Search content
Sort by

Showing 20 of 156 results by inh
Post
Topic
(Unknown Title)
by
inh
on 25/01/2020, 02:17:00 UTC
Just finished case revision two, more pics to come tomorrow Smiley





Post
Topic
(Unknown Title)
by
inh
on 25/01/2020, 02:17:00 UTC
Still waiting on the single good PSU to replace the three shitty ones



Post
Topic
(Unknown Title)
by
inh
on 25/01/2020, 02:17:00 UTC
Still waiting on the single good PSU to replace the three shitty ones

Nice. What mobo is that that can take 5 cards? o.0

Some gigabyte one that isn't made anymore Sad
Post
Topic
Board Securities
Re: ASICMINER: Entering the Future of ASIC Mining by Inventing It
by
inh
on 06/06/2013, 21:18:12 UTC
How much GH is one ASICMINER share?

(1/400000)*current hash rate in GH
Post
Topic
Board Securities
Re: [BTC-TC] Community Exchange w/ Options, DRIP, 2FA, API, CSV, etc.
by
inh
on 06/06/2013, 06:56:10 UTC
Burnside,

Would it be possible to make the API always return an array for the order list in the get_portfolio oauth response? If there's one order, it's not an array, but if there's more than one order it IS an array. This inconsistency makes me have to do some hacky work-arounds in parsing the JSON since it's not consistent.

Thanks  Grin
Post
Topic
Board Securities
Re: ASICMINER: Entering the Future of ASIC Mining by Inventing It
by
inh
on 30/05/2013, 18:15:44 UTC
300 direct shares for sale @ 2.45

https://bitcointalk.org/index.php?topic=220396.msg2320707#msg2320707

first come first serve.

Thanks.

We saw you mention this earlier in the thread already...  Roll Eyes
Post
Topic
Board Securities
Re: [BTC-TC] Community Exchange w/ Options, DRIP, 2FA, API, CSV, etc.
by
inh
on 25/05/2013, 07:58:50 UTC
Here's the code I mentioned earlier on IRC:

http://dpaste.com/hold/1197404/


Just change the credentials at the top.  This requires python 2.7 with a couple of dependencies (you'll get errors if they aren't there, just use pip to install them)

This takes the consumer key and consumer secret and generates the other tokens.  It will ask you to visit in the browser and grab the verification string, like you have been doing, then paste it back to the app to generate your oauth client secret.  You should save those, since this authorization is only needed once and you can skip the verification steps in the future if you have these stored.

I also put in an example of using the credentials to call the get_portfolio method to return your info.

I'm actually having the exact opposite problem.  It seems like the api is treating ALL callback_url as if they are oob.  I place an url into the callback_url parameter, but it never hits my callback url.



The python code is working fine for me, so I assume it must be an issue with the oauth package i was using (http://godoc.org/github.com/garyburd/go-oauth/oauth) and not with BTC-TC.

Whew.  One less thing to worry about.  Wink  Thank you for the update!


OK so I lied  Cheesy

Looks like the problem is that the RFC states that the server should accept an HTTP POST for the token request, however it only seems to work when the token is requested using a GET.

Just to help clarify, the code gets a set of temporary credentials, then it uses those plus the verification string to request an access token for future use. I was trying to use the packages built in request-token method, which uses a POST per the standard. In order to get it to work I had to manually create the token request and send it using a GET.

Hope that makes sense  Roll Eyes
Post
Topic
Board Securities
Re: [BTC-TC] Community Exchange w/ Options, DRIP, 2FA, API, CSV, etc.
by
inh
on 24/05/2013, 18:47:09 UTC

Really? I haven't had any luck at all. I can fetch the URL to approve application access to my account, and when I approve it the page reloads again, this time with the verification string in the URL. When I take that string and try to use it in my program, the website API says that it's invalid. I'll see if I can find some other oauth code to work with and test it out, the stuff I'm using has worked fine on other sites but maybe something is off with the way it works with btct.co.


Here's the code I mentioned earlier on IRC:

http://dpaste.com/hold/1197404/


Just change the credentials at the top.  This requires python 2.7 with a couple of dependencies (you'll get errors if they aren't there, just use pip to install them)

This takes the consumer key and consumer secret and generates the other tokens.  It will ask you to visit in the browser and grab the verification string, like you have been doing, then paste it back to the app to generate your oauth client secret.  You should save those, since this authorization is only needed once and you can skip the verification steps in the future if you have these stored.

I also put in an example of using the credentials to call the get_portfolio method to return your info.

I'm actually having the exact opposite problem.  It seems like the api is treating ALL callback_url as if they are oob.  I place an url into the callback_url parameter, but it never hits my callback url.



The python code is working fine for me, so I assume it must be an issue with the oauth package i was using (http://godoc.org/github.com/garyburd/go-oauth/oauth) and not with BTC-TC.
Post
Topic
Board Securities
Re: [BTC-TC] Community Exchange w/ Options, DRIP, 2FA, API, CSV, etc.
by
inh
on 23/05/2013, 18:17:33 UTC
Burnside, would it be possible to have the oauth verifier not expire when the page for a specific token is called again? I can browse to https://btct.co/authorize?oauth_token=c6da005d45642ba73589e37444304412020f36bc with my browser, and approve it, but then it reloads the same page with the oauth verifier token appended to the URL and when I use that verifier the API tells me it's already invalid Sad

I hate to say it but that confused me pretty good.  Wink  Something tells me though that if it doesn't invalidate it the first time around, it may be open to replay attacks?


I don't think so. Each time you visit the URL, for example
Code:
https://btct.co/authorize?oauth_token=c6da005d45642ba73589e37444304412020f36bc

and approve the access request, it returns the verification code in the form of a URL like
Code:
https://btct.co/authorize?oauth_token=c6da005d45642ba73589e37444304412020f36bc&oauth_verifier=

 Each time I grant access, a NEW verifier string is generated, and the old one is invalidated. The problem is that once I approve access, the page redirects to
Code:
https://btct.co/authorize?oauth_token=c6da005d45642ba73589e37444304412020f36bc&oauth_verifier=
and it prompts for access again. If I just ignore the request and paste the verifier string from the URL in to my program, it comes back with this error:

Code:
OAuth server status 401, oauth_problem=verifier_invalid

Hope that helps clears things up. What I think is happening is whenever the page is called, the program invalidates any credentials used for the token in the request URL, so when the page refreshes, BAM, the verifier string in the URL is already invalid.


When you grant access, it should redirect back to your callback page, correct?  Is this the oob situation we were discussing earlier?  No callback causes it to call itself again?  With the DDoS issues lately I haven't had any time to fix the oob functionality.  It's high on the list though.


Correct. When I pass 'oob' for the callback, the webpage reloads itself as the callback URL.

When you grant access, it should redirect back to your callback page, correct?  Is this the oob situation we were discussing earlier?  No callback causes it to call itself again?  With the DDoS issues lately I haven't had any time to fix the oob functionality.  It's high on the list though.

I think oob is working okay.  At least, I've been able to register and retrieve working credentials with it.

Really? I haven't had any luck at all. I can fetch the URL to approve application access to my account, and when I approve it the page reloads again, this time with the verification string in the URL. When I take that string and try to use it in my program, the website API says that it's invalid. I'll see if I can find some other oauth code to work with and test it out, the stuff I'm using has worked fine on other sites but maybe something is off with the way it works with btct.co.
Post
Topic
Board Securities
Re: [BTC-TC] Community Exchange w/ Options, DRIP, 2FA, API, CSV, etc.
by
inh
on 23/05/2013, 05:58:17 UTC
Burnside, would it be possible to have the oauth verifier not expire when the page for a specific token is called again? I can browse to https://btct.co/authorize?oauth_token=c6da005d45642ba73589e37444304412020f36bc with my browser, and approve it, but then it reloads the same page with the oauth verifier token appended to the URL and when I use that verifier the API tells me it's already invalid Sad

I hate to say it but that confused me pretty good.  Wink  Something tells me though that if it doesn't invalidate it the first time around, it may be open to replay attacks?


I don't think so. Each time you visit the URL, for example
Code:
https://btct.co/authorize?oauth_token=c6da005d45642ba73589e37444304412020f36bc

and approve the access request, it returns the verification code in the form of a URL like
Code:
https://btct.co/authorize?oauth_token=c6da005d45642ba73589e37444304412020f36bc&oauth_verifier=

 Each time I grant access, a NEW verifier string is generated, and the old one is invalidated. The problem is that once I approve access, the page redirects to
Code:
https://btct.co/authorize?oauth_token=c6da005d45642ba73589e37444304412020f36bc&oauth_verifier=
and it prompts for access again. If I just ignore the request and paste the verifier string from the URL in to my program, it comes back with this error:

Code:
OAuth server status 401, oauth_problem=verifier_invalid

Hope that helps clears things up. What I think is happening is whenever the page is called, the program invalidates any credentials used for the token in the request URL, so when the page refreshes, BAM, the verifier string in the URL is already invalid.
Post
Topic
Board Securities
Re: [BTC-TC] Community Exchange w/ Options, DRIP, 2FA, API, CSV, etc.
by
inh
on 23/05/2013, 04:18:55 UTC
Burnside, would it be possible to have the oauth verifier not expire when the page for a specific token is called again? I can browse to https://btct.co/authorize?oauth_token=c6da005d45642ba73589e37444304412020f36bc with my browser, and approve it, but then it reloads the same page with the oauth verifier token appended to the URL and when I use that verifier the API tells me it's already invalid Sad
Post
Topic
Board Securities
Re: [POLL] What is your favorite Bitcoin security?
by
inh
on 21/05/2013, 18:48:13 UTC
No Ziggap?  Sad
Post
Topic
Board Securities
Re: Best platform for a new security?
by
inh
on 18/05/2013, 18:08:01 UTC
MPex -> Lost most of its trading volume (stocks) -> going down

Still more trade than the sum of all others, for one.

The fact that it won't list bullshit "assets" (such as the Asciminer passthroughs) isn't really a valid objection.

...blah blah blah...

If on the other hand you have a legitimate business you have no chance making it outside of MPEx. This is a point of fact, not a point of argument: there have been bet sites coming and going for about two years. Once one listed on MPEx that was the end of that market, BitBet now dominates it. Same with dice games, same with everything else: kids can play around and pretend they're doing things until the adult exchange lists some adults...

Sounds like I should get myself listed on MPEx so I can live forever and dominate over everyone else that didn't list themselves there.

I hope you could hear me all the way up there on your high horse. If not I'll be glad to get a step-ladder and/or a megaphone.
Post
Topic
Board Securities
Re: Furthering the S.DICE / AM comparison
by
inh
on 17/05/2013, 00:12:52 UTC
So is this comparison thread still going on or...?

 I hope not  Undecided
Post
Topic
Board Securities
Re: [BTC-TC] Community Exchange w/ Options, DRIP, 2FA, API, CSV, etc.
by
inh
on 15/05/2013, 18:28:10 UTC
I'm working with the oauth API right now, and it seems it doesn't support 'oob' for situations when you don't have a callback url available. If you could implement this, I'd be really grateful. All it needs to do is if there is no callback url, or the callback url is 'oob', just display a page with the token and verification information in it so the user can copy and paste it where they need it to go.

After doing more testing, it appears that with "oob" passed as the callback, the page uses itself as the callback URL with the verifier string in the URL as well. This would be fine except I think as soon as the page is loaded with the same token, it invalidates the old verifier, so I can't just copy the verifier from the URL and use it because it's already invalid Sad

If you could make it show a new page that just displays the verifier string when the callback URL is "oob" that would be most excellent.

I'll definitely spend some time on this soon as I can.  I've been looking a bit at some other implementations to see what the "right way" to implement it is.  Wink

Awesome, thank you very much, oauth is such a PITA!

I was basing my statements on how Twitter does it. I made an app at https://dev.twitter.com and it generates the consumer secret and key. Then of course the user (with my sample code) has to hit up the URL http://api.twitter.com/oauth/authorize?oauth_token= and once the user OK's the app, it takes you to a page with just the verification string that is normally returned through the callback URL.

Just wanted to post that as a sample of the work flow for something that is probably doing it right.
Post
Topic
Board Securities
Re: [BTC-TC] Community Exchange w/ Options, DRIP, 2FA, API, CSV, etc.
by
inh
on 15/05/2013, 17:46:35 UTC
I'm working with the oauth API right now, and it seems it doesn't support 'oob' for situations when you don't have a callback url available. If you could implement this, I'd be really grateful. All it needs to do is if there is no callback url, or the callback url is 'oob', just display a page with the token and verification information in it so the user can copy and paste it where they need it to go.

After doing more testing, it appears that with "oob" passed as the callback, the page uses itself as the callback URL with the verifier string in the URL as well. This would be fine except I think as soon as the page is loaded with the same token, it invalidates the old verifier, so I can't just copy the verifier from the URL and use it because it's already invalid Sad

If you could make it show a new page that just displays the verifier string when the callback URL is "oob" that would be most excellent.
Post
Topic
Board Securities
Re: ASICMINER: Entering the Future of ASIC Mining by Inventing It
by
inh
on 15/05/2013, 16:16:33 UTC
It is normal for pts to have a delay in paying dividends. If you know issuers are trusted, you have nothing to worry about.

Yes, it can take a day or two sometimes.
Post
Topic
Board Securities
Re: [BTC-TC] Community Exchange w/ Options, DRIP, 2FA, API, CSV, etc.
by
inh
on 15/05/2013, 02:13:48 UTC
I'm working with the oauth API right now, and it seems it doesn't support 'oob' for situations when you don't have a callback url available. If you could implement this, I'd be really grateful. All it needs to do is if there is no callback url, or the callback url is 'oob', just display a page with the token and verification information in it so the user can copy and paste it where they need it to go.
Post
Topic
Board Service Discussion
Re: bitbet.us scammers ignore delivered BFL products
by
inh
on 12/05/2013, 18:51:20 UTC
Well then, idiot:

1) For the July 1st BFL bet, what exactly is the advertised performance?

Exactly what it was at the time the bet was introduced.


Which is what? Post the specifications or a link to them so we can see what the decision will be based on.
Post
Topic
Board Service Discussion
Re: bitbet.us scammers ignore delivered BFL products
by
inh
on 10/05/2013, 04:02:17 UTC
Add me to the list that think power is not performance and that old forum posts for a canceled product probably aren't the greatest source for the currently advertised specifications.