ildotoress
Newbie
Offline
Activity: 77
Merit: 0
|
|
July 08, 2018, 06:52:20 AM |
|
Well, these stats look very good indeed, it seems that the experimental pools have already achieved half of the global hashrate.
That is completely wrong! You have a button there on the right that also includes in the graphs the "Other miners". If you click that you will see the real distribution of mined blocks, not only the top 25 miners.
|
|
|
|
TakeItEasy
Sr. Member
Offline
Activity: 1622
Merit: 270
Undeads.com - P2E Runner Game
|
|
July 10, 2018, 03:43:25 AM |
|
Yes, now are stable. We will release this night referral experimental program for preparing the main release.
Did you mean the polar night?
|
|
|
|
Somz1
|
|
July 10, 2018, 03:51:03 AM |
|
Will the browser minihg use cpu or GPU power and how important is it to have good specifications hardware?
|
|
|
|
CryptoRobert
|
|
July 10, 2018, 11:19:45 PM |
|
Well, these stats look very good indeed, it seems that the experimental pools have already achieved half of the global hashrate.
That is completely wrong! You have a button there on the right that also includes in the graphs the "Other miners". If you click that you will see the real distribution of mined blocks, not only the top 25 miners. You are right. Then my previous analysis may still be right, alas. By the way I've noticed that the experimental pool has stopped to work, at least on my computer..
|
|
|
|
AlexandruPanait
Newbie
Offline
Activity: 232
Merit: 0
|
|
July 10, 2018, 11:20:56 PM |
|
Well, these stats look very good indeed, it seems that the experimental pools have already achieved half of the global hashrate.
That is completely wrong! You have a button there on the right that also includes in the graphs the "Other miners". If you click that you will see the real distribution of mined blocks, not only the top 25 miners. You are right. Then my previous analysis may still be right, alas. By the way I've noticed that the experimental pool has stopped to work, at least on my computer.. Yeah, we had 51% attack and now we're working to improve the network for protecting on this kind of attacks.
|
|
|
|
insanid
|
|
July 10, 2018, 11:32:49 PM |
|
So this is a testnet, right? The coins don't actually count?
|
|
|
|
efreeti
|
|
July 10, 2018, 11:37:15 PM |
|
No installations and no downloads but somewhere the coins need to be stored. Only in web wallets then?
|
|
|
|
AlexandruPanait
Newbie
Offline
Activity: 232
Merit: 0
|
|
July 10, 2018, 11:42:38 PM |
|
I wish this project will be useful. A rather interesting website, arguable job, flawless website!
Thank you!! No installations and no downloads but somewhere the coins need to be stored. Only in web wallets then?
The website is creating for you automatically an wallet. But you can create others by yourself. The wallets are stored using indexeDB in your browser and you have the option to download them for cold storage. So this is a testnet, right? The coins don't actually count?
Nope, is the main net.
|
|
|
|
CryptoRobert
|
|
July 11, 2018, 09:49:00 AM |
|
Well, these stats look very good indeed, it seems that the experimental pools have already achieved half of the global hashrate.
That is completely wrong! You have a button there on the right that also includes in the graphs the "Other miners". If you click that you will see the real distribution of mined blocks, not only the top 25 miners. You are right. Then my previous analysis may still be right, alas. By the way I've noticed that the experimental pool has stopped to work, at least on my computer.. Yeah, we had 51% attack and now we're working to improve the network for protecting on this kind of attacks. Ouch, that hurts, I hope this experience can help making the network for secure for the future. How much hashing power must this bad actor have put in place to carry on such an attack? But in fact, if we look closely, the big players (server farms?) who have recently boosted the global hashrate 10X probably have always had the power to launch a 51% attack, if they wanted. I had been warning about them for other reasons, but now this event has raised the problem of possible excessive centralization of mining to a new level.
|
|
|
|
cristiwn
Newbie
Offline
Activity: 42
Merit: 0
|
|
July 12, 2018, 05:29:27 AM |
|
Straight out of telegram chat :d
WebDollar.io - Alexandru Budisteanu: A few days ago we encountered 2 types of attacks.
1. One out of 40 Genesis wallets was stolen - via a malware we believe now. 2. Botnet attack for increasing to ~ 1 GB/s the Global Difficulty blocking network for 2 hours. This had been done by somebody with a powerful Computation Power. After 60 hours of straight coding, we were able to finally solve all the attacks damages. We did an update on experimental pools and now in the main network too. The update contains two updates 1. Hard fork to "cancel" the effect of ALL transactions sent by the attacker using the Stolen Wallet. 2. Network optimizations for preventing other 50%+1 to change the Network Global Hashrate (difficulty). Right before doing the update, someone which was in our intranet did cut our internet connection and then after we connected directly to the internet our computers was attacked with ddos.
The blockchain was secured and resisted all the above attacks. Everything works perfectly fine now and the script that "cancel" the effect of the transactions was in place during this fork. I want to add the fact that the transactions are still on the Blockchain because even we can not alter the Blockchain, but the new set of rules "cancel" the effect of those transactions and recover the entire sum.
|
|
|
|
wanggq8877
Member
Offline
Activity: 236
Merit: 11
|
|
July 12, 2018, 05:33:05 AM |
|
The mode of digging coins directly in browsers must be very popular. WebDollar coin project has the opportunity to achieve breakthroughs in this field.
|
|
|
|
deer_hunter89
Newbie
Offline
Activity: 19
Merit: 0
|
|
July 12, 2018, 08:40:49 AM |
|
Straight out of telegram chat :d
WebDollar.io - Alexandru Budisteanu: A few days ago we encountered 2 types of attacks.
1. One out of 40 Genesis wallets was stolen - via a malware we believe now. 2. Botnet attack for increasing to ~ 1 GB/s the Global Difficulty blocking network for 2 hours. This had been done by somebody with a powerful Computation Power. After 60 hours of straight coding, we were able to finally solve all the attacks damages. We did an update on experimental pools and now in the main network too. The update contains two updates 1. Hard fork to "cancel" the effect of ALL transactions sent by the attacker using the Stolen Wallet. 2. Network optimizations for preventing other 50%+1 to change the Network Global Hashrate (difficulty). Right before doing the update, someone which was in our intranet did cut our internet connection and then after we connected directly to the internet our computers was attacked with ddos.
The blockchain was secured and resisted all the above attacks. Everything works perfectly fine now and the script that "cancel" the effect of the transactions was in place during this fork. I want to add the fact that the transactions are still on the Blockchain because even we can not alter the Blockchain, but the new set of rules "cancel" the effect of those transactions and recover the entire sum.
This is bullshit. A 51% attack cannot be used to steal money from a wallet, only the private key owner can sign the transaction. The developers are lying big time.
|
|
|
|
CryptoRobert
|
|
July 12, 2018, 08:54:49 AM |
|
Straight out of telegram chat :d
WebDollar.io - Alexandru Budisteanu: A few days ago we encountered 2 types of attacks.
1. One out of 40 Genesis wallets was stolen - via a malware we believe now. 2. Botnet attack for increasing to ~ 1 GB/s the Global Difficulty blocking network for 2 hours. This had been done by somebody with a powerful Computation Power. After 60 hours of straight coding, we were able to finally solve all the attacks damages. We did an update on experimental pools and now in the main network too. The update contains two updates 1. Hard fork to "cancel" the effect of ALL transactions sent by the attacker using the Stolen Wallet. 2. Network optimizations for preventing other 50%+1 to change the Network Global Hashrate (difficulty). Right before doing the update, someone which was in our intranet did cut our internet connection and then after we connected directly to the internet our computers was attacked with ddos.
The blockchain was secured and resisted all the above attacks. Everything works perfectly fine now and the script that "cancel" the effect of the transactions was in place during this fork. I want to add the fact that the transactions are still on the Blockchain because even we can not alter the Blockchain, but the new set of rules "cancel" the effect of those transactions and recover the entire sum.
This is bullshit. A 51% attack cannot be used to steal money from a wallet, only the private key owner can sign the transaction. The developers are lying big time. This text has been captured in the Telegram chat where things have been probably explained in an unclear way. An official statement would probably been redacted better. Even if the mechanics of what has happened is not totally clear from this text, my personal impression is that the competence and proactivity shown by the team to successfully repair the damages of the attacks are quite obvious, which is proved by the fact that everything's fine now.
|
|
|
|
deer_hunter89
Newbie
Offline
Activity: 19
Merit: 0
|
|
July 12, 2018, 08:58:36 AM |
|
Straight out of telegram chat :d
WebDollar.io - Alexandru Budisteanu: A few days ago we encountered 2 types of attacks.
1. One out of 40 Genesis wallets was stolen - via a malware we believe now. 2. Botnet attack for increasing to ~ 1 GB/s the Global Difficulty blocking network for 2 hours. This had been done by somebody with a powerful Computation Power. After 60 hours of straight coding, we were able to finally solve all the attacks damages. We did an update on experimental pools and now in the main network too. The update contains two updates 1. Hard fork to "cancel" the effect of ALL transactions sent by the attacker using the Stolen Wallet. 2. Network optimizations for preventing other 50%+1 to change the Network Global Hashrate (difficulty). Right before doing the update, someone which was in our intranet did cut our internet connection and then after we connected directly to the internet our computers was attacked with ddos.
The blockchain was secured and resisted all the above attacks. Everything works perfectly fine now and the script that "cancel" the effect of the transactions was in place during this fork. I want to add the fact that the transactions are still on the Blockchain because even we can not alter the Blockchain, but the new set of rules "cancel" the effect of those transactions and recover the entire sum.
This is bullshit. A 51% attack cannot be used to steal money from a wallet, only the private key owner can sign the transaction. The developers are lying big time. This text has been captured in the Telegram chat where things have been probably explained in an unclear way. An official statement would probably been redacted better. Even if the mechanics of what has happened is not totally clear from this text, my personal impression is that the competence and proactivity shown by the team to successfully repair the damages of the attacks are quite obvious, which is proved by the fact that everything's fine now. The team has shown that they are incompetent and now they are lying to the community. There is nothing unclear, they said that a 51% attack was used to steal funds and this is a lie.
|
|
|
|
cristiwn
Newbie
Offline
Activity: 42
Merit: 0
|
|
July 12, 2018, 10:59:21 AM |
|
Straight out of telegram chat :d
WebDollar.io - Alexandru Budisteanu: A few days ago we encountered 2 types of attacks.
1. One out of 40 Genesis wallets was stolen - via a malware we believe now. 2. Botnet attack for increasing to ~ 1 GB/s the Global Difficulty blocking network for 2 hours. This had been done by somebody with a powerful Computation Power. After 60 hours of straight coding, we were able to finally solve all the attacks damages. We did an update on experimental pools and now in the main network too. The update contains two updates 1. Hard fork to "cancel" the effect of ALL transactions sent by the attacker using the Stolen Wallet. 2. Network optimizations for preventing other 50%+1 to change the Network Global Hashrate (difficulty). Right before doing the update, someone which was in our intranet did cut our internet connection and then after we connected directly to the internet our computers was attacked with ddos.
The blockchain was secured and resisted all the above attacks. Everything works perfectly fine now and the script that "cancel" the effect of the transactions was in place during this fork. I want to add the fact that the transactions are still on the Blockchain because even we can not alter the Blockchain, but the new set of rules "cancel" the effect of those transactions and recover the entire sum.
This is bullshit. A 51% attack cannot be used to steal money from a wallet, only the private key owner can sign the transaction. The developers are lying big time. This text has been captured in the Telegram chat where things have been probably explained in an unclear way. An official statement would probably been redacted better. Even if the mechanics of what has happened is not totally clear from this text, my personal impression is that the competence and proactivity shown by the team to successfully repair the damages of the attacks are quite obvious, which is proved by the fact that everything's fine now. The team has shown that they are incompetent and now they are lying to the community. There is nothing unclear, they said that a 51% attack was used to steal funds and this is a lie. In the text is never mentioned that the 50%+1 attack was used to steal the wallet. Having also a 50%+1 happening while wallet has been stolen, they had to fix both things, obviously
|
|
|
|
deer_hunter89
Newbie
Offline
Activity: 19
Merit: 0
|
|
July 12, 2018, 11:07:54 AM |
|
Straight out of telegram chat :d
WebDollar.io - Alexandru Budisteanu: A few days ago we encountered 2 types of attacks.
1. One out of 40 Genesis wallets was stolen - via a malware we believe now. 2. Botnet attack for increasing to ~ 1 GB/s the Global Difficulty blocking network for 2 hours. This had been done by somebody with a powerful Computation Power. After 60 hours of straight coding, we were able to finally solve all the attacks damages. We did an update on experimental pools and now in the main network too. The update contains two updates 1. Hard fork to "cancel" the effect of ALL transactions sent by the attacker using the Stolen Wallet. 2. Network optimizations for preventing other 50%+1 to change the Network Global Hashrate (difficulty). Right before doing the update, someone which was in our intranet did cut our internet connection and then after we connected directly to the internet our computers was attacked with ddos.
The blockchain was secured and resisted all the above attacks. Everything works perfectly fine now and the script that "cancel" the effect of the transactions was in place during this fork. I want to add the fact that the transactions are still on the Blockchain because even we can not alter the Blockchain, but the new set of rules "cancel" the effect of those transactions and recover the entire sum.
This is bullshit. A 51% attack cannot be used to steal money from a wallet, only the private key owner can sign the transaction. The developers are lying big time. This text has been captured in the Telegram chat where things have been probably explained in an unclear way. An official statement would probably been redacted better. Even if the mechanics of what has happened is not totally clear from this text, my personal impression is that the competence and proactivity shown by the team to successfully repair the damages of the attacks are quite obvious, which is proved by the fact that everything's fine now. The team has shown that they are incompetent and now they are lying to the community. There is nothing unclear, they said that a 51% attack was used to steal funds and this is a lie. In the text is never mentioned that the 50%+1 attack was used to steal the wallet. Having also a 50%+1 happening while wallet has been stolen, they had to fix both things, obviously This is complete garbage coin, the developers are using their authority to hide their incompetence. Why was a hard fork necessary? You click on malicious URLS / download malware ==> you pay the consequences, why should the code be updated to accomodate your fuck-up. In the future, when a member of the community gets scammed (or downloads malware), will the devs implement a hard-fork for him? How do we know that this is not an inside job, devs spend their money and then they bail out themselves?
|
|
|
|
TakeItEasy
Sr. Member
Offline
Activity: 1622
Merit: 270
Undeads.com - P2E Runner Game
|
|
July 12, 2018, 12:55:35 PM Last edit: July 12, 2018, 01:20:07 PM by TakeItEasy |
|
Straight out of telegram chat :d
WebDollar.io - Alexandru Budisteanu: A few days ago we encountered 2 types of attacks.
1. One out of 40 Genesis wallets was stolen - via a malware we believe now. 2. Botnet attack for increasing to ~ 1 GB/s the Global Difficulty blocking network for 2 hours. This had been done by somebody with a powerful Computation Power. After 60 hours of straight coding, we were able to finally solve all the attacks damages. We did an update on experimental pools and now in the main network too. The update contains two updates 1. Hard fork to "cancel" the effect of ALL transactions sent by the attacker using the Stolen Wallet. 2. Network optimizations for preventing other 50%+1 to change the Network Global Hashrate (difficulty). Right before doing the update, someone which was in our intranet did cut our internet connection and then after we connected directly to the internet our computers was attacked with ddos.
The blockchain was secured and resisted all the above attacks. Everything works perfectly fine now and the script that "cancel" the effect of the transactions was in place during this fork. I want to add the fact that the transactions are still on the Blockchain because even we can not alter the Blockchain, but the new set of rules "cancel" the effect of those transactions and recover the entire sum.
This is bullshit. A 51% attack cannot be used to steal money from a wallet, only the private key owner can sign the transaction. The developers are lying big time. This text has been captured in the Telegram chat where things have been probably explained in an unclear way. An official statement would probably been redacted better. Even if the mechanics of what has happened is not totally clear from this text, my personal impression is that the competence and proactivity shown by the team to successfully repair the damages of the attacks are quite obvious, which is proved by the fact that everything's fine now. The team has shown that they are incompetent and now they are lying to the community. There is nothing unclear, they said that a 51% attack was used to steal funds and this is a lie. In the text is never mentioned that the 50%+1 attack was used to steal the wallet. Having also a 50%+1 happening while wallet has been stolen, they had to fix both things, obviously This is complete garbage coin, the developers are using their authority to hide their incompetence. Why was a hard fork necessary? You click on malicious URLS / download malware ==> you pay the consequences, why should the code be updated to accomodate your fuck-up. In the future, when a member of the community gets scammed (or downloads malware), will the devs implement a hard-fork for him? How do we know that this is not an inside job, devs spend their money and then they bail out themselves? You are right here. When 50 000 000 NXT was stolen nobody made a hardfork. But it was 3355.73 BTC or roughly USD $1,701,015. https://cointelegraph.com/news/breaking-bter-hacked-50m-nxt-stolenAlso there was a community vote and discussion. Or $534 million in NEM. And there are a lot of other examples without hardfork. You talk about decentralization and anonymization, but you take the sole decision about the hardfork. It does not work like this. And what is very strange in this situation is that the 51 % attack and the wallet stolen occurred right before the release of the pool. So suddenly and unexpectedly. Yes, now are stable. We will release this night referral experimental program for preparing the main release.
We're working to finish pools this week for the official pools with referral release and bounty program and this month the first exchange should be here too.
As you can see in next 12-24 hours pool had to be started. And boooom. Attack and stolen. I do not believe in such coincidences. Also if you fixed all issues, where is the pool, referral programm ?) Something is not right here happening.
|
|
|
|
deer_hunter89
Newbie
Offline
Activity: 19
Merit: 0
|
|
July 12, 2018, 02:10:50 PM |
|
Straight out of telegram chat :d
WebDollar.io - Alexandru Budisteanu: A few days ago we encountered 2 types of attacks.
1. One out of 40 Genesis wallets was stolen - via a malware we believe now. 2. Botnet attack for increasing to ~ 1 GB/s the Global Difficulty blocking network for 2 hours. This had been done by somebody with a powerful Computation Power. After 60 hours of straight coding, we were able to finally solve all the attacks damages. We did an update on experimental pools and now in the main network too. The update contains two updates 1. Hard fork to "cancel" the effect of ALL transactions sent by the attacker using the Stolen Wallet. 2. Network optimizations for preventing other 50%+1 to change the Network Global Hashrate (difficulty). Right before doing the update, someone which was in our intranet did cut our internet connection and then after we connected directly to the internet our computers was attacked with ddos.
The blockchain was secured and resisted all the above attacks. Everything works perfectly fine now and the script that "cancel" the effect of the transactions was in place during this fork. I want to add the fact that the transactions are still on the Blockchain because even we can not alter the Blockchain, but the new set of rules "cancel" the effect of those transactions and recover the entire sum.
This is bullshit. A 51% attack cannot be used to steal money from a wallet, only the private key owner can sign the transaction. The developers are lying big time. This text has been captured in the Telegram chat where things have been probably explained in an unclear way. An official statement would probably been redacted better. Even if the mechanics of what has happened is not totally clear from this text, my personal impression is that the competence and proactivity shown by the team to successfully repair the damages of the attacks are quite obvious, which is proved by the fact that everything's fine now. The team has shown that they are incompetent and now they are lying to the community. There is nothing unclear, they said that a 51% attack was used to steal funds and this is a lie. In the text is never mentioned that the 50%+1 attack was used to steal the wallet. Having also a 50%+1 happening while wallet has been stolen, they had to fix both things, obviously This is complete garbage coin, the developers are using their authority to hide their incompetence. Why was a hard fork necessary? You click on malicious URLS / download malware ==> you pay the consequences, why should the code be updated to accomodate your fuck-up. In the future, when a member of the community gets scammed (or downloads malware), will the devs implement a hard-fork for him? How do we know that this is not an inside job, devs spend their money and then they bail out themselves? You are right here. When 50 000 000 NXT was stolen nobody made a hardfork. But it was 3355.73 BTC or roughly USD $1,701,015. https://cointelegraph.com/news/breaking-bter-hacked-50m-nxt-stolenAlso there was a community vote and discussion. Or $534 million in NEM. And there are a lot of other examples without hardfork. You talk about decentralization and anonymization, but you take the sole decision about the hardfork. It does not work like this. And what is very strange in this situation is that the 51 % attack and the wallet stolen occurred right before the release of the pool. So suddenly and unexpectedly. Yes, now are stable. We will release this night referral experimental program for preparing the main release.
We're working to finish pools this week for the official pools with referral release and bounty program and this month the first exchange should be here too.
As you can see in next 12-24 hours pool had to be started. And boooom. Attack and stolen. I do not believe in such coincidences. Also if you fixed all issues, where is the pool, referral programm ?) Something is not right here happening. The pools are not ready and we cannot trust them to be implemented securely. They are incompetent and they prefer to invest time in developing hard forks for safeguarding their premined coins instead of developing the pools. Never use this coin, it's garbage.
|
|
|
|
xXSSonicXx
Newbie
Offline
Activity: 11
Merit: 0
|
|
July 12, 2018, 05:58:19 PM |
|
The pools are not ready and we cannot trust them to be implemented securely. They are incompetent and they prefer to invest time in developing hard forks for safeguarding their premined coins instead of developing the pools.
Never use this coin, it's garbage.
Strange how you made an account just to bash on this project, we get the idea, webdollar is nr.1 for you.
|
|
|
|
curtism74
Newbie
Offline
Activity: 124
Merit: 0
|
|
July 12, 2018, 06:19:59 PM |
|
Interesting idea. If everything works as described, there will be a lot of people interested in mining. I went to the website and mining started. Now I will study what's what.
|
|
|
|
|