optimizations for preventing other 50%+1 to change the Network Global Hashrate (difficulty). Right before doing the update, someone which was in our intranet did cut our internet connection and then after we connected directly to the internet our computers was attacked with ddos.

The blockchain was secured and resisted all the above attacks. Everything works perfectly fine now and the script that "cancel" the effect of the transactions was in place during this fork. I want to add the fact that the transactions are still on the Blockchain because even we can not alter the Blockchain, but the new set of rules "cancel" the effect of those transactions and recover the entire sum.

This is bullshit. A 51% attack cannot be used to steal money from a wallet, only the private key owner can sign the transaction. The developers are lying big time.

This text has been captured in the Telegram chat where things have been probably explained in an unclear way. An official statement would probably been redacted better.
Even if the mechanics of what has happened is not totally clear from this text, my personal impression is that the competence and proactivity shown by the team to successfully repair the damages of the attacks are quite obvious, which is proved by the fact that everything's fine now.
deer_hunter89
Newbie
*
Offline Offline

Activity: 19
Merit: 0


View Profile
July 12, 2018, 08:58:36 AM
 #774

Straight out of telegram chat :d

WebDollar.io - Alexandru Budisteanu:
A few days ago we encountered 2 types of attacks.

1. One out of 40 Genesis wallets was stolen - via a malware we believe now.
2. Botnet attack for increasing to ~ 1 GB/s the Global Difficulty blocking network for 2 hours. This had been done by somebody with a powerful Computation Power. After 60 hours of straight coding, we were able to finally solve all the attacks damages. We did an update on experimental pools and now in the main network too. The update contains two updates 1. Hard fork to "cancel" the effect of ALL transactions sent by the attacker using the Stolen Wallet. 2. Network optimizations for preventing other 50%+1 to change the Network Global Hashrate (difficulty). Right before doing the update, someone which was in our intranet did cut our internet connection and then after we connected directly to the internet our computers was attacked with ddos.

The blockchain was secured and resisted all the above attacks. Everything works perfectly fine now and the script that "cancel" the effect of the transactions was in place during this fork. I want to add the fact that the transactions are still on the Blockchain because even we can not alter the Blockchain, but the new set of rules "cancel" the effect of those transactions and recover the entire sum.

This is bullshit. A 51% attack cannot be used to steal money from a wallet, only the private key owner can sign the transaction. The developers are lying big time.

This text has been captured in the Telegram chat where things have been probably explained in an unclear way. An official statement would probably been redacted better.
Even if the mechanics of what has happened is not totally clear from this text, my personal impression is that the competence and proactivity shown by the team to successfully repair the damages of the attacks are quite obvious, which is proved by the fact that everything's fine now.

The team has shown that they are incompetent and now they are lying to the community.
There is nothing unclear, they said that a 51% attack was used to steal funds and this is a lie.
cristiwn
Newbie
*
Offline Offline

Activity: 42
Merit: 0


View Profile
July 12, 2018, 10:59:21 AM
 #775

Straight out of telegram chat :d

WebDollar.io - Alexandru Budisteanu:
A few days ago we encountered 2 types of attacks.

1. One out of 40 Genesis wallets was stolen - via a malware we believe now.
2. Botnet attack for increasing to ~ 1 GB/s the Global Difficulty blocking network for 2 hours. This had been done by somebody with a powerful Computation Power. After 60 hours of straight coding, we were able to finally solve all the attacks damages. We did an update on experimental pools and now in the main network too. The update contains two updates 1. Hard fork to "cancel" the effect of ALL transactions sent by the attacker using the Stolen Wallet. 2. Network optimizations for preventing other 50%+1 to change the Network Global Hashrate (difficulty). Right before doing the update, someone which was in our intranet did cut our internet connection and then after we connected directly to the internet our computers was attacked with ddos.

The blockchain was secured and resisted all the above attacks. Everything works perfectly fine now and the script that "cancel" the effect of the transactions was in place during this fork. I want to add the fact that the transactions are still on the Blockchain because even we can not alter the Blockchain, but the new set of rules "cancel" the effect of those transactions and recover the entire sum.

This is bullshit. A 51% attack cannot be used to steal money from a wallet, only the private key owner can sign the transaction. The developers are lying big time.

This text has been captured in the Telegram chat where things have been probably explained in an unclear way. An official statement would probably been redacted better.
Even if the mechanics of what has happened is not totally clear from this text, my personal impression is that the competence and proactivity shown by the team to successfully repair the damages of the attacks are quite obvious, which is proved by the fact that everything's fine now.

The team has shown that they are incompetent and now they are lying to the community.
There is nothing unclear, they said that a 51% attack was used to steal funds and this is a lie.

In the text is never mentioned that the 50%+1 attack was used to steal the wallet.
Having also a 50%+1 happening while wallet has been stolen, they had to fix both things, obviously
deer_hunter89
Newbie
*
Offline Offline

Activity: 19
Merit: 0


View Profile
July 12, 2018, 11:07:54 AM
 #776

Straight out of telegram chat :d

WebDollar.io - Alexandru Budisteanu:
A few days ago we encountered 2 types of attacks.

1. One out of 40 Genesis wallets was stolen - via a malware we believe now.
2. Botnet attack for increasing to ~ 1 GB/s the Global Difficulty blocking network for 2 hours. This had been done by somebody with a powerful Computation Power. After 60 hours of straight coding, we were able to finally solve all the attacks damages. We did an update on experimental pools and now in the main network too. The update contains two updates 1. Hard fork to "cancel" the effect of ALL transactions sent by the attacker using the Stolen Wallet. 2. Network optimizations for preventing other 50%+1 to change the Network Global Hashrate (difficulty). Right before doing the update, someone which was in our intranet did cut our internet connection and then after we connected directly to the internet our computers was attacked with ddos.

The blockchain was secured and resisted all the above attacks. Everything works perfectly fine now and the script that "cancel" the effect of the transactions was in place during this fork. I want to add the fact that the transactions are still on the Blockchain because even we can not alter the Blockchain, but the new set of rules "cancel" the effect of those transactions and recover the entire sum.

This is bullshit. A 51% attack cannot be used to steal money from a wallet, only the private key owner can sign the transaction. The developers are lying big time.

This text has been captured in the Telegram chat where things have been probably explained in an unclear way. An official statement would probably been redacted better.
Even if the mechanics of what has happened is not totally clear from this text, my personal impression is that the competence and proactivity shown by the team to successfully repair the damages of the attacks are quite obvious, which is proved by the fact that everything's fine now.

The team has shown that they are incompetent and now they are lying to the community.
There is nothing unclear, they said that a 51% attack was used to steal funds and this is a lie.

In the text is never mentioned that the 50%+1 attack was used to steal the wallet.
Having also a 50%+1 happening while wallet has been stolen, they had to fix both things, obviously

This is complete garbage coin, the developers are using their authority to hide their incompetence.
Why was a hard fork necessary? You click on malicious URLS / download malware ==> you pay the consequences, why should the code be updated to accomodate your fuck-up.
In the future, when a member of the community gets scammed (or downloads malware), will the devs implement a hard-fork for him?
How do we know that this is not an inside job, devs spend their money and then they bail out themselves?
TakeItEasy
Sr. Member
****
Offline Offline

Activity: 1622
Merit: 270


Undeads.com - P2E Runner Game


View Profile
July 12, 2018, 12:55:35 PM
Last edit: July 12, 2018, 01:20:07 PM by TakeItEasy
 #777

Straight out of telegram chat :d

WebDollar.io - Alexandru Budisteanu:
A few days ago we encountered 2 types of attacks.

1. One out of 40 Genesis wallets was stolen - via a malware we believe now.
2. Botnet attack for increasing to ~ 1 GB/s the Global Difficulty blocking network for 2 hours. This had been done by somebody with a powerful Computation Power. After 60 hours of straight coding, we were able to finally solve all the attacks damages. We did an update on experimental pools and now in the main network too. The update contains two updates 1. Hard fork to "cancel" the effect of ALL transactions sent by the attacker using the Stolen Wallet. 2. Network optimizations for preventing other 50%+1 to change the Network Global Hashrate (difficulty). Right before doing the update, someone which was in our intranet did cut our internet connection and then after we connected directly to the internet our computers was attacked with ddos.

The blockchain was secured and resisted all the above attacks. Everything works perfectly fine now and the script that "cancel" the effect of the transactions was in place during this fork. I want to add the fact that the transactions are still on the Blockchain because even we can not alter the Blockchain, but the new set of rules "cancel" the effect of those transactions and recover the entire sum.

This is bullshit. A 51% attack cannot be used to steal money from a wallet, only the private key owner can sign the transaction. The developers are lying big time.

This text has been captured in the Telegram chat where things have been probably explained in an unclear way. An official statement would probably been redacted better.
Even if the mechanics of what has happened is not totally clear from this text, my personal impression is that the competence and proactivity shown by the team to successfully repair the damages of the attacks are quite obvious, which is proved by the fact that everything's fine now.

The team has shown that they are incompetent and now they are lying to the community.
There is nothing unclear, they said that a 51% attack was used to steal funds and this is a lie.

In the text is never mentioned that the 50%+1 attack was used to steal the wallet.
Having also a 50%+1 happening while wallet has been stolen, they had to fix both things, obviously

This is complete garbage coin, the developers are using their authority to hide their incompetence.
Why was a hard fork necessary? You click on malicious URLS / download malware ==> you pay the consequences, why should the code be updated to accomodate your fuck-up.
In the future, when a member of the community gets scammed (or downloads malware), will the devs implement a hard-fork for him?
How do we know that this is not an inside job, devs spend their money and then they bail out themselves?
You are right here.
When 50 000 000 NXT was stolen nobody made a hardfork. But it was 3355.73 BTC or roughly USD $1,701,015.
https://cointelegraph.com/news/breaking-bter-hacked-50m-nxt-stolen
Also there was a community vote and discussion.

Or $534 million in NEM.
And there are a lot of other examples without hardfork.
You talk about decentralization and anonymization, but you take the sole decision about the hardfork. It does not work like this.

And what is very strange in this situation is that the 51 % attack and the wallet stolen occurred right before the release of the pool. So suddenly and unexpectedly.
Yes, now are stable. We will release this night referral experimental program for preparing the main release.
We're working to finish pools this week for the official pools with referral release and bounty program and this month the first exchange should be here too.
As you can see in next 12-24 hours pool had to be started.
And boooom. Attack and stolen. I do not believe in such coincidences.
Also if you fixed all issues, where is the pool, referral programm ?)
Something is not right here happening.

💀|.
   ▄▄▄▄█▄▄              ▄▄█▀▀  ▄▄▄▄▄█      ▄▄    ▄█▄
  ▀▀▀████████▄  ▄██    ███▀ ▄████▀▀▀     ▄███   ▄███
    ███▀▄▄███▀ ███▀   ███▀  ▀█████▄     ▄███   ████▄
  ▄███████▀   ███   ▄███       ▀▀████▄▄███████████▀
▀▀███▀▀███    ███ ▄████       ▄▄████▀▀████   ▄███
 ██▀    ▀██▄  ██████▀▀   ▄▄█████▀▀   ███▀   ▄██▀
          ▀▀█  ▀▀▀▀ ▄██████▀▀       ███▀    █▀
                                      ▀
.
.PLAY2EARN.RUNNER.GAME.
||VIRAL
REF.SYSTEM
GAME
|
████████████████████████████
████████████████████████████
████████████████████████████
██████ ▄▀██████████  ███████
███████▄▀▄▀██████  █████████
█████████▄▀▄▀██  ███████████
███████████▄▀▄ █████████████
███████████  ▄▀▄▀███████████
█████████  ████▄▀▄▀█████████
███████  ████████▄▀ ████████
████████████████████████████
████████████████████████████
████████████████████████████
████████████████████████████
████████████████████████████
████████████████████████████
████████▀▀▄██████▄▀▀████████
███████  ▀        ▀  ███████
██████                ██████
█████▌   ███    ███   ▐█████
█████▌   ▀▀▀    ▀▀▀   ▐█████
██████                ██████
███████▄  ▀██████▀  ▄███████
████████████████████████████
████████████████████████████
████████████████████████████
deer_hunter89
Newbie
*
Offline Offline

Activity: 19
Merit: 0


View Profile
July 12, 2018, 02:10:50 PM
 #778

Straight out of telegram chat :d

WebDollar.io - Alexandru Budisteanu:
A few days ago we encountered 2 types of attacks.

1. One out of 40 Genesis wallets was stolen - via a malware we believe now.
2. Botnet attack for increasing to ~ 1 GB/s the Global Difficulty blocking network for 2 hours. This had been done by somebody with a powerful Computation Power. After 60 hours of straight coding, we were able to finally solve all the attacks damages. We did an update on experimental pools and now in the main network too. The update contains two updates 1. Hard fork to "cancel" the effect of ALL transactions sent by the attacker using the Stolen Wallet. 2. Network optimizations for preventing other 50%+1 to change the Network Global Hashrate (difficulty). Right before doing the update, someone which was in our intranet did cut our internet connection and then after we connected directly to the internet our computers was attacked with ddos.

The blockchain was secured and resisted all the above attacks. Everything works perfectly fine now and the script that "cancel" the effect of the transactions was in place during this fork. I want to add the fact that the transactions are still on the Blockchain because even we can not alter the Blockchain, but the new set of rules "cancel" the effect of those transactions and recover the entire sum.

This is bullshit. A 51% attack cannot be used to steal money from a wallet, only the private key owner can sign the transaction. The developers are lying big time.

This text has been captured in the Telegram chat where things have been probably explained in an unclear way. An official statement would probably been redacted better.
Even if the mechanics of what has happened is not totally clear from this text, my personal impression is that the competence and proactivity shown by the team to successfully repair the damages of the attacks are quite obvious, which is proved by the fact that everything's fine now.

The team has shown that they are incompetent and now they are lying to the community.
There is nothing unclear, they said that a 51% attack was used to steal funds and this is a lie.

In the text is never mentioned that the 50%+1 attack was used to steal the wallet.
Having also a 50%+1 happening while wallet has been stolen, they had to fix both things, obviously

This is complete garbage coin, the developers are using their authority to hide their incompetence.
Why was a hard fork necessary? You click on malicious URLS / download malware ==> you pay the consequences, why should the code be updated to accomodate your fuck-up.
In the future, when a member of the community gets scammed (or downloads malware), will the devs implement a hard-fork for him?
How do we know that this is not an inside job, devs spend their money and then they bail out themselves?
You are right here.
When 50 000 000 NXT was stolen nobody made a hardfork. But it was 3355.73 BTC or roughly USD $1,701,015.
https://cointelegraph.com/news/breaking-bter-hacked-50m-nxt-stolen
Also there was a community vote and discussion.

Or $534 million in NEM.
And there are a lot of other examples without hardfork.
You talk about decentralization and anonymization, but you take the sole decision about the hardfork. It does not work like this.

And what is very strange in this situation is that the 51 % attack and the wallet stolen occurred right before the release of the pool. So suddenly and unexpectedly.
Yes, now are stable. We will release this night referral experimental program for preparing the main release.
We're working to finish pools this week for the official pools with referral release and bounty program and this month the first exchange should be here too.
As you can see in next 12-24 hours pool had to be started.
And boooom. Attack and stolen. I do not believe in such coincidences.
Also if you fixed all issues, where is the pool, referral programm ?)
Something is not right here happening.

The pools are not ready and we cannot trust them to be implemented securely. They are incompetent and they prefer to invest time in developing hard forks for safeguarding their premined coins instead of developing the pools.

Never use this coin, it's garbage.
xXSSonicXx
Newbie
*
Offline Offline

Activity: 11
Merit: 0


View Profile
July 12, 2018, 05:58:19 PM
 #779

Quote
The pools are not ready and we cannot trust them to be implemented securely. They are incompetent and they prefer to invest time in developing hard forks for safeguarding their premined coins instead of developing the pools.

Never use this coin, it's garbage.

Strange how you made an account just to bash on this project, we get the idea, webdollar is nr.1 for you.
curtism74
Newbie
*
Offline Offline

Activity: 124
Merit: 0



View Profile
July 12, 2018, 06:19:59 PM
 #780


Interesting idea. If everything works as described, there will be a lot of people interested in mining.
I went to the website and mining started. Now I will study what's what.
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 [39] 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!