TheD0ct0r
Newbie
Offline
Activity: 24
Merit: 0
|
|
March 27, 2014, 01:59:58 AM |
|
Would love to see how you defend this?I went to login Openex.pw today and found this Disturbing conversation in chat. I am still Loz.. OOops looks like some one forgot to clear logs... 1: R3wt openly admits to working with former NSA on the new exchange.. WTF if he beleives this hes a moron. Worse yet he would work with a FED! 2: R3wt Begs Justin to build him a trade engine because he doesn't know how to.... It looks like R3wt is trying to hide Justin under the name mBlanchard. Please refresh my memory isn't Justin the same (Cat) R3wt tried to pin the bad code and hack on ? Yes it is, WTFF ! 3: R3wt Openly admits hes going to build another half ass trade engine Using python he knows nothing about. Doing more searching haha https://twitter.com/_LuaPod_ Rewt wants Justins code. Looks like a internal dispute going on. You know its bad when Justin doesn't even want anything to do with R3wt. Theres some real f%CKED uped stuff going on here maybe one of you guys can figure it out..... Make sure you guys spread this on other forums so no one else get screwed on this new pos he cooking up. Ohhh wait there is more I copied the full conversation to a .txt file just encase they try to wipe the log. http://snk.to/f-cdhfbiljhere are links to the full screen caps http://imgur.com/iDV9jHL http://imgur.com/WLTeWzz http://imgur.com/l7oHqxQhttps://i.imgur.com/kNKxGXE.jpg https://i.imgur.com/mtYwgFv.jpg https://i.imgur.com/mbbea02.jpg
|
|
|
|
Hazard
Legendary
Offline
Activity: 980
Merit: 1000
|
|
March 27, 2014, 02:04:19 AM |
|
Justin is also 15 years old.
The story just gets better and better, doesn't it?
|
|
|
|
TheD0ct0r
Newbie
Offline
Activity: 24
Merit: 0
|
|
March 27, 2014, 02:31:29 AM |
|
Doubtful, you can not Sue a 15 y/o. I think these messages point to how old he really is 18 + Justin is also 15 years old.
The story just gets better and better, doesn't it?
|
|
|
|
Hazard
Legendary
Offline
Activity: 980
Merit: 1000
|
|
March 27, 2014, 02:49:26 AM Last edit: March 27, 2014, 03:26:51 AM by Hazard |
|
Doubtful, you can not Sue a 15 y/o. I think these messages point to how old he really is 18 + Justin is also 15 years old.
The story just gets better and better, doesn't it?
He's 15. r3wt and him had a falling out not too long ago and he posted full dox on him.
|
|
|
|
Apocalyptic
Newbie
Offline
Activity: 47
Merit: 0
|
|
March 27, 2014, 05:05:38 AM |
|
Do not trade your coins in the small exchange like OpenEx. The problem is not the fact that the exchange is small (they all have to start somewhere, right ?) but don't trade your coins on exchanges where it's clear the owner/dev doesn't know what he's really doing. The twitter feed provides and provided enough clues that indeed he doesn't.
|
|
|
|
cryptopaths
|
|
March 27, 2014, 07:22:12 AM |
|
r3wt your a incompetent scamming fucking imbocile. Mark Karpeles 2.0
|
|
|
|
ahmed_bodi
|
|
March 27, 2014, 11:55:04 AM |
|
i disagree. r3wt know's what he's doing he just doesnt know anything but php so he's getting justin's help for lua
|
Bitrated user: ahmedbodi.
|
|
|
Apocalyptic
Newbie
Offline
Activity: 47
Merit: 0
|
|
March 27, 2014, 08:38:27 PM |
|
i disagree. r3wt know's what he's doing
If after all that drama and the story above you still believe he does you're so oblivious that it's scary.
|
|
|
|
markm
Legendary
Offline
Activity: 2940
Merit: 1090
|
|
March 27, 2014, 09:21:06 PM |
|
The exchange was vulnerable to the most famous obvious and well known idiotic attack, SQL injection.
That alone proves the thing is built by a total moron who doesn't know the first thing about web+SQL systems regardless of what language such systems happen to be coded in.
-MarkM-
|
|
|
|
jmlindn
Newbie
Offline
Activity: 28
Merit: 0
|
|
March 29, 2014, 01:29:52 PM |
|
My little bit of BTC/KDC is gone, i've accepted it.
|
|
|
|
jmlindn
Newbie
Offline
Activity: 28
Merit: 0
|
|
March 29, 2014, 01:32:27 PM |
|
My little bit of BTC/KDC is gone, i've accepted it.
|
|
|
|
r3wt (OP)
|
|
March 29, 2014, 04:46:42 PM |
|
|
My negative trust rating is reflective of a personal vendetta by someone on default trust.
|
|
|
cryptopaths
|
|
March 29, 2014, 05:44:43 PM |
|
i disagree. r3wt know's what he's doing he just doesnt know anything but php so he's getting justin's help for lua
I was basically saying he's an incompetent scammer. He's trying to scam but he's to stupid to pull it off in addition to that he's coding illiterate.
|
|
|
|
CrazyLoaf
|
|
March 29, 2014, 08:59:21 PM Last edit: March 01, 2017, 02:31:13 AM by CrazyLoaf |
|
null
|
|
|
|
cryptopaths
|
|
March 29, 2014, 09:01:18 PM |
|
Sorry for all the hate you're receiving, r3wt. There's not much more you can do on your end aside from what you've already done. R3wt that's an interesting name for an alt.
|
|
|
|
Raxe.io
|
|
March 29, 2014, 09:07:32 PM |
|
Remember guys all businesses make mistakes. r3wt why no security auditing? If you need a security audit we can help you with it, if you plan to relaunch the exchange that is, contact us here: https://twitter.com/RaxeSoftwarecontact@raxe.ioSkype: raxe.io (Raxe.io Support) Raxe.
|
|
|
|
r3wt (OP)
|
|
March 29, 2014, 09:25:26 PM |
|
Remember guys all businesses make mistakes. r3wt why no security auditing? If you need a security audit we can help you with it, if you plan to relaunch the exchange that is, contact us here: https://twitter.com/RaxeSoftwarecontact@raxe.ioSkype: raxe.io (Raxe.io Support) Raxe. thanks for the tip. i'll keep it in mind.
|
My negative trust rating is reflective of a personal vendetta by someone on default trust.
|
|
|
Raxe.io
|
|
March 29, 2014, 09:50:28 PM |
|
Remember guys all businesses make mistakes. r3wt why no security auditing? If you need a security audit we can help you with it, if you plan to relaunch the exchange that is, contact us here: https://twitter.com/RaxeSoftwarecontact@raxe.ioSkype: raxe.io (Raxe.io Support) Raxe. thanks for the tip. i'll keep it in mind. No problem, all it needs is some penetration testers and your good to go. The MySQL injection was bad but as your coding you need someone to test it, if you are one individual it's going to be extremely hard to cover every area of security. Raxe.
|
|
|
|
markm
Legendary
Offline
Activity: 2940
Merit: 1090
|
|
March 29, 2014, 10:32:51 PM |
|
MySQL injection is not "bad", it is a deliberate excuse for people to lose their money.
It is deliberate because only by deliberately refusing to address the simplest most basic aspects of web app programming can it even become at all possible.
It is pretty much impossible to study how secure financial apps on the web are built without learning how NOT to make SQL injection possible, thus the only way to make it possible is to deliberately refuse to actually do secure web app development, instead opting to just spam out any garbage that looks pretty enough to sucker people into putting money into it so you can steal it and pretend it was someone else not yourself who stole it.
Any research at all into how to actually not steal people's money in web apps would cover MySQL injection.
So obviously the programmer knew full well what it was and how to prevent it and chose instead to make it possible.
It is not a "mistake", it is one of the first things anyone researching MySQL + Web apps is told to prevent and how to prevent.
Thus there is probably no point even trying to "help" the perpetrator make a secure system since it is already more than obvious that they WANT there to be a way to hack, because they WANT something to point to as an "explanation" of how it could theoretically not have been an inside job.
No matter how many exploits you explain how to prevent, they will find another one, or will pretend to have made a silly error in implementing what you explained, or whatever they can do to create a loophole they can point to so as to pretend it is not them who is stealing people's coins.
Remember too this is a serial scammer/thief, gosh knows how many times over already.
-MarkM-
|
|
|
|
cryptopaths
|
|
March 29, 2014, 10:35:53 PM |
|
MySQL injection is not "bad", it is a deliberate excuse for people to lose their money.
It is deliberate because only by deliberately refusing to address the simplest most basic aspects of web app programming can it even become at all possible.
It is pretty much impossible to study how secure financial apps on the web are built without learning how NOT to make SQL injection possible, thus the only way to make it possible is to deliberately refuse to actually do secure web app development, instead opting to just spam out any garbage that looks pretty enough to sucker people into putting money into it so you can steal it and pretend it was someone else not yourself who stole it.
Any research at all into how to actually not steal people's money in web apps would cover MySQL injection.
So obviously the programmer knew full well what it was and how to prevent it and chose instead to make it possible.
It is not a "mistake", it is one of the first things anyone researchiong MySQL + Web apps is told to prevent and how to prevent.
-MarkM-
R3wt's response "But Justin DDOS TEH SERVERS AND TOOK ALL DE BITCOMS!"
|
|
|
|
|