Pages:
Author

Topic: [XMR] Monero - A secure, private, untraceable cryptocurrency - page 84. (Read 4670972 times)

hero member
Activity: 1834
Merit: 639
*Brute force will solve any Bitcoin problem*
When somebody hacked me and got 7000 xmr, Hueristic was about the only guy who took me seriously.  Most of the others piled on with predictable abuse.
Also, he's a very knowledgable guy, and I value that.
Overall, Hueristic's valuable contributions outweigh his little irritable outbursts.   As an older fellow with physical problems, I also let my annoyance get the better of me.
Hueristic, you should know we're on your side.  Next time something gets your goat, just think positive -- we're all your friends here.


it was my team...sorry brah  Grin  #game over lol
legendary
Activity: 3836
Merit: 4969
Doomed to see the future and unable to prevent it
When somebody hacked me and got 7000 xmr, Hueristic was about the only guy who took me seriously.  Most of the others piled on with predictable abuse.
Also, he's a very knowledgable guy, and I value that.
Overall, Hueristic's valuable contributions outweigh his little irritable outbursts.   As an older fellow with physical problems, I also let my annoyance get the better of me.
Hueristic, you should know we're on your side.  Next time something gets your goat, just think positive -- we're all your friends here.


Thanks Br0. Smiley


Quote
Hack Reveals Russian Plan to Deanonymize Tor Traffic

https://www.pcmag.com/news/369660/hack-reveals-russian-plan-to-deanonymize-tor-traffic
hero member
Activity: 870
Merit: 585
When somebody hacked me and got 7000 xmr, Hueristic was about the only guy who took me seriously.  Most of the others piled on with predictable abuse.
Also, he's a very knowledgable guy, and I value that.
Overall, Hueristic's valuable contributions outweigh his little irritable outbursts.   As an older fellow with physical problems, I also let my annoyance get the better of me.
Hueristic, you should know we're on your side.  Next time something gets your goat, just think positive -- we're all your friends here.
member
Activity: 952
Merit: 17
raskul
The third audit (by X41) of RandomX has successfully been completed!

https://www.reddit.com/r/Monero/comments/ca71ok/randomx_audit_statuas/


Can one still use this algo to install malware to run on a website so that website visitors mine XMR with the users CPU?
Wasn't there any consideration to the algorithm that would negate this specific security issue with XMR and why is this not mentioned in the audit?

thanks.

Due to the random code generation part of the proof-of-work, a web miner is significantly more difficult to create (though definitely not impossible). Additionally, the 2GB RAM requirement somewhat mitigates the malware issue.

this is the kind of response i had hoped to read. thank you for that.
Glad that some of us are a little less easily-triggered!

peace.

Yes, this was not at all an insult to the community as a whole. I think your lucky you got a civil answer at all. But I was abrasive so that is on me for allowing you to bait me. Be assured that won't happen again.

no it was a genuine question.. but feel free to see it as fud if you like.
my concern is that i had some comparative-crypto website open for a few hours yesterday on my browser and when i returned to my computer, it had almost melted the CPU. I know this type of shady deployment of malware has been inherent within the XMR community in the past so wanted to ask. I think your attitude to the question answered it specifically. thank you.

I refrained from stating 'within the XMR ecosystem, because it is not a fault of the developers, it is indeed people mining XMR via shady malware, which is indeed 'people involved in XMR' = "xmr community members"

You got triggered and defensive on my choice of phrase, perhaps you need some time with your head in a good novel or something friend, come away from 'Interent Formus' - it's an awful anxiety-enducing state to be in.



Take the advice of your peers:

Hueristic, I respect you, but in recent weeks and months you've been frothing at the mouth.

+1, let's keep it civil.
legendary
Activity: 3836
Merit: 4969
Doomed to see the future and unable to prevent it
The third audit (by X41) of RandomX has successfully been completed!

https://www.reddit.com/r/Monero/comments/ca71ok/randomx_audit_statuas/


Can one still use this algo to install malware to run on a website so that website visitors mine XMR with the users CPU?
Wasn't there any consideration to the algorithm that would negate this specific security issue with XMR and why is this not mentioned in the audit?

thanks.

Due to the random code generation part of the proof-of-work, a web miner is significantly more difficult to create (though definitely not impossible). Additionally, the 2GB RAM requirement somewhat mitigates the malware issue.

this is the kind of response i had hoped to read. thank you for that.
Glad that some of us are a little less easily-triggered!

peace.

Yes, this was not at all an insult to the community as a whole. I think your lucky you got a civil answer at all. But I was abrasive so that is on me for allowing you to bait me. Be assured that won't happen again.

no it was a genuine question.. but feel free to see it as fud if you like.
my concern is that i had some comparative-crypto website open for a few hours yesterday on my browser and when i returned to my computer, it had almost melted the CPU. I know this type of shady deployment of malware has been inherent within the XMR community in the past so wanted to ask. I think your attitude to the question answered it specifically. thank you.
member
Activity: 952
Merit: 17
raskul
The third audit (by X41) of RandomX has successfully been completed!

https://www.reddit.com/r/Monero/comments/ca71ok/randomx_audit_statuas/


Can one still use this algo to install malware to run on a website so that website visitors mine XMR with the users CPU?
Wasn't there any consideration to the algorithm that would negate this specific security issue with XMR and why is this not mentioned in the audit?

thanks.

Due to the random code generation part of the proof-of-work, a web miner is significantly more difficult to create (though definitely not impossible). Additionally, the 2GB RAM requirement somewhat mitigates the malware issue.

this is the kind of response i had hoped to read. thank you for that.
Glad that some of us are a little less easily-triggered!

peace.
sr. member
Activity: 1451
Merit: 258

monero is the best altcoin for what concerns the privacy and anonymity, many others have tried to imitate it but without reaching its levels, unfortunately i could not follow all the news concerning it (monero) someone can update me? the last fork? can no longer be mined with cryptonight? was born a new altcoin monero7?...

Indeed, as a matter of fact, most are only imitating but not entirely, all of which is wasted like garbage. I also don't understand why most people imitate and why not make something different. For what you ask, besides that, I also didn't follow the news so far.
legendary
Activity: 3836
Merit: 4969
Doomed to see the future and unable to prevent it

Pain? Hopefully not physical pain, but I have a feeling you are talking about wallet pains after longing Monero once we hit $100 again or something like that.  (ツ)

A bit of both I guess. Smiley
hero member
Activity: 2968
Merit: 605

monero is the best altcoin for what concerns the privacy and anonymity, many others have tried to imitate it but without reaching its levels, unfortunately i could not follow all the news concerning it (monero) someone can update me? the last fork? can no longer be mined with cryptonight? was born a new altcoin monero7?...
hero member
Activity: 1873
Merit: 840
Keep what's important, and know who's your friend
Hueristic, I respect you, but in recent weeks and months you've been frothing at the mouth.

I know, not sure whats wrong.
I think too much pain is taking a toll. Sad

I'll lose the red, but leave the post so others know what you guys mean.
Still looks like a beam fudder to me though.

Pain? Hopefully not physical pain, but I have a feeling you are talking about wallet pains after longing Monero once we hit $100 again or something like that.  (ツ)
legendary
Activity: 3836
Merit: 4969
Doomed to see the future and unable to prevent it
Hueristic, I respect you, but in recent weeks and months you've been frothing at the mouth.

I know, not sure whats wrong.
I think too much pain is taking a toll. Sad

I'll lose the red, but leave the post so others know what you guys mean.
Still looks like a beam fudder to me though.
legendary
Activity: 2268
Merit: 1141
Hueristic, I respect you, but in recent weeks and months you've been frothing at the mouth.

+1, let's keep it civil.
legendary
Activity: 2268
Merit: 1141
They plan to release a desktop version in the foreseeable future.
Do you know when exactly? There is an ETA? In short in 2020 or in 2025?

They did not provide an ETA, but I am reasonably certain 2020 is way more likely than 2025 :-P
Are you sure? In crypto 2025 is more likely than 2020 generally

I deem it more likely that the desktop wallet is out in 2020 than 2025, yes.
legendary
Activity: 2268
Merit: 1141
The third audit (by X41) of RandomX has successfully been completed!

https://www.reddit.com/r/Monero/comments/ca71ok/randomx_audit_statuas/


Can one still use this algo to install malware to run on a website so that website visitors mine XMR with the users CPU?
Wasn't there any consideration to the algorithm that would negate this specific security issue with XMR and why is this not mentioned in the audit?

thanks.

Due to the random code generation part of the proof-of-work, a web miner is significantly more difficult to create (though definitely not impossible). Additionally, the 2GB RAM requirement somewhat mitigates the malware issue.
sr. member
Activity: 807
Merit: 423
Hueristic, I respect you, but in recent weeks and months you've been frothing at the mouth.
legendary
Activity: 3836
Merit: 4969
Doomed to see the future and unable to prevent it
The third audit (by X41) of RandomX has successfully been completed!

https://www.reddit.com/r/Monero/comments/ca71ok/randomx_audit_statuas/


Can one still use this algo to install malware to run on a website so that website visitors mine XMR with the users CPU?
Wasn't there any consideration to the algorithm that would negate this specific security issue with XMR and why is this not mentioned in the audit?

thanks.

LOL, there is NO algo that cannot be mined through javascipt making one is impossible. if you are questioning whether the old cryptonote that was being mined on some websites are still viable then the answer is NO. Sounds to me like your just trying some left handed fuD though so i'll go grab me a few m0ar and wait for the spike.

no it was a genuine question.. but feel free to see it as fud if you like.
my concern is that i had some comparative-crypto website open for a few hours yesterday on my browser and when i returned to my computer, it had almost melted the CPU. I know this type of shady deployment of malware has been inherent within the XMR community in the past so wanted to ask. I think your attitude to the question answered it specifically. thank you.

Your slander and insult to the community because you per-sieve the xmr community is responsible for one scammer that screwed you speaks volumes, welcome to ignore moron. And have some red because I'm in a good mood.
member
Activity: 952
Merit: 17
raskul
The third audit (by X41) of RandomX has successfully been completed!

https://www.reddit.com/r/Monero/comments/ca71ok/randomx_audit_statuas/


Can one still use this algo to install malware to run on a website so that website visitors mine XMR with the users CPU?
Wasn't there any consideration to the algorithm that would negate this specific security issue with XMR and why is this not mentioned in the audit?

thanks.

LOL, there is NO algo that cannot be mined through javascipt making one is impossible. if you are questioning whether the old cryptonote that was being mined on some websites are still viable then the answer is NO. Sounds to me like your just trying some left handed fuD though so i'll go grab me a few m0ar and wait for the spike.

no it was a genuine question.. but feel free to see it as fud if you like.
my concern is that i had some comparative-crypto website open for a few hours yesterday on my browser and when i returned to my computer, it had almost melted the CPU. I know this type of shady deployment of malware has been inherent within the XMR community in the past so wanted to ask. I think your attitude to the question answered it specifically. thank you.
legendary
Activity: 3836
Merit: 4969
Doomed to see the future and unable to prevent it
The third audit (by X41) of RandomX has successfully been completed!

https://www.reddit.com/r/Monero/comments/ca71ok/randomx_audit_statuas/


Can one still use this algo to install malware to run on a website so that website visitors mine XMR with the users CPU?
Wasn't there any consideration to the algorithm that would negate this specific security issue with XMR and why is this not mentioned in the audit?

thanks.

LOL, there is NO algo that cannot be mined through javascipt making one is impossible. if you are questioning whether the old cryptonote that was being mined on some websites are still viable then the answer is NO. Sounds to me like your just trying some left handed fuD though so i'll go grab me a few m0ar and wait for the spike.
member
Activity: 952
Merit: 17
raskul
The third audit (by X41) of RandomX has successfully been completed!

https://www.reddit.com/r/Monero/comments/ca71ok/randomx_audit_statuas/


Can one still use this algo to install malware to run on a website so that website visitors mine XMR with the users CPU?
Wasn't there any consideration to the algorithm that would negate this specific security issue with XMR and why is this not mentioned in the audit?

thanks.
newbie
Activity: 24
Merit: 0
@ miner's
We have created a NEW more Powerful Pool on a better SERVER ,
faster alls thought: http://the-miners.de/XMR/#
Change your MINERS to this new address: 207.180.246.163
http://the-miners.de/XMR/#getting_started

Thank you for your patience and understanding
Pages:
Jump to: