nxtsky
Newbie
Offline
Activity: 56
Merit: 0
|
|
March 06, 2014, 12:24:53 PM |
|
+1 . It is fair ?
You cheat most of us who are red font marked
All other names below Rickyjames are still on my main list if someone above Rickyjames pulls out then Arafel71 is next in line and so on down the list.EDIT: The names in RED above Rickyjames did not send me there PLEDGES by the MARCH 6th Deadlines.
Remove others, It's not cool, man! Yes, it's your company, it's your right to decide who can be listed. But, you waste people's time and make people feel to be deceived. It's really not cool.
|
|
|
|
pr65536
Newbie
Offline
Activity: 4
Merit: 0
|
|
March 06, 2014, 12:40:00 PM |
|
Thanks a lot guys for the links! (but then, why people still stay here in this "huge chaotic and popular thread"? I don't understand...)
|
|
|
|
hala
|
|
March 06, 2014, 12:40:24 PM |
|
+1 . It is fair ?
You cheat most of us who are red font marked
All other names below Rickyjames are still on my main list if someone above Rickyjames pulls out then Arafel71 is next in line and so on down the list.EDIT: The names in RED above Rickyjames did not send me there PLEDGES by the MARCH 6th Deadlines.
Remove others, It's not cool, man! Yes, it's your company, it's your right to decide who can be listed. But, you waste people's time and make people feel to be deceived. It's really not cool. I am not angry. Its a joke from beginning.
|
|
|
|
instacalm
|
|
March 06, 2014, 12:43:21 PM |
|
(but then, why people still stay here in this "huge chaotic and popular thread"? I don't understand...) This thread is considered "the Ridiculously Long NXT Pub Crawl Thread (RLNPCT)". You get to hear a bit of everything, you see
|
|
|
|
Jean-Luc
|
|
March 06, 2014, 12:45:21 PM |
|
Jean-Luc How to get rid off of unconfirmed transaction, staying here for a long time? http://217.17.88.5:7875/Did refresh also restarted node, nothing helps. Do I need to reload blockchain from scratch? It will never be confirmed because it is not valid. It is a special case that I will fix in 0.8.7.
|
|
|
|
NxtChoice
|
|
March 06, 2014, 12:47:05 PM |
|
“Ooh Aah... Just a Little Bit” : A small amount of side channel can go a long way http://eprint.iacr.org/2014/161.pdfHow is it about Nxt? Abstract. We apply the FLUSH+RELOAD side-channel attack based on cache hits/misses to extract a small amount of data from OpenSSL ECDSA signature requests. We then apply a “standard” lattice technique to extract the private key, but unlike previous attacks we are able to make use of the side-channel information from almost all of the observed executions. This means we obtain private key recovery by observing a relatively small number of executions, and by expending a relatively small amount of post-processing via lattice reduction. We demonstrate our analysis via experiments using the curve secp256k1 used in the Bitcoin protocol. In particular we show that with as little as 200 signatures we are able to achieve a reasonable level of success in recovering the secret key for a 256-bit curve. This is significantly better than prior methods of applying lattice reduction techqniques to similar side channel information.
|
|
|
|
mcjavar
|
|
March 06, 2014, 12:47:57 PM |
|
... We don't really need a 100% full time cryptographer, but somebody who we can consult with regularly, and who can stay reasonably up to date with the current state of Nxt. Most of the time we don't need to make changes that require consulting a cryptographer, but when we do, we need to have somebody to refer to. Like, when considering changing the TF algorithm, or when deciding if there is any risk in accepting the proposed fix for the signature verification failing.
What about DoctorEvil? And while asking questions, do we know more about the crypto-review - msin? mcjavar? could lead to a possible candidate, couldn't it? I don´t know one single cryptographer so I think I won´t be able to help here. Does anyone has a suggestion whom to approach?
|
|
|
|
pr65536
Newbie
Offline
Activity: 4
Merit: 0
|
|
March 06, 2014, 12:48:07 PM |
|
(but then, why people still stay here in this "huge chaotic and popular thread"? I don't understand...) This thread is considered "the Ridiculously Long NXT Pub Crawl Thread (RLNPCT)". You get to hear a bit of everything, you see RLNPCT? Now that sound much better!
|
|
|
|
xadidos
|
|
March 06, 2014, 12:49:31 PM |
|
Guys pls help my, how to run 0.8.6 on OS X?
|
|
|
|
allwelder
Legendary
Offline
Activity: 1512
Merit: 1004
|
|
March 06, 2014, 12:50:37 PM |
|
All this complaining is getting me depressed.
James, calm down. I do think most of what you see as "complaining" is actually meant to further improve NXT. I can see very little ill-founded complaining in this thread. Your efforts are highly appreciated by everyone who cares about this project. james,you are all appreciated with your creative works ,the NxtCash, multigateway,nodecoin..... These tries are really very important to Nxt and all of us. Just do it.
|
|
|
|
instacalm
|
|
March 06, 2014, 12:51:52 PM |
|
Guys pls help my, how to run 0.8.6 on OS X?
Hi xadidos, download the client, unzip the folder (e.g. into your Applications folder), fire up a Terminal 1. head to your NXT path, e.g. 2. fire up the NXT client
|
|
|
|
landomata
Legendary
Offline
Activity: 2184
Merit: 1000
|
|
March 06, 2014, 12:53:09 PM |
|
I don´t know one single cryptographer so I think I won´t be able to help here. Does anyone has a suggestion whom to approach?
Pls check with Msin
|
|
|
|
xadidos
|
|
March 06, 2014, 12:55:41 PM |
|
Guys pls help my, how to run 0.8.6 on OS X?
Hi xadidos, download the client, unzip the folder (e.g. into your Applications folder), fire up a Terminal 1. head to your NXT path, e.g. 2. fire up the NXT client Thank you bro! its work!
|
|
|
|
btc2nxt
|
|
March 06, 2014, 12:59:59 PM |
|
about Asset Exchange test everything looks like ok. found a api error 1. getTrade OK {"trades":[{"timestamp":8778667,"price":200,"bidOrderId":"10668185170919619908"," askOrderId":"11342895551343357312","quantity":15},{"timestamp":8778667,"price":300,"bidOrderId":"10668185170919619908","askOrderId":"627868227848821830","quantity":10}]} 2.getAskOrder http://127.0.0.1:6876/nxt?requestType=getAskOrder&order=11342895551343357312 (this api don’t corret) {"errorCode":5,"errorDescription":"Unknown order"} askorder or bidorder api cannot return result. 3.getTransaction OK (use this api replace getaskorder api) http://127.0.0.1:6876/nxt?requestType=getTransaction&transaction=11342895551343357312btw i have issued some tulips(quantity=100). Tomorrow i will launch Tulip Bubble TEST, who earned most testNxt will win the match. I will donate 500 true Nxt to the winner. Was this order completely filled? If so, it has been removed from the system, so it is normal to get an unknown order. Trades are used to keep track of past orders that have been already executed. yes. .8.6 new blockchain
|
|
|
|
martismartis
Legendary
Offline
Activity: 1162
Merit: 1005
|
|
March 06, 2014, 01:02:09 PM |
|
Jean-Luc How to get rid off of unconfirmed transaction, staying here for a long time? http://217.17.88.5:7875/Did refresh also restarted node, nothing helps. Do I need to reload blockchain from scratch? It will never be confirmed because it is not valid. It is a special case that I will fix in 0.8.7. OK, thanks. Going to test AE
|
|
|
|
jl777
Legendary
Offline
Activity: 1176
Merit: 1134
|
|
March 06, 2014, 01:04:43 PM |
|
“Ooh Aah... Just a Little Bit” : A small amount of side channel can go a long way http://eprint.iacr.org/2014/161.pdfHow is it about Nxt? Abstract. We apply the FLUSH+RELOAD side-channel attack based on cache hits/misses to extract a small amount of data from OpenSSL ECDSA signature requests. We then apply a “standard” lattice technique to extract the private key, but unlike previous attacks we are able to make use of the side-channel information from almost all of the observed executions. This means we obtain private key recovery by observing a relatively small number of executions, and by expending a relatively small amount of post-processing via lattice reduction. We demonstrate our analysis via experiments using the curve secp256k1 used in the Bitcoin protocol. In particular we show that with as little as 200 signatures we are able to achieve a reasonable level of success in recovering the secret key for a 256-bit curve. This is significantly better than prior methods of applying lattice reduction techqniques to similar side channel information.
I hope "Consequently, a spy program and the victim must execute on the same execution core of the processor" is the key limitation of this attack. Basically if your computer ends up running a password cracker, even if it doesnt directly intercept the passkey, it can use sidechannel info (like sound, cache hit/miss, etc) to pretty quickly crack the password. This is why for hardened servers, you want to have as few processes running on it as possible. James
|
|
|
|
Daedelus
|
|
March 06, 2014, 01:07:09 PM |
|
Voted, I am slowly catching up after being 75 pages behind!! Makes me feel like I can't be involved when I fall behind... I wonder what you are all talking about today... suppose I'll find out tomorrow of the day after!
|
|
|
|
btc2nxt
|
|
March 06, 2014, 01:18:40 PM |
|
Not sure about the Electrum passphrase generator. Offspring does have a passphrase generator since day one. This is the algorithm that generates that passphrase. import org.apache.commons.lang3.RandomStringUtils;
private String generatePassphrase() { // No space, backslash, newline, tab String symbols = "!\"$%^&*()-_=+[{]};:'@#~|,<.>/?"; //$NON-NLS-1$ String alphaNum = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ01234567890"; //$NON-NLS-1$ int low = 70; int high = 90; Random random = new Random(); int count = random.nextInt(high - low) + low; return RandomStringUtils.random(count, symbols + alphaNum); }
Java.util.Random is not cryptographically secure. Change it to SecureRandom or people using Offspring to create Nxt accounts would be vulnerable http://stackoverflow.com/questions/11051205/difference-between-java-util-random-and-java-security-securerandomIt depends on what you use the random number for, in this case it makes no difference if you would use SecureRandom or Random. Anyways thanks for looking it up, tips are always appreciated. l posted a passphrase generator. last month. ------------- i coded a simple brain wallet shuffle 3 simple easy rememebered strings into a secret phrase. strings like: BTC address a long english sentence telphone number shuffle control string, like 0123456789 0: one by one insert, 1: one by 2 insert. the control string different ,the shuffle is different. how to generate a secret phrase by shuffle. 1 get a long string by shuffle 3 short strings. 2. every bytes +100 , to another string 3.loop to 104, get 6 times long the source string,let say is SA. 4. SA + password =secret phrase ------------ e.g. from a txt file ------------- ** multi_wallet 734ZrZPdZjLbwHfUbNo2kA9BdtC11214124j242 ** We don't really need a 100% full timeyptographerbutomebodywcan consult with regularly, and who can stay reasonably up to date with the current state of Nxt. Most of the time we don't need to make changes that require consulting a cryptographer, but when we do, we need to have somebody to refer to. Like, when considering changing the TF algorithm, or when deciding if there is any risk in accepting the proposed fix for the signature verification failing.(red chars must remember) ** nxt account 54365346908638959818 12344(must remember) ----------------- passphrase: 7cl di nb rtene a sngor nu 8curf hanwieanMhivteae'i ds5dohr aglshaatHftZeFrs.gd3 cWei2re a tiinoNu lnso1n hl hr rsu emltZt4so o. Ugtart8okr aboehh9,hwgft oltfef n n httsadsud tca luoeepid2h ire w2 1ia i9t3w4p ce ttyeZ' otger oysde%tkpt we 1nah1at evamyraig wooidh5 nson6ilaxnca ie jr e0 tthsn a4nagfer1 hiegniganeLwt t s e t8o 0ole d wdrbnqf,9hu pcnoycbd 4n5 limegd ecoenn eodsorr1tphi iemofdyAnf,a2knNrtrtirwhmrar3we 49Loeet80 ieiurde Pyopjtc ec ,e uTBrtealgtpb4whrect kooyte3ee2cwnxu ,o,fyCh oetg oebo cip6tb.n yie6m°Üå™Ýâ™çÛ™ëíÞçÞ™Ú™ìçàèë™çî™±Üîëß™áÚçðâÞÚçÆáâïíÞÚÞ â™Ýì®Ýèáë™ÚàåìáÚÚíÁßíÓÞ¿ëì§àݬ™ÜÐÞâ«ëÞ™Ú™íââçèÇî™åçìèªç™áå™áë™ëìî™ÞæåíÓíìè™è§™™ÎàíÚëí±èäë™ÚÛèÞáá²¥áðàßí™™èåíßÞß™ç™ç™áííìÚÝìîÝ™™íÜÚ™åîèÞÞéâÝ«á™âëޙ𫙪âÚ™â²í¬ðé™ÜÞ™™ííòÞÓ ™èíàÞë™èòìÝÞžíäéí™ðÞ™ªçÚáªÚí™ÞïÚæòëÚâà™™ðèèâÝá®™™çìèç¯âåÚñçÜÚ™âÞ™ãë™Þ©™ííáìç™ÚçÚàßÞ몙áâÞàçâàÚçÞÅðí™í™ì™Þ™í±è™™©èåޙݙðÝëÛçêߥ²áî™éÜçèòÜÛÝ™™ç®™åâæÞàÝ™ÞÜèÞçç™™ÞèÝìèëëªíéáâ™âÞæèßÝòºçߥګäçÇëíëíâëðáæëÚë¬ðÞ™²ÅèÞÞí±©™âÞâîëÝÞ™ÉòèéãíÜ™ÞÜ™™¥Þ™îÍ»ëíÞÚåàíéÛðáëÞÜí™äèèòíÞ¬ÞÞ«Üðçñè¥ßò¼á™èÞíà™èÞÛè™Üâé¯íۧ癙òâÞ¯æ±Ýæ¦Þã¦èܦìîßèߦۦíèáéì¦è零Ýïìà¦âÛèñãßÛèÇâãðîßÛß¡ã¦Þí¯Þéâì¦ÛáæíâÛÛîÂàîÔßÀìí¨áÞ¦ÝÑßã¬ìߦۦîããèéÈï¦æèíé«è¦âæ¦âì¦ìíï¦ßçæîÔî®íé¦é¨¦¦ÏáîÛìî²éåì¦ÛÜéßâ⳦âñáàéæîàßà¦è¦è¦âîîíÛÞíïÞ¦¦îÝÛ¦æïéßßêãÞ¬â¦ãìߦñ¬¦«ãÛ¦ã³îñ®ê¦Ýߦ¦îîóßÔ¡¦éîáßì¦éóíÞߟîåêî¦ñߦ«èÛâ«Ûî¦ßðÛçóìÛãᦦñééãÞ⯦¦èíéè°ãæÛòèÝÛ¦ãߦäì¦ßª¦îîâíè¦Û®èÛáàß쫦âãßáèãáÛèßÆñî¦î¦í¦ß¦î²é¦¦ªéæߦަñÞìÜèë঳âï¦êÝèéóÝÜÞ¦¦®è¯¦æãçßáÞ¦ßÝéßè覦ßéÞíéìì«îêâã¦ãßçéàÞó»èà¦Û¬åèÈìîìîãìñâçìÛìñߦ®³Æéßß¦ãßãïìÞߦÊóéêäîݦßݦ¦¦ß¦ïμìîßÛæáîêÜ®ñâìßÝî¦åééóîßß߬Ýñèò簾é¦àó½â¦éßîá¦éßÜé¦Ýãê°îܨ覦óãß°ç --------- you cannot rember the passphrase, but know how to generate it.
|
|
|
|
rickyjames
|
|
March 06, 2014, 01:21:56 PM |
|
NXT FUNDING COMMITTEE VOTE IS NOW UNDERWAY UNTIL 12:01 AM MARCH 8 (UTC)Per our previous poll, all three committees (NXTmarketingfund, NXTtechdevfund and NXTinfrastructure fund) will consist of five elected members. Read candidate statements here: https://bitcointalk.org/index.php?topic=479167.msg5280476#msg5280476Background: https://bitcointalk.org/index.php?topic=345619.msg5280786#msg5280786 DETAILS ON VOTING :
NXTers WHO HAVE POSTED 5-9 TIMES TO THIS THREAD PER NEWCN'S LIST BELOW : IF YOU WANT TO VOTE, PM ME AND I ***WILL*** SEND YOU A BALLOT CODE.LIVE ONGOING VOTE RESULTS:
https://www.electionbuddy.com/elections/12343/results/t34ayqhm2Update: With 35 hours to go in this election, I have now distributed 391 ballot access codes so far to nominees, candidates, everybody that has ever posted 10 or more times to this thread per newcn's list of most active posters (see https://bitcointalk.org/index.php?topic=345619.msg5456233#msg5456233 ), and various PM requesters not included in the above. I am caught up and have no outstanding PM requests for ballot codes at this time.
This election is winding down and due to my efforts at Texas Bitcoin Conference I will not be sending any more unsolicited ballot codes. I believe the numbers indicate that we have hit the law of diminishing returns on sending out additional ballots. I believe the end results of this election will constitute a fair, honest and successful effort to empanel all three NXT funding committees.
BOTTOM LINE: At this time 224 of the 391 distributed ballot access codes have been used to vote. There are 167 unutilized and 109 undistributed ballot access codes still available.
|
|
|
|
nxtsky
Newbie
Offline
Activity: 56
Merit: 0
|
|
March 06, 2014, 01:24:10 PM |
|
|
|
|
|
|