Bitcoin Forum
April 27, 2024, 05:19:26 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 [1026] 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 ... 1315 »
  Print  
Author Topic: [ANN][BURST] Burst | Efficient HDD Mining | New 1.2.3 Fork block 92000  (Read 2170601 times)
crowetic
Legendary
*
Offline Offline

Activity: 2282
Merit: 1072


https://crowetic.com | https://qortal.org


View Profile WWW
April 27, 2015, 07:34:19 PM
 #20501

Quote from: coinits
link=topic=731923.msg11213189#msg11213189 date=1430153316
How did you link the wallet to the user?

It says its alias right there on tiga's block explorer

OK. Thanks but beware of a ruse.

That is exactly why I said to use own judgment. That info could've easily been placed there to mislead.

Need to investigate the person deeper to see if a link can be established. There are too many scams in crypto right now. I expect the regulators to do a sweep soon and tough laws and regs to be enacted.

If anyone on here has coins in Cryptsy they should be careful because they may be in the crosshairs of the law for their involvement with the PayCoin Scandal.

I'm already looking into this and sent a message to the person on burstforum and also in the blockchain, hopefully they'll get back to me and we can figure this out.

Do we know anything about the original password style? How many characters, was it built from dictionary words, did it contain numbers and symbols?  I'm curious about the brute force capabilities, what type of password was the algorithm able to crack?



Currently I don't know much other than what I've posted, as I said tiga has been really busy lately and we haven't seen much of him. So that makes this 10x harder.



              ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
             ▒▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
          ▒▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
        ▒▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
       ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
     ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓              ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
    ▓▓▓▓▓▓▓▓▓▓▓▓▓                    ▓▓▓▓▓▓▓▓▓▓▓▓▓
   ▓▓▓▓▓▓▓▓▓▓▓▓                        ▓▓▓▓▓▓▓▓▓▓▓▓
  ▒▓▓▓▓▓▓▓▓▓▓▒                          ▒▓▓▓▓▓▓▓▓▓▓
  ▓▓▓▓▓▓▓▓▓▓▒                            ▒▓▓▓▓▓▓▓▓▓▓
 ▒▓▓▓▓▓▓▓▓▓▓                              ▓▓▓▓▓▓▓▓▓▓
 ▓▓▓▓▓▓▓▓▓▓▒                              ▒▓▓▓▓▓▓▓▓▓
 ▓▓▓▓▓▓▓▓▓▓▒                               ▓▓▓▓▓▓▓▓▓▓
 ▒▓▓▓▓▓▓▓▓▓▓                      ▒▓▓▓▓▓▒    ▓▓▓▓▓▓▓
  ▓▓▓▓▓▓▓▓▓▓                        ▓▓▓▓▓▓▓    ▓▓▓▓▓
  ▓▓▓▓▓▓▓▓▓▓▓              ▒▒▒▒▒▒     ▓▓▓▓▓▓▒    ▓▓▓
   ▓▓▓▓▓▓▓▓▓▓▓              ▒▓▓▓▓▓▓    ▒▓▓▓▓▓▓
   ▒▓▓▓▓▓▓▓▓▓▓▓▒              ▓▓▓▓▓▓▓    ▒▓▓▓▓▓▓
    ▒▓▓▓▓▓▓▓▓▓▓▓▓▓              ▓▓▓▓▓▓▒    ▓▓▓▓▓▓▓
      ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▒            ▓▓▓▓▓▓▒    ▓▓▓▓▓▓
       ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓    ▒▓▓▓▓▓▓▒   ▒▓▓▓▓▓▓
         ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓    ▒▓▓▓▓▓▓
           ▒▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓    ▓▓▓▓▓▓▓
              ▒▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
                   ▒▓▓▓▓▓▓▓▓▓▓▓▓▓▓


ORTAL
    ..Web and Application hosting.
     ⊙ decentralized infrastructure
    ..leveling and voting.
| https://qortal.org - Infrastructure for the future World
            Founder/current dev group facilitator
[/td][/tr][/table]

[/table]
There are several different types of Bitcoin clients. The most secure are full nodes like Bitcoin Core, but full nodes are more resource-heavy, and they must do a lengthy initial syncing process. As a result, lightweight clients with somewhat less security are commonly used.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
callmejack
Sr. Member
****
Offline Offline

Activity: 256
Merit: 250


View Profile
April 27, 2015, 07:59:03 PM
 #20502

Quote from: coinits
link=topic=731923.msg11213189#msg11213189 date=1430153316
How did you link the wallet to the user?

It says its alias right there on tiga's block explorer

OK. Thanks but beware of a ruse.

That is exactly why I said to use own judgment. That info could've easily been placed there to mislead.

Need to investigate the person deeper to see if a link can be established. There are too many scams in crypto right now. I expect the regulators to do a sweep soon and tough laws and regs to be enacted.

If anyone on here has coins in Cryptsy they should be careful because they may be in the crosshairs of the law for their involvement with the PayCoin Scandal.

I'm already looking into this and sent a message to the person on burstforum and also in the blockchain, hopefully they'll get back to me and we can figure this out.

Do we know anything about the original password style? How many characters, was it built from dictionary words, did it contain numbers and symbols?  I'm curious about the brute force capabilities, what type of password was the algorithm able to crack?



Currently I don't know much other than what I've posted, as I said tiga has been really busy lately and we haven't seen much of him. So that makes this 10x harder.

the whole password discussion already happened many pages back.
one of the most meaningful posts is this:
https://bitcointalk.org/index.php?topic=731923.msg9451896#msg9451896

it says if your passphrase is random enough you are "save".
the only way to prevent weak passwords on wallet side would be to analyze the entropy and discline the public key generation if it is bad.
i dont speak java but in general there must exist several string entropy analyzer even for java  Cheesy
the issue with such an approach becomes the usability for an average user if you get forced to use secure passwords.

12gaFacelift
Sr. Member
****
Offline Offline

Activity: 277
Merit: 250



View Profile
April 27, 2015, 09:44:42 PM
 #20503

I do not read all thing about what happen since my english is limited but i am not sure now i want to buy more asset/share in ByteEnt.

*Effective Immediately, all ByteEnt and ByteBank asset payouts are paused while we figure out this issue.


Never argue with idiots, they just drag you down to their level then beat you with experience. ~ *CANADA ONLY* Colloidal Silver Wire Rod - 12 Gauge Pure Silver .9999 - https://bitcointalk.org/index.php?topic=775964.0

https://bitcointalk.org/index.php?topic=731923.0
https://bitcointalk.org/index.php?topic=1323657.0
mczarnek
Hero Member
*****
Offline Offline

Activity: 527
Merit: 500


View Profile
April 27, 2015, 11:06:13 PM
 #20504

Hey DEV is there a way to limit brute force wallet attacks while not inconveniencing legit wallet owner?


No Sad

Problem is the public ledger, you can download the blockchain yourself and the formula for turning passwords into account numbers is known, so the attacker can brute force his own version of the database, then only use the 'good' passwords.  So no, not without some pretty significant changes.

Edit: Actually.. you could require the creation of the password to be a POW.. basically somehow prove to the network that you did a POW without also telling the network what your password is. Something along the lines of requiring that all public keys(aka account numbers) are within a certain range(or under a certain target) in order to be valid.  Meaning the only way to find a valid account number is to perform a POW that takes maybe 10 seconds on your average PC to find one.  Would be a nice combination alongside the wallet.dat file.  You'd have to allow access to funds in legacy accounts but this could be considered the way to generate a special 'secure' account.  Or even be required after block number X.

BitSend ◢◤Clients | Source
www.bitsend.info
█▄
█████▄
████████▄
███████████▄
██████████████
███████████▀
████████▀
█████▀
█▀












Segwit | Core 0.14 | Masternodes
XEVAN | DK3 | Electrum soon
Bitcore - BTX/BTC -Project












BSD -USDT | Bittrex | C.Gather | S.Exchange
Cryptopia | NovaExchange | Livecoin
Litebit.eu | Faucet | Bitsend Airdrop













████
 ████
  ████
   ████
    ████
     ████
      ████
       ████
        ████
       ████
      ████
     ████
    ████
   ████
  ████
 ████
████

████
 ████
  ████
   ████
    ████
     ████
      ████
       ████
        ████
       ████
      ████
     ████
    ████
   ████
  ████
 ████
████
haitch
Hero Member
*****
Offline Offline

Activity: 539
Merit: 500



View Profile
April 27, 2015, 11:16:14 PM
 #20505

Hey DEV is there a way to limit brute force wallet attacks while not inconveniencing legit wallet owner?


No Sad

Problem is the public ledger, you can download the blockchain yourself and the formula for turning passwords into account numbers is known, so the attacker can brute force his own version of the database, then only use the 'good' passwords.  So no, not without some pretty significant changes.

What about adding a secondary passphrase? The primary one can't be changed, but it shouldn't be too difficult to add a secondary passphrase that can optionally be blank, and that can be changed.

The primary can't be changed because it's tied to the account number, the secondary can just be a suitably secure hash thats not tied to the account ID.

H.





  ███        ███    ███
   ███      ███    ███
    ███    ███    ███
     ███  ███    ███
█████████████████████████
        ███    ███
       ███    ███
      ███    ███
IRELINE


       ██████
      ██████

     ██████
    ██████
   ██████
  ██████
 ██████
██████

   Largest Fund worldwide for distributed application makers   
   ███████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████
███████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████

       wireline.io  -  facebook.com/wirelineio  -  @wirelineio



       ██████
      ██████

     ██████
    ██████
   ██████
  ██████
 ██████
██████

ICO
  September 1
crowetic
Legendary
*
Offline Offline

Activity: 2282
Merit: 1072


https://crowetic.com | https://qortal.org


View Profile WWW
April 28, 2015, 12:45:58 AM
 #20506

-[ANNOUNCEMENT]-

We have figured out the issue, it wasn't a "hack", but it was human error that caused the leak of the password.


Byte Enterprises assets are unaffected. The only one that is still currently affected, is ByteEnt, because I'm awaiting the return of the asset from the account that took it.

Once the assets that were taken have been returned, everything will go back to normal.



Sorry for the issue, I just wanted to make sure to be transparent and make sure everyone knew what was going on.


Once again, ALL BYTE ENTERPRISES ASSETS ARE UNAFFECTED BY THE ISSUE. The assets (as long as ByteEnt that were taken are returned) will payout as planned on the first of the month. Thanks!



              ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
             ▒▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
          ▒▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
        ▒▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
       ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
     ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓              ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
    ▓▓▓▓▓▓▓▓▓▓▓▓▓                    ▓▓▓▓▓▓▓▓▓▓▓▓▓
   ▓▓▓▓▓▓▓▓▓▓▓▓                        ▓▓▓▓▓▓▓▓▓▓▓▓
  ▒▓▓▓▓▓▓▓▓▓▓▒                          ▒▓▓▓▓▓▓▓▓▓▓
  ▓▓▓▓▓▓▓▓▓▓▒                            ▒▓▓▓▓▓▓▓▓▓▓
 ▒▓▓▓▓▓▓▓▓▓▓                              ▓▓▓▓▓▓▓▓▓▓
 ▓▓▓▓▓▓▓▓▓▓▒                              ▒▓▓▓▓▓▓▓▓▓
 ▓▓▓▓▓▓▓▓▓▓▒                               ▓▓▓▓▓▓▓▓▓▓
 ▒▓▓▓▓▓▓▓▓▓▓                      ▒▓▓▓▓▓▒    ▓▓▓▓▓▓▓
  ▓▓▓▓▓▓▓▓▓▓                        ▓▓▓▓▓▓▓    ▓▓▓▓▓
  ▓▓▓▓▓▓▓▓▓▓▓              ▒▒▒▒▒▒     ▓▓▓▓▓▓▒    ▓▓▓
   ▓▓▓▓▓▓▓▓▓▓▓              ▒▓▓▓▓▓▓    ▒▓▓▓▓▓▓
   ▒▓▓▓▓▓▓▓▓▓▓▓▒              ▓▓▓▓▓▓▓    ▒▓▓▓▓▓▓
    ▒▓▓▓▓▓▓▓▓▓▓▓▓▓              ▓▓▓▓▓▓▒    ▓▓▓▓▓▓▓
      ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▒            ▓▓▓▓▓▓▒    ▓▓▓▓▓▓
       ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓    ▒▓▓▓▓▓▓▒   ▒▓▓▓▓▓▓
         ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓    ▒▓▓▓▓▓▓
           ▒▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓    ▓▓▓▓▓▓▓
              ▒▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
                   ▒▓▓▓▓▓▓▓▓▓▓▓▓▓▓


ORTAL
    ..Web and Application hosting.
     ⊙ decentralized infrastructure
    ..leveling and voting.
| https://qortal.org - Infrastructure for the future World
            Founder/current dev group facilitator
[/td][/tr][/table]

[/table]
crowetic
Legendary
*
Offline Offline

Activity: 2282
Merit: 1072


https://crowetic.com | https://qortal.org


View Profile WWW
April 28, 2015, 12:47:50 AM
 #20507

I do not read all thing about what happen since my english is limited but i am not sure now i want to buy more asset/share in ByteEnt.

*Effective Immediately, all ByteEnt and ByteBank asset payouts are paused while we figure out this issue.




No need to worry, I put things on pause for a minute while I figured it all out. It has been figured out and things will go back to normal.


If this had been something that affected things more long term, I would have made other adjustments. No matter what there is no reason to avoid Byte Enterprises' assets. It is all about the people behind them, and I would never rip anyone off.

Thank you.



              ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
             ▒▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
          ▒▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
        ▒▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
       ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
     ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓              ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
    ▓▓▓▓▓▓▓▓▓▓▓▓▓                    ▓▓▓▓▓▓▓▓▓▓▓▓▓
   ▓▓▓▓▓▓▓▓▓▓▓▓                        ▓▓▓▓▓▓▓▓▓▓▓▓
  ▒▓▓▓▓▓▓▓▓▓▓▒                          ▒▓▓▓▓▓▓▓▓▓▓
  ▓▓▓▓▓▓▓▓▓▓▒                            ▒▓▓▓▓▓▓▓▓▓▓
 ▒▓▓▓▓▓▓▓▓▓▓                              ▓▓▓▓▓▓▓▓▓▓
 ▓▓▓▓▓▓▓▓▓▓▒                              ▒▓▓▓▓▓▓▓▓▓
 ▓▓▓▓▓▓▓▓▓▓▒                               ▓▓▓▓▓▓▓▓▓▓
 ▒▓▓▓▓▓▓▓▓▓▓                      ▒▓▓▓▓▓▒    ▓▓▓▓▓▓▓
  ▓▓▓▓▓▓▓▓▓▓                        ▓▓▓▓▓▓▓    ▓▓▓▓▓
  ▓▓▓▓▓▓▓▓▓▓▓              ▒▒▒▒▒▒     ▓▓▓▓▓▓▒    ▓▓▓
   ▓▓▓▓▓▓▓▓▓▓▓              ▒▓▓▓▓▓▓    ▒▓▓▓▓▓▓
   ▒▓▓▓▓▓▓▓▓▓▓▓▒              ▓▓▓▓▓▓▓    ▒▓▓▓▓▓▓
    ▒▓▓▓▓▓▓▓▓▓▓▓▓▓              ▓▓▓▓▓▓▒    ▓▓▓▓▓▓▓
      ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▒            ▓▓▓▓▓▓▒    ▓▓▓▓▓▓
       ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓    ▒▓▓▓▓▓▓▒   ▒▓▓▓▓▓▓
         ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓    ▒▓▓▓▓▓▓
           ▒▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓    ▓▓▓▓▓▓▓
              ▒▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
                   ▒▓▓▓▓▓▓▓▓▓▓▓▓▓▓


ORTAL
    ..Web and Application hosting.
     ⊙ decentralized infrastructure
    ..leveling and voting.
| https://qortal.org - Infrastructure for the future World
            Founder/current dev group facilitator
[/td][/tr][/table]

[/table]
mczarnek
Hero Member
*****
Offline Offline

Activity: 527
Merit: 500


View Profile
April 28, 2015, 01:54:25 AM
 #20508

Hey DEV is there a way to limit brute force wallet attacks while not inconveniencing legit wallet owner?


No Sad

Problem is the public ledger, you can download the blockchain yourself and the formula for turning passwords into account numbers is known, so the attacker can brute force his own version of the database, then only use the 'good' passwords.  So no, not without some pretty significant changes.

What about adding a secondary passphrase? The primary one can't be changed, but it shouldn't be too difficult to add a secondary passphrase that can optionally be blank, and that can be changed.

The primary can't be changed because it's tied to the account number, the secondary can just be a suitably secure hash thats not tied to the account ID.

H.



Actually POW doesn't really make it any harder to crack..  so forget my idea.  The problem is that there already is a secure way to generate a password, use the built in password generator instead of inputting your own easy to crack password!

Yeah second password would work well.. maybe if there was a way to enter one password from one device and the second from the other device.  Also, if you lose one of those passwords(in other words haven't used it for 1 year or however long) then only one password is needed?

BitSend ◢◤Clients | Source
www.bitsend.info
█▄
█████▄
████████▄
███████████▄
██████████████
███████████▀
████████▀
█████▀
█▀












Segwit | Core 0.14 | Masternodes
XEVAN | DK3 | Electrum soon
Bitcore - BTX/BTC -Project












BSD -USDT | Bittrex | C.Gather | S.Exchange
Cryptopia | NovaExchange | Livecoin
Litebit.eu | Faucet | Bitsend Airdrop













████
 ████
  ████
   ████
    ████
     ████
      ████
       ████
        ████
       ████
      ████
     ████
    ████
   ████
  ████
 ████
████

████
 ████
  ████
   ████
    ████
     ████
      ████
       ████
        ████
       ████
      ████
     ████
    ████
   ████
  ████
 ████
████
haitch
Hero Member
*****
Offline Offline

Activity: 539
Merit: 500



View Profile
April 28, 2015, 02:53:42 AM
 #20509

Hey DEV is there a way to limit brute force wallet attacks while not inconveniencing legit wallet owner?


No Sad

Problem is the public ledger, you can download the blockchain yourself and the formula for turning passwords into account numbers is known, so the attacker can brute force his own version of the database, then only use the 'good' passwords.  So no, not without some pretty significant changes.

What about adding a secondary passphrase? The primary one can't be changed, but it shouldn't be too difficult to add a secondary passphrase that can optionally be blank, and that can be changed.

The primary can't be changed because it's tied to the account number, the secondary can just be a suitably secure hash thats not tied to the account ID.

H.



Actually POW doesn't really make it any harder to crack..  so forget my idea.  The problem is that there already is a secure way to generate a password, use the built in password generator instead of inputting your own easy to crack password!

Yeah second password would work well.. maybe if there was a way to enter one password from one device and the second from the other device.  Also, if you lose one of those passwords(in other words haven't used it for 1 year or however long) then only one password is needed?

I will defer to the developers, who are a damn sight smarter than me, to figure out the details; but to me adding a second level of security, that can be controlled by the account owner, seems like a no brainer to me.

POW is an interesting idea, in that it could stop brute forcing if you delay so many seconds between password attempt.

Two device authentication seems problematic to me - what if I want to make a transaction while mobile, and only have one device? What could be workable is devising a method to securely authorize a device to access the account. Use a second authorizing passphrase to authorize your mac address, which is stored as an account attribute in a hash. Authorized devices would need the account password, unauthorized devices could be temporarily or permanently authenticated by the use of a second level passphrase.

The time limit on a secondary password is also interesting. Lose your secondary password and in X time period it expires.Or maybe an AT to trigger a password reset to a registered email address after X blocks with no activity?

H.




  ███        ███    ███
   ███      ███    ███
    ███    ███    ███
     ███  ███    ███
█████████████████████████
        ███    ███
       ███    ███
      ███    ███
IRELINE


       ██████
      ██████

     ██████
    ██████
   ██████
  ██████
 ██████
██████

   Largest Fund worldwide for distributed application makers   
   ███████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████
███████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████

       wireline.io  -  facebook.com/wirelineio  -  @wirelineio



       ██████
      ██████

     ██████
    ██████
   ██████
  ██████
 ██████
██████

ICO
  September 1
xizmax
Hero Member
*****
Offline Offline

Activity: 527
Merit: 500


View Profile
April 28, 2015, 11:14:59 AM
 #20510

http://burstcoin.eu/transaction/16735348886334100917

Funds have been returned. This little ordeal is over now, thanks to all who helped resolve it.

Lesson to us all, stay frosty and try not to make mistakes.

BURST, your C:\urrency
Follow us on https://twitter.com/burstcoin_dev
katlogic
Member
**
Offline Offline

Activity: 75
Merit: 10


View Profile
April 28, 2015, 12:42:09 PM
Last edit: April 28, 2015, 05:02:44 PM by katlogic
 #20511

increasing the amount of work to verify a nonce should be for the average wallet user no real issue since there will also be checkpoints added.
for pools this may turn into a big challenge since most current pools seem to have already issues with the nonce verification under high load.
i tested it out and can say all pools except the dev2 one have them (if you run one of them pm me to share info about).
With current PoC settings, top of line CPUs can verify about 100 nonces/s, GPUs about 10k nonce/s (fancy private kernel). GPU and especially ASIC proofing involves raising the difficulty (hash arena size) by at least 1000 fold - which makes it 1 nonce every 10s on CPU, 10 nonce/s on GPU. Pools won't like that
(though they can use GPU to make it viable), but especially users syncing blockchain will see this as an inconvenience.

Current setting strikes a good balance between user friendlyness and ASIC resistance, but has no safe margin - again ballpark, if top of line GPU can mine as 600GB (with 240s deadline median), ASIC being 1000 times faster equals 600TB. But it will cost more than 600TB worth of drives, and use more power than 120x5TB drive (600W HDDs vs 1kW+ ASIC).

Beware that PoC2 works differently and ASIC and HDD work in synergy, not one replacing another.

what about a distributed pool feature as next big announcement? does any coin has one?
It wouldn't be that difficult to implement, however I'm not sure about demand for one though. As for alts with p2pool - all bitcoin codebase derived ones can implement one with no effort by adapting existing p2pool code.

i already thought of simply doing this using the at technology but it makes only sense for big miners due to the code execution fees.
Yes, p2pool is AT friendly. Note that winners of the round would pay fees to themselves (winning block includes the txes with payouts, with lengthy AT computation), so that wouldn't be an issue.
MiningAtlas
Full Member
***
Offline Offline

Activity: 159
Merit: 100



View Profile
April 28, 2015, 01:23:23 PM
 #20512

Can i mine this with my rig farm hard drives ? SSD ? Huh Grin
blizzen1
Full Member
***
Offline Offline

Activity: 156
Merit: 100


View Profile
April 28, 2015, 01:49:03 PM
 #20513

Yes, but probably SSD too small to make sense

Bitrated user: blizzen.
Merick
Full Member
***
Offline Offline

Activity: 129
Merit: 100


View Profile
April 28, 2015, 01:59:39 PM
 #20514

http://burstcoin.eu/transaction/16735348886334100917

Funds have been returned. This little ordeal is over now, thanks to all who helped resolve it.

Lesson to us all, stay frosty and try not to make mistakes.

What does this mean?
Was there a theft and the thief had a change of heart?

Did BURST get accidentally sent to the wrong address and the receiver sent them back?

The origonal statement was that an account was hacked and the funds drained, did this not happen?
xizmax
Hero Member
*****
Offline Offline

Activity: 527
Merit: 500


View Profile
April 28, 2015, 02:40:23 PM
 #20515

http://burstcoin.eu/transaction/16735348886334100917

Funds have been returned. This little ordeal is over now, thanks to all who helped resolve it.

Lesson to us all, stay frosty and try not to make mistakes.

What does this mean?
Was there a theft and the thief had a change of heart?

Did BURST get accidentally sent to the wrong address and the receiver sent them back?

The origonal statement was that an account was hacked and the funds drained, did this not happen?


Passphrase to the account was accidentally leaked, there was no hack. Person who found the leaked passphrase was a victim of a hack themselves a while ago so they did this in effort to 'teach us a lesson' about security, as they were not fortunate enough to have their funds returned. The person is, apparently, a supporter of BURST and did not seem to approach this in a malicious way.

One could argue whether this kind of 'shock therapy' is the best way to approach security issues, but the issue at hand was successfully resolved and it served as a reminder to keep us on our toes when it comes to security.
We have all agreed to work together on improving BURST security both technologically and in improving our own diligence about our coins/passphrases.


BURST, your C:\urrency
Follow us on https://twitter.com/burstcoin_dev
MiningAtlas
Full Member
***
Offline Offline

Activity: 159
Merit: 100



View Profile
April 28, 2015, 03:16:55 PM
 #20516

32. is the smallest i have some bigger but i don't know how to calculate it  Shocked
Blago
Sr. Member
****
Offline Offline

Activity: 416
Merit: 250



View Profile
April 28, 2015, 04:15:54 PM
Last edit: April 28, 2015, 04:53:23 PM by Blago
 #20517

[miner]

new version Burst-miner v1.150509
https://github.com/Blagodarenko/miner-burst/releases/download/1.150509/miner-burst-1.150509.zip

- solved memory usage issue
- parameter "UseCleanMem" did not used
- key "q" - quit/exit
- key "m" - memory cleaner
- new lib pdcurses.dll

limits:
Nonces, stagger and CacheSize must be a multiple of HDD's sector size / 64 ( 4096 by default / 64 = 64 ).
Miner's window not resizing and not scrolling.



https://github.com/Blagodarenko/miner-burst

Relax, I’m russian!...
BURST-B2LU-SGCZ-NYVS-HZEPK
bitladen
Full Member
***
Offline Offline

Activity: 322
Merit: 100



View Profile
April 28, 2015, 04:20:21 PM
 #20518

In my opinion.. short term, low prices are good, we need to attract more developers and entrepreneur types and let miners who are mining for short term profit go ahead and dump.. the more business and development minded people we get on board at these prices, the better long term.

I partially agree. Short term low prices are good, but as long as there is volume.  Haven't had any decent volume in ages. If people sell, but not make buy orders, it's not gonna happen. But I see the order book has increased slightly during this week

Please let the price fall down to 100 satoshi. At 100 satoshi i will place a 10 BTC buywall (and more BTC incoming if necessary).

Please?? Go ahead and dump, I'm buying.  Make action on the market, don't just sit and wait

Grim
Sr. Member
****
Offline Offline

Activity: 504
Merit: 252


View Profile
April 28, 2015, 04:31:58 PM
 #20519

[miner]

new version Burst-miner v1.150509
https://github.com/Blagodarenko/miner-burst/releases/download/1.150509/miner-burst-1.150509.zip

- solved memory usage issue
- parameter "UseCleanMem" did not used
- key "q" - quit/exit
- key "m" - memory cleaner
- new lib pdcurses.dll

limits:
Nonces, stagger and CacheSize must be a multiple of HDD's sector size / 64 ( 512 by default / 64 = 8 ).
Miner's window not resizing and not scrolling.



https://github.com/Blagodarenko/miner-burst

isn't 4kb sector size standard these days?
Blago
Sr. Member
****
Offline Offline

Activity: 416
Merit: 250



View Profile
April 28, 2015, 04:38:36 PM
Last edit: April 28, 2015, 04:54:54 PM by Blago
 #20520

isn't 4kb sector size standard these days?
perhaps... All my HDDs have sector size = 512   Smiley
maybe i'm very old...  Smiley

https://en.wikipedia.org/wiki/Hard_disk_drive
"... the number of bytes per sector (most commonly 512)..."

ok, my post edited. Thank you, Grim!
https://support.microsoft.com/en-us/kb/140365

Relax, I’m russian!...
BURST-B2LU-SGCZ-NYVS-HZEPK
Pages: « 1 ... 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 [1026] 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 ... 1315 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!