Bitcoin Forum
April 24, 2018, 01:38:16 PM *
News: Latest stable version of Bitcoin Core: 0.16.0  [Torrent]. (New!)
 
   Home   Help Search Donate Login Register  
Pages: « 1 ... 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 [1910] 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 »
  Print  
Author Topic: [XMR] Monero - A secure, private, untraceable cryptocurrency  (Read 4233538 times)
ozkraut
Sr. Member
****
Offline Offline

Activity: 497
Merit: 256


View Profile
March 10, 2018, 08:59:07 AM
 #38181

If all the xmv gets created in 5 huge transactions 1 on each exchange would that make a difference to the breach potential? instead of thousands of sets of keys shared.



I think they have realise most users don't run a home wallet so there will be no customers like that.


I cant see it getting on exchanges, but I do worry they may be using the Monero name + lies to get in the door.


I mean read any of the links people post to their material






I can' believe any exchanges will list this thing? Why? We have decimals....so we dont need 25ish million coins to express a value?
Its a joke really. And makes me worried how stupid and greedy we are as a species. Maybe we deserve all we get.
We should for monerovi of v immediately. 25 trillion coins. So everyone can be a millionaire. 15% to the dev (me)

Monero - Wir sind die Leute vor denen uns unsere Eltern gewarnt haben!
1524577096
Hero Member
*
Offline Offline

Posts: 1524577096

View Profile Personal Message (Offline)

Ignore
1524577096
Reply with quote  #2

1524577096
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
ZipperCoin
Jr. Member
*
Offline Offline

Activity: 58
Merit: 0


View Profile WWW
March 11, 2018, 09:45:09 AM
 #38182

CoinGenome listed XMR https://coingenome.com/coin/xmr

3M and 6M chart looks solid.
Dart315
Member
**
Offline Offline

Activity: 108
Merit: 12


View Profile
March 11, 2018, 09:50:06 AM
Merited by Globb0 (2)
 #38183

Well if the fork has been delayed then this makes it a good time to stock up on some more Monero, which exchanges will be issuing the forked coin.

The recent surprise growth in XMR price had got the support from a looming hard fork – which is expected to take place in mid of this month.  MoneroV would be the new form of Monero token; investors who hold Monero will obtain 10 coins of MoneroV against each Monero coin.
https://cryptocurrencynews.com/daily-news/altcoins/monero-price-lead/

Do I need to expose my private keys to get MoneroV?

I doubt it's fine to share your private key to get a fork coin.
Globb0
Legendary
*
Offline Offline

Activity: 1392
Merit: 1054


Fly me to the moon


View Profile
March 11, 2018, 11:20:49 AM
 #38184

You deduced well.

And who would ask you to do that?


Intergalactic planetary
explorer
Legendary
*
Offline Offline

Activity: 1484
Merit: 1112



View Profile
March 11, 2018, 12:42:08 PM
 #38185

You deduced well.

And who would ask you to do that?


I know!  I know!


SCAMMERZ!

LTCMAXMYR
Hero Member
*****
Offline Offline

Activity: 526
Merit: 500

DMD,VTC,XZC


View Profile
March 11, 2018, 01:28:55 PM
 #38186

ASIC is coming ,XVG and DGB are killed by AISC,obviously,XMR will dump to floor.

Never buy any ICO altcoin.
Never buy any ASIC altcoin.
Anon136
Legendary
*
Offline Offline

Activity: 1470
Merit: 1049



View Profile
March 11, 2018, 03:00:56 PM
 #38187

ASIC is coming ,XVG and DGB are killed by AISC,obviously,XMR will dump to floor.

Monero's POW algorithm is soon to be changed slightly. This will render any asics useless.

Rep Thread: https://bitcointalk.org/index.php?topic=381041
If one can not confer upon another a right which he does not himself first possess, by what means does the state derive the right to engage in behaviors from which the public is prohibited?
xs.over
Full Member
***
Offline Offline

Activity: 307
Merit: 102


View Profile
March 11, 2018, 03:11:04 PM
 #38188

ASIC is coming ,XVG and DGB are killed by AISC,obviously,XMR will dump to floor.

Monero's POW algorithm is soon to be changed slightly. This will render any asics useless.
Are you sure that minor changes in hash algorithm can help to avoid asics, cause they probably can update/reprogramming their FPGA
Anon136
Legendary
*
Offline Offline

Activity: 1470
Merit: 1049



View Profile
March 11, 2018, 03:22:17 PM
 #38189

ASIC is coming ,XVG and DGB are killed by AISC,obviously,XMR will dump to floor.

Monero's POW algorithm is soon to be changed slightly. This will render any asics useless.
Are you sure that minor changes in hash algorithm can help to avoid asics, cause they probably can update/reprogramming their FPGA

A FPGA is not an ASIC. This change will stop ASICs but not FPGAs. I don't think anything can do that except maybe an intentionally developed FPGA resistant algorithm.

Rep Thread: https://bitcointalk.org/index.php?topic=381041
If one can not confer upon another a right which he does not himself first possess, by what means does the state derive the right to engage in behaviors from which the public is prohibited?
Hueristic
Legendary
*
Offline Offline

Activity: 1596
Merit: 1026


Doomed to see the future and unable to prevent it


View Profile
March 11, 2018, 05:32:17 PM
 #38190

ASIC is coming ,XVG and DGB are killed by AISC,obviously,XMR will dump to floor.

Monero's POW algorithm is soon to be changed slightly. This will render any asics useless.
Are you sure that minor changes in hash algorithm can help to avoid asics, cause they probably can update/reprogramming their FPGA

FPGA (field Grid Programmable Array) is a system that can be programmed to act as an asic but it does not have even close to asic speed because the chips used are much slower than if you had made the asic on die.

Holy crap you guys. Eureka! I figured it out! Not just a stop gap measure to address the fork ring sig reuse problem. The actual solution! I was just laying in bed trying to fall asleep and it hit me like a tire iron to the face.

It is possable to deterministically derive ring sig partners but in a way that would be functionally random to any outside observer. I'll give an example of one way of doing it. Take

Code:
sha256([your private key] [transaction hash of most recent input]) mod [number of prospective ring signature partners]

Then make all of the prospective ring signature partners into an ordered numbered set and use the resulting modulus from the pseudo code above to select one. Continue wrapping around the clock face as many times as needed to arrive at the number of ring signature partners desired.

There would be 0 information leak from the outside, the ring signature partners would be functionally random to any outside observer BUT, and here is the beautiful thing, the same ring signature partners would end up being selected on both the main chain AND the fork chain!

Of course what I outlined above almost certainly isn't the best way to achieve this. It was just to outline the concept.


Merits! I deserve all of the merits. Bequeath unto me thine merits! (well, after peer review, and not just if my specific idea is right but if I'm barking up close enough to the right tree to inspire someone smarter than me)

The prospective ring signature partners is a numbered order set consisting of the total number of transactions so what is the benefit of using that as it can easily be determined? Or am I just missing something there?

AFA as the concept itself,I cannot comment on except it sounds doable.

What happened to the hoard of reddit supporters? They have no issue funding marketing bullshit so they can line their greedly little pockets but when it comes to the most important core parts of the project they are no where to be found. It's almost as if security is kicked from the back seat into the trunk. I bet if we put up a funder to get some second rate hack actor like Seagal it would be funded in 10 minutes.

https://forum.getmonero.org/8/funding-required/90007/bulletproofs-audit-fundraising

We want Carlos from bitconnect!

Come on now 170 xmr in 3 days is not bad at all.

It used to be hours tops for this stuff.

All done.  3 days.  240 xmr ain't peanuts anymore either.

120k subs on reddit. Typically 3000-4000+ online at any given time.  Ya, not much for community support given the numbers.  But we still get it done.

Nice to see you guys still supporting the core ideals over here and I'm glad Fluffy used the Dev fund for the remainder. It's weird with the FFS sometimes I forget that there is a Dev fund that gets a cut of most pools.


Anyone know how much is in the development fund?

Good question, I'm sure there is a view key around somewhere but I have no clue where. It would be nice to see a spreadsheet to see how it's been used over the years. I only disagreed with one thing it was used for (at least that I know) so that's pretty damn good over all as in any organization having that kind of agreement from the community is pretty unheard of.


BITSLER                 ▄███
               ▄████▀
             ▄████▀
           ▄████▀  ▄██▄
         ▄████▀    ▀████▄
       ▄████▀        ▀████▄
     ▄████▀            ▀████▄
   ▄████▀                ▀████▄
 ▄████▀ ▄████▄      ▄████▄ ▀████▄
█████   ██████      ██████   █████
 ▀████▄ ▀████▀      ▀████▀ ▄████▀
   ▀████▄                ▄████▀
     ▀████▄            ▄████▀
       ▀████▄        ▄████▀
         ▀████▄    ▄████▀
           ▀████▄▄████▀
             ▀██████▀
               ▀▀▀▀
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▄            
▄▄▄▄▀▀▀▀    ▄▄█▄▄ ▀▀▄         
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▄      
█  ▀▄▄  ▀█▀▀ ▄      ▀████   ▀▀▄   
█ █▄  ▀▄   ▀████       ▀▀ ▄██▄ ▀▀▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
█  ▀▀       ▀▄▄ ▀████      ▄▄▄▀▀▀  █
█            ▄ ▀▄    ▄▄▄▀▀▀   ▄▄  █
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
█ ▄▄   ███   ▀██  █           ▀▀  █ 
█ ███  ▀██       █        ▄▄      █ 
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀  
▀▄            █        ▀▀      █  
▀▀▄   ███▄  █   ▄▄          █   
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀    
▀▀▄   █   ▀▀▄▄▄▀▀▀         
▄▄▄▄▄▄▄▄▄▄▄█▄▄▀▀▀▀              
              ▄▄▄██████▄▄▄
          ▄▄████████████████▄▄
        ▄██████▀▀▀▀▀▀▀▀▀▀██████▄
▄     ▄█████▀             ▀█████▄
██▄▄ █████▀                ▀█████
 ████████            ▄██      █████
  ████████▄         ███▀       ████▄
  █████████▀▀     ▄███▀        █████
   █▀▀▀          █████         █████
     ▄▄▄         ████          █████
   █████          ▀▀           ████▀
    █████                     █████
     █████▄                 ▄█████
      ▀█████▄             ▄█████▀
        ▀██████▄▄▄▄▄▄▄▄▄▄██████▀
          ▀▀████████████████▀▀
              ▀▀▀██████▀▀▀
            ▄▄▄███████▄▄▄
         ▄█▀▀▀ ▄▄▄▄▄▄▄ ▀▀▀█▄
       █▀▀ ▄█████████████▄ ▀▀█
     █▀▀ ███████████████████ ▀▀█
    █▀ ███████████████████████ ▀█
   █▀ ███████████████▀▀ ███████ ▀█
 ▄█▀ ██████████████▀      ▀█████ ▀█▄
███ ███████████▀▀            ▀▀██ ███
███ ███████▀▀                     ███
███ ▀▀▀▀                          ███
▀██▄                             ▄██▀
  ▀█▄                            ▀▀
    █▄       █▄▄▄▄▄▄▄▄▄█
     █▄      ▀█████████▀
      ▀█▄      ▀▀▀▀▀▀▀
        ▀▀█▄▄  ▄▄▄
            ▀▀█████
[]
Anon136
Legendary
*
Offline Offline

Activity: 1470
Merit: 1049



View Profile
March 11, 2018, 06:05:56 PM
 #38191

Holy crap you guys. Eureka! I figured it out! Not just a stop gap measure to address the fork ring sig reuse problem. The actual solution! I was just laying in bed trying to fall asleep and it hit me like a tire iron to the face.

It is possable to deterministically derive ring sig partners but in a way that would be functionally random to any outside observer. I'll give an example of one way of doing it. Take

Code:
sha256([your private key] [transaction hash of most recent input]) mod [number of prospective ring signature partners]

Then make all of the prospective ring signature partners into an ordered numbered set and use the resulting modulus from the pseudo code above to select one. Continue wrapping around the clock face as many times as needed to arrive at the number of ring signature partners desired.

There would be 0 information leak from the outside, the ring signature partners would be functionally random to any outside observer BUT, and here is the beautiful thing, the same ring signature partners would end up being selected on both the main chain AND the fork chain!

Of course what I outlined above almost certainly isn't the best way to achieve this. It was just to outline the concept.


Merits! I deserve all of the merits. Bequeath unto me thine merits! (well, after peer review, and not just if my specific idea is right but if I'm barking up close enough to the right tree to inspire someone smarter than me)

The prospective ring signature partners is a numbered order set consisting of the total number of transactions so what is the benefit of using that as it can easily be determined? Or am I just missing something there?

AFA as the concept itself,I cannot comment on except it sounds doable.

No you aren't missing anything. I was just trying to be as clear as possible. Said differently, one would use the ouput from that algorithm, call it N, to select the Nth valid prospective ring signature partner.

Rep Thread: https://bitcointalk.org/index.php?topic=381041
If one can not confer upon another a right which he does not himself first possess, by what means does the state derive the right to engage in behaviors from which the public is prohibited?
Hueristic
Legendary
*
Offline Offline

Activity: 1596
Merit: 1026


Doomed to see the future and unable to prevent it


View Profile
March 11, 2018, 06:31:07 PM
 #38192

Holy crap you guys. Eureka! I figured it out! Not just a stop gap measure to address the fork ring sig reuse problem. The actual solution! I was just laying in bed trying to fall asleep and it hit me like a tire iron to the face.

It is possable to deterministically derive ring sig partners but in a way that would be functionally random to any outside observer. I'll give an example of one way of doing it. Take

Code:
sha256([your private key] [transaction hash of most recent input]) mod [number of prospective ring signature partners]

Then make all of the prospective ring signature partners into an ordered numbered set and use the resulting modulus from the pseudo code above to select one. Continue wrapping around the clock face as many times as needed to arrive at the number of ring signature partners desired.

There would be 0 information leak from the outside, the ring signature partners would be functionally random to any outside observer BUT, and here is the beautiful thing, the same ring signature partners would end up being selected on both the main chain AND the fork chain!

Of course what I outlined above almost certainly isn't the best way to achieve this. It was just to outline the concept.


Merits! I deserve all of the merits. Bequeath unto me thine merits! (well, after peer review, and not just if my specific idea is right but if I'm barking up close enough to the right tree to inspire someone smarter than me)

The prospective ring signature partners is a numbered order set consisting of the total number of transactions so what is the benefit of using that as it can easily be determined? Or am I just missing something there?

AFA as the concept itself,I cannot comment on except it sounds doable.

No you aren't missing anything. I was just trying to be as clear as possible. Said differently, one would use the ouput from that algorithm, call it N, to select the Nth valid prospective ring signature partner.

Got ya. Smiley

BITSLER                 ▄███
               ▄████▀
             ▄████▀
           ▄████▀  ▄██▄
         ▄████▀    ▀████▄
       ▄████▀        ▀████▄
     ▄████▀            ▀████▄
   ▄████▀                ▀████▄
 ▄████▀ ▄████▄      ▄████▄ ▀████▄
█████   ██████      ██████   █████
 ▀████▄ ▀████▀      ▀████▀ ▄████▀
   ▀████▄                ▄████▀
     ▀████▄            ▄████▀
       ▀████▄        ▄████▀
         ▀████▄    ▄████▀
           ▀████▄▄████▀
             ▀██████▀
               ▀▀▀▀
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▄            
▄▄▄▄▀▀▀▀    ▄▄█▄▄ ▀▀▄         
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▄      
█  ▀▄▄  ▀█▀▀ ▄      ▀████   ▀▀▄   
█ █▄  ▀▄   ▀████       ▀▀ ▄██▄ ▀▀▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
█  ▀▀       ▀▄▄ ▀████      ▄▄▄▀▀▀  █
█            ▄ ▀▄    ▄▄▄▀▀▀   ▄▄  █
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
█ ▄▄   ███   ▀██  █           ▀▀  █ 
█ ███  ▀██       █        ▄▄      █ 
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀  
▀▄            █        ▀▀      █  
▀▀▄   ███▄  █   ▄▄          █   
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀    
▀▀▄   █   ▀▀▄▄▄▀▀▀         
▄▄▄▄▄▄▄▄▄▄▄█▄▄▀▀▀▀              
              ▄▄▄██████▄▄▄
          ▄▄████████████████▄▄
        ▄██████▀▀▀▀▀▀▀▀▀▀██████▄
▄     ▄█████▀             ▀█████▄
██▄▄ █████▀                ▀█████
 ████████            ▄██      █████
  ████████▄         ███▀       ████▄
  █████████▀▀     ▄███▀        █████
   █▀▀▀          █████         █████
     ▄▄▄         ████          █████
   █████          ▀▀           ████▀
    █████                     █████
     █████▄                 ▄█████
      ▀█████▄             ▄█████▀
        ▀██████▄▄▄▄▄▄▄▄▄▄██████▀
          ▀▀████████████████▀▀
              ▀▀▀██████▀▀▀
            ▄▄▄███████▄▄▄
         ▄█▀▀▀ ▄▄▄▄▄▄▄ ▀▀▀█▄
       █▀▀ ▄█████████████▄ ▀▀█
     █▀▀ ███████████████████ ▀▀█
    █▀ ███████████████████████ ▀█
   █▀ ███████████████▀▀ ███████ ▀█
 ▄█▀ ██████████████▀      ▀█████ ▀█▄
███ ███████████▀▀            ▀▀██ ███
███ ███████▀▀                     ███
███ ▀▀▀▀                          ███
▀██▄                             ▄██▀
  ▀█▄                            ▀▀
    █▄       █▄▄▄▄▄▄▄▄▄█
     █▄      ▀█████████▀
      ▀█▄      ▀▀▀▀▀▀▀
        ▀▀█▄▄  ▄▄▄
            ▀▀█████
[]
SillyGirl
Jr. Member
*
Offline Offline

Activity: 82
Merit: 0


View Profile
March 11, 2018, 09:39:01 PM
 #38193

Waited for Monero to come out of the dip. +10% today! Check out the fluctuations in the charts:https://www.coinranker.net/cryptocurrency/monero
Drhiggins
Sr. Member
****
Offline Offline

Activity: 329
Merit: 250



View Profile
March 11, 2018, 11:59:54 PM
 #38194

I need some help.  Ever since v0.11.1.0 I can not figure out how to send a payment through the CLI wallet feature.  I typed help and get this in the wallet help menu but I don't know how to format it correctly.

Ring size does this matter and what values do you use min max?  Also what is the minimum mixinn these days?   Can someone please place an example of how to transfer here please.

how do you generate a payment ID now has this changed as well?

Monerohash.com   U.S. Mining Pool
nioc
Legendary
*
Offline Offline

Activity: 1540
Merit: 1005

out of the blue and into the black


View Profile
March 12, 2018, 12:30:18 AM
 #38195

I need some help.  Ever since v0.11.1.0 I can not figure out how to send a payment through the CLI wallet feature.  I typed help and get this in the wallet help menu but I don't know how to format it correctly.

Ring size does this matter and what values do you use min max?  Also what is the minimum mixinn these days?   Can someone please place an example of how to transfer here please.

how do you generate a payment ID now has this changed as well?


the minimum and default for ringsize is 5 (that is the same as mixin 4) ring size has replaced mixin as the descriptor. No need to change this.

when you type help you will see "transfer" and that is the format to use. and it describes it as well

transfer [<priority>] [<ring_size>] <address> <amount> [<payment_id>]

you don't need to set ring size.  If you want to lower priority and therefore the fee use [1]  I usually just set the priority before a transfer by "set priority 1" so as not to be concerned with the order of things and then just use "transfer <address> <amount>"

for the PID, whoever you are sending to will give that to you.  If receiving then I am unsure.  I have found no need for it

With the new release and hardfork at the end of the month subaddresses can be used instead of PID.  They will work better but it will probably take a while before exchanges start using them. 


If you don't know where you're going any road will get you there
Drhiggins
Sr. Member
****
Offline Offline

Activity: 329
Merit: 250



View Profile
March 12, 2018, 12:32:34 AM
 #38196

I need some help.  Ever since v0.11.1.0 I can not figure out how to send a payment through the CLI wallet feature.  I typed help and get this in the wallet help menu but I don't know how to format it correctly.

Ring size does this matter and what values do you use min max?  Also what is the minimum mixinn these days?   Can someone please place an example of how to transfer here please.

how do you generate a payment ID now has this changed as well?


the minimum and default for ringsize is 5 (that is the same as mixin 4) ring size has replaced mixin as the descriptor. No need to change this.

when you type help you will see "transfer" and that is the format to use. and it describes it as well

transfer [<priority>] [<ring_size>] <address> <amount> [<payment_id>]

you don't need to set ring size.  If you want to lower priority and therefore the fee use [1]  I usually just set the priority before a transfer by "set priority 1" so as not to be concerned with the order of things and then just use "transfer <address> <amount>"

for the PID, whoever you are sending to will give that to you.  If receiving then I am unsure.  I have found no need for it

With the new release and hardfork at the end of the month subaddresses can be used instead of PID.  They will work better but it will probably take a while before exchanges start using them. 



Thank you good sir.

Monerohash.com   U.S. Mining Pool
LTCMAXMYR
Hero Member
*****
Offline Offline

Activity: 526
Merit: 500

DMD,VTC,XZC


View Profile
March 12, 2018, 12:38:07 AM
 #38197

ASIC is coming ,XVG and DGB are killed by AISC,obviously,XMR will dump to floor.

Monero's POW algorithm is soon to be changed slightly. This will render any asics useless.
Are you sure that minor changes in hash algorithm can help to avoid asics, cause they probably can update/reprogramming their FPGA

i mean this ASIC,not FPGA.
http://www.baikalminer.com/product12.php

Never buy any ICO altcoin.
Never buy any ASIC altcoin.
nioc
Legendary
*
Offline Offline

Activity: 1540
Merit: 1005

out of the blue and into the black


View Profile
March 12, 2018, 02:35:32 AM
 #38198

^^^^
They have already removed Monero from the list of coins that can be mined with this

If you don't know where you're going any road will get you there
Whtwabbit
Sr. Member
****
Offline Offline

Activity: 385
Merit: 256



View Profile
March 12, 2018, 02:48:54 AM
 #38199

Still says it mines Monero on their website from the link above



“It's easier to fool people than to convince them that they have been fooled.” Mark Twain
nioc
Legendary
*
Offline Offline

Activity: 1540
Merit: 1005

out of the blue and into the black


View Profile
March 12, 2018, 02:53:28 AM
 #38200

They removed it from their twitter

https://twitter.com/baikalminer

If you don't know where you're going any road will get you there
Pages: « 1 ... 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 [1910] 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 »
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!