Pages:
Author

Topic: www.lketc.com 1TH Dragon miner direct order. 3000$ - page 2. (Read 25495 times)

legendary
Activity: 1512
Merit: 1000
I think Cryptoceelo is pissed at LKETC, because they didn't give him the password and he has to use an older image with root access.
He claimed that the Dragons are stealing hashes or sending encrypted packages back to a Chinese IP address

And did anyone try to corroborate his findings with a simple network sniffer?   I would have, but I never purchased an LKETC machine because they pegged their prices to BTC-E and didn't update in real time (meaning it was always overpriced).
legendary
Activity: 1512
Merit: 1000
Glad you figured it out  Grin I would have shown you how a month earlier if cypotcelo and dropt werent being such assclowns about the whole reverse engineering is easy and noobs know nothing attack  

I made one comment about the existence of tools for reverse engineering as well as stating that a driver could be written from the A1 documentation, and I'm "being such [an] assclown".  You were so butthurt over someone having a differing opinion that you put me on ignore and then added it to your sig as if it was some sort of achievement.

Then, you refused to help others with their problems that you allege to have solutions for because two people on a forum of many didn't worship your worthless opinion.  Are you 12?

Hello assclown hypocrite!
hero member
Activity: 854
Merit: 500
einc.io

I haven't contact the Dutch engineer, instead I try to see if it was possible to do it myself before I call help.
I had to start as a noob in Linux.
The LKETC password was not the most diffecult part, the ghost files that replace any files you have change back to the original files every time
after a reboot are.
After I found out the password, I found an easier way to change the password, simply replace the file "shadow" with your own username and password.
This is a standaard Linux trick, so next time you run into a firmware that is locked and you have control over the SD card.
Backup the SD card and replace the password and username in the file "shadow" with your own password and username.
It takes only 5 minutes instead of hours.

All the LKETC firmware use CGminer 3.9.0, the only difference between them is the languages files.
The first versions only have Chinese, the later version have English added and the last version have also Russian.
The ghost files in the latest version is more trickier than in the first version.

https://www.dropbox.com/s/14a66jqudfjkulw/Dragon_192_168_1_101.7z

This is the latest firmware with all the languages files, I change all the LKETC logo with my own and added a password protected page that I have
learn here.
https://bitcointalksearch.org/topic/m.7277745

The IP of the miner is 192.168.1.101
The username of the password protected page is admin, no password, you can change that when you SSH into the Raspberry Pi with PUTTY.
The Raspberry username is pi and the password is raspberry.
Once you are logged into the Raspberry.

su root
cd /var/www
nano passwordprotect.php
Change your username and password and save it by pressing Ctrl+x

I want to write a tutorial how you can replace the ghost files with your own customize files and logo, but I am afraid I am too busy to do that
at this moment.





Glad you figured it out  Grin I would have shown you how a month earlier if cypotcelo and dropt werent being such assclowns about the whole reverse engineering is easy and noobs know nothing attack 

I think Cryptoceelo is pissed at LKETC, because they didn't give him the password and he has to use an older image with root access.
He claimed that the Dragons are stealing hashes or sending encrypted packages back to a Chinese IP address, but he is unable to locate all the hidden files and change the password.
I doubt about his claim that he has rewritten the firmware, untill now he hasn't proofed it yet.
If he is that good as he claim to be, he could have change the password himself and located all the hidden files easily.

If you analize the files on the older images, you will find traces of Innosilicon passwords.

I am still a Linux NOOB, but am still learning and it is fun to do.
grn
sr. member
Activity: 357
Merit: 252

I haven't contact the Dutch engineer, instead I try to see if it was possible to do it myself before I call help.
I had to start as a noob in Linux.
The LKETC password was not the most diffecult part, the ghost files that replace any files you have change back to the original files every time
after a reboot are.
After I found out the password, I found an easier way to change the password, simply replace the file "shadow" with your own username and password.
This is a standaard Linux trick, so next time you run into a firmware that is locked and you have control over the SD card.
Backup the SD card and replace the password and username in the file "shadow" with your own password and username.
It takes only 5 minutes instead of hours.

All the LKETC firmware use CGminer 3.9.0, the only difference between them is the languages files.
The first versions only have Chinese, the later version have English added and the last version have also Russian.
The ghost files in the latest version is more trickier than in the first version.

https://www.dropbox.com/s/14a66jqudfjkulw/Dragon_192_168_1_101.7z

This is the latest firmware with all the languages files, I change all the LKETC logo with my own and added a password protected page that I have
learn here.
https://bitcointalksearch.org/topic/m.7277745

The IP of the miner is 192.168.1.101
The username of the password protected page is admin, no password, you can change that when you SSH into the Raspberry Pi with PUTTY.
The Raspberry username is pi and the password is raspberry.
Once you are logged into the Raspberry.

su root
cd /var/www
nano passwordprotect.php
Change your username and password and save it by pressing Ctrl+x

I want to write a tutorial how you can replace the ghost files with your own customize files and logo, but I am afraid I am too busy to do that
at this moment.





Glad you figured it out  Grin I would have shown you how a month earlier if cypotcelo and dropt werent being such assclowns about the whole reverse engineering is easy and noobs know nothing attack 
newbie
Activity: 11
Merit: 0
how to order?
hero member
Activity: 854
Merit: 500
einc.io
We found the machines are sending back encrypted packets back to a Chinese IP address, the packets are encrypted so we are not sure weather its sending back hashes or somethig more sinister.

We have re-wrote the lketc dragon miner software our self and found the units to be hashing 10% more, so likely stealing hashes from our power.

i will release more proof and our clean dragon miner software after more tests.

I am in The Netherlands at the moment, I can't make an image of the latest firmware of the Dragon miners that are password protected.
Can someone upload an image that is password protected?
I need it ASAP, I found a Dutch sotware engineer who can reverse engineer it.
I will tip him if he finds the password and stuff that don't belong in that image.

Good luck to your engineer, I wish him luck and he's going to need it Smiley

I haven't contact the Dutch engineer, instead I try to see if it was possible to do it myself before I call help.
I had to start as a noob in Linux.
The LKETC password was not the most diffecult part, the ghost files that replace any files you have change back to the original files every time
after a reboot are.
After I found out the password, I found an easier way to change the password, simply replace the file "shadow" with your own username and password.
This is a standaard Linux trick, so next time you run into a firmware that is locked and you have control over the SD card.
Backup the SD card and replace the password and username in the file "shadow" with your own password and username.
It takes only 5 minutes instead of hours.

All the LKETC firmware use CGminer 3.9.0, the only difference between them is the languages files.
The first versions only have Chinese, the later version have English added and the last version have also Russian.
The ghost files in the latest version is more trickier than in the first version.

https://www.dropbox.com/s/14a66jqudfjkulw/Dragon_192_168_1_101.7z

This is the latest firmware with all the languages files, I change all the LKETC logo with my own and added a password protected page that I have
learn here.
https://bitcointalksearch.org/topic/m.7277745

The IP of the miner is 192.168.1.101
The username of the password protected page is admin, no password, you can change that when you SSH into the Raspberry Pi with PUTTY.
The Raspberry username is pi and the password is raspberry.
Once you are logged into the Raspberry.

su root
cd /var/www
nano passwordprotect.php
Change your username and password and save it by pressing Ctrl+x

I want to write a tutorial how you can replace the ghost files with your own customize files and logo, but I am afraid I am too busy to do that
at this moment.



legendary
Activity: 1120
Merit: 1002
Anyone know if the company is honest Dragon Miners?

I'm thinking of hiring the cloud service mining them.
i dont know their cloud service, but  i recently bought several units from them , and all is ok for me. ultra quick delivery from china to europe ( 4 days ups ).  the miners all work fine.  ( i paid in BTC ) contact: [email protected]
legendary
Activity: 1120
Merit: 1002
Bumped the thread for you with Dragon information from Mr. Lee.  My image is on first page it's 4 blade with ssh .

https://bitcointalksearch.org/topic/the-install-instruction-and-trouble-shoot-of-1t-dragon-miner-545642 ( note prices in thread are old they are now cheaper in group buy thread)
thank you a lot Wink
newbie
Activity: 7
Merit: 0
Anyone know if the company is honest Dragon Miners?

I'm thinking of hiring the cloud service mining them.
legendary
Activity: 1456
Merit: 1000
Bumped the thread for you with Dragon information from Mr. Lee.  My image is on first page it's 4 blade with ssh .

https://bitcointalksearch.org/topic/the-install-instruction-and-trouble-shoot-of-1t-dragon-miner-545642 ( note prices in thread are old they are now cheaper in group buy thread)
legendary
Activity: 1120
Merit: 1002
anyone got a clean & recent english image of the "4 blade dragonboot" ? ( with unblocked ssh acces..)
thanx in advance  Wink
sr. member
Activity: 434
Merit: 250


It still might not be fully compatible, I'll let you know in around 45mins Smiley

Yeah, so it doesn't work 'out-of-the-box', but I'm continuing to investigate if it's just a configuration issue (e.g. see if SPI ports can be polled)
sr. member
Activity: 434
Merit: 250
I thought I'd mention that it seems BFGMiner will now support The "jingtian" miner, which is essentially the same thing as all the other A1 miner clones.
I'm not sure if it is... JingTian has a microcontroller that IIRC they designed themselves.
Either way, let me know how this works out. Smiley

I think their controller is an Rpi (which you can see the end of here: http://www.jtminer.com/product/28nm-miner/#). This would would make sense as they are probably just using innosilicon's driver as the rest of the A1 clone miner manufacturers.

It still might not be fully compatible, I'll let you know in around 45mins Smiley
legendary
Activity: 2576
Merit: 1186
I thought I'd mention that it seems BFGMiner will now support The "jingtian" miner, which is essentially the same thing as all the other A1 miner clones.
I'm not sure if it is... JingTian has a microcontroller that IIRC they designed themselves.
Either way, let me know how this works out. Smiley
sr. member
Activity: 434
Merit: 250
I thought I'd mention that it seems BFGMiner will now support The "jingtian" miner, which is essentially the same thing as all the other A1 miner clones.

I'm going to check it out, but it seems we finally have open source firmware and can avoid using the stock driver (and the other potentially nefarious crap which may come with it)
sr. member
Activity: 434
Merit: 250
We found the machines are sending back encrypted packets back to a Chinese IP address, the packets are encrypted so we are not sure weather its sending back hashes or somethig more sinister.

We have re-wrote the lketc dragon miner software our self and found the units to be hashing 10% more, so likely stealing hashes from our power.

i will release more proof and our clean dragon miner software after more tests.

I am in The Netherlands at the moment, I can't make an image of the latest firmware of the Dragon miners that are password protected.
Can someone upload an image that is password protected?
I need it ASAP, I found a Dutch sotware engineer who can reverse engineer it.
I will tip him if he finds the password and stuff that don't belong in that image.

Good luck to your engineer, I wish him luck and he's going to need it Smiley
legendary
Activity: 1036
Merit: 1000
3000USD for a china made product where their cost is much more lower. Is it worth it ?

they sell it for 1620 usd not 3000 but sales are slow only 5 pcs sold in about 3 weeks
everyone is waiting for the big hit this august...
Big players like Spondoolies and Bitmain will flow the market with Terra hash.
Then this same will have to compete Antminer s3 with 1 btc per th/s
 
hero member
Activity: 854
Merit: 500
einc.io
We found the machines are sending back encrypted packets back to a Chinese IP address, the packets are encrypted so we are not sure weather its sending back hashes or somethig more sinister.

We have re-wrote the lketc dragon miner software our self and found the units to be hashing 10% more, so likely stealing hashes from our power.

i will release more proof and our clean dragon miner software after more tests.

I am in The Netherlands at the moment, I can't make an image of the latest firmware of the Dragon miners that are password protected.
Can someone upload an image that is password protected?
I need it ASAP, I found a Dutch sotware engineer who can reverse engineer it.
I will tip him if he finds the password and stuff that don't belong in that image.

legendary
Activity: 1512
Merit: 1000
care to elaborate? where did you get the source code to re write the driver? afaik they have not released the source to ckolivas. seems like bs without these simple answeres

There are such things as decompilers.  Also, It's possible one could write the "dragon" driver from scratch with just the A1 datasheet.

really? Pfffffffff! Are you or have you ever been a software engineer? This is plain old FUD, I kinda respected spondoolies for their product quality even though way beyond any possible roi price until now. Stooping to the level of bashing others products with NO backup is pretty low. Wanna increase your sp10 hash rate ? insert this code with a couple of other lines in the right place:

 for(j=0;j<32,j++){
     if(work->hash[j] > work->target[j]){
        work->hash[j] = work->target[j];
    }
 }

edit: put the > as <  oops

No, I preferred an Engineering field a little more challenging, but that's beside the point.  Are you denying the existence of decompilers and/or the ability to write a driver by reverse engineering HW and using the IC datasheet for its comms protocol?  Or perhaps you're losing your shit on the wrong person?   Learn to forum noob.

legendary
Activity: 1904
Merit: 1007
Hey @Roadstress  you changed your reply

Changed? How? I edited it for more clarity maybe, but didn't change anything important.

Roadstress, im not here to get in a pissing match with you nor discredit you. I admit that your constant pushing of spond products bothers me. Many newbs find these forums and look for advice here, many without posting but just lurking. There is no hardware that can roi right now mining btc, but your posts indicate sp30 will. In my opinion this is a poor way to introduce newbs to bitcoin  big loss of $ and noisy equipment.

btw I am no longer a software engineer, left that for the great outdoors, I am now a roadbuilding superintendent

Constant push? Please show me evidence.

My post here isn't pushing anything. It's just pointing out that there might be a problem with this miner. It has nothing to do with my signature. You seem to fail to understand that. Please double or triple read my above reply: https://bitcointalksearch.org/topic/m.7697791
Pages:
Jump to: