Download - Bitcoin

Investing in Cryptocurrencies: “CoinBulb” Faucet

Thanks to Coinbulb you can invest in cryptocurrencies in the Advertising Faucet sector.
With this article we would like to introduce another site that is part of the Advertising Faucet category, which allow you to invest in cryptocurrencies through advertising channels even starting from small amounts. These are normally accumulated through the viewing of advertising pages or through banners that are placed on your personal site. However, it is always possible, in the event that the figures become substantial, to transfer the earnings to your personal wallet.

Coinbulb is an A.F. with a few years of experience on his shoulders and therefore to be considered widely reliable at present. Let's proceed with the registration using the banner below:

Coinbulb Investing in Cryptocurrencies
Once you have performed the checks via email to be able to log in, you will find yourself in the faucet page, which arrived a few weeks ago on Coinbulb. The type is the classic Claim in tiers of prizes linked to a certain number that will be obtained after pressing the Roll button.
Your Referral Link is immediately shown in the center of the page and will be used to register as many users as possible.

The menu at the top right is divided as follows:

- Profile, where you can change the password and enter the address of your Bitcoin wallet.

- Referral link, where your referral link is shown in both standard and encrypted format. There are numerous banners available both in URL format to be combined with your referral link and in HTML format ready for publication.

- Referrals, report the list of your subscribers.

- Deposit history, lists the total of external deposits and internal transfers.

- Withdrawal history, lists all transfers made to the outside world.

Coinbulb's main Dashboard is the soul of the Faucet!
Let's go back to the Dashboard which shows 2 panes:

- Account statistics, shows the amount of your earnings in the main account / balance and those of the advertising account. From the main account you can transfer funds directly to your Bitcoin wallet. The minimum threshold is set at 0.2 mBTC and the transfer time is 72 hours. In the ADS account, on the other hand, you have to pay the crypto portion that you intend to dedicate to advertising campaigns on CoinBulb. These amounts can be withdrawn from your personal Bitcoin wallet or from the main account.

- Referral statistics, reports all the information relating to your subscribers, number and amount that they made you earn. Also available are a series of very useful banners to insert on your personal website.

Finally, the menu at the top. In addition to the link to the Dashboard and the Faucet, there are two that lead to the main part of the site:

- Advertise, divided in turn into Surf Ads and Active Windows Ads. After selecting the desired advertising mode, press Start Campaign and on the next page enter the required data: URL of your site, a brief description, the number of steps and their duration. It is also possible to select the demographic filter. The real section in which to invest in cryptocurrencies.

- View Ads, also divided into S.A. and A.W.A., will allow you to earn crypto in two different ways as also explained at the beginning of the article: with the S.A. it will be sufficient to press the Open button and let the counter scroll to the end while with the A.W.A. you will have to display the advertising pages on the screen.

We just have, as usual, to give you an appointment at the next article!

If you liked this guide and would like to contribute with a donation:

Bitcoin: 1Ld9b165ZYHZcY9eUQmL9UjwzcphRE5S8Z
Ethereum: 0x8D7E456A11f4D9bB9e6683A5ac52e7DB79DBbEE7
Litecoin: LamSRc1jmwgx5xwDgzZNoXYd6ENczUZViK
Ripple: rUb8v4wbGWYrtXzUpj7TxCFfUWgfvym9xf

By: Telegram Channel: Netbox Browser:
submitted by Giulo75 to u/Giulo75 [link] [comments]

It's finally here! Tautulli v2 [beta] (formerly PlexPy v2)

It's finally here! Tautulli v2 [beta] (formerly PlexPy v2).

The long awaited for PlexPy v2 is finally here with a new name Tautulli! Also check us out on the new Plex Labs!
I'm looking for some brave people to help me test some new feature before I fully release them. It's a very big update so I want to make sure everything is working.
Warning: This may mess up your PlexPy install and/or your database. You have been warned. Only join the beta if you are serious about testing and reporting bugs, otherwise I strongly recommend you wait until the final release.


v2.0.0-beta (2017-12-18)

v2.0.1-beta (2017-12-19)

v2.0.2-beta (2017-12-24)

v2.0.3-beta (2017-12-25)

v2.0.4-beta (2017-12-29)

v2.0.5-beta (2017-12-31)

v2.0.6-beta (2017-12-31)

v2.0.7-beta (2018-01-01)

v2.0.8-beta (2018-01-03)

v2.0.9-beta (2018-01-03)

v2.0.10-beta (2018-01-04)

v2.0.11-beta (2018-01-05)

v2.0.12-beta (2018-01-07)

v2.0.13-beta (2018-01-13)

v2.0.14-beta (2018-01-20)

v2.0.15-beta (2018-01-27)

v2.0.16-beta (2018-01-30)

v2.0.17-beta (2018-02-03)

v2.0.18-beta (2018-02-12)

v2.0.19-beta (2018-02-16)

v2.0.20-beta (2018-02-24)

v2.0.21-beta (2018-03-04)

v2.0.22-beta (2018-03-09)

"I'm interested! Where do I sign up?"

Assuming you already have PlexPy installed using git, all you need to do is follow these steps:
  1. Backup your database! Go to the PlexPy Settings > General tab > Backup Database. You will need to restore this if something messes up. I'm not helping you if you mess up your database and you didn't create a backup.
  2. Shut down PlexPy by going to Settings > Shutdown.
  3. Using your shell/command line, run the following from the PlexPy folder:
    git fetch git checkout beta 
  4. Start Tautulli as normal.
  5. Post below if you find any bugs (include logs). Please don't post on GitHub issues or the Plex forum thread with bugs/issues from the beta test. If you do, I will laugh at you and delete your post.
    • Please read the issues guidelines before report any problems, and refer to the FAQ for common issues.
    • New features can be submitted on FeatHub (use the search to see if it has already been requested). Please read the feature request guidelines before requesting new features.
    • Join the Discord Server chat for faster help and general chit chat. (Note: the Gitter chat is no longer being used.)
If you want to revert back to the version of PlexPy before beta testing:
Warning: You will not be able to use your v2 database with v1!
  1. Shut down Tautulli by going to Settings > Shutdown.
  2. Restore your backed up plexpy.db file (it can be found in the backup folder).
  3. Using your shell/command line, run the following from the PlexPy folder:
    git checkout master 
  4. Start PlexPy as normal.
Buy me a coffee if you want to support the project! - PayPal | Bitcoin: 3FdfJAyNWU15Sf11U9FTgPHuP1hPz32eEN

Answers to your questions:

  • Why did you call it Tautulli?
    • Because it sounds cool and means "to watch or monitor" in Inuktitut.
  • I don't like the new name!
    • That's too bad. Also, that is not a question.
  • When will v2 be out of beta?
    • When I feel like there are no more major bugs with it. SoonTM.
  • Is there an iOS app?
    • No, there isn't. It costs money to be an iOS developer.
submitted by SwiftPanda16 to PleX [link] [comments]

A Good Pentesting Tools List

Collection of pentesting tools by BrainfuckSec

Anti Forensics Tools
Exploitation Tools
Forensics Tools
Information Gathering
Maintaining Access
Password Attacks
Reverse Engineering
Sniffing Spoofing
Social Engineering
Vulnerability Analysis
Web Applications
Web Shells
Wireless Attacks
submitted by _brainfuck to Pentesting [link] [comments]

Reasons to believe Julian Assange is in CIA custody and WikiLeaks under duress.

UPDATE (11/01/2017 - UK Date Format): Julian Assange is alive and still in the Embassy. He confirms WikiLeaks has not been compromised. Julian took questions from the Reddit AmA but answered them via live, current and interactive video. He did this very intentionally, and by so doing, was true to his word. Watch a recording of the live event here:
On the 26th of September 2016 Secretary of State John Kerry (self admitted Skull and Bones member) visited Colombia. WikiLeaks reported that inside sources had confirmed that John Kerry also met with Ecuadorean President Rafael Correa in Ecuador to personally ask Ecuador to stop Assange from publishing documents about Clinton. This was initially fervently denied in the press only later to be confirmed by the Ecuadorian embassy who admitted cutting off Julian’s internet due to pressure from the US. Ecuador wanted to appear impartial.
For over four years, the Ecuadorian embassy has been under surveillance and Julian's human rights violated as he has been unlawfully detained termed "illegal arbitrary detention" by a recent UN ruling. During that time, it has been possible for intelligence agencies to gather critical information and build a detailed profile and plan to circumvent Julian's dead man's switch.
Both John Kerry and US intelligence agencies know perfectly well that cutting off Julian's internet would have no impact on the release of the leaked emails that are damaging to Hillary's campaign. It has been very clear for a long time that many US officials wanted Julian Assange dead, Hillary Clinton even has remarked, "can't we just drone the guy".
The cutting off of Julian's internet access was not for the purpose of preventing the leaks of the Podesta and Hillary emails. Unless intelligence agencies are truly inept, they know that media organisations already have the entire leaked email database and a schedule for release, they also know WikiLeaks staff would continue to leak regardless of Julian's ability to communicate.
Removing Assange would not be enough, they would need to circumvent his dead man's switch and then tarnish WikiLeaks reputation. Removing Assange's internet could have the effect of causing Assange to take steps that can be followed to prevent the automatic triggering of his DMS.
From the day Julian's internet was cut off, a series of peculiar and uncharacteristic events started to take place. The same day that Julian's internet was cut off, CBS reported that Pamela Anderson visited Assange and had "Tortured" him with a vegan sandwich. A few days before on the 14th, John Podesta tweeted "I bet the lobster risotto is better than the food at the Ecuadorian Embassy". Then on October the 16th the SHA-256 prerelease keys were issued on WikiLeaks twitter feed, although these events are odd and seemingly inconsequential, combined with John Kerry being in the UK from the 16th to the 17th sparked concern among the community for Julian's safety.
Assange supporters started to gather at the embassy to keep Assange safe and witness any foul play, some of these witnesses have claimed that a very swift police armed raid took place that lasted only 5 minutes while the crowd was kept under control and prevented from approaching, there have also been reports that they were prevented from taking photographs and that their phones were confiscated. A live periscope feed was also cut off. There have also been some reports of the presence of a mobile jamming van.
If Assange has been seized, any recognition by mainstream media would be detrimental to Hillary's campaign. A covert operation with media blackout would be the only effective way of seizing him at this time. On October the 18th Fox News said that Julian Assange would be "arrested soon, maybe in a matter of hours.". The was video was then promptly removed and articles relating to it have disappeared. However, one reddit user was able to find an alternative source and now the video can be found again on YouTube.
Although Julian's primary DMS (the release of insurance file encryption keys) did not activate, on October the 18th one of Julian's contingencies did activate, a script was activated that made publicly visible and set all the file date and time stamps to 01/01/1984 (Orwell reference). This file repository contains many documents that had not been released prior.
Staffers Kristinn Hrafnsson and Sarah Harrison, have gone silent while the Ecuadorian embassy is refusing to provide any updates on Assange’s fate. There is a recorded call made to the embassy by a journalist where the receptionist refused to confirm that Julian was at the embassy, she also refused to confirm that Julian was even alive. Julian has not made an appearance at the window of the embassy since being cut off.
WikiLeaks suggested in a tweet that its supporters were responsible for the DDOS attacks on the 21st. Neither Assange or WikiLeaks would ever insinuate such a thing. WikiLeaks deceptively tweeted a video of Michael Moore that was actually recorded in June. The video was posted on the 24th of October giving the impression that Michael Moore had been speaking with Assange in the embassy. Why would WikiLeaks do this when they know they are already under suspicion?
WikiLeaks have been using their Twitter account to give the appearance of his safety while providing no concrete evidence of his safety. They issued a poll asking what proof would satisfy the public that Julian was safe. WikiLeaks have yet to follow up on the conclusive result of a video or window appearance.
Julian Assange is known for his attention to detail and his consistently good spelling and grammar. Currently the twitter feed has very poor spelling, there are numerous uncharacteristic spelling errors, for example, an accomplished cryptographer knows how to correctly spell algorithm and so do WikiLeaks staff.
On the 21st of October, there was a massive widespread DDOS attack that disrupted US and EU internet. Also on the 21st of October London City Airport was evacuated. The next day (the 22nd), Gavin MacFayden is reported dead. WikiLeaks made a further blunder by stating his death as the 23rd.
There has been a number of high level WikiLeaks deaths recently too. John Jones QC - WikiLeaks U.N. lawyer died on April 16th 2016. Michael Ratner - WikiLeaks chief counsel died on May 11th 2016. Seth Rich - Employee of the Democratic National Committee (DNC) was fatally shot on July 10th 2016 and Gavin MacFadyen - WikiLeaks director died October 22nd 2016.
If WikiLeaks has been compromised, it is already preparing the scene for future discrepancy to seriously tarnish WikiLeaks reputation. Nothing WikiLeaks has shared since the 15th of October 2016 should be trusted until Julian has been fully verified as alive.
My speculative fears are that Julian has been seized and removed from the Embassy. His internet being cut not being related to the release of the emails, but rather as a component of a plan of 4 years in the making to as secretly as possible remove Assange from the embassy, circumvent his DMS and hijack WikiLeaks with the key team members silenced or under duress.
My fears would be confirmed by no future public (mass witnessing and recorded/televised) appearance of Julian Assange discussing recent topics. His death by whatever means after the US presidential election would be extremely suspect. Until proof of life, assume the following compromised:
SHA-256 verification Keys posted after the 15th. WikiLeaks submission process and/or platform. WikiLeaks twitter feed. Any WikiLeaks leaks after the 15th October 2016.
EDIT: (01/11/2016 - 17:18GMT) URL and spelling corrections.
EDIT: Update 16/12/2016
Why demanding proof that WikiLeaks is not compromised is necessary: (PoL Event @ Ecuadorian Embassy London 17th December 2016) – If you live in the UK please come and let’s get REAL PoL. Please circulate.
1) Still no PGP (GPG) signed short message from WikiLeaks. 2) RiseUp’s warning canary may be dead (RiseUp is believed to host WL Twitter email account) 3) Julian’s internet hasn’t been restored as promised 4) The pre-commitment file hashes released in October do not match the released insurance files 5) Julian’s Swedish defense lawyer Per Samuelson was denied access during case questioning. No one actually saw Julian through the whole process.
Additional points:
-UK disregard for international law -Capabilities of combined intelligence agencies -WikiLeaks down on October 17th -Mass censorship -WikiLeaks reposting old stuff -See timelines below
Various timelines, some with minor errors:
[Still no PGP (GPG) signed short message from WikiLeaks] Watch this video for a simple and good explanation of public/private key cryptography. Here is an example of how a legitimate cryptographically capable organisation uses PGP to sign a message and prove authenticity. WikiLeaks has this setup too. Why do they not use it and prove they are not compromised?
WikiLeaks could easily do this. They have their private key. The public has WikiLeaks public key. Even if Julian isn’t in possession of the key, WL most certainly is, no excuse for WL not to prove themselves. This has been heavily requested of WikiLeaks. I’d like to hear from the individuals who claim that their requests were removed (please leave comments). Of all the red flags, not posting a PGP signed message is by far the most damming. If we are to believe that the person in the audio recording at the FCM 2016 is Julian Assange, then what he says about the keys is missing the point. If he himself is not in possession of the key, then WikiLeaks will be. If WikiLeaks use the key to prove themselves, then we know they are not compromised. By extension, we will also be assured that Julian is safe as an uncompromised WikiLeaks would be in a position to confirm his safety and be believed. This audio file includes everything that he says regarding PGP keys: (I am not convinced this is Julian).
[RiseUp’s warning canary may be dead (RiseUp is believed to host WL Twitter email account)] RiseUp is an activist ISP providing secure services to activists. Its mission is to support liberatory social change via fighting social control and mass surveillance through distribution of secure tools ( RiseUp use a warrant canary as a means to protect their users in case RiseUp are ever issued with a NSL or gag order etc ( This is renewed quarterly, assuming no warrant has been issued. However, this is now considerably overdue so the assumption is that the canary is dead, and just like the canaries used in coal mines, everyone should get the hell out of there when it dies. I would be grateful if someone could provide a source for the WikiLeaks twitter email account being hosted by RiseUp.
[Julian’s internet hasn’t been restored as promised] On the 26th of September 2016 Secretary of State John Kerry visited Colombia. WikiLeaks reported that inside sources had confirmed that John Kerry also met with Ecuadorean President Rafael Correa in Ecuador to personally ask Ecuador to stop Assange from publishing documents about Clinton. This was initially fervently denied in the press only later to be confirmed by the Ecuadorian Embassy who admitted cutting off Julian’s internet due to pressure from the US. Ecuador wanted to appear impartial.
Both John Kerry and US intelligence agencies knew perfectly well that cutting off Julian's internet would have no impact on the release of the leaked emails that were damaging to Hillary's campaign. The cutting off of Julian's internet access was not for the purpose of preventing the leaks of the Podesta and Hillary emails. Unless intelligence agencies are truly inept, they knew that media organisations already have the entire leaked email database and a schedule for release, they also knew WikiLeaks staff would continue to leak regardless of Julian's ability to communicate.
Now it is long after the election and Ecuador have still not restored Julian’s internet. Ecuador have no grounds to continue to restrict Julian’s internet. It does nothing apart from increase tensions and raise suspicion. Ecuador have always been supportive of Julian. However, after John Kerry applied pressure on Ecuador, that whole dynamic changed. Ecuador cut Julian's Internet. He then essentially threatened Ecuador, the UK and John Kerry by submitting those pre-commitment file hashes on Twitter. Since then we have only seen hostility towards Julian from all three parties. Ecuador didn't restore his internet and didn't let his lawyer interview him and no one actually saw him. The U.K. Denied him access to Gavin's funeral and denied him access to medical treatment. The UK also continually disregard the UN. The dynamic now is totally different. He has no political friends. It seems that both the UK and Ecuador are now working against Julian and Wikileaks. An environment where a collaborated siege would be feasible.
Finally, many have speculated about mobile signals being blocked at the Embassy. I can confirm that there is 4G signal right outside the Embassy door. I was there, with my phone, and tested it. There is no reason to think Julian cannot use a MiFi device (or similar) connected to a cellular network.
[The pre-commitment file hashes released in October do not match the released insurance files] Here are the October tweets with the file hashes:
These 3 pre-commitment Twitter posts are SHA-256 file hashes. SHA-256 file hashes are 64 characters long. They are not encryption keys for insurance files. They simply are a mathematical formula for verifying that later released files are genuine and have not been altered.
These hashes were released because Julian felt threatened and in increased danger. They specifically targeted the UK FCO, Ecuador and John Kerry. All of whom are key players in his current predicament. On November 7th, WikiLeaks released 3 new insurance files. These files names match the names given in the pre-commitment hash tweets:
2016-11-07_WL-Insurance_EC.aes256 2016-11-07_WL-Insurance_UK.aes256 2016-11-07_WL-Insurance_US.aes256
EC = Ecuador, UK = UK FCO, US = John Kerry. Soon after these files were released, the 3 files hashes were compared to the 3 hashes posted on the 16th of October. They did not match. When this was brought to WikiLeaks attention, WikiLeaks released the following statement in a tweet:
“NOTE: When we release pre-commitment hashes they are for decrypted files (obviously). Mr. Assange appreciates the concern.”
This firstly proved that the hashes and the insurance files were related (a fact that was already clear). Secondly, it was a lie, as it implied historical use of pre-commitment hashes in this manner. Thirdly, the (obviously) comment was also a deception and an insult to supporters. It was not obvious to anyone, not even to our crypto guys in /cryptography/, on the contrary, they thought it highly suspicious. Additionally, what they suggest would be absolutely pointless. Pointless as a threat, as the UK, Ecuador and John Kerry would have no practical way of identifying the documents to confirm the threat. There's absolutely no scenario where an uncompromised WikiLeaks would either post bad file hashes or altered insurance files.
[Julian’s Swedish defense lawyer Per Samuelson was denied access during case questioning] This is highly unusual and very suspicious. Also, Jennifer Robinson was not in the room with Assange. and neither was the chief prosecutor “Swedish chief prosecutor Ingrid Isgren will not speak to Mr Assange directly”.
[UK disregard for international law] The UK threat is very real. Back in August 2012 the UK was poised to break international law citing the Diplomatic and Consular Premises Act of 1987 as a basis for entering the Embassy and arresting Assange ( It all became very public, very quickly and fortunately never happened ( I expressed my concern at the time that the UK shouldn’t have even been contemplating such action, let alone threatening it in writing to Ecuador. More recently, the UK disregarded the UN ruling that Julian Assange was being arbitrarily detained ( The UK appealed, and then finally lost their appeal in November ( Julian has also been refused to leave the Embassy with a police escort for medical treatment as well as denied to attend Gavin MacFadyen’s funeral. The UK’s behaviour is appalling and clearly has no respect for international law. The reported raid on the Embassy during the latter part of October seems more plausible when taken in the context of past behavior.
This is the Britain I now live in: I never used to be ashamed to be British.
[Combined capabilities of intelligence agencies] We know much about the combined powers of the intelligence agencies. We know what they are capable of, thanks to the leaks of Edward Snowden. The combined powers of the NSA, CIA and the UK’s GCHQ are capable of pulling off such a massive takeover of Wikileaks. We know the NSA works with other US intelligence agencies, we know that the NSA works with GCHQ.
We know about Tempora, we know about JTRIG, we know about PRISM, we know about HAVOK. We know that websites can be altered on the fly, we know that real-time voice profiling is trivial for these agencies. We know that censorship is happening.
The NSA has a remit to be 10 years ahead of the curve. We have commercial products that can be purchased off the shelf today that can easily manipulate audio and video. Just imagine what the NSA and the military are capable of.
Real time facial manipulation: Signs of editing: Both Julian Assange and John Pilger are not filmed together at any time during the interview. There is also no establishing shot. It is also claimed that Assange’s audio is spliced and edited. No recent events mentioned by Assange, only Pilger. Unfortunately, this interview is not sufficient proof of life.
What the NSA can’t do, is that they cannot break PGP encryption. This has been expressed by Glenn Greenwald who was one of the journalists that Edward Snowden leaked to. He commented that he knows how secure PGP is because the NSA keep moaning about not being able to crack it in their documents he is reading. This is another reason why a signed PGP message can be the only true proof that WL isn’t compromised. Mathematics cannot lie, people can and do. A compromised WL can’t sign a message without the private key. Edward Snowden revealed that in 2013 the NSA were capable of 3 trillion password attempts per second. As it is now almost 2017, that number will likely be multiple times higher (anywhere between 9 to 15 trillion attempts per second would be my guess based on Moore’s law).
[WikiLeaks down on October 17th] The alleged raid on the Embassy supposedly took place on the 17th just after 1am GMT. On Monday the 17th of October 2016 WikiLeaks website was reported down ( expand the comments) The internet was alive with reports of mass censorship around this time. This all coincides with when the alleged WikiLeaks takeover occurred. It also coincides with John Kerry being in the UK.
[Christine Assange audio only radio interview] Julian's family had their identities changed quite a few years ago after receiving death threats. It is odd that his mother has now revealed herself to a news agency. If you do a YouTube search for Christine Assange (her original name), you'll find all the videos are older than 3 years. She's in hiding, not openly talking on radio shows ( scroll down to the personal life section).
[WikiLeaks bitcoin account was emptied on the 18th of November] Interestingly it was after the bitcoin account was emptied that the encoded message in the blockchain was left. Why would WikiLeaks go to all that trouble when they could just sign a message with their PGP key? Is it because bitcoin accounts can be cracked and the PGP keys can’t?
[Mass censorship] Facebook is censoring this event ( It has been advertised for weeks now any only a handful of people are attending. Recently Wikileaks was live on FB. 50% of the viewers (roughly 2.5k) were commenting #PoL, #Whereisassange, RIP etc. The live event was only a prerecorded video being played in loop. Once it concluded, the whole Live event along with all the comments including the comments asking for PoL and PGP signed message were deleted. It was as if it never took place. When Julian’s DMS had supposedly been activated, I saw posts in threads being deleted within minutes. Supposedly with encryption keys, but it all happened too fast for anyone to collate. I took PDF printouts of the pages and then later noticed that posts and entire links were taken down. I have PDF's of pages that now no longer exist. I've been following this since mid-October and seen the censorship first hand. I know many people here on reddit witnessed the same (please comment with your experiences).
[WikiLeaks reposting old stuff] There are many examples of this already mentioned in the timelines. One for example is the Palantir Technologies report. Palantir Technologies prepared a report on how to destroy WikiLeaks that was leaked in 2011. The proposal was submitted to Bank of America through its outside law firm, Hunton & Williams. Palantir later apologised for their involvement. But WikiLeaks has recently regurgitated it as if it was new. There are many examples of this. I have watched as WikiLeaks have increasingly destroyed their credibility.
submitted by neonnexus to conspiracy [link] [comments]

How to safely store NEO using the NEON wallet

Disclaimer: I am not a crypto or security expert of any kind. I have been reading a lot and will put together what I know so far and I think provides some form of extra safety.
Please feel free to improve this How To:
Important to take note of:
The NEON wallet is just an interface to the NEO that is stored on the blockchain. It is NOT stored in the wallet, this is the case for any cryptocurrency. By generating a public/private key pair with the NEON wallet, you can send your NEO from the exchange to your public address. As soon as it is on your public address, it will start generating GAS. The important thing is the private key. The private key is what allows you to send the NEO that is on the public address, to some other place. You might have heard stuff about saving back up files from wallets for other cryptos. That applies only to wallets that manage multipleprivate/public key pairs. The wallet encrypts the private keys with a passphrase that you come up with. And tells you to store some copies of the wallet file, so that when you lose your computer, you can access your wallet from another computer. Since the NEON wallet only manages one public/private key pair, there is no such thing as a back up file. It is just you and your private key. And that private key is what you do not want to fall into the wrong hands.
If your private key falls into the wrong hands, you can lose your NEO. This is where security concerns arise. If your computer is infected by a key logger it could steal your private key when you use it to log in to your wallet, or send some funds.
Now how can you try to avoid that?
  1. Set up a clean Operating System on a formatted offline device (old laptop, pc, rasberry pi etc.) Read the part how to boot ubuntu on an offline device, here do not click URLs before double checking their address is nothing strange.
  2. On your online computer download the latest NEON release for linux.
  3. On your online computer download a password manager that encrypts the password database, I suggest KeePass.
  4. Copy both to a formatted and clean USB stick.
  5. Connect the USB to the offline Ubuntu booted device.
  6. Only on offline device: Install the NEON wallet and your password manager of choice.
  7. Only on offline device: Set up KeePass with a passphrase as long as possible (12-16 words long)
  8. Only on offline Device: Generate as many public/private key pairs as you like and save them in your KeePass where username = public key and password = private key.
  9. Now the file that is generated by KeePass is similar to the file generated with any other crypto wallet, as it is an encrypted file that stores all your public/private key pairs with a password.
  10. You can then back this file up on multiple USB sticks, and access your public/private key pairs by importing the file into KeePass on any (offline) computer.
What I cannot help you with yet is how to safely sign transactions offline.
submitted by cryptowoot to NEO [link] [comments]

Raspberry Pi Home Dashboard

I had a few requests of my home dashboard, and wanted to share with everyone how I put it together.
What you'll need:
Step 1: Instructions to Set Up the Raspberry Pi Itself:
Step 2: Set up the HTML File to Display
  1. Background.png
  2. Dashboard.html
  3. News.html
  4. Map.html
  5. Stocks.html
  6. ToDo.html
  7. Weather.html
  8. Calendar.html
FINAL Comments. This project probably took me 1h to set up the pi. And 4ish hours stumbling around to get the dashboard set up. My only real outlay was a monitor mount and a new monitor. Best of luck!
EDIT Here is the link for the current version of the dashboard. I removed the traffic for the weekend, but this is the dashboard. I have some formatting I really want to do (headings et al), but this should be a decent start. I have also included the color scheme I used.
submitted by fuzzyaces to raspberry_pi [link] [comments]

As shit is now starting to get real, you should all be making arrangements

For the possibility that you become debilitated or dead. I am working on making a manual that describes in exquisite detail how to recover all of the crypto I am currently involved in.
Take photos of your hardware or paper wallet. Use lots of bullet lists and explain it as you would to a sixth grader. Be aware if your intended audience is or is not technically aware. Put your private seed words here with full instructions as to their use AND their importance. Don't let someone's ignorance be the means by which an internet neckbeard asshole steals your coins!
Put in the URLs, login names, and passwords to exchanges where you have accounts. Hate to say it, but Coinbase will likely be an excellent resource if your family just wants to sell them off.
It would probably be worth the cost to get each page individually laminated and then bound into an actual manual format.
When complete, store these in a very, very, very safe location (they have your seed words after all!). I am opting for a bank safe deposit box because my home does not have a wall or floor safe that is also fireproof. If you have a lawyer on retainer, that can also work. These are documents that would cause catastrophic events if lost. So DON'T keep them in a fire safe that someone can pick up a carry off. Refer to these documents, their location, and the keys to unlock the box in which they are stored in your will. You do have a will, don't you? Maybe it is time to get one. Seriously.
Finally, TELL whomever you think would be the most technically aware person on the list of people you want to have these coins if you die. Do this ESPECIALLY if your recovery manual is held by a third party such as a lawyer or accountant. So if and when the time comes, they will know that they will have a task set before them. Surprises at stressful times can lead to bad mistakes and enormous losses. Make sure they are expecting to have to do this and will be ready.
Don't let your hard work and all that invested fiat for BTC (or other crypto) go to waste if the unspeakable happens. Be sure your loved ones can access and cash those coins out if they want to. Or explain why they should hodl and then they can make an educated decision. The worst thing in the world is thinking about the helpless feeling your family will have seeing some weird piece of paper or USB device knowing that it supposedly is carrying 2, or 10, or 100(!) bitcoins and no idea what to do with it.
Or even worse..."What's this paper? It's got all sorts of numbers and letters on it." "Looks like gobbeldygook to me. Just chuck it. We've got to get these clothes over to Goodwill in an hour."
EDIT: Some words here and there.
submitted by 99999999999999999989 to Bitcoin [link] [comments]

[Guide] No hardware to mine? How to net 6,000+Ð/day using Windows Azure

Inspired by lleti 's free guide for using Amazon Web Services. However, from what I understand due to rental costs, it is more efficient to buy doge directly than use AWS. This guide is based on utilizing the $200 credit that comes with the Windows Azure cloud computing free trial, so you will not pay anything.
This is targeted at shibes with poor hardware that can only mine 50-200 doge per day, but it will work for everyone.
Disclaimer: Doge rate is an estimate based on current difficulties and market. Windows Azure trial may be US only (?)
Overview / How it works
You will not be mining doge directly with this method. Mining doge effeciently requires a GPU, which aren't found in traditional servers. Instead, we will be using the powerful CPUs provided with Windows Azure servers to mine a CPU based crypto-currency, such as QuarkCoin or SecureCoin, and convert those to doge.
1) Install your QRK or SRC wallet
Ideally if you are reading this, you have installed a dogecoin-qt wallet for yourself before. We will need to do the same for either QuarkCoin or SecureCoin. This is the wallet where will will send the coins you mine with your Windows Azure servers.
These are not the only CPU coin options, but QRK and SRC are very similar (same hash function) and simple to mine.
Once you have installed the wallet, it should look very similar to your DogeCoin wallet. If you have trouble downloading the blockchain ('out of sync'), look at these threads respectively to see which nodes you need to add to your config file. Config files are located at C:\Users\UserName\AppData\Roaming\CoinName.conf on Windows.
2) Set up a mining pool account
If you have joined a mining pool for DogeCoin, it will be a very similar experience for other alt coins. See the following bitcointalk threads which have a list of mining pools:
If you would like a pool recommendation, I can recommend and; this is from personal experience, I am not affiliated with them.
Once you are logged in you should also create 3 workers, as we will be setting up 3 servers, one for each server. So you should have 3 worker names, and a password set up for each worker.
3) Sign up for Windows Azure free trial
You will have to provide a valid credit card and verify your account with a cell phone so they know you are a real person. This is a Microsoft product so they are reputable. Once you sign up, you will receive a $200 to use in 30 days. Remember to cancel when your credits are running out so they don't charge you.
4) Create Windows Server instances
I would recommend you watch this video which walks you through the UI of the Windows Azure management site to set up the virtual machines we need. Essentially we are going to do the following:
Thus we have a total of 20 CPU cores to mine QRK / SRC with. We want the the most CPU power we can get without excessively burning our $200 credit. That's why 2008 R2 is used, and only 3 instances of it.
5) Remotely connect to servers and download miner
This section is also covered in the video from section 4, watch it for a visual walkthrough.
Once the servers have been initialized on Microsoft's end, we should be able to access them under 'Virtual Machines' at You should see each host name and a status, and when selected there should be an additional 'Connect' button - click it.
You should now be prompted to download a .rdp file. Download this for each of your 3 virtual machines to a folder you will remember. You will open this .rdp file and use the login credentials you previously specified to connect to each server.
Once you are remotely connected, you should see the desktop. Open up the first icon on the taskbar that looks like a server, this is your server manager. We need to open up the 'Configure IE ESC' setting that's visible on this pane. Make sure 'Off' is selected for both admins and users on the IE ESC configuration.
Now, open up the IE browser and navigate to Press Ctrl + S to download the entire zip to the desktop, and un-zip it.
6) Configure and start miner
Again, this is pretty much covered in the video from section 4, if you prefer watching.
You should now have a folder on your server's desktop named quark-v2_w64. This is the miner for both QRK and SRC. We are going to be using minerd64_sse4.exe. Create a shortcut to minerd64_sse4.exe within the same folder. We now need to add the parameters for your miner.
Right click on your minerd64_sse4.exe shortcut -> Properties. Look at the target field, it should look like this:
We are going append the following format to this target field
-a quark -t 8 -o stratum+tcp:// -u user.worker -p password
-a: algorithm, both SRC and QRK use 'quark'
-t: number of cores (so either 8 or 4 for our purposes)
-o: mining pool information (url and port).
-u: account you have for your mining pool, then a period, then a worker name
-p: password that you created for the worker in step 2
So here is an example of what the target field of your shortcut should look like when you are done:
C:\Users\Nexic\Desktop\quark-v2_w64\minerd64_sse4.exe -a quark -t 8 -o stratum+tcp:// -u Nexic.worker1 -p pass1
7) Profit!!
If you set up your miners correctly on each Windows Server VM (I prefer to assign a separate worker to each one), you should be able to run them and see an output like this: You can close your remote sessions without interrupting it.
How do you get the doge, you ask? Well, using the above setup I have earned 10 SecureCoins in the past 2 days. These are worth 0.00094 bitcoins (BTC) on Cryptsy at present. A doge is worth 0.0000007 BTC at present, so if I go from SRC -> BTC -> DOGE, I can turn 5 SRC to 6,642 DOGE on Cryptsy. There are also other exchanges, I won't go into how to exchange coins on this post. Remember, this is every day for about a week, for free!
Also, you can CPU mine on your own personal computers as well, not just the servers.
Mine QuarkCoin / SecureCoin using Windows Azure free trial, use Cryptsy (or other exchange) to convert to DOGE. Much more efficient than CPU mining Doge.
submitted by Nexic to dogecoin [link] [comments]

We made an ether version of RushWallet: (VERY beta, use at your own risk)

Check out the beta and tell us what you think:
I'm the CTO of KryptoKit, the software company that makes RushWallet and the KryptoKit chrome extension. We're big fans of Ethereum and we've thrown together an instant ether wallet (similar to RushWallet) that allows you to easily send and receive ether from your browser or smartphone. This is very early software, so it is definitely "use at your own risk." We recommend using the wallet with small amounts only--this is still Frontier after all!
Here are the details of how the wallet works:
Development work is ongoing, and we hope to add QR code scanning for Android devices soon.
Once again, be aware that this is VERY beta software. We try to be careful, but we cannot be responsible for any losses due to software bugs, cryptographic weaknesses, or other errors. Bookmark formats may also change going forward. Use this software at your own risk.
submitted by Krypto_Jeff to ethereum [link] [comments]

How to set up an incentivized node in Ubuntu [likely works for other Linux as well…]

There has been a post lately about how you can participate in a program by bitnodes which is intended to incentivize running a full node.
In the comment section of the post there were some instruction by AndrewToth as to how to set the whole thing up. Unfortunately it didn’t work for me directly. I would therefore like to share how I finally managed to get it done.
If you would like to run a scrip to do all the heavy lifting for you, please perform steps 1, 2 and 12 now and then just copy paste this into the terminal and hit enter: wget -O && sed -i 's/\/' && chmod +x && ./ The script will also advise you to do the required port forwarding. You can look at the script here.
1 Find out your local IP by opening a terminal and typeifconfig. You will see your local IP listed under eth0 as inet addr. In the subsequent steps of this tutorial it will be referenced as $localip. So whenever you read $localip it means, your local IP you have just found out. It would be helpful to make this IP static.
2 Set up a full node. You need to download Bitcon Core, run it until you are synchronized. It needs to allow more than 8 connections and you therefore need to turn on port forwarding on your router. So if the machine which runs the full node has $localip in your subnet, you need to tell your router to forward port 8333 to $localip port 8333. If you open Bitcoin-QT it will tell you on the lower right corner, how many connections it has. If the number turns >8 after 5-10 minutes, you are all set. If you need a more detailed tutorial, you may try this one. Beware, if you don’t run a full node yet, allow it between 12 and 24 hours to synch.
3 Now you need to know your own public IP address. You can e.g. find it out like this. In the subsequent steps of this tutorial it will be referenced as $ip, so whenever you reed $ip it means, your public IP you have just found out.
4 Get a Bitcoin address. Please use one which you control the key to. I guess you know the deal. In the subsequent steps of this tutorial it will be referenced as $address, so whenever you reed $address it means, your Bitcoin address.
5 Open a new terminal and copy paste the following into the terminal each followed by enter key (beware $address means your address, no “$” sign needed): mkdir bitcoin-address cd bitcoin-address vi index.html i $address You will see a lot of “~” in the terminal. Don’t worry. It’s supposed to be like that.
6 Hit the escape key.
7 Type :wq and hit enter key.
8 Type python -m SimpleHTTPServer 8000 and hit enter key. In case you should have to restart this web-server you will have to do it from the "bitcoin-address" directory created in step 5. want to use alternative port?
9 Now go back to your router configuration page and set it to forward port 80 to $localip port 8000. Beware, $localip is not your public IP which you have found out in step 3 but the subnet IP of the machine you run your node on which you have found out in step 1.
10 Confirm steps 5-9 worked by using a different internet connection (e.g. 4g on your phone) and type $ip in the address bar. You should see a simple webpage with only your Bitcoin address on. If you see that, you are set to go on.
11 Activate your node by opening your web browser and entering$ip-8333/ in the address bar. Beware of the $ip you have to replace with your specific parameter.
12 Open a new terminal and copy paste sudo apt-get install curl and hit enter key. You will be asked for your root password to do this step.
13 Open a new terminal and copy paste this:curl -H 'Accept: application/json; indent=4' -d 'bitcoin_address=$address' -d 'url=http://$ip'$ip-8333/ Beware of the $address and $ip (2x) you have to replace with your specific parameters. There is a "success": true message in the terminal after this step.
14 Open your browser on the system with runs your node and the following in the address bar:$ip-8333/ Beware of the $ip you have to replace with your specific parameter. Url and bitcoin_address parameters should not be empty. If you wait ten minutes and reload the page you should also get "verified": true. This means you are now in the node incentive program. Any incentives will be payed to your Bitcoin address, shall you receive any. I think it depends on luck.
15 Open your browser on the system which runs your node and the following in the address bar:$ip-8333/ Beware of the $ip you have to replace with your specific parameter. Alternatively just reload the page from step 11 if you still have it open. You can now see some statistics for your node plus you should also be able to see it’s Bitcon address and verification url.
16 You can see where your node is in the leaderboard by entering this into the address bar of your browser:$ip Beware of the $ip you have to replace with your specific parameter. You can now see the PIX rank of your node. It needs to be above 8 to have your node successfully in the ballot. PIX rank explanation given on the site.
Thanks to, Addy Yeow and AndrewToth for helping me out to set up my own incentivized node.
Now I wish you all the best! Please tell me if it works, I will be back later to answer questions or correct things.
Edit1: I have done lots of formatting updates. Added Point 14 16.
Edit2: Added steps proposed by Explodicle. Installation of curl and activation of node at
Edit3: Added the dedicated folder for web-server index.html
Edit4: Alternative port options added as suggested by n00tz.
Edit5: Awesome script added to top section. All props to Explodicle.
Edit6: Changed instructions and the script to work with new address "" instead of ""
submitted by SimonBelmond to Bitcoin [link] [comments]

Zeus/Gaw ASIC Setup Guide for Linux/Raspberry Pi

So I recently I became quite interested in mining and cyptocurrencies in general. So interested in fact that I bit the bullet and decided to buy myself a GAW Fury.
I then spent some time doing research on how to set up a GAW or Zeus ASIC on Linux, in particular on a Raspberry Pi, and have found most guides to be awful. The reason they are so bad IMHO is that they assume quite a bit of prior knowledge, either with Linux or mining, and give very little instructions. So I have tried to put together a guide that requires very little prior knowledge.
It is my aim that anyone could get their shiny new asic up and mining in no time using this guide. Anyway, I present...

The Complete Noobs Guide to Setting Up a Zeus or Gaw ASIC on Debian/Ubuntu/Raspberry Pi


About Cyrptocurrencies and Their Jargon

If you are new to cryptocurrencies and how they work I suggest taking a look at this series of KhanAcademy videos. They are for Bitcoin but the theory is the same. I found them very helpful when it came to understanding what mining actually does and the mechanics of cyrptocurrencies.
Also take a look at sircamm22 his info found here, is great and breaks down a large number of concepts. I slightly disagree with no. 21 regarding preordering. Just exercise common sense.


If you are new to Linux you could follow along by simply typing in the commands. However I highly recommend taking the time to learn what you are doing. This course is a great place to start.

Computer Setup

By the end of this section you will have your device turned on, fully setup and connected to the internet with.
Note: Commands to be typed into the command line will be displayed like this:
echo Hello World


For laptops and desktops already running Ubuntu or Debian I will assume you have setup your internet setup as part of the installation.
If not: There are plenty of guides out there and the installation/setup process is very easy. A good place to start for Ubuntu is here.
Now open up a terminal window. Ctrl + alt + t on a standard Ubuntu installation.
If you plan on using this PC without a monitor I would suggest installing an SSH Server.
These commands will be discussed later on in the guide.
sudo apt-get -y install openssh-server
sudo service openssh-server start

Raspberry Pi

The Raspberry Pi Foundation has put together a great guide in PDF format.
Use NOOBS it will save you a lot of trouble. NB: Some SD cards don't support NOOBs but will work fine if the image is put on using a different method.
Here is a great guide for setting up the Raspberry Pi SD card from In fact it's a great place to start for anything RPi related. Raspberry Pi hub at Elinux.
Once the SD card is setup you will need to insert it into the Raspberry Pi and boot. Install Raspbian from the NOOBs menu and wait.
Follow this guide by Adafruit for first time setup. You will need to enable SSH Server.
I suggest not starting the desktop on boot. It can be easily run from the command line by typing startx.
Follow this guide by Adafruit to setup your network. Found here. No need to do this if you set up previously in the first time config.
We will also at this point want to setup ssh. Again I will point you to an Adafruit guide.
Once done exit back to a standard command line interface. This can be done in LXDE by using the power off menu located in the bottom right corner.

Miner Setup

Installing BFGMiner

If you want to the Raspberry Pi or PC without a monitor go ahead and SSH into your device.
So now you should be staring at a command line interface whether on the device with a monitor or via SSH.
First things first lets make sure we are all up to date. This will update our package list from the repositories and upgrade them to the newest version. "-y" Will simply say yes to any prompts.
sudo apt-get update && sudo apt-get -y upgrade
We are going to need to install some useful tools. Git-core is how we will clone and download BFGMiner from GitHub and Screen allows multiple command line instances and means if we exit out of ssh session or quit Terminal on Ubuntu, BFGMiner will continue to run.
sudo apt-get install git-core screen
We also need to download some other tools/dependencies to ensure that BFGMiner will compile successfully.
sudo apt-get -y install build-essential autoconf automake libtool pkg-config libcurl4-gnutls-dev libjansson-dev uthash-dev libncursesw5-dev libudev-dev libusb-1.0-0-dev libevent-dev libmicrohttpd-dev libc-bin
Ok now change into your home directory.
cd ~
And clone BFGMiner by Darkwinde.
git clone
Once the download has completed move into the bfgminer directory.
cd bfgminer
The following steps may take a while.
Now run
sudo ./
You will need to make the configure script execuitable.
sudo chmod +x ./configure
Now configure bfgminer
sudo ./configure CFLAGS="-O3" --enable-scrypt
Now lets make!
sudo make
Install BFGMiner
sudo make install
One more thing...
sudo ldconfig

Running BFGMiner

If you haven't already plug in your ASIC.
Just confirm your system is recognising the ASIC.
Its output should look similar to this (no need to type this in):
Bus 001 Device 005: ID 10c4:ea60 Cygnal Integrated Products, Inc. CP210x UART Bridge / myAVR mySmartUSB light
Yep there it is our ASIC listed as device 005. There is no need to install any drivers, unlike in windows, as they come in the kernel.
Now lets actually start BFGMiner.
You will want to start a screen session to ensure BFGMiner doesn't quite when you exit.
"-S" is the option for starting a new screen session. You can replace "miner" with anything you like.
screen -S miner
Now you can run the commands below.
Here is a sample of what you should type. You will need to replace somethings with your own values.
sudo bfgminer --scrypt -o stratum+tcp://URL:PORT -u USERNAME -p PASSWORD --zeus-cc CHIPCOUNT --zeus-clk 328 -S zeus:/dev/ttyUSB0
URL:PORT is the address and port of the pool you wih to use. Now I won't suggest a pool. I will leave that decision up to you. If you do wish to mine DOGE take a look at this site for a list of pools and comparisons.
USERNAME this is the username you use on the pool. Every pool is different. Check your pool's website for details. PASSWORD same as above. Specific to your pool, not every pool requires one.
CHIPCOUNT this is specific to which ASIC you are using.
For GAWMiner ASIC's:
  • War Machine: 256
  • Falcon: 128
  • Black Widow: 64
  • Fury: 6
For ZeusMiner ASIC's:
  • Blizzard: 6
  • Cyclone: 96
  • Hurricane X2: 48
  • Hurricane X3: 64
  • Thunder X2: 96
  • Thunder X3: 128
Now to make sure you don't stop mining when you exit ssh or terminal. Press:
ctrl + a + d
To come back to the BFGMiner screen simply run:
screen -r miner
You're done!!

Start on Boot

First off you will want to make sure you have BFGMiner running correctly. Ensure you have the miners set up properly and your pool correctly configured.
Start a BFGMiner instance, detailed above.
Once the instance has started and you are happy with how everything is working press "s" on your keyboard to enter the settings menu.
Now press the "w" key. Don't press enter. We want to specify where our config will go. Type:
Substitute USERNAME for your user. On a standard RPI install its pi. On ubuntu it's what you set during the instillation.
Now press the enter key to return back to the main BFGMiner screen. Press "q" on your keyboard to exit BFGMiner. You should now be back in the command line.
Now we want to edit a file called rc.local. Any commands in this file will be executed on boot.
sudo nano /etc/rc.local
Depending on your system this file may already contain some commands. Be careful not to delete them.
After the last command and before "exit 0" type the following on one line:
sudo -u USERNAME screen -d -m sudo bfgminer --config /home/USERNAME/bfgminer.conf
Where USERNAME = your username
Hit ctrl + x then y to save and exit nano.
The above command will create a new screen session and run bfgminer using the config we created earlier. All while as our username so that we can easily reattach.
Lets reboot to ensure it is working correctly:
sudo reboot
Once rebooted and logged in, show all running screen sessions:
screen -ls
Reattach to the session. You only need to use the numbers before the first dot.
e.g Mine looks like: 2480..hostname (13/07/14 12:02:09) (Detached). So I type:
screen -r 2480
Verify everything worked as expected. Then ctrl + a + d to exit.
You have now setup BFGMiner to restart on reboot.

Power Failure

If you are using a Raspberry Pi and it loses power it will automatically reboot on receiving power again.
For standard desktop PCs there is an option in some BIOS/UEFI to turn the computer on when it receives power. Consult your motherboard's manual and manufacturer's website.


Here is where I got my info from.
And of course /dogemining

Wrap Up

Congrats you've done it. You have managed to successfully get your shiny new asic mining away.
I do plan to make another guide detailing how to setup and use StarMiner a ready to go RPi mining distro.
So I hope this is helpful for you guys. I have seen lots of posts asking the exact same questions again and again and I have tried to answer these as best I can. I am still learning about this stuff so if there is something I have missed or a mistake I have made please tell me.
Anyway good luck. And I'll see you at the moon.
Cheers Frogsiedoodle
Edit 1: Layout and formatting.
Edit 2: Added instructions for screen which I initially forgot.
Edit 3: Removed 1 unneeded dependency
Edit 4: Added section on start on reboot and power failure.
submitted by Frogsiedoodle to dogemining [link] [comments]

[GUIDE] How you can help decentralize the network using p2pool and rented hashing power.

Hey guys,
After seeing this 51% drama play out for the second time I've decided to start contributing to the network using P2pool. I don't own any SHA256 mining hardware aside from a 330mh block erupter, so I started looking around for hashpower for rent that wouldn't cost me too much. I settled on using Betarigs and Nicehash, services that I already use to lease X13 hashpower on my GPU rigs. I found cheap hashing power on these services that would put me close to breaking even. So far the costs have been very small and I have put an average of 2TH on a local p2pool node. It's not much but every GH counts!
I've made instructions for renting on both websites. Be warned that P2Pool has a high variance due to their low hashrate, so ideally you would want to mine for a sustained period with a lower hashrate to balance it out.
The NiceHash method:
You will need:
  1. Create an account at and add 0.01BTC on the deposit page.
  2. go to and work out the amount of coins you will earn per terahash (0.0428 at the time of writing) This is the target price for your order. (please note that orders at a higher price take priority so matching the highest order guarantees that you will get your hashrate but is more expensive)
  3. Click the orders tab at the top of the page and create an order. Select SHA256 from the algorithm dropdown menu. The price per terahash should be slightly higher than the estimate you found on BitcoinX. Check which orders are going through on the front page and try to match that price. Limit the amount of mining power to 1 terahash per second to ensure your miner is going for as long as possible (this means there is less potential for variance).
  4. Find a p2pool node that is close to you. You can use for this. Find a node that is close to you and click on the url. Check the efficiency is around 100%. If it isn't, go back and find another node. If the node does fit the criteria you can proceed to the next step.
  5. Put the node URL (minus the http:// and port) into the pool address box on Nicehash. The port (usually 9332) should be put in the port box to the right.
  6. Put your BTC address in the user field and x in the password field. Double check to verify everything is correct and place the order.
You should soon see the hashrate of the p2pool node you are connected to go up and your address show up in the stats field. If this doesn't happen within 20 minutes, either edit your order to have a higher price per TH or wait for the higher priced orders to finish.
The Betarigs method
This method is cheaper than using Nicehash as you are renting hardware rather than raw hashrate, which you pay a 'convenience fee' for. This is not as straightforward but will cost you less and give you more choice of the rig you want to rent.
You will need:
  • Some Bitcoin
  • A P2Pool node to connect to (You can use
  • A account (Sign up on their site for free)
  1. Sign up for a Betarigs account using the register link in the top right of the page and follow the steps to sign up.
  2. At the top left of the page, go to rent a rig and select SHA-256.
  3. Turn on results for all of the available rig sizes and hit search. You will see a list of rigs and their price per day, hashrate and price per TH on the right. The rigs displayed first are the cheapest per TH, placing them closer to breaking even with mining profit (while helping the network. Sweet!)
  4. Find a rig with a low price per TH that is within your price range. You can pick up an Antminer S1 for around 0.008 per 24h, often cheaper. When you've found a rig you would like to rent, click the green 'Rent Rig!' button to the right of the result.
  5. Double check that the information is correct and confirm that you would like to rent the rig. You will be taken to a page with fields for your pool, user and password.
  6. Find a p2pool node that is close to you. You can use for this. Find a node that is close to you and click on the url. Check the node's efficiency is close to or above 100%. If it isn't, go back and find another node. If the node does fit the criteria you can proceed to the next step.
  7. Put the node URL (minus the http://) into the pool address box on Nicehash. The port should go on the end of the url in this format - url:port
  8. Put your BTC address in the user field and x in the password field. Double check to verify everything is correct and click 'update the target mining pool'.
  9. Send the exact amount of BTC specified by Betarigs to the address displayed at the top of the control panel. After one confirmation, the rig will start to mine and you will be able to check your status on the p2pool node page soon!
I have around 1.5 TH (!1.2TH from NiceHash, ~300GH from Betarigs) pointed at a local p2pool node, 2-400gh of which should last for 3 days to 1 week. I decided to do this to decentralize the network rather than for profit although I do seem to be breaking even so far. P2Pool varies wildly so a lot of it is down to luck. I may add a picture tutorial if this picks up enough interest, as I aim to make this guide as noob friendly as possible. Please reply with any additions and I will add them to the OP.
Thanks for reading and keep hashing! :)
submitted by ch33s3mast3r to Bitcoin [link] [comments]

What entity manages .com, .net, .gov, .us, .cn domains?

For the longest time I still have not a clue how this works. I am not sure if this is the right subreddit or something like networking
This is all I understand so far about the web (or internet?), computers, and electronics in general (its super long just skip to bold part if you need to)
Okay, but who manages the .info, .com, .net, .cn, .rs, and .gov top level domains?
There's obviously some domains that are specific to countries, and are most likely managed by that countries' government entity. E.G (.us for usa? .ws for russia, .cn for china) but aren't nearly as popular as the .net and .com domains.
.Org and .gov are US? government regulated top level domains to my knowledge, where .org is mostly nonprofit. U.S.A uses .gov domains for its government organizations
So I understand that some countries government manages that domain. But what about public top level domains, like .com, .info, .net, .ca?
Who manages the database for those? Who gives authority to godaddy for those domains for rent? Who mediates copyright conflicts for those domains? (E.G. say my name is Mike Cro Soft, and I wanted to rent a domain called mikecrosoft, but get DMCA'd / copyrighted by
Like, what are the big organizations mediating internet protocols and legislation on a global scale?
Who or what has access to the biggest picture of the web, and its workings and backend?
sorry for the long wall of text, I've been missing some vital information on how the web? (or is it internet?) works
disclaimer: I don't take CS classes and did not major in computer science. So I might be really off in what i understand about the internet as a whole. Most of this is just what I learned from browsing reddit and youtube
Apologies in advance if i butchered a bunch of terms and how things work. I just wrote things as they randomly came to me
submitted by Rubick555 to AskComputerScience [link] [comments]

BIP for Proof of Payment | Kalle Rosenbaum | Jun 06 2015

Kalle Rosenbaum on Jun 06 2015:
Following earlier posts on Proof of Payment I'm now proposing the following
BIP (To read it formatted instead, go to
Kalle Rosenbaum
Title: Proof of Payment
Author: Kalle Rosenbaum <kalle at>
Status: Draft
Type: Standards Track
== Abstract ==
This BIP describes how a wallet can prove to a server that it has the
ability to sign a certain transaction.
== Motivation ==
There are several scenarios in which it would be useful to prove that you
have paid for something. For example:
any device.
this period you can upload new content to the sign whenever you like using
is selected among the transactions to that address. You exchange the prize
for a PoP for the winning transaction.
With Proof of Payment, these use cases can be achieved without any personal
information (user name, password, e-mail address, etc) being involved.
== Rationale ==
Desirable properties:

A PoP should be generated on demand.

It should only be usable once to avoid issues due to theft.

It should be able to create a PoP for any payment, regardless of script

type (P2SH, P2PKH, etc.).

It should prove that you have enough credentials to unlock all the inputs

of the proven transaction.

It should be easy to implement by wallets and servers to ease adoption.

Current methods of proving a payment:
the request makes some sort of proof. However, it does not meet 1, 2 or 4
and it obviously only meets 3 if the payment is made through BIP0070. Also,
there's no standard way to request/provide the proof. If standardized it
would probably meet 5.
sign the transaction. This could meet 1 and 2 but probably not 3. This is
not standardized either. 4 Could be met if designed so.
If the script type is P2SH, any satisfying script should do, just like for
a payment. For M-of-N multisig scripts, that would mean that any set of M
keys should be sufficient, not neccesarily the same set of M keys that
signed the transaction. This is important because strictly demanding the
same set of M keys would undermine the purpose of a multisig address.
== Specification ==
=== Data structure ===
A proof of payment for a transaction T, here called PoP(T), is used to
prove that one has ownership of the credentials needed to unlock all the
inputs of T. It has the exact same structure as a bitcoin transaction with
the same inputs and outputs as T and in the same order as in T. There is
also one OP_RETURN output inserted at index 0, here called the pop output.
This output must have the following format:
! Field !! Size [B] !! Description
| || 2 || Version, little endian, currently 0x01 0x00
| || 32 || The transaction to prove
| || 6 || Random data
The value of the pop output is set to the same value as the transaction fee
of T. Also, if the outputs of T contains an OP_RETURN output, that output
must not be included in the PoP because there can only be one OP_RETURN
output in a transaction. The value of that OP_RETURN output is instead
added to the value of the pop output.
An illustration of the PoP data structure and its original payment is shown
|inputs | outputs |
| Value | Value Script |
|input0 1 | 0 pay to A |
|input1 3 | 2 OP_RETURN |
|input2 4 | 1 pay to B |
| | 4 pay to C |
|inputs | outputs |
| Value | Value Script |
|input0 1 | 3 OP_RETURN |
|input1 3 | 0 pay to A |
|input2 4 | 1 pay to B |
| | 4 pay to C |
The PoP is signed using the same signing process that is used for bitcoin
The purpose of the nonce is to make it harder to use a stolen PoP; Once the
PoP has reached the server, that PoP is useless since the server will
generate a new nonce for every PoP request.
Since a PoP is indistinguishable from a bitcoin transaction, there is a
risk that it, accidently or maliciously, enters the bitcoin p2p network. If
T is still unconfirmed, or if a reorg takes place, chances are that PoP(T)
ends up in a block, invalidating T. Therefore it is important that the
outputs of the PoP are the same as in T. The zero transaction fee in PoP(T)
is to minimize the incentives for miners to select PoP(T) for inclusion.
=== Process ===

A proof of payment request is sent from the server to the wallet. The PoP

request contains:

a random nonce

a destination where to send the PoP, for example a https URL

data hinting the wallet which transaction to create a proof for. For


* txid, if known by the server

* PaymentRequest.PaymentDetails.merchant_data (in case of a BIP0070


* amount, label, message or other information from a BIP0021 URL

The wallet identifies a transaction T, if possible. Otherwise it asks the

user to select among the ones that match the hints in 1.iii.

The wallet creates an unsigned PoP (UPoP) for T, and asks the user to

sign it.

The user confirms

The UPoP(T) is signed by the wallet, creating PoP(T).

The PoP is sent to the destination in 1.ii.

The server receiving the PoP validates it and responds with “valid” or


The wallet displays the response in some way to the user.

  • The method of transferring the PoP request at step 1 is not specified
here. Instead that is specified in separate specifications. See [btcpop
scheme BIP](btcpop scheme BIP).
  • The nonce must be randomly generated by the server for every new PoP
=== Validating a PoP ===
The server needs to validate the PoP and reply with "valid" or "invalid".
That process is outlined below. If any step fails, the validation is
aborted and "invalid" is returned:

Check the format of the PoP. It must pass normal transaction checks,

except that the inputs may already be spent.

Check the PoP output at index 0. It must conform to the OP_RETURN output

format outlined above.

Check that the rest of the outputs exactly corresponds to the outputs of

T and that they appear in the same order as in T. An exception to this is
that any OP_RETURN outputs of T must not be included in the PoP. All output
value from the OP_RETURN must instead be included in the PoP output.

Check that the nonce is the same as the one you requested.

Check that the inputs of the PoP are exactly the same as in transaction

T, and in the same order.

Check the scripts of all the inputs, as would be done on a normal


Check that the txid in the PoP output is the transaction you actually

want proof for. If you don’t know exactly what transaction you want proof
for, check that the transaction actually pays for the product/service you

Return "valid".

== Security considerations ==
  • Someone can intercept the PoP-request and change the PoP destination so
that the user sends the PoP to the bad actor.
  • Someone can intercept the PoP-request and change for example the txid to
trick the user to sign a PoP for another transaction than the intended.
This can of course be avoided if the user is actually looking at the UPoP
before signing it. The bad actor could also set hints for a transaction,
existing or not, that the user didn’t make, resulting in a broken service.
  • Someone can steal a PoP and try to use the service hoping to get a
matching nonce. Probability per try: 1/(248). The server should have a
mechanism for detecting a brute force attack of this kind, or at least slow
down the process by delaying the PoP request by some 100 ms or so.
  • Even if a wallet has no funds it might still be valuable as a generator
for PoPs. This makes it important to keep the security of the wallet after
it has been emptied.
  • Transaction malleability may cause the server to have another transaction
id than the wallet for the payment. In that case the wallet will not be
able to prove the transaction for the server. Wallets should not rely on
the transaction id of the outgoing transaction. Instead it should listen
for the transaction on the network and put that in its list of transactions.
The first two issues are the same attack vector as for traditional, ie
BIP0021, bitcoin payments. They could be mitigated by using secure
== Reference implementation ==
[ poppoc on GitHub]
[ Mycelium fork on GitHub]
== References ==
[ BIP0021]:
URI Scheme
[ BIP0070]:
Payment Protocol
[[btcpop scheme BIP]]
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <>
submitted by bitcoin-devlist-bot to bitcoin_devlist [link] [comments]

Can't get GUIMiner Scrypt working - get message "No servers could be used.

I imagine this has been answered numerous times but I've spent the last several days trying to fix it myself and failed. I've been trying to mine Litecoins using GUIMiner Scrypt, but every time I try I either get this:
2013-06-09 18:54:10: Listener for "deepbit" started
2013-06-09 18:55:10: Listener for "deepbit": [2013-06-09 18:54:10] Started cgminer 3.1.0
2013-06-09 18:55:10: Listener for "deepbit": [2013-06-09 18:54:10] Probing for an alive pool
2013-06-09 18:55:10: Listener for "deepbit": [2013-06-09 18:55:10] No servers were found that could be used to get work from.
2013-06-09 18:55:10: Listener for "deepbit": [2013-06-09 18:55:10] Please check the details from the list below of the servers you have input
2013-06-09 18:55:10: Listener for "deepbit": [2013-06-09 18:55:10] Most likely you have input the wrong URL, forgotten to add a port, or have not set up workers
2013-06-09 18:55:10: Listener for "deepbit": [2013-06-09 18:55:10] Pool: 0 URL: stratum+tcp:// User: Password:
2013-06-09 18:55:10: Listener for "deepbit": [2013-06-09 18:55:10] No servers could be used! Exiting.
or it just hangs at "Listener for "deepbit" started. Deepbit is a Bitcoin pool, but I was trying to see if I could get it mining Bitcoins. I get the same result when I try to use a Litecoin mining pool. I've tried multiple pools, same result. I've installed the AMD APP SDK, hasn't made any difference. I've tried different versions of GUIMiner Scrypt, and none of them have worked, so I don't know what I'm doing wrong. Does anyone have any idea what might be happening?
Sorry if there's a better subreddit for posting this. Thanks for your help.
edit - Formatting is shit. Tried to fix it, sorry about that.
submitted by torzir to litecoinmining [link] [comments]

To the moon! Dogemining with BFGMiner, Debian, and ATI.

Visitor from the future! Hello. I'm a newbie digger and recently setup my first dedicated mining box in Debian. I'm not the most experienced Linux user, but the machine had started with Debian Squeeze and I couldn't find its old Windows key. (Also please forgive formatting errors, I'm new to this whole "Reddit" thing as well.)
I found a number of guides to misdirect me on my way, so I decided to write up a sort-of (or at least hopefully up-to-date) guide to create a Dogecoin miner on Debian with AMD cards, using BFGMiner to mine coins.
Expert digging shibes: I would certainly appreciate feedback to improve this guide.
This is not a headless mining guide. I have not reached that level of mastery yet, though I believe it is well within reach.
You can refer to this wiki source to understand the output from BFGMiner 3.10.0. The one gotcha I've observed is that BFGMiner will happily start off showing hash rates in KHash/sec, and after the first accepted block it will jump to MHashes/sec. When I first saw my hash speed appear to drop from "250" to "0.2", I panicked a little before seeing it had changed its orders of magnitude.
If you think you're still mining slowly, you might need to bump up the intensity for BFGMiner. Higher intensity means more work, and it's possible to create hardware failures if you set it too high. For my HD 5870s, I use an intensity of 12. You can either set the intensity by adding "-I 12" to the ./bfgminer line of, or you can adjust the value by pressing M in BFGMiner and working through the menu system from there.
Bonus: Multiple cards
What happens if I have multiple ATI cards on one rig, you ask? I had the same problem, and OpenCL would only recognize one of them! It turns out that there's an easy solution, but it costs $1.25 in resistors from your local radio shack:
Plug the finished product from there into your second card. If you have more than two cards, you'll need to make one for every card you want to recognize without a monitor attached to it. Reboot and restart your mining, BFGMiner should recognize all of your cards now.
In theory, the above technique should allow you to run completely headless, as long as you also install SSH and be sure to have your script export DISPLAY=:0 before running BFGMiner. I haven't tried this, though.
Happy mining and welcome to the Moon! I hope this is helpful to someone.
submitted by indigodarkwolf to dogeducation [link] [comments]

Parsing and Generating JSON data efficiently on Android with Fastjson from Alibaba Passwords & hash functions (Simply Explained) - YouTube Creating a Password for a Google Form - YouTube YouTube How To Open Password Protected RAR Files Without Password ...

A Bitcoin wallet is as simple as a single pairing of a Bitcoin address with its corresponding Bitcoin private key. Such a wallet has been generated for you in your web browser and is displayed above. To safeguard this wallet you must print or otherwise record the Bitcoin address and private key. It is important to make a backup copy of the private key and store it in a safe location. Bitcoin Address Lookup Search and Alerts. View and research bitcoin ownership, transactions and balance checker by name, bitcoin address, url or keyword a common used format to store a private key is the WIF-format. you can convert a private key to the wif-format and vice versa. many people call a keypair (containing private- and public key) a "wallet". but technically you don't need any software to have a wallet. you can have a paper wallet for example as long as you do not want so send your funds to have full access to your funds. The stratum overlay protocol was extended to support pooled mining as a replacement for obsolete getwork protocol in late 2012. The mining service specification was initially announced via Slush's pool's website.Shortly thereafter, alternative "cheat sheet" style documentation was provided by BTCGuild.As the extension lacks a formal BIP describing an official standard, it has further developed ... Binance cryptocurrency exchange - We operate the worlds biggest bitcoin exchange and altcoin crypto exchange in the world by volume

[index] [12185] [1150] [50320] [48713] [26316] [2546] [39731] [11918] [7399] [8856]

Parsing and Generating JSON data efficiently on Android with Fastjson from Alibaba

In this tutorial we will show you how to create html Username, Password, Submit button and radio form. Learn to unlock your password-protected RAR files without a password. Download the software at Read the new and improved techniques on... Fastjson, from Alibaba, is a fast and efficient library to parse and generate JSON data in Java. It supports server side and client side parsing and generation with great performances. Fastjson is ... Episode 3 covers Mastering Bitcoin Chapter 4 - Keys and Addresses. We mainly go over Elliptic Curve Cryptography and the how and why it is used to generate Bitcoin keys and address. How to find your LinkedIn url? Personalize your LinkedIn URL to get the most out of your profile. Luckily it’s easy to create your own LinkedIn profile URL. ...