Search content
Sort by

Showing 20 of 22 results by unicron
Post
Topic
Board Mining
Re: Small time miners - What do you do when ASICs hit and you don't upgrade?
by
unicron
on 04/11/2012, 05:32:20 UTC
Most currency is created due to the fact that people are already exchanging goods and services and they need a simpler way to do that beyond bartering and the like.

I've no quibbles with your other points, but this nit is worth picking.  I recently read a book called "Debt: The First 5,000 Years" which contradicts the usual dogma that money arose to solve the problem of barter.  Here is the author's discussion of that point in depth.

http://www.nakedcapitalism.com/2011/09/david-graeber-on-the-invention-of-money-%E2%80%93-notes-on-sex-adventure-monomaniacal-sociopathy-and-the-true-function-of-economics.html
Post
Topic
Board Speculation
Re: The Great Silk Road Crash of 20** ...?
by
unicron
on 27/09/2012, 01:06:56 UTC
(you can't torify vmware)
Sure you can. Set your VM up for host-only networking and you can use iptables to do whatever you want to the packets.

I just meant using the torify wrapper, which is trivial compared to any iptables mucking.
Post
Topic
Board Speculation
Re: The Great Silk Road Crash of 20** ...?
by
unicron
on 26/09/2012, 21:04:31 UTC
Now, it's possible to set up your server so that the software running your hidden services can't access the internet except over Tor, but it's fairly non-trivial. The easiest method involves obscure iptables matching rules.

torify thttpd

as long as it's all in userland, it'll work (you can't torify vmware)
Post
Topic
Board Speculation
Re: The Great Silk Road Crash of 20** ...?
by
unicron
on 20/09/2012, 20:05:55 UTC
Ugh, some of the general tactics I threw out there for getting the server to cough up its info may have slight catches and flaws but the idea here is sound.  You're all saying they exist in happy magic land and nobody will ever catch them.  Well guess what, their web server is a computer and it's sitting somewhere connected to the internet with an ISP or host and an IP address.  That means someone could find it out.

Nobody in this thread is claiming tor is invulnerable, but the ideas you've proposed are not at all sound.  Now if you had said something like, hidden services can be revealed by a malicious node which advertises infinite bandwidth, causing the hidden service to preferentially route through it, you might have more credibility, though this attack can be mitigated by specifying a strict list of entry nodes.  Which I'm sure the SR crew are aware of, given the ease of this potential attack and their history of continuing to operate despite the yelling about them in Congress.

Someone may compromise SR, but I think it far more likely to get infiltrated, or discovered through old fashioned sleuthing, or to have been a honeypot operation from the beginning, than through a known technical flaw.

Quote
This article is titled:
"Feds shutter online narcotics store that used TOR to hide its tracks" <-- lol
http://arstechnica.com/tech-policy/2012/04/feds-shutter-online-narcotics-store-that-used-tor-to-hide-its-tracks/

Super short summary: an exact clone of silkroad got shut down despite existing only in Tor.  Oops, Des was right again.  I guess computers connected to the internet can be found after all! lol.

This was not an exact clone of SR.  The operators used hushmail and paypal, both of which rolled over for the feds, as anyone would have predicted.  You're not even reading your own links now!  FUD indeed.
Post
Topic
Board Speculation
Re: The Great Silk Road Crash of 20** ...?
by
unicron
on 20/09/2012, 19:38:45 UTC
And they haven't been caught because the FBI is stupid, isn't allowed to do stuff like that anyway, probably doesn't know how TOR works, failed to go to Google and search "tor weaknesses" Tongue , and they don't have sufficient coordination to do an enter-exit attack nor would they be allowed to DDOS other people's TOR nodes and mount their own rigged ones to get to a sufficient control level for other attack methods.  That's like 1/10th of the reasons lol.

If you could be arsed to take your own advice and read some docs, you'd know that there is no exit node involved in accessing a hidden service.

The government uses tor for its own purposes, so it has little incentive to ddos nodes.

Quote
Oh and a server that receives 99.99999% SSL traffic and no normal traffic, that could happen in certain somewhat common normal circumstances but it would be at least suspicious enough that that would be the server a hosting company would look at to see if it contains things like text saying "silkroad."

SSL traffic is normal traffic.  If an ssh tunnel is employed, there are no files to look at.  You're grasping at straws in order to avoid admitting that you don't know enough about your topic.

Quote
plus, what if 1 single offsite image is posted as a link like as a product or something.

This would be a stupid thing to allow.  I'd be surprised if this was possible on SR.  Even beyond disallowing such an attack, the web server could easily be prevented from connecting anywhere without tor, a step that I doubt the SR admins have neglected to take.

By the way, you are mistaken about the "direct server to server link up"; you wouldn't catch the server's IP this way, only that of improperly configured SR users (more likely, just that of a tor exit node).  Your server logs would only contain the hidden service hostname as the referer.

Quote
There's like 100 ways to catch these assholes, just most are seriously illegal so nobody's done it yet.

This is so naive it's cute.
Post
Topic
Board Speculation
Re: The Great Silk Road Crash of 20** ...?
by
unicron
on 20/09/2012, 18:49:45 UTC
btw there's nooooo way in hell it's a hosted machine at a 3rd party host.  Almost all web hosts have backdoors to view content on their own servers regardless of security not to mention examining inbound and outbound data to the server.  The FBI probably has every host in the US and as many as they could get in the rest of the world examining their data for servers containing files relevant to silkroad or data indicating massive inbound TOR traffic.

The existence of shady hosts notwithstanding, it really could be anywhere.  It could be on a hacked box in Russia.  It could be secreted in a closet at a NOC.  It could be somewhere completely different and using an ssh tunnel through a rogue access point in any organization.  The traffic would look like normal SSL traffic, and because of the way hidden services work, if the server or its tunnel endpoint ever went down, a backup could be placed elsewhere and nobody would have to update their links to it.  That's because the hidden service hostname is actually a hash of its private key.

Quote
1. go to google
2. type in "tor weaknesses"
3. shut the hell up

I appreciate your concern, but I'm not the one being willfully ignorant here.
Post
Topic
Board Speculation
Re: The Great Silk Road Crash of 20** ...?
by
unicron
on 20/09/2012, 18:28:43 UTC
can anyone explain how an entire site can exist inside TOR? [...] I'm still not convinced they designed it that way in the first place but I can't imagine how else someone could set up a website that exists only in TOR and have it actually work.

[...] if those idiots think they're safe, they're not.

Okay, now I'm really not clicking it, you dumbass.

[...]

Your knowledge of how Tor works is a joke. [...]

You claim you want to know, then you decide to be spiteful instead.  The most charitable reading is that you are spreading FUD.

As for other programs on the same computer not using tor, if you torify your shell then every process forked from it will use tor.  This is a trivial enough workaround to make your point uninteresting to anyone who hasn't just learned about tor.
Post
Topic
Board Speculation
Re: The Great Silk Road Crash of 20** ...?
by
unicron
on 20/09/2012, 17:41:16 UTC
Yeeeeah, security certificate error and an extension ending in .en.  I don't think I'm gonna let that page load.

Load it in a VM that you can revert after, Mr. Security Expert.  You seem to talk a lot for someone who is unwilling to read.
Post
Topic
Board Pools
Re: [1423GH] ABCPool PPS - Proxy Pool For High & Steady Mining Rewards
by
unicron
on 23/08/2012, 12:34:35 UTC
someone please do it for me

.01BTC if a newbie does it

Estimated next difficulty, from bitcoinwatch.com = 2,432,977

From the FAQ:

Quote
payout_per_share = block_reward / difficulty = BTC 50 / 2190865.9701029 * (1 - 0.015) = 0.0000224796955506

Estimated next payout per share = 50 / (2432977 * (1 - 0.015)) = 0.0000208639133538035724607017707864649426407520644597 (according to wolframalpha.com)

If I am newbie enough, I'll PM you an addr Smiley
Post
Topic
Board Bitcoin Discussion
Re: Defeating Rubber-Hose Cryptanalysis
by
unicron
on 30/07/2012, 19:43:59 UTC
Idea 5) Deniable encryption. Like carrying 2 wallets, one low value. Can't see this workingm they might be able to tell you are lying.

Truecrypt can do this. 

http://www.truecrypt.org/docs/?s=plausible-deniability

See also http://marutukku.org/
Post
Topic
Board Project Development
Re: BAMT for 7970 using cgminer
by
unicron
on 29/07/2012, 08:14:27 UTC
I see people keep asking for a BAMT able to run with 7970 cards so I am thinking to share mine.
It may work for you or it may not...give it a try. It worked for me two months already so is not gonna blow your PC.

Anyone try this image yet?

I'm eager to know if it works, but too busy lately for messing with hardware :/
Post
Topic
Board Mining (Altcoins)
Re: Quad XC6SLX150 Board - Initial Price £400/$640/520€
by
unicron
on 28/07/2012, 04:18:00 UTC
(10:59:50 PM) Glasswalker [~glasswalk@bas4-kingston08-1177944628.dsl.bell.ca] entered the room.
(10:59:54 PM) Glasswalker: Hey anyone here?
(11:00:29 PM) Glasswalker: I'm on my laptop at my inlaws, and don't have my password db readily available to log into bitcointalk
(11:00:37 PM) Glasswalker: but I have a new bitstream for people to test
(11:01:02 PM) Glasswalker: at http://www.btcsyn.com/bitstreams/cairnsmore_125_test.zip
(11:01:15 PM) Glasswalker: be aware this is untested, it uses new code that may not even work
(11:01:21 PM) Glasswalker: but I hope it's nice and stable in all 4 slots
(11:01:30 PM) Glasswalker: so I'm not wasting time optimizing the 175Mhz version of the same code.
(11:01:48 PM) Glasswalker: It's 25Mhz source clock, 57600 baud same as last bitstream, uses glasswalker controller
(11:02:11 PM) Glasswalker: If someone here could please post this info to the bitcointalk threads I would appreciate it
(11:02:30 PM) Glasswalker: This one is 125Mhz (125Mhash)
(11:02:33 PM) Glasswalker: only for testing functionality
(11:02:45 PM) Glasswalker: But if this works, I should have a 175Mhz version very soon
(11:03:00 PM) Glasswalker: if it fails, at least I know I need to debug it. instead of wasting a ton of compute power on optimizing bugged code
(11:03:27 PM) Glasswalker: Isokivi: *poke*
(11:03:50 PM) Glasswalker: zefir: *poke*
(11:04:01 PM) Glasswalker: makomk: *poke*
(11:04:03 PM) Glasswalker: lol
(11:04:32 PM) Glasswalker: ok well I've got to head to sleep, hopefully someone sees this, Tomorrow I'll get my pwdb going and get on and post it up myself if nobody beats me to it, but it might not be till the end of the day
(11:08:40 PM) Glasswalker: Night all, here's hoping someone has some success with the 125Mhz test.
(11:08:51 PM) Glasswalker: I've also sent it to Yohan at Enterpoint for testing.
(11:13:50 PM) Glasswalker left the room (quit: Ping timeout: 240 seconds).
Post
Topic
Board Off-topic
Re: The AR-15 bitcoin project
by
unicron
on 05/03/2012, 15:06:20 UTC
lower receiver assembly placeholder

This is the only AR-15 part that would legally require a background check in USA.

If someone has a 3D printer they could print one, though I don't know how well it would work:

http://www.thingiverse.com/thing:11770
Post
Topic
Board Project Development
Re: BAMT version 0.5 - Easy USB based mining Linux with farm wide management tools
by
unicron
on 24/02/2012, 09:32:55 UTC
Here is a link to the current latest release.

Direct download: http://biomancer.net/bamt/bamt_v0.5a.zip

md5sum: 692d336de35fd3f3b4561ff39b109d08  bamt_v0.5a.zip
Post
Topic
Board Bitcoin Discussion
Re: Hiding your assets from the government via BTC
by
unicron
on 31/01/2012, 00:02:06 UTC
Post
Topic
Board Speculation
Re: Goomboo's Journal
by
unicron
on 21/01/2012, 19:38:34 UTC

By the way, if no one has read this, it is awesome...a great reality check.  I think you can get it free in some places, but I suggest buying it to support the authors:

Reminiscences of a Stock Operator
http://www.amazon.com/Reminiscences-Stock-Operator-Investment-Classics/dp/0471770884/ref=sr_1_1?ie=UTF8&qid=1327114156&sr=8-1

The copyright is expired and the author is deceased.  Project Gutenberg has it:

http://ebooks.gutenberg.us/WorldeBookLibrary.com/confessstock.htm
Post
Topic
Board Pools
Re: [57.7 GH/s] ABCPool.co - The NEW 0% fee PPS pool; with stales as bonus!
by
unicron
on 21/01/2012, 05:57:19 UTC
You guys should setup an IRC channel on freenode Smiley

+1
Post
Topic
Board Beginners & Help
Re: Gratuitous newbie intro
by
unicron
on 11/01/2012, 10:12:42 UTC
I paid $600 each, hoping to get 700MH/s out of them after DiabloMiner is tweaked a bit more...   I've been having trouble finding 5970's or I would have opted for that instead.

Thank you very much for your help!
Post
Topic
Board Beginners & Help
Re: Gratuitous newbie intro
by
unicron
on 11/01/2012, 07:36:21 UTC
Damn, that is crazy!  One of my friends is trying to RMA a card right now and Sapphire won't even answer their phones.

Fortunately, none of my cards are Sapphires...  the 6870's are XFX, the 6750's and the 5770's are HIS, and the 7970's are Diamonds.  I have no experience with Diamond but that was the only brand available, damn they all sold out quick...  I had a pair of XFX 7970's in my shopping cart that someone else bought out from under me while I was logging in Sad
Post
Topic
Board Beginners & Help
Re: Gratuitous newbie intro
by
unicron
on 11/01/2012, 07:26:24 UTC
It's an XFX card, and they issued me an RMA immediately when I called them after my ticket had idled for a couple days through New Year's.  I figured a warranty replacement for the $20 shipping cost was better than a $14+shipping replacement fan from ebay, and being out of commission longer won't be such a big hit soon considering it will be just one of nine cards.