Author

Topic: Wall Observer BTC/USD - Bitcoin price movement tracking & discussion - page 8308. (Read 26710773 times)

legendary
Activity: 2184
Merit: 1540
JJG is silent....

No I am not.

 Cheesy Cheesy Cheesy Cheesy


Just have some things that I am doing, which causes me to not be able to talk as much with my fingers.   Tongue Tongue

Mrs Jay bossing you around at home? Tongue
legendary
Activity: 2145
Merit: 1660
We choose to go to the moon
Well looks like Pence will be the person who will run point on the virus outbreak.

We're screwed. But at least he will prey for us.

Pff. What's the worst that could happen?

member
Activity: 165
Merit: 10
Bitcoin price forecast. The next target should be on the 1st March! Maybe a day more or less. The pivot should be on the 1st of March! Good luck!
legendary
Activity: 3234
Merit: 1130
Leading Crypto Sports Betting & Casino Platform
- Leaked documents reveal coronavirus infections up to 52 times higher than reported figures in China’s Shandong province.

the problem of politicians is that even when there is a serious situation they continue to lie, I do not believe in the numbers that the Chinese government keeps talking. the situation is probably much more serious and china continues to lie about the numbers of dead and infected
legendary
Activity: 2242
Merit: 3523
Flippin' burgers since 1163.
JUST IN: SEC Rejects Latest Bitcoin ETF Bid

https://www.coindesk.com/sec-rejects-latest-bitcoin-etf-bid


Think that the dissent by SEC Commissioner Hester Peirce is quite telling how much Bitcoin getting traction / being adopted is being feared:

Quote
"This line of disapprovals leads me to conclude that this Commission is unwilling to approve the listing of any product that would provide access to the market for bitcoin and that no filing will meet the ever-shifting standards that this Commission insists on applying to bitcoin-related products—and only to bitcoin-related products"
legendary
Activity: 2242
Merit: 3523
Flippin' burgers since 1163.
hero member
Activity: 870
Merit: 585
legendary
Activity: 3620
Merit: 4813
Coronavirus update:

- There are currently 82,147 confirmed cases worldwide, including 2,772 fatalities.

- Pakistan, North Macedonia, Greece, Georgia, Finland, Norway and Algeria reporting their first cases.

- A resident of Solano County, California, might be the first example in the country of community spread. Orange County declares state of emergency.

- Iraq closes all schools and universities for at least 10 days.

- Kuwait sends plane to evacuate its nationals from Milan.

- Saudi Arabia suspends entry for religious purposes and for tourists from countries where coronavirus is spreading.

- Qatar evacuates its nationals from Iran.

- Leaked documents reveal coronavirus infections up to 52 times higher than reported figures in China’s Shandong province.

- Helicopter money arrives in Hong Kong. HK residents aged 18 and above will each receive a cash handout of HK$10,000 in a HK$120 billion relief deal.

- Chinese hotel worker, 56, is diagnosed with coronavirus after testing negative 8 times in 17 days while in quarantine.

- Germany health minister warns we're at beginning of epidemic in Germany.

- Australian Prime Minister Scott Morrison: "Based on the expert medical advice we've received, there is every indication that the world will soon enter a pandemic phase of coronavirus"

- Coronavirus cases in Italy have jumped to 374 in the past six days, 12 deaths.

- South Korea reports 334 new cases, bringing the total number in the country to 1,595.

- 14 new cases in the Diamond Princess cruise ship. This brings the number of passengers and crew infected with the virus to 705.

- North Korea postpones the opening of schools, no information how many infected people.

- Scientists discover HIV-like mutation which makes coronavirus extremely infectious.

legendary
Activity: 3388
Merit: 4775
diamond-handed zealot
since when?

people write custom BIOS for older stuff all the time

not being snarky, really want to know
legendary
Activity: 3220
Merit: 2334
I fix broken miners. And make holes in teeth :-)
For better computers, the BIOS updates are usually signed with a key that is compared to the author list. Tougher to screw with by far.
legendary
Activity: 3388
Merit: 4775
diamond-handed zealot

I’ll leave it as an exercise to the reader to prove that there is no way for malware to futz with the ‘safe copy’ of the BIOS that could overwrite the other. (Hint: as if)

depends how it is implemented

if the button is an actual hardware reset that forces a reload from ROM that seems like it would work

if it is just a software call then the malware would just reset your settings and lie to you, and if it is not an actual ROM it would just write itself in the backup...
legendary
Activity: 3080
Merit: 1688
lose: unfind ... loose: untight

Most linux distributions can be run on read-only filesystems (same as from cd) BUT the only true security hole is running them as root, because volumes can be remounted in rw mode on the fly. I'm using this strategy on my raspberryPi that is running the game console emulators for the kids. They don't do no shutdown, they just pull the plug/wallwart. Roms are stored on etx4 USB, mounted read-only. This one is just mounted in rw mode on the PC, to manage the roms and emulator binaries.

Just make sure you run linux as unprivileged user. Privilege escalation is a thing though, but unlikely on patched systems. However, when you're not connected to the net, i doubt there is a fair chance of catching a successful exploit via USB.

Again, your postulated security described above is utterly dependent upon the rando USB device implementing only a storage class endpoint.

Whatevs. Good luck with that.

I would care less if i am running as unpriv. user on a system that is not network connected. I didn't mention that i'd never use a host with actual user data on it. I thought that would be clear because i was replying to Dabs' "frozen sysimage" approach. I would definitely not use a guest VM but a dedicated box that i can reset via dd or similar disc imaging tools, i wasn't clear on that, as i just recognize while typing this.
And yes, it's part of the very basics: there is no 100% security, only 100% security against certain (and therefor known) attack vectors.

I’m gonna say this one last time. Your postulated recovery is weaksauce against anything other than a disk-resident vector.

dd ain’t gonna do nothing for you if malware-containing USB infects the BIOS.

my bios has a reset to default button for times it all goes wrong. dont conflate things to 2 options when there are many more possibilities

I am not limiting things to two options. I am merely pointing out a single issue with the postulated ‘presumed safe’ activity. Perhaps one of many.

I’ll leave it as an exercise to the reader to prove that there is no way for malware to futz with the ‘safe copy’ of the BIOS that could overwrite the other. (Hint: as if)
legendary
Activity: 3080
Merit: 1688
lose: unfind ... loose: untight

Most linux distributions can be run on read-only filesystems (same as from cd) BUT the only true security hole is running them as root, because volumes can be remounted in rw mode on the fly. I'm using this strategy on my raspberryPi that is running the game console emulators for the kids. They don't do no shutdown, they just pull the plug/wallwart. Roms are stored on etx4 USB, mounted read-only. This one is just mounted in rw mode on the PC, to manage the roms and emulator binaries.

Just make sure you run linux as unprivileged user. Privilege escalation is a thing though, but unlikely on patched systems. However, when you're not connected to the net, i doubt there is a fair chance of catching a successful exploit via USB.

Again, your postulated security described above is utterly dependent upon the rando USB device implementing only a storage class endpoint.

Whatevs. Good luck with that.

I would care less if i am running as unpriv. user on a system that is not network connected. I didn't mention that i'd never use a host with actual user data on it. I thought that would be clear because i was replying to Dabs' "frozen sysimage" approach. I would definitely not use a guest VM but a dedicated box that i can reset via dd or similar disc imaging tools, i wasn't clear on that, as i just recognize while typing this.
And yes, it's part of the very basics: there is no 100% security, only 100% security against certain (and therefor known) attack vectors.

I’m gonna say this one last time. Your postulated recovery is weaksauce against anything other than a disk-resident vector.

dd ain’t gonna do nothing for you if malware-containing USB infects the BIOS.

Forget about badUSB/badBIOS as it has already been perfectly documented and evidenced... Maybe you are the right person to ask this, depending on how low level your work or knowledge goes... I have always thought another theoretical attack vector would be in the HD firmware from which it would be possible to on-the-fly replace a call to the boot sector adding some payload to it. I still think so but... have you ever seen any real practical example/exploit of that? Even as a PoC "lab test"?

Well, if you can program new drive FW, and you can get it programmed into the drive’s FW store, then yes - that would be trivial.

Indeed, I’ve shipped devices that provided canned boot sector data before - not as an exploit, but because the operating environment needed such in order to function. Of course, that was a ‘from the factory’ thing, not a field exploit.

However, drive FW development is non-trivial. Embedded computers without public data on memory maps, peripheral specs, etc. Nonstandard SoCs, built on various ISAs, dependent upon lots of in-house developed tools. Very difficult. Albeit doable in theory.

However^2, most (all?) contemporary drives will not load FW that does not have a valid crypto signature. I have never heard of any case of a successful exploit of a drive’s FW sig being cracked.

Though drive companies are just collections of people, and some people in the chain of custody for the root certs may not fully understand their responsibilities. I could see the possibility of a leak of keys happening some day by some vendor or another. At which point, such an exploit again becomes plausible.
legendary
Activity: 3808
Merit: 7912
JJG is silent....

No I am not.

 Cheesy Cheesy Cheesy Cheesy


Just have some things that I am doing, which causes me to not be able to talk as much with my fingers.   Tongue Tongue



       Shocked
legendary
Activity: 3388
Merit: 4775
diamond-handed zealot


my bios has a reset to default button for times it all goes wrong. dont conflate things to 2 options when there are many more possibilities

hmmmm

I honestly don't know if the backup BIOS on overclocking boards is an actual ROM, if so that is a pretty good option.

I'd still be worried about the firmware on any drives or other connected devices
legendary
Activity: 3948
Merit: 11416
Self-Custody is a right. Say no to"Non-custodial"
JJG is silent....

No I am not.

 Cheesy Cheesy Cheesy Cheesy


Just have some things that I am doing, which causes me to not be able to talk as much with my fingers.   Tongue Tongue
legendary
Activity: 2702
Merit: 2053
Free spirit

Most linux distributions can be run on read-only filesystems (same as from cd) BUT the only true security hole is running them as root, because volumes can be remounted in rw mode on the fly. I'm using this strategy on my raspberryPi that is running the game console emulators for the kids. They don't do no shutdown, they just pull the plug/wallwart. Roms are stored on etx4 USB, mounted read-only. This one is just mounted in rw mode on the PC, to manage the roms and emulator binaries.

Just make sure you run linux as unprivileged user. Privilege escalation is a thing though, but unlikely on patched systems. However, when you're not connected to the net, i doubt there is a fair chance of catching a successful exploit via USB.

Again, your postulated security described above is utterly dependent upon the rando USB device implementing only a storage class endpoint.

Whatevs. Good luck with that.

I would care less if i am running as unpriv. user on a system that is not network connected. I didn't mention that i'd never use a host with actual user data on it. I thought that would be clear because i was replying to Dabs' "frozen sysimage" approach. I would definitely not use a guest VM but a dedicated box that i can reset via dd or similar disc imaging tools, i wasn't clear on that, as i just recognize while typing this.
And yes, it's part of the very basics: there is no 100% security, only 100% security against certain (and therefor known) attack vectors.

I’m gonna say this one last time. Your postulated recovery is weaksauce against anything other than a disk-resident vector.

dd ain’t gonna do nothing for you if malware-containing USB infects the BIOS.

my bios has a reset to default button for times it all goes wrong. dont conflate things to 2 options when there are many more possibilities
legendary
Activity: 2380
Merit: 17063
Fully fledged Merit Cycler - Golden Feather 22-23
Square earning call underway.

This is a nice roundup:
Square sold over half a billion dollars worth of bitcoin in 2019, outpacing broader crypto exchange volume growth in Q4

One piece of information is really important:

Quote

Square 4Q earnings saw $178 million worth of bitcoin sold in the quarter, up ~20% from last quarter and 240% year over year




They are buying more and more bitcoins.
Couple it with bitcoin halving, and the outcome is bullish af.

Bitcoin 90 days moving average: 8,400
Number of bitcoin bought: 178,000,000/8,400= 21,200
Bitcoin mined every quarter= 12.5*6*24*90=162,000

So Square bought the equivalent of 13% of total mined bitcoins.
If growth is flat over the next 2 quarters, this is going to be 26% of total mined bitcoins after the halving.

Of course this is not meaning that Square is going too buy freshly minted bitcoin only, but that there will be a massive force in the buy side. Squre is probably going to buy these coins OTC from whales, helping a redistribution of UTXO from early investors to latest investors.
full member
Activity: 308
Merit: 146
IMO, this sell-off seems like a fakeout by some big whales to make newbies think that bitcoin can't work as good as gold (and other safe-haven assets) during a global crisis (like coronavirus). Eventually, these whales should lose the sell-off power and bitcoin should get back on (bull) track.

Keep in mind, the way Wall Street works, they short and shake the tree first before they buy into a long position.

Apparently, the Bitcoin CEO leaked that there was gonna be major layoffs and an indefinite cut in productivity by 50 Percent from May.
legendary
Activity: 3808
Merit: 7912
Well looks like Pence will be the person who will run point on the virus outbreak.

We're screwed. But at least he will prey for us.

i feel safer already

Is he not with the Trump Crowd that does NOT believe in Vaccination? Maybe not.

HE JUST HANGS OUT WITH THOSE THAT DO!

(we are so screwed)

I, on the other hand, AM RETIRED EARLY, somewhat due to crypto, though I've been in HODL mode for more than a year on BTC/Crypto/Alts selling of such to live on now.

Thus I should start stocking up to live at home, do the over $100 delivery on the web for groceries free to the house thingy ahead of the curve and get lots of rubber gloves,

figure out how to 'sanitize' the canned goods as they arrive in bulk. Oh, such 'fun' this will be! NOT!

So it MAYBE finally happened...10  years ago I would 'laugh' at those folks that built bunkers and said it was in case of this stuff...DOOMSDAY stay at home and it was really

annoying when the main 1st adopters were these guys...getting into BTC and then making said 'fancy bunkers'. Now instead of out of sight out of mind...I'll likely

croak, in my home, hearing them 'crow' about their foresight (never really did the foresight thing)....anyway....they just said today the Vaccine is speeding along

much faster than in the past and should ONLY take 1 to 1.5  years to distribute...if IT DOES NOT MUTATE TO SOMETHING WORSE...really did not need to hear

that last part....it should be fine right? FML? Maybe I should just run about and buy a lot of meaningless sex/sell bitcoin/to take my mind of this .that will help right?

Brad


 You can buy unscented Lysol



 It kills everything1

1 99.9% of everything
Jump to: