Author

Topic: NXT :: descendant of Bitcoin - Updated Information - page 1359. (Read 2761650 times)

full member
Activity: 238
Merit: 100
new 9 digit vanity account: 640915453
Code:
{"hallmark":"0eef079d88b20e41c1ac1f0ad7ece8ef94d34a27096d048ed96207ffd5b21f750a0049726f6c6c5568617465640000008a2d330193dfc7fe4c327db84be870b50ec9dc5d7182722f7711db721f7f0f9cc246383d0a94d485da999d1131ad49817ffe2605b07c7b670cfb98c4211e2fcf75e06af443"}
Which vanity engine are you using, the Java version?  Reason that I ask is that some are suspecting the vanity engine in thefts.

If the java client, have you also reviewed this code?  The code I looked at only has the following imports:

import java.math.BigInteger;
import java.nio.charset.Charset;
import java.security.MessageDigest;  <- SHA256 conversion routine
import java.security.SecureRandom;
import java.util.Arrays;
import java.util.Random;
import java.util.concurrent.atomic.AtomicInteger;
import java.util.concurrent.atomic.AtomicLong;
import java.util.regex.Pattern;




I modified jean-lucs java vanity generator to make it search for short accounts.  Im sure its safe since fromhim
newbie
Activity: 22
Merit: 0
I need help with http://wiki.nxtcrypto.org/wiki/How-To:GenerateStrongPassword. I've looked at many sites that describe how to generate strong passwords. I find most unsatisfactory.

The example password "Tammy's#18bdayBIGpartyDroppedshibesweaterinpoolGMasonUsoon:(3yearsislong" on that page is weak.

Generating a NXT password is basically the same problem as creating a Bitcoin private key. bitaddress.org is to my knowledge a fairly trusted site. You can take the private key it generates and use it as your password.

The human brain should not be used to generate a password because it is not a good source of randomness.


newbie
Activity: 35
Merit: 0
Update 3 - Bitcoin Conference Miami

Just had lunch with one of the organizers for the Austin, Texas Bitcoin conference, Jeremy, on March 5-6. Just happened to meet him in the food line and asked if he would like to join me Smiley

http://texasbitcoinconference.com/

We spoke a bit about the conference and they are shooting to be the largest Bitcoin conference in history. I think we need to get a speaker lined up and get them to this conference. Having this contact should help us get our foot in the door and really spread the word about Nxt.

****Action Item****

If I could get the communities help in finding a speaker to represent us at this conference, I will make contact with Jeremy to see if we can get a spot.

Thanks again for everyone's help and will keep updating with more news as it happens!
newbie
Activity: 10
Merit: 0
new 9 digit vanity account: 640915453
Code:
{"hallmark":"0eef079d88b20e41c1ac1f0ad7ece8ef94d34a27096d048ed96207ffd5b21f750a0049726f6c6c5568617465640000008a2d330193dfc7fe4c327db84be870b50ec9dc5d7182722f7711db721f7f0f9cc246383d0a94d485da999d1131ad49817ffe2605b07c7b670cfb98c4211e2fcf75e06af443"}
Which vanity engine are you using, the Java version?  Reason that I ask is that some are suspecting the vanity engine in thefts.

If the java client, have you also reviewed this code?  The code I looked at only has the following imports:

import java.math.BigInteger;
import java.nio.charset.Charset;
import java.security.MessageDigest;  <- SHA256 conversion routine
import java.security.SecureRandom;
import java.util.Arrays;
import java.util.Random;
import java.util.concurrent.atomic.AtomicInteger;
import java.util.concurrent.atomic.AtomicLong;
import java.util.regex.Pattern;

legendary
Activity: 1722
Merit: 1217
However a piece of tape over the camera is simple and foolproof.

They can still hear you fart from the camera's mic though!   Cheesy

well its foolproof for being looked at
sr. member
Activity: 490
Merit: 250
I don't really come from outer space.
full member
Activity: 186
Merit: 100
IDEA

I was whining about "aristocratic" redistribution and ROI limited only to biggest NXT holders getting even richer on poor majority transactions traffic.

BUT! I figured out that there is still a possibility of concentration of NXTs in hand of bigger trusted holder(s) for purpose of proporcional sharing that bigger interest gained this way for profit of many small holders.

I'm shocked that there is a such simple way to solve so fundamental and so irritating problem. Now i don't have the reason to criticise NXT redistribution so much as earlier anymore and i can look at NXT future with much bigger optimism.

(...)

Any feedback on this idea? Any comment? Noone cares that this makes narrow redistribution effects less damaging to common NXTers and make system more democratic? Sad
legendary
Activity: 1722
Merit: 1217
I also posted security warnings at the top of today's summaries to hopefully jolt some people into passphrase safety.

There is an article at Ars Technica which really woke me up to how unsafe some seemingly safe pass-phrases may actually be: How the Bible and YouTube are fueling the next frontier of password cracking -- Crackers tap new sources to uncover "givemelibertyorgivemedeath" and other phrases by Dan Goodin - Oct 8 2013, 9:00am EDT.

That article made me reevaluate and change most of the pass-phrases I had been using on many different sites, including my banks.

In related news: today I discovered one of my collegues had taped off his webcam, because he was "afraid someone might be spying on him", but only snorted when I pointed out that securing his system with a four letter word wasn't all that safe to begin with...  Cheesy

gotta side with your friend on this one. you could have a 200 character password and the nsa could still break in ezpz. heck they can even break into a computer thats turned off. here are some links just to touch the tip of the iceberg

http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html?_r=0

http://www.youtube.com/watch?v=vILAlhwUgIU

http://news.softpedia.com/news/Secret-3G-Radio-in-Every-Intel-vPro-CPU-Could-Steal-Your-Ideas-at-Any-Time-385194.shtml

However a piece of tape over the camera is simple and foolproof.
full member
Activity: 360
Merit: 100
Update #2 from Bitcoin Conference Miami

Leetcoin - "Compete in your favorite games for Bitcoin."

http://www.leetcoin.com/

The first person shooter we saw looked good (see screenshot) I spoke with the CEO. He is very open to the idea of adding in alts such as Nxt, I let him know we have a number of talented developers that could assist with getting a wallet to work.  He's agreed to do a conference call with their CIO, we'll follow-up early next week.

Getting gamers on board would be BIG.


*** Action Item ***

Take a look at the website and simply thank them for meeting with our community member Matt.

[email protected]
king@leetcoin


*** Reminder ***

This is just a first step to discuss possible options but one that's great for Nxt in the competitive gaming market.




Ps

The pic wasn't me, I'll get one up in a bit.


great job!!

talking about nxt in games, we should maybe contact sony and offer nxt for the to-be-released mmo "Everquest Next" (https://www.everquestnext.com/) and ask whether nxt could play a role there xD

legendary
Activity: 1092
Merit: 1010
I also posted security warnings at the top of today's summaries to hopefully jolt some people into passphrase safety.

There is an article at Ars Technica which really woke me up to how unsafe some seemingly safe pass-phrases may actually be: How the Bible and YouTube are fueling the next frontier of password cracking -- Crackers tap new sources to uncover "givemelibertyorgivemedeath" and other phrases by Dan Goodin - Oct 8 2013, 9:00am EDT.

That article made me reevaluate and change most of the pass-phrases I had been using on many different sites, including my banks.

In related news: today I discovered one of my collegues had taped off his webcam, because he was "afraid someone might be spying on him", but only snorted when I pointed out that securing his system with a four letter word wasn't all that safe to begin with...  Cheesy
member
Activity: 98
Merit: 10
There is an article at Ars Technica which really woke me up to how unsafe some seemingly safe pass-phrases may actually be: How the Bible and YouTube are fueling the next frontier of password cracking -- Crackers tap new sources to uncover "givemelibertyorgivemedeath" and other phrases.

That article made me reevaluate and change most of the pass-phrases I had been using on many different sites, including my banks.

I need help with http://wiki.nxtcrypto.org/wiki/How-To:GenerateStrongPassword. I've looked at many sites that describe how to generate strong passwords. I find most unsatisfactory. They're either outdated, or just instruction lists that don't explain rationales. The requirements for Nxt passwords are orders of magnitude greater than what folks will be used to for other applications; I'd like people to understand why they need to be as careful as they should be, rather than mindlessly following instructions.

EDIT: Everyone, feel free to edit, and especially comment in the Discussion page. We need to use the wiki Talk pages more. Editors also need to know the rationale behind why pages are structured and written as they are, rather than simply piling on edits!
sr. member
Activity: 490
Merit: 250
I don't really come from outer space.
I also posted security warnings at the top of today's summaries to hopefully jolt some people into passphrase safety.

There is an article at Ars Technica which really woke me up to how unsafe some seemingly safe pass-phrases may actually be: How the Bible and YouTube are fueling the next frontier of password cracking -- Crackers tap new sources to uncover "givemelibertyorgivemedeath" and other phrases by Dan Goodin.

That article made me reevaluate and change most of the pass-phrases I had been using on many different sites, including my banks.
full member
Activity: 184
Merit: 100

No, i didn't. Also i am 100% sure, that i had no compromised client.

but you used a vanitygenerator, maybe even a closed source one.
legendary
Activity: 1092
Merit: 1010
I am pleased to say that Nxt convinced me to move away from a Windows platform completely.

The amount of work it takes to be reasonably sure that it isn't infected with something or other has been nagging at me for weeks now.

Moved over to a Linux environment now.

I also posted security warnings at the top of today's summaries to hopefully jolt some people into passphrase safety.

full member
Activity: 221
Merit: 100
Update #2 from Bitcoin Conference Miami

Leetcoin - "Compete in your favorite games for Bitcoin."

http://www.leetcoin.com/

The first person shooter we saw looked good (see screenshot) I spoke with the CEO. He is very open to the idea of adding in alts such as Nxt, I let him know we have a number of talented developers that could assist with getting a wallet to work.  He's agreed to do a conference call with their CIO, we'll follow-up early next week.

Getting gamers on board would be BIG.


*** Action Item ***

Take a look at the website and simply thank them for meeting with our community member Matt.

[email protected]
king@leetcoin


*** Reminder ***

This is just a first step to discuss possible options but one that's great for Nxt in the competitive gaming market.

Ps

The pic wasn't me, I'll get one up in a bit.


+1000. Thanks!
legendary
Activity: 1680
Merit: 1001
CEO Bitpanda.com
Client 0.5.10 stood on the local machine.
My purse number 378082518108298527.
Coin purse went to 13664022353450653976.
Password length of 32 characters (5 words).
Use uppercase and lowercase letters.
Client rocked by reference to the first village,
https://bitcointalksearch.org/topic/m.4690322 # msg4690322
Hash check.

This is getting more and more disturbing! What's happening?



Cracking 5 words is cracking 5 x 1 word

lol.... It isn't.

Other than that, i feel like this is appearing far too often for it to be random.
5xxk NXT stolen
108k NXT stolen
12,5k NXT stolen

All have the same pattern (thus being not related to EpicThomas)

Before we go into panic modes, wasn't the red line of them all that they used passwords that weren't really strong?
3 of those accounts were mine, and i posted those passwords already here. They were ~60 digits hashes, that were randomly created by the Keepass 2 algo.

Twin,, didnt you admit that you used the compromised client?

No, i didn't. Also i am 100% sure, that i had no compromised client.
full member
Activity: 140
Merit: 100
Let me understand this....
The guy who created this thing started with 1 billion coins.
Let's assume that he shared that 1 billion coins with 99 other people
that would give each of them 10 million coins.
Even assuming that he managed to get the price to only $0.01, he has already made $100,000 off of that.
and it's closer to 0.07.  And I know for a fact that he didn't give 99% of the coins away to other people.
Does this seem fair to you?

The hangup on the initial distribution is just ridiculous. Why don't you go to your bank, your employer, Amazon.com and tell them all you want their rates from 10 years ago? Meaning all the costs from 10 years ago with all the reward of today.
I am not an original stakeholder but I see no issue with the gains. It was all very uncertain and a big risk then. If nxt was only worth $0.00001 no one would be complaining about this but because someone, somewhere made money and you didn't they have to be up to no good. You are greedy, not BCNext or the stakeholders.
Jump to: