Pages:
Author

Topic: ➫ ➬ ➫ ➬ LUCKYB.IT ★ +2M bets ★ +100,000 BTC wagered - page 35. (Read 414931 times)

legendary
Activity: 1400
Merit: 1009
oh thats a great tournament, in my opinion doing them is one of the best ways to attract more players to your website, i played a lot of luckyb.it a few months ago and it gave me a lot of entertainment as the game is different than the others i guess ill try to win this tournament, lets hope ill be lucky
Well it's tough to win when whales like jadra participate in contests like this lol.. if you hit x999 multiplier then you'll have a chance to win, good luck betting/winning. Wink
hero member
Activity: 770
Merit: 500
CryptoTalk.Org - Get Paid for every Post!
oh thats a great tournament, in my opinion doing them is one of the best ways to attract more players to your website, i played a lot of luckyb.it a few months ago and it gave me a lot of entertainment as the game is different than the others i guess ill try to win this tournament, lets hope ill be lucky
BRE
legendary
Activity: 1218
Merit: 1014
Lucky.lat | Marketing Solutions & Implementations
sr. member
Activity: 406
Merit: 250
thank for warning. I never download anything anyway. I learn it in not an easy way.
BRE
legendary
Activity: 1218
Merit: 1014
Lucky.lat | Marketing Solutions & Implementations
full member
Activity: 209
Merit: 250
Thanks for the warning! Some people will fall for anything  Grin
BRE
legendary
Activity: 1218
Merit: 1014
Lucky.lat | Marketing Solutions & Implementations
WARNING

There is an advertisement circulating around, stating that the visitor has won 3 BTC. The user is directed to pay 0.005 BTC to download a text file that contains a twelve-digit promotion code and the address of the site.
The text file is fraudulent; it contains an invalid code and the address to LuckyBit.
LuckyBit is not associated with this scam.
LuckyBit not giving away 3BTC - never pay to download text files


full member
Activity: 209
Merit: 100
@OldHiall LuckyBit
Merry Christmas  Cheesy Sorry I haven't been on the chat in a while  Cry




Merry Christmas for you Smiley very nice gift!
member
Activity: 126
Merit: 10
Merry Christmas  Cheesy Sorry I haven't been on the chat in a while  Cry


BRE
legendary
Activity: 1218
Merit: 1014
Lucky.lat | Marketing Solutions & Implementations
i hit 20x with max promo but no one seen u.u lol.


 Tongue Tongue Tongue Tongue Tongue

Congratulations To Andu
legendary
Activity: 2310
Merit: 1047
i hit 20x with max promo but no one seen u.u lol.
sr. member
Activity: 241
Merit: 250
Nice .. 0.005 for 0.65 BTC !

Love to saw it when people hit .
BRE
legendary
Activity: 1218
Merit: 1014
Lucky.lat | Marketing Solutions & Implementations


Congratulations To Nero


Congratulations To Boxxob
hero member
Activity: 696
Merit: 500
hero member
Activity: 563
Merit: 500
Uhh... huh





its your lucky day today, congrats ^^ enjoy it !! ^^
legendary
Activity: 2018
Merit: 1108
legendary
Activity: 1008
Merit: 1001
Out of crypto entirely and don't miss it
Hey! It's Tournament Time Soon! Click Here!
legendary
Activity: 1008
Merit: 1001
Out of crypto entirely and don't miss it
For a website which claims to have more than 94000 BTC wagered, I don't think an argument like "not worth the effort for us" sounds plausible. You just don't want, admit it.

I don't care how it sounds. It's actually not useful.

Claiming the information is available in other parts isn't a valid excuse too. Is there some place in the website saying this? No? And what about new users?

As was pointed out, a MITM attack would immediately be detected and the attacker would gain, at most, one bet's worth of coin, regardless of the target.

It depends on the wallet. blockchain.info uses an HTTPS conection, so it's unlikely to be affected. Even if you're affected, the HTTPS conection will be gone and the lock in address box of the browser won't appear.

This is ridiculously incorrect. The wallet used has no bearing on the website at all; it functions identically whether you use a web wallet, desktop wallet, or phone. LuckyBit's website does not, and cannot, interface with any wallet.

About the LAN attack, well, you can take care about your network, but when this goes to your ISP, international routes and so, you lose the control of what goes on.

And so does any MITM attacker. Derp.

But is responsability of the user to verify if the network is secure.

Do you really expect average people to use wireshark in order to detect if there's a MITM happening?

No, I expect the average user's network administrator to. It is your responsibility to secure your network, or report to your network operator to have it secured. It is not LuckyBit's responsibility to take measures to prevent malicious providers from interfering with our clients. We have no reason to expend resources to protect a theoretical user from a theoretical attack that could theoretically steal only one theoretical bet.

It's much more simple having an HTTPS website. If it isn't encrypted, there will be lock on the browser. If it presents an invalid certificate, you'll receive an alert.

No, it's not "much more simple". It's an additional layer of complexity that doesn't solve a problem. If a MITM attack is ongoing, the user won't know the difference - lock or no lock.

3.- MITM have a tool called sslstrip to bypass the SSL connection, so, change the site to SSL will fix nothing about the attack.

sslstrip turns HTTPS traffic in HTTP. But to be effective, the user needs to go further and ignore the lack of HTTPS. Aside of this, there are tools and settings to avoid these types of downgrading, like HSTS.

Viruses and malware frequently adjust browser settings behind the user's back and do exactly this type of thing. A MITM attack would probably be paired with some infection that would facilitate sslstrip/HSTS infection, allowing the operation to complete as desired by the hacker. To a hacker, this additional step is relatively trivial, so SSL wouldn't pose a significant barrier to the attack you describe.

Well, a more sophisticated attack can try to replace the entire game too.

With what? That makes no sense. The game engine operates independently of the site; even a total rewrite of the front end won't change the operation of the game at all. If a hacker is going to the trouble of rewriting the game frontend, then why not go whole hog and clone the whole game (which has happened)? It's easier, less risky, and more profitable than bet-hijacking.

And again, the "this never happened" isn't a good reason. You need to consider the possibilities and risks, not the "it never happened".

That was a last point. We have considered the possibilities and risks. The risks with this model are smaller than the risks involved in using SSL. The effective result for the user is not a net gain. This decision was made two years ago and has not been a hindrance for us, nor has it ever led to the loss of customer funds. Using SSL would present increased overhead for us, but not increased security for any party.

But it seems you think it's more simple to deal with an eventual problem than fixing the origin of it. OK, it's your choice. A bad choice, I think, but, well...

It is more simple to deal with a problem. This is not a problem. We don't need SSL. There's no personal user data collected by the site - at all. There is no personal information retained by the site - at all. User funds are transmitted via blockchain only - no site authorization ever happens. There is literally nothing a hacker could interfere with that could pose a risk to our operation or our users. The entire site frontend could be removed entirely and the game will still operate just the same.

SSL's primary purpose is to secure data sent and received between the operator and the user. We have no private data being transmitted - none. So there is actually no use for SSL for us - it is an unjustifiable expense.

Your theoretical attack can be only executed in a very specific circumstance with a specific target in mind. LuckyBit isn't the target nor does it facilitate that circumstance - therefore, LuckyBit shouldn't even consider that possibility in its design because it simply doesn't have any bearing on the operation either way.

tl;dr:  not worth the effort for an attacker, not worth the effort for us. Still.
legendary
Activity: 3220
Merit: 3009

Man in the middle attack isn't a problem for luckybit because:

1.- MITM is a LAN attack. That mean the only users who will be affected are those who are on the local area network of the attacker. Users access point is users responsability, if you are on a not secure network better don't use bitcoin, because if you are under MITM attack, the hacker will not change the betting addys, he will get your blockchain.info wallet access information.

It depends on the wallet. blockchain.info uses an HTTPS conection, so it's unlikely to be affected. Even if you're affected, the HTTPS conection will be gone and the lock in address box of the browser won't appear. Please read the point 3.

About the LAN attack, well, you can take care about your network, but when this goes to your ISP, international routes and so, you lose the control of what goes on. If you lose control of what goes on your network, there is not much luckybit can do for you.



2.- MITM can be detected by users with tools like wireshark. But is responsability of the user to verify if the network is secure.

Do you really expect average people to use wireshark in order to detect if there's a MITM happening? If people is paranoid about the attack, then they should find a way to avoid it.

It's much more simple having an HTTPS website. If it isn't encrypted, there will be lock on the browser. If it presents an invalid certificate, you'll receive an alert. Again please read the point 3.

3.- MITM have a tool called sslstrip to bypass the SSL connection, so, change the site to SSL will fix nothing about the attack.

sslstrip turns HTTPS traffic in HTTP. But to be effective, the user needs to go further and ignore the lack of HTTPS. Aside of this, there are tools and settings to avoid these types of downgrading, like HSTS. You should learn a lil more about sslstrip, it really works fine to make the MITM to SSL connections.


Make a man in the middle to change luckybit addys, is one of the worst things you can do with this attack. Because if the users don't see the bets rolling they will ask to support what happen?, then we will ask for the TX ID, and in that moment we will see the fake addy. How much the hacker get? 0.005? 0.01?... not really a big lost. So, that attack is just a waste of time if some one is thinking about use it that way.

I want to make emphasis on the point of; This has never happened to luckybit and isn't something to worry about.

Well, a more sophisticated attack can try to replace the entire game too. A sophisticated hacker know how stupid is the idea of edit the gambling site with MITM to change addys and catch some satoshis if he have luck.

And again, the "this never happened" isn't a good reason. You need to consider the possibilities and risks, not the "it never happened". We consider possibilities and risks... Chance to get a user hacked to change the betting addys, zero. Risks, only one user hacked because some one vuln his network.

But it seems you think it's more simple to deal with an eventual problem than fixing the origin of it. OK, it's your choice. A bad choice, I think, but, well... The only problem here is all this trash talk, and we are working on it.

I will say it clear because you are confusing our customers.

Luckybit is not worried about a MITM attack.

Because the MITM attack goes for one target, the target must be in the same attacker local network, and if users got hacked with this attack we wasn't the reason or the vuln and we are not the target.

If the hacker have a success attack to one of our users, other users will be not affected, and we are a gambling site not a Internet Security Service. Of course we care about out customers security, but only for problems relevant to luckybit. If a random guy on internet get hacked by this attack should be our problem? if that guy use windows and some one use a trojan to hack it, should be our problem? i think not.

For all the luckybit users:

*This is not a luckybit security problem. it's the user responsibility to be on a secure network.
*This is not a problem because it will not happen, to have the hacker in the same local network is really hard. And if you have a hacker on your LAN change the addys of luckybit to take the user bitcoins isn't a smart idea, as i say before if the users send one bet and it don't roll, support will ask for the tx id, and there we will see the fake addys.
*In a fantasy world this is possible, but in the real world, this is almost impossible, is a bad idea, hard as hell and a waste of time.
sr. member
Activity: 252
Merit: 250

SSL implementation is not a simple process. Getting a signed certificate, implementing security across the site and filtering for non-essential services such as the LuckyBit Community Hub are not a quick-switch option. These things take time and money that aren't justified by a "potential" threat that hasn't been realized and can be easily avoided by customers. Most of our players don't even depend on the site to provide the addresses; the information is available elsewhere and the majority of wallets also provide address-book services that would make this attack ineffective.

tl;dr: not worth the effort for an attacker, not worth the effort for us

For a website which claims to have more than 94000 BTC wagered, I don't think an argument like "not worth the effort for us" sounds plausible. You just don't want, admit it.

Claiming the information is available in other parts isn't a valid excuse too. Is there some place in the website saying this? No? And what about new users?


Man in the middle attack isn't a problem for luckybit because:

1.- MITM is a LAN attack. That mean the only users who will be affected are those who are on the local area network of the attacker. Users access point is users responsability, if you are on a not secure network better don't use bitcoin, because if you are under MITM attack, the hacker will not change the betting addys, he will get your blockchain.info wallet access information.

It depends on the wallet. blockchain.info uses an HTTPS conection, so it's unlikely to be affected. Even if you're affected, the HTTPS conection will be gone and the lock in address box of the browser won't appear.

About the LAN attack, well, you can take care about your network, but when this goes to your ISP, international routes and so, you lose the control of what goes on.



2.- MITM can be detected by users with tools like wireshark. But is responsability of the user to verify if the network is secure.

Do you really expect average people to use wireshark in order to detect if there's a MITM happening?

It's much more simple having an HTTPS website. If it isn't encrypted, there will be lock on the browser. If it presents an invalid certificate, you'll receive an alert.

3.- MITM have a tool called sslstrip to bypass the SSL connection, so, change the site to SSL will fix nothing about the attack.

sslstrip turns HTTPS traffic in HTTP. But to be effective, the user needs to go further and ignore the lack of HTTPS. Aside of this, there are tools and settings to avoid these types of downgrading, like HSTS.


Make a man in the middle to change luckybit addys, is one of the worst things you can do with this attack. Because if the users don't see the bets rolling they will ask to support what happen?, then we will ask for the TX ID, and in that moment we will see the fake addy. How much the hacker get? 0.005? 0.01?... not really a big lost. So, that attack is just a waste of time if some one is thinking about use it that way.

I want to make emphasis on the point of; This has never happened to luckybit and isn't something to worry about.

Well, a more sophisticated attack can try to replace the entire game too.

And again, the "this never happened" isn't a good reason. You need to consider the possibilities and risks, not the "it never happened".

But it seems you think it's more simple to deal with an eventual problem than fixing the origin of it. OK, it's your choice. A bad choice, I think, but, well...
Pages:
Jump to: