Pages:
Author

Topic: 🔥🔥🔥 [ANN][ICO] BITFENCE - REMOVE HACKERS FROM YOUR NETWORK - page 77. (Read 30058 times)

full member
Activity: 448
Merit: 110
I read on the Bitfence site that you can pay with ETH, BTC, LTC, DASH in order to get coins, but if you pay with LTC will you get the coins also immediately or is that only if you pay with ETH ?

Good question I don’t see why it would be different between the various coins I’d imagine they would just rely on transaction confirmations before issuing the new tokens

I think since Bitfence is using the ethereum network then it's only normal to get a faster confirmation and Token issuing since it's still within same infrastructure, however I can't really establish the condition for ltc

I know some other projects that also pay nearly instantly when you pay with ETH, and they also use Ethereum network. It would be awesome if it also worked with the other payment coins.

I am also not sure but I have seen few projects delaying tokens distribution if payment is done using fiat currency. But we should ask this question in telegram channel to get confirmation.
It does not matter if some of us receive them a little bit later because at the end you will receive your Tokens anyway so just have patience.
jr. member
Activity: 406
Merit: 2
I read on the Bitfence site that you can pay with ETH, BTC, LTC, DASH in order to get coins, but if you pay with LTC will you get the coins also immediately or is that only if you pay with ETH ?

Good question I don’t see why it would be different between the various coins I’d imagine they would just rely on transaction confirmations before issuing the new tokens

I think since Bitfence is using the ethereum network then it's only normal to get a faster confirmation and Token issuing since it's still within same infrastructure, however I can't really establish the condition for ltc

I know some other projects that also pay nearly instantly when you pay with ETH, and they also use Ethereum network. It would be awesome if it also worked with the other payment coins.

I am also not sure but I have seen few projects delaying tokens distribution if payment is done using fiat currency. But we should ask this question in telegram channel to get confirmation.
member
Activity: 672
Merit: 11

What is it like when a hacker realizes that he is attacking a Bitfence honey pot and somehow bypasses it? Can he then move freely in the Bitfence network?
I do not think it works like that he is not in the Bitfence network he is only in the honeypot and trying to hack that.

True, i once read Bitfence will allow hackers attack the honey pot which is totally separate from Bitfence network. With what the team intends to develop i highly doubt hackers stand a chance in bypassing Bitfence network.

Lets not underestimate the tricks of hackers, yea BITFENCE got some impressive concepts and i seriously do want to see them take on this challenge head on, as it has bring woos to countless individuals, a constant trail and monitoring of their network should be done because as a new project, hackers will be hell bent on bypassing their defenses, statistical analysis should be maintained by the team as proof that they have never been breached, investors will love to see such report and attest to the fact that the project is indeed sustainable
member
Activity: 490
Merit: 10
Great project with solid team background composition. Hoping for your miner in desktop is friendly to both x32 bit and X64 bit system. So excited to try this. Goodluck team.! to the moon!

It should be very friendly to at least the 32bit OS version if not all. Since, the 64bit can efficiently run the 32bit apps. Also I think there are more of windows users than Mac OS users thus they just have to make sure the guys their best on windows.

I am not sure what programming language they have used or are using in the system but I am guessing it is a cross platform one something like python or java. I've seen their twitter post of the hardware device they are working but am still waiting for news on the software and where it is at.
member
Activity: 728
Merit: 10

What is it like when a hacker realizes that he is attacking a Bitfence honey pot and somehow bypasses it? Can he then move freely in the Bitfence network?
I do not think it works like that he is not in the Bitfence network he is only in the honeypot and trying to hack that.

True, i once read Bitfence will allow hackers attack the honey pot which is totally separate from Bitfence network. With what the team intends to develop i highly doubt hackers stand a chance in bypassing Bitfence network.

Just look if you were to hack an Anti-virus on a client machine, you then don't have access to the entire network.  All the honeypot is doing is sending back a signature of the hacker it's not going to have a SSH or RDP tunnel to the network lol.

Thank you all for the explanations. I am a noob in internet security and do not know very well :-)
That's why I like bitfence, they help me to secure my network as easily as possible

Don't worry once bitfence becomes fully functional and the sting miners have be given to users to use as the honeypot, you will see how the honeypot works and you will really enjoy working with it.
newbie
Activity: 392
Merit: 0
Yesterday evening when I visited website I found 597+ ETH raised yet. What I seen today, 615+ ETH raised yet Shocked. I am sure they will achieve their MAIN SALE also in minimum time.

That's nice, seems like eyes are on this project and the fact is, why won't they?, the project is a massive win and has a lot of benefits attached to it, which is helpful to every individual, no matter your portfolio, is a highly sort after project

Yes it's great to see individuals like yourself are keeping an eye on Bitfence closely this shows they are a popular project and have a lot of interest from their supporters. The reaction to the pre-sale has been awesome I'm looking forward to seeing the final total for the main sale, I'm certain it's going to be a very large figure.

For sure. I hope it is a large figure also, the main sale is pretty going well and the project has gotten to attract a lot of potential investors so i don't think anything will go wrong as the sale proceeds.

May I know softcap level for this main token sale? And hardcap level as well? Also can you tell me if Token price is fixed in USD of ETH ?

from the bitfence-homepage:

Soft Cap $1,000,000
Maximum Hard: $50,000,000
Base HNY Price: 1 ETH = 6000 HNY
Max Hard Cap is a stretch goal with staged goals of 5, 10, 20 and 35 million

and there is a bonus if you invest more than 10ETH: 10ETH = 10%, 20 ETH = 20%-  and so on

ICO ends on 1.7.2018


Softcap is just one million USD? BitFence is good project and I think they will get approx 20 million USD or more also.

I actually prefer it when there is a smaller softcap, you know the project will go ahead once it hits the softcap regardless so any investments you made will go ahead and hopefully prove to be a success Smiley

Thanks for the information friends. I also prefer smaller softcap. Softcap reached means project work can start. But I would like to see BitFence receiving as much fund as possible so that marketing and product development can go with full swing
I found they raised 716+ ETH yet. Their target is 2000 ETH. Seems to be great move yet. But what will be next steps if they not reach their expected target? If they will not sold tokens which is generated for sale? Anyone have information about this?
copper member
Activity: 658
Merit: 0
Empowering crypto w/ sustainable energy
I read on the Bitfence site that you can pay with ETH, BTC, LTC, DASH in order to get coins, but if you pay with LTC will you get the coins also immediately or is that only if you pay with ETH ?

Good question I don’t see why it would be different between the various coins I’d imagine they would just rely on transaction confirmations before issuing the new tokens

I think since Bitfence is using the ethereum network then it's only normal to get a faster confirmation and Token issuing since it's still within same infrastructure, however I can't really establish the condition for ltc

I know some other projects that also pay nearly instantly when you pay with ETH, and they also use Ethereum network. It would be awesome if it also worked with the other payment coins.

If you pay with ETH, the Token can besend instantly, because it is the same address for the ERC20 Token. It is more difficult with other currencies, they need to verify the payment first, before you receive the Token on your ETH wallet.

That is a good explanation ! I always pay with ETH just because of this. Also other coins sometimes will take even longer to send a transaction and verify it.
That's correct and thanks Zombie259 to explained here. If you are paying for erc20 tokens by using other currencies, that will take time for verification confirmation. Better way always use ETH to pay in ICO as Zombie259 said.
full member
Activity: 616
Merit: 108
io.ezystayz.com
I read on the Bitfence site that you can pay with ETH, BTC, LTC, DASH in order to get coins, but if you pay with LTC will you get the coins also immediately or is that only if you pay with ETH ?

Good question I don’t see why it would be different between the various coins I’d imagine they would just rely on transaction confirmations before issuing the new tokens

I think since Bitfence is using the ethereum network then it's only normal to get a faster confirmation and Token issuing since it's still within same infrastructure, however I can't really establish the condition for ltc

I know some other projects that also pay nearly instantly when you pay with ETH, and they also use Ethereum network. It would be awesome if it also worked with the other payment coins.

If you pay with ETH, the Token can besend instantly, because it is the same address for the ERC20 Token. It is more difficult with other currencies, they need to verify the payment first, before you receive the Token on your ETH wallet.

That is a good explanation ! I always pay with ETH just because of this. Also other coins sometimes will take even longer to send a transaction and verify it.
full member
Activity: 994
Merit: 140

What is it like when a hacker realizes that he is attacking a Bitfence honey pot and somehow bypasses it? Can he then move freely in the Bitfence network?
I do not think it works like that he is not in the Bitfence network he is only in the honeypot and trying to hack that.

True, i once read Bitfence will allow hackers attack the honey pot which is totally separate from Bitfence network. With what the team intends to develop i highly doubt hackers stand a chance in bypassing Bitfence network.

Just look if you were to hack an Anti-virus on a client machine, you then don't have access to the entire network.  All the honeypot is doing is sending back a signature of the hacker it's not going to have a SSH or RDP tunnel to the network lol.

Thank you all for the explanations. I am a noob in internet security and do not know very well :-)
That's why I like bitfence, they help me to secure my network as easily as possible
hero member
Activity: 1274
Merit: 646

What is it like when a hacker realizes that he is attacking a Bitfence honey pot and somehow bypasses it? Can he then move freely in the Bitfence network?
I do not think it works like that he is not in the Bitfence network he is only in the honeypot and trying to hack that.

True, i once read Bitfence will allow hackers attack the honey pot which is totally separate from Bitfence network. With what the team intends to develop i highly doubt hackers stand a chance in bypassing Bitfence network.

Just look if you were to hack an Anti-virus on a client machine, you then don't have access to the entire network.  All the honeypot is doing is sending back a signature of the hacker it's not going to have a SSH or RDP tunnel to the network lol.
member
Activity: 728
Merit: 11
DocTailor IEO on Zloadr
I have checked the Bitfence Twitter and found a post and a picture of a sting miner. It looks very small and will protect you from hackers while earning crypto. I want this tiny sting miner now.
https://twitter.com/BitFence_/status/994395208967249920

This is awesome to see, I'm glad the team have published and given us a insight as to what this miner actually looks like. I can't wait for the release, I myself; will most definitely be getting one.
I'm in love with this Stingminer. I like the fact it's small and not a huge bulky miner. Slick design and easy to mount or place anywhere in the house.

That was something which attracted me, the size of it is fantastic. Similar to a Raspberry Pi; easily can disclose it in a hidden location. Also the fact you can still mine on it from such a small system and generate some tokens is fantastic. Great workj

I do agree with you on that, having something tangible do something as magnificent as that can be eye catching and that's the focus of the new coming technological age, no one wants to implement or use something bulky, no matter how great the product is, if is bulky, the sales will be low compared to a product with a small size, i'm glad the product development team of BITFENCE kept that in mind during development

it's because it's not an actual miner, like an ASIC.  From my understanding you are not confirming transactions on the blockchain, you 'mine' a reward everytime it reports a 'hackers' activity to the main network.

Let me get this straight and i'm sure some people in the community will like to get clarification on that, so what this means is, if a network was attacked by a hacker, is it BITFENCE that will automatically flag the hacker's IP as bad or will the report be done by the individual and secondly, will the sting miner do the mining automatically or does it need to be authenticated first by BITFENCE before the mining can be done?

I had similar questions I’ve flipped through the whitepaper but it’s quite a complex project so I think more videos and documentation simplifying and explaining how things like this will work could go quite far with assuring peole

Yea, i think a detailed response to this will go a long way but from my view if such report is to be done by the community, it should first be authenticated by the BITFENCE team before commencing the necessary steps, such process will ensure credibility to the network and stop the process of false reports, even though the project is a decentralized one, is best to also keep the community in check too

Wow that sting miner device looks very small. Is this for home office or can used for big offices as well. And this device will catch hackers?

I think you can use sting miners everywhere, but for big companies you will need more to secure the network. I like the idea to go in public networks like an airport or railway station and mine a lot of hackers.

Its really good idea. There are lot of hackers attacking airports and train station. It will be good demo also, if this device managed to catch good amount of hackers then people will jump to buy this one.
Finally a picture of the sting miners, is a little bit smaller than what I was expecting though, I think a demonstration and video will guide us on how this device works will be helpful. Just my input!!

There is a gif in the telegram group that demonstrates how the sting Miner works, the admin uses them from time to time

Group link @bitfence
newbie
Activity: 182
Merit: 0

What is it like when a hacker realizes that he is attacking a Bitfence honey pot and somehow bypasses it? Can he then move freely in the Bitfence network?
I do not think it works like that he is not in the Bitfence network he is only in the honeypot and trying to hack that.

True, i once read Bitfence will allow hackers attack the honey pot which is totally separate from Bitfence network. With what the team intends to develop i highly doubt hackers stand a chance in bypassing Bitfence network.
member
Activity: 532
Merit: 10
Great project with solid team background composition. Hoping for your miner in desktop is friendly to both x32 bit and X64 bit system. So excited to try this. Goodluck team.! to the moon!

It should be very friendly to at least the 32bit OS version if not all. Since, the 64bit can efficiently run the 32bit apps. Also I think there are more of windows users than Mac OS users thus they just have to make sure the guys their best on windows.
member
Activity: 420
Merit: 11
I read on the Bitfence site that you can pay with ETH, BTC, LTC, DASH in order to get coins, but if you pay with LTC will you get the coins also immediately or is that only if you pay with ETH ?

Good question I don’t see why it would be different between the various coins I’d imagine they would just rely on transaction confirmations before issuing the new tokens

I think since Bitfence is using the ethereum network then it's only normal to get a faster confirmation and Token issuing since it's still within same infrastructure, however I can't really establish the condition for ltc

I know some other projects that also pay nearly instantly when you pay with ETH, and they also use Ethereum network. It would be awesome if it also worked with the other payment coins.

If you pay with ETH, the Token can besend instantly, because it is the same address for the ERC20 Token. It is more difficult with other currencies, they need to verify the payment first, before you receive the Token on your ETH wallet.
newbie
Activity: 112
Merit: 0
BitFence is creating hacker-proof solution for businesses and end-users with blockchain, The project is promising, the team is experienced.
full member
Activity: 616
Merit: 108
io.ezystayz.com
I read on the Bitfence site that you can pay with ETH, BTC, LTC, DASH in order to get coins, but if you pay with LTC will you get the coins also immediately or is that only if you pay with ETH ?

Good question I don’t see why it would be different between the various coins I’d imagine they would just rely on transaction confirmations before issuing the new tokens

I think since Bitfence is using the ethereum network then it's only normal to get a faster confirmation and Token issuing since it's still within same infrastructure, however I can't really establish the condition for ltc

I know some other projects that also pay nearly instantly when you pay with ETH, and they also use Ethereum network. It would be awesome if it also worked with the other payment coins.
full member
Activity: 448
Merit: 110

What is it like when a hacker realizes that he is attacking a Bitfence honey pot and somehow bypasses it? Can he then move freely in the Bitfence network?
I do not think it works like that he is not in the Bitfence network he is only in the honeypot and trying to hack that.
member
Activity: 672
Merit: 11
Yes, i believe that every investors, whether big or small will be given the product according to their preferences, when it comes to them been implemented by a public system, that must be when they must have gotten a lot of positive reviews that will attract big companies and even government parastatals, i really hope to see them achieve that level

Im pretty sure the device they pictured is a mockup, for them to test the software on, remember every company has different requirements, some may require multi-port devices etc, so i'd imagine the team would have a plan to test and then develop larger boxes, in the end they just have to get it working on ARM (raspberry pi) and then they can port that work over to other ARM boards.

You're right, that was why i talked about preferences on the part of users, is a sure thing that specificity will come in due time, that is the major reason why the initial launch should be a winner, as such scenario in this project triggers the impact that will beckon on investors, industries want this, governmental organizations will be willing to even fund such to their spec, BITFENCE just need to give them the reason why they should, is a good project
member
Activity: 350
Merit: 16
I have checked the Bitfence Twitter and found a post and a picture of a sting miner. It looks very small and will protect you from hackers while earning crypto. I want this tiny sting miner now.
https://twitter.com/BitFence_/status/994395208967249920

This is awesome to see, I'm glad the team have published and given us a insight as to what this miner actually looks like. I can't wait for the release, I myself; will most definitely be getting one.
I'm in love with this Stingminer. I like the fact it's small and not a huge bulky miner. Slick design and easy to mount or place anywhere in the house.

That was something which attracted me, the size of it is fantastic. Similar to a Raspberry Pi; easily can disclose it in a hidden location. Also the fact you can still mine on it from such a small system and generate some tokens is fantastic. Great workj

I do agree with you on that, having something tangible do something as magnificent as that can be eye catching and that's the focus of the new coming technological age, no one wants to implement or use something bulky, no matter how great the product is, if is bulky, the sales will be low compared to a product with a small size, i'm glad the product development team of BITFENCE kept that in mind during development

it's because it's not an actual miner, like an ASIC.  From my understanding you are not confirming transactions on the blockchain, you 'mine' a reward everytime it reports a 'hackers' activity to the main network.

Let me get this straight and i'm sure some people in the community will like to get clarification on that, so what this means is, if a network was attacked by a hacker, is it BITFENCE that will automatically flag the hacker's IP as bad or will the report be done by the individual and secondly, will the sting miner do the mining automatically or does it need to be authenticated first by BITFENCE before the mining can be done?

I had similar questions I’ve flipped through the whitepaper but it’s quite a complex project so I think more videos and documentation simplifying and explaining how things like this will work could go quite far with assuring peole

Yea, i think a detailed response to this will go a long way but from my view if such report is to be done by the community, it should first be authenticated by the BITFENCE team before commencing the necessary steps, such process will ensure credibility to the network and stop the process of false reports, even though the project is a decentralized one, is best to also keep the community in check too

Wow that sting miner device looks very small. Is this for home office or can used for big offices as well. And this device will catch hackers?

I think you can use sting miners everywhere, but for big companies you will need more to secure the network. I like the idea to go in public networks like an airport or railway station and mine a lot of hackers.

So this device need to connected before firewall or after firewall device? Will it be able to pass the huge amount of internet data through it ?

It's not a web gateway, so isn't designed to be inline.  It essentially sits inside your network and will detect any malicious activity. 

Exactly, almost like a proxy setup, wont require pass through of traffic and hence the "honeypot" will basically host a vulnerable target which collects vital information
hero member
Activity: 1274
Merit: 646
I have checked the Bitfence Twitter and found a post and a picture of a sting miner. It looks very small and will protect you from hackers while earning crypto. I want this tiny sting miner now.
https://twitter.com/BitFence_/status/994395208967249920

This is awesome to see, I'm glad the team have published and given us a insight as to what this miner actually looks like. I can't wait for the release, I myself; will most definitely be getting one.
I'm in love with this Stingminer. I like the fact it's small and not a huge bulky miner. Slick design and easy to mount or place anywhere in the house.

That was something which attracted me, the size of it is fantastic. Similar to a Raspberry Pi; easily can disclose it in a hidden location. Also the fact you can still mine on it from such a small system and generate some tokens is fantastic. Great workj

I do agree with you on that, having something tangible do something as magnificent as that can be eye catching and that's the focus of the new coming technological age, no one wants to implement or use something bulky, no matter how great the product is, if is bulky, the sales will be low compared to a product with a small size, i'm glad the product development team of BITFENCE kept that in mind during development

it's because it's not an actual miner, like an ASIC.  From my understanding you are not confirming transactions on the blockchain, you 'mine' a reward everytime it reports a 'hackers' activity to the main network.

Let me get this straight and i'm sure some people in the community will like to get clarification on that, so what this means is, if a network was attacked by a hacker, is it BITFENCE that will automatically flag the hacker's IP as bad or will the report be done by the individual and secondly, will the sting miner do the mining automatically or does it need to be authenticated first by BITFENCE before the mining can be done?

I had similar questions I’ve flipped through the whitepaper but it’s quite a complex project so I think more videos and documentation simplifying and explaining how things like this will work could go quite far with assuring peole

Yea, i think a detailed response to this will go a long way but from my view if such report is to be done by the community, it should first be authenticated by the BITFENCE team before commencing the necessary steps, such process will ensure credibility to the network and stop the process of false reports, even though the project is a decentralized one, is best to also keep the community in check too

Wow that sting miner device looks very small. Is this for home office or can used for big offices as well. And this device will catch hackers?

I think you can use sting miners everywhere, but for big companies you will need more to secure the network. I like the idea to go in public networks like an airport or railway station and mine a lot of hackers.

So this device need to connected before firewall or after firewall device? Will it be able to pass the huge amount of internet data through it ?

It's not a web gateway, so isn't designed to be inline.  It essentially sits inside your network and will detect any malicious activity. 
Pages:
Jump to: