Author

Topic: BTCD is no more - page 303. (Read 1328505 times)

hero member
Activity: 635
Merit: 500
August 28, 2014, 12:24:18 PM
XMR is really FUDing BTCD on cryptsy troll box. Especially "DecHar"

yup. looks like they're setting up camp in the troll boxes:

DecHar
anyone heard of this coin called monero (XMR)? it is the only one with true anon

Dionysus
@DecHar: hahahahaha

Dionysus
I called it

AngusCanine
@DecHar: check out lxc it has newest innovation for anon coming out

DecHar
@AngusCanine: LXC good coin too it has real features unlike BTCD scam

Hmmm like these ppl are screwing coz they cant afford to get in it or sumink!!!
legendary
Activity: 3570
Merit: 1126
August 28, 2014, 12:13:10 PM
XMR is really FUDing BTCD on cryptsy troll box. Especially "DecHar"

yup. looks like they're setting up camp in the troll boxes:

DecHar
anyone heard of this coin called monero (XMR)? it is the only one with true anon

Dionysus
@DecHar: hahahahaha

Dionysus
I called it

AngusCanine
@DecHar: check out lxc it has newest innovation for anon coming out

DecHar
@AngusCanine: LXC good coin too it has real features unlike BTCD scam
newbie
Activity: 35
Merit: 0
August 28, 2014, 12:09:44 PM
XMR is really FUDing BTCD on cryptsy troll box. Especially "DecHar"
legendary
Activity: 3570
Merit: 1126
August 28, 2014, 11:09:47 AM
not sure if this method for withdrawing from cryptsy is good, but at least it might be much faster.
convert btcd to another altcoin, and send it to bittrex. (preferably if the altcoin price is more profitable in bittrex.
from there convert it again to btcd and withdraw it from there.
Be careful to make good conversions because you might loose some btcd (or gain some more)

I don't mind paying it out of my pocket, the only thing that is unknown ATM is the value of the TX's currently in limbo...

newbie
Activity: 35
Merit: 0
August 28, 2014, 11:05:15 AM
I think Doge wallets are up, you could use that
hero member
Activity: 490
Merit: 500
0_0
August 28, 2014, 10:55:53 AM
not sure if this method for withdrawing from cryptsy is good, but at least it might be much faster.
convert btcd to another altcoin, and send it to bittrex. (preferably if the altcoin price is more profitable in bittrex.
from there convert it again to btcd and withdraw it from there.
Be careful to make good conversions because you might loose some btcd (or gain some more)
legendary
Activity: 3570
Merit: 1126
August 28, 2014, 10:24:25 AM
Anyone know what is wrong with xpool.ca .  The btcd payouts are still stuck in confirming.



i believe its due to the mess cryptsy is in atm with withdrawals

Yup, I've only got ~70% of the shift successfully exchanged.

I could cut it loose as is, and then have it all pile into today's shift,  but I'm not quite ready for that yet. They keep saying... not much longer...

The main problem is if I close push the shift through now, it will be missing ~3.5 hours of coins that were sent to Cryptsy. I'll pay out of my pocket what's already been exchanged, cause I knwo if I req the withdraw it won't show up anyway.

Then when all the tx's come through, they'll simply boost today's shift...

I've sent no coins to Cryptsy since 7PM EST yesterday. It's how my scripts work. So nothing is going to be lost for today.

Cheers!
hero member
Activity: 620
Merit: 500
August 28, 2014, 10:20:28 AM
im still waiting for my btc deposit i sent yesterday to buy btcd. its a good job ive been buying at poloniex at these prices Smiley
legendary
Activity: 3570
Merit: 1126
August 28, 2014, 10:18:21 AM
Anyone know what is wrong with xpool.ca .  The btcd payouts are still stuck in confirming.



i believe its due to the mess cryptsy is in atm with withdrawals

Yup, I've only got ~70% of the shift successfully exchanged.

I could cut it loose as is, and then have it all pile into today's shift,  but I'm not quite ready for that yet. They keep saying... not much longer...
hero member
Activity: 620
Merit: 500
August 28, 2014, 10:16:45 AM
Anyone know what is wrong with xpool.ca .  The btcd payouts are still stuck in confirming.



i believe its due to the mess cryptsy is in atm with withdrawals
newbie
Activity: 41
Merit: 0
August 28, 2014, 10:14:10 AM
Anyone know what is wrong with xpool.ca .  The btcd payouts are still stuck in confirming.

hero member
Activity: 620
Merit: 500
August 28, 2014, 10:04:01 AM
so much fud going on in cryptsy troll box about btcd its unbelievable lol

And now you got banned Sad

I can only say stay away from cryptsy this exchange is the last i would use. I had to use it last week and i would need to wait 1 week to have my BTCD Withdrawn from them. In the end i just used the old trick and made just over 1000 small transactions and it worked.



haha yea a total of 6 years 1 day ban combined from all accounts of mine. they get real but hurt when the truth is told in public. all i want is to get my funds and remove them from cryptsy and delete my account i will never use them again, they are useless and im sure there is something more sinister than the usual server mishaps lol
legendary
Activity: 1176
Merit: 1134
August 28, 2014, 10:01:32 AM
re: paper for teleport
Read the paper and afaik I understand most of it. Please correct my mistakes.

An issue I see with the teleport and pods is that it relies on a few folks stepping up and being the front man if someone wants to cash out. So maybe if a few good money launders get into the business I can see this as a useful way to cash out to fiat.
If someone isn't interested to cash out and the anon card takes off, that changes things for the better, but the anon card still needs a front man.
Have you contacted the various mobs yet? I hear they like the profit margin of this type.

This is pretty much a tor network mixer using encrypted messages that is automated and built into the coin with incentive for random folks to run the teleport servers to keep the anon as high as possible. More servers better mixer.  Keeping it all off tor using onion routing in a private network helps. I would suggest having the port change a bit as to keep the network fingerprinting down.

Am I missing anything?


 
cashout can also be handled by the telepod creator, which makes a closed loop. I am also working on automated tradebots to deal with some of the more dangerous parts, but not all these details are finished as the important part is the main network and I know there are several solutions for the entry/exit
By using other anon coins to feed into the system, it allows for much more private seeding of the initial telepods and once we get multiple other anon coins combined with some realtime trading  of them, the attacker wouldnt even know which coin network the telepod value ended up.

I dont think there is much network fingerprinting possible due to the M of N fragmenting of each telepod. Using M of 40% of N (can be up to 254) and 85% probability to route, then for 4 hops you still end up with half the fragments getting to the destination, which is plenty to reconstruct. So I am envisioning some sort of constant white noise of the M of N fragments and since it is all encrypted not really a way to tell if it is a telepod being originated or rerouted or even if it is the destination since 15% of the destinations dont reroute! Was it the destination or was it the 15% random discard?

I am also not sure if you realize that the receiver is the one that controls the timing of the blockchain event and that this is randomly delayed by up to a max delay specified by each user. So not possible to even know what set of cloning events are actually part of the anon set when trying to correlate it with the sender. The sending anon set is potentially much bigger due to the possibility of aging telepods for a long time and even a minimal amount of trusted teleports (no cloning) will allow a telepod to end up anywhere. So the anon set for the sender is close to all the cloning events since the telepod was cloned but of course this is only being correlated to a guess as to the potential receivers.

With there being only txout/txin without any history other than all the clonings that just go back to telepod creator, the timing analysis is the best chance for correlations, but with each telepod resembling more a quantum wave function than a discrete particle, I think this is quite difficult

I try to make big headache for attacker. How did I do?
You are first to make such a good analysis, on a scale of 1 to 10 how would you rate this?

James



Thank you for the info.  
Personally I give it a 7 or 8 since it simplifies the current method of, send alt/btc to random small exchange that won't be in business next week, pray they don't steal your funds,  transfer to new wallet.

I like that it is a closed system, I think there will be a good market for selling telepods of various standard denoms as this will add a nice anon level.
As for fingerprinting, I was meaning more the fact that someone is running a teleport server on their isp. Guess you could route all traffic as https or wrap it so it looks live video traffic so it meets average traffic appearance.

One of the things to consider. You have a neighborhood of 100,000 people all using the internet to go on facebook, youtube, skype and watch streaming movies. This is 99.9% of traffic and makes a nice graph if it is being monitored. The 4 people that are using tor, irc, ssh etc all stand out like a giant blip on the chart.  So those people get the attention focused on them a bit more...hey..why is bob using tor...he must be a bad guy, so LE might say we should look at his life a little closer and see if we can charge him on one of the 100 laws he doesn't know he is breaking.  Or in a fun world...your isp says..I am sorry your traffic meets certain patterns and we are not willing to subject our shareholders to potential liability. 10 years from now, the only thing you can do online is to go to 'approved' sites. Give me hookers, blow and free information to anything I might want to learn even if it doesn't conform to my socialite neighbors or give me death.

So a way to prevent this type of fingerprinting of traffic is to encapsulate the traffic in a nice header from another type. Deep packet inspection is mean.

Just my random thoughts on this.
Thank you for honest feedback, a 7.5 yes that is reasonable assessment for this first version
We are thinking alike, tor is immediate redflag so it was rejected immediately, but onion is nice, so I had roll my own.

I considered using steganography to make it really a video stream, by making it an endless loop of something like a rough ocean, you could encode quite a bit into the chaotic patterns, or maybe make it some sort of porn feed, then it would go totally unnoticed Smiley

However, the bandwidth use and CPU consumption just seemed a bit too much for version one. I hope I have time to push this to a 10! I hope you will visit occasionally for some more great feedbacks.

James
sr. member
Activity: 420
Merit: 250
August 28, 2014, 09:45:01 AM
re: paper for teleport
Read the paper and afaik I understand most of it. Please correct my mistakes.

An issue I see with the teleport and pods is that it relies on a few folks stepping up and being the front man if someone wants to cash out. So maybe if a few good money launders get into the business I can see this as a useful way to cash out to fiat.
If someone isn't interested to cash out and the anon card takes off, that changes things for the better, but the anon card still needs a front man.
Have you contacted the various mobs yet? I hear they like the profit margin of this type.

This is pretty much a tor network mixer using encrypted messages that is automated and built into the coin with incentive for random folks to run the teleport servers to keep the anon as high as possible. More servers better mixer.  Keeping it all off tor using onion routing in a private network helps. I would suggest having the port change a bit as to keep the network fingerprinting down.

Am I missing anything?


 
cashout can also be handled by the telepod creator, which makes a closed loop. I am also working on automated tradebots to deal with some of the more dangerous parts, but not all these details are finished as the important part is the main network and I know there are several solutions for the entry/exit
By using other anon coins to feed into the system, it allows for much more private seeding of the initial telepods and once we get multiple other anon coins combined with some realtime trading  of them, the attacker wouldnt even know which coin network the telepod value ended up.

I dont think there is much network fingerprinting possible due to the M of N fragmenting of each telepod. Using M of 40% of N (can be up to 254) and 85% probability to route, then for 4 hops you still end up with half the fragments getting to the destination, which is plenty to reconstruct. So I am envisioning some sort of constant white noise of the M of N fragments and since it is all encrypted not really a way to tell if it is a telepod being originated or rerouted or even if it is the destination since 15% of the destinations dont reroute! Was it the destination or was it the 15% random discard?

I am also not sure if you realize that the receiver is the one that controls the timing of the blockchain event and that this is randomly delayed by up to a max delay specified by each user. So not possible to even know what set of cloning events are actually part of the anon set when trying to correlate it with the sender. The sending anon set is potentially much bigger due to the possibility of aging telepods for a long time and even a minimal amount of trusted teleports (no cloning) will allow a telepod to end up anywhere. So the anon set for the sender is close to all the cloning events since the telepod was cloned but of course this is only being correlated to a guess as to the potential receivers.

With there being only txout/txin without any history other than all the clonings that just go back to telepod creator, the timing analysis is the best chance for correlations, but with each telepod resembling more a quantum wave function than a discrete particle, I think this is quite difficult

I try to make big headache for attacker. How did I do?
You are first to make such a good analysis, on a scale of 1 to 10 how would you rate this?

James



Thank you for the info.  
Personally I give it a 7 or 8 since it simplifies the current method of, send alt/btc to random small exchange that won't be in business next week, pray they don't steal your funds,  transfer to new wallet.

I like that it is a closed system, I think there will be a good market for selling telepods of various standard denoms as this will add a nice anon level.
As for fingerprinting, I was meaning more the fact that someone is running a teleport server on their isp. Guess you could route all traffic as https or wrap it so it looks live video traffic so it meets average traffic appearance.

One of the things to consider. You have a neighborhood of 100,000 people all using the internet to go on facebook, youtube, skype and watch streaming movies. This is 99.9% of traffic and makes a nice graph if it is being monitored. The 4 people that are using tor, irc, ssh etc all stand out like a giant blip on the chart.  So those people get the attention focused on them a bit more...hey..why is bob using tor...he must be a bad guy, so LE might say we should look at his life a little closer and see if we can charge him on one of the 100 laws he doesn't know he is breaking.  Or in a fun world...your isp says..I am sorry your traffic meets certain patterns and we are not willing to subject our shareholders to potential liability. 10 years from now, the only thing you can do online is to go to 'approved' sites. Give me hookers, blow and free information to anything I might want to learn even if it doesn't conform to my socialite neighbors or give me death.

So a way to prevent this type of fingerprinting of traffic is to encapsulate the traffic in a nice header from another type. Deep packet inspection is mean.

Just my random thoughts on this.
legendary
Activity: 1206
Merit: 1000
August 28, 2014, 09:39:16 AM

I try to make big headache for attacker. How did I do?
You are first to make such a good analysis, on a scale of 1 to 10 how would you rate this?

James


I'd say you did alright for a "simple c programmer"  Grin
legendary
Activity: 1176
Merit: 1134
August 28, 2014, 09:39:10 AM
I like it.

If this system becomes big enough to allow a certain currency to be removed from their controlled economy without bbeing traced or regulated, this coin may surpass btc
fiat -> crypto is always the big problem, realistically fiat -> btc will be the available gateway
now once it comes into crypto, then it will be able to directly go into or traded for telepods and I expect a lively telepod <-> telepod economy as this becomes the analogue of cash and when you extract back to the blockchain, it is more like a signed check/bank deposit with everything traceable. Or maybe better analogy is that telepods are like safe deposit boxes. people are using them for exchanging and cloning is just emptying the contents of a box you get into your safe deposit box that only you have the key to. So it is good that with automation we are not having to have the safe boxes in our pockets!

Maybe in some years when the fiat -> BTCD infrastructure is inplace, then there is some chances for what you talk about, but let us take things one step at a time.

The key is that there is hope now. Instead of year by year our privacy being eroded, now year by year we gain privacy. Even with just a few hundred users things become hard to correlate. With tens of thousands of users, it will be finding some floating cotton speck in a blizzard. then if you are able to actually get one, it is all encrypted scrambles
legendary
Activity: 1582
Merit: 1001
August 28, 2014, 09:30:37 AM
I like it.

If this system becomes big enough to allow a certain currency to be removed from their controlled economy without bbeing traced or regulated, this coin may surpass btc
hero member
Activity: 490
Merit: 500
0_0
August 28, 2014, 09:23:55 AM
so much fud going on in cryptsy troll box about btcd its unbelievable lol

And now you got banned Sad

I can only say stay away from cryptsy this exchange is the last i would use. I had to use it last week and i would need to wait 1 week to have my BTCD Withdrawn from them. In the end i just used the old trick and made just over 1000 small transactions and it worked.


I am sure they are using our btcd for staking
legendary
Activity: 1176
Merit: 1134
August 28, 2014, 09:19:13 AM
re: paper for teleport
Read the paper and afaik I understand most of it. Please correct my mistakes.

An issue I see with the teleport and pods is that it relies on a few folks stepping up and being the front man if someone wants to cash out. So maybe if a few good money launders get into the business I can see this as a useful way to cash out to fiat.
If someone isn't interested to cash out and the anon card takes off, that changes things for the better, but the anon card still needs a front man.
Have you contacted the various mobs yet? I hear they like the profit margin of this type.

This is pretty much a tor network mixer using encrypted messages that is automated and built into the coin with incentive for random folks to run the teleport servers to keep the anon as high as possible. More servers better mixer.  Keeping it all off tor using onion routing in a private network helps. I would suggest having the port change a bit as to keep the network fingerprinting down.

Am I missing anything?


 
cashout can also be handled by the telepod creator, which makes a closed loop. I am also working on automated tradebots to deal with some of the more dangerous parts, but not all these details are finished as the important part is the main network and I know there are several solutions for the entry/exit
By using other anon coins to feed into the system, it allows for much more private seeding of the initial telepods and once we get multiple other anon coins combined with some realtime trading  of them, the attacker wouldnt even know which coin network the telepod value ended up.

I dont think there is much network fingerprinting possible due to the M of N fragmenting of each telepod. Using M of 40% of N (can be up to 254) and 85% probability to route, then for 4 hops you still end up with half the fragments getting to the destination, which is plenty to reconstruct. So I am envisioning some sort of constant white noise of the M of N fragments and since it is all encrypted not really a way to tell if it is a telepod being originated or rerouted or even if it is the destination since 15% of the destinations dont reroute! Was it the destination or was it the 15% random discard?

I am also not sure if you realize that the receiver is the one that controls the timing of the blockchain event and that this is randomly delayed by up to a max delay specified by each user. So not possible to even know what set of cloning events are actually part of the anon set when trying to correlate it with the sender. The sending anon set is potentially much bigger due to the possibility of aging telepods for a long time and even a minimal amount of trusted teleports (no cloning) will allow a telepod to end up anywhere. So the anon set for the sender is close to all the cloning events since the telepod was cloned but of course this is only being correlated to a guess as to the potential receivers.

With there being only txout/txin without any history other than all the clonings that just go back to telepod creator, the timing analysis is the best chance for correlations, but with each telepod resembling more a quantum wave function than a discrete particle, I think this is quite difficult

I try to make big headache for attacker. How did I do?
You are first to make such a good analysis, on a scale of 1 to 10 how would you rate this?

James

sr. member
Activity: 420
Merit: 250
August 28, 2014, 09:00:02 AM
re: paper for teleport
Read the paper and afaik I understand most of it. Please correct my mistakes.

An issue I see with the teleport and pods is that it relies on a few folks stepping up and being the front man if someone wants to cash out. So maybe if a few good money launders get into the business I can see this as a useful way to cash out to fiat.
If someone isn't interested to cash out and the anon card takes off, that changes things for the better, but the anon card still needs a front man.
Have you contacted the various mobs yet? I hear they like the profit margin of this type.

This is pretty much a tor network mixer using encrypted messages that is automated and built into the coin with incentive for random folks to run the teleport servers to keep the anon as high as possible. More servers better mixer.  Keeping it all off tor using onion routing in a private network helps. I would suggest having the port change a bit as to keep the network fingerprinting down.

Am I missing anything?


 
Jump to: