alexrussel1980
Member
Offline
Activity: 106
Merit: 10
CryptoBeggar
|
|
December 01, 2013, 01:31:37 AM |
|
omg my client crashed and i lost all of my 4 coins LOL any ideas?
|
Support My Drinking Habits And Guinness Draught Addiction
BTN - > 1DPHLULFXjtXSSCEZVKqGg7Y457q51fxxr
|
|
|
|
|
|
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
|
|
nexern
|
|
December 01, 2013, 01:33:02 AM |
|
I think you're block explorer has some bugs. There are many inconsistencies.
yes, you are right, mostly due to sync-problems via the api but the new version seems much better now, as soon the blockchain and api is more stable the explorer will work proper.
|
|
|
|
Chang Hum
|
|
December 01, 2013, 01:33:52 AM |
|
My clients not updating it's stuck on November 24th at 7am!
|
|
|
|
alexrussel1980
Member
Offline
Activity: 106
Merit: 10
CryptoBeggar
|
|
December 01, 2013, 01:36:26 AM |
|
im on 0.2.15 my client crashed and stuck on block 0
|
Support My Drinking Habits And Guinness Draught Addiction
BTN - > 1DPHLULFXjtXSSCEZVKqGg7Y457q51fxxr
|
|
|
nexern
|
|
December 01, 2013, 01:36:45 AM |
|
i see many bad peers with similar ip addresses traced to netherland. perhaps and attack?
edit: yes, i think so.
|
|
|
|
bizz
|
|
December 01, 2013, 01:44:48 AM |
|
i see many bad peers with similar ip addresses traced to netherland. perhaps and attack?
edit: yes, i think so.
if you mean 178.239.62.100 it's not attack that's my vps it's on 0.2.19 but nothing works
|
|
|
|
xibeijan
Legendary
Offline
Activity: 1232
Merit: 1001
|
|
December 01, 2013, 01:45:57 AM |
|
What base target (the little red and white target icon) do you see? I see tens of thousand of percent. Also, the block explorer shows the base target increasing dramatically: http://87.230.14.1/nxt/nxt.cgi?action=105473 14195150371142589470 566713 0 0 605925763130 0 0 6965796235585550964 5472 9575565819347146297 566443 0 0 302962881565 0 0 2616818314257352073 5471 17693815705716663328 566339 0 0 174786277826 0 0 2616818314257352073 5470 12338540848651413889 566283 0 0 187271011957 0 0 6965796235585550964 5469 8499461349111284557 566227 0 0 200647512812 0 0 7678554491804589202 5468 15983375086446388884 566080 0 0 100323756406 0 0 2556221026631726577 5467 15925998402635253895 565919 0 0 50161878203 0 0 2556221026631726577 5466 373389247039999903 565863 0 0 53744869504 0 0 2556221026631726577 5465 11993978457853181973 565590 0 0 26872434752 0 0 6785084810899231190 5464 11317452651914963516 565437 0 0 13436217376 0 0 6785084810899231190 Moreover, you have accounts with relatively low balances mining several blocks in a row. Umm... what is going on here? Is the block explorer broken OR is the network broken?!?
|
|
|
|
Chang Hum
|
|
December 01, 2013, 01:49:33 AM |
|
mines 12000%+
|
|
|
|
inkadnb
Member
Offline
Activity: 126
Merit: 10
|
|
December 01, 2013, 01:49:43 AM |
|
exploit??
|
|
|
|
nexern
|
|
December 01, 2013, 01:52:04 AM |
|
i see many bad peers with similar ip addresses traced to netherland. perhaps and attack?
edit: yes, i think so.
if you mean 178.239.62.100 it's not attack that's my vps it's on 0.2.19 but nothing works no, it's not your ip. there are 10+ starting with 109.201.XXX with bad time sync in my peer list and my node is gone.
|
|
|
|
nexern
|
|
December 01, 2013, 01:54:30 AM |
|
i have seen these ip's some days before, doing the same. unfortunatly cfb's bs-server is gone too.
|
|
|
|
Chang Hum
|
|
December 01, 2013, 01:55:57 AM |
|
The client doesn't make sense to me, what if two people use the same passphrase or common words are entered until a match is found... wouldn't that just open up someone else's wallet?
|
|
|
|
nexern
|
|
December 01, 2013, 01:58:21 AM |
|
exploit??
don't think so, they are just shooting at our nodes but even with this low base target they need coins to use this and i don't see sense in this.
|
|
|
|
xibeijan
Legendary
Offline
Activity: 1232
Merit: 1001
|
|
December 01, 2013, 01:59:14 AM |
|
The client doesn't make sense to me, what if two people use the same passphrase or common words are entered until a match is found... wouldn't that just open up someone else's wallet?
Yeah, don't pick a stupid short password.
|
|
|
|
Chang Hum
|
|
December 01, 2013, 02:00:40 AM |
|
That's not a very clever design!!
|
|
|
|
nexern
|
|
December 01, 2013, 02:01:17 AM |
|
The client doesn't make sense to me, what if two people use the same passphrase or common words are entered until a match is found... wouldn't that just open up someone else's wallet?
this is a brainwallet, common words are not the right place to use as a passphrase in this context.
|
|
|
|
nexern
|
|
December 01, 2013, 02:05:25 AM |
|
That's not a very clever design!!
think again, this design is very clever.
|
|
|
|
Chang Hum
|
|
December 01, 2013, 02:07:35 AM |
|
No but what happens if 100000 people use it more than 1 persons going to use the same phrase or word
|
|
|
|
xibeijan
Legendary
Offline
Activity: 1232
Merit: 1001
|
|
December 01, 2013, 02:07:55 AM |
|
That's not a very clever design!!
think again, this design is very clever. I agree. You never need to worry about losing your wallet. It's the next step and solves an old bitcoin problem.
|
|
|
|
Chang Hum
|
|
December 01, 2013, 02:12:29 AM |
|
But what happens if two people choose the same word or phrase?
|
|
|
|
|