Author

Topic: [ANN][BURST] Burst | Efficient HDD Mining | New 1.2.3 Fork block 92000 - page 589. (Read 2171061 times)

sr. member
Activity: 434
Merit: 250
Alright, have a v2 pool running at http://178.62.39.204:8121/
The v1 pool will be converted to v2 in a day or 2, but setting up the migration would have delayed this release, and only running that one on v2 could result in a dangerously high portion of network hashrate on one pool, so it's better to split it for now anyway.

Usage:

You will need the pocminer_pool posted previously when the v1 pool was launched: https://mega.co.nz/#!7hwHQJLZ!-waC7CwWeMStkdAwjEVbew1fN_YqeZDRWMWfCylaNPo
Reward reassignment has not been integrated into the wallet gui yet, however an extra html page was included in the 1.0.3 release that you can use. http://localhost:8125/rewardassignment.html
Below where it says set reward recipient, fill in your passphrase, and put the pool's burst- address where it says recipient, and submit. This will have a fee of 1 Burst. It should come up with a page of a bunch of details you won't care about if everything is good.
Once the transaction is in a valid block + 3 confirms, you should be able to use the pool. You can check the users list on the pool to make sure that your numerical account id is there(your generate address)
Edit the pool's ip/port into the run_mine file for pocminer_pool.
Rename or move your passphrases.txt file, since pocminer_pool will try to solo instead if it sees a correct passphrase for those plots.

Starting target deadline is 75k
PPLNS
When your balance hits 500 burst you get paid.

All users who have not upgraded to 1.0.3 are now on a bad fork

V2 Pool allows you to mine with your solo plots. You do NOT have to regenerate plots if you have solo plots. v1 pool users can keep mining without doing anything. the v1 -> v2 migration for v1 pool users will be transparent to them, and not require them to do anything.

is pool offline?
member
Activity: 101
Merit: 10
Something is wrong with the blogs at cryptomining.farm

I missed block 31471
legendary
Activity: 1932
Merit: 1042
https://locktrip.com/?refId=40964
BURST-68JV-2EAW-WDRB-FKZ4Y
 is the new hacker adress hast a few burst in there now


for choose stronger passwor use a GUID generator like...
there are a lot site online...

http://www.guidgen.com/

good by!
sr. member
Activity: 456
Merit: 250
Blockchain Just Entered The Real World
I'm using the latest version of your Uray Burst Miner 1.1 R4 on Linux,
there is a particular configuration or option to put on mining.conf file in order to know
how many seconds it took to read a folder of plots ?

How I can understand how many shared plots read the pool ?

Thanks

Fabrizio
full member
Activity: 171
Merit: 100


password was = applepie123 - no new software or any thing new , download the wallet direct from the here . could it be a software that was install on my PC or key stroke ... the hacker account is worth less then 0.5BTC so yea i dont really care about the value , but atleast we have all learnt


Someone is probably "just" bruteforcing weak passwords, I guess.


Correct. It's a simple bruteforcing. I was the victim of this & mostly posted first about this kind of hacking at the following link,

https://bitcointalksearch.org/topic/m.8822983

My password was long enough but instead of random words it was the collection of few dictionary words + few numbers.

I didn't loose much but I had to re-plot my whole available space with the new a/c with more stronger randomly  generated password which took almost a week !

I think since this is the web based wallet 2FA is must to avoid this kind of hacking (I am not sure if it's possible or not) or atleast we need captcha to avoid some auto-script. It's easy to make a script which can check combination of dictionary words & make a list of account balance itself without any manual work. Later once the list is ready, the so called hacker can transfer the whole balance as he desires.
sr. member
Activity: 462
Merit: 250


password was = applepie123 - no new software or any thing new , download the wallet direct from the here . could it be a software that was install on my PC or key stroke ... the hacker account is worth less then 0.5BTC so yea i dont really care about the value , but atleast we have all learnt


Someone is probably "just" bruteforcing weak passwords, I guess.
hero member
Activity: 599
Merit: 500
i think there is a hacker that is stealing ppl burst coin

BURST-FRNC-8G44-FNQP-AEQFS

not my wallet but now my account is empty

Full Hash:   a3ef1a22011c2f4c4dec7422d84c3cb6a73c03f991642c49c0aac159ac0e8711
Confirmations:   734
Signature Hash:   db82653bca0f90868b8e8e277c82f98c68e1c46a2590a854001e2667048627e4
Amount NQT:   15'075 BURST
ec_block_height:   30549
Block:   1723633751819466101
Recipient RS:   BURST-FRNC-8G44-FNQP-AEQFS
Type:   0
Fee NQT:   1 BURST
Recipient:   10103487335684824714
Version:   1
Sender:   You
Timestamp:   7419262
ec_block_id:   13420289258326036281
Height:   30562
Subtype:   0
Sender Public Key:   e53096f42bedc9434fa311fec0f008e4a749a79fa7a53c149f1f6f14f426174e
Deadline:   1440
Block Timestamp:   7419271
Sender RS:   You
signature:   5c783709d6d12bbb8689051d62e56a5cb08814f0db1b26847b22b04ffbe9de00ee3a2379d2a00d0 f87bdfe70ebd4273b91b398e5a5316b0446586f04782306b1
This same address was posted a few pages back by 2 other people who lost burst to it, but a link between them them has not yet been found. Can you post how secure your password was(number of characters, randomly generated or not, etc), and any burst-related or cryptocurrency software you've recently started using, and whether you're using precompiled binarys or compiled them yourself? It would help see if there's a common link in this(ex particular program)

password was = applepie123 - no new software or any thing new , download the wallet direct from the here . could it be a software that was install on my PC or key stroke ... the hacker account is worth less then 0.5BTC so yea i dont really care about the value , but atleast we have all learnt
hero member
Activity: 599
Merit: 500
how do you make it with ur own password , and not the one they give you ?

There's a link at the bottom of page, or simply specify that you're returning user and enter another passphrase.
Do not use these pre-generated words.


suck it has to be 35 long
sr. member
Activity: 280
Merit: 250
i think there is a hacker that is stealing ppl burst coin

BURST-FRNC-8G44-FNQP-AEQFS

not my wallet but now my account is empty

Full Hash:   a3ef1a22011c2f4c4dec7422d84c3cb6a73c03f991642c49c0aac159ac0e8711
Confirmations:   734
Signature Hash:   db82653bca0f90868b8e8e277c82f98c68e1c46a2590a854001e2667048627e4
Amount NQT:   15'075 BURST
ec_block_height:   30549
Block:   1723633751819466101
Recipient RS:   BURST-FRNC-8G44-FNQP-AEQFS
Type:   0
Fee NQT:   1 BURST
Recipient:   10103487335684824714
Version:   1
Sender:   You
Timestamp:   7419262
ec_block_id:   13420289258326036281
Height:   30562
Subtype:   0
Sender Public Key:   e53096f42bedc9434fa311fec0f008e4a749a79fa7a53c149f1f6f14f426174e
Deadline:   1440
Block Timestamp:   7419271
Sender RS:   You
signature:   5c783709d6d12bbb8689051d62e56a5cb08814f0db1b26847b22b04ffbe9de00ee3a2379d2a00d0 f87bdfe70ebd4273b91b398e5a5316b0446586f04782306b1
This same address was posted a few pages back by 2 other people who lost burst to it, but a link between them them has not yet been found. Can you post how secure your password was(number of characters, randomly generated or not, etc), and any burst-related or cryptocurrency software you've recently started using, and whether you're using precompiled binarys or compiled them yourself? It would help see if there's a common link in this(ex particular program)
newbie
Activity: 44
Merit: 0
how do you make it with ur own password , and not the one they give you ?

There's a link at the bottom of page, or simply specify that you're returning user and enter another passphrase.
Do not use these pre-generated words.
newbie
Activity: 44
Merit: 0
i think there is a hacker that is stealing ppl burst coin

BURST-FRNC-8G44-FNQP-AEQFS

not my wallet but now my account is empty


can you change ur wallet password or not

Googled it up and this account was already active on Aug 26. Could be a trojan in one of the first third-party binaries. Sad
Which software were you using?

No, password cannot be changed. You'll have to create a new wallet and replot.
hero member
Activity: 599
Merit: 500
i think there is a hacker that is stealing ppl burst coin

BURST-FRNC-8G44-FNQP-AEQFS

not my wallet but now my account is empty


can you change ur wallet password or not

No, your password is your private key connected to your specific account.

You can of course make a new account with a stronger password tho.

how do you make it with ur own password , and not the one they give you ?
hero member
Activity: 599
Merit: 500
BURST-68JV-2EAW-WDRB-FKZ4Y
 is the new hacker adress hast a few burst in there now
sr. member
Activity: 462
Merit: 250
i think there is a hacker that is stealing ppl burst coin

BURST-FRNC-8G44-FNQP-AEQFS

not my wallet but now my account is empty


can you change ur wallet password or not

No, your password is your private key connected to your specific account.

You can of course make a new account with a stronger password tho.
hero member
Activity: 599
Merit: 500
i think there is a hacker that is stealing ppl burst coin

BURST-FRNC-8G44-FNQP-AEQFS

not my wallet but now my account is empty


can you change ur wallet password or not
hero member
Activity: 599
Merit: 500
i think there is a hacker that is stealing ppl burst coin

BURST-FRNC-8G44-FNQP-AEQFS

not my wallet but now my account is empty

Full Hash:   a3ef1a22011c2f4c4dec7422d84c3cb6a73c03f991642c49c0aac159ac0e8711
Confirmations:   734
Signature Hash:   db82653bca0f90868b8e8e277c82f98c68e1c46a2590a854001e2667048627e4
Amount NQT:   15'075 BURST
ec_block_height:   30549
Block:   1723633751819466101
Recipient RS:   BURST-FRNC-8G44-FNQP-AEQFS
Type:   0
Fee NQT:   1 BURST
Recipient:   10103487335684824714
Version:   1
Sender:   You
Timestamp:   7419262
ec_block_id:   13420289258326036281
Height:   30562
Subtype:   0
Sender Public Key:   e53096f42bedc9434fa311fec0f008e4a749a79fa7a53c149f1f6f14f426174e
Deadline:   1440
Block Timestamp:   7419271
Sender RS:   You
signature:   5c783709d6d12bbb8689051d62e56a5cb08814f0db1b26847b22b04ffbe9de00ee3a2379d2a00d0 f87bdfe70ebd4273b91b398e5a5316b0446586f04782306b1
hero member
Activity: 1400
Merit: 505
http://pool3.burstcoin.io down? at least it's not responding :/

looking good here, which one is not responding, ur miner or pool website?

i think i see something weird going on here on the blockchain
member
Activity: 105
Merit: 10
My password is a random string of numbers and letters, caps and no caps, 30 symbols long. So weak password is not an issue.

By random, do you mean randomly machine generated, or chosen manually by you?

OS is Windows 8.1, so it stores the password in an unencrypted text file :/

https://www.virustotal.com/en/file/d3992c3d8be28d99b4f58b17a1d7eccbb04ba18e6471bcc3321a82b8011e0475/analysis/1413153796/

Either a false positive or  a very obscure trojan. After initial scam, this is hard to swallow and keep faith. Any insight into why this has shown up Dev?

no threat found on my end. false positive, its common with windows-qt and that particular antivirus


its scanned with 53 virus protectors and only 1/53 come up with a false positive
Alright, just thought I would check, have recently had some malware problems on the machine that hosts my wallets.

It looks like you have recently had security issues.  What steps have you taken to mitigate them?

I've been working hand in hand with a few experts over at Malwarebytes to clean my machine out, which ended in a clean reinstall because I didn't trust a "dirty" machine. So no previous malware should be infecting my machine anymore.
hero member
Activity: 1400
Merit: 505
http://pool3.burstcoin.io down? at least it's not responding :/

looking good here, which one is not responding, ur miner or pool website?
hero member
Activity: 560
Merit: 500
thx for help

you can only limit by the timestamp which expresses seconds passed since the genesis block.
if you use a timestamp around 3600000 the last entries in the list should be around the Sept 23.
to get it more precisely you have to find out the exact date of the genesis block and then convert the days which have passed since then into seconds.
i have'nt worked on my mysql based blockchain copy for a while now. if i would have it ready i could simply look it up  Roll Eyes

thx!
any way to filter? or just see payments sent for Sept 23?
(my poloniex is locked, I need TXid to unlock)


any idea how to search a transaction from 6 weeks ago? The current wallet doesn't seem to go back that far. Block explorer also, not that far back.

you can use the account api function.
replace 127.0.0.1 with your walltet ip if it differs and enter your account (BURST-XXX.... or numeric) in the "getAccountTransactions" section.
http://127.0.0.1:8125/test?requestTag=ACCOUNTS

this should return all transactions as json into the output area.
to retrieve it directly as json you can use this as url (replace XXX with your account): http://127.0.0.1:8125/burst?requestType=getAccountTransactions&account=XXX

this is a json response and therefore not readable like the transaction list in the wallet ui but it contains all data the wallets blockchain supplies.

Jump to: