Bitcoin Forum
June 17, 2024, 01:40:58 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 1507 1508 1509 1510 1511 1512 1513 1514 1515 1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533 1534 1535 1536 1537 1538 1539 1540 1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556 [1557] 1558 1559 1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 ... 2125 »
  Print  
Author Topic: [XMR] Monero - A secure, private, untraceable cryptocurrency  (Read 4669574 times)
bbc.reporter
Legendary
*
Offline Offline

Activity: 2968
Merit: 1454



View Profile
July 08, 2016, 05:51:30 AM
 #31121


That looks really good. Sleek and simple, I like it. But really, is it the only reason that XMR is rising right now? Are we sure the devs aren't hiding anything good from the public? Wink

It would really be nice to have a nice surprise. Not much good news in the cryptosphere lately.

███████████████████████████
███████▄████████████▄██████
████████▄████████▄████████
███▀█████▀▄███▄▀█████▀███
█████▀█▀▄██▀▀▀██▄▀█▀█████
███████▄███████████▄███████
███████████████████████████
███████▀███████████▀███████
████▄██▄▀██▄▄▄██▀▄██▄████
████▄████▄▀███▀▄████▄████
██▄███▀▀█▀██████▀█▀███▄███
██▀█▀████████████████▀█▀███
███████████████████████████
.
.Duelbits.
..........UNLEASH..........
THE ULTIMATE
GAMING EXPERIENCE
DUELBITS
FANTASY
SPORTS
████▄▄█████▄▄
░▄████
███████████▄
▐███
███████████████▄
███
████████████████
███
████████████████▌
███
██████████████████
████████████████▀▀▀
███████████████▌
███████████████▌
████████████████
████████████████
████████████████
████▀▀███████▀▀
.
▬▬
VS
▬▬
████▄▄▄█████▄▄▄
░▄████████████████▄
▐██████████████████▄
████████████████████
████████████████████▌
█████████████████████
███████████████████
███████████████▌
███████████████▌
████████████████
████████████████
████████████████
████▀▀███████▀▀
/// PLAY FOR  FREE  ///
WIN FOR REAL
..PLAY NOW..
aminorex
Legendary
*
Offline Offline

Activity: 1596
Merit: 1029


Sine secretum non libertas


View Profile
July 08, 2016, 05:57:59 AM
 #31122

But really, is it the only reason that XMR is rising right now?
That's a topic best reserved for the XMR Speculation thread here bitcointalk.org/index.php?topic=753252.new#new

Give a man a fish and he eats for a day.  Give a man a Poisson distribution and he eats at random times independent of one another, at a constant known rate.
novag
Hero Member
*****
Offline Offline

Activity: 687
Merit: 500


novag


View Profile WWW
July 08, 2016, 06:30:23 AM
 #31123

$ 1,202,630 - 24h Volume on Monero!

Donate for the support of a new Martial arts Style - Aikivindo = Aikido + Wing-Chun (in Ukraine) 5168757318423326 PrivatBank.
http://aikivindo.com.ua
BTC:1DpRaQjdVmrkSopRV8p9RdwvBMWNA9faCS
toffoo
Sr. Member
****
Offline Offline

Activity: 408
Merit: 261



View Profile
July 08, 2016, 07:17:02 AM
 #31124

I'm sorry to hear that Shapeshift is not recognizing the payment as soon as it hits the tx pool. Use xmr.to. I have communicated with a Shapeshift dev on how to get the payment id from the tx pool but I guess they are too busy or something...

I noticed that ShapeShift has recently turned off all monero trades again so maybe they're actually trying to fix this now.

fflaguna
Member
**
Offline Offline

Activity: 84
Merit: 10


View Profile
July 08, 2016, 07:30:32 AM
 #31125

i think we will see a decent rise in price during the halving, as people want to exit btc and enter alts.
vokain
Legendary
*
Offline Offline

Activity: 1834
Merit: 1019



View Profile WWW
July 08, 2016, 07:34:16 AM
 #31126

i think we will see a decent rise in price during the halving, as people want to exit btc and enter alts.

Why
GingerAle
Legendary
*
Offline Offline

Activity: 1260
Merit: 1008


View Profile WWW
July 08, 2016, 09:33:44 AM
 #31127

Hello! Can somebody explain me how hash target works on monero?

in cpu-miner.c see this
       memset(work->target, 0xff, sizeof(work->target));
       work->target[7] = rpc2_target;

i see this in scanhash
   cryptonight_hash_ctx(hash, pdata, persistentctx);
   if (unlikely(hash[7] < ptarget[7])) {

so we are only concerned for hash[7] and target[7] really.

the way I understand target is 0xffffffff/diff, so it should be 1 at current diff right?
what happens when diff is over 0xffffffff ? we also check hash[6] or what?

and it's not obvious where this hash appears in the blockhash (like if I browser an explorer). for satoshi it's obvious where this is.

and how does monero actually validate this. could someone point me to the code that does this in the daemon?

Thanks!

I think this might help https://cryptonote.org/cns/cns003.txt

But I'm not sure.

< Track your bitcoins! > < Track them again! > <<< [url=https://www.reddit.com/r/Bitcoin/comments/1qomqt/what_a_landmark_legal_case_from_mid1700s_scotland/] What is fungibility? >>> 46P88uZ4edEgsk7iKQUGu2FUDYcdHm2HtLFiGLp1inG4e4f9PTb4mbHWYWFZGYUeQidJ8hFym2WUmWc p34X8HHmFS2LXJkf <<< Free subdomains at moneroworld.com!! >>> <<< If you don't want to run your own node, point your wallet to node.moneroworld.com, and get connected to a random node! @@@@ FUCK ALL THE PROFITEERS! PROOF OF WORK OR ITS A SCAM !!! @@@@
mowangluo
Newbie
*
Offline Offline

Activity: 11
Merit: 0


View Profile
July 08, 2016, 02:53:49 PM
 #31128

help!     How to transfer
mmortal03
Legendary
*
Offline Offline

Activity: 1762
Merit: 1010


View Profile
July 08, 2016, 03:06:00 PM
 #31129

I'm sorry to hear that Shapeshift is not recognizing the payment as soon as it hits the tx pool. Use xmr.to. I have communicated with a Shapeshift dev on how to get the payment id from the tx pool but I guess they are too busy or something...

I noticed that ShapeShift has recently turned off all monero trades again so maybe they're actually trying to fix this now.

Yeah, looks like they must not have fixed the problem, but at least I got my refund! Sad
Whtwabbit
Sr. Member
****
Offline Offline

Activity: 490
Merit: 266



View Profile
July 08, 2016, 04:12:50 PM
 #31130

help!     How to transfer

https://www.reddit.com/r/Monero/comments/27zo46/simple_payment_tutorial/


██████████
█████████████████
██████████████████████
█████████████████████████
████████████████████████████
████
████████████████████████
█████
███████████████████████████
█████
███████████████████████████
██████
████████████████████████████
██████
████████████████████████████
██████
████████████████████████████
██████
███████████████████████████
██████
██████████████████████████
█████
███████████████████████████
█████████████
██████████████
████████████████████████████
█████████████████████████
██████████████████████
█████████████████
██████████

Monero
"The difference between bad and well-developed digital cash will determine
whether we have a dictatorship or a real democracy." 
David Chaum 1996
"Fungibility provides privacy as a side effect."  Adam Back 2014
Buy and sell XMR near you
P2P Exchange Network
Buy XMR with fiat
Is Dash a scam?
luigi1111
Legendary
*
Offline Offline

Activity: 1105
Merit: 1000



View Profile
July 08, 2016, 06:47:42 PM
 #31131


Nothing is wrong. Mymonero attaches a small fee for each transaction:
https://mymonero.com/#/terms

Quote
5. Fees
5.1. Company Fees. Access to the account is free, but the Company may charge fees for additional Services. Specifically, and at a minimum, the Company can and does charge a fee for every transaction that is sent. Any applicable fees will be displayed in each Service.


That would make sense, the math just doesn't seem to add up to me. The amount+fee on chainradar in the transaction that was sent to ShapeShift adds up to 26.32, which is *larger* than the 26.29493623 amount+fee reported by MyMonero on the confirmation page. I'd think that it would be the other way around. Maybe someone can break down the math for me. It would also seem useful to have the confirmation page on MyMonero break it down into parts so that there's no confusion. Finally, is there a simple way to have MyMonero spend the contents of the entire wallet so that there's no need to manually figure out what amount to enter?

Ah yeah, I forgot about the MyMonero added fee. Someone reminded me of this on IRC yesterday after I posted. The remaining contradiction may be a truncation thing.
luigi1111
Legendary
*
Offline Offline

Activity: 1105
Merit: 1000



View Profile
July 08, 2016, 07:36:27 PM
Last edit: July 08, 2016, 07:58:28 PM by luigi1111
 #31132

Hello! Can somebody explain me how hash target works on monero?

in cpu-miner.c see this
       memset(work->target, 0xff, sizeof(work->target));
       work->target[7] = rpc2_target;

i see this in scanhash
   cryptonight_hash_ctx(hash, pdata, persistentctx);
   if (unlikely(hash[7] < ptarget[7])) {

so we are only concerned for hash[7] and target[7] really.

the way I understand target is 0xffffffff/diff, so it should be 1 at current diff right?
what happens when diff is over 0xffffffff ? we also check hash[6] or what?

and it's not obvious where this hash appears in the blockhash (like if I browser an explorer). for satoshi it's obvious where this is.

and how does monero actually validate this. could someone point me to the code that does this in the daemon?

Thanks!

I think this might help https://cryptonote.org/cns/cns003.txt

But I'm not sure.

Yes that is correct, specifically:
Quote
5. Calculation of Block Identifier

   The identifier of a block is the result of hashing the following data
   with Keccak:

      - size of [block_header, Merkle root hash, and the number of
        transactions] in bytes (varint)

      - block_header,

      - Merkle root hash,

      - number of transactions (varint).

and

Quote

   +---------------+------------------+--------------------------------+
   |     Field     |       Type       |            Content             |
   +---------------+------------------+--------------------------------+
   | major_version | varint           | Major block header version     |
   |               |                  | (always 1)                     |
   +---------------+------------------+--------------------------------+
   | minor_version | varint           | Minor block header version     |
   |               |                  |                                |
   +---------------+------------------+--------------------------------+
   | timestamp     | varint           | Block creation time            |
   |               |                  | (UNIX timestamp)               |
   +---------------+------------------+--------------------------------+
   | prev_id       | hash             | Identifier of the previous     |
   |               |                  | block                          |
   +---------------+------------------+--------------------------------+
   | nonce         | 4 bytes          | Any value which is used in the |
   |               |                  | network consensus algorithm    |
   +---------------+------------------+--------------------------------+

             Table 4.1: Block header structure description

The quotes above are specifically for computing the block identifier (hash) with keccak. The POW hash input is exactly the same, minus the leading sizeof wrapper.

EDIT (fixed link): CryptoNight web version available here: https://xmr.llcoins.net/slowhash.html

Sample block for you enjoyment:
Block: 1,000,000
Hash: a886ef5149902d8342475fee9bb296341b891ac67c4842f47a833f23c00ed721 (hash the below with keccak_256 to get this)
Identifier:
Code:
4c0102ad91a6b70509930781258c24007085a407703a6c34b2a560fef7d2c51879fb5622ff3c17d65edc0000eb4670d141a7474b07426c34f5cd0cb54dfd5bade712abdec5dbd9f8cf0fc95801
CryptoNight hash: 675f9c8d902e664c91b0bde794a4f3078947bc324c273ffd3cdc365c00000000 (hash above sans leading "4c" with CryptoNight)
Decoded:
Code:
size major minor timestamp (varint)   previous block ID                                      nonce (little endian)         merkle root                                number of transactions (varint)
4c  01      02      ad91a6b705   09930781258c24007085a407703a6c34b2a560fef7d2c51879fb5622ff3c17d6 5edc0000 eb4670d141a7474b07426c34f5cd0cb54dfd5bade712abdec5dbd9f8cf0fc958 01
nioc
Legendary
*
Offline Offline

Activity: 1624
Merit: 1008


View Profile
July 08, 2016, 08:49:35 PM
 #31133

I know this it not news but it was nice that it worked.

My crazed cat ended up pulling the plug out of the wall and I had to restart my comp.  When I restarted the daemon the blockchain was saved up to the point the comp was turned off so no need to sync more than the few blocks.  0.9.4.0
GingerAle
Legendary
*
Offline Offline

Activity: 1260
Merit: 1008


View Profile WWW
July 08, 2016, 09:32:16 PM
 #31134

as lead troll dev I'm happy to announce that Monero is unoffically being rebranded as

Monetary Operational Network for Encrypted Remittance Online

< Track your bitcoins! > < Track them again! > <<< [url=https://www.reddit.com/r/Bitcoin/comments/1qomqt/what_a_landmark_legal_case_from_mid1700s_scotland/] What is fungibility? >>> 46P88uZ4edEgsk7iKQUGu2FUDYcdHm2HtLFiGLp1inG4e4f9PTb4mbHWYWFZGYUeQidJ8hFym2WUmWc p34X8HHmFS2LXJkf <<< Free subdomains at moneroworld.com!! >>> <<< If you don't want to run your own node, point your wallet to node.moneroworld.com, and get connected to a random node! @@@@ FUCK ALL THE PROFITEERS! PROOF OF WORK OR ITS A SCAM !!! @@@@
bitebits
Legendary
*
Offline Offline

Activity: 2216
Merit: 3238


Flippin' burgers since 1163.


View Profile
July 08, 2016, 09:55:10 PM
 #31135

^^ I like it! Let's do a coin vote.

- You can figure out what will happen, not when /Warren Buffett
- Pay any Bitcoin address privately with a little help of Monero.
osensei
Member
**
Offline Offline

Activity: 70
Merit: 10

https://monerohash.com


View Profile WWW
July 08, 2016, 10:21:33 PM
Last edit: July 08, 2016, 10:47:25 PM by osensei
 #31136

Hey guys, just wanted to let you know that https://monerohash.com/ now supports mining directly to an exchange address using a payment ID.

Although I don't encourage mining to an exchange, I know there are some miners out there that prefer it that way, so feel free to give it a try.

Minimum payout is 7 XMR. Payments are run twice per day.

EDIT: To clarify, the mininum of 7 XMR and the frequency of 2 payments per day is for exchanges addresses. Normal minimum payout is 0.3 XMR.

MoneroHash.com - U.S. Mining Pool
Hueristic
Legendary
*
Offline Offline

Activity: 3850
Merit: 5015


Doomed to see the future and unable to prevent it


View Profile
July 08, 2016, 10:24:05 PM
 #31137


Nothing is wrong. Mymonero attaches a small fee for each transaction:
https://mymonero.com/#/terms

Quote
5. Fees
5.1. Company Fees. Access to the account is free, but the Company may charge fees for additional Services. Specifically, and at a minimum, the Company can and does charge a fee for every transaction that is sent. Any applicable fees will be displayed in each Service.


That would make sense, the math just doesn't seem to add up to me. The amount+fee on chainradar in the transaction that was sent to ShapeShift adds up to 26.32, which is *larger* than the 26.29493623 amount+fee reported by MyMonero on the confirmation page. I'd think that it would be the other way around. Maybe someone can break down the math for me. It would also seem useful to have the confirmation page on MyMonero break it down into parts so that there's no confusion. Finally, is there a simple way to have MyMonero spend the contents of the entire wallet so that there's no need to manually figure out what amount to enter?

Ah yeah, I forgot about the MyMonero added fee. Someone reminded me of this on IRC yesterday after I posted. The remaining contradiction may be a truncation thing.

And don't forget you guys using Mymonero it is not safe to leave large amounts on. MIM attack (was presumed) has already cost someone 16,000 XMR (IIRC).

“Bad men need nothing more to compass their ends, than that good men should look on and do nothing.”
ArticMine
Legendary
*
Offline Offline

Activity: 2282
Merit: 1050


Monero Core Team


View Profile
July 09, 2016, 12:55:54 AM
Last edit: July 09, 2016, 04:48:51 AM by ArticMine
 #31138

...

And don't forget you guys using Mymonero it is not safe to leave large amounts on. MIM attack (was presumed) has already cost someone 16,000 XMR (IIRC).

My understanding is that this was an attack against https rather than an attack against MyMonero itself. I stand to be corrected on this. As for attacking https: here are some possibilities I can think of:

1) Man in the middle attacks that downgrade the connection to http:
Some possible  culprits here can be:
a) A network provider.
b) An ISP
c) An Internet backbone provider
d) A VPN provider
e) A Tor exit node (If Tor is used)
etc.
Countermeasure: Check that one has https: at every stage of the transaction

2) Malicious software running on the client computer. For example key loggers etc. This is one of the most common causes of loss.
Countermeasures:
a) Replace Microsoft Windows or even Mac OS X with GNU/Linux or another Free Libre Open Source Software (FLOSS) OS. R
b) If you really must use Microsoft Windows or Mac OS X then there are all the "safe" computing solutions that are promoted by big proprietary software vendors at a cost. Anti virus software, anti malware software, using only genuine non pirated software etc.
c) Replace IOS with Android. For Android see 4 below or simply do not trust the mobile device.
d) In addition to a) b) or c) above: Avoid high risk sites, installing software one does not trust, html email, clicking on malicious, email links
 
3) Attack against the certificate issuer or a malicious certificate issuer.
Countermeasures:
This one can be tricky if the attacker for example is a government, The answer is make sure you trust the certificate vendor, and in a extreme case use self signed certificates.

4) Attacks by so called "legitimate" players. These typically are proprietary operating system vendors, including Microsoft, hardware vendors and "premium" content vendors. The primary motivations here are:
a) DRM (Digital restrictions / rights management, digital locks, copy protection etc.)
b) Spying for the purpose of marketing.
c) Government spying is typically a much lower risk and in many cases piggybacks on a) and b) above.
Examples:
a) DRM: The infamous Sony rootkit. The culprit was Sony BMG https://en.wikipedia.org/wiki/Sony_BMG_copy_protection_rootkit_scandal . One can also argue that the design of the Microsoft Windows registry was in fact motivated by DRM since it does frustrate the copying of installed windows applications. The side effect of this is that the Microsoft Windows registry is also the perfect breeding ground for malware.
b) Spying for the purpose of marketing: Superfish https://en.wikipedia.org/wiki/Superfish The culprits here were Lenovo and Microsoft. (Microsoft is accountable here since it licensed the use of its trademarks in the sale of the infected computers).  In this case Lenovo placed a rouge certificate in the operating system that broke SSL in order to decrypt the the connection to obtain marketing data from https browsing. Basically to break initiatives such as Encrypt the Web. https://www.eff.org/encrypt-the-web. Lenovo has been caught repeatedly doing this and is still licensing trademarks from Microsoft to sell computers.
c) Government spying. Most of these attacks tend to be highly targeted and in many cases rely on a) and b) above. https://en.wikipedia.org/wiki/Global_surveillance_disclosures_(2013%E2%80%93present)
Countermeasures:
Large corporations cannot be trusted here since they are the main adversary; however their products if they have a FLOSS OS can in many cases be made safe.
a) Use only a FLOSS OS that does not support DRM at the OS level. The most popular are GNU/Linux on the laptops / desktops and Android (see b below) on mobile.
b) Ensure you have full control of the computer of device (this mean root access) and lock down the computer or device using only FLOSS tools. This is critical for Android or Chromebooks since they are typically sold with the manufacturer, a telco or OS vendor having root access. Note: Rooting an Android device or putting a Chromebook in "developer mode" will break the DRM on the device. This makes sense because a computer or device cannot serve two masters. It can protect the paranoia and business models of "big content" such as the MPAA or your moneroj but not both.
c) Avoid software or content that infected with DRM unless you can break the DRM. Breaking the DRM may be illegal in your jurisdiction depending on the circumstances, in that case the only legal option is to avoid the DRM infected software or content or see d below
d) As alternative to c put the DRM infected software or content in a FLOSS controlled sandbox. This can be another computer or device, a virtual machine, or some other kind of sandbox. This is also a good strategy with proprietary software even if it not infected with DRM. The key here is the security of the sandbox. A very good analogy is biological containment labs. The degree of security is determined by the risk posed by the pathogens. Watch out for shares on your network, software bugs in the virtual machine or sandbox etc.
e) As a mitigation measure avoid proprietary software and operating systems targeted to consumers. Many large proprietary software vendors, including Microsoft, take the point of view that consumers are fair game for these shenanigans while business users are not. Take a look at Lenovo's response to Superfish. http://news.lenovo.com/news-releases/lenovo-statement-on-superfish.htm They avoided attacking their business customers, by not infecting products that were meant for business customers with their Superfish malware.  

The above is not meant to be a comprehensive list. I am sure members of the community can find other attack vectors. We now come to one more attack vector:

5) Attacking the server. This is in reality the only aspect under the control of the server operator. In the case of MyMonero, this would be fluffypony.

The reality is that the attacks 1) - 4) I mentioned above have little if anything  to do with the security of a particular server, and are equally applicable to any other secure online activity, for example fiat banking. In addition many of these attacks will also work against a Monero or other cryptocurrency wallet stored  on one's own computer or device and even against a brain. paper, off line, etc wallet that was created or used, using a compromised computer or device.

My take is that with MyMonero a very a significant part if not most of the risk lies with client computer or device.

Edit: Disclosure. As of this date I do not have a MyMonero wallet although I may get one in the future.

Concerned that blockchain bloat will lead to centralization? Storing less than 4 GB of data once required the budget of a superpower and a warehouse full of punched cards. https://upload.wikimedia.org/wikipedia/commons/8/87/IBM_card_storage.NARA.jpg https://en.wikipedia.org/wiki/Punched_card
aminorex
Legendary
*
Offline Offline

Activity: 1596
Merit: 1029


Sine secretum non libertas


View Profile
July 09, 2016, 02:09:12 AM
 #31139

You should think of public wifi as a card skimmer

Give a man a fish and he eats for a day.  Give a man a Poisson distribution and he eats at random times independent of one another, at a constant known rate.
ArticMine
Legendary
*
Offline Offline

Activity: 2282
Merit: 1050


Monero Core Team


View Profile
July 09, 2016, 02:16:00 AM
Last edit: July 09, 2016, 02:31:00 AM by ArticMine
 #31140

You should think of public wifi as a card skimmer

Yes. That would be an example of a network provider as opposed to an ISP. A malicious hotel server etc. could do the same thing.

Edit: When it comes to home Internet service for example. A good idea is to use one's own fire walled router rather than the combo modem / routers units provided by most ISPs. If your ISP does not provide a modem only unit, then one typically can place one's router in the DMZ of the IPPs combo unit, and used a different subnet. One does not use all the other ports or the WiFi on the ISPs unit. Here in Canada one of the major ISP uses a password that is well known, since it has been leaked online, as the master password on their combo units and does not allow consumer and even small business customers to change it. So again do not trust the big corporations on security especially with consumer products. By the way this same ISP is excellent otherwise.

Concerned that blockchain bloat will lead to centralization? Storing less than 4 GB of data once required the budget of a superpower and a warehouse full of punched cards. https://upload.wikimedia.org/wikipedia/commons/8/87/IBM_card_storage.NARA.jpg https://en.wikipedia.org/wiki/Punched_card
Pages: « 1 ... 1507 1508 1509 1510 1511 1512 1513 1514 1515 1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533 1534 1535 1536 1537 1538 1539 1540 1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556 [1557] 1558 1559 1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 ... 2125 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!