Pages:
Author

Topic: Offline mining? (Read 16685 times)

rjk
sr. member
Activity: 448
Merit: 250
1ngldh
April 29, 2012, 07:56:37 PM
#51
Edit:  In short, couldn't you simply have a computer take the hashing algorithm, process it offline, save the results of the work, connect to the network, then dump all the results at once?


Blocks are linked. You need the previous block to calculate the nonce (which includes a hash of the previous block). Thats why you cant mine offline for longer than ~10 minutes. After 10 minutes you are essentially forking.

^^ This answers te orignal question.

May I ask what is your goal? Are you trying to save bandwidth? Looking to 'mask' the reporting daemon? Trying to minimize net exposure?

Well, I may have access to 2 T/hash under certain conditions, and hashing offline may be one of those conditions.

I'd be interested in whatever came of this... MysteryMiner?
rjk
sr. member
Activity: 448
Merit: 250
1ngldh
January 12, 2012, 09:01:30 AM
#50
I think it is entirely possible that the government MAFIAA Iran rich folks of this world might have access to SHA256 cracking monsters, and that the market for such devices is only just starting to be realized. Such a device could be re-purposed (with a little work) to mine coins when it isn't being used for cracking passwords legit purposes.
hero member
Activity: 504
Merit: 500
January 12, 2012, 07:56:01 AM
#49
What a load of crap
And its amazing some of you guys actually believe

Is there a need to believe anything when we're discussing a theoretical idea in the first place?

If nothing else, I desire to have a convo about this type of layout because I would also have interest in utilizing such a configuration for the security of my future mining ops.



P.S. Would you like a hug?
full member
Activity: 168
Merit: 100
January 12, 2012, 07:42:24 AM
#48
What a load of crap
And its amazing some of you guys actually believe he has a legitimate access to such computational power.

Op, you really think you can feed me with BS? read your last fcking thread about stealing then tell me you're doing a right thing this time.

When a guy got no fcking clue of what hes doing, its easy to catch his lies/bs.

hero member
Activity: 504
Merit: 500
January 07, 2012, 10:17:59 PM
#47
bitcoin network
  \|/
my bitcoind w/ static ip x.x.x.x <-- addnode=y.y.y.y
   |
(the internet)
   |
firewall <-- allow x.x.x.x:8333-y.y.y.y:8333 (bitcoin binary protocol)
   |
bitcoind w/ static ip y.y.y.y <-- connect x.x.x.x:8333 (only one outbound connection)
   |
firewall <-- allow z.z.z.z:8332-y.y.y.y:8332 (bitcoin rpc protocol)
   |
(my internal network)
   |
poolserver w/ static ip z.z.z.z
 /|\
mystery hash monsters

Thats exactly what I envision.  Am hoping he will update soon with having the server pc he is going to use for this so we can move on form there with tweaking it out.
sr. member
Activity: 266
Merit: 254
January 07, 2012, 09:37:14 PM
#46
bitcoin network
  \|/
my bitcoind w/ static ip x.x.x.x <-- addnode=y.y.y.y
   |
(the internet)
   |
firewall <-- allow x.x.x.x:8333-y.y.y.y:8333 (bitcoin binary protocol)
   |
bitcoind w/ static ip y.y.y.y <-- connect x.x.x.x:8333 (only one outbound connection)
   |
firewall <-- allow z.z.z.z:8332-y.y.y.y:8332 (bitcoin rpc protocol)
   |
(my internal network)
   |
poolserver w/ static ip z.z.z.z
 /|\
mystery hash monsters

rjk
sr. member
Activity: 448
Merit: 250
1ngldh
January 06, 2012, 10:10:58 AM
#45
I can haz botnet?  Grin
sr. member
Activity: 256
Merit: 250
January 04, 2012, 06:56:48 AM
#44
Quote
Exactly.  Outside of Bitcoin nothing needs to perform trillions of hashes per second.

Password recovery and SL3 unlocking for sure does. Actually I would not be surprised if overall more computing resources are thrown at SL3 rather than bitcoin. It's more profitable overall.
donator
Activity: 1218
Merit: 1079
Gerald Davis
January 03, 2012, 05:38:16 PM
#43

Yes.  I am not sure of the exact computational power of the machines I am interested in using.  It actually may be a very poor estimation because I am guessing based on petaflop output which, to my knowledge, is more or less irrational.

Regardless, it's a shit-ton of power.

FLOPs are floating point operations. If you can get access to a supercomputer thats any good at flops, it will almost certainly stink when it comes to sha256 hashing (integer). A typical TOP500 supercomputer may have trouble delivering higher hashrates than your typical 3x dual GPU mining rig

From what I was told, the machines I am interested in using are often used for sha256 hashing.
Unless they have GPU's, it doesn't really matter.  P4man is right - you'll get hashes on the order of GH/s, not TH/s.  They may often be used for sha256 hashing, but 12 GH/s is quite enough for most sha256 hashing needs.  It's just not a whole lot when used for Bitcoin mining.

But good luck.  I only hope you DON'T have 2 TH/s, because I would hate to see my own miniscule mining profits drop by 20% overnight.  Do tell us whether it works out for you though.

Exactly.  Outside of Bitcoin nothing needs to perform trillions of hashes per second.

1 GH = 2 billion hashes per second (Bitcoin is a double hash).  

Say you have a login server w/ passwords hashed as SHA-256.  Now everyone on the planet needs to login and they might all login at the same exact second.  Assuming you had fast enough disks, network, memory, etc you would "only" need roughly 4 GH to allow global simultaneous login of every human living (including those without computers or electricity "just in case").

That's just 4 GH.  Terra hash would be 250 times that.

I won't do the math but the same terra-scale factors apply to VPN/IPsec, digital signatures, document analysis, data sorting, deduplication, and other applications for hashing functions.
legendary
Activity: 1834
Merit: 1020
January 03, 2012, 04:49:53 PM
#42

Yes.  I am not sure of the exact computational power of the machines I am interested in using.  It actually may be a very poor estimation because I am guessing based on petaflop output which, to my knowledge, is more or less irrational.

Regardless, it's a shit-ton of power.

FLOPs are floating point operations. If you can get access to a supercomputer thats any good at flops, it will almost certainly stink when it comes to sha256 hashing (integer). A typical TOP500 supercomputer may have trouble delivering higher hashrates than your typical 3x dual GPU mining rig

From what I was told, the machines I am interested in using are often used for sha256 hashing.
Unless they have GPU's, it doesn't really matter.  P4man is right - you'll get hashes on the order of GH/s, not TH/s.  They may often be used for sha256 hashing, but 12 GH/s is quite enough for most sha256 hashing needs.  It's just not a whole lot when used for Bitcoin mining.

But good luck.  I only hope you DON'T have 2 TH/s, because I would hate to see my own miniscule mining profits drop by 20% overnight.  Do tell us whether it works out for you though.

No prob.  I should be meeting with some colleagues to discuss everything this weekend.
legendary
Activity: 1400
Merit: 1005
January 03, 2012, 04:48:20 PM
#41

Yes.  I am not sure of the exact computational power of the machines I am interested in using.  It actually may be a very poor estimation because I am guessing based on petaflop output which, to my knowledge, is more or less irrational.

Regardless, it's a shit-ton of power.

FLOPs are floating point operations. If you can get access to a supercomputer thats any good at flops, it will almost certainly stink when it comes to sha256 hashing (integer). A typical TOP500 supercomputer may have trouble delivering higher hashrates than your typical 3x dual GPU mining rig

From what I was told, the machines I am interested in using are often used for sha256 hashing.
Unless they have GPU's, it doesn't really matter.  P4man is right - you'll get hashes on the order of GH/s, not TH/s.  They may often be used for sha256 hashing, but 12 GH/s is quite enough for most sha256 hashing needs.  It's just not a whole lot when used for Bitcoin mining.

But good luck.  I only hope you DON'T have 2 TH/s, because I would hate to see my own miniscule mining profits drop by 20% overnight.  Do tell us whether it works out for you though.
legendary
Activity: 1834
Merit: 1020
January 03, 2012, 04:41:43 PM
#40

Yes.  I am not sure of the exact computational power of the machines I am interested in using.  It actually may be a very poor estimation because I am guessing based on petaflop output which, to my knowledge, is more or less irrational.

Regardless, it's a shit-ton of power.

FLOPs are floating point operations. If you can get access to a supercomputer thats any good at flops, it will almost certainly stink when it comes to sha256 hashing (integer). A typical TOP500 supercomputer may have trouble delivering higher hashrates than your typical 3x dual GPU mining rig

From what I was told, the machines I am interested in using are often used for sha256 hashing.
hero member
Activity: 518
Merit: 500
January 03, 2012, 04:37:15 PM
#39

Yes.  I am not sure of the exact computational power of the machines I am interested in using.  It actually may be a very poor estimation because I am guessing based on petaflop output which, to my knowledge, is more or less irrational.

Regardless, it's a shit-ton of power.

FLOPs are floating point operations. If you can get access to a supercomputer thats any good at flops, it will almost certainly stink when it comes to sha256 hashing (integer). A typical TOP500 supercomputer may have trouble delivering higher hashrates than your typical 3x dual GPU mining rig.

Okay slight exaggeration perhaps, but not much; the top 250 supercomputer uses 12K xeon cores, which would roughly produce 12GH/s. Thats still only as good as ~6 good mining rigs.
legendary
Activity: 1834
Merit: 1020
January 03, 2012, 01:51:08 AM
#38
*takes his rabbies shot and offers Plastic.Elastic a hug*

Helping him to steal isnt exactly how you should show your intelligence. If he must ask these questions he sure doesnt know jack and will be caught easily.

Although I have not devoted a whole lot of thought to 'how is this person accessing 2TH worth of computing power', it seems atleast somewhat 'legit'. I would sure hope he is not stealing anything. Some basic things that lead me to believe it are that he will need physical access for any of my suggestions. His concern of limiting the Internet exposure of the machines is more in line with needing to be able to ensure the security of them more so than to 'hide'. I mean, any network admin on the planet would notice the usage...

If he must ask, he may not be ready for such a project but 'being caught' implies doing something wrong to begin with. Otherwise such an ambitous project is good in excercise to learn from if nothing else.

Whether you are just being antagonistic with implying I am being helpful to show my intelligence, I do not know. But my IQ is really quite low as far as I can tell.

And if it is real, then in the grand scheme of things another ~2TH only goes to further strengthen the network as a whole. That being my main motivator beyond just being helpful, if only mildly helpful.

cheers

Your assumption about ensuring the security of the machines is correct.  You could say I'm trying to hide the machines from others who might wish to steal.

And yes, I hope to learn a lot from this whether I succeed or fail.

Interesting.  Going to watch this thread.

By my estimation, 2 THash/sec is about 5000 moderately high end GPUs, or several times that number of GPUs if they are the sort that normally end up in supercomputers, and needs a large fraction of a megawatt of power (at least).  It is also larger than most pools.

Yes.  I am not sure of the exact computational power of the machines I am interested in using.  It actually may be a very poor estimation because I am guessing based on petaflop output which, to my knowledge, is more or less irrational.

Regardless, it's a shit-ton of power.
kjj
legendary
Activity: 1302
Merit: 1026
January 03, 2012, 01:36:01 AM
#37
*takes his rabbies shot and offers Plastic.Elastic a hug*

Helping him to steal isnt exactly how you should show your intelligence. If he must ask these questions he sure doesnt know jack and will be caught easily.

Although I have not devoted a whole lot of thought to 'how is this person accessing 2TH worth of computing power', it seems atleast somewhat 'legit'. I would sure hope he is not stealing anything. Some basic things that lead me to believe it are that he will need physical access for any of my suggestions. His concern of limiting the Internet exposure of the machines is more in line with needing to be able to ensure the security of them more so than to 'hide'. I mean, any network admin on the planet would notice the usage...

If he must ask, he may not be ready for such a project but 'being caught' implies doing something wrong to begin with. Otherwise such an ambitous project is good in excercise to learn from if nothing else.

Whether you are just being antagonistic with implying I am being helpful to show my intelligence, I do not know. But my IQ is really quite low as far as I can tell.

And if it is real, then in the grand scheme of things another ~2TH only goes to further strengthen the network as a whole. That being my main motivator beyond just being helpful, if only mildly helpful.

cheers

Your assumption about ensuring the security of the machines is correct.  You could say I'm trying to hide the machines from others who might wish to steal.

And yes, I hope to learn a lot from this whether I succeed or fail.

Interesting.  Going to watch this thread.

By my estimation, 2 THash/sec is about 5000 moderately high end GPUs, or several times that number of GPUs if they are the sort that normally end up in supercomputers, and needs a large fraction of a megawatt of power (at least).  It is also larger than most pools.
legendary
Activity: 1834
Merit: 1020
January 02, 2012, 04:24:26 PM
#36
*takes his rabbies shot and offers Plastic.Elastic a hug*

Helping him to steal isnt exactly how you should show your intelligence. If he must ask these questions he sure doesnt know jack and will be caught easily.

Although I have not devoted a whole lot of thought to 'how is this person accessing 2TH worth of computing power', it seems atleast somewhat 'legit'. I would sure hope he is not stealing anything. Some basic things that lead me to believe it are that he will need physical access for any of my suggestions. His concern of limiting the Internet exposure of the machines is more in line with needing to be able to ensure the security of them more so than to 'hide'. I mean, any network admin on the planet would notice the usage...

If he must ask, he may not be ready for such a project but 'being caught' implies doing something wrong to begin with. Otherwise such an ambitous project is good in excercise to learn from if nothing else.

Whether you are just being antagonistic with implying I am being helpful to show my intelligence, I do not know. But my IQ is really quite low as far as I can tell.

And if it is real, then in the grand scheme of things another ~2TH only goes to further strengthen the network as a whole. That being my main motivator beyond just being helpful, if only mildly helpful.

cheers

Your assumption about ensuring the security of the machines is correct.  You could say I'm trying to hide the machines from others who might wish to steal.

And yes, I hope to learn a lot from this whether I succeed or fail.
legendary
Activity: 1834
Merit: 1020
January 02, 2012, 04:20:47 PM
#35
DeathandTexas and Sadpandatech - I admit I have some research and consulting with others to do to understand the importance of your advice.  I need to construct a working model in my head of exactly what this will entail.  Thanks for the help! Smiley

Plastic.Elastic - What do you do to relax?  Electricity is "free" as defined by my lease.  I don't need your definition.

Is this 2TH/s computing also "free" in... -i dont know- your tuition fee?

Not only you're stupid, you're lack of morals .... a great combo of failure



I never said the 2 TH/s is free.  But it's cheap enough that I could stand to make a few grand every day.  Me gaining access to these 2 TH/s would mean a priori approval by the entity[ies] controlling the 2 TH/s.

And, I believe the two fine gentlemen helping me may have identified some ways that will allow me to have my request approved.

It's called being sociable, forming good relationships, and establishing connections.  Try it sometime.  Like I said, if this eventually works, I will handsomely reward both of them for their help.  No guarantees it will, though.

hero member
Activity: 504
Merit: 500
January 02, 2012, 04:14:23 PM
#34
*takes his rabbies shot and offers Plastic.Elastic a hug*

Helping him to steal isnt exactly how you should show your intelligence. If he must ask these questions he sure doesnt know jack and will be caught easily.

Although I have not devoted a whole lot of thought to 'how is this person accessing 2TH worth of computing power', it seems atleast somewhat 'legit'. I would sure hope he is not stealing anything. Some basic things that lead me to believe it are that he will need physical access for any of my suggestions. His concern of limiting the Internet exposure of the machines is more in line with needing to be able to ensure the security of them more so than to 'hide'. I mean, any network admin on the planet would notice the usage...

If he must ask, he may not be ready for such a project but 'being caught' implies doing something wrong to begin with. Otherwise such an ambitous project is good in excercise to learn from if nothing else.

Whether you are just being antagonistic with implying I am being helpful to show my intelligence, I do not know. But my IQ is really quite low as far as I can tell.

And if it is real, then in the grand scheme of things another ~2TH only goes to further strengthen the network as a whole. That being my main motivator beyond just being helpful, if only mildly helpful.

cheers
legendary
Activity: 1834
Merit: 1020
January 02, 2012, 04:14:11 PM
#33
aye, Poolservj has work caching, etc. Without using it I am guessing. But it appears it can be set to only send new works on block changes. It also forms the getwork request localy, freeing up resource use on the bitcoind itself.

for C it does have idle detection but I believe it is capable of being on or off.

Best way to find out is get a box setup with VM and run bitcoind/PSJ and break out the ol ethereal on it. Slap as many mining instances as you can pointing at it. You can run multiple miners on one GPU for example to help simulate multiple connections. Get a few hours run and observe your packet counts and system loads and multiply it up.



*takes his rabbies shot and offers Plastic.Elastic a hug*

Helping him to steal isnt exactly how you should show your intelligence. If he must ask these questions he sure doesnt know jack and will be caught easily.


Stop fabricating things when it's obvious that you have absolutely no clue as to what I'm planning.

You should watch your language and your accusations of me 'stealing.'   I don't steal anything. 
full member
Activity: 168
Merit: 100
January 02, 2012, 03:55:54 PM
#32
aye, Poolservj has work caching, etc. Without using it I am guessing. But it appears it can be set to only send new works on block changes. It also forms the getwork request localy, freeing up resource use on the bitcoind itself.

for C it does have idle detection but I believe it is capable of being on or off.

Best way to find out is get a box setup with VM and run bitcoind/PSJ and break out the ol ethereal on it. Slap as many mining instances as you can pointing at it. You can run multiple miners on one GPU for example to help simulate multiple connections. Get a few hours run and observe your packet counts and system loads and multiply it up.



*takes his rabbies shot and offers Plastic.Elastic a hug*

Helping him to steal isnt exactly how you should show your intelligence. If he must ask these questions he sure doesnt know jack and will be caught easily.
Pages:
Jump to: