Pages:
Author

Topic: � [MYST] Mystery Coin � Random Rewards � 24 Seconds � Mystery FOUND - ROLLBACK � - page 19. (Read 26861 times)

legendary
Activity: 1050
Merit: 1293
Huh?
Releasing Today, July 27th


Today is the 26th isn't it? Is that the surprise?
That's the mystery...


Btw. in Australia it's already the 27th..  Wink
full member
Activity: 182
Merit: 100
Releasing Today, July 27th


Today is the 26th isn't it? Is that the surprise?
hero member
Activity: 574
Merit: 500
hero member
Activity: 756
Merit: 500
sr. member
Activity: 378
Merit: 254
small fry
is this going to be the one that switches algos randomly and requires a special miner package???
i thought roulettecoin was it, and they were still busy premining it, but maybe there's a special trick up the sleeve yet.
hero member
Activity: 504
Merit: 500
Bitcoin is getting bigcoin
sr. member
Activity: 308
Merit: 250
To bad it is SHA, it could be a X11 and still bring in "ASICS"...
member
Activity: 98
Merit: 10
legendary
Activity: 2002
Merit: 1051
ICO? Not even once.
newbie
Activity: 112
Merit: 0



Rolling back to 7408. All vulnerabilities have been closed. Coin now has no flaws. I will post a detailed response on what happened, why it happened, and how it was so easy to do. Thanks to earlz for finding the mystery and MrData for his help with the rollback



   








This coin has a mystery...
It's not malicious...
It's not obvious...
Virtually insignificant...
But when found...
Will raise the due diligence standard


Third party pools. We take no responsibility for down time or lost shares. Contact Pool Operator for support

Please post your pool picture and link to be readded once you are updated to the rollback

                       

Pool operators will probably have to run the daemon with -disablesafemode for a while until there enough new good blocks to be a longer chain than the old one
Pool Operators: Your pool will be listed once you post a confirmation that you have updated


Code:
int64 static GetBlockValue(int nHeight, int64 nFees, uint256 prevHash)
{
       int64 nSubsidy = 10 * COIN;

       std::string cseed_str = prevHash.ToString().substr(7,7);
       const char* cseed = cseed_str.c_str();
       long seed = hex2long(cseed);
       int rand = generateMTRandom(seed, 800);
       int rand1 = 0;
       int rand2 = 0;
       int rand3 = 0;
       int rand4 = 0;
       int rand5 = 0;
       int rand6 = 0;
       int rand7 = 0;

      
       if(nHeight < 80000)    
       {
               nSubsidy = rand * COIN;
       }



       else if(nHeight < 160000)      
       {
               cseed_str = prevHash.ToString().substr(7,7);
               cseed = cseed_str.c_str();
               seed = hex2long(cseed);
               rand1 = generateMTRandom(seed, 400);
               if(rand1 < 1)
               nSubsidy = rand1 + 1 * COIN;
               else if(rand1 > 1)
               nSubsidy = rand1 * COIN;
       }
       else if(nHeight < 240000)      
       {
               cseed_str = prevHash.ToString().substr(6,7);
               cseed = cseed_str.c_str();
               seed = hex2long(cseed);
               rand2 = generateMTRandom(seed, 300);
               if(rand2 < 2)
               nSubsidy = rand2 + 2 * COIN;
               else if(rand2 > 2)
               nSubsidy = rand2 * COIN;
       }
       else if(nHeight < 320000)      
       {
               cseed_str = prevHash.ToString().substr(7,7);
               cseed = cseed_str.c_str();
               seed = hex2long(cseed);
               rand3 = generateMTRandom(seed, 200);
               if(rand3 < 3)
               nSubsidy = rand3 + 3 * COIN;
               else if(rand3 > 3)
               nSubsidy = rand3 * COIN;
       }
       else if(nHeight < 400000)      
       {
               cseed_str = prevHash.ToString().substr(7,7);
               cseed = cseed_str.c_str();
               seed = hex2long(cseed);
               rand4 = generateMTRandom(seed, 100);
               if(rand4 < 4)
               nSubsidy = rand4 + 4 * COIN;
               else if(rand4 > 4)
               nSubsidy = rand4 * COIN;
       }
       else if(nHeight < 480000)      
       {
               cseed_str = prevHash.ToString().substr(6,7);
               cseed = cseed_str.c_str();
               seed = hex2long(cseed);
               rand5 = generateMTRandom(seed, 50);
               if(rand5 < 5)
               nSubsidy = rand5 + 5 * COIN;
               else if(rand5 > 5)
               nSubsidy = rand5 * COIN;
       }
       else if(nHeight < 560000)      
       {
               cseed_str = prevHash.ToString().substr(7,7);
               cseed = cseed_str.c_str();
               seed = hex2long(cseed);
               rand6 = generateMTRandom(seed, 25);
               if(rand6 < 6)
               nSubsidy = rand6 + 6 * COIN;
               else if(rand6 > 6)
               nSubsidy = rand6 * COIN;
       }
       else if(nHeight < 600000)      
       {
               cseed_str = prevHash.ToString().substr(7,7);
               cseed = cseed_str.c_str();
               seed = hex2long(cseed);
               rand1 = generateMTRandom(seed, 14);
               if(rand7 < 1)
               nSubsidy = rand7 + 7 * COIN;
               else if(rand7 > 7)
               nSubsidy = rand7 * COIN;
       }


        nSubsidy >>= (nHeight / 1000000);

   return nSubsidy;
}



Rolling back to 7408. All vulnerabilities have been closed. Coin now has no flaws. I will post a detailed response on what happened, why it happened, and how it was so easy to do. Thanks to earlz for finding the mystery and MrData for his help with the rollback



   

Pages:
Jump to: