tunage 2017-01-17 23:12:52
china is going to whoop trumps ass http://www.reuters.com/article/us-china-usa-trump-idUSKBN15001X
piqure 2017-01-17 23:12:53
^^^ WARNING: any URL may lead directly or indirectly to COIN-STEALING MALWARE! ^^^
ResQue 2017-01-17 23:16:23
are there any bitcoin exchanges that do not require you to register a bank account or id to trade? I want to trade vs the dollar or commodities then buy back bitcoins and cash out.
trotski2000 2017-01-17 23:23:14
ResQue: #bitcoin-otc
ResQue 2017-01-17 23:24:10
trotski2000, thanks
Nikhil_Jain1810 2017-01-17 23:25:56
Hello, I want to know that nonce that is calculated that fits into the target space of the output hash, how is that calculated?
Nikhil_Jain1810 2017-01-17 23:26:24
can anyone tell me what is this output hash is it the block hash??
mryandao 2017-01-17 23:30:46
Nikhil_Jain1810: you'll probably have to rephrase your question
Nikhil_Jain1810 2017-01-17 23:31:50
I know that nonce is the hash of (prev block hash & tx) and then it is supposed to fit in the target space
Nikhil_Jain1810 2017-01-17 23:32:10
was just going through a lecture on youtube to understand this nonce value calculation
mryandao 2017-01-17 23:32:53
your definition of nonce is incorrect.
mryandao 2017-01-17 23:33:18
a nonce is simply some long random number
Nikhil_Jain1810 2017-01-17 23:33:34
It says it should fit into target space of the output hash
Nikhil_Jain1810 2017-01-17 23:33:53
is it?? I am sorry, I am trying to understand this
mryandao 2017-01-17 23:34:12
what output hash?
Nikhil_Jain1810 2017-01-17 23:34:37
https://www.youtube.com/watch?v=q5GWwTgRIT4&t=2024s watch from 45th minute
piqure 2017-01-17 23:34:39
^^^ WARNING: any URL may lead directly or indirectly to COIN-STEALING MALWARE! ^^^
Nikhil_Jain1810 2017-01-17 23:35:20
output space of hash
Nikhil_Jain1810 2017-01-17 23:35:25
sorry my bad
mryandao 2017-01-17 23:36:03
what that slide is trying to illustrate is that
mryandao 2017-01-17 23:36:10
the set of possible hashes is huge
mryandao 2017-01-17 23:36:16
relative to the number of acceptable solutions
mryandao 2017-01-17 23:36:27
where the set of acceptable solutions is the "target space"
mryandao 2017-01-17 23:36:49
those terms "output space" and "target space" only made sense in the context of that diagram
Nikhil_Jain1810 2017-01-17 23:38:59
ok so what is the blocks trying to calculate nonce in order to publish the blockchain
Nikhil_Jain1810 2017-01-17 23:39:12
*to publish the block
Nikhil_Jain1810 2017-01-17 23:39:21
Nodes
mryandao 2017-01-17 23:39:48
to try to guess some solution that would be in the acceptable solution set, you try as many nonces as required
mryandao 2017-01-17 23:40:23
with the other parameters (i.e. previous block hash, merkle hash root, etc...)
mryandao 2017-01-17 23:41:13
until you get some H(nonce, previous_block_hash, merkle_hash_root) that falls within the "target space"
throl 2017-01-17 23:43:08
Hi guys
throl 2017-01-17 23:43:33
glad to see that you removed my ban... ( i was banned with no reason i guess ) :D
Nikhil_Jain1810 2017-01-17 23:44:23
can you tell me what is this target space and output space of hash
mryandao 2017-01-17 23:44:51
target space == set of numbers that can be accepted as a valid proof of work solution
Nikhil_Jain1810 2017-01-17 23:44:58
according to that slide, what are they referring to in reality? My guess the hash of the block
mryandao 2017-01-17 23:45:21
output space of hash == union of solution set and the set of numbers that aren't solutions
mryandao 2017-01-17 23:45:47
the slide is trying to explain why proof of work is hard
mryandao 2017-01-17 23:45:49
:/
Trinity 2017-01-17 23:52:33
anyone ever try paxful?
inersha 2017-01-18 00:31:59
Where is the maximum target value set in the bitcoin source code?
buZz 2017-01-18 00:34:33
inersha: what do you mean?
buZz 2017-01-18 00:34:37
target value of what
inersha 2017-01-18 00:38:02
buZz: The target that is created using the difficulty -- the value that a block hash must be under for a block to be added to the blockchain.
inersha 2017-01-18 00:38:05
Sorry.
inersha 2017-01-18 00:38:21
The max target is: 00000000FFFF0000000000000000000000000000000000000000000000000000
inersha 2017-01-18 00:38:39
Is this hard coded in to the source code somewhere?
Lauda 2017-01-18 00:38:50
Difficulty target you mean?
inersha 2017-01-18 00:39:09
Lauda: Yes.
buZz 2017-01-18 00:39:11
ah , lets see
Lauda 2017-01-18 00:39:46
That's the maximum value of a 256bit number I believe
Lauda 2017-01-18 00:40:48
Oh wait, not sure. It has to be hard coded somewhere.
Lauda 2017-01-18 00:42:21
https://www.anintegratedworld.com/what-does-the-bitcoin-target-really-mean-part-2/
piqure 2017-01-18 00:42:22
^^^ WARNING: any URL may lead directly or indirectly to COIN-STEALING MALWARE! ^^^
buZz 2017-01-18 00:42:27
hnmm i just see minimum defined
inersha 2017-01-18 00:45:41
Yeah, can't seem to find the maximum difficulty target in the source code.
Alexander-47u 2017-01-18 00:46:40
Hi
Alexander-47u 2017-01-18 00:47:51
What kind of OS do you use to access trading platforms?
buZz 2017-01-18 00:48:03
Alexander-47u: linux
Alexander-47u 2017-01-18 00:48:47
I have a dual boot with windows 7 and ubuntu with encrypted home
buZz 2017-01-18 00:49:02
thats nice
Alexander-47u 2017-01-18 00:49:21
Also checked ubuntu for vulnerabilities with nessus
Alexander-47u 2017-01-18 00:50:22
But is it really that bad to use windows
Alexander-47u 2017-01-18 00:50:29
:p
Lauda 2017-01-18 00:58:46
Yes it is.
devn0ll 2017-01-18 01:00:52
Lauda: Sure. explain that? Considering almost no businesses uses it.
Lauda 2017-01-18 01:01:01
Explain what?
Lauda 2017-01-18 01:01:06
The built in NSA dlls?
devn0ll 2017-01-18 01:01:06
Im not saying its the best or anything, but say its outright "really bad" is just stupid.
devn0ll 2017-01-18 01:01:11
oh dear.
Lauda 2017-01-18 01:01:34
https://en.wikipedia.org/wiki/NSAKEY
piqure 2017-01-18 01:01:35
^^^ WARNING: any URL may lead directly or indirectly to COIN-STEALING MALWARE! ^^^
Lauda 2017-01-18 01:01:51
It began a long time ago.
devn0ll 2017-01-18 01:02:48
So this 20 year old article is what you base this off?
devn0ll 2017-01-18 01:03:40
Im not even sure what you are saying here. What exactly is "really bad" about using windows?
Lauda 2017-01-18 01:03:58
If you have to ask that, it's already too late for you..
devn0ll 2017-01-18 01:04:43
Strong arguement.
Lauda 2017-01-18 01:05:10
https://www.gnu.org/proprietary/malware-microsoft.en.html
piqure 2017-01-18 01:05:11
^^^ WARNING: any URL may lead directly or indirectly to COIN-STEALING MALWARE! ^^^
Alexander-47u 2017-01-18 01:07:16
Do you recommend any trading platform
Alexander-47u 2017-01-18 01:07:23
I was thinking about using poloniex
Lauda 2017-01-18 01:08:34
Depends on where you're at and what you want to trade.
Alexander-47u 2017-01-18 01:08:59
What do you mean with where I am at?
Lauda 2017-01-18 01:09:32
US, EU, etc.
Alexander-47u 2017-01-18 01:09:38
EU
Lauda 2017-01-18 01:10:26
Do you want to trade Bitcoin only or also alts?
Alexander-47u 2017-01-18 01:10:49
Also alts
Lauda 2017-01-18 01:11:03
Then Poloniex is probably the best choice. Not many alternatives that are *legit*
Alexander-47u 2017-01-18 01:11:23
Thank you Lauda
Lauda 2017-01-18 01:12:19
Np.
moli_ 2017-01-18 01:12:54
Lauda, bitcoin was created on windows :P
buZz 2017-01-18 01:13:23
:)
moli_ 2017-01-18 01:13:31
NTumbleBit is created on windows by a windows core dev
buZz 2017-01-18 01:13:56
Alexander-47u: bittrex is also nice
Alexander-47u 2017-01-18 01:15:12
moli_ , even so. Unix systems are allot more safe. FreeBSD is best.
moli_ 2017-01-18 01:15:26
define safe
Alexander-47u 2017-01-18 01:15:31
Windows has allot more attack surface
moli_ 2017-01-18 01:15:50
depends on how you use it
Alexander-47u 2017-01-18 01:15:52
More windows users = more people looking for exploits and creating malware
moli_ 2017-01-18 01:16:00
huh
Alexander-47u 2017-01-18 01:16:29
Cyber criminals want to get as many victims as possible
moli_ 2017-01-18 01:16:38
old argument
Alexander-47u 2017-01-18 01:17:02
Well its still a valid one
moli_ 2017-01-18 01:17:26
the safest computer is the one that never gets on the internet, and can't be used much for anything
devn0ll 2017-01-18 01:17:55
Tell that to the guys behind stuxnet :]
Lauda 2017-01-18 01:18:44
Being outside of the internet doesn't protect you either.
Alexander-47u 2017-01-18 01:18:53
Indeed IoT devices are attacked allot more these days
Lauda 2017-01-18 01:18:56
Physically vulnerable. Targeting you with USV devices
Lauda 2017-01-18 01:18:57
etc etc
Alexander-47u 2017-01-18 01:19:25
Lauda ye but you would have to have some serious coin for anyone to go that far.
Lauda 2017-01-18 01:19:51
No, you just need someone with a grudge, knowledge and close to you.
Lauda 2017-01-18 01:20:05
e.g. they could drop the USB into your bag while you're walking in a crowd
Lauda 2017-01-18 01:20:06
and done :)
Alexander-47u 2017-01-18 01:20:09
Frenemies.
Alexander-47u 2017-01-18 01:21:00
Ye, usb malware can be loaded by using it with keyboard drivers.
Lauda 2017-01-18 01:22:07
You order package from amazon, they intercept it and flash new firmware
Lauda 2017-01-18 01:22:17
bam your 'non internet connected' safe machine is now compromised.
Alexander-47u 2017-01-18 01:22:48
You would still need it to call home somehow Lauda
Lauda 2017-01-18 01:23:05
One day.
Alexander-47u 2017-01-18 01:24:07
Im an aspiring pentester, though in fairly new to it all.
Alexander-47u 2017-01-18 01:24:14
Im*
moli_ 2017-01-18 01:25:52
Lauda, yup that's true now
moli_ 2017-01-18 01:26:17
so nothing is safe anymore!
Lauda 2017-01-18 01:27:08
Besides microwaving, destroying the HDD and throwing it into lava
Lauda 2017-01-18 01:27:09
Nothing
Lauda 2017-01-18 01:27:16
It's a 3 step process
Alexander-47u 2017-01-18 01:33:41
Finding exploits have a straightforward process
Alexander-47u 2017-01-18 01:34:00
You scan target for open ports
Alexander-47u 2017-01-18 01:34:21
Detect software that is connected to WAN
Alexander-47u 2017-01-18 01:34:39
Download a copy if its open source, audit code
Alexander-47u 2017-01-18 01:35:06
Look for bufferoverflows and execute abitrary code with ir
Alexander-47u 2017-01-18 01:35:07
It
septianuciha 2017-01-18 01:35:29
sup
Alexander-47u 2017-01-18 01:36:15
If you close all unnecessary ports and use a javascript blocker like noSuite
Alexander-47u 2017-01-18 01:36:23
You are already fairly safe
Alexander-47u 2017-01-18 01:36:50
But just by coming here, showing your IP
moli_ 2017-01-18 01:36:57
a javascript blocker can keep you safe? :)
Alexander-47u 2017-01-18 01:37:03
If you have services connected to WAN,
Alexander-47u 2017-01-18 01:37:11
You are already very much at risk
Alexander-47u 2017-01-18 01:37:44
It prevents xss, which is sums up about 60 procent of todays cyber attacks moli
moli_ 2017-01-18 01:39:50
more than 60%
Sk_ 2017-01-18 01:40:38
Hello
mryandao 2017-01-18 01:42:17
moli_: if you're really paranoid
Alexander-47u 2017-01-18 01:42:19
Xss isnt limited to javascript, but it is more often than not.
mryandao 2017-01-18 01:42:30
you can curl a HTML page through a disposable proxy
mryandao 2017-01-18 01:42:48
that disposable proxy should be anonymously acquired
Alexander-47u 2017-01-18 01:43:05
Because, if its not, it means the attacker already compromised the entire webserver or database
mryandao 2017-01-18 01:43:20
then open up said HTML page in an air-gapped computer
Alexander-47u 2017-01-18 01:43:20
Just make backups lol.