Bitcoin Forum
May 26, 2024, 04:41:29 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 [415] 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 ... 1310 »
  Print  
Author Topic: [ANN] Ethereum: Welcome to the Beginning  (Read 2004142 times)
cesmak
Legendary
*
Offline Offline

Activity: 1050
Merit: 1009



View Profile
June 19, 2016, 12:56:52 PM
 #8281

Yes, he deserve a good jail..... LOL

lordoliver
Legendary
*
Offline Offline

Activity: 1666
Merit: 1020

expect(brain).toHaveBeenUsed()


View Profile
June 19, 2016, 01:02:54 PM
 #8282


Of course I would. But that doesn't mean, that I should. Look at my given movie.

And we are not even talking about lives anyway, so the only think is loosing money. I am also invested in both ETH and DAO, but still I know, that its wrong, to make a hard fork. Soft forks, can be maybe considered to put pressure on the attacker to give most of the money back.

But for finding that exploit, he has deserved some money anyway. Companies like Apple, Facebook or Google pay a lot for finding exploits...

If he didn't do it someone else would have have done it later and it would have been even worse scenario...

Yes they pay if you talk of the exploit you found directly to the company, not using it, to stole money, and then if the exploit is confirmed they pay a reward..... this is not the way to manage exploits in the right manner....

There are some, that don't pay enough and the hacker sells it as 0-days,...
Brain is expensive...

In this case is a Cracker (not hacker) and this is not always a good behaviour.....

noone said that. But manners don't count here. Its the fact, that he deserves something...

Deserve something WHAT ? Afther he make a robbery !?!?!?!?! WTF.... !!!!

not additionally. but some of the money for finding the bug. Anyway.
You guys just don't want to see both sides of the medal...
I am fine with any decisions, but I think we run into bigger problems if we hard fork, than if we try to find the consensus with the attacker instead.

After a hard fork ETH will probably have lower value, because then a lot of decentralization priests will be counter ETH.

And if the attacker manages to persuade miners to take his transaction with the 1million eth, the money is still gone, but all of it.
Dealing with the attacker will at least bring some back...

But do what you want.
haendehochueberfall
Full Member
***
Offline Offline

Activity: 182
Merit: 100


View Profile WWW
June 19, 2016, 01:22:29 PM
 #8283

Another successful attack!

https://www.reddit.com/r/ethtrader/comments/4ot3vi/warning_another_successful_attack_recursive_split/
abercrombie
Legendary
*
Offline Offline

Activity: 1159
Merit: 1001



View Profile
June 19, 2016, 01:28:04 PM
 #8284

$7,913,177.070017318

Let's just round it out to $8 million more lost.
Bamsed
Member
**
Offline Offline

Activity: 120
Merit: 10


View Profile
June 19, 2016, 01:39:24 PM
 #8285


Mircea Popescu could be the attacker

http://trilema.com/2013/dear-guardian-stop-being-retarded/#comment-95603
killerjoegreece
Legendary
*
Offline Offline

Activity: 1680
Merit: 1010


Professional Native Greek Translator (2000+ done)


View Profile WWW
June 19, 2016, 01:40:22 PM
 #8286


how much is lost in total?
haendehochueberfall
Full Member
***
Offline Offline

Activity: 182
Merit: 100


View Profile WWW
June 19, 2016, 01:44:21 PM
 #8287

Second independant successfull attack within the last hour

https://www.reddit.com/r/ethtrader/comments/4ot3vi/warning_another_successful_attack_recursive_split/

this is coming in by the minute
revelacaogr
Legendary
*
Offline Offline

Activity: 1316
Merit: 1021

2009 Alea iacta est


View Profile
June 19, 2016, 01:49:18 PM
 #8288

https://www.youtube.com/watch?v=RHcLKrkwPLQ

Published on 18 Jun 2016

A live show recorded in the aftermath of the DAO's draining of funds by an unknown actor. In this show, Andreas M. Antonopoulos moderates a discussion with guests Pamela Morgan (attorney), Brian Klein (attorney) and Taylor Gerring (Ethereum Project co-founder), with live twitter Q&A and participation from the DAO slack channel.


its a very good debate......
this debade shows very well that exist a lot of confuse in the law ,its very complicated(( every state have different laws,the white paper is not so white e.t.c )) and will take months (( if ))to resolve this dispute.....
dumana
Full Member
***
Offline Offline

Activity: 148
Merit: 100


View Profile
June 19, 2016, 01:51:26 PM
 #8289

Why cannot the DAO developers move the rest of the tokens to an account and freeze that? That will prevent further attack.
HPt
Member
**
Offline Offline

Activity: 70
Merit: 15


View Profile
June 19, 2016, 01:54:58 PM
 #8290

Why cannot the DAO developers move the rest of the tokens to an account and freeze that? That will prevent further attack.

I happen to have two proposals running. Their 7 days periods will be over on Monday and Tuesday. If those proposals can be used for a white hat attack in order to save funds I'd be happy to provide them (for a small fee).
dumana
Full Member
***
Offline Offline

Activity: 148
Merit: 100


View Profile
June 19, 2016, 01:57:05 PM
 #8291

Why cannot the DAO developers move the rest of the tokens to an account and freeze that? That will prevent further attack.

I happen to have two proposals running. Their 7 days periods will be over on Monday and Tuesday. If those proposals can be used for a white hat attack in order to save funds I'd be happy to provide them (for a small fee).

But those big holder should have many accounts and they can use those to move (attack) the Ethereum to protect it.
seedtrue
Legendary
*
Offline Offline

Activity: 963
Merit: 1002



View Profile
June 19, 2016, 01:58:00 PM
 #8292

Second independant successfull attack within the last hour

https://www.reddit.com/r/ethtrader/comments/4ot3vi/warning_another_successful_attack_recursive_split/

this is coming in by the minute

Do you mean the second overall attack has just happened, or that there was 2 attacks which both happened in the last hour?
ocminer
Legendary
*
Offline Offline

Activity: 2660
Merit: 1240



View Profile WWW
June 19, 2016, 02:00:12 PM
 #8293

It's the same attack scheme like the last - as there are lots of instructions on the internet in the meanwhile to drain funds from the DAO - expect much more attacks shortly as long as the DAO is not fixed.

Nothing new...

suprnova pools - reliable mining pools - #suprnova on freenet
https://www.suprnova.cc - FOLLOW us @ Twitter ! twitter.com/SuprnovaPools
killerjoegreece
Legendary
*
Offline Offline

Activity: 1680
Merit: 1010


Professional Native Greek Translator (2000+ done)


View Profile WWW
June 19, 2016, 02:01:01 PM
 #8294

It's the same attack scheme like the last - as there are lots of instructions on the internet in the meanwhile to drain funds from the DAO - expect much more attacks shortly as long as the DAO is not fixed.

Nothing new...

this seems to be getting worse by the minute then;....
ocminer
Legendary
*
Offline Offline

Activity: 2660
Merit: 1240



View Profile WWW
June 19, 2016, 02:01:58 PM
 #8295

It's the same attack scheme like the last - as there are lots of instructions on the internet in the meanwhile to drain funds from the DAO - expect much more attacks shortly as long as the DAO is not fixed.

Nothing new...

this seems to be getting worse by the minute then;....

Why ? It's the same shit as before, just someone else copied the attack (or maybe its the same guy again)... Even you could drain the DAO if you google for a few minutes Wink

suprnova pools - reliable mining pools - #suprnova on freenet
https://www.suprnova.cc - FOLLOW us @ Twitter ! twitter.com/SuprnovaPools
dumana
Full Member
***
Offline Offline

Activity: 148
Merit: 100


View Profile
June 19, 2016, 02:03:45 PM
 #8296

It's the same attack scheme like the last - as there are lots of instructions on the internet in the meanwhile to drain funds from the DAO - expect much more attacks shortly as long as the DAO is not fixed.

Nothing new...

this seems to be getting worse by the minute then;....

Why ? It's the same shit as before, just someone else copied the attack (or maybe its the same guy again)... Even you could drain the DAO if you google for a few minutes Wink

So why do not you do it to protect the DAO community? I am quite confused, why didnot the Eth developers do that?
pönde
Full Member
***
Offline Offline

Activity: 308
Merit: 109


View Profile
June 19, 2016, 02:05:43 PM
 #8297

I ask this off topic question here, because Ethereum is supported by Jaxx-wallet. I do not know where else I could ask about it.


So. Few questions of Linux 64-bit Jaxx-wallet. Every time I create new wallet from the Jaxx-v1.0.3-linux-x64.tar.gz file, the wallet creates the same mnemonic seed. It does this also when I delete the old wallet before I create the new one. It creates the same seed even when I download the Jaxx-v1.0.3-linux-x64.tar.gz file again and create a new wallet from it.

So the seed is I gues stored somewhere, and the Jaxx-v1.0.3-linux-x64.tar.gz checks it and creates the same seed again.

How that can be avoided?
killerjoegreece
Legendary
*
Offline Offline

Activity: 1680
Merit: 1010


Professional Native Greek Translator (2000+ done)


View Profile WWW
June 19, 2016, 02:06:50 PM
 #8298

I ask this off topic question here, because Ethereum is supported by Jaxx-wallet. I do not know where else I could ask about it.


So. Few questions of Linux 64-bit Jaxx-wallet. Every time I create new wallet from the Jaxx-v1.0.3-linux-x64.tar.gz file, the wallet creates the same mnemonic seed. It does this also when I delete the old wallet before I create the new one. It creates the same seed even when I download the Jaxx-v1.0.3-linux-x64.tar.gz file again and create a new wallet from it.

So the seed is I gues stored somewhere, and the Jaxx-v1.0.3-linux-x64.tar.gz checks it and creates the same seed again.

How that can be avoided?

just dont tell me that there is another bug with priv keys
ocminer
Legendary
*
Offline Offline

Activity: 2660
Merit: 1240



View Profile WWW
June 19, 2016, 02:07:25 PM
 #8299

It's the same attack scheme like the last - as there are lots of instructions on the internet in the meanwhile to drain funds from the DAO - expect much more attacks shortly as long as the DAO is not fixed.

Nothing new...

this seems to be getting worse by the minute then;....

Why ? It's the same shit as before, just someone else copied the attack (or maybe its the same guy again)... Even you could drain the DAO if you google for a few minutes Wink

So why do not you do it to protect the DAO community? I am quite confused, why didnot the Eth developers do that?

Hmm thats actually a brilliant idea, why not drain it to protect the rest Smiley

As I think they'll fix it by soft/hardforking it will probably be pointless doing it, but hey.. It's sunday.. spare time...

suprnova pools - reliable mining pools - #suprnova on freenet
https://www.suprnova.cc - FOLLOW us @ Twitter ! twitter.com/SuprnovaPools
revelacaogr
Legendary
*
Offline Offline

Activity: 1316
Merit: 1021

2009 Alea iacta est


View Profile
June 19, 2016, 02:14:14 PM
 #8300

A Call for a Temporary Moratorium on The DAO


http://hackingdistributed.com/2016/05/27/dao-call-for-moratorium/


After this report,why they didn't shut down all the project immediately and put all the funds in cold?







Pages: « 1 ... 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 [415] 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 ... 1310 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!