Bitcoin Forum
December 09, 2016, 01:41:12 PM *
News: To be able to use the next phase of the beta forum software, please ensure that your email address is correct/functional.
 
   Home   Help Search Donate Login Register  
Pages: « 1 ... 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 [310] 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 ... 426 »
  Print  
Author Topic: [CLOSED] BTC Guild - Pays TxFees+NMC, Stratum, VarDiff, Private Servers  (Read 829389 times)
This is a self-moderated topic. If you do not want to be moderated by the person who started this topic, create a new topic.
AussieHash
Hero Member
*****
Offline Offline

Activity: 675



View Profile
March 03, 2014, 04:09:10 AM
 #6181

Block at last !

That is funny where did you get it?

Google
1481290872
Hero Member
*
Offline Offline

Posts: 1481290872

View Profile Personal Message (Offline)

Ignore
1481290872
Reply with quote  #2

1481290872
Report to moderator
1481290872
Hero Member
*
Offline Offline

Posts: 1481290872

View Profile Personal Message (Offline)

Ignore
1481290872
Reply with quote  #2

1481290872
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
1481290872
Hero Member
*
Offline Offline

Posts: 1481290872

View Profile Personal Message (Offline)

Ignore
1481290872
Reply with quote  #2

1481290872
Report to moderator
ManeBjorn
Legendary
*
Offline Offline

Activity: 868



View Profile
March 03, 2014, 04:18:09 AM
 #6182

Cool I snagged it from you.
A block finally.  Grin
Good news.  I hope it levels out soon.



Block at last !

That is funny where did you get it?

Google

ericisback
Jr. Member
*
Offline Offline

Activity: 35


View Profile
March 03, 2014, 04:20:41 AM
 #6183

Right now we're at a little under 6 hours without a block.  Not exactly hard to believe, that's only ~6x difficulty, something which happens at least once a month (probably more).

Is there a good reference where I can learn about the relationship between the time between blocks, the pool size, and network difficulty?  Specifically, how can I look at this info and see if the time is 2x difficulity etc.?  Thanks.

BTC:  152kxHXJEZpQPvsB2iaQfWHT2DMMYnn8dD
eleuthria
Legendary
*
Offline Offline

Activity: 1750


BTC Guild Owner


View Profile WWW
March 03, 2014, 04:26:28 AM
 #6184

Right now we're at a little under 6 hours without a block.  Not exactly hard to believe, that's only ~6x difficulty, something which happens at least once a month (probably more).

Is there a good reference where I can learn about the relationship between the time between blocks, the pool size, and network difficulty?  Specifically, how can I look at this info and see if the time is 2x difficulity etc.?  Thanks.

I mostly just report with "napkin math" figures.  I did bump the shift share count up slightly, but prior to my post:

Shifts were taking ~55 minutes, with a shift length of ~4 billion shares.  The translates to ~4.3 billion shares per hour.  Current network difficulty is ~3.8 billion.  The last block for the pool (at the time of my post) was 6 hours ago.  That means we had done approximately 25.8 billion shares, which is ~6.7 times the current network difficulty.


The even easier version (doesn't factor in the current shift):  Check how many open shifts currently have 0 blocks.  Multiply that by shift length (4 billion as of my previous post, 4.5 billion going forward), and compare that number to network diff.

R.I.P. BTC Guild, 2011 - 2015.
BTC Guild Forum Thread
AussieHash
Hero Member
*****
Offline Offline

Activity: 675



View Profile
March 03, 2014, 04:39:22 AM
 #6185

Pool hashrate 5258TH/s, should earn 693btc/d,
= 1.155 blocks/hour = block every 52mins
ericisback
Jr. Member
*
Offline Offline

Activity: 35


View Profile
March 03, 2014, 04:42:16 AM
 #6186

The even easier version (doesn't factor in the current shift):  Check how many open shifts currently have 0 blocks.  Multiply that by shift length (4 billion as of my previous post, 4.5 billion going forward), and compare that number to network diff.

At the risk of looking like a complete idiot, I'll ask this...

So, if the current network difficulty is 3,815,723,799, and with ZERO variance, how do you compute the number of shares it should take to find a block (is it just the network difficultly number)?  Asked another way, what math do you use to to see if you are above or below 100%, on your "luck chart"?

BTC:  152kxHXJEZpQPvsB2iaQfWHT2DMMYnn8dD
ericisback
Jr. Member
*
Offline Offline

Activity: 35


View Profile
March 03, 2014, 04:44:35 AM
 #6187

The even easier version (doesn't factor in the current shift):  Check how many open shifts currently have 0 blocks.  Multiply that by shift length (4 billion as of my previous post, 4.5 billion going forward), and compare that number to network diff.

At the risk of looking like a complete idiot, I'll ask this...

So, if the current network difficulty is 3,815,723,799, and with ZERO variance, how do you compute the number of shares it should take to find a block (is it just the network difficultly number)?  Asked another way, what math do you use to to see if you are above or below 100%, on your "luck chart"?

Man, I hate being the dumbest guy in the room....

BTC:  152kxHXJEZpQPvsB2iaQfWHT2DMMYnn8dD
ericisback
Jr. Member
*
Offline Offline

Activity: 35


View Profile
March 03, 2014, 04:53:06 AM
 #6188

Finally, anyone think there is actually any shot of the difficulty increase actually slowing down:


BTC:  152kxHXJEZpQPvsB2iaQfWHT2DMMYnn8dD
organofcorti
Donator
Legendary
*
Offline Offline

Activity: 1960


Poor impulse control.


View Profile WWW
March 03, 2014, 04:53:26 AM
 #6189

The even easier version (doesn't factor in the current shift):  Check how many open shifts currently have 0 blocks.  Multiply that by shift length (4 billion as of my previous post, 4.5 billion going forward), and compare that number to network diff.

At the risk of looking like a complete idiot, I'll ask this...

So, if the current network difficulty is 3,815,723,799, and with ZERO variance, how do you compute the number of shares it should take to find a block (is it just the network difficultly number)?  Asked another way, what math do you use to to see if you are above or below 100%, on your "luck chart"?

You need on average 3,815,723,799 difficulty-1 equivalent shares to solve a 3,815,723,799 difficulty block.

The "luck" measurement BTCGuild uses is expected d1 shares / actual d1 shares, do if it only took 300,000,000 d1 shares to solve a 3,815,723,799 difficulty block, it would have a "luck" of 3,815,723,799 / 300,000,000 * 100 = 1271.908%


Bitcoin network and pool analysis 12QxPHEuxDrs7mCyGSx1iVSozTwtquDB3r
follow @oocBlog for new post notifications
AussieHash
Hero Member
*****
Offline Offline

Activity: 675



View Profile
March 03, 2014, 04:55:35 AM
 #6190

Finally, anyone think there is actually any shot of the difficulty increase actually slowing down:


365 / 12 months = 30.4 days "per month"
Compound Daily growth of 1.5% = 1.015^30.4 = +57% per month
joeofall
Jr. Member
*
Offline Offline

Activity: 47


View Profile
March 03, 2014, 05:00:19 AM
 #6191

Black Monday!
dazzling2865
Newbie
*
Offline Offline

Activity: 15


View Profile
March 03, 2014, 01:29:40 PM
 #6192

Can someone help. I am furious. BTCG user/worker benutzer_1 has hacked my antminer and changed a script file somewhere to redirect to his worker. What will BTC Guild do about this? Short of changing my SSH password which I have now done what else can I do?

UPDATE: Config file for cgminer did not show his pool/worker (priority 0) and a reboot has deleted killed his worker. Now very confused.

Thanks
mdude77
Legendary
*
Offline Offline

Activity: 1358


View Profile
March 03, 2014, 02:22:06 PM
 #6193

Can someone help. I am furious. BTCG user/worker benutzer_1 has hacked my antminer and changed a script file somewhere to redirect to his worker. What will BTC Guild do about this? Short of changing my SSH password which I have now done what else can I do?

UPDATE: Config file for cgminer did not show his pool/worker (priority 0) and a reboot has deleted killed his worker. Now very confused.

Thanks

I'm sorry you appear to have been hacked.  But I don't see how BTCG can help?

I could say my worker was hacked and I should get credit for someone else's work too.  My point is, how can you prove it?

M

MMinerMonitor author, monitor/auto/schedule reboots/alerts/remote/MobileMiner for Ants and Spondoolies! Latest (5.2). MPoolMonitor author, monitor stats/workers for most pools, global BTC stats (current/nxt diff/USD val/hashrate/calc)! Latest (v4.2) 
Buyer beware of Bitmain hardware and services.
hurricandave
Legendary
*
Offline Offline

Activity: 868



View Profile
March 03, 2014, 03:07:05 PM
 #6194

I'm not certain he's pointing the finger solely at BTC Guild, and if he has a way to document that someone on the Guild is doing something like redirecting what equates to funds within the Guild, maybe it can be traced. Though I think it would be very difficult. Even if the funds generated were a wash, the question could be whether the offenders user account was freezable, or not.  Could other people have also been victimized? Yes, he could simply create new accounts and try again but would have to do so without the ill gotten funds generated so far. Is it possible to share a potential threat IP address within the inner circles of the Pool Operators? Could a security lesson be shared among users to help prevent security breaches? If the matter appears legitimate, can/would the Guild really do anything? Huh
dazzling2865
Newbie
*
Offline Offline

Activity: 15


View Profile
March 03, 2014, 03:09:03 PM
 #6195

Can someone help. I am furious. BTCG user/worker benutzer_1 has hacked my antminer and changed a script file somewhere to redirect to his worker. What will BTC Guild do about this? Short of changing my SSH password which I have now done what else can I do?

UPDATE: Config file for cgminer did not show his pool/worker (priority 0) and a reboot has deleted killed his worker. Now very confused.

Thanks

I'm sorry you appear to have been hacked.  But I don't see how BTCG can help?

I could say my worker was hacked and I should get credit for someone else's work too.  My point is, how can you prove it?

M

Well, I was hoping for some advice as to how to avoid this given that CGminer config had not been modified. Also I will be keeping firewall logs from my router from now on and any further attempts from this user I will forward these to the users ISP with reference to his BTG worker name.
mdude77
Legendary
*
Offline Offline

Activity: 1358


View Profile
March 03, 2014, 03:10:26 PM
 #6196

I'm not certain he's pointing the finger solely at BTC Guild, and if he has a way to document that someone on the Guild is doing something like redirecting what equates to funds within the Guild, maybe it can be traced. Though I think it would be very difficult. Even if the funds generated were a wash, the question could be whether the offenders user account was freezable, or not.  Could other people have also been victimized? Yes, he could simply create new accounts and try again but would have to do so without the ill gotten funds generated so far. Is it possible to share a potential threat IP address within the inner circles of the Pool Operators? Could a security lesson be shared among users to help prevent security breaches? If the matter appears legitimate, can/would the Guild really do anything? Huh

It's still a matter of my word vs your word.  I could say your account has my funds, and your account should be frozen.  How could I prove it, and you prove otherwise?

I'm curious how his Ant was hacked.  It shouldn't be accessible externally.  If it is, he needs to tighten up his security a bit.

M

MMinerMonitor author, monitor/auto/schedule reboots/alerts/remote/MobileMiner for Ants and Spondoolies! Latest (5.2). MPoolMonitor author, monitor stats/workers for most pools, global BTC stats (current/nxt diff/USD val/hashrate/calc)! Latest (v4.2) 
Buyer beware of Bitmain hardware and services.
dazzling2865
Newbie
*
Offline Offline

Activity: 15


View Profile
March 03, 2014, 03:21:14 PM
 #6197

I'm not certain he's pointing the finger solely at BTC Guild, and if he has a way to document that someone on the Guild is doing something like redirecting what equates to funds within the Guild, maybe it can be traced. Though I think it would be very difficult. Even if the funds generated were a wash, the question could be whether the offenders user account was freezable, or not.  Could other people have also been victimized? Yes, he could simply create new accounts and try again but would have to do so without the ill gotten funds generated so far. Is it possible to share a potential threat IP address within the inner circles of the Pool Operators? Could a security lesson be shared among users to help prevent security breaches? If the matter appears legitimate, can/would the Guild really do anything? Huh

It's still a matter of my word vs your word.  I could say your account has my funds, and your account should be frozen.  How could I prove it, and you prove otherwise?

I'm curious how his Ant was hacked.  It shouldn't be accessible externally.  If it is, he needs to tighten up his security a bit.

M

I gain nothing by inventing a story like this. The fact is a BTCG member hacked my miner and I can't see how given the cgminer conf is intact. So I was hoping for a bit of help, like it's probably been done using X, Y, Z method and here's how to help avoid that. I posted in this forum as I think BTCG has some responsibility to stop it's members behaving in this way.
hurricandave
Legendary
*
Offline Offline

Activity: 868



View Profile
March 03, 2014, 03:21:35 PM
 #6198

I'm not certain he's pointing the finger solely at BTC Guild, and if he has a way to document that someone on the Guild is doing something like redirecting what equates to funds within the Guild, maybe it can be traced. Though I think it would be very difficult. Even if the funds generated were a wash, the question could be whether the offenders user account was freezable, or not.  Could other people have also been victimized? Yes, he could simply create new accounts and try again but would have to do so without the ill gotten funds generated so far. Is it possible to share a potential threat IP address within the inner circles of the Pool Operators? Could a security lesson be shared among users to help prevent security breaches? If the matter appears legitimate, can/would the Guild really do anything? Huh

It's still a matter of my word vs your word.  I could say your account has my funds, and your account should be frozen.  How could I prove it, and you prove otherwise?

I'm curious how his Ant was hacked.  It shouldn't be accessible externally.  If it is, he needs to tighten up his security a bit.

M
Yes, there must be supporting documentation and if "warranted" further review before any action was taken. I'm also curious too, was the Ant hacked? Or was the user's account modified. Of course "IF" the claim is legitimate. Proof is on the shoulders of the accuser.
mdude77
Legendary
*
Offline Offline

Activity: 1358


View Profile
March 03, 2014, 03:28:48 PM
 #6199

I'm not certain he's pointing the finger solely at BTC Guild, and if he has a way to document that someone on the Guild is doing something like redirecting what equates to funds within the Guild, maybe it can be traced. Though I think it would be very difficult. Even if the funds generated were a wash, the question could be whether the offenders user account was freezable, or not.  Could other people have also been victimized? Yes, he could simply create new accounts and try again but would have to do so without the ill gotten funds generated so far. Is it possible to share a potential threat IP address within the inner circles of the Pool Operators? Could a security lesson be shared among users to help prevent security breaches? If the matter appears legitimate, can/would the Guild really do anything? Huh

It's still a matter of my word vs your word.  I could say your account has my funds, and your account should be frozen.  How could I prove it, and you prove otherwise?

I'm curious how his Ant was hacked.  It shouldn't be accessible externally.  If it is, he needs to tighten up his security a bit.

M

I gain nothing by inventing a story like this. The fact is a BTCG member hacked my miner and I can't see how given the cgminer conf is intact. So I was hoping for a bit of help, like it's probably been done using X, Y, Z method and here's how to help avoid that. I posted in this forum as I think BTCG has some responsibility to stop it's members behaving in this way.

Um, I disagree.  I don't see how BTCG is responsible for a user's actions.  I'm sure if there was definitive proof something could be done to the account, but there's certainly nothing BTCG can do to prevent malicious activity by one of the users.  That's like saying someone stole my car, but I managed to get it back, and Ford needs needs to do something about it.

Your ant shouldn't be reachable by anyone except those on your internal network.  If it's reachable externally, then you open yourself up to hack attempts.

M

MMinerMonitor author, monitor/auto/schedule reboots/alerts/remote/MobileMiner for Ants and Spondoolies! Latest (5.2). MPoolMonitor author, monitor stats/workers for most pools, global BTC stats (current/nxt diff/USD val/hashrate/calc)! Latest (v4.2) 
Buyer beware of Bitmain hardware and services.
dazzling2865
Newbie
*
Offline Offline

Activity: 15


View Profile
March 03, 2014, 04:23:09 PM
 #6200

I'm not certain he's pointing the finger solely at BTC Guild, and if he has a way to document that someone on the Guild is doing something like redirecting what equates to funds within the Guild, maybe it can be traced. Though I think it would be very difficult. Even if the funds generated were a wash, the question could be whether the offenders user account was freezable, or not.  Could other people have also been victimized? Yes, he could simply create new accounts and try again but would have to do so without the ill gotten funds generated so far. Is it possible to share a potential threat IP address within the inner circles of the Pool Operators? Could a security lesson be shared among users to help prevent security breaches? If the matter appears legitimate, can/would the Guild really do anything? Huh

It's still a matter of my word vs your word.  I could say your account has my funds, and your account should be frozen.  How could I prove it, and you prove otherwise?

I'm curious how his Ant was hacked.  It shouldn't be accessible externally.  If it is, he needs to tighten up his security a bit.

M

I gain nothing by inventing a story like this. The fact is a BTCG member hacked my miner and I can't see how given the cgminer conf is intact. So I was hoping for a bit of help, like it's probably been done using X, Y, Z method and here's how to help avoid that. I posted in this forum as I think BTCG has some responsibility to stop it's members behaving in this way.

Um, I disagree.  I don't see how BTCG is responsible for a user's actions.  I'm sure if there was definitive proof something could be done to the account, but there's certainly nothing BTCG can do to prevent malicious activity by one of the users.  That's like saying someone stole my car, but I managed to get it back, and Ford needs needs to do something about it.

Your ant shouldn't be reachable by anyone except those on your internal network.  If it's reachable externally, then you open yourself up to hack attempts.

M

Laughable!
Pages: « 1 ... 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 [310] 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 ... 426 »
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!