lingdu22
Jr. Member
Offline
Activity: 59
Merit: 10
|
 |
March 06, 2014, 12:22:44 PM |
|
Here is the final namelist: pandaisftw abctc I8orre -- SHOWED INTEREST ON JANUARY 9 (I forgot to include his name in the first two list.) Jef-Diesel -- SHOWED INTEREST ON JANUARY 9 (I forgot to include his name in the first two list.) butterclown eXtatiC Shin swartzfeger LemonAndFries Allwelder Opticarrier -- SHOWED INTEREST from early February kodtycoon smaragda eB101 Damelon KyLins rushi shenjie voldemort628 redsn0w stoneone bezbezbez xcn sashsh Igmaca Chanc3r Vega Rickyjames
All other names below Rickyjames are still on my main list if someone above Rickyjames pulls out then Arafel71 is next in line and so on down the list.
Hey lando! I'm NXT fans. I also put lots of interest in your company and your applications. But would you please to accept my little advices? 1. I hope you can tell the rules clearly before you start the next ipo, if it exists. 2. The PMs before your next IPO post should be invalid.
|
|
|
|
|
|
instacalm
|
 |
March 06, 2014, 12:23:18 PM |
|
Would you please stop spamming this nmac blabla list? Thank you.
ps. I don't really care but it is not I8orre but l8orre (L not I)
|
|
|
|
|
|
qbd1313
|
 |
March 06, 2014, 12:23:30 PM |
|
+1 . It is fair ?
You cheat most of us who are red font marked
All other names below Rickyjames are still on my main list if someone above Rickyjames pulls out then Arafel71 is next in line and so on down the list.Unable to find member 'i8orre'. I think its a big joke. E-mail received from I8orre to my nxtcypto.org mailbox.....I cannot post the full-e:mail. Nxt Mobile App company- thoughts+perspective Sent: Sun Jan 12, 2014 5:10 pm From: l8orre To: landomata Link to his 1st post regarding NMAC: https://nextcoin.org/index.php/topic,2634.msg26607.html#msg26607great,I see
|
|
|
|
|
nxtsky
Newbie
Offline
Activity: 56
Merit: 0
|
 |
March 06, 2014, 12:24:53 PM |
|
+1 . It is fair ?
You cheat most of us who are red font marked
All other names below Rickyjames are still on my main list if someone above Rickyjames pulls out then Arafel71 is next in line and so on down the list.EDIT: The names in RED above Rickyjames did not send me there PLEDGES by the MARCH 6th Deadlines.
Remove others, It's not cool, man! Yes, it's your company, it's your right to decide who can be listed. But, you waste people's time and make people feel to be deceived. It's really not cool.
|
|
|
|
|
pr65536
Newbie
Offline
Activity: 4
Merit: 0
|
 |
March 06, 2014, 12:40:00 PM |
|
Thanks a lot guys for the links! (but then, why people still stay here in this "huge chaotic and popular thread"?  I don't understand...)
|
|
|
|
|
|
hala
|
 |
March 06, 2014, 12:40:24 PM |
|
+1 . It is fair ?
You cheat most of us who are red font marked
All other names below Rickyjames are still on my main list if someone above Rickyjames pulls out then Arafel71 is next in line and so on down the list.EDIT: The names in RED above Rickyjames did not send me there PLEDGES by the MARCH 6th Deadlines.
Remove others, It's not cool, man! Yes, it's your company, it's your right to decide who can be listed. But, you waste people's time and make people feel to be deceived. It's really not cool. I am not angry. Its a joke from beginning.
|
|
|
|
|
|
instacalm
|
 |
March 06, 2014, 12:43:21 PM |
|
(but then, why people still stay here in this "huge chaotic and popular thread"?  I don't understand...) This thread is considered "the Ridiculously Long NXT Pub Crawl Thread (RLNPCT)". You get to hear a bit of everything, you see 
|
|
|
|
|
|
Jean-Luc
|
 |
March 06, 2014, 12:45:21 PM |
|
Jean-Luc How to get rid off of unconfirmed transaction, staying here for a long time? http://217.17.88.5:7875/Did refresh also restarted node, nothing helps. Do I need to reload blockchain from scratch? It will never be confirmed because it is not valid. It is a special case that I will fix in 0.8.7.
|
|
|
|
|
NxtChoice
|
 |
March 06, 2014, 12:47:05 PM |
|
“Ooh Aah... Just a Little Bit” : A small amount of side channel can go a long way http://eprint.iacr.org/2014/161.pdfHow is it about Nxt? Abstract. We apply the FLUSH+RELOAD side-channel attack based on cache hits/misses to extract a small amount of data from OpenSSL ECDSA signature requests. We then apply a “standard” lattice technique to extract the private key, but unlike previous attacks we are able to make use of the side-channel information from almost all of the observed executions. This means we obtain private key recovery by observing a relatively small number of executions, and by expending a relatively small amount of post-processing via lattice reduction. We demonstrate our analysis via experiments using the curve secp256k1 used in the Bitcoin protocol. In particular we show that with as little as 200 signatures we are able to achieve a reasonable level of success in recovering the secret key for a 256-bit curve. This is significantly better than prior methods of applying lattice reduction techqniques to similar side channel information.
|
|
|
|
|
|
mcjavar
|
 |
March 06, 2014, 12:47:57 PM |
|
... We don't really need a 100% full time cryptographer, but somebody who we can consult with regularly, and who can stay reasonably up to date with the current state of Nxt. Most of the time we don't need to make changes that require consulting a cryptographer, but when we do, we need to have somebody to refer to. Like, when considering changing the TF algorithm, or when deciding if there is any risk in accepting the proposed fix for the signature verification failing.
What about DoctorEvil? And while asking questions, do we know more about the crypto-review - msin? mcjavar? could lead to a possible candidate, couldn't it? I don´t know one single cryptographer so I think I won´t be able to help here. Does anyone has a suggestion whom to approach?
|
|
|
|
|
pr65536
Newbie
Offline
Activity: 4
Merit: 0
|
 |
March 06, 2014, 12:48:07 PM |
|
(but then, why people still stay here in this "huge chaotic and popular thread"?  I don't understand...) This thread is considered "the Ridiculously Long NXT Pub Crawl Thread (RLNPCT)". You get to hear a bit of everything, you see  RLNPCT? Now that sound much better! 
|
|
|
|
|
|
xadidos
|
 |
March 06, 2014, 12:49:31 PM |
|
Guys pls help my, how to run 0.8.6 on OS X?
|
|
|
|
|
allwelder
Legendary
Offline
Activity: 1512
Merit: 1004
|
 |
March 06, 2014, 12:50:37 PM |
|
All this complaining is getting me depressed.
James, calm down. I do think most of what you see as "complaining" is actually meant to further improve NXT. I can see very little ill-founded complaining in this thread. Your efforts are highly appreciated by everyone who cares about this project. james,you are all appreciated with your creative works ,the NxtCash, multigateway,nodecoin..... These tries are really very important to Nxt and all of us. Just do it.
|
|
|
|
|
instacalm
|
 |
March 06, 2014, 12:51:52 PM |
|
Guys pls help my, how to run 0.8.6 on OS X?
Hi xadidos, download the client, unzip the folder (e.g. into your Applications folder), fire up a Terminal 1. head to your NXT path, e.g. cd ~/Applications/NXT 2. fire up the NXT client ./run.sh
|
|
|
|
|
landomata
Legendary
Offline
Activity: 2184
Merit: 1000
|
 |
March 06, 2014, 12:53:09 PM |
|
I don´t know one single cryptographer so I think I won´t be able to help here. Does anyone has a suggestion whom to approach?
Pls check with Msin
|
|
|
|
|
xadidos
|
 |
March 06, 2014, 12:55:41 PM |
|
Guys pls help my, how to run 0.8.6 on OS X?
Hi xadidos, download the client, unzip the folder (e.g. into your Applications folder), fire up a Terminal 1. head to your NXT path, e.g. cd ~/Applications/NXT 2. fire up the NXT client ./run.sh Thank you bro! its work!
|
|
|
|
|
|
btc2nxt
|
 |
March 06, 2014, 12:59:59 PM |
|
about Asset Exchange test everything looks like ok. found a api error 1. getTrade OK {"trades":[{"timestamp":8778667,"price":200,"bidOrderId":"10668185170919619908"," askOrderId":"11342895551343357312","quantity":15},{"timestamp":8778667,"price":300,"bidOrderId":"10668185170919619908","askOrderId":"627868227848821830","quantity":10}]} 2.getAskOrder http://127.0.0.1:6876/nxt?requestType=getAskOrder&order=11342895551343357312 (this api don’t corret) {"errorCode":5,"errorDescription":"Unknown order"} askorder or bidorder api cannot return result. 3.getTransaction OK (use this api replace getaskorder api) http://127.0.0.1:6876/nxt?requestType=getTransaction&transaction=11342895551343357312btw i have issued some tulips(quantity=100). Tomorrow i will launch Tulip Bubble TEST, who earned most testNxt will win the match. I will donate 500 true Nxt to the winner. Was this order completely filled? If so, it has been removed from the system, so it is normal to get an unknown order. Trades are used to keep track of past orders that have been already executed. yes. .8.6 new blockchain
|
|
|
|
|
martismartis
Legendary
Offline
Activity: 1161
Merit: 1005
|
 |
March 06, 2014, 01:02:09 PM |
|
Jean-Luc How to get rid off of unconfirmed transaction, staying here for a long time? http://217.17.88.5:7875/Did refresh also restarted node, nothing helps. Do I need to reload blockchain from scratch? It will never be confirmed because it is not valid. It is a special case that I will fix in 0.8.7. OK, thanks. Going to test AE 
|
|
|
|
|
jl777
Legendary
Offline
Activity: 1176
Merit: 1134
|
 |
March 06, 2014, 01:04:43 PM |
|
“Ooh Aah... Just a Little Bit” : A small amount of side channel can go a long way http://eprint.iacr.org/2014/161.pdfHow is it about Nxt? Abstract. We apply the FLUSH+RELOAD side-channel attack based on cache hits/misses to extract a small amount of data from OpenSSL ECDSA signature requests. We then apply a “standard” lattice technique to extract the private key, but unlike previous attacks we are able to make use of the side-channel information from almost all of the observed executions. This means we obtain private key recovery by observing a relatively small number of executions, and by expending a relatively small amount of post-processing via lattice reduction. We demonstrate our analysis via experiments using the curve secp256k1 used in the Bitcoin protocol. In particular we show that with as little as 200 signatures we are able to achieve a reasonable level of success in recovering the secret key for a 256-bit curve. This is significantly better than prior methods of applying lattice reduction techqniques to similar side channel information.
I hope "Consequently, a spy program and the victim must execute on the same execution core of the processor" is the key limitation of this attack. Basically if your computer ends up running a password cracker, even if it doesnt directly intercept the passkey, it can use sidechannel info (like sound, cache hit/miss, etc) to pretty quickly crack the password. This is why for hardened servers, you want to have as few processes running on it as possible. James
|
|
|
|
|
Daedelus
|
 |
March 06, 2014, 01:07:09 PM |
|
Voted, I am slowly catching up after being 75 pages behind!! Makes me feel like I can't be involved when I fall behind...  I wonder what you are all talking about today... suppose I'll find out tomorrow of the day after!
|
|
|
|
|
|