It was the Bitcointalk forum that inspired us to create Bitcointalksearch.org - Bitcointalk is an excellent site that should be the default page for anybody dealing in cryptocurrency,
since it is a virtual gold-mine of data. However, our experience and user feedback led us create our site;
Bitcointalk's search is slow, and difficult to get the results you need, because you need to log in first to find anything useful - furthermore, there are rate limiters for their search functionality.
The aim of our project is to create a faster website that yields more results and faster without having to create an account and eliminate the need to log in -
your personal data, therefore, will never be in jeopardy since we are not asking for any of your data and you don't need to provide them to use our site with all of its capabilities.
We created this website with the sole purpose of users being able to search quickly and efficiently in the field of cryptocurrency
so they will have access to the latest and most accurate information and thereby assisting the crypto-community at large.
@Trade if you want i can make a test account on both of your sites with a random password, you can then post hash with salt here and a screenshot of username /hash from database to prove him wrong.
You can also put a bounty to crack it.
A few things:
1) He only takes full source code and database as proof apparenty
2) I am not disclosing my salt
3) If I wasn't hashing / salting them, I could just hash later.
CoinLenders also hashes your password in your browser with Javascript.
I cannot access your password (unlike what gweedo is claiming) on CoinLenders. I can only access the hash which is useless if it has been salted with a strong hash.
Gweedo is spreading FUD that I don't do this. He is posting a misleading screenshot out of context. I DO hash passwords. I don't salt them for CoinChat, but they are hashed.
As I am tired of saying the same thing again and again, this is now my stock response.
@Trade if you want i can make a test account on both of your sites with a random password, you can then post hash with salt here and a screenshot of username /hash from database to prove him wrong.
How do I know he didn't pay you just to say that. Also he could just take your stuff and throw into a hash generator.
@Trade if you want i can make a test account on both of your sites with a random password, you can then post hash with salt here and a screenshot of username /hash from database to prove him wrong.
CoinLenders also hashes your password in your browser with Javascript.
I cannot access your password (unlike what gweedo is claiming) on CoinLenders. I can only access the hash which is useless if it has been salted with a strong hash.
Gweedo is spreading FUD that I don't do this. He is posting a misleading screenshot out of context. I DO hash passwords. I don't salt them for CoinChat, but they are hashed.
As I am tired of saying the same thing again and again, this is now my stock response.
CoinLenders also hashes your password in your browser with Javascript.
I cannot access your password (unlike what gweedo is claiming) on CoinLenders. I can only access the hash which is useless if it has been salted with a strong hash.
Gweedo is spreading FUD that I don't do this. He is posting a misleading screenshot out of context. I DO hash passwords. I don't salt them for CoinChat, but they are hashed.
As I am tired of saying the same thing again and again, this is now my stock response.
When did images become FUD and untrustworthy? I am not abusing any trust system, apparently he is very sensitive with this. He has extorted me to abuse the trust, he thinks he can hack me, and he just calling me untrustworthy which is slander.
Quote
This is a warning! Don't use these sites, TF can access your password at anytime! And take over your other accounts.
Which is untrue.
Your image shows that I don't salt passwords for CoinChat. I hash passwords with SHA256. So I cannot access your password at any time. That's an outright lie. For other sites I always salt at least.
Quote
No His ratings are red because you are in " DefaultTrust"
That's my point? My ratings show up my default, his doesn't.
The negative trust rating shows up for everyone by default, your negative trust rating shows up for no one except you. I suggest making a new throwaway and seeing what your profile looks like.
No His ratings are red because you are in " DefaultTrust"
Why are you guys abusing trust system for no reason?
He's posting FUD (such as claiming that I don't hash or salt), when that's plainly untrue (your password is hashed in your browser for CoinLenders) which is untrustworthy.
That's not very different from false scammer accusations, which would get you a negative trust rating. Go claim John K is a scammer (when it is untrue) and see what your trust score looks like later for example.
Or claim that a web hosting company scammed you when you haven't purchased anything. Intentionally misleading statements are untrustworthy.
By hard proof, gweedo means that he wants the full source code and database of CoinLenders. I wonder what legitimate reasons he has for wanting the database?
I've already found vulnerabilities in them. It's simple, provide me with a written & signed contract authorizing penetration testing on your site.
The negative trust rating shows up for everyone by default, your negative trust rating shows up for no one except you. I suggest making a new throwaway and seeing what your profile looks like.
So your going to believe him if one of his sites doesn't have for sure, I am 100% none of his sites do. Just a programming hence, I use the same template for all my sites, and 99% of programmers do. So yeah. If you believe him then good for you, but I am not.
Yeah good luck using a Node.js template for PHP
FUD like this is why you have a negative trust rating. I've already shown the source code function for CL.
Don't worry its perfectly legal to possess hacking software here and people need to see this, so:
Quote
$ nmap -T4 -A -v -PE -PS22,25,80 -PA21,23,80,3389 coinchat.org
Starting Nmap 5.21 ( http://nmap.org ) at 2013-07-12 08:48 IST NSE: Loaded 36 scripts for scanning. Initiating Ping Scan at 08:48 Scanning coinchat.org (192.155.86.153) [8 ports] Completed Ping Scan at 08:48, 0.20s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 08:48 Completed Parallel DNS resolution of 1 host. at 08:48, 0.05s elapsed Initiating SYN Stealth Scan at 08:48 Scanning coinchat.org (192.155.86.153) [1000 ports] Discovered open port 80/tcp on 192.155.86.153 Discovered open port 22/tcp on 192.155.86.153 Discovered open port 8888/tcp on 192.155.86.153 Discovered open port 8000/tcp on 192.155.86.153 Discovered open port 9000/tcp on 192.155.86.153 Discovered open port 8333/tcp on 192.155.86.153 Completed SYN Stealth Scan at 08:48, 5.86s elapsed (1000 total ports) Initiating Service scan at 08:48 Scanning 6 services on coinchat.org (192.155.86.153) Completed Service scan at 08:49, 31.61s elapsed (6 services on 1 host) Initiating OS detection (try #1) against coinchat.org (192.155.86.153) Retrying OS detection (try #2) against coinchat.org (192.155.86.153) Initiating Traceroute at 08:49 Completed Traceroute at 08:49, 0.20s elapsed Initiating Parallel DNS resolution of 10 hosts. at 08:49 Completed Parallel DNS resolution of 10 hosts. at 08:49, 0.10s elapsed NSE: Script scanning 192.155.86.153. NSE: Starting runlevel 1 (of 1) scan. Initiating NSE at 08:49 Completed NSE at 08:49, 30.34s elapsed NSE: Script Scanning completed. Nmap scan report for coinchat.org (192.155.86.153) Host is up (0.19s latency). rDNS record for 192.155.86.153: mafiahunt.net Not shown: 985 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 5.9p1 Debian 5ubuntu1.1 (protocol 2.0) | ssh-hostkey: 1024 87:73:ff:39:8c:14:99:b2:a7:09:f8:2f:e1:95:b7:ba (DSA) |_2048 0e:dc:0c:ff:45:c0:a1:f4:69:4e:58:80:f4:5d:f4:b7 (RSA) 25/tcp filtered smtp 80/tcp open http? 2710/tcp filtered unknown 6666/tcp filtered irc 6667/tcp filtered irc 6668/tcp filtered irc 6669/tcp filtered irc 6969/tcp filtered acmsoda 7000/tcp filtered afs3-fileserver 8000/tcp open http Apache httpd 2.2.22 ((Ubuntu)) |_html-title: MafiaHunt - Realtime Mafia on the web | http-open-proxy: Potentially OPEN proxy. |_Methods supported: CONNECTION 8333/tcp open tcpwrapped 8888/tcp open sun-answerbook? 9000/tcp open cslistener? 9090/tcp filtered zeus-admin 3 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=5.21%I=7%D=7/12%Time=51DFB4D7%P=i686-pc-linux-gnu%r(GetReq SF:uest,52,"HTTP/1\.1\x20404\x20Not\x20Found\r\nDate:\x20Fri,\x2012\x20Jul SF:\x202013\x2007:48:38\x20GMT\r\nConnection:\x20close\r\n\r\n")%r(HTTPOpt SF:ions,52,"HTTP/1\.1\x20404\x20Not\x20Found\r\nDate:\x20Fri,\x2012\x20Jul SF:\x202013\x2007:48:39\x20GMT\r\nConnection:\x20close\r\n\r\n")%r(FourOhF SF:ourRequest,52,"HTTP/1\.1\x20404\x20Not\x20Found\r\nDate:\x20Fri,\x2012\ SF:x20Jul\x202013\x2007:48:40\x20GMT\r\nConnection:\x20close\r\n\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port8888-TCP:V=5.21%I=7%D=7/12%Time=51DFB4D7%P=i686-pc-linux-gnu%r(GetR SF:equest,1A1A,"HTTP/1\.1\x20200\x20OK\r\nDate:\x20Fri,\x2012\x20Jul\x2020 SF:13\x2007:48:38\x20GMT\r\nConnection:\x20close\r\n\r\n SF:\n\nCoinChat\x20-\x20free\x20bitcoins\x20and\x20chat\x20ro SF:om\nSF:ap/2\.3\.2/css/bootstrap-combined\.min\.css\"\x20rel=\"stylesheet\">\n< SF:link\x20href='static/css/default\.css'\x20type='text/css'\x20rel='style SF:sheet'>\nSF:mg/chat\.png\">\nSF:0chatroom\x20-\x20discuss\x20and\x20chat\x20with\x20a\x20nice\x20stylis SF:h\x20functional\x20client\.\x20Works\x20everywhere,\x20Bitcoin\x20integ SF:rated\">\x20\n\n\n\t
\n\x20\x20Device type: WAP|general purpose|router|broadband router|webcam Running (JUST GUESSING) : Linux 2.6.X|2.4.X (91%), Linksys Linux 2.4.X (90%), D-Link embedded (87%), Linksys embedded (87%), Peplink embedded (87%), AXIS Linux 2.6.X (87%) Aggressive OS guesses: OpenWrt Kamikaze 7.09 (Linux 2.6.22) (91%), Linux 2.6.9 - 2.6.27 (91%), Linux 2.6.22 (Fedora Core 6) (91%), OpenWrt White Russian 0.9 (Linux 2.4.30) (90%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (90%), Linux 2.6.24 - 2.6.31 (89%), Linux 2.6.9 - 2.6.18 (89%), Linux 2.6.18 - 2.6.27 (88%), Linux 2.6.15 - 2.6.30 (88%), Linux 2.6.22 (88%) No exact OS matches for host (test conditions non-ideal). Uptime guess: 4.372 days (since Sun Jul 7 23:53:26 2013) Network Distance: 10 hops TCP Sequence Prediction: Difficulty=258 (Good luck!) IP ID Sequence Generation: All zeros Service Info: OS: Linux
Read data files from: /usr/share/nmap OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 73.28 seconds Raw packets sent: 1148 (52.820KB) | Rcvd: 1082 (45.508KB)