joblo
Legendary
Offline
Activity: 1470
Merit: 1114
|
|
March 30, 2016, 06:58:48 PM |
|
@sp - I cannot download your open source miners because it says it has detected a threat and the software contains a malwaregen32? Why does it find that? Is it a compressed file?
Old news, many AVs do that with miners, whitelist it. Sorry - I am a little paranoid after losing all of my coins in mid January. how did you lose your coins??? virus Yes a virus that was attached to a new miner listed on Cryptomining Blog. It had a trojan with keylogger built in. Unfortunately I wasn't running AV or anti keylogger at the time (I know stupid of me) and got wiped out. So like I said. I am paranoid now. That's unfortunate. Was it from a known dev like SP or some nobody? I'd like to be able to trust CMB, they have been a good source for Windows binaries, particularly for different architectures. Binaries are always a risk so trusted sources are critical and it appears CMB is not one of them. The fact is many AVs flag uninfected miners as malware because some people use them to mine in botnets. There's nothing better than a cloud of false positives to hide a real threat.
|
|
|
|
Epsylon3
Legendary
Offline
Activity: 1484
Merit: 1082
ccminer/cpuminer developer
|
|
March 30, 2016, 07:15:25 PM |
|
and the worst is when you get that after the compilation auto deleted by your antivirus "adware"
|
|
|
|
Grim
|
|
March 30, 2016, 09:55:44 PM |
|
@sp - I cannot download your open source miners because it says it has detected a threat and the software contains a malwaregen32? Why does it find that? Is it a compressed file?
Old news, many AVs do that with miners, whitelist it. Sorry - I am a little paranoid after losing all of my coins in mid January. how did you lose your coins??? virus Yes a virus that was attached to a new miner listed on Cryptomining Blog. It had a trojan with keylogger built in. Unfortunately I wasn't running AV or anti keylogger at the time (I know stupid of me) and got wiped out. So like I said. I am paranoid now. cryptomining blog really? that site is huge for mining, how they can not check for malicious code, are they stupid? what was the miner with the virus? Hrmm at this point I cannot remember the title but I remember it said tpruvot 1.7 or so. Obviously a scam since when after the fact I went to the github and saw tpruvot wasn't even on 1.7 - lol - hind sight is always 20/20. I read somewhere that you got "robbed" by someone copying your wallet dats and actually got into your system with teamviewer?! There are a few people who got robbed that way (search reddit). It actually seems teamviewer is the culprit here. Imo someone is bruteforcing teamviewer accounts. The attacker only needs to bypass the loginlimit somehow ... Don't forget the basic teamviewer password is only 6 letters, so even if you set a permanent login password that is way longer that basic 6 letter pw is still valid. (the default 6 letter pw can be changed to a 10 letter pw including special characters)
|
|
|
|
bathrobehero
Legendary
Offline
Activity: 2002
Merit: 1051
ICO? Not even once.
|
|
March 30, 2016, 10:46:50 PM |
|
I read somewhere that you got "robbed" by someone copying your wallet dats and actually got into your system with teamviewer?!
There are a few people who got robbed that way (search reddit).
It actually seems teamviewer is the culprit here.
Imo someone is bruteforcing teamviewer accounts. The attacker only needs to bypass the loginlimit somehow ...
Don't forget the basic teamviewer password is only 6 letters, so even if you set a permanent login password that is way longer that basic 6 letter pw is still valid. (the default 6 letter pw can be changed to a 10 letter pw including special characters)
I doubt it's Teamviewer because it increases the amount of time you have to wait to try again after unsuccessful tries but it's possible. But, you can change the default password's length to 10 characters which includes symbols in Options\Security > password strength. And you can also disable incoming connections from outside your local network. It also makes windows much more responsive and don't use your bandwidth and of course it's completely safe from the outside (Options\General - Incoming LAN connections > accept exclusively). In this case you can also use local IP addresses to connect for example in shortcuts like this which is pretty convenient: "C:\Program Files (x86)\TeamViewer\TeamViewer.exe" -i 192.168.1.x --Password doesnt_matter_local_only_password
|
Not your keys, not your coins!
|
|
|
bensam1231
Legendary
Offline
Activity: 1764
Merit: 1024
|
|
March 31, 2016, 07:38:34 AM |
|
Sp_ I noticed that when I start mining decred sometimes some of the cards won't start hashing and their GPU usage stays 0. This seems more frequent with release 7 but it's also there with release 4. The cards are not crashing or anything, the miner just doesn't start using them. If I restart the same .bat it sometimes work. Lowering or increasing intensity or poolside difficulty had no effect. Different pools also had no effect. Issue is the same on 750 Ti and 970 on all of my rigs so it's likely the issue is not exclusive to me. Here's a graph just to shows what I mean: Explanation: the graph represents a bunch of 1 minute mining sessions with 10 second breaks between them on a loop. So the spikes are the 1 minute sessions and the small drops are the 10 second breaks (just for visibility purposes) and the big drops are when some of the cards are not hashing. The .bat file had no extra parameters for ccminer. Not the same thing, but I noticed one of my six GPUs has a oscilating pattern to it. Obviously reduces hashrate. I'll screenshot it next time. Not runnign celerons or dual core processors, so that's not it.
|
I buy private Nvidia miners. Send information and/or inquiries to my PM box.
|
|
|
Ayers
Legendary
Offline
Activity: 2814
Merit: 1024
DGbet.fun - Crypto Sportsbook
|
|
March 31, 2016, 08:12:04 AM |
|
@sp - I cannot download your open source miners because it says it has detected a threat and the software contains a malwaregen32? Why does it find that? Is it a compressed file?
Old news, many AVs do that with miners, whitelist it. Sorry - I am a little paranoid after losing all of my coins in mid January. how did you lose your coins??? virus Yes a virus that was attached to a new miner listed on Cryptomining Blog. It had a trojan with keylogger built in. Unfortunately I wasn't running AV or anti keylogger at the time (I know stupid of me) and got wiped out. So like I said. I am paranoid now. cryptomining blog really? that site is huge for mining, how they can not check for malicious code, are they stupid? what was the miner with the virus? Hrmm at this point I cannot remember the title but I remember it said tpruvot 1.7 or so. Obviously a scam since when after the fact I went to the github and saw tpruvot wasn't even on 1.7 - lol - hind sight is always 20/20. I read somewhere that you got "robbed" by someone copying your wallet dats and actually got into your system with teamviewer?! There are a few people who got robbed that way (search reddit). It actually seems teamviewer is the culprit here. Imo someone is bruteforcing teamviewer accounts. The attacker only needs to bypass the loginlimit somehow ... Don't forget the basic teamviewer password is only 6 letters, so even if you set a permanent login password that is way longer that basic 6 letter pw is still valid. (the default 6 letter pw can be changed to a 10 letter pw including special characters) there are options on teamviewer to remove the possibility to access your computer, you simply choose to negate any connection to that computer from remote
|
|
|
|
Epsylon3
Legendary
Offline
Activity: 1484
Merit: 1082
ccminer/cpuminer developer
|
|
March 31, 2016, 09:40:42 AM |
|
you are wrong, it was infected scam wallets like Intellect, and Oxen recently. And it was not teamviewer but MS Remote destkop.
The method by users with quoted links in the forum seems different.
|
|
|
|
pallas
Legendary
Offline
Activity: 2716
Merit: 1094
Black Belt Developer
|
|
March 31, 2016, 09:42:53 AM |
|
people should just mine on linux and learn to "configuremake" ;-)
|
|
|
|
Epsylon3
Legendary
Offline
Activity: 1484
Merit: 1082
ccminer/cpuminer developer
|
|
March 31, 2016, 09:57:55 AM |
|
|
|
|
|
Vaccomondus
|
|
March 31, 2016, 11:00:38 AM |
|
Hrmm at this point I cannot remember the title but I remember it said tpruvot 1.7 or so. Obviously a scam since when after the fact I went to the github and saw tpruvot wasn't even on 1.7 - lol - hind sight is always 20/20.
Any chance you mined Oxen? Some people confused ccminer having malicious code instead of Oxen which was malicious. cryptomining blog really? that site is huge for mining, how they can not check for malicious code, are they stupid? what was the miner with the virus?
Apparently people can hide their malicious stuff with FUD crypters so the virus can't be detected and can be triggered anytime, even like months later. it's not about antivirus, it's about code checking, no virus can be hidden if you have the source and you know what you're doing
|
|
|
|
joblo
Legendary
Offline
Activity: 1470
Merit: 1114
|
|
March 31, 2016, 02:51:13 PM |
|
Hrmm at this point I cannot remember the title but I remember it said tpruvot 1.7 or so. Obviously a scam since when after the fact I went to the github and saw tpruvot wasn't even on 1.7 - lol - hind sight is always 20/20.
Any chance you mined Oxen? Some people confused ccminer having malicious code instead of Oxen which was malicious. cryptomining blog really? that site is huge for mining, how they can not check for malicious code, are they stupid? what was the miner with the virus?
Apparently people can hide their malicious stuff with FUD crypters so the virus can't be detected and can be triggered anytime, even like months later. it's not about antivirus, it's about code checking, no virus can be hidden if you have the source and you know what you're doing That's the theory, but how many people actually inspect the code before they compile it? Most assume "someone" has already inspected it. Heartbleed was open source and was built into many different OSs for 2 years beofore it was discovered. MS and Red Hat and Ubuntu and... must have inspected openssl before using it in their product, didn't they?
|
|
|
|
bathrobehero
Legendary
Offline
Activity: 2002
Merit: 1051
ICO? Not even once.
|
|
March 31, 2016, 02:57:30 PM |
|
Hrmm at this point I cannot remember the title but I remember it said tpruvot 1.7 or so. Obviously a scam since when after the fact I went to the github and saw tpruvot wasn't even on 1.7 - lol - hind sight is always 20/20.
Any chance you mined Oxen? Some people confused ccminer having malicious code instead of Oxen which was malicious. cryptomining blog really? that site is huge for mining, how they can not check for malicious code, are they stupid? what was the miner with the virus?
Apparently people can hide their malicious stuff with FUD crypters so the virus can't be detected and can be triggered anytime, even like months later. it's not about antivirus, it's about code checking, no virus can be hidden if you have the source and you know what you're doing They obviously publish a clean surce with dirty binaries from a the private, malicious source. People would be fine compiling the clean source but they rarely do it themselves on windows. That will be very interesting. It might even convince me to make the switch from 7 to 10.
|
Not your keys, not your coins!
|
|
|
induktor
|
|
April 01, 2016, 01:37:38 AM |
|
Hi sp_ 0.1 BTC for you TxID: cf4e935a8aebce8bc1126740c07f5952014c994830f091c4f8d370ae6c78bcd1 if you have a (private) optimized linux version for quark/lyra2v2 i would like to have it , otherwise, for the opensource 1.5.79 I compile for lubuntu 14.04 x64. excelent job btw with 1.5.78 thanks! indkt.
|
BTC addr: 1vTGnFgaM2WJjswwmbj6N2AQBWcHfimSc
|
|
|
Velgelm
|
|
April 01, 2016, 05:34:50 AM |
|
sp - in ccminer have a problem with neoscrypt solo mining. Can u fix this ? (i tested all your version and tpruvots version)
|
|
|
|
Ayers
Legendary
Offline
Activity: 2814
Merit: 1024
DGbet.fun - Crypto Sportsbook
|
|
April 01, 2016, 06:47:10 AM |
|
still the issue about the privacy that bother me so much, i'll stick with win7 for the time being, until a proper solution is found, and removing cortana is not enough
|
|
|
|
sp_ (OP)
Legendary
Offline
Activity: 2954
Merit: 1087
Team Black developer
|
|
April 01, 2016, 08:19:49 AM |
|
sp - in ccminer have a problem with neoscrypt solo mining. Can u fix this ? (i tested all your version and tpruvots version)
did you try to run with this parameter: --broken-neo-wallet Use 84byte data for broken neoscrypt wallets.\n\
|
|
|
|
sp_ (OP)
Legendary
Offline
Activity: 2954
Merit: 1087
Team Black developer
|
|
April 01, 2016, 08:21:54 AM |
|
Hi sp_ 0.1 BTC for you TxID: cf4e935a8aebce8bc1126740c07f5952014c994830f091c4f8d370ae6c78bcd1 if you have a (private) optimized linux version for quark/lyra2v2 i would like to have it , otherwise, for the opensource 1.5.79 I compile for lubuntu 14.04 x64. excelent job btw with 1.5.78 thanks! indkt. Thanks the quark/lyra2v2 kernals are private for now. But the Decred #7 sourcecode is for sale for 0.4BTC. only 0.3BTC to go.
|
|
|
|
Velgelm
|
|
April 01, 2016, 08:49:54 AM |
|
sp - in ccminer have a problem with neoscrypt solo mining. Can u fix this ? (i tested all your version and tpruvots version)
did you try to run with this parameter: --broken-neo-wallet Use 84byte data for broken neoscrypt wallets.\n\ I ii try : [2016-04-01 11:49:01] Binding thread 0 to cpu 0 (mask 1) [2016-04-01 11:49:01] JSON inval data [2016-04-01 11:49:01] json_rpc_call failed, retry after 5 seconds [2016-04-01 11:49:06] JSON inval data [2016-04-01 11:49:06] json_rpc_call failed, retry after 5 seconds [2016-04-01 11:49:11] JSON inval data [2016-04-01 11:49:11] json_rpc_call failed, retry after 5 seconds user password and rpcport existing in .conf and bat file params : 78_7.5 -d 1 --cpu-priority 3 -a neoscrypt -i 14 -o 127.0.0.1:7878-u yyy -p x--broken-neo-wallet --no-gbt --no-stratum
|
|
|
|
sp_ (OP)
Legendary
Offline
Activity: 2954
Merit: 1087
Team Black developer
|
|
April 01, 2016, 08:53:12 AM |
|
I just did a comparison between my buyable private miner (0.1BTC) and the latest 1.7.5 release. I have written 0-10% faster, but I should have written 17-74% faster
Sp-Mod #5 default intensities hashrates in MHASH/s. (980ti 1290 coreclock/1650 memclock)
nist5: 43.80 (+17%) quark: 27.85 (+61,91%) lyra2v2 16.10 (+16.6%) x11: 12.85 (+18%) x13: 10.27 (+19.97) x15: 8.83 (+18.52 ) neoscrypt: 0.99 (+73.68%)
Current profit with my modded kernal on nicehash.com:(one single gtx 980ti, 24 hours mining) neoscrypt: 0,00971250BTC ($4,0792500) quark: 0,00907910BTC ($3,8132220) x15: 0,00819512BTC ($3,4419504) x13: 0,00796027BTC ($3,3433134) x11: 0,00718058BTC ($3,0158436) lyra2v2: 0,00663964BTC ($2,7886488) nist5: 0,00161184BTC ($0,6769728) does this mean you will cut out most of the other algos that are already contained in ccminer-tpruvot175 and only provide the above kernels? ... No the new fork will contain all the kernals in 1.7.5, but with optimized code.
|
|
|
|
Velgelm
|
|
April 01, 2016, 09:28:31 AM |
|
I ii try : [2016-04-01 11:49:01] Binding thread 0 to cpu 0 (mask 1) [2016-04-01 11:49:01] JSON inval data [2016-04-01 11:49:01] json_rpc_call failed, retry after 5 seconds [2016-04-01 11:49:06] JSON inval data [2016-04-01 11:49:06] json_rpc_call failed, retry after 5 seconds [2016-04-01 11:49:11] JSON inval data [2016-04-01 11:49:11] json_rpc_call failed, retry after 5 seconds
user password and rpcport existing in .conf and bat file
params : 78_7.5 -d 1 --cpu-priority 3 -a neoscrypt -i 14 -o 127.0.0.1:7878-u yyy -p x--broken-neo-wallet --no-gbt
For example cgminer work fine
|
|
|
|
|