|
idev
|
 |
January 02, 2014, 12:05:59 AM |
|
If NXT is going to succeed, it needs mass adoption. I've got some IT background, but I've had a steep learning curve to climb over the last 10 days just to get the client up and running.
There is no way that the average Facebook/email/Candycrush user is going to get into NXT if they have to write their own .bat files. And without a mass adoption, NXT is never going to be any more than a really amazing ALT-currency, not the only currency.
In summary: one-click client = NXT success.
We already have 1 click installers for Windows and MAC OS X.
|
|
|
|
utopianfuture
Sr. Member
  
Offline
Activity: 602
Merit: 268
Internet of Value
|
 |
January 02, 2014, 12:08:19 AM |
|
What about the nextern-holiday-fund? Is there someone organazing it so he can work on the client full time?
C'mon bitchizzz I have asked several stakeholders to lead a fund-raising but they do not seem to be interested. I would suggest nextern to sell his full-feature client instead of making it free. That would give him quite a sum for his work. I know a couple stakeholders that have given 100k+ Nxt to nexern. One has set aside 250k for when the client is finished. I personally gave him 50k Nxt and plan to give him more when the client is done. I'm not a stakeholder by the way. The big stakeholder I asksed has not contributed anything. But I think nexern will be fine for now. Let's see what he is delivering first.
|
|
|
|
Damelon
Legendary
Offline
Activity: 1092
Merit: 1010
|
 |
January 02, 2014, 12:13:55 AM |
|
I made these for friends and family. They are all like "why didnt you tell me about bitcoin earlier", well this time they wont have any excuses.   Nice! 
|
|
|
|
yan83
Newbie
Offline
Activity: 43
Merit: 0
|
 |
January 02, 2014, 12:20:35 AM |
|
Nice!
|
|
|
|
|
smartwart
|
 |
January 02, 2014, 12:25:13 AM |
|
what is the current count at the voting?
|
NxT: 13574045486980287597
|
|
|
notsoshifty
|
 |
January 02, 2014, 12:33:21 AM |
|
CfB
Architecture question.
All nodes run the same software, each maintaining synchronized copy of blockchain Your reflex objection to any secondary authentication is that it can only be implemented using some sort of centralized method, defeating the robustness gained from the distributed nature.
I have been thinking about this at a high level this afternoon, so I am sure not all the details are right, but conceptually if we can implement a "centralized" type of action when all the nodes are running the same software and replicating the same dataset, then authentication could be implemented in a distributed context.
Correct or incorrect?
James
You can't assume all nodes run the same software. Rogue nodes do/will exist, although their rogueness may not be apparent to their peers.
|
|
|
|
jl777
Legendary
Offline
Activity: 1176
Merit: 1134
|
 |
January 02, 2014, 12:35:34 AM |
|
notsoshifty
OK, change "same software" to "software that uses the same protocol"
My question is still unanswered
James
|
|
|
|
ferment
Full Member
 
Offline
Activity: 168
Merit: 100
IDEX - LIVE Real-time DEX
|
 |
January 02, 2014, 12:39:40 AM |
|
can I get some SSH remote command help here? on a box, I can do lynx -dump http://localhost:7874/nxt?requestType=getPeer\&peer=79.102.159.249to see the stats for the 79.102.159.249 peer if it is connected. The results look like this (notice I had to escape the & there): {"platform":"?","application":"NRS","weight":0,"state":1,"announcedAddress":""," downloadedVolume":8758,"version":"0.4.7e","uploadedVolume":12675225}
why can I not use this to do a remote SSH command? root@vps1:~# ssh -i .ssh/vps root@vps1 lynx -dump http://localhost:7874/nxt?requestType=getPeer\&peer=79.102.159.249 {"errorCode":3,"errorDescription":"\"peer\" not specified"} root@vps1:~#
Try: ssh root@vps1 -t -C 'curl "http://localhost:7874/nxt?requestType=getPeer&peer=79.102.159.249"'
|
|
|
|
newcn
|
 |
January 02, 2014, 12:40:33 AM |
|
Oh my god, my nxt was stolen by some one, and the client behaves strange today: when I unlock my account, it stucked there and client complains: 2014-01-02 08:29:52.060:INFO:oejs.ServerConnector:main: Started ServerCon d1a23c{SSL-http/1.1}{0.0.0.0:7875} 2014-01-02 08:31:48.263:WARN:oejs.ServletHandler:qtp14109749-51: /nxt java.lang.IllegalStateException: WRITER at org.eclipse.jetty.server.Response.getOutputStream(Response.jav at Nxt.doGet(Nxt.java:9306) at javax.servlet.http.HttpServlet.service(HttpServlet.java:687) at javax.servlet.http.HttpServlet.service(HttpServlet.java:790) at org.eclipse.jetty.servlet.ServletHolder.handle(ServletHolder.j ) at org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter( Handler.java:1568) at org.eclipse.jetty.servlets.DoSFilter.doFilterChain(DoSFilter.j ) at org.eclipse.jetty.servlets.DoSFilter.doFilter(DoSFilter.java:3 at org.eclipse.jetty.servlets.DoSFilter.doFilter(DoSFilter.java:2 at org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter( Handler.java:1539) at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandl :524) at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHa ava:143) at org.eclipse.jetty.security.SecurityHandler.handle(SecurityHand a:568) at org.eclipse.jetty.server.session.SessionHandler.doHandle(Sessi er.java:221) at org.eclipse.jetty.server.handler.ContextHandler.doHandle(Conte er.java:1110) at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandle 453) at org.eclipse.jetty.server.session.SessionHandler.doScope(Sessio r.java:183) at org.eclipse.jetty.server.handler.ContextHandler.doScope(Contex r.java:1044) at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHa ava:141) at org.eclipse.jetty.server.handler.ContextHandlerCollection.hand extHandlerCollection.java:199) at org.eclipse.jetty.server.handler.HandlerCollection.handle(Hand ection.java:109) at org.eclipse.jetty.server.handler.HandlerWrapper.handle(Handler .java:97) at org.eclipse.jetty.server.Server.handle(Server.java:459) at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:2 at org.eclipse.jetty.server.HttpConnection.onFillable(HttpConnect a:229) at org.eclipse.jetty.io.AbstractConnection$1.run(AbstractConnecti :505) at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedTh l.java:607) at org.eclipse.jetty.util.thread.QueuedThreadPool$3.run(QueuedThr .java:536) at java.lang.Thread.run(Unknown Source) [2014-01-02 08:31:49.677] 17: java.lang.IllegalStateException: WRITER [2014-01-02 08:31:49.974] 17: java.lang.IllegalStateException: WRITER [2014-01-02 08:31:49.977] 17: java.lang.IllegalStateException: WRITER [2014-01-02 08:31:49.978] 17: java.lang.IllegalStateException: WRITER the theft transaction is sender: 16886318053889080545 recipient: 9793828175536096502 amount: 18197 fee: 1 confirmations: 453 which happened yesterday!
|
BTC:1NzzfeHCgN8fF6mSG1UeBFCVd2cxKbGyHk NXT:13187911577562526278
|
|
|
PaulyC
|
 |
January 02, 2014, 12:43:01 AM Last edit: January 02, 2014, 12:55:23 AM by PaulyC |
|
I literally saw my client a few moments after it happened (it was open) so how this happened is odd!
My actual User account that has been stolen from is NXT 16821029889165561706
I don't have any idea how this may have happened either. Just wanted to confirm, at the moment the theft happened your client was running and you had the browser window opened, and your account was unlocked (you were seeing your balance and the "send money" arrow), is that all correct? Just trying to differentiate the possibilities, whether the hacker obtained you password via brute-force or some other way and initiated the transaction from another machine, or somehow your own machine was tricked to initiate the transaction. And you were running 0.4.8 at the time, right? I added the second check for secret phrase before send money exactly to increase security, so that even if you account is unlocked in the browser you still need to enter your password again. Another question, did you generate your random-looking password using some software - password manager, online service, or created it manually by typing at random? I just wanted to clarify, with this, I had my server and client open. Was just perusing the blocks within the client, seeing if I was up-to-date, something I just do sometimes, and the account balance went from 7808, then on next look 0, maybe a moment later, less than 10 seconds. No one was remotely accessing my computer etc. It was just balance 0, account recipient ID under sent transactions with 7808, etc. Update ran a full scan with my antivirus software, ESET, all up to date, no viruses or intrusions found. The other question about password, this is the very first account I made so I did use the password generator that I had seen recommended on nextcoin.org used "local" mode, to a certain degree, http://passwordsgenerator.net/(i definitely wouldn't recommend using one of these) for 25 of the char of the PW, then I just made up the rest randomly 9 more characters. and I'm not sure about what online nodes refers to exactly, but I can honestly say I never used anything online with that PW until today with CfB. I don't see any strange opened ports so I believe I'm good on that end. Has anyone else noticed the 4.8 download zip from nextcoin.org vs. the one from this exact link Nxt 0.4.8 - https://mega.co.nz/#!yV5A1BTR!oi33K7WovgccuEHvP05nzggTnxrkZHJbwFmv5tGeXNI Are 5 Kb in difference? is that anything to be concerned about? I want to buy more NXT, but it just sucks cuz i got in somewhat early and thought I was following all the instructions correctly, and I honestly don't know what happened which makes me hesitant. It's not cool everyone thinks I'm some troll planning this all out, but I guess that's a natural reaction. I would hope in the future there's someway to stop someone from just taking someone's NXT like this, (I actually thought the two step PW on "sending" was a good idea, but didn't stop them in this case) I'll try to keep an eye out on this hacker's acct# to see if he hits anybody else. http://22k.io/-account/16204974692852323982
|
Doge Mars Landing Foundation (founder) Coined the phrase, "Doge to the Mars" and "Check that Hash!". Discoverer of the 2013 NXT nefarious wallet. Admin. FameMom [FAMOM]
|
|
|
PaulyC
|
 |
January 02, 2014, 12:48:26 AM |
|
Oh my god, my nxt was stolen by some one, and the client behaves strange today: when I unlock my account, it stucked there and client complains: 2014-01-02 08:29:52.060:INFO:oejs.ServerConnector:main: Started ServerCon d1a23c{SSL-http/1.1}{0.0.0.0:7875} 2014-01-02 08:31:48.263:WARN:oejs.ServletHandler:qtp14109749-51: /nxt java.lang.IllegalStateException: WRITER at org.eclipse.jetty.server.Response.getOutputStream(Response.jav at Nxt.doGet(Nxt.java:9306) at javax.servlet.http.HttpServlet.service(HttpServlet.java:687) at javax.servlet.http.HttpServlet.service(HttpServlet.java:790) at org.eclipse.jetty.servlet.ServletHolder.handle(ServletHolder.j ) at org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter( Handler.java:1568) at org.eclipse.jetty.servlets.DoSFilter.doFilterChain(DoSFilter.j ) at org.eclipse.jetty.servlets.DoSFilter.doFilter(DoSFilter.java:3 at org.eclipse.jetty.servlets.DoSFilter.doFilter(DoSFilter.java:2 at org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter( Handler.java:1539) at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandl :524) at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHa ava:143) at org.eclipse.jetty.security.SecurityHandler.handle(SecurityHand a:568) at org.eclipse.jetty.server.session.SessionHandler.doHandle(Sessi er.java:221) at org.eclipse.jetty.server.handler.ContextHandler.doHandle(Conte er.java:1110) at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandle 453) at org.eclipse.jetty.server.session.SessionHandler.doScope(Sessio r.java:183) at org.eclipse.jetty.server.handler.ContextHandler.doScope(Contex r.java:1044) at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHa ava:141) at org.eclipse.jetty.server.handler.ContextHandlerCollection.hand extHandlerCollection.java:199) at org.eclipse.jetty.server.handler.HandlerCollection.handle(Hand ection.java:109) at org.eclipse.jetty.server.handler.HandlerWrapper.handle(Handler .java:97) at org.eclipse.jetty.server.Server.handle(Server.java:459) at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:2 at org.eclipse.jetty.server.HttpConnection.onFillable(HttpConnect a:229) at org.eclipse.jetty.io.AbstractConnection$1.run(AbstractConnecti :505) at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedTh l.java:607) at org.eclipse.jetty.util.thread.QueuedThreadPool$3.run(QueuedThr .java:536) at java.lang.Thread.run(Unknown Source) [2014-01-02 08:31:49.677] 17: java.lang.IllegalStateException: WRITER [2014-01-02 08:31:49.974] 17: java.lang.IllegalStateException: WRITER [2014-01-02 08:31:49.977] 17: java.lang.IllegalStateException: WRITER [2014-01-02 08:31:49.978] 17: java.lang.IllegalStateException: WRITER the theft transaction is sender: 16886318053889080545 recipient: 9793828175536096502 amount: 18197 fee: 1 confirmations: 453 which happened yesterday! Newcn are you serious? cuz this is almost exactly what happened to me, I'm pretty sure my server had some language like this too! I just closed mine and didn't copy it like you did.. what is this? When I open it now it opens fine, but my balance is 0.
|
Doge Mars Landing Foundation (founder) Coined the phrase, "Doge to the Mars" and "Check that Hash!". Discoverer of the 2013 NXT nefarious wallet. Admin. FameMom [FAMOM]
|
|
|
S3MKi
Legendary
Offline
Activity: 1554
Merit: 1016
|
 |
January 02, 2014, 12:48:31 AM |
|
I literally saw my client a few moments after it happened (it was open) so how this happened is odd!
My actual User account that has been stolen from is NXT 16821029889165561706
I don't have any idea how this may have happened either. Just wanted to confirm, at the moment the theft happened your client was running and you had the browser window opened, and your account was unlocked (you were seeing your balance and the "send money" arrow), is that all correct? Just trying to differentiate the possibilities, whether the hacker obtained you password via brute-force or some other way and initiated the transaction from another machine, or somehow your own machine was tricked to initiate the transaction. And you were running 0.4.8 at the time, right? I added the second check for secret phrase before send money exactly to increase security, so that even if you account is unlocked in the browser you still need to enter your password again. Another question, did you generate your random-looking password using some software - password manager, online service, or created it manually by typing at random? I just wanted to clarify, with this, I had my server and client open. Was just perusing the blocks within the client, seeing if I was up-to-date, something I just do sometimes, and the account balance went from 7808, then on next look 0, maybe a moment later, less than 10 seconds. No one was remotely accessing my computer etc. It was just balance 0, account recipient ID under sent transactions with 7808, etc. Update ran a full scan with my antivirus software, ESET, all up to date, no viruses or intrusions found. The other question about password, this is the very first account I made so I did use the password generator that I had seen recommended on nextcoin.org used "local" mode, to a certain degree, http://passwordsgenerator.net/(i definitely wouldn't recommend using one of these) for 25 of the char of the PW, then I just made up the rest randomly 14 more characters. and I'm not sure about what online nodes refers to exactly, but I can honestly say I never used anything online with that PW until today with CfB. I don't see any strange opened ports so I believe I'm good on that end. Has anyone else noticed the 4.8 download zip from nextcoin.org vs. the one from this exact link Nxt 0.4.8 - https://mega.co.nz/#!yV5A1BTR!oi33K7WovgccuEHvP05nzggTnxrkZHJbwFmv5tGeXNI Are 5 Kb in difference? is that anything to be concerned about? I want to buy more NXT, but it just sucks cuz i got in somewhat early and thought I was following all the instructions correctly, and I honestly don't know what happened which makes me hesitant. It's not cool everyone thinks I'm some troll planning this all out, but I guess that's a natural reaction. I would hope in the future there's someway to stop someone from just taking someone's NXT like this, (I actually thought the two step PW on "sending" was a good idea, but didn't stop them in this case) I'll try to keep an eye out on this hacker's acct# to see if he hits anybody else. http://22k.io/-account/16204974692852323982do not worry much bro
|
|
|
|
S3MKi
Legendary
Offline
Activity: 1554
Merit: 1016
|
 |
January 02, 2014, 12:51:53 AM |
|
Oh my god, my nxt was stolen by some one, and the client behaves strange today: when I unlock my account, it stucked there and client complains: 2014-01-02 08:29:52.060:INFO:oejs.ServerConnector:main: Started ServerCon d1a23c{SSL-http/1.1}{0.0.0.0:7875} 2014-01-02 08:31:48.263:WARN:oejs.ServletHandler:qtp14109749-51: /nxt java.lang.IllegalStateException: WRITER at org.eclipse.jetty.server.Response.getOutputStream(Response.jav at Nxt.doGet(Nxt.java:9306) at javax.servlet.http.HttpServlet.service(HttpServlet.java:687) at javax.servlet.http.HttpServlet.service(HttpServlet.java:790) at org.eclipse.jetty.servlet.ServletHolder.handle(ServletHolder.j ) at org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter( Handler.java:1568) at org.eclipse.jetty.servlets.DoSFilter.doFilterChain(DoSFilter.j ) at org.eclipse.jetty.servlets.DoSFilter.doFilter(DoSFilter.java:3 at org.eclipse.jetty.servlets.DoSFilter.doFilter(DoSFilter.java:2 at org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter( Handler.java:1539) at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandl :524) at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHa ava:143) at org.eclipse.jetty.security.SecurityHandler.handle(SecurityHand a:568) at org.eclipse.jetty.server.session.SessionHandler.doHandle(Sessi er.java:221) at org.eclipse.jetty.server.handler.ContextHandler.doHandle(Conte er.java:1110) at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandle 453) at org.eclipse.jetty.server.session.SessionHandler.doScope(Sessio r.java:183) at org.eclipse.jetty.server.handler.ContextHandler.doScope(Contex r.java:1044) at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHa ava:141) at org.eclipse.jetty.server.handler.ContextHandlerCollection.hand extHandlerCollection.java:199) at org.eclipse.jetty.server.handler.HandlerCollection.handle(Hand ection.java:109) at org.eclipse.jetty.server.handler.HandlerWrapper.handle(Handler .java:97) at org.eclipse.jetty.server.Server.handle(Server.java:459) at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:2 at org.eclipse.jetty.server.HttpConnection.onFillable(HttpConnect a:229) at org.eclipse.jetty.io.AbstractConnection$1.run(AbstractConnecti :505) at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedTh l.java:607) at org.eclipse.jetty.util.thread.QueuedThreadPool$3.run(QueuedThr .java:536) at java.lang.Thread.run(Unknown Source) [2014-01-02 08:31:49.677] 17: java.lang.IllegalStateException: WRITER [2014-01-02 08:31:49.974] 17: java.lang.IllegalStateException: WRITER [2014-01-02 08:31:49.977] 17: java.lang.IllegalStateException: WRITER [2014-01-02 08:31:49.978] 17: java.lang.IllegalStateException: WRITER the theft transaction is sender: 16886318053889080545 recipient: 9793828175536096502 amount: 18197 fee: 1 confirmations: 453 which happened yesterday! omg. How do they steal your nxt!?!?
|
|
|
|
newcn
|
 |
January 02, 2014, 12:53:53 AM |
|
Newcn are you serious? cuz this is almost exactly what happened to me, I'm pretty sure my server had some language like this too! I just closed mine and didn't copy it like you did.. what is this? When I open it now it opens fine, but my balance is 0.
's Im not joking, the thief take all from my account, there're 1696 nxt arrive after, that's all my balance now and I can't transfer to other account
|
BTC:1NzzfeHCgN8fF6mSG1UeBFCVd2cxKbGyHk NXT:13187911577562526278
|
|
|
S3MKi
Legendary
Offline
Activity: 1554
Merit: 1016
|
 |
January 02, 2014, 12:55:38 AM |
|
Newcn are you serious? cuz this is almost exactly what happened to me, I'm pretty sure my server had some language like this too! I just closed mine and didn't copy it like you did.. what is this? When I open it now it opens fine, but my balance is 0.
's Im not joking, the thief take all from my account, there're 1696 nxt arrive after, that's all my balance now and I can't transfer to other account Where did you download your client 0.4.8?
|
|
|
|
notsoshifty
|
 |
January 02, 2014, 12:59:24 AM |
|
Has anyone else noticed the 4.8 download zip from nextcoin.org vs. the one from this exact link Nxt 0.4.8 - https://mega.co.nz/#!yV5A1BTR!oi33K7WovgccuEHvP05nzggTnxrkZHJbwFmv5tGeXNI Are 5 Kb in difference? is that anything to be concerned about? You've quoted one, but what is the second link exactly?
|
|
|
|
PaulyC
|
 |
January 02, 2014, 01:00:27 AM |
|
Newcn are you serious? cuz this is almost exactly what happened to me, I'm pretty sure my server had some language like this too! I just closed mine and didn't copy it like you did.. what is this? When I open it now it opens fine, but my balance is 0.
's Im not joking, the thief take all from my account, there're 1696 nxt arrive after, that's all my balance now and I can't transfer to other account and let me guess.. when you tried to re-enter your client.. it was sort of "sticking".. like mine was hanging for a second after entering the passphrase, I don't think it ever did that b4. it's always like passphrase, enter, bam client right there.. but when i noticed it gone, i trying to start the server/client from scratch in hopes it was just something in the browser history was off. I'm on Chrome Google, download link was the one directly from nextcoin.org, I think it's a different mega link I used from the one placed on page 1 here. @notsoshifty.. umm.. This is the place and link I actually DLed and was using when my NXT was stolen (I think I'm not sure if it's the exact same file it coulda been updated?) https://nextcoin.org/index.php/topic,4.0.htmlhttps://mega.co.nz/#!yV5A1BTR!oi33K7WovgccuEHvP05nzggTnxrkZHJbwFmv5tGeXNI Ok I just realized those two links (front page and nextcoin.org) are the same. weird. Could they have been different yesterday?
|
Doge Mars Landing Foundation (founder) Coined the phrase, "Doge to the Mars" and "Check that Hash!". Discoverer of the 2013 NXT nefarious wallet. Admin. FameMom [FAMOM]
|
|
|
|
|