Pages:
Author

Topic: PRIMEDICE COMPROMISED [RESOLVED] (Read 4204 times)

newbie
Activity: 7
Merit: 0
January 05, 2017, 03:30:21 AM
Looks like Stunna will probably never reply to me again.

Oh well. Atleast you get your funds back. Nice one mate  Smiley
member
Activity: 84
Merit: 10
Javascript developer, Available for work
January 05, 2017, 02:59:00 AM
Stunna has promised to refund my losses and fix the issues on their website. Marking this as resolved and will lock this thread in a couple of hours. A lot of people have contributed to this thread. Thanks.
hero member
Activity: 826
Merit: 500
January 04, 2017, 08:00:14 PM
ouch sorry to hear that Sad
member
Activity: 84
Merit: 10
Javascript developer, Available for work
January 04, 2017, 06:42:27 PM
Just as a test and never touched the account but it took me 12 minutes to brute force a btcpop.co account (it had no 2fa engaged)
There is no denying that passwords can be bruteforced and if you managed to do so then the password you used must have been weak.
 Would you be able to crack some of these passwords?


A good password with alphanumerics and symbols would look similar to these:
  • n
  • 937/o=92sW/G{5c
  • ~(=0,548_"2"/Ga
  • kZs75Upu]48j?6q
Anyway I don't see that this discussion is leading us somewhere. Stunna claims that this case has nothing to do with PD's security.
convertekk says otherwise - we reached a stalemate here.


Three things here-

-When a user is playing with one ip address, its highly unlikely that he'd login to another ip at the same time. A possible 10 minute delay check between login to login would have prevented this from happening.
- If a user enters wrong passwords for more than, say 5 times, his account should have been locked for the next 10 or 15 minutes and the user should be notified over email stating that the login attempt from the particular ip failed. Even bitcointalk.org does that. Locking the account after 5 wrong attempts would definitely not result in false positives as Ryan was stating.
- Protect your site from DDOS and Bruteforce attacks. That's a must.

Still nothing to do with security ?
legendary
Activity: 1288
Merit: 1000
January 04, 2017, 06:35:21 PM
Just as a test and never touched the account but it took me 12 minutes to brute force a btcpop.co account (it had no 2fa engaged)
There is no denying that passwords can be bruteforced and if you managed to do so then the password you used must have been weak.
 Would you be able to crack some of these passwords?


A good password with alphanumerics and symbols would look similar to these:
  • n
  • 937/o=92sW/G{5c
  • ~(=0,548_"2"/Ga
  • kZs75Upu]48j?6q
Anyway I don't see that this discussion is leading us somewhere. Stunna claims that this case has nothing to do with PD's security.
convertekk says something competently different - we reached a stalemate here.
legendary
Activity: 1036
Merit: 1000
January 04, 2017, 06:10:36 PM
Just as a test and never touched the account but it took me 12 minutes to brute force a btcpop.co account (it had no 2fa engaged)
member
Activity: 84
Merit: 10
Javascript developer, Available for work
January 04, 2017, 06:07:30 PM
When using any site that handles bitcoin like mine you have the chance to lock a bitcoin address for withdrawals and you need to confirm it by email your sent

one among lot of other ways to protect the user. But, that is, if they have the intent to protect their users at all.
member
Activity: 84
Merit: 10
Javascript developer, Available for work
January 04, 2017, 06:06:35 PM
You know what guys, I don't want to waste any time of mine as well.
Good to know, apologies for your loss.

If you want to prevent people from replying to the topic you can press the 'Lock Topic' link in the bottom left hand corner of the page. I suggest you do this, else it will likely continue to be brought up.

I'll just wait for Stunna's reply and resolution before locking the topic.
legendary
Activity: 1036
Merit: 1000
January 04, 2017, 05:50:34 PM
When using any site that handles bitcoin like mine you have the chance to lock a bitcoin address for withdrawals and you need to confirm it by email your sent
legendary
Activity: 2352
Merit: 1267
In Memory of Zepher
January 04, 2017, 05:47:36 PM
You know what guys, I don't want to waste any time of mine as well.
Good to know, apologies for your loss.

If you want to prevent people from replying to the topic you can press the 'Lock Topic' link in the bottom left hand corner of the page. I suggest you do this, else it will likely continue to be brought up.
member
Activity: 84
Merit: 10
Javascript developer, Available for work
January 04, 2017, 05:36:39 PM
You know what guys, I don't want to waste any time of mine as well.

Stunna, you refund my losses as you have mentioned, and make your website a little more secure possibly for the sake of your users and your own good. We are done.
legendary
Activity: 2352
Merit: 1267
In Memory of Zepher
January 04, 2017, 05:18:59 PM
a password with alphanumerics and symbols is easy to guess for a machine in a few hundred tries ? LOL. arguing with you on this will be an insult to my intelligence.
You literally changed the word 'Password' to have some well known symbol replacements and added a p at the beginning. It wouldn't surprise me if these sorts of passwords were targeted specifically by some attackers.
A good password with alphanumerics and symbols would look similar to these:
  • n
  • 937/o=92sW/G{5c
  • ~(=0,548_"2"/Ga
  • kZs75Upu]48j?6q
Notice how none of those passwords follow any sort of structure/pattern? They do not resemble any dictionary words (unlike yours), they do not have any predictable characters in there (unlike yours) and alphanumerics and symbols are scattered randomly in each password (unlike yours).

Any website you store funds on is dangerous ? Please tell me if you own any websites, I'll not even come near to it.
None that you store funds on for that exact reason.
By storing funds on a website you are literally giving them your money. If they have poor security or get greedy there is absolutely nothing stopping them from running off or losing your money. That is something that could only have been helped by not storing funds on a website. Of course, I do not think that PD or Bustabit have a problem with either of these.

If PD is allowing hackers to guess user's passwords using trial and error, isn't that a problem ?
It is. An inherent problem that comes into play with almost every website that uses accounts with passwords.

Where does the point of apology come into picture then ?
You are trying to frame Stunna/PD for a problem that isn't their fault. It's disrespectful at best, and deserves an apology.
Not that anyone here should expect one from you; you seem too deluded by your own faulty logic to realize you have done anything wrong.



snip
I suggest that you try to understand this; he is absolutely correct.
member
Activity: 84
Merit: 10
Javascript developer, Available for work
January 04, 2017, 05:05:31 PM


Your whole thread is about problems in PrimeDice, while in reality it's simply a case of you using a trivially guessable password (to anyone who looked up how you pick passwords on a password leak site).

If PD is allowing hackers to guess user's passwords using trial and error, isn't that a problem ? Stunna himself accepted that and was willing to enable 2FA for withdrawals. Where does the point of apology come into picture then ?
member
Activity: 84
Merit: 10
Javascript developer, Available for work
January 04, 2017, 05:03:13 PM
My password was pP@$$w0rd and it's definitely unique to this site.
That password is insanely easy to guess. A machine could probably come up with that password in a few hundred tries.

you tell me that this a password that could be guessed by a random guy in less than 10 minutes, I have nothing to say to you.
Do you really think that passwords are brute-forced by hand? You really don't know much about this stuff, do you?

Do we get the edit history on that comment please ? I'm pretty sure the "after changing it on primedice" was added later. Just like how he changed the words "blatant lies" to "simply untrue"
Regardless, did it not come to mind that if you're posting your password in a public place you should change it?

You keep fighting on his behalf asking me to owe an apology for the money I lost.
Because Stunna/PD has done nothing wrong. You accusing him of doing such is not fair. You lost the money because your account security was bad - deal with the loss and learn from it in the future.

for pointing a potential security loophole ?
You are the security loophole. Make a password that isn't stupidly easy for a machine to guess and you will no longer have these problems.



It really is dangerous  Angry Angry Angry
Any website you store funds on is dangerous for many reasons. Provided you trust the website and use a strong password this danger can be mitigated.

where are you guys popping from ? Are you the army the other guy who lost his money was referring to ? a password with alphanumerics and symbols is easy to guess for a machine in a few hundred tries ? LOL. arguing with you on this will be an insult to my intelligence.

Any website you store funds on is dangerous ? Please tell me if you own any websites, I'll not even come near to it. I've already added primedice and bustabit to that list but if you have any, please feel free to add that to my list.
legendary
Activity: 2352
Merit: 1267
In Memory of Zepher
January 04, 2017, 04:57:58 PM
My password was pP@$$w0rd and it's definitely unique to this site.
That password is insanely easy to guess. A machine could probably come up with that password in a few hundred tries.

you tell me that this a password that could be guessed by a random guy in less than 10 minutes, I have nothing to say to you.
Do you really think that passwords are brute-forced by hand? You really don't know much about this stuff, do you?

Do we get the edit history on that comment please ? I'm pretty sure the "after changing it on primedice" was added later. Just like how he changed the words "blatant lies" to "simply untrue"
Regardless, did it not come to mind that if you're posting your password in a public place you should change it?

You keep fighting on his behalf asking me to owe an apology for the money I lost.
Because Stunna/PD has done nothing wrong. You accusing him of doing such is not fair. You lost the money because your account security was bad - deal with the loss and learn from it in the future.

for pointing a potential security loophole ?
You are the security loophole. Make a password that isn't stupidly easy for a machine to guess and you will no longer have these problems.



It really is dangerous  Angry Angry Angry
Any website you store funds on is dangerous for many reasons. Provided you trust the website and use a strong password this danger can be mitigated.
full member
Activity: 140
Merit: 100
January 04, 2017, 04:54:49 PM
It really is dangerous  Angry Angry Angry
member
Activity: 84
Merit: 10
Javascript developer, Available for work
January 04, 2017, 04:46:06 PM
The real concern was the lost money and his behavior towards a user who loses money on their site. "Share your password, to the public, I'll refund your loss" and then gone. disappears.

I was actually the one who originally asked you to share your password (after you changed it) so we could see if it was a secure password or not (like you claimed).


coming to your own conclusions and asking me to owe an apology for what primedice did to me ? WOW!! Care to explain how you came to that conclusion ?

Your whole thread is about problems in PrimeDice, while in reality it's simply a case of you using a trivially guessable password (to anyone who looked up how you pick passwords on a password leak site).

I'm telling you that I don't use that pattern elsewhere. You keep fighting on his behalf asking me to owe an apology for the money I lost. Why should I go through this mental trauma fighting a hundred guys here for pointing a potential security loophole ?
member
Activity: 84
Merit: 10
Javascript developer, Available for work
January 04, 2017, 04:41:46 PM
Do we get the edit history on that comment please ? I'm pretty sure the "after changing it on primedice" was added later. Just like how he changed the words "blatant lies" to "simply untrue"

Comments that are edited after a threshold (5 minutes I think) look like this:

https://imgur.com/a/BOWYt

(that's my post, for testing)

And you can hover over it, to see the edit time.

However, Stunna's was never edited (at least after the threshold)


Before threshold or after threshold. You simply shouldn't force someone to share their passwords on a public forum. He called me a blatant liar after wasting 3 days of time. I had to share it to prove my point right ? Also, that account is not worth a penny to me anymore. So, I wouldn't mind retrieving it. Its just that someone would be misusing that account to get a higher faucet(its currently at 3.2K) and it's Stunna's loss. You could simply reset the hash and share the reset password with me over PM to simply hand over my account to myself instead of playing a blame game.

The real concern was the lost money and his behavior towards a user who loses money on their site. "Share your password, to the public, I'll refund your loss" and then gone. disappears.
member
Activity: 84
Merit: 10
Javascript developer, Available for work
January 04, 2017, 04:29:52 PM
My password was pP@$$w0rd and it's definitely unique to this site. you tell me that this a password that could be guessed by a random guy in less than 10 minutes, I have nothing to say to you. and guys, do google it and tell me if you find it.

Also it seems that P@$$w0rd is a suffix you use for many of your password? So pP@$$w0rd means "primedice password"?  If people know a bunch of your other passwords, and then trying to guess your PrimeDice password ... you're not exactly making it hard Cheesy

I really think you owe PrimeDice an apology for this whole thing, and use it as a cheap lesson on the importance of using a password manager  Grin




coming to your own conclusions and asking me to owe an apology for what primedice did to me ? WOW!! Care to explain how you came to that conclusion ?
member
Activity: 84
Merit: 10
Javascript developer, Available for work
January 04, 2017, 04:27:51 PM
feel free to post it here (after changing it on primedice) and close this discussion.

He forced me to share the password on this thread.

:sigh:

Do we get the edit history on that comment please ? I'm pretty sure the "after changing it on primedice" was added later. Just like how he changed the words "blatant lies" to "simply untrue"
Pages:
Jump to: