Author

Topic: Wall Observer BTC/USD - Bitcoin price movement tracking & discussion - page 8311. (Read 26710890 times)

legendary
Activity: 1722
Merit: 2213
legendary
Activity: 2744
Merit: 13618
BTC + Crossfit, living life.
Right, it’s low enough now. Logging onto laptop to buy 0.5BTC.

Thank you for your service.

I’ve bought 4 BTC so far this week. Because incremental ladder trading.

Wow, 4 whole coins this week. You wrote btc - as in bitcoin, with no other qualifiers. If I got it right, there goes a little haiku for you.

That's just, like, you know
five days and a weekend, man
Congratulations!

Yes, BTC.

Just buying back the coins I sold (for more USD) on the way up. Incremental laddered standing orders FTW.

Good breher is getting some sense.... now forget the worthless forks and be a true coiner in its purest form once again!
legendary
Activity: 1708
Merit: 3439
Man who stares at charts (and stars, too...)

Most linux distributions can be run on read-only filesystems (same as from cd) BUT the only true security hole is running them as root, because volumes can be remounted in rw mode on the fly. I'm using this strategy on my raspberryPi that is running the game console emulators for the kids. They don't do no shutdown, they just pull the plug/wallwart. Roms are stored on etx4 USB, mounted read-only. This one is just mounted in rw mode on the PC, to manage the roms and emulator binaries.

Just make sure you run linux as unprivileged user. Privilege escalation is a thing though, but unlikely on patched systems. However, when you're not connected to the net, i doubt there is a fair chance of catching a successful exploit via USB.

Again, your postulated security described above is utterly dependent upon the rando USB device implementing only a storage class endpoint.

Whatevs. Good luck with that.

I would care less if i am running as unpriv. user on a system that is not network connected. I didn't mention that i'd never use a host with actual user data on it. I thought that would be clear because i was replying to Dabs' "frozen sysimage" approach. I would definitely not use a guest VM but a dedicated box that i can reset via dd or similar disc imaging tools, i wasn't clear on that, as i just recognize while typing this.
And yes, it's part of the very basics: there is no 100% security, only 100% security against certain (and therefor known) attack vectors.
member
Activity: 256
Merit: 62
Bitcoin cant close the day below the 200 Day moving average. Its currently at $8794.

If we close above it, it would be pretty bullish.
legendary
Activity: 3080
Merit: 1688
lose: unfind ... loose: untight
How can mounting a USB stick on an AutoRun-disabled VM affect your host's BIOS? Honest question, I want to know.
Don’t lost track of the fact that USB is an acronym for Universal Serial Bus. That device could contain any number of USB endpoints, each implementing a different device class. What if one of the endpoints identifies as a Human Interface Device — for example a keyboard — and injects a number of commands to the system? From the users perspective, invisibly. Or even deeper, a bridge device, giving it access to the underlying I2C bus - maybe even the SMB?
Yeah, but who is going to maintain the discipline required to ensure any potential infection does not spread from the separate PC to others in your stable?

There is the Yubikey which types for you like a USB keyboard. There is that Rubber Ducky, which types like a USB keyboard and can type like it was there at 100 words per second or something as fast as a keyboard will accept, such as Windows-R, CMD, and do any number of commands from the command prompt.

https://shop.hak5.org/products/usb-rubber-ducky-deluxe


As for virgin clean PC's, I used to (and still do) use something called Deep Freeze, reboot to restore thing. If the host computer it's installed on gets infected, before it can propagate any problems to the rest of the network (assuming you disconnected it physically from the rest of the network), you just reboot, and it's back as new, as if it was never updated.

Most malware is unaware of it's existence. It's great for setting up kiosks that provide internet access through regular browsers. At the end of the session, reboot, it's back to the way it was. If you need to update anything, reboot, turn it off, update, reboot, and it will stay that way.

In theory, it can still be hacked, but in practice it's as if the whole computer is one giant VM. Reboot, and it's back to the way it was yesterday.

If you need to save data or files or documents, you save them on a different drive or partition or folder designated as such. But the rest of the OS, reboot, and it goes back to the way it was.

Most linux distributions can be run on read-only filesystems (same as from cd) BUT the only true security hole is running them as root, because volumes can be remounted in rw mode on the fly. I'm using this strategy on my raspberryPi that is running the game console emulators for the kids. They don't do no shutdown, they just pull the plug/wallwart. Roms are stored on etx4 USB, mounted read-only. This one is just mounted in rw mode on the PC, to manage the roms and emulator binaries.

Just make sure you run linux as unprivileged user. Privilege escalation is a thing though, but unlikely on patched systems. However, when you're not connected to the net, i doubt there is a fair chance of catching a successful exploit via USB.

Again, your postulated security described above is utterly dependent upon the rando USB device implementing only a storage class endpoint.

Whatevs. Good luck with that.
hero member
Activity: 786
Merit: 857
Bought another 0.1 BTC on this dip.
Spent more than I originally planned this week already.
legendary
Activity: 3080
Merit: 1688
lose: unfind ... loose: untight
Right, it’s low enough now. Logging onto laptop to buy 0.5BTC.

Thank you for your service.

I’ve bought 4 BTC so far this week. Because incremental ladder trading.

Wow, 4 whole coins this week. You wrote btc - as in bitcoin, with no other qualifiers. If I got it right, there goes a little haiku for you.

That's just, like, you know
five days and a weekend, man
Congratulations!

Yes, BTC.

Just buying back the coins I sold (for more USD) on the way up. Incremental laddered standing orders FTW.
legendary
Activity: 3080
Merit: 1688
lose: unfind ... loose: untight
As for virgin clean PC's, I used to (and still do) use something called Deep Freeze, reboot to restore thing. If the host computer it's installed on gets infected, before it can propagate any problems to the rest of the network (assuming you disconnected it physically from the rest of the network), you just reboot, and it's back as new, as if it was never updated.

Does your ‘reboot’ re-flash the BIOS with a known-good image? Probably not. Even if so, what ensures that supposedly ‘known-good’ image has not itself been corrupted by the malware?

Again. There is NO perfect security.
legendary
Activity: 2856
Merit: 1520
Bitcoin Legal Tender Countries: 2 of 206
[meme] BTC give me my life back, pls! [/meme]
legendary
Activity: 2856
Merit: 1520
Bitcoin Legal Tender Countries: 2 of 206
   Bitstamp ADL    8,627.78 USD   
(source: Bitstamp API)
legendary
Activity: 1795
Merit: 1208
This is not OK.
How can mounting a USB stick on an AutoRun-disabled VM affect your host's BIOS? Honest question, I want to know.
Don’t lost track of the fact that USB is an acronym for Universal Serial Bus. That device could contain any number of USB endpoints, each implementing a different device class. What if one of the endpoints identifies as a Human Interface Device — for example a keyboard — and injects a number of commands to the system? From the users perspective, invisibly. Or even deeper, a bridge device, giving it access to the underlying I2C bus - maybe even the SMB?
Yeah, but who is going to maintain the discipline required to ensure any potential infection does not spread from the separate PC to others in your stable?

There is the Yubikey which types for you like a USB keyboard. There is that Rubber Ducky, which types like a USB keyboard and can type like it was there at 100 words per second or something as fast as a keyboard will accept, such as Windows-R, CMD, and do any number of commands from the command prompt.

https://shop.hak5.org/products/usb-rubber-ducky-deluxe


As for virgin clean PC's, I used to (and still do) use something called Deep Freeze, reboot to restore thing. If the host computer it's installed on gets infected, before it can propagate any problems to the rest of the network (assuming you disconnected it physically from the rest of the network), you just reboot, and it's back as new, as if it was never updated.

Most malware is unaware of it's existence. It's great for setting up kiosks that provide internet access through regular browsers. At the end of the session, reboot, it's back to the way it was. If you need to update anything, reboot, turn it off, update, reboot, and it will stay that way.

In theory, it can still be hacked, but in practice it's as if the whole computer is one giant VM. Reboot, and it's back to the way it was yesterday.

If you need to save data or files or documents, you save them on a different drive or partition or folder designated as such. But the rest of the OS, reboot, and it goes back to the way it was.

I recall reading an article where they made a 'flash drive' act like an ethernet adapter and would intercept all internet traffic for a man-in-the-middle attack.
legendary
Activity: 2856
Merit: 1520
Bitcoin Legal Tender Countries: 2 of 206
legendary
Activity: 1708
Merit: 3439
Man who stares at charts (and stars, too...)
How can mounting a USB stick on an AutoRun-disabled VM affect your host's BIOS? Honest question, I want to know.
Don’t lost track of the fact that USB is an acronym for Universal Serial Bus. That device could contain any number of USB endpoints, each implementing a different device class. What if one of the endpoints identifies as a Human Interface Device — for example a keyboard — and injects a number of commands to the system? From the users perspective, invisibly. Or even deeper, a bridge device, giving it access to the underlying I2C bus - maybe even the SMB?
Yeah, but who is going to maintain the discipline required to ensure any potential infection does not spread from the separate PC to others in your stable?

There is the Yubikey which types for you like a USB keyboard. There is that Rubber Ducky, which types like a USB keyboard and can type like it was there at 100 words per second or something as fast as a keyboard will accept, such as Windows-R, CMD, and do any number of commands from the command prompt.

https://shop.hak5.org/products/usb-rubber-ducky-deluxe


As for virgin clean PC's, I used to (and still do) use something called Deep Freeze, reboot to restore thing. If the host computer it's installed on gets infected, before it can propagate any problems to the rest of the network (assuming you disconnected it physically from the rest of the network), you just reboot, and it's back as new, as if it was never updated.

Most malware is unaware of it's existence. It's great for setting up kiosks that provide internet access through regular browsers. At the end of the session, reboot, it's back to the way it was. If you need to update anything, reboot, turn it off, update, reboot, and it will stay that way.

In theory, it can still be hacked, but in practice it's as if the whole computer is one giant VM. Reboot, and it's back to the way it was yesterday.

If you need to save data or files or documents, you save them on a different drive or partition or folder designated as such. But the rest of the OS, reboot, and it goes back to the way it was.

Most linux distributions can be run on read-only filesystems (same as from cd) BUT the only true security hole is running them as root, because volumes can be remounted in rw mode on the fly. I'm using this strategy on my raspberryPi that is running the game console emulators for the kids. They don't do no shutdown, they just pull the plug/wallwart. Roms are stored on etx4 USB, mounted read-only. This one is just mounted in rw mode on the PC, to manage the roms and emulator binaries.

Just make sure you run linux as unprivileged user. Privilege escalation is a thing though, but unlikely on patched systems. However, when you're not connected to the net, i doubt there is a fair chance of catching a successful exploit via USB.
legendary
Activity: 2520
Merit: 3038
Right, it’s low enough now. Logging onto laptop to buy 0.5BTC.

Thank you for your service.

I’ve bought 4 BTC so far this week. Because incremental ladder trading.

Wow, 4 whole coins this week. You wrote btc - as in bitcoin, with no other qualifiers. If I got it right, there goes a little haiku for you.

That's just, like, you know
five days and a weekend, man
Congratulations!

legendary
Activity: 2590
Merit: 4839
Addicted to HoDLing!
is the bear back from the woods?  Roll Eyes

in times like this I constantly watching these two videos in rotation:

1. Toby Ganger + Decap - Welcome To The Blockchain (for me in desperate mood)

2. Remy: Bitcoin Billionaire (for me in shit-free mood)

The 1st I haven't heard yet.

The 2nd is epic. Smartest and most hilarious lyrics on a Bitcoin song I've ever heard.
legendary
Activity: 2744
Merit: 13618
BTC + Crossfit, living life.
Me an total unaffected HODLer... though the 10.5K to 8.6K-ish in a few days is a decent drop... Still why? I only have one answer---> Normal BTC market behavior, n00bs better get used to it, if one can appreciate a HUGE pump, then the same peep should be aware there are some decent drops as well!
legendary
Activity: 2520
Merit: 3038
I'm buying like crazy. My DCA schedule got on sort of a quick track. The main thing, as some absent peep would point out, is making sure I don't run out of dry powder should the need for a big shot arise. So I got a few more sats today - couldn't resist placing a couple limit orders in this area, and both triggered - and I will keep at this.

However, as the same absent peep would suggest, I've got an emergency stash. It amounts to ~40% of the fiat I'd allocated for Q1. You bears want to try your hands at the high 7k's? Even lower? Go for it, I'm ready.

legendary
Activity: 1708
Merit: 3439
Man who stares at charts (and stars, too...)
Hard to get some beans, noodles and rice already.

Came home and i saw that i already advanced to Jr. Member!!! ...again  Roll Eyes
Again?

This is mainly for VB1001:



 I'm just going to eat McDonald's food if there's a crisis.  No bacteria or virus can live in that stuff anyway and the probability of dying from SARS-2 is likely higher than the probability of dying from eating only McDonald's food for a few weeks.  As an added bonus, there won't be a queue.


Uh, oh, no... Sorry, bro!
According to a testing from last year, the bacterial and fungal density, count and variety of the bottom side of the grips on McDonald's trays are higher than on their toilet seats!
No joke, mister. You probably get in contact with SARS-CoV-2 from an asymptomatic carrier this way, either directly or indirectly via the wiping cloths that do not get exchanged for several days. You're better off by getting their "food" through the McDrive instead.
legendary
Activity: 2856
Merit: 1520
Bitcoin Legal Tender Countries: 2 of 206
is the bear back from the woods?  Roll Eyes

in times like this I constantly watching these two videos in rotation:

1. Toby Ganger + Decap - Welcome To The Blockchain (for me in desperate mood)

2. Remy: Bitcoin Billionaire (for me in shit-free mood)
Jump to: