Pages:
Author

Topic: 🔥🔥🔥 [ANN][ICO] BITFENCE - REMOVE HACKERS FROM YOUR NETWORK - page 19. (Read 30049 times)

full member
Activity: 546
Merit: 106
Bountyhive.io
Bitfence has updated on twitter about their device. Bitfence introduces "proof-of-threat" mining. Electricity costs to run for a whole year is $14.

https://twitter.com/BitFence_/status/1008931766340644864?s=19

Thats the amazing thing about being able to run it from a beagle board or Raspberry Pi, it's such a low power draw that it's barely going to be noticable (I bet you'll make more than $10 a month from it mining)
This is a really nice. 14$ cost for whole year is almost nothing. @Darkoth89 if you are expecting more than 10$ in a month, then just think that in a month or 2 month you will recover your electricity coats. Cheesy

That is a great shout - the profits are pretty much guaranteed as long as Bitfence doesn't crash and become non-existent especially with the plans and roadmap.

Not long till stingminer release

The SBC style devices have such a negligible power usage that basically their too for any project is almost instant and definitly within a few months I’d imagine well in profit from whatever kind of project like the stingminer is operating on it
jr. member
Activity: 224
Merit: 5
I’m hoping thebsting miner release will be able to spark the platform interest once initial reviews and impressions come in from people we should see I think a decent bit of positive response

A positive response from the sting miner will boost the community and also the token sale. Everything has been quiet lately i just hope they are giving their all behind the scenes.
I am sure they are working really hard and maybe that is why they don't have much time to let us know what they are working at. We just have to be patient i guess.

Oh this sacred moment when you don't see any news from something you are interested in and think that nothing is being done but then... Hey! News, people talkings, discussions, something really big. I feel this is just this moment now.
newbie
Activity: 31
Merit: 0
Good day, all!
Looks very nice.
Vigilant vision, very nice results!
member
Activity: 350
Merit: 16
Bitfence has updated on twitter about their device. Bitfence introduces "proof-of-threat" mining. Electricity costs to run for a whole year is $14.

https://twitter.com/BitFence_/status/1008931766340644864?s=19

Thats the amazing thing about being able to run it from a beagle board or Raspberry Pi, it's such a low power draw that it's barely going to be noticable (I bet you'll make more than $10 a month from it mining)
This is a really nice. 14$ cost for whole year is almost nothing. @Darkoth89 if you are expecting more than 10$ in a month, then just think that in a month or 2 month you will recover your electricity coats. Cheesy

That is a great shout - the profits are pretty much guaranteed as long as Bitfence doesn't crash and become non-existent especially with the plans and roadmap.

Not long till stingminer release
copper member
Activity: 658
Merit: 0
Empowering crypto w/ sustainable energy
Bitfence has updated on twitter about their device. Bitfence introduces "proof-of-threat" mining. Electricity costs to run for a whole year is $14.

https://twitter.com/BitFence_/status/1008931766340644864?s=19

Thats the amazing thing about being able to run it from a beagle board or Raspberry Pi, it's such a low power draw that it's barely going to be noticable (I bet you'll make more than $10 a month from it mining)
This is a really nice. 14$ cost for whole year is almost nothing. @Darkoth89 if you are expecting more than 10$ in a month, then just think that in a month or 2 month you will recover your electricity coats. Cheesy
member
Activity: 490
Merit: 10

I always read that Bitfence will block the IP address of identified hackers (this lock will be sent to the entire Bitfence network within seconds)
But how do they proceed if the hacker gets another IP?

Nice question, hackers are known to spoof ips For all we know one hacker can try as many as 20 ips  and hacking is a real time process I don't know how bitfence is gonna handle  multiple hacking scenario.

I am here wondering how they  will get the exact ip address of a hacker who uses tor network for anonymity and also has 2 to 3 infrastructure from which he can penetrate and hack from. Hacker's are not that dull. Bitfence might end up blocking the wrong person.

with the way i have come to understand the Bitfence machinery and how they intend to work using the Honey pot approach then i think having hackers change their IP from time to time ain't big deal as they keep getting tracked and tagged, i understand the point where most of y'all are driving at in terms of how effective it may be but we could say one day at a time

Agreed the ip should not have any impact it is a normal or a given that IP are no longer the best defense mechanism as you can easily manipulate source be it a VPN or even TOR so there has to be other means.
member
Activity: 728
Merit: 11
DocTailor IEO on Zloadr

I always read that Bitfence will block the IP address of identified hackers (this lock will be sent to the entire Bitfence network within seconds)
But how do they proceed if the hacker gets another IP?

Nice question, hackers are known to spoof ips For all we know one hacker can try as many as 20 ips  and hacking is a real time process I don't know how bitfence is gonna handle  multiple hacking scenario.

I am here wondering how they  will get the exact ip address of a hacker who uses tor network for anonymity and also has 2 to 3 infrastructure from which he can penetrate and hack from. Hacker's are not that dull. Bitfence might end up blocking the wrong person.

with the way i have come to understand the Bitfence machinery and how they intend to work using the Honey pot approach then i think having hackers change their IP from time to time ain't big deal as they keep getting tracked and tagged, i understand the point where most of y'all are driving at in terms of how effective it may be but we could say one day at a time
hero member
Activity: 1274
Merit: 646
Bitfence has updated on twitter about their device. Bitfence introduces "proof-of-threat" mining. Electricity costs to run for a whole year is $14.

https://twitter.com/BitFence_/status/1008931766340644864?s=19

Thats the amazing thing about being able to run it from a beagle board or Raspberry Pi, it's such a low power draw that it's barely going to be noticable (I bet you'll make more than $10 a month from it mining)
member
Activity: 420
Merit: 11
I’m hoping thebsting miner release will be able to spark the platform interest once initial reviews and impressions come in from people we should see I think a decent bit of positive response

A positive response from the sting miner will boost the community and also the token sale. Everything has been quiet lately i just hope they are giving their all behind the scenes.
I am sure they are working really hard and maybe that is why they don't have much time to let us know what they are working at. We just have to be patient i guess.

i asked for an update in the telegram channel this morning, the team are still working on alot of stuff in the background from the conference they went to, so Im sure we'll be seeing some awesome news soon. Smiley

I hope that you are right with the awesome news. I honestly understand that such a big event like a conference, bring a lot of work, but for the project it is a good opportunity. I think we need some patience.
newbie
Activity: 392
Merit: 0
Bitfence has updated on twitter about their device. Bitfence introduces "proof-of-threat" mining. Electricity costs to run for a whole year is $14.

https://twitter.com/BitFence_/status/1008931766340644864?s=19
newbie
Activity: 25
Merit: 0
Greetings team!
It's really good business. Plausible design, a rather interesting idea!
hero member
Activity: 1274
Merit: 646
I’m hoping thebsting miner release will be able to spark the platform interest once initial reviews and impressions come in from people we should see I think a decent bit of positive response

A positive response from the sting miner will boost the community and also the token sale. Everything has been quiet lately i just hope they are giving their all behind the scenes.
I am sure they are working really hard and maybe that is why they don't have much time to let us know what they are working at. We just have to be patient i guess.

i asked for an update in the telegram channel this morning, the team are still working on alot of stuff in the background from the conference they went to, so Im sure we'll be seeing some awesome news soon. Smiley
full member
Activity: 266
Merit: 107
I’m hoping thebsting miner release will be able to spark the platform interest once initial reviews and impressions come in from people we should see I think a decent bit of positive response

A positive response from the sting miner will boost the community and also the token sale. Everything has been quiet lately i just hope they are giving their all behind the scenes.
I am sure they are working really hard and maybe that is why they don't have much time to let us know what they are working at. We just have to be patient i guess.
member
Activity: 350
Merit: 16

I always read that Bitfence will block the IP address of identified hackers (this lock will be sent to the entire Bitfence network within seconds)
But how do they proceed if the hacker gets another IP?

Nice question, hackers are known to spoof ips For all we know one hacker can try as many as 20 ips  and hacking is a real time process I don't know how bitfence is gonna handle  multiple hacking scenario.

I am here wondering how they  will get the exact ip address of a hacker who uses tor network for anonymity and also has 2 to 3 infrastructure from which he can penetrate and hack from. Hacker's are not that dull. Bitfence might end up blocking the wrong person.

I think it would mostly evolve around pattern detection. In many cases there are patterns for hackers or let us say ports and specific files targeted that will allow panetration; I think the focus would be on those; IPs of hackers are constantly changing to have a white/black list is a legacy approach.

They've already covered this. it blocks by a fingerprint and not just the IP address.  because it's so easy to spoof IP's and mac addresses etc, they'll be using a combination of things that together identify that hacker. Id suggest reading up on the stingminer and how it works.

Well noted, this is what will prevent the same attack occuring even if its from different parts of the world, due to the nature of the attack - it will be finger printed to save the same type of attack occuring
full member
Activity: 994
Merit: 140

I always read that Bitfence will block the IP address of identified hackers (this lock will be sent to the entire Bitfence network within seconds)
But how do they proceed if the hacker gets another IP?

Nice question, hackers are known to spoof ips For all we know one hacker can try as many as 20 ips  and hacking is a real time process I don't know how bitfence is gonna handle  multiple hacking scenario.

I am here wondering how they  will get the exact ip address of a hacker who uses tor network for anonymity and also has 2 to 3 infrastructure from which he can penetrate and hack from. Hacker's are not that dull. Bitfence might end up blocking the wrong person.

I think it would mostly evolve around pattern detection. In many cases there are patterns for hackers or let us say ports and specific files targeted that will allow panetration; I think the focus would be on those; IPs of hackers are constantly changing to have a white/black list is a legacy approach.

They've already covered this. it blocks by a fingerprint and not just the IP address.  because it's so easy to spoof IP's and mac addresses etc, they'll be using a combination of things that together identify that hacker. Id suggest reading up on the stingminer and how it works.

Thanks for the explanation. I have to say honestly, I have read the whitepaper, but have not understood that correctly. But now I see that more clearly
hero member
Activity: 1274
Merit: 646

I always read that Bitfence will block the IP address of identified hackers (this lock will be sent to the entire Bitfence network within seconds)
But how do they proceed if the hacker gets another IP?

Nice question, hackers are known to spoof ips For all we know one hacker can try as many as 20 ips  and hacking is a real time process I don't know how bitfence is gonna handle  multiple hacking scenario.

I am here wondering how they  will get the exact ip address of a hacker who uses tor network for anonymity and also has 2 to 3 infrastructure from which he can penetrate and hack from. Hacker's are not that dull. Bitfence might end up blocking the wrong person.

I think it would mostly evolve around pattern detection. In many cases there are patterns for hackers or let us say ports and specific files targeted that will allow panetration; I think the focus would be on those; IPs of hackers are constantly changing to have a white/black list is a legacy approach.

They've already covered this. it blocks by a fingerprint and not just the IP address.  because it's so easy to spoof IP's and mac addresses etc, they'll be using a combination of things that together identify that hacker. Id suggest reading up on the stingminer and how it works.
member
Activity: 490
Merit: 10

I always read that Bitfence will block the IP address of identified hackers (this lock will be sent to the entire Bitfence network within seconds)
But how do they proceed if the hacker gets another IP?

Nice question, hackers are known to spoof ips For all we know one hacker can try as many as 20 ips  and hacking is a real time process I don't know how bitfence is gonna handle  multiple hacking scenario.

I am here wondering how they  will get the exact ip address of a hacker who uses tor network for anonymity and also has 2 to 3 infrastructure from which he can penetrate and hack from. Hacker's are not that dull. Bitfence might end up blocking the wrong person.

I think it would mostly evolve around pattern detection. In many cases there are patterns for hackers or let us say ports and specific files targeted that will allow panetration; I think the focus would be on those; IPs of hackers are constantly changing to have a white/black list is a legacy approach.
member
Activity: 728
Merit: 10

I always read that Bitfence will block the IP address of identified hackers (this lock will be sent to the entire Bitfence network within seconds)
But how do they proceed if the hacker gets another IP?

Nice question, hackers are known to spoof ips For all we know one hacker can try as many as 20 ips  and hacking is a real time process I don't know how bitfence is gonna handle  multiple hacking scenario.

I am here wondering how they  will get the exact ip address of a hacker who uses tor network for anonymity and also has 2 to 3 infrastructure from which he can penetrate and hack from. Hacker's are not that dull. Bitfence might end up blocking the wrong person.
jr. member
Activity: 574
Merit: 1
when you are fed up transfer your crypto to me
I’m hoping thebsting miner release will be able to spark the platform interest once initial reviews and impressions come in from people we should see I think a decent bit of positive response

A positive response from the sting miner will boost the community and also the token sale. Everything has been quiet lately i just hope they are giving their all behind the scenes.

I don't think there's going to be any issues with it, it's been in their private testnet for ages, and they even took it to the blockchain conference for their display booth to show people how it was working.

They wouldn't have taken it to the public if they were not sure of its absolute perfection. Even if it was 80% perfection, it would still have been a risky step to take.

When you say absolute perfection you sound like they have a technology for stopping hacker well I don't think so I believe they have a great tech but the effectiveness of their platform I believe will grow with time but nonetheless they are really confident about their tech.
member
Activity: 532
Merit: 10
I’m hoping thebsting miner release will be able to spark the platform interest once initial reviews and impressions come in from people we should see I think a decent bit of positive response

A positive response from the sting miner will boost the community and also the token sale. Everything has been quiet lately i just hope they are giving their all behind the scenes.

I don't think there's going to be any issues with it, it's been in their private testnet for ages, and they even took it to the blockchain conference for their display booth to show people how it was working.

They wouldn't have taken it to the public if they were not sure of its absolute perfection. Even if it was 80% perfection, it would still have been a risky step to take.
Pages:
Jump to: