Search content
Sort by

Showing 20 of 58 results by WakiMiko
Post
Topic
Board Trading Discussion
Re: [Announcement] New bitcoin exchange site for USD/BTC
by
WakiMiko
on 20/09/2011, 19:17:39 UTC
sending spam emails is certainly not going to make me sign up
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin Developers
by
WakiMiko
on 09/09/2011, 15:16:12 UTC
Yeah I meant the normal OS command. Here is a cached version of the docs: https://webcache.googleusercontent.com/search?q=cache:fwJsXAH-4yUJ:www.kernel.org/pub/software/scm/git/docs/git-shortlog.html

But it looks like you are already done. Nice work!
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin Developers
by
WakiMiko
on 09/09/2011, 14:53:09 UTC
Alexz: Wouldn't it be easier to just use the "git shortlog" command? It can show the commit count per author (see my previous post).

The only problem is that the same author can appear under different names (e.g. in the output above: s_nakamoto, Satoshi Nakamoto and --author=Satoshi Nakamoto (which was some command line mistake im sure Tongue )). The .mailmap feature might be able to solve this though. See bottom of http://www.kernel.org/pub/software/scm/git/docs/git-shortlog.html

Post
Topic
Board Bitcoin Discussion
Re: Bitcoin Developers
by
WakiMiko
on 05/09/2011, 00:00:21 UTC
output of "git shortlog --summary --numbered --no-merges"

Code:
   245 s_nakamoto
    92 Gavin Andresen
    56 Matt Corallo
    35 Jeff Garzik
    32 Pieter Wuille
    26 Satoshi Nakamoto
    26 sirius-m
    19 gavinandresen
    17 Giel van Schijndel
    12 tcatm
     8 --author=Satoshi Nakamoto
     8 Jordan Lewis
     7 Han Lin Yap
     6 Vegard Nossum
     5 Chris Moore
     5 Doug Huff
     5 Matt Giuca
     4 Chris
     4 Dev Random
     4 Eric Hosmer
     4 Jay Weisskopf
     4 John Maguire
     4 Wladimir J. van der Laan
     4 devrandom
     3 Michael Bemmerl
     3 Venkatesh Srinivas
     2 Carlo Alberto Ferraris
     2 Daniel Folkinshteyn
     2 David FRANCOIS
     2 Dawid Spiechowicz
     2 Marius Hanne
     2 Ricardo M. Correia
     2 Stéphane Gimenez
     2 Witchspace
     1 Abraham Jewowich
     1 Amir Yalon
     1 Anonymous
     1 Blitzboom
     1 Carlos Pizarro
     1 Dan Helfman
     1 Dan Loewenherz
     1 Daniel Holbert
     1 Danube
     1 Dean Lee
     1 Dylan Noblesmith
     1 Eric Swanson
     1 Fabian H jr.
     1 Federico Faggiano
     1 Forrest Voight
     1 HostFat
     1 Jakob Kramer
     1 James Burkle
     1 Jaromil
     1 Jeroenz0r
     1 JoelKatz
     1 Joerie de Gram
     1 Johannes Henninger
     1 Luke Dashjr
     1 Michal Zima
     1 Nils Schneider
     1 Patrick Varilly
     1 Santiago M. Mola
     1 Shane Wegner
     1 Sven Slootweg
     1 ariel
     1 dabaopku
     1 gjs278
     1 laszloh
     1 m0ray
     1 mewantsbitcoins
     1 ojab
     1 ovdeathiam
     1 sandos
     1 xHire
Post
Topic
Board Development & Technical Discussion
Re: looking for technical info
by
WakiMiko
on 26/08/2011, 13:01:33 UTC
blockhashing example in C: https://gist.github.com/1173353

Post
Topic
Board Development & Technical Discussion
Re: Can you help design a better Bitcoin Interface?
by
WakiMiko
on 28/07/2011, 11:12:25 UTC
Yours is just a fundamentalist party line, that seems to refuse that 95% of the talking being done about Bitcoin is because it has a peg to the dollar, and as such has a baseline store of value that becomes more reliable the more people buy it for the dollars you're so against.

But bitcoin ISN'T pegged to the dollar. Or any other currency for that matter.
Post
Topic
Board Bitcoin Discussion
Re: DUMBEST HACKER HACKED ME AT GOX
by
WakiMiko
on 25/07/2011, 12:31:32 UTC
That makes no sense.

I see how it wouldn't make sense for a DUMBASS
Post
Topic
Board Bitcoin Discussion
Re: DUMBEST HACKER HACKED ME AT GOX
by
WakiMiko
on 25/07/2011, 12:06:07 UTC
regardless of what actually happened, if you got hacked by the "dumbest hacker", doesnt that technically make you even dumber than the hacker?
Post
Topic
Board Mining
Re: Putty + Ubuntu +SSH + Public/Private Keys = Not Working (Server refused our key)
by
WakiMiko
on 24/07/2011, 19:52:31 UTC
it does, also make sure that the .ssh directory is also only read and writeable by "cyper"
Post
Topic
Board Mining
Re: Putty + Ubuntu +SSH + Public/Private Keys = Not Working (Server refused our key)
by
WakiMiko
on 24/07/2011, 17:41:00 UTC
duh, you did not listen to what I said, the permissions and the owner are completely wrong

run the following

Code:
sudo chown cyper:cyper authorized_keys
chmod 600 authorized_keys
Post
Topic
Board Mining
Re: Putty + Ubuntu +SSH + Public/Private Keys = Not Working (Server refused our key)
by
WakiMiko
on 24/07/2011, 17:10:53 UTC


1 - So then the keys will be in different formats? Why would that work?
2 - I've tried that function before when using different tutorial, but it didn't work.
3 - I think I'm doing everything right, but to no avail.

1 - Why wouldnt it? The keys are only stored in different formats, putty needs the putty format, openssh needs the openssh format.
3 - If you would be doing everything right it would be working by now. Post a ls -l output of your .ssh directory.
Post
Topic
Board Mining
Re: Putty + Ubuntu +SSH + Public/Private Keys = Not Working (Server refused our key)
by
WakiMiko
on 24/07/2011, 15:29:52 UTC
1 - Do I need to convert the private key (which stays on the Windows machine) to OPENSSH format?
3 - What command do I use on the Ubuntu machine to convert the public key generated by PuttyGen into OpenSSH format?
4 - I can do it with the GUI, right? As shown in the screenshot above. I make sure it's a single line.

Like I said I've tried 2 or 3 different tutorials and I only get Server refused our key.

1) No, you dont.
3) I dunno, but a quick google search tells me that the puttygen GUI has a conversion function. also note that you can do this step on your client or host machine, it doesnt matter.
4) You can edit the authorized_keys file with any editor you want, just make sure it has the right permissions


Post
Topic
Board Mining
Re: Putty + Ubuntu +SSH + Public/Private Keys = Not Working (Server refused our key)
by
WakiMiko
on 24/07/2011, 09:45:59 UTC
Let me see if I understand correctly - First I create a private key under Windows using Puttygen and after I copy this private key to the Ubuntu machine I use again Puttygen to generate the private and public keys out of the private keys I created earlier with PuttyGen under Windows.

Are you sure that is the way, cause that's how you explained it. The program for generating keys under windows is Puttygen and it can create either a private or public keys or both.

You NEVER move a private key to another machine. You also generate keys only ONCE, and only on CLIENT machine.

1) Create a KEY PAIR using putty on your client machine

2) Copy the PUBLIC KEY to the Ubuntu machine

3) Convert the PUBLIC KEY on the Ubuntu machine into OPENSSH FORMAT

4) Append the OPENSSH PUBLIC KEY to the authorized_keys file in the ~/.ssh/ directory


Step 1) is done on the client machine, step 2) is sorta inbetween and 3) and 4) are done on the host machine.
Post
Topic
Board Mining
Re: Putty + Ubuntu +SSH + Public/Private Keys = Not Working (Server refused our key)
by
WakiMiko
on 23/07/2011, 19:46:27 UTC
First:

After you've created your putty key under Windows (puttykey.ppk), copy it to your Ubuntu server.  We'll assume you have it in your home directory on your Ubuntu server which is ~/.

So, that file is now ~/puttykey.ppk

On your Ubuntu box, run a terminal (or SSH in from your Windows box) and:

Code:
sudo apt-get install putty

When that's done, you now have putty on Ubuntu.  Next do:

Code:
puttygen ~/puttykey.ppk -L > ~/.ssh/id_rsa.pub

If you're not familiar with Unix/Linux then you won't realize this, but the key output is being redirected to a file named "id_rsa.pub" in the .ssh directory in your home directory on the Ubuntu server.

Finally, create the private key on Ubuntu using:

Code:
puttygen ~/puttykey.ppk -O private-openssh -o ~/.ssh/id_rsa

Now you should be able to do public key logins to Ubuntu.  You MAY still have an issue due to permissions, so I'd recommend also doing:

Code:
address
chmod 700 .ssh
chmod 600 .ssh/id_rsa*

Good luck.

I'm pretty sure that is completely wrong since the id_rsa* files .ssh are the public/private key files of THAT machine, and do not specify which public key is allowed to connect. They would only be used if you ssh'd from that machine to somewhere else. Furthermore there should be no need to create ANY keys whatsoever on the host machine.

Rather, you want to append your public key you created with putty on your client machine to the authorized_keys file in the ~/.ssh directory on the host machine. If that file does not exist create it and then run "chmod 600 authorized_keys". Depending on the format putty uses you might have to convert it to the openssh format first. There should be one key per line in the authorized_keys file, e.g. it should look similar to this:

Code:
ssh-rsa AAA[lots of characters]== bla@foo

So basically: append the .pub file you created on the client machine to the authorized_keys file of the host machine
Post
Topic
Board Mining
Re: Putty + Ubuntu +SSH + Public/Private Keys = Not Working (Server refused our key)
by
WakiMiko
on 23/07/2011, 17:47:53 UTC
make sure the file permissions of authorized_keys is set to 600 and owned by the user you are using to connect or openssh will refuse to use it.
Post
Topic
Board Project Development
Re: Website Developers, Stop Scaring Away Your Potential Customers (SSL!)
by
WakiMiko
on 23/07/2011, 17:08:17 UTC
SSL is worthless. The Feds (and the Fed) have backdoors in most modern SSL software that allows them access to it, and I am certain that some hackers out there probably have access to it as well.


Never, ever type your Social Security number, Credit/Debit card information, or real name into any website - only use them all at the DMV and retail stores.

This is total bullshit.


That being said, there is no need for a backdoor anyway, when the Fed can just get issued a VALID cert for any domain.
Look through the CA lists that come as fully trusted with every browser download and tell me if you really trust everyone in there. At least with a self-signed certificate there is no way for someone to pose as your website.

Like it has already been said numerous times in this thread, the browser warning for a self-signed certificate really needs to change. A big red warning that takes several clicks to get past should only be displayed if a PREVIOUSLY ACCEPTED certificate changes. There is a Firefox extension that sort of does that already.
Post
Topic
Board Development & Technical Discussion
Re: Can you help design a better Bitcoin Interface?
by
WakiMiko
on 20/07/2011, 17:41:08 UTC
John Smith is working on a Qt interface here http://forum.bitcoin.org/index.php?topic=15276.0

However, I am strongly opposed to adding a USD column because that would make the client depend on an exchange and give the impression that BTC is tied to the dollar.
Post
Topic
Board Development & Technical Discussion
Re: How to download latest bitcoin source from github?
by
WakiMiko
on 20/07/2011, 01:54:55 UTC
github only hosts the source code and no compiled versions. you clone the source repository using git and compile it yourself. there is a feed for commits https://github.com/bitcoin/bitcoin/commits/v0.3.24rc3.atom but not for tags, which would probably be the best way to determine a "stable" version.

precompiled binaries are hosted on sourceforge and there appears to be an rss feed: http://sourceforge.net/api/file/index/project-id/244765/mtime/desc/limit/20/rss
Post
Topic
Board Wallet software
Re: Request for Standardization
by
WakiMiko
on 19/07/2011, 21:19:55 UTC
Some people want to just spend and receive coins without even seeing address strings or wallet details.  Others will be power users, and want more fine-grained control over their wallet(s), keys, encryptions, and super-security techniques.  And there's a million shades of gray in between.  I don't think all this can be achieve with one client.

I think a nice future addition to the Satoshi client would be some kind of EXPERT MODE that can be turned on in the options (disabled by default) that enables all that (and possibly more).
Post
Topic
Board Development & Technical Discussion
Re: On-the-wire byte map (knowledge donation!)
by
WakiMiko
on 19/07/2011, 00:20:30 UTC
thanks a lot for those!