Author

Topic: NXT :: descendant of Bitcoin - Updated Information - page 1751. (Read 2761645 times)

sr. member
Activity: 308
Merit: 250
I know I said it before, but let me repeat this again, now without any guilt:

If I lose your money – tough luck! Go ask Come-from-Beyond why there are no checksums in the system.

I wash my hands.

U should follow my advice how to conduct payments and u'll be safe.

I did this for sending money, however sometimes I get "unknown transaction" errors. I then send the money again, HOWEVER, sometimes the money did go through, so I send a double payment. what should i do to prevent this?
member
Activity: 111
Merit: 10
We don't need BCNext anymore. He kickstarted the snowball with name "Nxt", the rest is our work.

very hard with no leader the snowball can fall from a cliff in a split second

I hope he is not stopping with nxt

hero member
Activity: 490
Merit: 504
I know I said it before, but let me repeat this again, now without any guilt:

If I lose your money – tough luck! Go ask Come-from-Beyond why there are no checksums in the system.

I wash my hands.

How old are you? Smiley This is not the way to operate the exchange.

It's just his OCD talking - that's why he is always so paranoid and frightened. So it gladly isn't the personality issue.
legendary
Activity: 1232
Merit: 1001
How many transactions per day do you suppose MtGox or bitstamp do?  Not the volume in BTC or USD, but how many transactions?


anyone?
sr. member
Activity: 378
Merit: 250
If you want mass adoption, you can't ask people to "follow my advice" to not lose coin.
People will not go on the forum to check your post, so it need to safe, the more possible.

Checksum !

Guys guys, calm down. This way of doing transfers is more exciting. You think James Bond would ask for checksums on a closed-source payment system? No way!
legendary
Activity: 2142
Merit: 1010
Newbie
If you want mass adoption, you can't ask people to "follow my advice" to not lose coin.

This is a special advice for exchange owners. He ought to follow it.

User experience is another story that will end when one of client developers implement a checksum. We could continue the discussion after u point me to that place in Bitcoin protocol where checksum is used.
hero member
Activity: 490
Merit: 504

What kind of project leader suddenly goes silent and abandons his creation like this?  Huh


Satoshi Nakamoto
sr. member
Activity: 392
Merit: 250
I know I said it before, but let me repeat this again, now without any guilt:

If I lose your money – tough luck! Go ask Come-from-Beyond why there are no checksums in the system.

I wash my hands.

U should follow my advice how to conduct payments and u'll be safe.

If you want mass adoption, you can't ask people to "follow my advice" to not lose coin.
People will not go on the forum to check your post, so it need to safe, the more possible.

Checksum !
member
Activity: 98
Merit: 10
I know I said it before, but let me repeat this again, now without any guilt:

If I lose your money – tough luck! Go ask Come-from-Beyond why there are no checksums in the system.

I wash my hands.

How old are you? Smiley This is not the way to operate the exchange.
legendary
Activity: 2142
Merit: 1010
Newbie
I know I said it before, but let me repeat this again, now without any guilt:

If I lose your money – tough luck! Go ask Come-from-Beyond why there are no checksums in the system.

I wash my hands.

U should follow my advice how to conduct payments and u'll be safe.
hero member
Activity: 910
Merit: 1000
I know I said it before, but let me repeat this again, now without any guilt:

If I lose your money – tough luck! Go ask Come-from-Beyond why there are no checksums in the system.

I wash my hands.

Washed hands?

Wow, I am ashamed. It indeed looks like my stupid mistake.
hero member
Activity: 840
Merit: 1002
Simcoin Developer
I know I said it before, but let me repeat this again, now without any guilt:

If I lose your money – tough luck! Go ask Come-from-Beyond why there are no checksums in the system.

I wash my hands.
full member
Activity: 238
Merit: 100
I suggest @info.nxtcrypto link @Luc's BTT post for each client update, so we can do a fast simple comparison with @Luc's post and confirm the sha256sum. If hacker replaced the download file and also replace sha256sum at info.nxtcrypto, it's not so easy to find it, but I think hack those 2 and Luc's account at the same time is more difficult.
See those *.asc files in the http://download.nxtcrypto.org/ directory? Those are GPG signatures of the corresponding zip files. If you download both nxt-client-0.5.3.zip and nxt-client-0.5.3.zip.asc in the same directory, you can run "gpg --verify nxt-client-0.5.3.zip.asc" to verify my signature of the zip package. This gives you one independent way of checking, and a hacker cannot provide a signature for a modified zip package without somehow stealing my private GPG key.

The nxt-client-0.5.3.zip.sha256.txt.asc is again a GPG signed file containing the sha256 sum. You can run "gpg --verify nxt-client-0.5.3.zip.sha256.txt.asc" to verify its content, then run "sha256sum -c nxt-client-0.5.3.zip.sha256.txt.asc" which will say "nxt-client-0.5.3.zip: OK" if the sha256 sum matches (ignore the warning about the extra lines, those are the gpg signature).

Finally, the value of the NRSversion alias on the blockchian contains the sha256 sum of the last stable release.

That gives you quite a few independent ways of verifying the package.


Thank you Luc for your explanation.
legendary
Activity: 1011
Merit: 1006
Tried to send some coins and my client crashed. A few minutes before it i did it successfully.
Here is a log from my client v.0.5.3:

2014-01-09 14:18:43.201:WARN:oejs.ServletHandler:qtp1552615194-299: /nxt
java.lang.IllegalStateException: WRITER
        at org.eclipse.jetty.server.Response.getOutputStream(Response.java:931)
        at Nxt.doGet(Unknown Source)
        at javax.servlet.http.HttpServlet.service(HttpServlet.java:687)
        at javax.servlet.http.HttpServlet.service(HttpServlet.java:790)
        at org.eclipse.jetty.servlet.ServletHolder.handle(ServletHolder.java:696)
        at org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1568)
        at org.eclipse.jetty.servlets.DoSFilter.doFilterChain(DoSFilter.java:457)
        at org.eclipse.jetty.servlets.DoSFilter.doFilter(DoSFilter.java:326)
        at org.eclipse.jetty.servlets.DoSFilter.doFilter(DoSFilter.java:299)
        at org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1539)
        at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:524)
        at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:143)
        at org.eclipse.jetty.security.SecurityHandler.handle(SecurityHandler.java:568)
        at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:221)
        at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1110)
        at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:453)
        at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:183)
        at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1044)
        at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:141)
        at org.eclipse.jetty.server.handler.ContextHandlerCollection.handle(ContextHandlerCollection.java:199)
        at org.eclipse.jetty.server.handler.HandlerCollection.handle(HandlerCollection.java:109)
        at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:97)
        at org.eclipse.jetty.server.Server.handle(Server.java:459)
        at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:280)
        at org.eclipse.jetty.server.HttpConnection.onFillable(HttpConnection.java:229)
        at org.eclipse.jetty.io.AbstractConnection$1.run(AbstractConnection.java:505)
        at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:607)
        at org.eclipse.jetty.util.thread.QueuedThreadPool$3.run(QueuedThreadPool.java:536)
        at java.lang.Thread.run(Unknown Source)
legendary
Activity: 2142
Merit: 1010
Newbie
We know you two are one in the same. Smiley

Hehe, I know that u just guess this. Smiley
legendary
Activity: 2184
Merit: 1000
The mission of the NXT MOBILE APPLICATIONS COMPANY is to facilitate the MAINSTREAM ADOPTION OF THE NXT ECOSYSTEM.



Pls visit the below forums and let us know how you can help.


https://nextcoin.org/index.php/topic,2634.0.html   or

https://forums.nxtcrypto.org/viewtopic.php?f=2&t=467
legendary
Activity: 1232
Merit: 1001
I think BCNext has more important things to do instead of answering hunders of same (or new) stupid (or smart) questions.

I believe that BCNext is actually here doing all that and I am truly afraid that we might be getting close to the day that he STOPS!!!   Undecided

We don't need BCNext anymore. He kickstarted the snowball with name "Nxt", the rest is our work.

We know you two are one in the same. Smiley
sr. member
Activity: 392
Merit: 250
I suggest @info.nxtcrypto link @Luc's BTT post for each client update, so we can do a fast simple comparison with @Luc's post and confirm the sha256sum. If hacker replaced the download file and also replace sha256sum at info.nxtcrypto, it's not so easy to find it, but I think hack those 2 and Luc's account at the same time is more difficult.
See those *.asc files in the http://download.nxtcrypto.org/ directory? Those are GPG signatures of the corresponding zip files. If you download both nxt-client-0.5.3.zip and nxt-client-0.5.3.zip.asc in the same directory, you can run "gpg --verify nxt-client-0.5.3.zip.asc" to verify my signature of the zip package. This gives you one independent way of checking, and a hacker cannot provide a signature for a modified zip package without somehow stealing my private GPG key.

The nxt-client-0.5.3.zip.sha256.txt.asc is again a GPG signed file containing the sha256 sum. You can run "gpg --verify nxt-client-0.5.3.zip.sha256.txt.asc" to verify its content, then run "sha256sum -c nxt-client-0.5.3.zip.sha256.txt.asc" which will say "nxt-client-0.5.3.zip: OK" if the sha256 sum matches (ignore the warning about the extra lines, those are the gpg signature).

Finally, the value of the NRSversion alias on the blockchian contains the sha256 sum of the last stable release.

That gives you quite a few independent ways of verifying the package.


Add to this getting your public key based on "GPG key fingerprint" and it will be nice guide.

And yes, we definitely need nxt-client-latest to automate all this steps
$ gpg --recv-keys FF2A19FA
$ gpg --fingerprint FF2A19FA

Then compare with fingerprint in my profile info.
legendary
Activity: 1232
Merit: 1001
Does transparent forging work through firewalls?
sr. member
Activity: 378
Merit: 250
Brainstorming

I'd like to introduce a concept of a new feature called Account Control. This feature will allow to do different things with ur accounts. For example, u will be able to set a lock on an account to prohibit any outgoing transactions until a special condition met (e.g. an incoming transaction from a predefined account). Another example is Pooled Forging, when an account leases its forging power to another account.

Please, post here what u would like to see in Account Control.

(Not sure if this already part of pooled forging already).
Pooled forging with agreed pro-rata payment to be made at the end of the lease.

Example:
 - I lease 100,000nxt to Bob at an agreed rate of 0.0005 "nxt per day per nxt" (agreement to be reached using nxt network protocol).
 - Whilst leased, the funds aren't available for me to spend or forge with
 - After 3 days I decide I want to buy a car, so I revoke the lease
 - As part of the nxt being returned to my account, I also automatically receive 150 (==0.0005*100000*3) nxt from Bob's account
 - Network ensures that funds to pay all leases is available in the target account (or a separate nominated/linked account), and automatically cancels leases if this situation should arise

So the pool operator takes on all forging risk, and the network ensures users are paid what they're due (so safe for them).

Follow up to this:
 - Auctioning of my forging lease to the highest bidder; one-off, or similar to Amazon's "spot price" where if someone bids higher whilst my forging power is leased to one party the lease automatically gets transferred to the new highest bidder

So, to create a competitive marketplace for forging power.

Jump to: