2975 points: deleted's comment in hentAI: Detecting and removing censors with Deep Learning and Image Segmentation
2772 points: I_DONT_LIE_MUCH's comment in 20GB leak of Intel data: whole Git repositories, dev tools, backdoor mentions in source code
2485 points: api's comment in Stripe Workers Who Relocate Get $20,000 Bonus and a Pay Cut - Stripe Inc. plans to make a one-time payment of $20,000 to employees who opt to move out of San Francisco, New York or Seattle, but also cut their base salary by as much as 10%
2464 points: iloveparagon's comment in Google engineer breaks down the problems he uses when doing technical interviews. Lots of advice on algorithms and programming.
2384 points: why_not_both_bot's comment in During lockdown my wife has been suffering mentally from pressure to stay at her desk 100% of the time otherwise after a few minutes her laptop locks and she is recorded as inactive. I wrote this small app to help her escape her desk by periodically moving the cursor. Hopefully it can help others.
2293 points: ThatInternetGuy's comment in Iranian Maintainer refuses to merge code from Israeli Developer. Cites Iranian regulations.
2268 points: xequae's comment in I'm a software engineer going blind, how should I prepare?
2228 points: turniphat's comment in AWS forked my project and launched it as its own service
2149 points: Rami-Slicer's comment in 20GB leak of Intel data: whole Git repositories, dev tools, backdoor mentions in source code
Hi all, trying to determine if the 150W PSU is enough for my build pieced together from an old rig. The online power supply calculators have ranged from 103W to 250W for this setup. It's literally just a CPU, RAM, MOBO, and SSD. The i5-4670 has a TDP of 84W. I plan to find a random mobo off eBay with the right socket. I plan to run this headless 24/7 as a sandbox / development environment / Bitcoin trading script or other random experiments. PCPartPicker Part List
Feedback Requested from Vendors - Would this Pitch be Effective?
I'm looking for vendors' honest reaction if they were to receive a message such as the following (with details changed that fit your store):
I want to buy your CBD oil but I don't like using Ebay because it's not very private and I know they take high fees. I'll buy it from you directly for $48 [listed for $50 on Ebay] with Bitcoin, and since there's no cut taken from Ebay you'll keep all of it. I use an app called Haven which has a built in escrow system. If you're interested this link gives the details: [Link to the app]
I'm with the company OB1 who has an app that connects buyers and sellers directly and privately, and uses cryptocurrency for payments. We're trying to equip buyers who want to make purchases with the app with methods to approach vendors, and the script above would be generated by the buyer inputting the information from an existing Ebay listing and sending the resulting message. If the vendor uses the app it then automatically creates the listing with the necessary information and sends a message to the buyer letting them know they can make the purchase. Since most people here probably don't accept cryptocurrency, I'm curious in honest feedback about how you'd react to an offer like this. I believe this post complies with all the sidebar rules but I'm happy to change anything if not.
I am the founder of Credo360.com – an open reputation platform that aims to provide safety, security, and privacy for P2P transactions. AMA!
Excited to do an AMA here – and looking forward to all the questions. My name is Irakliy Khaburzaniya and I am the CEO of Credo360.
This AMA is a way of giving back to the /entrepreneur community, from which we have learned a tremendous deal. We have gone from being wantrepreneurs to entrepreneurs, and hope to inspire you to do the same.
The concept for the business grew from the pain we have all experienced when dealing with strangers, particular when it came time to financial transactions. Many of us have been ripped off, or scammed in some way, and wished that there was a way to check if the person that we’re dealing with was reputable. We set out to do just that with Credo360.
Problem: No basis for trust when dealing with strangers. Solution: Open Reputation (and now transaction) platform.
The solution: Credo360 (or simply Credo) is an open reputation and transaction platform. Using Credo, you can: check if someone you need to deal with is trustworthy, conduct transactions (buy/sell/trade) with them, and then rate and review your experience with them. The idea is very similar to reputation systems on sites such as eBay or Airbnb – but Credo reputation is not tied to a marketplace. Instead, it belongs to you as a person, and you can take it with you anywhere you like.
This score sums up a person’s reputation and trustworthiness in a single number (measured, unsurprisingly, on a scale from 0 to 360). There are bunch of things that go into a calculation of this score, and we worked very hard to try to make it difficult to game. One of the most important factors in this score are the ratings and reviews you get from people you deal with on Credo.
We have also recently launched P2P payments– so, now people can pay each other for goods and services without leaving Credo. Right now this is available only to people with U.S. bank accounts, but we are working on adding other payment methods (e.g. bitcoin, PayPal).
A little background on how we got here and lessons learned: • September 2015 – Core of the company founded.
We used clerky.com to organize as a Delaware C Corporation. It was relatively straightforward to do with their templates.
We were accepted into the Microsoft BizSpark program. https://bizspark.microsoft.com/ . It was relatively easy to apply, especially since we have our first mock-ups, and had a formal C corporation. Would highly recommend applying here if you’re planning to build an Azure-based application.
• May 2016
We self-financed and hired a couple of Ukraine-based front-end developers to help with the front-end design and implementation.
We launched our private beta to family and friends.
• March 2017
We launched our Public beta.
Some lessons learned: We didn’t get much fanfare right away at launch. It would’ve been smarter for us to build out a large amount of interest from when we first started development back in September of 2015. We were naïve and thought that we should keep our startup under wraps, so that our competitors wouldn’t steal our features. In hindsight this was a mistake.
• August 2017
We integrated payments using Dwalla. It’s actually a lot more challenging to implement p2p payments then one would imagine.
• Going forward
We plan to integrate bitcoin and other crypto currency payments.
We are putting the final touches on our iOS and Android apps.
We would love to work with someone to submit our startup to ProductHunt. If you’re an influencer on there – please reach out to us!
If you’re into IT technology, here is a little bit about technology we use:
Our backend runs in Azure cloud. We chose Azure primarily because of the BizSpark program that gives us enough credits to pretty much cover out infrastructure expenses. Within Azure we use a bunch of services from storage, to databases, to app services, to queues, to CDN etc. The backend itself is written in TypeScript and runs on Node.js
Our web frontend is a single-page application written in React.js. It communicates with the backend via a RESTful API and websockets (socket.io)
We are also working on mobile apps for iOS and Android, and these rely on the same backend API as the web frontend.
Lastly we use a bunch of 3rd-party services for various things: SendGrid (to send email), Twillio (to send SMS), Blitline (for image processing), Blockscore (for identity verification), Dwolla (for P2P payments) and others
Either way we would love to hear your feedback about our site, the overall concept, and any other questions that we can answer.
Meme Gear! Memes Merch CHEAP AND FREE SHIPPING on Ebay and Etsy!!!! ------> https://www.etsy.com/listing/648242908/im-already-tracer-meme-keychain-memes?oihskfjvr 44352 Shana Kuphal meme olive port transmit port West Ena Licensed Concrete Gloves Awesome Tuna Ergonomic analyzing Meme Gear wrapitator wrapitator fever fie dolla disability stockton mne awards Claudie Glover meme plum matrix connect matrix Ebertbury Incredible Granite Soap Small Table Realigned executive Meme Gear Heard this in Texas Linnea Barrows meme pink circuit quantify circuit Port Horacioville Gorgeous Concrete Tuna Practical Mouse Functionbased incremental Meme Gear google initialism acronym single serving site Ray Rogahn meme orange driver parse driver East Jolie Intelligent Steel Chair Handcrafted Bacon Face to face multimedia Meme Gear reddit how i met your mother stillshot drawing tv show quote sitcom neil patrick harris reaction image rage comic Alvina Toy meme azure alarm hack alarm Port Aldaville Awesome Cotton Bike Handcrafted Ball Optional scalable Meme Gear music song rhyme suggestions google search corrections lyrics poetry Koby Lind meme turquoise card override card North Elenamouth Fantastic Metal Table Incredible Mouse Streamlined gridenabled Meme Gear internet adult swim movement toonami bringbacktoonami hashtags nostalgia pr public relations anime tumblr shonen cartoon network steve blum bumper seinen twitter campaign sally timm video game reviews cult following Ron Fahey Jr meme tan circuit parse circuit Marieburgh Generic Wooden Car Incredible Table Fundamental intangible Meme Gear fandom fan art fan fiction fanfiction Dr Gaylord Pfannerstill meme lime driver synthesize driver Rutherfordside Incredible Soft Soap Sleek Bike Openarchitected dynamic Meme Gear website funny racist parody comedy nsfw dub stereotype charlie brown kwanzaa voiceover 2002 most offensive video anonymous a charlie brown christmas a charlie brown kwanzaa Mrs Libby Sanford meme salmon hard drive hack hard drive Lake Kasandra Sleek Granite Keyboard Incredible Cheese Advanced encompassing Meme Gear xmen video game video game quote 1992 magneto Sheridan Braun meme violet feed reboot feed Schulistbury Awesome Wooden Ball Practical Car Usercentric methodical Meme Gear transracial rachel dolezal filipino Eloise OReilly meme grey card bypass card Lake Merle Handmade Metal Bacon Practical Bacon Preemptive 24 hour Meme Gear trump sean spicer donald trump communications director trump administration Jamil Adams meme silver card generate card Lilianfurt Refined Soft Computer Licensed Fish Upgradable valueadded Meme Gear rit university rifle umbrella cancelled class Leonora Herzog meme violet protocol parse protocol Port Damienhaven Awesome Concrete Pizza Refined Tuna Innovative actuating Meme Gear monsquaz Ronaldo Flatley meme magenta interface connect interface Port Bernita Practical Concrete Table Awesome Hat Distributed clientserver Meme Gear casually pepper spraying tenderly applying pepper spray charitably administering pepper spray mly employing a dose of pepper spray pepper spray cop casually pepper spray everything cop pepperspray protest photoshop exploitable occupy movement Jovani Auer meme magenta circuit synthesize circuit Jenkinsville Fantastic Wooden Fish Handcrafted Towels Networked contextuallybased Meme Gear deus ex what a shame jc denton jc denton what a rotten way to die my vision is augmented oh my god jc a bomb Lamar Rice meme plum bandwidth reboot bandwidth Ahmadport Awesome Cotton Car Fantastic Sausages Balanced clearthinking Meme Gear iraq twitter islam terrorism social media is syria isis islamic state islamic caliphate Allie Ortiz meme red bandwidth calculate bandwidth Boyermouth Intelligent Steel Towels Intelligent Chair Diverse ecocentric Meme Gear Mullet Hypothesis Davon Goldner meme orange pixel connect pixel North Thea Fantastic Fresh Car Tasty Chair Organized homogeneous Meme Gear cartoon fark france bags hate fck freedom muslim terrorist attack pack rotterdam charlie hebdo Noel Eichmann meme red driver hack driver Maddisonland Ergonomic Steel Shoes Awesome Ball Integrated needsbased Meme Gear Everyone has this friend in their group of friends Carey Hickle meme sky blue pixel navigate pixel Treutelberg Incredible Metal Bike Intelligent Chicken Networked intangible Meme Gear video remix vine Miss Amani Hilll meme salmon sensor quantify sensor Lake Bellashire Rustic Concrete Gloves Handcrafted Pants Horizontal transitional Meme Gear website creepypasta horror adult entertainment Cortney Ondricka IV meme cyan alarm synthesize alarm West Kearaborough Tasty Fresh Tuna Unbranded Keyboard Balanced bifurcated Meme Gear ripped no life 17 fag Mr Niko Cartwright meme fuchsia panel navigate panel Albinaberg Rustic Fresh Towels Handcrafted Shoes Multilateral transitional Meme Gear fashion pants shorts jeans Henderson Thompson V meme orange monitor index monitor Wintheiserport Gorgeous Granite Ball Unbranded Bacon Functionbased local Meme Gear sara ryder mass effect andromeda facial face animation weird look Celestine Rosenbaum meme lime protocol parse protocol Jodyport Awesome Rubber Pizza Small Chicken Functionbased empowering Meme Gear spongbebob squarepants patrick star manray exploitable Fleta Stroman meme orchid monitor parse monitor New Deon Ergonomic Fresh Pants Incredible Bike Secured optimal Meme Gear none Caroline Schiller meme maroon panel index panel South Brittanyton Sleek Plastic Hat Rustic Soap Assimilated fullrange Meme Gear caterpillar zombies Wilford Schumm meme purple bus hack bus Homenickfort Handmade Granite Mouse Fantastic Bike Businessfocused demanddriven Meme Gear youtube fandom tumblr stereotypes high school dolls barbie cheerleaders barbie dolls Richard Rolfson meme red system back up system East Rubyfort Refined Soft Pizza Awesome Computer Upgradable optimizing Meme Gear My first thought for Youtube ads Paul Moen meme azure driver program driver Luciuston Generic Steel Bacon Sleek Car Polarised 6th generation Meme Gear psa heroin Adele Cormier meme blue feed parse feed Michaelberg Handcrafted Metal Table Practical Shirt Innovative background Meme Gear douchebag bodybuing annoying newbie gym Dee Bogan meme white alarm parse alarm Friesenport Fantastic Concrete Mouse Licensed Keyboard Objectbased needsbased Meme Gear religion parodies christianity pigeon advice animal Angelica Botsford Sr meme blue interface generate interface Gardnerside Gorgeous Cotton Car Ergonomic Table Cloned zero defect Meme Gear eddsworld Dr Jeffrey Ritchie meme olive system copy system Lake Sofia Rustic Frozen Bacon Refined Computer Userfriendly optimal Meme Gear pwned counterstrike flash myg0t Mrs Lilla Nienow meme gold system generate system Port Chet Refined Steel Tuna Awesome Fish Teamoriented nonvolatile Meme Gear lost pause noble lostpause noble maibigbutt youtuber youtube celebrity anime visual novel shots fiyerd shotsfiyerdcom Jalen Ward meme purple hard drive reboot hard drive West Velma Rustic Plastic Hat Ergonomic Keyboard Proactive zero tolerance Meme Gear youtube spanish Briana Treutel meme mint green bandwidth connect bandwidth Keeblerfort Sleek Concrete Towels Tasty Table Businessfocused 6th generation Meme Gear nintendo logic mii video game logic virtual boy all hail the virtual boy Marcelo Pollich meme turquoise pixel transmit pixel Raynorton Tasty Plastic Mouse Intelligent Soap Networked explicit Meme Gear dark web dark net drugs bitcoin darknet Estefania McDermott meme salmon panel back up panel West Kelsie Intelligent Concrete Soap Small Tuna Persevering encompassing Meme Gear subreddit reddit bots markov chain script automated bot Ms Dante Kertzmann meme olive pixel generate pixel South Roderick Small Plastic Salad Sleek Ball Polarised analyzing Meme Gear ascii dwarf dwarf fortress indie game tarn adams sandbox game roguelike Alayna Swift meme salmon circuit transmit circuit Treutelstad Sleek Metal Keyboard Tasty Gloves Innovative holistic Meme Gear shark happy days fonzie television slang pop culture classic downhill peaking jumping Jacky Renner meme orange port transmit port Pinkieborough Intelligent Cotton Table Rustic Shirt Futureproofed exuding Meme Gear christmas butt cartoon holiday gift Janick Larkin meme indigo protocol parse protocol Port Devanton Gorgeous Rubber Chips Ergonomic Gloves Adaptive regional Meme Gear fashion photo fad dress clothes selfie Luis Kuhlman meme teal matrix generate matrix Monahanland Practical Metal Tuna Generic Shirt Diverse background Meme Gear swagg Natalia Weimann meme sky blue application override application Marvinfort Fantastic Cotton Soap Tasty Keyboard Fullyconfigurable bottomline Meme Gear cartoon tv comedy eric south park cartman sitcom animated series cartoon title fall 2014 Tito Little meme ivory circuit bypass circuit Wisozkland Rustic Metal Gloves Gorgeous Chicken Face to face national Meme Gear space jam quad city dj remix city space dj slam quad jam disk jockey one song remix charles barkley nba goes with everything mashup musical mashup Darren Hettinger meme ivory array copy array OConnershire Practical Rubber Chair Small Computer Automated 4th generation Meme Gear tumblr notes Dr Reginald Johnston meme teal monitor navigate monitor New Nikkoside Handcrafted Steel Fish Licensed Tuna Face to face composite Meme Gear none Ms Elnora Schaefer meme lime alarm bypass alarm Port Guiseppeside Unbranded Soft Pants Generic Towels Fundamental responsive Meme Gear link finds zelda Jarred Williamson meme magenta sensor back up sensor West Vita Small Cotton Chips Unbranded Towels Robust zero administration Meme Gear twitter exploitable tumblr sarkozy nicolas nico je suis nico french france -
So, here is my bio... Married, 2 kids, long stable marriage. Live in lovely home, belong to several high end social clubs. Have lots of dough, and don't need to work any more. For sake of discussion, let's say I'm about 57 years old. In summary, totally respectable in every way shape & form. Except one. I love to do fucked up stuff. Here's a typical example I've had several serious medical issues over the years. As a result, I've had lots of drugs prescribed to me. I found ways to get significant quantities of narcotics on script, but simply threw them into a big box at home. It just seemed sorta neat to have a shitoad of narcotics which I could never use in 10 lifetimes. It got to the point where there were thousands & thousands of hard grade stuff. So, what does a well -off father of two, well respected businessman decide is the best option?? Become a drug dealer. I trolled around the internet & found different sites such as drugs.alt. the funny thing is everyone there is looking for narcotics, but if you contact them & let you know you have them, they all think you're going to rip them off. So, I came up with a brilliant idea. I told people, just give me your address, and I'll send you pills. If you're happy, send me back cash in an envelope. Believe it or not, this sorta worked. And then I found out about the "dark net" and a drug site called Silk Road. This was too good to be true. So, I figured out all the logistics of bitcoins, PGP encryption, and lots of other dodgy stuff. And then posted a couple of ads on Silk Road I figured that if you did a good job, it would be just like ebay. And guess what, it was. So, my day existed of doing mundane shit, taking kids to hockey games, going to bar mitzvahs, and stopping by the post office to mail out some drugs. I was having a great time watching my user feedback give me stellar ratings. When we would go on family vacations, I would follow my silk road account from the room's Internet when the famiky was in the pool. And then the DEA shut down silk road & threw the site's owner in jail for life. Problem was, they got all his files and info, and there were rumors that there were going to be thousands of arrests. Every time I heard a car door slam outside my house, I thought it was the cops. This went on for a year.
“Bitcoin enables certain uses that are very unique. I think it offers possibilities that no other currency allows. For example the ability to spend a coin that only occurs when two separate parties agree to spend the coin; with a third party that couldn’t run away with the coin itself.” – Pieter Wui (66 points, 14 comments)
HOWTO: installing bitcoin core on a TI/99 tape-drive
Hi everyone, It took a bit of time to get this tutorial written as I needed to buy another TI/99 on eBay (I couldn't afford to run bitcoin on my current machine as I use it for all my word processing and gaming needs), but for anyone else who is interested in supporting the network by running a full-node, here is the script that worked for me after the tape drive syncs. For some reason this doesn't work if you've played FROGGER after booting the machine - so heads up to go straight to your basic interpreter and don't play around on your new mining rig.
INSTALLATION INSTRUCTIONS Insert BCore cassette tape (mail order from blockstream) Turn motor on. Wait for 30 VDP interrupts (0.5-0.6 sec). Display "Rewind cassette tape. Then press enter". Beep Call GETKEY Turn motor off. Wait for 30 VDP interrupts (0.5-0.6 sec). Beep Display "Synchronize blockchain. Then press enter". Beep Wait for 6000000000 VDP interrupts Call the ROM routine, with GPL opcode I/O 4. Number of bytes taken from PAB bytes 6+7. Turn motor off. Wait for 30 VDP interrupts (0.5-0.6 sec). Display "Blockchain synchronized, waiting for transaction". Beep Call GETKEY If cassette is BS2, goto EXIT Display "Start Mining (Y or N)?". Beep Wait for or to be pressed: If goto EXIT If goto HASHCASH
The PHANTOM Technical Whitepaper[Version 0.1] The PHANTOM TeamPHANTOM Technical Whitepaper V2 pass2
We considered the attack strategy when the attacker tried to double the expenses by "over" the system speed. A “massive” attack means that, in order to double the expenses, the attacker tries to give the dual spending transaction a very large weight so that it will exceed the legal subtleties. When the allowed weight is unbounded, s policy is a threat to the network. As a solution, we can limit the transaction's own weight from above, or set it to a constant value. When the maximum self-priority of a transaction is m, the best attack strategy is to generate a transaction with its own weight, m, that refers to a dual-overhead transaction. When the INP is compared to the attacker's computing power, the ut flow of an "honest" transaction is large enough so that it is possible to estimate the likelihood of a double-spending transaction having a greater cumulative weight. formula). The attack method of constructing the "parasite chain" makes the height or score-based approval strategy obsolete because the attacker's site has higher value on these indexes than LE. The ultimate tangled. On the other hand, the PhantomTip selection algorithm described in Section 4.1 seems to provide protection against such attacks. The Phantom hint selection algorithm also provides extra incentives to prevent delay nodes. Resistance of F. to quantum computing It is well known that a sufficiently large quantum computer 35 can very effectively deal with problems that rely on trial and error to find a solution. Finding a "now" process, eating a bitcoin block is a good example. Since today, we must check an average of 268 non-CES to find a suitable hash that allows new blocks to be generated. (Everybody knows) TOM computer words need to handle INSTRON(N) operations to solve problems similar to the Bitcoin puzzle mentioned above. The same problem also requires INSTEM(N) operations on a classic Song computer. Therefore, the quantum computation r value is about 268 = 234 ≈ 17 billion times, which is more efficient than a classical computer on mining a bitcoin blockchain. In addition, it is worth noting that if a blockchain does not increase its difficulty, as a response to increased hash capabilities, the rate of isolated blocks will be increased. For the same reason, "heavy weight" attacks will also be more effective on quantum computers. However, as suggested in Section 4, limiting the weight from above will effectively prevent qua, as will computer attacks. This is obvious because the number of that need to be checked to find the right hash to issue a non-Ces transaction is not unreasonable. Age on Aver is about 38 years old. Therefore, the "ideal" quantum computer's efficiency gain is 34 = 81, which is quite acceptable. What's more, the algorithm used to implement the structure is such a time to find a random number. In order to obtain a wide range of applications, the applications on the chain need a platform that is flexible enough to meet the following requirements: Supporting millions of users to compete with companies such as ebay, uber, airbnb, and facebook requires high-performance technologies capable of handling tens of millions of active users. In some cases, the application may not reach a critical number of users, so a platform that can handle a large number of users is crucial. Cross-chain transaction of Free Usage Application developers of cross-chain transaction need to provide users with the flexibility to trade cross-chain transactions for free; users should not pay to use the platform or benefit from their services. A blockchain platform, which is freely available to users, may be used more widely. Developers and companies can develop effective cross-chain monetization strategies. Easy to upgrade and failback Businesses building blockchain-based applications need the flexibility to enhance the new features of their applications. The platform must support software and smart contract upgrades. All non-trivial software is affected by errors, even the most rigorous formal verification. The platform must be robust enough to fix bugs when bugs inevitably occur. Low latency A good user experience requires reliable feedback with a delay of no more than a few seconds. Longer delays can frustrate users and make applications built on the blockchain uncompetitive with existing NOs. N-block chain alternatives: the platform should support low latency for transaction latency. Due to the order-dependent steps of DPOS's large super nodes, some applications cannot implement parallel algorithms. Applications such as swaps need enough sequential performance to handle hi. Gh volume. Therefore, the platform should support fast sequential performance. Parallel performance Large applications need to divide workloads across multiple CPUs and computers. Consensus algorithm (BFT) The PHANTOM.IO software uses the only known decentralized consensus DPOS algorithm. This algorithm can satisfy the performance requirements of the application program on the blockchain, that is, the trust proof of delegation (DPO). Lander algorithm, using PHANTOM.IO software to hold tokens on the blockchain, can select block producers through a continuous approval voting system. Anyone can choose to join the block. Produce, and will have the opportunity to produce blocks, as long as they can persuade token holders to vote for them. PHANTOM.IO software allows blocks to be generated precisely every 0.5 seconds, and exactly one producer is authorized to generate blocks at any given point in time. If there is no editing time in the SCH generation block, then skip the block of that time slot. When one or more blocks are skipped, there is an interval of 0.5 or more seconds in the blockchain. Used in software, blocks are produced in n rounds (x blocks per unit, n producers per time). At the beginning of each round, n unique producers were decided by Toke's vote. n holder, the selected manufacturer arranges the order according to the agreement of n or more manufacturers. If a producer misses a block and has not produced any blocks in the past 24 hours, they will be considered to be removed from therein until they inform the blockchain that they intend to start producing blocks. Gain: it ensures that the network runs smoothly, by minimizing the number of blocks missed by the non-scheduled producers, which have proven to be unreliable. Under normal circumstances, the DPOS blockchain does not experience any bifurcation because block producers cooperate in producing blocks rather than compete. If there is a fork, the consensus will switch to the longest chain in automatic way. This method works because the speed at which blocks are added to a block fork is directly related to the percentage of block producers that share the same block. DPOS consensus: in other words, the length of the blockchain forks of more manufacturers grows faster than the lesser forks of manufacturers, because the more producers, the less the forks, and they are ignored. In addition, any block manufacturer should not produce two fork blocks at the same time. A block maker that prevents doing so is likely to be eliminated. This type of cryptographic evidence for dual production of m can also be used to automatically clear abusers. Byzantine fault tolerance was added to the traditional handicapped organization, allowing all producers to sign all blocks as long as no producer marks two blocks with the same time stamp or the same block height. A 15-minute painter has signed a block that is considered irreversible. Any Byzantine writer must sign two blocks with the same time stamp or block, resulting in treasonable cryptographic evidence. Under this model, an irreversible consensus should be reached within 1 second. Transaction confirmation A typical association of organizations of persons with disabilities has 100% of producers involved. After an average transaction time of 0.25 seconds, the transaction can be considered as confirming 99.9% certainty. In addition to disabled people's organizations, PHANTOM.IO also added asynchronous Byzantine Fault Tolerance (ABFT) to accelerate irreversibility. The aBFT algorithm provides 100% irreversibility confirmation within 1Seco. The software requires that each transaction contain a portion of the hash of the most recent block header. This hash provides two purposes: To prevent replay of transactions on forks that do not include reference blocks; and Signals when a particular user and their listed shares are placed on a particular fork. Over time, all users will eventually confirm the blockchain directly, which makes it difficult to fake chains because fakes cannot migrate transactions from legitimate chai. Haploid generation (code) Named permission levels For use in software, accounts can define named permission levels, and each permission level can be derived from higher level named permissions. Each named privilege level defines one privilege; one privilege is a threshold multi-signature check that consists of the keys and/or naming privilege levels of other accounts. For example, the “Friends” permission level on the account can be set to be controlled equally by any friend of the account. Another example is the Steem blockchain, which has three hard-coded named permission levels: owner, activity and release. Delivery licenses can only perform social actions such as voting and post-processing, while Active permissions can do everything except change the owner. The owner's permission is for refrigerated and can do all things. The PHANTOM.IO software allows each account holder to define their own hierarchy and grouping of actions. Permission mapping The PHANTOM.IO software allows each account to define the mapping between any other account's contracts/operations or contracts and their own named permission levels. For example, account holders can map ac. The counting holder's social media applies for the account holder's "friend" permission group. With this map, any friend can post the account holder’s identity on the account holder’s social media. Even numbers, they will put their account holders, they still use their own keys to sign the action. This means that it is always possible to determine which friends use the account and how to use it. Evaluation authority When an action of "Action" is passed, the PHANTOM.IO software will first check whether Alicepc's permission map. If nothing is then mapping. If no more matches are found, the map is assumed to point to the named permission group Once the mapping is identified, the threshold multi-signature process and the rights associated with the naming authority verify the signature authority. If it fails, it will move upwards. Go to parent permissions and eventually point to owner permissions. Default permission group The technology also allows all accounts to have an "Owner" group that can complete all tasks, and can do any "Activity" group other than changing the owner group. All other permission groups S are derived from "activity". Parallel Computing of Permission The permission evaluation process is "read-only" and changes to the permissions of the transaction do not take effect until the end of the block. This means that all keys and permission calculation transactions can be executed in parallel. In addition, it means that you can quickly verify permissions without starting expensive application logic, and these logic must be rolled back. Finally, it means that transaction privileges can be evaluated when pending transactions are received without having to re-evaluate them when applied. For all things considered, privilege validation represents a significant percentage of the calculations needed to validate transactions, making this a read-only and trivial parallel process can greatly improve performance. When replaying to regenerate a deterministic state from the operation log, there is no need to re-evaluate the rights. The block of facts contained in the known product is sufficient to skip this step, which greatly reduces the computational load associated with replaying a growing blockchain. Actions of mandatory delays Time is a key component of security. In most cases, it is not possible to know if the private key has been stolen until it is used. Time-based security is used when people have applications that require a key to be stored on a computer connected to the Internet for daily use. PHANTOM.IO software enables application developers to indicate certain operations that must wait for the minimum value of each operation, and they can be applied after being included in a block. During this time, they can be cancelled. When these operations are broadcasted, users can receive notifications via email or text messages. If they are not authorized, then they can use the account recovery process to restore their account d withdrawal actions. The delay required depends on how sensitive the operation is. Buying coffee may not be delayed and is irreversible within a few seconds, while buying a house may require a 72-hour clean-up time. It may take up to 30 days for the entire account to be handed over to the new control. The actual delay is chosen by the application developer and the user. Application deterministic parallel execution Blockchain consensus depends on deterministic (repeatable) behavior. It means that all parallel executions must be freed from the use of mutexes or other locking primitives. Without locks, there must be some way to ensure that transactions that can be executed in parallel do not produce ambiguous results. Software designed in 2018 will run a single thread, but it contains the data structures necessary for future multithreaded, parallel execution. Based on PHANTOM.IO software, once the parallel operation is enabled, the task of the block manufacturer is to transfer the actions to independent fragments so that they can be evaluated. The schedule is the output of the block producer and will be executed, but the process of generating the schedule is not deterministic. This means that block producer S can use parallel algorithms to schedule transactions. When part of the parallel execution means that when a script generates a new Action, it will not be delivered immediately, but it plans to deliver it in the next cycle. The reason is that it cannot be Ivered immediately because the receiver may actively modify its state in another fragment. Minimum communication delay Delay is the time it takes for receiving a response after an account sending an Action to another account. The goal is to enable two accounts to exchange operations back and forth in a single block. There is no need to wait 0.5 seconds between each action. To achieve this, PHANTOM.IO software divides each block into loops. Each loop is divided into fragments and each fragment contains a trans-list of actions. Each transaction contains a set of operations to be delivered. This structure can be visualized as a tree in which alternating layers are processed sequentially and in parallel. Region Cycle (order) Fragments (parallel) Transaction (order) Action (order) Receiver and notification account (parallel) Transactions generated in one cycle can be delivered in any subsequent cycle or block. The block generator will always add a loop to the block until the maximum wall-clock time passes or there is no n. EW generates the transaction to be delivered. You can use static analysis of blocks to verify that in a given period, no two fragments contain transactions that modify the same account. As long as the invariants remain unchanged, the block ca will remain unchanged. n Processes by running all fragments in parallel. Read-only operation handler Some accounts may be able to handle a pass/fail based operation without modifying their internal state. If this is the case, these handlers can be executed in parallel as long as they are read only. The Ly operation handler for a particular account is contained in one or more shards within a specific period. Multi-account atomic transactions Sometimes it is necessary to ensure that actions are delivered and accepted by multiple accounts. In this case, both operations are placed in one transaction and two accounts will be allocated. The same pieces and actions apply in sequence. Non-equilibrium partial evaluation Scale block chain technology requires that the components be modular. Everyone doesn't have to run everything, especially if they only need to use a small part of the application. Exchange application developers run full nodes to display Exchange status to users. This exchange application does not require the status associated with social media. The software allows any full node to select any subset of applications to run. If the application never depends on stat, operations passed to other applications will be safely ignored. Subjective best effort scheduling The software cannot force the vendor to pass any action to any other account. Each block producer makes its own subjective measurement of computational complexity and time. This applies to whether a transaction is generated by a user or automatically generated by a smart contract. In the boot blockchain using PHANTOM.IO software, at the network level, all transactions count toward the computational bandwidth cost based on the number of WASM instructions executed. However, each block producer using the software can use its own algorithms and metrics to calculate resource usage. When a block producer concludes that a deal or account has consumed a prop. When generating their own blocks, they simply reject the transaction; however, if other block producers consider the transaction, they will still process the transaction. In general, as long as a block producer considers a transaction to be valid, and all other block producers accept it under resource use restrictions, it may take 1 minute to find the producer's transaction. In some cases, the producer may create a block that contains a transaction that is out of the acceptable range. In this case, the next block producer may choose to reject block D. The tie will be broken by the third producer. This is no different from what would happen if a large block caused network propagation delays. The society has noticed a pattern of abuse. Remove ballots from hooligan producers. This subjective evaluation of computational costs has forced people to accurately measure the time to run. With this design, there is no need for PRESI. Calculating directives greatly increases the opportunity for optimization without breaking the consensus. Proof of integrity When using the proof of Merkle from an external blockchain, there is a big difference between knowing that all transactions are valid and knowing that no transactions have been skipped or OMI. Although it is impossible to prove that all the recent transactions are known, it can be proved that there are no loopholes in the history of the transaction. PHANTOM.IO Software Tool is achieved by assigning a serial number to each operation passed to each account. Users can use these serial numbers to prove that all operations for a specific account have been processed. And they are processed in order. Conclusions PHANTOM.IO software is designed based on proven concepts and best practices and represents the basic progress of blockchain technology. The software is part of the overall blueprint. For a blockchain society with global scalability, decentralized applications can be easily deployed and managed.
Erich’s “What in the (cyber security) world is going on?” 03-09-17 edition
Another crazy week in the Cyberz. This is my recap of the last week worth of fun (and not) related to the world of cyber. To get updates more often, subscribe to my blog or follow me on twitter. This has been formatted in Reddit markdown so inline images are gone. To see it in all it's glory, CLICK HERE I'll be down by Ft. Lauderdale Thursday and Friday while speaking at the South Florida ISSA Conference. If you are around and want to meet up for a cold one, let me know.
I'm just going to start with Vault 7 I mean, really, how could I not? On Tuesday WikiLeaks dropped a bomb on the infosec world (perhaps the world in general) when they published roughly eleventy-trillion pages of data related to CIA offensive cyber capabilities. It's full of 0-days and different vulnerabilities/hack with fun little names like "SnowyOwl" and "Weeping Angel". For example, Weeping Angel can use Samsung Smart TVs to covertly record audio conversations. If/when it's confirmed that this is really a legit CIA info dump (which it appears to be), it won't be pleasant. As it is, a lot of people int he US Government are probably creating new grey hair and ulcers at this very moment. I am not going to try to analyze the whole dump, but I will say that some of this stuff is a bit spooky. Just remember, Don't Blink!
Over 1 Biiiiiiiiilion email addresses exposed by spammers misconfigured backups Karma is a bitch. River City Media screwed up their Rsync configs and accidentally backed up their data to an internet-facing server, exposing all of the data where it was discovered by Chris Vickery, a security researcher for MacKeeper. He contacted the authorities and relevant orgs to help shut down the infrastructure. Hopefully that 1.3 billion records, some containing home addresses and IP's, don't drop in to the hands of other spamming orgs. Time will tell
TorrentLocker (aka Cryptolocker) is back and farming credentials as well. After taking some time off, Cryptolocker appears to be back in a very aggressive campaign, and it has some new 'features'. It's sent via Word docs with a PowerShell script, infects and spreads via shared files, and it's also grabbing credentials as well. Right now it appears to be targeting Europe, especially Italy, but we need to keep our eyes open regardless of where we live.
16 Senators and Staff In Pennsylvania Locked Out Of Their Systems By Ransomware This happened to the Pennsylvania Senate Democratic Caucus on Friday and the website is still down as of the time of this post on Wednesday evening. This can't be a fun day over there. As of Friday, Pennsylvania Democrats spokeswoman Stacey Witalec said, “At this point we are working with Microsoft to see where we’re at.” Odds are, it was a phishing email some poor unsuspecting staffer clicked on. This is a good time to take them from unsuspecting, to a healthy level of paranoia by training them about the threat.
Dot ransomware - Coming soon to a network near you I've mentioned Raas (Ransomware as a Service) before, but it's really starting to show some growth potential. The "Dot" RaaS strain is currently being advertised on the dark web, so we can expect to see it hitting pretty soon. This one is a zero money down, profit-sharing strain with a 50/50 split. Expect more of this sort of thing to start rolling out in the near future. If it remains profitable, it will continue to grow.
Shamoon 2 May Get a Ransomware Feature and StoneDrill Hides in Memory This is a good read from DarkReading. In summary, Shamoon was Sha-sleep for quite Shum time (You see what I did there, right?) but returned last year to harass some folks in the Middle East. It is typically deployed as data wiping malware, but it seems as if the developer realized that there can be money in adding a ransomware feature in version 2. While it's not in the wild yet, it's a lesson that malware devs are starting to see the value in coding a ransomware option in to what they are already distributing. Also, StoneDrill is injecting itself into the memory process of the user's browser and doing a good job of ducking under sandbox radars. It appears to share code with NewsBeef and/or Charming Kitten APTs which are generally affiliated with Iranian State-Sanctioned options. Currently these are still focused on the Middle East, but it appears at least one European org has been infected with it.
Mystery Shopper Email Scams - Yeah, They Still Happen It's important that we help educate others that these scams do still happen. Lower income, unemployed and retired people are especially prone to this sort of scam. It sounds like easy money, and even appeals to the undercover 007 type in most of us, but it can do a number on your bank account. Key thing to remember is, if someone sends you a check and asks you to send the change, it's a scam. This doesn't matter if it's a car purchase on ebay or craigslist, or anything else, don't do it. Checks can take a long time to clear, or be found to be fake, and you are held holding the bag. Mystery shopping is the SCAM OF THE WEEK here at KnowBe4, and there is some good info on what to look for, and something you can copy/paste for friends and family. Check it out.
W2 Scams are off the charts right now This week was just stupid, so I'm going to just group them together
Yet Another W2 Breach - 2,400 at Autoneum North America Inc. Sadly the Swiss company disclosed about 2,400 employees W2's to scammers. The employees were in Jeffersonville, Indiana; Oregon, Ohio; Bloomsburg, Pennsylvania; and Aiken, South Carolina; and at its North American headquarters in Farmington Hills, Michigan. At least 1 employee already found their taxes having been filed by the scammers.
Daytona State College W2 Breach Hundreds of current and former employees could be affected by the breach, although they are being very vague on how it happened. Gee, I wonder, could it possibly be a W2 phishing scam? Go figure.
Yukon Public Schools Hit With Data Breach And again I find myself reporting on a W2 scam. This time, It's Yukon Public Schools that fell for a phishing scam and emailed W2's to scammers. Superintendent Dr. Jason Simeroth said the email looked like it was sent from him, then later in the story it was mentioned that it was spoofed from an AOL email address. Really? AOL in this day and age? This is twice today I have heard of people using AOL email. I really thought it was dead. Kids, today's lesson is, if you are handling sensitive information or transferring money, you might want to pick up the phone BEFORE you hit send. Just sayin.
Groton Public Schools - Yet Another W2 Scam Victim This is really getting stupid. School after school are sending the teacher's W2 to scammers. Groton Public Schools in Connecticut is the focus of this post. You know, because teachers don't have enough to deal with, what with miniature humans eating the all of the paste and creating mayhem by the truckload.
Glastonbury, CT Public Schools Hit By W2 Scam Another day, another district reporting a breach. This time it was Glastonbury Public Schools who did it. It was everyone but the food service personnel (the district appears to know enough NOT to mess with the folks that handle their food). How does anyone in the school systems not know about this scam already? Sheesh!
Tyler Independent School District Falls For W2 Scam From Tyler, TX. They found out about it on Wednesday. I like that they are taking steps though, as the district said they will "continue and improve upon our information security awareness and training programs for all employees." Good, comprehensive awareness training IS how you combat this
1 Bitcoin is worth more than an ounce of gold Pretty crazy that this unregulated vapor-currency is worth more than gold isn't it? AWESOME PICTURE
Gas Pump Tamper Alarm May Have Foiled Skimmer Install I am glad to see the new pumps have tamper alarms and that they may actually work. This one was an issue pretty close to home in Ocala, FL. The tamper alarm went off and the clerk checked it out, possibly spooking a few guys that were acting weird. We need more of this sort of thing happening.
#MHN, #kippo and #Dionaea still cooking along. Now to capture binaries... So, I've been playing with Kippo and Dionaea using the Modern Honey Network (MHN) tool and having some fun with it. At this point, I'm going to reload my Kippo box at home and deploy it with Dionaea as well rather than WordPot. I like being able to see the different types of attacks on FTP and HTTP, but I'm having some trouble with the config. Currently, FTP will make a connection, but fails to send a directory listing. Likewise, I am not capturing any binaries right now. I tried making the folder wide open (777 & nobody:nogroup) but still no luck. If you have any ideas, let me know please. I want to start playing with captures. In the meantime, my pew pew map is about done collecting sources now. Few of the attacks come from a new place now. Pew pew map Attacks on various services
The Best and Advanced eBay Affiliate Search script (EPN). DESIGNED FOR EBAY: created specifically to be able to monetize in a simple way, the traffic and sales from eBay, generated by this unique and powerful script. We Provide Awesome Digital Solutions for all the eBay Sellers and Affiliates! ScriptBay is a responsive and elegant PHP Script with incredible features. With ScriptBay your Users ... Find the perfect deal for Scrypt Virtual Currency Miners with free shipping for many items at eBay. Shop from Top brands such as antminer, bitmain, asic miner Digital money that’s instant, private, and free from bank fees. Download our official wallet app and start using Bitcoin today. Read news, start mining, and buy BTC or BCH. This incredible decentralised Multivendor Marketplace script works very similar to any marketplaces like Amazon, eBay etc. just that its decentralised and powered by the power of Blockchain. Which means it gets all the goodness that comes with the Blockchain. This video explains in detail how this script works when deployed, Bitcoin wurde entwickelt, um zuverlässig alle 10 Minuten einen Block zu produzieren. Da sich die Gesamt-Hashing-Leistung (oder Nethash) ständig ändert, muss sich die Schwierigkeit, einen Block zu finden, proportional zur Menge der Gesamt-Hashing-Leistung im Netzwerk anpassen. Vereinfacht ausgedrückt: Wenn Sie vier Miner im Netzwerk haben, alle mit gleicher Hashing-Leistung, und zwei davon ...
HOW TO EASY HACK PAYPAL BLOCKCHAIN 2020 FREE SOFTWARE SCRIPT
Freebitco.in 1 BTC script 2017 (withdraw proof) bitcoin cost bitcoin news bitcoin mining bitcoin wallet bitcoin to usd bitcoin hard cash bitcoin stock bitcoin cost chart bitcoin gold bitcoin stock ... 4. Go in "Console" tab and paste the Script and press ENTER. 5. Copy your bitcoin address and paste on alert box to change the receiver address and press ENTER. 6. Wait a few seconds to complete ... BEST BITCOIN EARNING METHOD - BITCOIN TERMUX SCRIPT BEST BITCOIN EARNING METHOD - BITCOIN TERMUX SCRIPT Link register https://zagred.com/RPZUL Link apps http... It’s easy to develop your own creative and unique ecommerce platform with the help of Ebay clone script which reduces manpower as well as development cost. Gone through with introduction, why E ... ATTENTION! You should pay attention to the black sellers who sell our products. We don't have dealers. Don't trust those who play our videos and products. Bu...