| 
			| 
					
								| MemoryDealers (OP) 
								VIP 
								Legendary
								    Offline 
								Activity: 1052 
								Merit: 1155
								     | 
								|  | May 14, 2011, 05:07:29 PM |  | 
 
 A question: Did you use the same password for deepbit login as for submitting the shares from mining client? 
 Because if did, then anyone who can spy on your HTTP headers (local network users) then can see your password, too.
 
 On deepbit, you can set another password for worker (even the first), but by default, the passwords are the same. Not safe IMHO.
 
 
 I think you are right about this being my weakest link. The deepbit screen hides the actual login password, but displays all the passwords for each worker in the client. Until today,  we used the same password for both. Multiple people (about ten) in the warehouse could of looked at the screen and noticed the username and password. I think my only chance is by finding the IP address of the person who logged into my deepbit account. |  
						| 
 |  |  | 
| 
			| 
					
								| proudhon 
								Legendary    Offline 
								Activity: 2198 
								Merit: 1311
								   | 
								|  | May 14, 2011, 05:12:28 PM |  | 
 
 We are not talking about you, but about security practices and how dumb some people are revealing their personal data on public forums without even realizing it
 But you are talking about me since I'm the dummy who revealed the personal data that my deepbit password is over 20 characters long.  Now, in a matter of months, if not sooner, any sufficiently crafty scriptkiddie could have access to my deepbit account.You must be a geniusI must. |  
						| 
 Bitcoin Fact: the price of bitcoin will not be greater than $70k for more than 25 consecutive days at any point in the rest of recorded human history. |  |  | 
| 
			| 
					
								| vuce | 
								|  | May 14, 2011, 05:17:28 PM |  | 
 
 My deepbit password is now over 20 characters long with caps and symbols.
 That just shortened the time to crack now didn't it?How so?Because now you don;t have to waste time searching all the combinations between 1 and 20 characters.Well, sure.  But you've still got to search through at least all the 20 character combinations and the password is longer than that so it's still a pretty big task.  But, yes, you're right, it'll take less time.  Less time to make a realistic difference?  Probably not.80 bits is considered safe. 20 characters of letters+numbers make it 20*6=120 bits, an overkill (even if the attacker knows how many bits there are exactly). |  
						|  |  |  | 
| 
			| 
					
								| proudhon 
								Legendary    Offline 
								Activity: 2198 
								Merit: 1311
								   | 
								|  | May 14, 2011, 05:22:58 PM |  | 
 
 My deepbit password is now over 20 characters long with caps and symbols.
 That just shortened the time to crack now didn't it?How so?Because now you don;t have to waste time searching all the combinations between 1 and 20 characters.Well, sure.  But you've still got to search through at least all the 20 character combinations and the password is longer than that so it's still a pretty big task.  But, yes, you're right, it'll take less time.  Less time to make a realistic difference?  Probably not.80 bits is considered safe. 20 characters of letters+numbers make it 20*6=120 bits, an overkill (even if the attacker knows how many bits there are exactly).That's what I thought, but, hey, apparently I'm a dummy for revealing this personal data on a public forum. |  
						| 
 Bitcoin Fact: the price of bitcoin will not be greater than $70k for more than 25 consecutive days at any point in the rest of recorded human history. |  |  | 
| 
			| 
					
								| VTCarter 
								Member     Offline 
								Activity: 61 
								Merit: 10
								   | 
								|  | May 14, 2011, 05:58:31 PM |  | 
 
 A question: Did you use the same password for deepbit login as for submitting the shares from mining client? 
 Because if did, then anyone who can spy on your HTTP headers (local network users) then can see your password, too.
 
 On deepbit, you can set another password for worker (even the first), but by default, the passwords are the same. Not safe IMHO.
 
 
 I think you are right about this being my weakest link. The deepbit screen hides the actual login password, but displays all the passwords for each worker in the client. Until today,  we used the same password for both. Multiple people (about ten) in the warehouse could of looked at the screen and noticed the username and password. I think my only chance is by finding the IP address of the person who logged into my deepbit account.this is why I like poclbm-gui it also hides the worker password, but thanks for the heads up I wasn't aware of this HTTP header transparency myself |  
						|  |  |  | 
| 
			| 
					
								| Raoul Duke 
								aka psy 
								Legendary
								    Offline 
								Activity: 1386 
								Merit: 1002
								   | 
								|  | May 14, 2011, 06:08:34 PM |  | 
 
 I have since changed the password,  and I am currently the only person on the planet who knows it.
 Does deepbit have any sort of a log of what IP addresses log into each account?
 I think that might be my only chance of having any info at all as to who took my bitcoins.
 If the IP address is one in the same town as my business,  I will know the theft was related to one of the employees who knew the password.
 
 If the IP address is in some far off country,  then I know it was just some random hacker.
 
 Any other thoughts on how I can find additional information?
 
 Or someone using a proxy or tor...    |  
						|  |  |  | 
| 
			| 
					
								| ribuck 
								Donator 
								Hero Member
								    Offline 
								Activity: 826 
								Merit: 1065
								
								
								
								
								   | 
								|  | May 14, 2011, 07:13:39 PM |  | 
 
 I still think the most likely is that a browser window was left unattended while logged in. |  
						|  |  |  | 
| 
			| 
					
								| MemoryDealers (OP) 
								VIP 
								Legendary
								    Offline 
								Activity: 1052 
								Merit: 1155
								     | 
								|  | May 14, 2011, 07:19:35 PM |  | 
 
 I still think the most likely is that a browser window was left unattended while logged in.
 The strange part is that it was done at about 5:30AM  PST (where my office is) There are lots of cameras at the office that I can check soon, but no one but myself has access at that time of day. So I suspect it was done somewhere other than at the location of the mining computers. |  
						| 
 |  |  | 
| 
			| 
					
								| AntiVigilante 
								Member     Offline 
								Activity: 98 
								Merit: 10
								   | 
								|  | May 14, 2011, 07:21:12 PM |  | 
 
 I hope that people can build extensions of block explorers to watch where these funds get sent and when they get sent to a known entity we can slowly backtrack and narrow down who the scoundrel was who did this.  Bitcoin isn't anonymous as people think---Its got Lojack built in.  Using some good old fashioned Link Analysis , thefts on a grand scale can be monitored.   I'd like to see something built into the Bitcoin user interface that would check a database of reported stolen bitcoins and send an alert when some were received from an address in the database.  We can all be Big Brother collectively.The Anonymous of Bitcoin. I love it. |  
						| 
 |  |  | 
| 
			| 
					
								| mewantsbitcoins | 
								|  | May 14, 2011, 07:21:22 PM |  | 
 
 I still think the most likely is that a browser window was left unattended while logged in.
 The strange part is that it was done at about 5:30AM  PST (where my office is) There are lots of cameras at the office that I can check soon, but no one but myself has access at that time of day. So I suspect it was done somewhere other than at the location of the mining computers.Are your mining computers on a wireless network? Edit: depending of what kind of logging deepbit uses, they maybe able to provide user agents, which in turn may help to narrow your search down |  
						|  |  |  | 
| 
			| 
					
								| MemoryDealers (OP) 
								VIP 
								Legendary
								    Offline 
								Activity: 1052 
								Merit: 1155
								     | 
								|  | May 14, 2011, 07:24:49 PM |  | 
 
 I still think the most likely is that a browser window was left unattended while logged in.
 The strange part is that it was done at about 5:30AM  PST (where my office is) There are lots of cameras at the office that I can check soon, but no one but myself has access at that time of day. So I suspect it was done somewhere other than at the location of the mining computers.Are your mining computers on a wireless network?No,  they are hardwired. |  
						| 
 |  |  | 
| 
			| 
					
								| new_in_this 
								Member     Offline 
								Activity: 82 
								Merit: 10
								
								
								
								
								   | 
								|  | May 14, 2011, 07:34:06 PM |  | 
 
 I don't know, but could this error i receive be related to this somehow? There is nothing to steal in my account as my daily BTC is ~0.8-1.1, but i started to wonder because i can't access to Deepbit :/http://bitcointalk.org/index.php?topic=3889.msg120901#msg120901 And sorry if this is totally OT to this thread. |  
						|  |  |  | 
| 
			| 
					
								| gmaxwell 
								Staff 
								Legendary
								    Offline 
								Activity: 4550 
								Merit: 10019
								     | 
								|  | May 14, 2011, 09:59:05 PM |  | 
 
 I think you are right about this being my weakest link.
 The deepbit screen hides the actual login password, but displays all the passwords for each worker in the client.
 Until today,  we used the same password for both.
 Multiple people (about ten) in the warehouse could of looked at the screen and noticed the username and password.
 I think my only chance is by finding the IP address of the person who logged into my deepbit account.
 
 Every worker is frequently sending their password in clear over the internet, anyone with access to sniff the network between you and the other end at any point can easily get it. Also, deepbit doesn't use https for the management screens either, so a similar (if somewhat reduced) risk exist there. This is why services which have no accounts are good. |  
						|  |  |  | 
| 
			| 
					
								| MemoryDealers (OP) 
								VIP 
								Legendary
								    Offline 
								Activity: 1052 
								Merit: 1155
								     | 
								|  | May 14, 2011, 10:14:30 PM |  | 
 
 I just heard that:The money was taken by someone logged in from:
 
 94.75.217.249
 "Mozilla/5.0 (Windows NT 5.1; rv:2.0.1) Gecko/20100101 Firefox/4.0.1"
 
 It shows up as being in Holland.
 
 Any other ideas on how I could track this down any further?
 
 |  
						| 
 |  |  | 
| 
			| 
					
								| Tha Feds 
								Newbie    Offline 
								Activity: 9 
								Merit: 0
								
								
								
								
								   | 
								|  | May 14, 2011, 10:21:05 PM |  | 
 
 My deepbit password is now over 20 characters long with caps and symbols.
 That just shortened the time to crack now didn't it?How so?Because now you don;t have to waste time searching all the combinations between 1 and 20 characters.Well, sure.  But you've still got to search through at least all the 20 character combinations and the password is longer than that so it's still a pretty big task.  But, yes, you're right, it'll take less time.  Less time to make a realistic difference?  Probably not.80 bits is considered safe. 20 characters of letters+numbers make it 20*6=120 bits, an overkill (even if the attacker knows how many bits there are exactly).That's what I thought, but, hey, apparently I'm a dummy for revealing this personal data on a public forum.You shouldn't take this personally; in fact, you should be gracious. I was reminded to be more aware of accidentally revealing personal info online.  |  
						|  |  |  | 
| 
			| 
					
								| Tha Feds 
								Newbie    Offline 
								Activity: 9 
								Merit: 0
								
								
								
								
								   | 
								|  | May 14, 2011, 10:25:15 PM |  | 
 
 I just heard that:The money was taken by someone logged in from:
 
 94.75.217.249
 "Mozilla/5.0 (Windows NT 5.1; rv:2.0.1) Gecko/20100101 Firefox/4.0.1"
 
 It shows up as being in Holland.
 
 Any other ideas on how I could track this down any further?
 
 
 Is this info from deepbit? |  
						|  |  |  | 
| 
			| 
					
								| VTCarter 
								Member     Offline 
								Activity: 61 
								Merit: 10
								   | 
								|  | May 14, 2011, 10:29:00 PM |  | 
 
 I just heard that:The money was taken by someone logged in from:
 
 94.75.217.249
 "Mozilla/5.0 (Windows NT 5.1; rv:2.0.1) Gecko/20100101 Firefox/4.0.1"
 
 It shows up as being in Holland.
 
 Any other ideas on how I could track this down any further?
 
 
 Holland? probably a proxy then , I'd really want to take a close look at the employees  myself as that looks like the most obvious rout, and usually the most obvious is the most likely.  |  
						|  |  |  | 
|  | 
| 
			| 
					
								| MemoryDealers (OP) 
								VIP 
								Legendary
								    Offline 
								Activity: 1052 
								Merit: 1155
								     | 
								|  | May 14, 2011, 10:41:42 PM |  | 
 
 The IP address information was provided by the Admin from deepbit. |  
						| 
 |  |  | 
| 
			| 
					
								| VTCarter 
								Member     Offline 
								Activity: 61 
								Merit: 10
								   | 
								|  | May 14, 2011, 10:49:09 PM |  | 
 
 This whole situation brings , to my mind at least, a fair question : What can we do about this sort of thing when BC's entire basis is one of semi-anonymity? Block explorer ( http://blockexplorer.com/  ) provides some tools for tracking transaction.. perhaps a RiSKAPI of some sort for merchants? Flagging accounts with odd behaviors (though how would you define odd?)  I don't know myself I'm simply tossing the idea out for discussion. As it stands though even a RiSKAPI would be limited as one wallet.dat / user can contain many many keys. |  
						|  |  |  | 
	|  |