ebereon
|
|
January 31, 2014, 02:08:54 PM |
|
... picture removed
Very nice work ebereon, any idea of the price for all? Thanks all, building this is fun Cost/parts of the solar powered RasPI NXT node: - 1 x CombiBox incl. Solar panel + 1x Empty battery box: €69,78 EUR (price can be optimiced!) - 8 x Panasonic NCR18650B 3,6V 3400mAh !!!UNPROTECTED!!!(€6,90 EUR): €55,20 EUR (best price!) - 1 x Empty battery box: €12,95 EUR (price can be optimiced!) - 1 x Raspberry PI model B: €39,95 EUR (price can be optimiced!) - 1 x USB Adapter cable mini B-plug - A-plug(connection battery boxes): €8,95 EUR (price can be optimiced!) - 1 x USB Adapter cable mini B-plug - A-socket(Solarpanel > battery box): €8,95 EUR (price can be optimiced!) - 1 x ISY IWL 2000 Wlan Adapter: €19,99 EUR (price can be optimiced!) - some time to set RasPI up Done! Not optimiced complete price is €215,77 EUR. I bougth everything from time to time over some month, not only for NXT Please do not complain about the price, this is not a consumer product! RasPI is a dev board and so are the components of this prototype. If you need a offgrid RasPI, then this is what works > 30 hours without sunshine! If you build 100 of em, the optimiced price would come down to half or more Greets, eb
|
|
|
|
Come-from-Beyond
Legendary
Offline
Activity: 2142
Merit: 1010
Newbie
|
|
January 31, 2014, 02:09:27 PM |
|
when is the nxt distributed exchange going to be up and running?
When the community tests it and is satisfied with the result.
|
|
|
|
rickyjames
|
|
January 31, 2014, 02:22:57 PM Last edit: January 31, 2014, 02:51:59 PM by rickyjames |
|
I have a few questions about nxt if someone could clarify that'd be great.
When I click the peer tab it shows a list of not only names but IPs is this just people hosting or everyone connected to the network at the time?
Why Java? Java often has exploits, it's not something most people want on there pc.
Security, is it being worked on? Even if you don't want usernames, two passwords would be a drastic improvement. Even possibly a second password where it asks you 3 random characters of it, like character 1,4,7 like some online banks use.
Nxt forging, correct me if I'm wrong but when I see the unconfirmed transaction tabs all transactions seem to have a 1 nxt fee, regardless of the amount, based on that it doesn't seem to make sense why the bigger share holders forge drastically more, maybe it should be transaction based? The more you send and receive the bigger chance?
Will there ever be an offline wallet? Thanks in advanced for any reply, what I said above wasn't supposed to be negative. I bought some yesterday as I think it has potential, it just needs work.
My understanding of NXT is far from perfect so somebody correct me if I'm wrong but here goes. The peer tab only shows the subset of nodes that are in your "peer group", not all that are connected. This list will grow the longer you stay on with your client and are eventually "discovered" by other nodes, one guy got up to 3000+ I think before his client crashed. The client is continually being updated to have fewer bugs/memory leaks/etc and is running longer and longer with each version number. NXT is only a couple of months old, so creaky code is a given at this point but is getting better and better. Security is a hot issue and there will be upgrades in the user security interface as new clients are introduced (at least, I sure hope so) - keep an eye out on Solaris, our best hope for a new user friendly client. Choosing who prints the next block based on transaction quantity would not be a Proof of Stake system as NXT currently is, it would be a Proof of Transaction Quantity system. Proof of Stake is the method used to assign trust levels here, presumably people who own more NXT have a bigger stake in seeing the system run smoothly that those who own less NXT. If there ever was a NXT wallet, it would be an illusion for general public users. NXT is a brainwallet, all a user's NXT is stored on the encrypted blockchain itself and not in a separate file that can be taken offline and stored in a bank safe deposit box. This is why long 40+ random passwords are so important - with NXT your holdings are available to you anywhere at any time, but they can be attacked continuously by hackers as well. There is no hiding your NXT away from others offline, it is always in the cloud. Welcome to NXT - new users like you are the only hope we have at success. Head on over to https://nextcoin.org/ to dig deeper into NXT!
|
|
|
|
|
jkoil
|
|
January 31, 2014, 02:26:52 PM |
|
Sure. It's up to you to decide. You don't like Dgex, then don't use it.
You can be sure that I will never use DGEX again.Grav seems nice guy, but DGEX is not prefessional.Thats all. it's just businness. Absolutely. Just business. As for me, I bought nxt at 0.000069 on Dgex yesterday. About 5% lower then on Bter. I'd love to use Btc-e only. I think it's a perfect exchange, but they don't trade Nxt, so I have to use Dgex and Bter. not just business Shouldn't we support "NXT ecosystem" and have some tolerance for development and error corrections. Ofc it is so that problems must be brought into light, even smaller ones, but then should have patience ...
|
|
|
|
Damelon
Legendary
Offline
Activity: 1092
Merit: 1010
|
|
January 31, 2014, 02:36:40 PM |
|
another question lol
if i close my client.. i have to wait 1440 blocks before i can forge again right? it was finally forging and had to close it to upgrade to 0.5.11... :/
No, if your Nxt has been confirmed 1440 times, that's good. Once you open the new client, you will start forging immediately again
|
|
|
|
salsacz
|
|
January 31, 2014, 02:39:39 PM |
|
Funny thing. Lyaffe made a challenge with guessing a passphrase https://nextcoin.org/index.php/topic,3718.0.htmlI decided to simplify rules, created an account with simple passphrase and sent 100 Nxt to that account. The passphrase was an answer to the question: "I'm a big fun of soap operas and have no idea about security.". Guess what. Someone stole 100 Nxt before I even managed to post the question yes, in fact there would/could be quizes on the internet and then especially at the conventions/conferences, but answer will have to always have some additional phrase
|
|
|
|
Damelon
Legendary
Offline
Activity: 1092
Merit: 1010
|
|
January 31, 2014, 02:44:46 PM |
|
another question lol
if i close my client.. i have to wait 1440 blocks before i can forge again right? it was finally forging and had to close it to upgrade to 0.5.11... :/
No, if your Nxt has been confirmed 1440 times, that's good. Once you open the new client, you will start forging immediately again oh ok so my deposit of nxt needs 1440 conformations...before i can forge.. ok got it.. and you know the way on nxt blockexplorer it tells you your ratio of forging.. mine being like 0.0011% [8.blabla] or sumthin.. how ofter do i get that? is it just pure flook? To be honest, I totally disregards both that, and the message about it in the client (after 1440 confirms your client starts giving you forging ETAs). I go by "it will take a lot of time". Saves me a lot of stress.
|
|
|
|
Passion_ltc
|
|
January 31, 2014, 02:54:42 PM |
|
Encrypted messaging via AMI coded an encryption tool, which encrypts a message with AES (128, 192 and 256 bit). After the encryption you can send it to the blockchain. You need to specify a key and an initialization vector. More info you can find on my website and wikipedia. If anyone has an idea how I can make a system where the recipient knows which key and initialization vector he has to use, let me know! :) For the encryption part I used this php version! To the Msg Encrypter!I made 2 test encryption messages, they were send from the website directly. Key: 12345678909876541234567890987654
Initialization Vector: 0987654321234567
Encryption Mode: cbc
Encryption: 256 Bit
Original message: This is the first encrypted message sent by NXTarea.com! Soon on nxtion.com! :) Have fun. Greetings Berzerk.
Encrypted message: <°þÆÞ¥vgKä”8Aïš™Š]lûŽ·0\¯ù„ðÔFWÆvÖkVöæ¥ÑÄ U€³ÈZí¾*¥êÝVÆ3òk–4ߧóÖ+;ÊYÏ«èaäz»'î ™‡I%Æ
Base64-Encoded Encrypted Message: PLD+xt6BpXZnS+SUOEHvH5qZil1s+463MFwZr/mE8NQURlcZxnbWEmtW9ual0cQgVYCzyFoQ7b4qperdVsYz8muWPEdIxm8ZsKIS4yjEzwS+6RY+NN+n89YrO8pZzwIDqxfoYeR6uyfuoMKZh0klxg==
Key: 12345678909876541234567890987654
Initialization Vector: 0987654321234567
Encryption Mode: cbc
Encryption: 256 Bit
Original message: This is the second encrypted message sent by NXTarea.com! I hope you like it. :)
Encrypted message: âROÔƒj^iƒr7]ˆûŒl Y^·bMm˜ê.Û7yXºHr†sOÏ _¾€ÄÊúùÐ1u&ü1ge~Þ=¾X;3ÝÞhj5 (4pcˆÏ–±+Æk”¸Í?6jå€M²‹
Base64-Encoded Encrypted Message: 4lJP1INqXo1pg3I3XYj7jGwJFllet2JNbZjqLts3eVi6SHKGc0/PCl++gJ3Eyvr50DF/dSb8MWdlft49vlg7M93eaGo1ICg0cGOIz5axK8ZrlBgRuI3NPzYIauWATbKL
You can also view them on my AM Explorer (IDs: 1100, 1101) If everything works fine I will implement it into nxtion.com in form of a messaging tool between all users, where the key/init_vect are known (if wanted). Thank you. PS: I also participate with this in the AM contest. :)
|
|
|
|
salsacz
|
|
January 31, 2014, 02:59:37 PM |
|
ebereon: and how can you manage it? You can connect it to the notebook or google nexus 7?
|
|
|
|
rickyjames
|
|
January 31, 2014, 03:02:31 PM Last edit: January 31, 2014, 03:15:04 PM by rickyjames |
|
Funny thing. Lyaffe made a challenge with guessing a passphrase https://nextcoin.org/index.php/topic,3718.0.htmlI decided to simplify rules, created an account with simple passphrase and sent 100 Nxt to that account. The passphrase was an answer to the question: "I'm a big fun of soap operas and have no idea about security.". Guess what. Someone stole 100 Nxt before I even managed to post the question What the hell? How is that possible? It is already known that there is a bot running that checks the balances of very simple passwords. If you send some NXT to accounts of passphrases "1" or smthg, it will be gone within 45 seconds! This is really scary. There is apparently a continuous, ongoing attack against NXT looking for weak passwords. There is no way to know how many hackers are doing this or how much computer horsepower is being directed towards this because the attack can be run offline against a copy of the blockchain. Every day we are signing up 100 users on average and we are hoping to get many, many more. NEW USERS ARE NOT BEING TOLD OFTEN ENOUGH OR STRONGLY ENOUGH ABOUT THE IMPORTACE OF A LOOOONG RANDOM PASSWORD. Every day new users are coming in and using a short password and immediately lose their NXT just like dzarmush did. They do not put a happy smile after their experience. They do not put a happy smile after their experience. They do not put a happy smile after their experience. I truly believe that one of the biggest threats to NXT is word of mouth about poor security. "Yeah, I tried to buy some NXT, it was stolen in 24 hours, better steer clear of that coin..." That kind of talk - and the poor security hygiene that precipitate it - needs to be nipped in the bud NOW. We only get a fresh reputation once - and people are losing NXT at an alarming rate, at least it seems that way to me. Some day when I am all caught up (ha ha ha) I want to start a Wiki page listing every known past instance of lost NXT and have new users record their experiences on what happened to them in some kind of table. This is data we need to be accumulating.
|
|
|
|
salsacz
|
|
January 31, 2014, 03:05:07 PM |
|
hopefully new clients will have built system for creating strong passwords / not allowing weak ones
|
|
|
|
salsacz
|
|
January 31, 2014, 03:06:11 PM |
|
its sort of like the recognition of this problem has caused people to attempt to compensate for it and in so doing they created a situation where its less of a problem in the system where its supposedly a problem than in other systems where its not. Thanks. Any other comments?
|
|
|
|
FrictionlessCoin
Legendary
Offline
Activity: 868
Merit: 1000
Cryptotalk.org - Get paid for every post!
|
|
January 31, 2014, 03:08:18 PM |
|
Funny thing. Lyaffe made a challenge with guessing a passphrase https://nextcoin.org/index.php/topic,3718.0.htmlI decided to simplify rules, created an account with simple passphrase and sent 100 Nxt to that account. The passphrase was an answer to the question: "I'm a big fun of soap operas and have no idea about security.". Guess what. Someone stole 100 Nxt before I even managed to post the question This is really scary. There is apparently a continuous, ongoing attack against NXT looking for weak passwords. There is no way to know how many hackers are doing this or how much computer horsepower is being directed towards this because the attack can be run offline against a copy of the blockchain. Every day we are signing up 100 users on average and we are hoping to get many, many more. NEW USERS ARE NOT BEING TOLD OFTEN ENOUGH OR STRONGLY ENOUGH ABOUT THE IMPORTACE OF A LOOOONG RANDOM PASSWORD. Every day new users are coming in and using a short password and immediately lose their NXT just like dzarmush did. They do not put a happy smile after their experience. They do not put a happy smile after their experience. They do not put a happy smile after their experience. I truly believe that one of the biggest threats to NXT is word of mouth about poor security. "Yeah, I tried to buy some NXT, it was stolen in 42 hours, better steer clear of that coin..." That kind of talk - and the activities that precipitate it - needs to be nipped in the bud NOW. We only get a fresh reputation once - and people are losing NXT at an alarming rate, at least to me. Some day when I am all caught up (ha ha ha) I want to start a Wiki page listing every known past instance of lost NXT and have new users record their experiences on what happened to them in some kind of table. This is data we need to be accumulating. Can''t be fixed. It is fundamental broken. Exposing the private key (even if it is hashed) is just fundamentally wrong.
|
|
|
|
PeercoinEnthusiast
Full Member
Offline
Activity: 126
Merit: 100
JustabitofTime - Co-Founder of CoinTropolis
|
|
January 31, 2014, 03:08:23 PM |
|
Rickyjames, Texas conference etc --
I can send you additional business card holders. Also, I'll have my dad do a test run on the stainless steel water bottles and see how they turn out (fingers crossed).
rj, justabit, nifty etc -- how many people do we anticipate a team of Nxt representatives would meet over the course of a conference? IOW, if I was to engrave a batch of bottles (or keychains, or <insert swag>), how many should I whip up? 20? 100?
Swag that is big and bulky is going to be very difficult to manage if we have no exhibitor table to use as a base. Basically I intend to walk around two days shaking hands so any swag to give out would need to be small and light so I could lug it. Engraving on objects is neat and I appreciate the effort but I also think it is expensive and I hate to see that go to waste when people just chuck it into a back drawer when they get home. To me the key items are brochures and business cards - cheap, lights, full of information. Exactly, if we are not getting a booth, I'd argue that even brochures is a bit much (unless they are quite small) and not common at these events. - Business Cards - Good handshake and eye contact - Ability to figure out who are the decision makers - Ability to setup mini 10 minute meetings with booth merchants - Frequent updates to the community during the event That's the slam dunk, more than most people are doing there.
|
JustaBitofTime - Co-Founder of CoinTropolis - Currently assisting Nxt
|
|
|
Come-from-Beyond
Legendary
Offline
Activity: 2142
Merit: 1010
Newbie
|
|
January 31, 2014, 03:12:42 PM |
|
Can''t be fixed. It is fundamental broken. Exposing the private key (even if it is hashed) is just fundamentally wrong.
FrictionlessCoin == Hazard !!! Both state the same silly things.
|
|
|
|
nxtru
Newbie
Offline
Activity: 37
Merit: 0
|
|
January 31, 2014, 03:15:44 PM |
|
Funny thing. Lyaffe made a challenge with guessing a passphrase https://nextcoin.org/index.php/topic,3718.0.htmlI decided to simplify rules, created an account with simple passphrase and sent 100 Nxt to that account. The passphrase was an answer to the question: "I'm a big fun of soap operas and have no idea about security.". Guess what. Someone stole 100 Nxt before I even managed to post the question This is really scary. There is apparently a continuous, ongoing attack against NXT looking for weak passwords. There is no way to know how many hackers are doing this or how much computer horsepower is being directed towards this because the attack can be run offline against a copy of the blockchain. Every day we are signing up 100 users on average and we are hoping to get many, many more. NEW USERS ARE NOT BEING TOLD OFTEN ENOUGH OR STRONGLY ENOUGH ABOUT THE IMPORTACE OF A LOOOONG RANDOM PASSWORD. Every day new users are coming in and using a short password and immediately lose their NXT just like dzarmush did. They do not put a happy smile after their experience. They do not put a happy smile after their experience. They do not put a happy smile after their experience. I truly believe that one of the biggest threats to NXT is word of mouth about poor security. "Yeah, I tried to buy some NXT, it was stolen in 42 hours, better steer clear of that coin..." That kind of talk - and the activities that precipitate it - needs to be nipped in the bud NOW. We only get a fresh reputation once - and people are losing NXT at an alarming rate, at least to me. Some day when I am all caught up (ha ha ha) I want to start a Wiki page listing every known past instance of lost NXT and have new users record their experiences on what happened to them in some kind of table. This is data we need to be accumulating. Can''t be fixed. It is fundamental broken. Exposing the private key (even if it is hashed) is just fundamentally wrong. Please point me where you found "Exposing the private key" phrase, I can't see it.
|
|
|
|
opticalcarrier
|
|
January 31, 2014, 03:17:48 PM |
|
Funny thing. Lyaffe made a challenge with guessing a passphrase https://nextcoin.org/index.php/topic,3718.0.htmlI decided to simplify rules, created an account with simple passphrase and sent 100 Nxt to that account. The passphrase was an answer to the question: "I'm a big fun of soap operas and have no idea about security.". Guess what. Someone stole 100 Nxt before I even managed to post the question What the hell? How is that possible? It is already known that there is a bot running that checks the balances of very simple passwords. If you send some NXT to accounts of passphrases "1" or smthg, it will be gone within 45 seconds! This is really scary. There is apparently a continuous, ongoing attack against NXT looking for weak passwords. There is no way to know how many hackers are doing this or how much computer horsepower is being directed towards this because the attack can be run offline against a copy of the blockchain. Every day we are signing up 100 users on average and we are hoping to get many, many more. NEW USERS ARE NOT BEING TOLD OFTEN ENOUGH OR STRONGLY ENOUGH ABOUT THE IMPORTACE OF A LOOOONG RANDOM PASSWORD. Every day new users are coming in and using a short password and immediately lose their NXT just like dzarmush did. They do not put a happy smile after their experience. They do not put a happy smile after their experience. They do not put a happy smile after their experience. I truly believe that one of the biggest threats to NXT is word of mouth about poor security. "Yeah, I tried to buy some NXT, it was stolen in 24 hours, better steer clear of that coin..." That kind of talk - and the poor security hygene that precipitate it - needs to be nipped in the bud NOW. We only get a fresh reputation once - and people are losing NXT at an alarming rate, at least it seems that way to me. Some day when I am all caught up (ha ha ha) I want to start a Wiki page listing every known past instance of lost NXT and have new users record their experiences on what happened to them in some kind of table. This is data we need to be accumulating. https://bitcointalk.org/index.php?topic=345619.msg4799666#msg4799666I wish my idea would get some traction. Also, look at the HUGE EMPTY BOX available when we type in a passphrase. Why is there not some info in that box for a new user to read, warning that their NXT WILL be stolen if they use a simple word/phrase, even a long sentence if it is in some vulgate?
|
|
|
|
opticalcarrier
|
|
January 31, 2014, 03:18:45 PM |
|
Please point me where you found "Exposing the private key" phrase, I can't see it.
his claim is that since the public key is a curve25519 hash of the private key that it is exposed.
|
|
|
|
l8orre
Legendary
Offline
Activity: 1181
Merit: 1018
|
|
January 31, 2014, 03:19:42 PM |
|
Can''t be fixed. It is fundamental broken. Exposing the private key (even if it is hashed) is just fundamentally wrong.
oh Boy - FrictionlessCoin, there is something you fundamentally misunderstood when your momma explained that curious thing about them 'pussies' to you ...
|
|
|
|
|