I was thinking the same thing. He wants a record of the transactions so the ADAs case is a slam dunk. Will there be a separate thread listing the chronology of the crimes committed with said weapon or will that just be posted here as well? lol
I appreciate the humor, but where I live, I can order everything I need (except the lower, which i've already purchased from a dealer) shipped to my door, and be completely legal. I love living in the middle of nowhere.
Well those rabbits in you back woods are sure gonna be pissed when you get this assault rifle complete. Make sure to test it with a rubber band to guarantee it can be bump-fired like a full automatic US Army issued M-16.
That you'll end up with a lot of fire power to hunt with when youre done; unless of course youre hunting people (which was my first joke). Then that weapon is perfect as that's what it was designed for originally. Good luck with your project.
You seem to be somewhat misinformed as to the nature and purpose of firearms.
Post
Topic
BoardOff-topic
Re: The AR-15 bitcoin project
by
btc_artist
on 05/03/2012, 18:53:46 UTC
Awesome thread.
As for the receiver, another option might have been an 80% receiver if there are any companies accepting bitcoins.
Post
Topic
BoardBitcoin Discussion
Re: Instawallet is shutting down - please withdraw your funds
I kind of hate to bring this up, but given that jav gets to keep all the coins that go unclaimed.... well, I'd call that pretty big incentive to shut it down.
TBH, I kinda think that's uncalled for. I think he mentioned he'd honor people's claims even after it's shut down.
i mean seriously, could not this whole thing been prevented if the wallet was just encrypted?
Obviously the software running against the hot wallet has to have access to it. This means that if someone roots the server, they'll be able to have the same access to the hot wallet. Encryption would not have entered into it.
Zhou, good on you for covering this! I'm having a hard enough time covering the BTCinch theft; I can only imagine how pissed you are at linode.
In this case, encryption would have protected the wallet because the attacker was only able to get root access after a reboot.
why would a reboot stop the attacker from seeing the wallet being unencrypted during the next use?
You have to enter the wallet password/passphrase after rebooting/restarting bitcoin.
am i missing something here? wouldn't that entry be exactly what the attacker would be waiting for?
Yes, an attack like that could also be done, although it would have to be slightly more sophisticated than today's attack. Likely you would modify bitcoind to log the passphrase to a file somewhere.
Post
Topic
BoardBitcoin Discussion
Re: Bitcoinica lost 43,554 BTC from Linode compromise, suspicious TXIDs publicized
i mean seriously, could not this whole thing been prevented if the wallet was just encrypted?
Obviously the software running against the hot wallet has to have access to it. This means that if someone roots the server, they'll be able to have the same access to the hot wallet. Encryption would not have entered into it.
Zhou, good on you for covering this! I'm having a hard enough time covering the BTCinch theft; I can only imagine how pissed you are at linode.
In this case, encryption would have protected the wallet because the attacker was only able to get root access after a reboot.
why would a reboot stop the attacker from seeing the wallet being unencrypted during the next use?
You have to enter the wallet password/passphrase after rebooting/restarting bitcoin.
I want to depersonalize mining pools in this scheme, so domain transaction can be processed by any miner, not miner who was paid directly by client for processing.
Have your read this page: https://en.bitcoin.it/wiki/Contracts ? I think there's probably something in there that could be adapted for what you want to do.
Post
Topic
BoardBitcoin Discussion
Re: Bitcoinica Warning: Please do not re-use any old Bitcoin deposit addresses