|
jkoil
|
 |
January 31, 2014, 02:26:52 PM |
|
Sure. It's up to you to decide. You don't like Dgex, then don't use it.
You can be sure that I will never use DGEX again.Grav seems nice guy, but DGEX is not prefessional.Thats all. it's just businness. Absolutely. Just business. As for me, I bought nxt at 0.000069 on Dgex yesterday. About 5% lower then on Bter. I'd love to use Btc-e only. I think it's a perfect exchange, but they don't trade Nxt, so I have to use Dgex and Bter. not just business Shouldn't we support "NXT ecosystem" and have some tolerance for development and error corrections. Ofc it is so that problems must be brought into light, even smaller ones, but then should have patience ...
|
|
|
|
|
Damelon
Legendary
Offline
Activity: 1092
Merit: 1010
|
 |
January 31, 2014, 02:36:40 PM |
|
another question lol
if i close my client.. i have to wait 1440 blocks before i can forge again right? it was finally forging and had to close it to upgrade to 0.5.11... :/
No, if your Nxt has been confirmed 1440 times, that's good. Once you open the new client, you will start forging immediately again 
|
|
|
|
|
salsacz
|
 |
January 31, 2014, 02:39:39 PM |
|
Funny thing. Lyaffe made a challenge with guessing a passphrase https://nextcoin.org/index.php/topic,3718.0.htmlI decided to simplify rules, created an account with simple passphrase and sent 100 Nxt to that account. The passphrase was an answer to the question: "I'm a big fun of soap operas and have no idea about security.". Guess what. Someone stole 100 Nxt before I even managed to post the question  yes, in fact there would/could be quizes on the internet and then especially at the conventions/conferences, but answer will have to always have some additional phrase
|
|
|
|
|
Damelon
Legendary
Offline
Activity: 1092
Merit: 1010
|
 |
January 31, 2014, 02:44:46 PM |
|
another question lol
if i close my client.. i have to wait 1440 blocks before i can forge again right? it was finally forging and had to close it to upgrade to 0.5.11... :/
No, if your Nxt has been confirmed 1440 times, that's good. Once you open the new client, you will start forging immediately again  oh ok so my deposit of nxt needs 1440 conformations...before i can forge.. ok got it.. and you know the way on nxt blockexplorer it tells you your ratio of forging.. mine being like 0.0011% [8.blabla] or sumthin.. how ofter do i get that? is it just pure flook? To be honest, I totally disregards both that, and the message about it in the client (after 1440 confirms your client starts giving you forging ETAs). I go by "it will take a lot of time".  Saves me a lot of stress.
|
|
|
|
|
Passion_ltc
|
 |
January 31, 2014, 02:54:42 PM |
|
Encrypted messaging via AMI coded an encryption tool, which encrypts a message with AES (128, 192 and 256 bit). After the encryption you can send it to the blockchain. You need to specify a key and an initialization vector. More info you can find on my website and wikipedia. If anyone has an idea how I can make a system where the recipient knows which key and initialization vector he has to use, let me know! :) For the encryption part I used this php version! To the Msg Encrypter!I made 2 test encryption messages, they were send from the website directly. Key: 12345678909876541234567890987654
Initialization Vector: 0987654321234567
Encryption Mode: cbc
Encryption: 256 Bit
Original message: This is the first encrypted message sent by NXTarea.com! Soon on nxtion.com! :) Have fun. Greetings Berzerk.
Encrypted message: <°þÆÞ¥vgKä”8Aïš™Š]lûŽ·0\¯ù„ðÔFWÆvÖkVöæ¥ÑÄ U€³ÈZí¾*¥êÝVÆ3òk–4ß§óÖ+;ÊYÏ«èaäz»'î ™‡I%Æ
Base64-Encoded Encrypted Message: PLD+xt6BpXZnS+SUOEHvH5qZil1s+463MFwZr/mE8NQURlcZxnbWEmtW9ual0cQgVYCzyFoQ7b4qperdVsYz8muWPEdIxm8ZsKIS4yjEzwS+6RY+NN+n89YrO8pZzwIDqxfoYeR6uyfuoMKZh0klxg==
Key: 12345678909876541234567890987654
Initialization Vector: 0987654321234567
Encryption Mode: cbc
Encryption: 256 Bit
Original message: This is the second encrypted message sent by NXTarea.com! I hope you like it. :)
Encrypted message: âROÔƒj^iƒr7]ˆûŒl Y^·bMm˜ê.Û7yXºHr†sOÏ _¾€ÄÊúùÐ1u&ü1ge~Þ=¾X;3ÝÞhj5 (4pcˆÏ–±+Æk”¸Í?6jå€M²‹
Base64-Encoded Encrypted Message: 4lJP1INqXo1pg3I3XYj7jGwJFllet2JNbZjqLts3eVi6SHKGc0/PCl++gJ3Eyvr50DF/dSb8MWdlft49vlg7M93eaGo1ICg0cGOIz5axK8ZrlBgRuI3NPzYIauWATbKL
You can also view them on my AM Explorer (IDs: 1100, 1101) If everything works fine I will implement it into nxtion.com in form of a messaging tool between all users, where the key/init_vect are known (if wanted). Thank you. PS: I also participate with this in the AM contest. :)
|
|
|
|
|
salsacz
|
 |
January 31, 2014, 02:59:37 PM |
|
ebereon: and how can you manage it? You can connect it to the notebook or google nexus 7? 
|
|
|
|
|
|
rickyjames
|
 |
January 31, 2014, 03:02:31 PM Last edit: January 31, 2014, 03:15:04 PM by rickyjames |
|
Funny thing. Lyaffe made a challenge with guessing a passphrase https://nextcoin.org/index.php/topic,3718.0.htmlI decided to simplify rules, created an account with simple passphrase and sent 100 Nxt to that account. The passphrase was an answer to the question: "I'm a big fun of soap operas and have no idea about security.". Guess what. Someone stole 100 Nxt before I even managed to post the question  What the hell? How is that possible? It is already known that there is a bot running that checks the balances of very simple passwords. If you send some NXT to accounts of passphrases "1" or smthg, it will be gone within 45 seconds! This is really scary. There is apparently a continuous, ongoing attack against NXT looking for weak passwords. There is no way to know how many hackers are doing this or how much computer horsepower is being directed towards this because the attack can be run offline against a copy of the blockchain. Every day we are signing up 100 users on average and we are hoping to get many, many more. NEW USERS ARE NOT BEING TOLD OFTEN ENOUGH OR STRONGLY ENOUGH ABOUT THE IMPORTACE OF A LOOOONG RANDOM PASSWORD. Every day new users are coming in and using a short password and immediately lose their NXT just like dzarmush did. They do not put a happy smile after their experience. They do not put a happy smile after their experience. They do not put a happy smile after their experience. I truly believe that one of the biggest threats to NXT is word of mouth about poor security. "Yeah, I tried to buy some NXT, it was stolen in 24 hours, better steer clear of that coin..." That kind of talk - and the poor security hygiene that precipitate it - needs to be nipped in the bud NOW. We only get a fresh reputation once - and people are losing NXT at an alarming rate, at least it seems that way to me. Some day when I am all caught up (ha ha ha) I want to start a Wiki page listing every known past instance of lost NXT and have new users record their experiences on what happened to them in some kind of table. This is data we need to be accumulating.
|
|
|
|
|
|
salsacz
|
 |
January 31, 2014, 03:05:07 PM |
|
hopefully new clients will have built system for creating strong passwords / not allowing weak ones 
|
|
|
|
|
|
salsacz
|
 |
January 31, 2014, 03:06:11 PM |
|
its sort of like the recognition of this problem has caused people to attempt to compensate for it and in so doing they created a situation where its less of a problem in the system where its supposedly a problem than in other systems where its not. Thanks. Any other comments? 
|
|
|
|
|
FrictionlessCoin
Legendary
Offline
Activity: 868
Merit: 1000
Cryptotalk.org - Get paid for every post!
|
 |
January 31, 2014, 03:08:18 PM |
|
Funny thing. Lyaffe made a challenge with guessing a passphrase https://nextcoin.org/index.php/topic,3718.0.htmlI decided to simplify rules, created an account with simple passphrase and sent 100 Nxt to that account. The passphrase was an answer to the question: "I'm a big fun of soap operas and have no idea about security.". Guess what. Someone stole 100 Nxt before I even managed to post the question  This is really scary. There is apparently a continuous, ongoing attack against NXT looking for weak passwords. There is no way to know how many hackers are doing this or how much computer horsepower is being directed towards this because the attack can be run offline against a copy of the blockchain. Every day we are signing up 100 users on average and we are hoping to get many, many more. NEW USERS ARE NOT BEING TOLD OFTEN ENOUGH OR STRONGLY ENOUGH ABOUT THE IMPORTACE OF A LOOOONG RANDOM PASSWORD. Every day new users are coming in and using a short password and immediately lose their NXT just like dzarmush did. They do not put a happy smile after their experience. They do not put a happy smile after their experience. They do not put a happy smile after their experience. I truly believe that one of the biggest threats to NXT is word of mouth about poor security. "Yeah, I tried to buy some NXT, it was stolen in 42 hours, better steer clear of that coin..." That kind of talk - and the activities that precipitate it - needs to be nipped in the bud NOW. We only get a fresh reputation once - and people are losing NXT at an alarming rate, at least to me. Some day when I am all caught up (ha ha ha) I want to start a Wiki page listing every known past instance of lost NXT and have new users record their experiences on what happened to them in some kind of table. This is data we need to be accumulating. Can''t be fixed. It is fundamental broken. Exposing the private key (even if it is hashed) is just fundamentally wrong.
|
|
|
|
PeercoinEnthusiast
Full Member
 
Offline
Activity: 126
Merit: 100
JustabitofTime - Co-Founder of CoinTropolis
|
 |
January 31, 2014, 03:08:23 PM |
|
Rickyjames, Texas conference etc --
I can send you additional business card holders. Also, I'll have my dad do a test run on the stainless steel water bottles and see how they turn out (fingers crossed).
rj, justabit, nifty etc -- how many people do we anticipate a team of Nxt representatives would meet over the course of a conference? IOW, if I was to engrave a batch of bottles (or keychains, or <insert swag>), how many should I whip up? 20? 100?
Swag that is big and bulky is going to be very difficult to manage if we have no exhibitor table to use as a base. Basically I intend to walk around two days shaking hands so any swag to give out would need to be small and light so I could lug it. Engraving on objects is neat and I appreciate the effort but I also think it is expensive and I hate to see that go to waste when people just chuck it into a back drawer when they get home. To me the key items are brochures and business cards - cheap, lights, full of information. Exactly, if we are not getting a booth, I'd argue that even brochures is a bit much (unless they are quite small) and not common at these events. - Business Cards - Good handshake and eye contact - Ability to figure out who are the decision makers - Ability to setup mini 10 minute meetings with booth merchants - Frequent updates to the community during the event That's the slam dunk, more than most people are doing there.
|
JustaBitofTime - Co-Founder of CoinTropolis - Currently assisting Nxt
|
|
|
Come-from-Beyond
Legendary
Offline
Activity: 2142
Merit: 1010
Newbie
|
 |
January 31, 2014, 03:12:42 PM |
|
Can''t be fixed. It is fundamental broken. Exposing the private key (even if it is hashed) is just fundamentally wrong.
FrictionlessCoin == Hazard !!! Both state the same silly things.
|
|
|
|
|
nxtru
Newbie
Offline
Activity: 37
Merit: 0
|
 |
January 31, 2014, 03:15:44 PM |
|
Funny thing. Lyaffe made a challenge with guessing a passphrase https://nextcoin.org/index.php/topic,3718.0.htmlI decided to simplify rules, created an account with simple passphrase and sent 100 Nxt to that account. The passphrase was an answer to the question: "I'm a big fun of soap operas and have no idea about security.". Guess what. Someone stole 100 Nxt before I even managed to post the question  This is really scary. There is apparently a continuous, ongoing attack against NXT looking for weak passwords. There is no way to know how many hackers are doing this or how much computer horsepower is being directed towards this because the attack can be run offline against a copy of the blockchain. Every day we are signing up 100 users on average and we are hoping to get many, many more. NEW USERS ARE NOT BEING TOLD OFTEN ENOUGH OR STRONGLY ENOUGH ABOUT THE IMPORTACE OF A LOOOONG RANDOM PASSWORD. Every day new users are coming in and using a short password and immediately lose their NXT just like dzarmush did. They do not put a happy smile after their experience. They do not put a happy smile after their experience. They do not put a happy smile after their experience. I truly believe that one of the biggest threats to NXT is word of mouth about poor security. "Yeah, I tried to buy some NXT, it was stolen in 42 hours, better steer clear of that coin..." That kind of talk - and the activities that precipitate it - needs to be nipped in the bud NOW. We only get a fresh reputation once - and people are losing NXT at an alarming rate, at least to me. Some day when I am all caught up (ha ha ha) I want to start a Wiki page listing every known past instance of lost NXT and have new users record their experiences on what happened to them in some kind of table. This is data we need to be accumulating. Can''t be fixed. It is fundamental broken. Exposing the private key (even if it is hashed) is just fundamentally wrong. Please point me where you found "Exposing the private key" phrase, I can't see it.
|
|
|
|
|
|
opticalcarrier
|
 |
January 31, 2014, 03:17:48 PM |
|
Funny thing. Lyaffe made a challenge with guessing a passphrase https://nextcoin.org/index.php/topic,3718.0.htmlI decided to simplify rules, created an account with simple passphrase and sent 100 Nxt to that account. The passphrase was an answer to the question: "I'm a big fun of soap operas and have no idea about security.". Guess what. Someone stole 100 Nxt before I even managed to post the question  What the hell? How is that possible? It is already known that there is a bot running that checks the balances of very simple passwords. If you send some NXT to accounts of passphrases "1" or smthg, it will be gone within 45 seconds! This is really scary. There is apparently a continuous, ongoing attack against NXT looking for weak passwords. There is no way to know how many hackers are doing this or how much computer horsepower is being directed towards this because the attack can be run offline against a copy of the blockchain. Every day we are signing up 100 users on average and we are hoping to get many, many more. NEW USERS ARE NOT BEING TOLD OFTEN ENOUGH OR STRONGLY ENOUGH ABOUT THE IMPORTACE OF A LOOOONG RANDOM PASSWORD. Every day new users are coming in and using a short password and immediately lose their NXT just like dzarmush did. They do not put a happy smile after their experience. They do not put a happy smile after their experience. They do not put a happy smile after their experience. I truly believe that one of the biggest threats to NXT is word of mouth about poor security. "Yeah, I tried to buy some NXT, it was stolen in 24 hours, better steer clear of that coin..." That kind of talk - and the poor security hygene that precipitate it - needs to be nipped in the bud NOW. We only get a fresh reputation once - and people are losing NXT at an alarming rate, at least it seems that way to me. Some day when I am all caught up (ha ha ha) I want to start a Wiki page listing every known past instance of lost NXT and have new users record their experiences on what happened to them in some kind of table. This is data we need to be accumulating. https://bitcointalk.org/index.php?topic=345619.msg4799666#msg4799666I wish my idea would get some traction. Also, look at the HUGE EMPTY BOX available when we type in a passphrase. Why is there not some info in that box for a new user to read, warning that their NXT WILL be stolen if they use a simple word/phrase, even a long sentence if it is in some vulgate?
|
|
|
|
|
|
opticalcarrier
|
 |
January 31, 2014, 03:18:45 PM |
|
Please point me where you found "Exposing the private key" phrase, I can't see it.
his claim is that since the public key is a curve25519 hash of the private key that it is exposed. 
|
|
|
|
|
l8orre
Legendary
Offline
Activity: 1194
Merit: 1021
|
 |
January 31, 2014, 03:19:42 PM |
|
Can''t be fixed. It is fundamental broken. Exposing the private key (even if it is hashed) is just fundamentally wrong.
oh Boy - FrictionlessCoin, there is something you fundamentally misunderstood when your momma explained that curious thing about them 'pussies' to you ... 
|
|
|
|
|
Agent86
Newbie
Offline
Activity: 25
Merit: 0
|
 |
January 31, 2014, 03:20:54 PM |
|
Thanks NxtChg, the format I wrote "Nxxxx xxxx X xxxx xxxxT" or even just "Nxxx xxxx xxxx xxxx" instead of NXTxx xxxxx xxxxx xxxxx this addresses two of the "arguments against" branding Arguments against: Longer addresses, usability suffers. -> Harder to find address visually, because all 3 first letters are the same. -> Needless duplication in case of: Phone: 123-4122-312 Email: john@doe.comSkype: john_doe BTC: 1dff943fjfj90234jfidsjf98430jffj03 NXT: NXT-JOHN-2342-S4FW4-DFSESE Even if the branding is more subtle I think it still functions. I also prefer removing confusing letters/numbers rather than mapping I=1 etc. to the same code, "For rare cases where you need to actually type in the address". Maybe I'm wrong but I thought the point of using shortened "visible ID" addresses in NXT is so people can type an address. Mapping I=1 to the same code makes people nervous because they don't know it will do that. I think using unambiguous alphabet is better. What is the value in making it easy for people create a vanity address that starts with a word, Why not just register an alias?
|
|
|
|
|
|
bidji29
|
 |
January 31, 2014, 03:25:09 PM |
|
To avoid the situation were people choose weak password, there is a simple solution. Do not let them choose. The client should generate an account itself.
It would be like the bitcoin private keys. Hidden from the user, unless he's looking for it.
|
|
|
|
|
|
|
opticalcarrier
|
 |
January 31, 2014, 03:27:04 PM |
|
IMO, if we are to use a prefix, it should ONLY be N and not NXT, and then there should be no dash between the N and the rest of the account. AND that N should participate in whatever error correcting code we choose. If it doesnt then it is completely useless. I still say no prefix at all, I like shorter account numbers - less to deal with.
|
|
|
|
|
|