Pages:
Author

Topic: $1500+ bounty for litecoin 51% attack - page 4. (Read 14231 times)

newbie
Activity: 42
Merit: 0
March 18, 2013, 09:16:48 AM
#80
$4000 is so totally $400,000 you are right

You totally have enough money to perform this attack...

You should fire your Low Orbit Ion Cannon at port 80 or whatever dem cool kids do...

"Insert extreme sarcasms"
sr. member
Activity: 448
Merit: 250
March 18, 2013, 09:11:44 AM
#79
First I did not read the whole post so don't hate me if I say something that has already been covered.

What has litecoin done to you?
Why not put your resources into something useful?  Huh
Who cares what the market cap is? People sell dirt and rocks it's the world we live in.


First, GO READ THE WHOLE POST. The join the conversation.

 NO NEED TO SHOUT, your douchebaggery is not needed, um-kay ok thanks now bye bye
hero member
Activity: 924
Merit: 1001
Unlimited Free Crypto
March 18, 2013, 09:05:57 AM
#78
First I did not read the whole post so don't hate me if I say something that has already been covered.

What has litecoin done to you?
Why not put your resources into something useful?  Huh
Who cares what the market cap is? People sell dirt and rocks it's the world we live in.


First, GO READ THE WHOLE POST. The join the conversation.
sr. member
Activity: 448
Merit: 250
March 18, 2013, 08:55:20 AM
#77
First I did not read the whole post so don't hate me if I say something that has already been covered.

What has litecoin done to you?
Why not put your resources into something useful?  Huh
Who cares what the market cap is? People sell dirt and rocks it's the world we live in.
hero member
Activity: 924
Merit: 1001
Unlimited Free Crypto
March 18, 2013, 08:43:12 AM
#76
I will add 500$ to the bounty. Not rich just damn sure this is not possible. I will handsomely pay if proven otherwise.
legendary
Activity: 1176
Merit: 1015
March 18, 2013, 12:54:45 AM
#75
To gain 51% of a 2,814,369Kh LTC network, you would need 1,435,328.19 Khs

You actually underestimated the hash power needed to take control of a 2,814,369Kh LTC network. You will be adding power because all those nodes still exist, so you will actually need to add 2,814,369Kh plus a little more to gain. Like this:

2,814,369 + 2,814,369 + 1000 to get a good 51% going. This means you need to add 2,815,369 Kh and you will have control over a network with the eventual speed of 5,629,738 Kh

So it would cost even more.
member
Activity: 64
Merit: 10
March 18, 2013, 12:20:38 AM
#74
Why do you say they will both fail sooner than we think?
efx
sr. member
Activity: 378
Merit: 250
March 17, 2013, 05:30:25 PM
#73
No no...wait... Long term, both bitcoin and litecoin will die, mostly. Possibly sooner than we expect.
efx
sr. member
Activity: 378
Merit: 250
March 17, 2013, 05:28:35 PM
#72
^^ Yeah right, that's nice   Cheesy
legendary
Activity: 1484
Merit: 1005
March 17, 2013, 05:27:21 PM
#71
I think this thread is a waste of time and efforts. Litecoin will fail anyway.... no need for an attack.

I doubt it given the ever increasing $10 million USD market cap.
sr. member
Activity: 361
Merit: 250
March 17, 2013, 05:22:54 PM
#70
I think this thread is a waste of time and efforts. Litecoin will fail anyway.... no need for an attack.
efx
sr. member
Activity: 378
Merit: 250
March 17, 2013, 05:16:27 PM
#69
Perhaps. I especially liked the crazy_rabbit troll. Make sure you collect from them both, rabbit.

Also, coinhorder went to town on that calulation.  Grin


What do you mean by the coins 'disappear', Simran?
sr. member
Activity: 271
Merit: 250
March 17, 2013, 05:10:07 PM
#68
Successful troll is successful
legendary
Activity: 1344
Merit: 1001
March 17, 2013, 04:41:19 PM
#67
People keep forgetting there are legal consequences to engaging in this activity. I can't speak for everyone's home country, but in mine even offering a bounty for a malicious cyber crime that would damage businesses and individuals constitutes criminal activity (Computer Misuse Act, amongst others).

And very, very few people get caught, so no one cares.

Because no-one from the Anonymous hacking group got busted right? Or the other groups. OP would already be implicated just by offering a bounty but he is too retarded to realise that.
member
Activity: 81
Merit: 1002
It was only the wind.
March 17, 2013, 03:24:58 PM
#66
People keep forgetting there are legal consequences to engaging in this activity. I can't speak for everyone's home country, but in mine even offering a bounty for a malicious cyber crime that would damage businesses and individuals constitutes criminal activity (Computer Misuse Act, amongst others).

And very, very few people get caught, so no one cares.
hero member
Activity: 658
Merit: 500
March 17, 2013, 03:57:22 PM
#66
You buy a "botkiller". It kills all the other peoples infected file besides yours so the zombie is all yours.

That I would trust even less than the botnet computers themselves.  That would need to be something you yourself programmed, and even then it'd be difficult to tell what other backends were and weren't installed on the compromised computer.

Just check if any system files have injected any different byte arrays into the systems memory. Checking if anything has been written to the VirtualMemory or any space has been allocated in the memory.
OMG THAT EASY?!?!?..... See how long your botnet lasts then.

Its a fallacy to think something that's easy isn't already done.
hero member
Activity: 714
Merit: 500
March 17, 2013, 02:40:42 PM
#65
It is easy, just not everyone knows what exactly to do :trlf:

There are a lot of ways to get around WriteProcessMemory or OpenProcess call monitoring if that's what you're talking about.  It's really easy to write straight binary code to memory from a C program from overflow or other simple calls that will never be detected that way.

:trlf: :trlf: :trlf: :trlf: not saying anymoar :trlf: :trlf: :trlf:
legendary
Activity: 1344
Merit: 1001
March 17, 2013, 02:39:13 PM
#64
People keep forgetting there are legal consequences to engaging in this activity. I can't speak for everyone's home country, but in mine even offering a bounty for a malicious cyber crime that would damage businesses and individuals constitutes criminal activity (Computer Misuse Act, amongst others).
legendary
Activity: 1484
Merit: 1005
March 17, 2013, 02:38:03 PM
#63
It is easy, just not everyone knows what exactly to do :trlf:

There are a lot of ways to get around WriteProcessMemory or OpenProcess call monitoring if that's what you're talking about.  It's really easy to write straight binary code to memory from a C program from overflow or other simple calls that will never be detected that way.
hero member
Activity: 714
Merit: 500
March 17, 2013, 02:30:23 PM
#62
Just check if any system files have injected any different byte arrays into the systems memory. Checking if anything has been written to the VirtualMemory or any space has been allocated in the memory.

If it were that easy, anti-virus software companies would be out of a job pretty quickly.  Cheesy

It is easy, just not everyone knows what exactly to do :trlf:
Pages:
Jump to: