_Crash_
|
|
March 12, 2015, 05:53:26 PM |
|
I'm getting 415ms ping to the stratum URL from the UK... I was thinking about switching to antpool since I'm wondering where the 40Ph/s have gone from GHash, etc, but after reading a few posts, I think I might stick to p2pool.
|
MiningSpace.net - MULTI-COIN / MULTI-POOL :: Miners Paid TX Fees! :: Europe :: Most Profitable Pool! :: Gigabit Connectivity :: 0% Fee!
|
|
|
nwfella
Legendary
Offline
Activity: 1610
Merit: 1000
Well hello there!
|
|
March 12, 2015, 09:59:43 PM |
|
I'm getting 415ms ping to the stratum URL from the UK... I was thinking about switching to antpool since I'm wondering where the 40Ph/s have gone from GHash, etc, but after reading a few posts, I think I might stick to p2pool.
Until they manage to get these DDoS issue's under control that's probably not such a bad idea.
|
¯¯̿̿¯̿̿'̿̿̿̿̿̿̿'̿̿'̿̿̿̿̿'̿̿̿)͇̿̿)̿̿̿̿ '̿̿̿̿̿̿\̵͇̿̿\=(•̪̀●́)=o/̵͇̿̿/'̿̿ ̿ ̿̿
Gimme the crypto!!
|
|
|
kd4yal
Newbie
Offline
Activity: 12
Merit: 0
|
|
March 12, 2015, 11:01:09 PM |
|
I would like to hear a status update from BITMAIN on the DDos issue. One more day of this crap and I am jumping ship. Whats up BITMAIN?
|
|
|
|
Fatman3001
Legendary
Offline
Activity: 1526
Merit: 1013
Make Bitcoin glow with ENIAC
|
|
March 13, 2015, 06:48:14 AM |
|
I would like to hear a status update from BITMAIN on the DDos issue.
One more day of this crap and I am jumping ship. :-[
Whats up BITMAIN? ???
Some updates would have been nice. HELLO BITMAIN!!! HELLO!!!WAAAAZZZUUUUUPPPP?????
|
"I predict the Internet will soon go spectacularly supernova and in 1996 catastrophically collapse." - Robert Metcalfe, 1995
|
|
|
TracerX
|
|
March 13, 2015, 11:59:21 AM |
|
Dear Bitmain Customer, This morning we received a concerning email from a group of hackers threatening Bitmain and our services with a DDoS attack and demanding a ransom payment to prevent the attack. Bitmain is committed to providing the best service possible to our users, and will not invite future attacks of this sort by giving in to the demands of hackers. The hackers have demonstrated that they do possess the capability to execute a DDoS and that this is not an entirely empty threat, although we do not know the full extent of their capabilities. During the next few days, Bitmaintech.com, AntPool, AntPool.com, and&nbs p;Hashnest.com may experience intermittent outages. Our team is working hard to ensure that the effects of any possible attack will be as minimal as possible. For those customers mining on AntPool, please make sure that you have configured your backup pools properly in the event that you are unable to access AntPool. For HashNest users, mining payouts will continue as usual and there is no need to worry about lost revenue. For sales, if you are unable to access our main website, you may contact us directly at info@bitmaintech.com. Thank you for bearing with us during this time. All the best, Bitmain Hey now, everyone needs to slow down a bit. BM has stated that this DDOS attack may bring them up and down for a few days, which is exactly what's happening. Make sure you've got a secondary or tertiary backup pool and don't sweat it.
|
|
|
|
kd4yal
Newbie
Offline
Activity: 12
Merit: 0
|
|
March 13, 2015, 01:38:27 PM |
|
BMSo again its been a few days so how about a update as to where your at with solving this issue?
|
|
|
|
Ecnad
|
|
March 13, 2015, 06:25:38 PM |
|
Still sending them my junk-mines (couple usb sticks, a butterfly 30 and gpu) so pool is alive (20hrs active mining) but the webserver is still under attack so no clue if it's accounting for the work or not. Keeping my good miner on my other pool until I can get an update and see stats.
I know it's not their fault and applaud their decision not to pay the ransom so will be back full-speed with them when its resolved. I see they stepped up the ddos protection level today, and in time the putzes will move on if they aren't getting paid.
|
|
|
|
dog1965
|
|
March 13, 2015, 10:02:23 PM |
|
Still sending them my junk-mines (couple usb sticks, a butterfly 30 and gpu) so pool is alive (20hrs active mining) but the webserver is still under attack so no clue if it's accounting for the work or not. Keeping my good miner on my other pool until I can get an update and see stats.
I know it's not their fault and applaud their decision not to pay the ransom so will be back full-speed with them when its resolved. I see they stepped up the ddos protection level today, and in time the putzes will move on if they aren't getting paid.
Its called a ransom malware virus the FBI Originally wrote it to so called "White-collar crime!" it encrypts your hard drive and all your files then you can not access them without undoing the encryption. The only way to do that I to get the key used to encrypt it which is stored on the FBI Server. Even If you remove the ransom ware virus your files or whole hard drive is encrypted and cant be undone only restore from a backup which it can store itself on there to and also encrypt it. Now hackers use the same thing to scam money but they always ask for bitcoin because its not traceable at least that's what they think! Just Google "Ransom ware virus" you will see a lot of info on it. It goes back in years! And now there at it again with smarter methods that do the same thing!
|
|
|
|
dog1965
|
|
March 13, 2015, 10:04:05 PM |
|
Bitmain and two other companies are offering 110 bitcoins if you can track this guy down!
|
|
|
|
PatMan
|
|
March 13, 2015, 10:11:56 PM |
|
...the FBI Originally wrote it...
I refuse to believe the FBI are or ever will be that clever........
|
|
|
|
jonnybravo0311
Legendary
Offline
Activity: 1344
Merit: 1024
Mine at Jonny's Pool
|
|
March 13, 2015, 10:19:56 PM |
|
Still sending them my junk-mines (couple usb sticks, a butterfly 30 and gpu) so pool is alive (20hrs active mining) but the webserver is still under attack so no clue if it's accounting for the work or not. Keeping my good miner on my other pool until I can get an update and see stats.
I know it's not their fault and applaud their decision not to pay the ransom so will be back full-speed with them when its resolved. I see they stepped up the ddos protection level today, and in time the putzes will move on if they aren't getting paid.
Its called a ransom malware virus the FBI Originally wrote it to so called "White-collar crime!" it encrypts your hard drive and all your files then you can not access them without undoing the encryption. The only way to do that I to get the key used to encrypt it which is stored on the FBI Server. Even If you remove the ransom ware virus your files or whole hard drive is encrypted and cant be undone only restore from a backup which it can store itself on there to and also encrypt it. Now hackers use the same thing to scam money but they always ask for bitcoin because its not traceable at least that's what they think! Just Google "Ransom ware virus" you will see a lot of info on it. It goes back in years! And now there at it again with smarter methods that do the same thing! Yikes. Yes, such a ransom-ware attack certainly exists; however, that is not what is being utilized here. In this case, a user, or group of users, are flooding Bitmain's servers with traffic, effectively blocking out everyone else. That's the denial of service. The distributed part means it's coming from a whole host of IP addresses, making stopping it very difficult. Believe me, if it were just one guy on one machine, Bitmain or their upstream ISP could simply block traffic from that one address and the problem would be solved. These attacks typically come from many machines that the hacker controls, usually by means of a hidden trojan that the machine's owner is likely unaware is even on the box. And no, the original ransom-ware attacks were most certainly not perpetrated by the FBI against white collar criminals. Geez, take off the tinfoil hat and spend a little time in the sun .
|
Jonny's Pool - Mine with us and help us grow! Support a pool that supports Bitcoin, not a hardware manufacturer's pockets! No SPV cheats. No empty blocks.
|
|
|
kano
Legendary
Offline
Activity: 4592
Merit: 1851
Linux since 1997 RedHat 4
|
|
March 13, 2015, 10:36:31 PM |
|
Still sending them my junk-mines (couple usb sticks, a butterfly 30 and gpu) so pool is alive (20hrs active mining) but the webserver is still under attack so no clue if it's accounting for the work or not. Keeping my good miner on my other pool until I can get an update and see stats.
I know it's not their fault and applaud their decision not to pay the ransom so will be back full-speed with them when its resolved. I see they stepped up the ddos protection level today, and in time the putzes will move on if they aren't getting paid.
Its called a ransom malware virus the FBI Originally wrote it to so called "White-collar crime!" it encrypts your hard drive and all your files then you can not access them without undoing the encryption. The only way to do that I to get the key used to encrypt it which is stored on the FBI Server. Even If you remove the ransom ware virus your files or whole hard drive is encrypted and cant be undone only restore from a backup which it can store itself on there to and also encrypt it. Now hackers use the same thing to scam money but they always ask for bitcoin because its not traceable at least that's what they think! Just Google "Ransom ware virus" you will see a lot of info on it. It goes back in years! And now there at it again with smarter methods that do the same thing! Different virus, unrelated to ddos. Edit: and re: the above post. Of course they can filter it out. That's why you pay for ddos protection .........
|
|
|
|
Ecnad
|
|
March 14, 2015, 03:46:57 AM |
|
Was just able to get into Antpool and Hashnest to check on my accounts
|
|
|
|
MyRig
Donator
Hero Member
Offline
Activity: 792
Merit: 510
support@myrig.com
|
|
March 14, 2015, 03:50:17 AM |
|
Now, it is back up for now... If you are still mining at Antpool, please make sure to set Pool2 and Pool3 outside Antpool
|
Antminer & DragonMint Repair E-mail: support@myrig.com T: @MyRig_com Return Address: MyRig 3700 Quebec Street, Unit 100-239, Denver, Colorado 80207, USA
|
|
|
notlist3d
Legendary
Offline
Activity: 1456
Merit: 1000
|
|
March 14, 2015, 06:33:01 AM |
|
Now, it is back up for now... If you are still mining at Antpool, please make sure to set Pool2 and Pool3 outside Antpool Thanks for getting it back up! And thanks for the headache's and extra work it sounds like. You are still at my pool 1
|
|
|
|
crk
|
|
March 14, 2015, 12:22:46 PM |
|
Now, it is back up for now... If you are still mining at Antpool, please make sure to set Pool2 and Pool3 outside Antpool Great.. Going to switch my miners back to antpool in a few days (going to give you some time to see if thr DDoS is really mitigated) Bitmain's staff should read this post more often ;-)
|
|
|
|
MyRig
Donator
Hero Member
Offline
Activity: 792
Merit: 510
support@myrig.com
|
|
March 14, 2015, 12:25:30 PM Last edit: March 15, 2015, 01:40:27 PM by BitmainWarranty |
|
@CRK, we will!!! and to the DDOS guys...
|
Antminer & DragonMint Repair E-mail: support@myrig.com T: @MyRig_com Return Address: MyRig 3700 Quebec Street, Unit 100-239, Denver, Colorado 80207, USA
|
|
|
notlist3d
Legendary
Offline
Activity: 1456
Merit: 1000
|
|
March 16, 2015, 06:25:18 AM |
|
Seems to be reliable again or me. I did not see my miners going over to failover pools in past 24 hours.
Also nice to see it going back in percentage of blocks found in past 24 hours. Now the pool is above F2P.
|
|
|
|
ezeminer
Legendary
Offline
Activity: 2198
Merit: 1118
Lie down. Have a cookie
|
|
March 16, 2015, 06:31:19 AM |
|
...the FBI Originally wrote it...
I refuse to believe the FBI are or ever will be that clever........ I remember reading about hardware malware that the CIA pulled off, even if you wiped your disk it was hard coded onto the disk itself.
|
|
|
|
kano
Legendary
Offline
Activity: 4592
Merit: 1851
Linux since 1997 RedHat 4
|
|
March 16, 2015, 08:24:35 AM |
|
...the FBI Originally wrote it...
I refuse to believe the FBI are or ever will be that clever........ I remember reading about hardware malware that the CIA pulled off, even if you wiped your disk it was hard coded onto the disk itself. Nothing special about that. No malware required. The issue is that each time you write to the disk, it doesn't exactly overlap where it wrote the previous time. Thus it's possible to read what was there 1 or more generations before the current data. I'm not sure how that goes with current technology considering the density you can get on a HDD these days, but certainly the case with HDD only a few years ago. ... linux shred is you friend
|
|
|
|
|