Running Bitcoind – BitcoinWiki

The Reset Server Subreddit

[link]

[ANN][ANDROID MINING][AIRDROP] NewEnglandcoin: Scrypt RandomSpike

New England
New England 6 States Songs: https://www.reddit.com/newengland/comments/er8wxd/new_england_6_states_songs/
NewEnglandcoin
Symbol: NENG
NewEnglandcoin is a clone of Bitcoin using scrypt as a proof-of-work algorithm with enhanced features to protect against 51% attack and decentralize on mining to allow diversified mining rigs across CPUs, GPUs, ASICs and Android phones.
Mining Algorithm: Scrypt with RandomSpike. RandomSpike is 3rd generation of Dynamic Difficulty (DynDiff) algorithm on top of scrypt.
1 minute block targets base difficulty reset: every 1440 blocks subsidy halves in 2.1m blocks (~ 2 to 4 years) 84,000,000,000 total maximum NENG 20000 NENG per block Pre-mine: 1% - reserved for dev fund ICO: None RPCPort: 6376 Port: 6377
NewEnglandcoin has dogecoin like supply at 84 billion maximum NENG. This huge supply insures that NENG is suitable for retail transactions and daily use. The inflation schedule of NengEnglandcoin is actually identical to that of Litecoin. Bitcoin and Litecoin are already proven to be great long term store of value. The Litecoin-like NENG inflation schedule will make NewEnglandcoin ideal for long term investment appreciation as the supply is limited and capped at a fixed number
Bitcoin Fork - Suitable for Home Hobbyists
NewEnglandcoin core wallet continues to maintain version tag of "Satoshi v0.8.7.5" because NewEnglandcoin is very much an exact clone of bitcoin plus some mining feature changes with DynDiff algorithm. NewEnglandcoin is very suitable as lite version of bitcoin for educational purpose on desktop mining, full node running and bitcoin programming using bitcoin-json APIs.
The NewEnglandcoin (NENG) mining algorithm original upgrade ideas were mainly designed for decentralization of mining rigs on scrypt, which is same algo as litecoin/dogecoin. The way it is going now is that NENG is very suitable for bitcoin/litecoin/dogecoin hobbyists who can not , will not spend huge money to run noisy ASIC/GPU mining equipments, but still want to mine NENG at home with quiet simple CPU/GPU or with a cheap ASIC like FutureBit Moonlander 2 USB or Apollo pod on solo mining setup to obtain very decent profitable results. NENG allows bitcoin litecoin hobbyists to experience full node running, solo mining, CPU/GPU/ASIC for a fun experience at home at cheap cost without breaking bank on equipment or electricity.
MIT Free Course - 23 lectures about Bitcoin, Blockchain and Finance (Fall,2018)
https://www.youtube.com/playlist?list=PLUl4u3cNGP63UUkfL0onkxF6MYgVa04Fn
CPU Minable Coin Because of dynamic difficulty algorithm on top of scrypt, NewEnglandcoin is CPU Minable. Users can easily set up full node for mining at Home PC or Mac using our dedicated cheetah software.
Research on the first forked 50 blocks on v1.2.0 core confirmed that ASIC/GPU miners mined 66% of 50 blocks, CPU miners mined the remaining 34%.
NENG v1.4.0 release enabled CPU mining inside android phones.
Youtube Video Tutorial
How to CPU Mine NewEnglandcoin (NENG) in Windows 10 Part 1 https://www.youtube.com/watch?v=sdOoPvAjzlE How to CPU Mine NewEnglandcoin (NENG) in Windows 10 Part 2 https://www.youtube.com/watch?v=nHnRJvJRzZg
How to CPU Mine NewEnglandcoin (NENG) in macOS https://www.youtube.com/watch?v=Zj7NLMeNSOQ
Decentralization and Community Driven NewEnglandcoin is a decentralized coin just like bitcoin. There is no boss on NewEnglandcoin. Nobody nor the dev owns NENG.
We know a coin is worth nothing if there is no backing from community. Therefore, we as dev do not intend to make decision on this coin solely by ourselves. It is our expectation that NewEnglandcoin community will make majority of decisions on direction of this coin from now on. We as dev merely view our-self as coin creater and technical support of this coin while providing NENG a permanent home at ShorelineCrypto Exchange.
Twitter Airdrop
Follow NENG twitter and receive 100,000 NENG on Twitter Airdrop to up to 1000 winners
Graphic Redesign Bounty
Top one award: 90.9 million NENG Top 10 Winners: 500,000 NENG / person Event Timing: March 25, 2019 - Present Event Address: NewEnglandcoin DISCORD at: https://discord.gg/UPeBwgs
Please complete above Twitter Bounty requirement first. Then follow Below Steps to qualify for the Bounty: (1) Required: submit your own designed NENG logo picture in gif, png jpg or any other common graphic file format into DISCORD "bounty-submission" board (2) Optional: submit a second graphic for logo or any other marketing purposes into "bounty-submission" board. (3) Complete below form.
Please limit your submission to no more than two total. Delete any wrongly submitted or undesired graphics in the board. Contact DISCORD u/honglu69#5911 or u/krypton#6139 if you have any issues.
Twitter Airdrop/Graphic Redesign bounty sign up: https://goo.gl/forms/L0vcwmVi8c76cR7m1
Milestones
Roadmap
NENG v1.4.0 Android Mining, randomSpike Evaluation https://github.com/ShorelineCrypto/NewEnglandCoin/releases/download/NENG_2020_Q3_report/NENG_2020_Q3_report.pdf
RandomSpike - NENG core v1.3.0 Hardfork Upgrade Proposal https://github.com/ShorelineCrypto/NewEnglandCoin/releases/download/2020Q1_Report/Scrypt_RandomSpike_NENGv1.3.0_Hardfork_Proposal.pdf
NENG Security, Decentralization & Valuation
https://github.com/ShorelineCrypto/NewEnglandCoin/releases/download/2019Q2_report/NENG_Security_Decentralization_Value.pdf
Whitepaper v1.0 https://github.com/ShorelineCrypto/NewEnglandCoin/releases/download/whitepaper_v1.0/NENG_WhitePaper.pdf
DISCORD https://discord.gg/UPeBwgs
Explorer
http://www.findblocks.com/exploreNENG http://86.100.49.209/exploreNENG http://nengexplorer.mooo.com:3001/
Step by step guide on how to setup an explorer: https://github.com/ShorelineCrypto/nengexplorer
Github https://github.com/ShorelineCrypto/NewEnglandCoin
Wallet
Android with UserLand App (arm64/armhf), Chromebook (x64/arm64/armhf): https://github.com/ShorelineCrypto/NewEnglandCoin/releases/tag/v1.4.0.5
Linux Wallet (Ubuntu/Linux Mint, Debian/MX Linux, Arch/Manjaro, Fedora, openSUSE): https://github.com/ShorelineCrypto/NewEnglandCoin/releases/tag/v1.4.0.3
MacOS Wallet (10.11 El Capitan or higher): https://github.com/ShorelineCrypto/NewEnglandCoin/releases/tag/v1.4.0.2
Android with GNUroot on 32 bits old Phones (alpha release) wallet: https://github.com/ShorelineCrypto/NewEnglandCoin/releases/tag/v1.4.0
Windows wallet: https://github.com/ShorelineCrypto/NewEnglandCoin/releases/tag/v1.3.0.1
addnode ip address for the wallet to sync faster, frequently updated conf file: https://github.com/ShorelineCrypto/cheetah_cpumineblob/mastenewenglandcoin.conf-example
How to Sync Full Node Desktop Wallet https://www.reddit.com/NewEnglandCoin/comments/er6f0q/how_to_sync_full_node_desktop_wallet/
TWITTER https://twitter.com/newenglandcoin
REDDIT https://www.reddit.com/NewEnglandCoin/
Cheetah CPU Miner Software https://github.com/ShorelineCrypto/cheetah_cpuminer
Solo Mining with GPU or ASIC https://bitcointalk.org/index.php?topic=5027091.msg52187727#msg52187727
How to Run Two Full Node in Same Desktop PC https://bitcointalk.org/index.php?topic=5027091.msg53581449#msg53581449
ASIC/GPU Mining Pools Warning to Big ASIC Miners Due to DynDiff Algo on top of Scrypt, solo mining is recommended for ASIC/GPU miners. Further more, even for mining pools, small mining pool will generate better performance than big NENG mining pool because of new algo v1.2.x post hard fork.
The set up configuration of NENG for scrypt pool mining is same as a typical normal scrypt coin. In other word, DynDiff on Scrypt algo is backward compatible with Scrypt algo. Because ASIC/GPU miners rely on CPU miners for smooth blockchain movement, checkout bottom of "Latest News" section for A WARNING to All ASIC miners before you decide to dump big ASIC hash rate into NENG mining.
(1) Original DynDiff Warning: https://bitcointalk.org/index.php?topic=5027091.msg48324708#msg48324708 (2) New Warning on RandomSpike Spike difficulty (244k) introduced in RandomSpike served as roadblocks to instant mining and provide security against 51% attack risk. However, this spike difficulty like a roadblock that makes big ASIC mining less profitable. In case of spike block to be mined, the spike difficulty immediately serve as base difficulty, which will block GPU/ASIC miners effectively and leave CPU cheetah solo miners dominating mining almost 100% until next base difficulty reset.
FindBlocks http://findblocks.com/
CRpool http://crpool.xyz/
Cminors' Pool http://newenglandcoin.cminors-pool.com/
SPOOL https://spools.online/
Exchange
📷
https://shorelinecrypto.com/
Features: anonymous sign up and trading. No restriction or limit on deposit or withdraw.
The trading pairs available: NewEnglandcoin (NENG) / Dogecoin (DOGE)
Trading commission: A round trip trading will incur 0.10% trading fees in average. Fees are paid only on buyer side. buy fee: 0.2% / sell fee: 0% Deposit fees: free for all coins Withdraw fees: ZERO per withdraw. Mining fees are appointed by each coin blockchain. To cover the blockchain mining fees, there is minimum balance per coin per account: * Dogecoin 2 DOGE * NewEnglandcoin 1 NENG
Latest News Aug 30, 2020 - NENG v1.4.0.5 Released for Android/Chromebook Upgrade with armhf, better hardware support https://bitcointalk.org/index.php?topic=5027091.msg55098029#msg55098029
Aug 11, 2020 - NENG v1.4.0.4 Released for Android arm64 Upgrade / Chromebook Support https://bitcointalk.org/index.php?topic=5027091.msg54977437#msg54977437
Jul 30, 2020 - NENG v1.4.0.3 Released for Linux Wallet Upgrade with 8 Distros https://bitcointalk.org/index.php?topic=5027091.msg54898540#msg54898540
Jul 21, 2020 - NENG v1.4.0.2 Released for MacOS Upgrade with Catalina https://bitcointalk.org/index.php?topic=5027091.msg54839522#msg54839522
Jul 19, 2020 - NENG v1.4.0.1 Released for MacOS Wallet Upgrade https://bitcointalk.org/index.php?topic=5027091.msg54830333#msg54830333
Jul 15, 2020 - NENG v1.4.0 Released for Android Mining, Ubuntu 20.04 support https://bitcointalk.org/index.php?topic=5027091.msg54803639#msg54803639
Jul 11, 2020 - NENG v1.4.0 Android Mining, randomSpike Evaluation https://bitcointalk.org/index.php?topic=5027091.msg54777222#msg54777222
Jun 27, 2020 - Pre-Announce: NENG v1.4.0 Proposal for Mobile Miner Upgrade, Android Mining Start in July 2020 https://bitcointalk.org/index.php?topic=5027091.msg54694233#msg54694233
Jun 19, 2020 - Best Practice for Futurebit Moonlander2 USB ASIC on solo mining mode https://bitcointalk.org/index.php?topic=5027091.msg54645726#msg54645726
Mar 15, 2020 - Scrypt RandomSpike - NENG v1.3.0.1 Released for better wallet syncing https://bitcointalk.org/index.php?topic=5027091.msg54030923#msg54030923
Feb 23, 2020 - Scrypt RandomSpike - NENG Core v1.3.0 Relased, Hardfork on Mar 1 https://bitcointalk.org/index.php?topic=5027091.msg53900926#msg53900926
Feb 1, 2020 - Scrypt RandomSpike Proposal Published- NENG 1.3.0 Hardfork https://bitcointalk.org/index.php?topic=5027091.msg53735458#msg53735458
Jan 15, 2020 - NewEnglandcoin Dev Team Expanded with New Kickoff https://bitcointalk.org/index.php?topic=5027091.msg53617358#msg53617358
Jan 12, 2020 - Explanation of Base Diff Reset and Effect of Supply https://www.reddit.com/NewEnglandCoin/comments/envmo1/explanation_of_base_diff_reset_and_effect_of/
Dec 19, 2019 - Shoreline_tradingbot version 1.0 is released https://bitcointalk.org/index.php?topic=5121953.msg53391184#msg53391184
Sept 1, 2019 - NewEnglandcoin (NENG) is Selected as Shoreline Tradingbot First Supported Coin https://bitcointalk.org/index.php?topic=5027091.msg52331201#msg52331201
Aug 15, 2019 - Mining Update on Effect of Base Difficulty Reset, GPU vs ASIC https://bitcointalk.org/index.php?topic=5027091.msg52169572#msg52169572
Jul 7, 2019 - CPU Mining on macOS Mojave is supported under latest Cheetah_Cpuminer Release https://bitcointalk.org/index.php?topic=5027091.msg51745839#msg51745839
Jun 1, 2019 - NENG Fiat project is stopped by Square, Inc https://bitcointalk.org/index.php?topic=5027091.msg51312291#msg51312291
Apr 21, 2019 - NENG Fiat Project is Launched by ShorelineCrypto https://bitcointalk.org/index.php?topic=5027091.msg50714764#msg50714764
Apr 7, 2019 - Announcement of Fiat Project for all U.S. Residents & Mobile Miner Project Initiation https://bitcointalk.org/index.php?topic=5027091.msg50506585#msg50506585
Apr 1, 2019 - Disclosure on Large Buying on NENG at ShorelineCrypto Exchange https://bitcointalk.org/index.php?topic=5027091.msg50417196#msg50417196
Mar 27, 2019 - Disclosure on Large Buying on NENG at ShorelineCrypto Exchange https://bitcointalk.org/index.php?topic=5027091.msg50332097#msg50332097
Mar 17, 2019 - Disclosure on Large Buying on NENG at ShorelineCrypto Exchange https://bitcointalk.org/index.php?topic=5027091.msg50208194#msg50208194
Feb 26, 2019 - Community Project - NewEnglandcoin Graphic Redesign Bounty Initiated https://bitcointalk.org/index.php?topic=5027091.msg49931305#msg49931305
Feb 22, 2019 - Dev Policy on Checkpoints on NewEnglandcoin https://bitcointalk.org/index.php?topic=5027091.msg49875242#msg49875242
Feb 20, 2019 - NewEnglandCoin v1.2.1 Released to Secure the Hard Kork https://bitcointalk.org/index.php?topic=5027091.msg49831059#msg49831059
Feb 11, 2019 - NewEnglandCoin v1.2.0 Released, Anti-51% Attack, Anti-instant Mining after Hard Fork https://bitcointalk.org/index.php?topic=5027091.msg49685389#msg49685389
Jan 13, 2019 - Cheetah_CpuMiner added support for CPU Mining on Mac https://bitcointalk.org/index.php?topic=5027091.msg49218760#msg49218760
Jan 12, 2019 - NENG Core v1.1.2 Released to support MacOS OSX Wallet https://bitcointalk.org/index.php?topic=5027091.msg49202088#msg49202088
Jan 2, 2019 - Cheetah_Cpuminer v1.1.0 is released for both Linux and Windows https://bitcointalk.org/index.php?topic=5027091.msg49004345#msg49004345
Dec 31, 2018 - Technical Whitepaper is Released https://bitcointalk.org/index.php?topic=5027091.msg48990334#msg48990334
Dec 28, 2018 - Cheetah_Cpuminer v1.0.0 is released for Linux https://bitcointalk.org/index.php?topic=5027091.msg48935135#msg48935135
Update on Dec 14, 2018 - NENG Blockchain Stuck Issue https://bitcointalk.org/index.php?topic=5027091.msg48668375#msg48668375
Nov 27, 2018 - Exclusive for PC CPU Miners - How to Steal a Block from ASIC Miners https://bitcointalk.org/index.php?topic=5027091.msg48258465#msg48258465
Nov 28, 2018 - How to CPU Mine a NENG block with window/linux PC https://bitcointalk.org/index.php?topic=5027091.msg48298311#msg48298311
Nov 29, 2018 - A Warning to ASIC Miners https://bitcointalk.org/index.php?topic=5027091.msg48324708#msg48324708
Disclosure: Dev Team Came from ShorelineCrypto, a US based Informatics Service Business offering Fee for service for Coin Creation, Coin Exchange Listing, Blockchain Consulting, etc.
submitted by honglu69 to NewEnglandCoin [link] [comments]

Problematic Filters (I think)? (Also Suggestion for Developers)

A couple days ago YouTube was working correctly, but recently videos are stuck on the loading circle. I'm certain theirs a mischievous filter, but I need some help on finding this filter or another suggestion. Someone tell me the best filters I should keep on my list and the filters I should get rid of. I'm not concerned about my RAM or speed, but my main issue right now is that YouTube is not playing videos unless I turn off uBlock Origin. In addition, I have a suggestion for the developer or developers = Can you make a button in your extension that can create its own filter using all the filters the user has, but this button would delete any duplicate filters. Basically Gorhilla or the developers/volunteers, I'm asking if you can or know any software that can allow me to "optimize" my filter list by getting rid of duplicate rules/links or filters (whichever is easier for you developers), because if I remember correctly, when their are two uBlock filters with the same rule/link, one filter will either disable the other filter's rule/link or just disable the rule/link entirely, IF I REMEMBER CORRECTLY. IF I REMEMBER CORRECTLY, this is a horrible program/extension flaw/design, because most people who just willy nilly get third party filters, might not even realize that their entire list could be garbage, because of one or two filters. An easier way is maybe having a stronger suggested list on Reddit, that we can click on each filter, than a new tab opens going to a filter subscription site to add your filters to ours more easily, maybe? ONE MORE THING, I will not be replying back to this thread, this is a throwaway account, just for the sake of asking my question and to fix my issue by coming back and reading what this Reddit group's answers/solutions are, SO YEAH. If the community helps me, than THANK YOU SO MUCH!!!!! ALSO, if you're reading this Gorhilla and developers/volunteers, than THANK YOU SO MUCH for taking the time out of your days and nights to create such an AMAZING EXTENSION FOR THE ENTIRE WORLD, AND FOR READING MY SUGGESTION!!!!! THIS COMMUNITY AND I ARE VERY APPRECIATIVE OF THE HARD WORK YOU DEVELOPERS DO FOR ALL OF US, AGAIN THANK YOU!!!!!
Also, does anyone have THE BEST EVER FILTER LIST TO USE? I would love to hear what filters this Reddit group uses to create an amazing filter list!!!
-----My Filter List (all these filters shown are check marked)<-------
1,774,234 network filters + 249,512 cosmetic filters from:
-Built-in (5/5)
-Ads (3/3)
-Privacy (3/3)
-Malware domains (3/3)
-Annoyances (7/7)
-Multipurpose (3/3)
-Regions, languages (33/34) (I'm not using the adguard Japanese list, because I've noticed it causes issues with many websites)
-Custom (39/39)
submitted by User1401943 to uBlockOrigin [link] [comments]

Groestlcoin 6th Anniversary Release

Introduction

Dear Groestlers, it goes without saying that 2020 has been a difficult time for millions of people worldwide. The groestlcoin team would like to take this opportunity to wish everyone our best to everyone coping with the direct and indirect effects of COVID-19. Let it bring out the best in us all and show that collectively, we can conquer anything.
The centralised banks and our national governments are facing unprecedented times with interest rates worldwide dropping to record lows in places. Rest assured that this can only strengthen the fundamentals of all decentralised cryptocurrencies and the vision that was seeded with Satoshi's Bitcoin whitepaper over 10 years ago. Despite everything that has been thrown at us this year, the show must go on and the team will still progress and advance to continue the momentum that we have developed over the past 6 years.
In addition to this, we'd like to remind you all that this is Groestlcoin's 6th Birthday release! In terms of price there have been some crazy highs and lows over the years (with highs of around $2.60 and lows of $0.000077!), but in terms of value– Groestlcoin just keeps getting more valuable! In these uncertain times, one thing remains clear – Groestlcoin will keep going and keep innovating regardless. On with what has been worked on and completed over the past few months.

UPDATED - Groestlcoin Core 2.18.2

This is a major release of Groestlcoin Core with many protocol level improvements and code optimizations, featuring the technical equivalent of Bitcoin v0.18.2 but with Groestlcoin-specific patches. On a general level, most of what is new is a new 'Groestlcoin-wallet' tool which is now distributed alongside Groestlcoin Core's other executables.
NOTE: The 'Account' API has been removed from this version which was typically used in some tip bots. Please ensure you check the release notes from 2.17.2 for details on replacing this functionality.

How to Upgrade?

Windows
If you are running an older version, shut it down. Wait until it has completely shut down (which might take a few minutes for older versions), then run the installer.
OSX
If you are running an older version, shut it down. Wait until it has completely shut down (which might take a few minutes for older versions), run the dmg and drag Groestlcoin Core to Applications.
Ubuntu
http://groestlcoin.org/forum/index.php?topic=441.0

Other Linux

http://groestlcoin.org/forum/index.php?topic=97.0

Download

Download the Windows Installer (64 bit) here
Download the Windows Installer (32 bit) here
Download the Windows binaries (64 bit) here
Download the Windows binaries (32 bit) here
Download the OSX Installer here
Download the OSX binaries here
Download the Linux binaries (64 bit) here
Download the Linux binaries (32 bit) here
Download the ARM Linux binaries (64 bit) here
Download the ARM Linux binaries (32 bit) here

Source

ALL NEW - Groestlcoin Moonshine iOS/Android Wallet

Built with React Native, Moonshine utilizes Electrum-GRS's JSON-RPC methods to interact with the Groestlcoin network.
GRS Moonshine's intended use is as a hot wallet. Meaning, your keys are only as safe as the device you install this wallet on. As with any hot wallet, please ensure that you keep only a small, responsible amount of Groestlcoin on it at any given time.

Features

Download

iOS
Android

Source

ALL NEW! – HODL GRS Android Wallet

HODL GRS connects directly to the Groestlcoin network using SPV mode and doesn't rely on servers that can be hacked or disabled.
HODL GRS utilizes AES hardware encryption, app sandboxing, and the latest security features to protect users from malware, browser security holes, and even physical theft. Private keys are stored only in the secure enclave of the user's phone, inaccessible to anyone other than the user.
Simplicity and ease-of-use is the core design principle of HODL GRS. A simple recovery phrase (which we call a Backup Recovery Key) is all that is needed to restore the user's wallet if they ever lose or replace their device. HODL GRS is deterministic, which means the user's balance and transaction history can be recovered just from the backup recovery key.

Features

Download

Main Release (Main Net)
Testnet Release

Source

ALL NEW! – GroestlcoinSeed Savior

Groestlcoin Seed Savior is a tool for recovering BIP39 seed phrases.
This tool is meant to help users with recovering a slightly incorrect Groestlcoin mnemonic phrase (AKA backup or seed). You can enter an existing BIP39 mnemonic and get derived addresses in various formats.
To find out if one of the suggested addresses is the right one, you can click on the suggested address to check the address' transaction history on a block explorer.

Features

Live Version (Not Recommended)

https://www.groestlcoin.org/recovery/

Download

https://github.com/Groestlcoin/mnemonic-recovery/archive/master.zip

Source

ALL NEW! – Vanity Search Vanity Address Generator

NOTE: NVidia GPU or any CPU only. AMD graphics cards will not work with this address generator.
VanitySearch is a command-line Segwit-capable vanity Groestlcoin address generator. Add unique flair when you tell people to send Groestlcoin. Alternatively, VanitySearch can be used to generate random addresses offline.
If you're tired of the random, cryptic addresses generated by regular groestlcoin clients, then VanitySearch is the right choice for you to create a more personalized address.
VanitySearch is a groestlcoin address prefix finder. If you want to generate safe private keys, use the -s option to enter your passphrase which will be used for generating a base key as for BIP38 standard (VanitySearch.exe -s "My PassPhrase" FXPref). You can also use VanitySearch.exe -ps "My PassPhrase" which will add a crypto secure seed to your passphrase.
VanitySearch may not compute a good grid size for your GPU, so try different values using -g option in order to get the best performances. If you want to use GPUs and CPUs together, you may have best performances by keeping one CPU core for handling GPU(s)/CPU exchanges (use -t option to set the number of CPU threads).

Features

Usage

https://github.com/Groestlcoin/VanitySearch#usage

Download

Source

ALL NEW! – Groestlcoin EasyVanity 2020

Groestlcoin EasyVanity 2020 is a windows app built from the ground-up and makes it easier than ever before to create your very own bespoke bech32 address(es) when whilst not connected to the internet.
If you're tired of the random, cryptic bech32 addresses generated by regular Groestlcoin clients, then Groestlcoin EasyVanity2020 is the right choice for you to create a more personalised bech32 address. This 2020 version uses the new VanitySearch to generate not only legacy addresses (F prefix) but also Bech32 addresses (grs1 prefix).

Features

Download

Source

Remastered! – Groestlcoin WPF Desktop Wallet (v2.19.0.18)

Groestlcoin WPF is an alternative full node client with optional lightweight 'thin-client' mode based on WPF. Windows Presentation Foundation (WPF) is one of Microsoft's latest approaches to a GUI framework, used with the .NET framework. Its main advantages over the original Groestlcoin client include support for exporting blockchain.dat and including a lite wallet mode.
This wallet was previously deprecated but has been brought back to life with modern standards.

Features

Remastered Improvements

Download

Source

ALL NEW! – BIP39 Key Tool

Groestlcoin BIP39 Key Tool is a GUI interface for generating Groestlcoin public and private keys. It is a standalone tool which can be used offline.

Features

Download

Windows
Linux :
 pip3 install -r requirements.txt python3 bip39\_gui.py 

Source

ALL NEW! – Electrum Personal Server

Groestlcoin Electrum Personal Server aims to make using Electrum Groestlcoin wallet more secure and more private. It makes it easy to connect your Electrum-GRS wallet to your own full node.
It is an implementation of the Electrum-grs server protocol which fulfils the specific need of using the Electrum-grs wallet backed by a full node, but without the heavyweight server backend, for a single user. It allows the user to benefit from all Groestlcoin Core's resource-saving features like pruning, blocks only and disabled txindex. All Electrum-GRS's feature-richness like hardware wallet integration, multi-signature wallets, offline signing, seed recovery phrases, coin control and so on can still be used, but connected only to the user's own full node.
Full node wallets are important in Groestlcoin because they are a big part of what makes the system be trust-less. No longer do people have to trust a financial institution like a bank or PayPal, they can run software on their own computers. If Groestlcoin is digital gold, then a full node wallet is your own personal goldsmith who checks for you that received payments are genuine.
Full node wallets are also important for privacy. Using Electrum-GRS under default configuration requires it to send (hashes of) all your Groestlcoin addresses to some server. That server can then easily spy on your transactions. Full node wallets like Groestlcoin Electrum Personal Server would download the entire blockchain and scan it for the user's own addresses, and therefore don't reveal to anyone else which Groestlcoin addresses they are interested in.
Groestlcoin Electrum Personal Server can also broadcast transactions through Tor which improves privacy by resisting traffic analysis for broadcasted transactions which can link the IP address of the user to the transaction. If enabled this would happen transparently whenever the user simply clicks "Send" on a transaction in Electrum-grs wallet.
Note: Currently Groestlcoin Electrum Personal Server can only accept one connection at a time.

Features

Download

Windows
Linux / OSX (Instructions)

Source

UPDATED – Android Wallet 7.38.1 - Main Net + Test Net

The app allows you to send and receive Groestlcoin on your device using QR codes and URI links.
When using this app, please back up your wallet and email them to yourself! This will save your wallet in a password protected file. Then your coins can be retrieved even if you lose your phone.

Changes

Download

Main Net
Main Net (FDroid)
Test Net

Source

UPDATED – Groestlcoin Sentinel 3.5.06 (Android)

Groestlcoin Sentinel is a great solution for anyone who wants the convenience and utility of a hot wallet for receiving payments directly into their cold storage (or hardware wallets).
Sentinel accepts XPUB's, YPUB'S, ZPUB's and individual Groestlcoin address. Once added you will be able to view balances, view transactions, and (in the case of XPUB's, YPUB's and ZPUB's) deterministically generate addresses for that wallet.
Groestlcoin Sentinel is a fork of Groestlcoin Samourai Wallet with all spending and transaction building code removed.

Changes

Download

Source

UPDATED – P2Pool Test Net

Changes

Download

Pre-Hosted Testnet P2Pool is available via http://testp2pool.groestlcoin.org:21330/static/

Source

submitted by Yokomoko_Saleen to groestlcoin [link] [comments]

College Education Resources

Not a complete list, but somewhere to start
United States
submitted by chrisknight1985 to cybersecurity [link] [comments]

AMA/Tutorial: Run a full node on AWS free tier with local LAN storage

AMA/Tutorial: Run a full node on AWS free tier with local LAN storage
This is a tutorial/AMA on how you can be running a full node, in the AWS cloud, for very low cost or even free.
I used to run a node on my local network but there is a problem with this; your public IP is broadcast, and then it gets associated with Bitcoin. Node owners are likely to own Bitcoin, and this raises your personal threat profile, validated against my IDS/IPS logs.
Run a VPN? Many VPNs are automatically blocked, or sketchy. Tor is also blocked on a large portion of the internet. Neither provide you with a real static IP, and that helps out the network.
There is a easy solution to this; run a node on the AWS free tier, and use an elastic IP so you have a static address. Bandwidth is free in, and low cost out, and you can control how much of that you use easily, and control your spent. The problem is that Amazon charges a LOT for online storage and even with a 1MB blocksize, the blockchain is very large and growing steadily! We mitigate this by using a VPN back to your network, where you can store the blockchain on a SMB share.
It is not complicated to do, but there are very many moving pieces to keep track of and configure. In order to fully trust your node, the best way is to build it from scratch. This is my goal in walking you through the process.
There are lots of ways to accomplish this same task; I only want to present one that works, and you can go from there. Once you have access to the blockchain in the cloud for reasonable prices, you can also look at things like the Lightning Network.
This article makes four major assumptions:

  1. That you have a OpenVPN server on your network and know how to configure it. I use pfSense and OpenVPN; others will work just as well, but you'll need to do a little work to figure out the particulars. If you don't know how, do not fret! There are loads of good tutorials for just about every platform. Or ask below. I also limited the user with access to the share at the firewall specifically to the IP hosting the share to lower the threat envelope.
  2. That you have the blockchain downloaded locally and reasonably up to date. If you don't, head on over to bitcoin.org and download it for OSX or Windows or Linux, whatever you use for your workstation. Follow the directions to set up the software and download/synchronize it to the network. This will take awhile! Once you've synchronized, copy the data directory to your SMB share you want the AWS instance to access. You could also synchronize everything directly on AWS too, but it will likely take longer and may cost a bit for the bandwidth.
  3. That you're on windows. OSX and Linux will have slightly different processes to connect to the instance via the terminal and SSH. If you need help, ask, and I am sure we can get you fixed up.
  4. That you've read the excellent bitcoin.org full node tutorial here: https://bitcoin.org/en/full-node

With that, on with the show!
First: Head on over to https://aws.amazon.com/ and make yourself an account.
Once you've set up you'll need to start the process of creating a virtual machine on AWS. Look for this graphic and click on it:

Start by launching a new machine

Follow the rabbit hole, and you'll be looking to create a plain jane Amazon AMI Linux instance. It looks like this:

Pick the basic AMI instance
Keep in mind you want to pick the x86 version, which is the default.

Continue clicking, you'll want to select the t2.micro instance that is eligible for the free tier for new accounts.

Pick the free tier. You can also upgrade to the smaller tier for more ram, but the micro works for now.
Now, you're going to need a way to connect to your soon-to-be-created node in the cloud. Amazon uses SSH keys to do this, so the next step means you're going to make some. You need to save this file, as if you lose it, you won't be able to access your node anymore. Much like your wallet private keys!

Beware losing your keys!

If you've made it this far, you're almost launched!
Now we need to convert the key to a format that we can use to connect to the instance from Windows. I recommend using Putty! https://www.putty.org/ if you don't have it already; if you're on OSX or Linux, you likely have what you need already.
Follow the guide here to get connected: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/putty.html

Next you'll need to set up a opening in the firewall if you want incoming connections. This is done by adding to the security group in the "Network and Security" section; edit it to look like this:

Change the inbound security rules for the instance to accept incoming connections on 8333.

The hard part is over!
Optional: Configuring a static IP. Amazon calls their implementation "elastic" IPs, but it's really a static IP that you can move around between instances very easily. It will ensure your public address on AWS does not change; it isn't required, but it is better if you intend on allowing outgoing connections.
Go back to the main dashboard display.
In "Network and Security", click on "Elastic IPs".
Select Allocate New Address (blue button on top) and then select it in the table. In actions, you will see "Associate Address". Select this then assign the address to the instance you have previously configured. Done!

Next up: Log into your machine, and immediately update everything. Use the IP provided by Amazon, or the Elastic IP if you assigned one to the instance in the last step.
type: "sudo yum update"

Now, let's get the VPN configured.
First step is to install OpenVPN. We need to install the extended package library to do this.
type: "sudo amazon-linux-extras install epel"
type: "sudo yum-config-manager --enable epel"
Now you can install OpenVPN.
type: "sudo yum install openvpn"
You will need your credential file from OpenVPN; it's a file you generate that will have a .ovpn extension. But you're going to need to upload it to the instance. You can do this through the scp command on OSX or Linux, but if you're on Windows, you'll need another utility. Get WinSCP here: https://winscp.net/eng/download.php
But we'll have to tell it where your key file is so you can login. Select "New Session", then use the same IP and username as you did to connect before. We'll need to tell it about the key file though! Select the "Advanced" tab then under the SSH section, click on "Authentication" and then select your private key file you generated in the tutorial above.
Connect and upload the .ovpn file that you generated when you added a user for the VPN. This step depends on your OpenVPN configuration - ask below if you have problems.
Next, let's verify we can connect to the VPN!
type: "openvpn --config my-configuration-file-made-by-openvpn.ovpn &"
You will be prompted for a password if you configured one.
Verify operation by pinging your LAN router, e.g.
type: "ping 192.168.2.1" or the address of the SMB server where you shared the information.

Allllrighty! Next up is getting connected to your blockchain. Create a directory where the data directory will be mounted.
type: "mkdir blockchain"
We need to install samba and some utilities to get things mounted.
type: "sudo yum install samba"
type: "sudo yum install cifs-utils"

Now let's mount the folder:
type: "sudo mount -t cifs //192.168.2.100/Bitcoin ./blockchain -o user=bitcoin,vers=2.0,uid=ec2-user,gid=ec2 user,file_mode=0777,dir_mode=0777"
Where " //192.168.2.100/Bitcoin" is the address of the SMB server and share where you put the data directory from your initial sync. If you didn't, and just want to sync everything from AWS, then make sure it's a folder where your user has access. In this case, I'm assuming you've made a SMB user with the name "Bitcoin". The command will prompt you for the password to access the share. The other bits ensure you can have read and write access to the share once it's mounted in AWS.

Now we're ready for some Bitcoin! Props to the tutorial here: https://hackernoon.com/a-complete-beginners-guide-to-installing-a-bitcoin-full-node-on-linux-2018-edition-cb8e384479ea
But I'll summarize for you:
Download and then re-upload with WinSCP, or download directly to your instance with wget, the most current Bitcoin core. In this case, it's bitcoin-0.18.0-i686-pc-linux-gnu.tar.gz downloaded from https://bitcoin.org/en/bitcoin-core/.
Let's verify it hasn't been tampered with once you have it uploaded to the terminal:
type: "sha256sum bitcoin-0.18.0-i686-pc-linux-gnu.tar.gz"
Then compare that with the hash value that's listed in the SHA256SUMS.asc file on bitcoin.org. In this case, "36ce9ffb375f6ee280df5a86e61038e3c475ab9dee34f6f89ea82b65a264183b" all matches up, so we know nobody has done anything evil or nefarious to the file.
Unzip the file:
type: "tar zxvf bitcoin-0.18.0-i686-pc-linux-gnu.tar.gz"
There is a warning about a symbolic link; everything seems to work OK regardless, but if anyone knows what or how to fix, please comment.
We'll need to get some missing libraries before we can run it; these aren't in the basic AMI instance.
type: "sudo yum install glibc.i686"
type: "yum install libgcc_s.so.1"

FINALLY! We are ready to launch the program. Go to the "bin" directory inside where you unzipped the Bitcoin Core tarball. (e.g. /home/ec2-useblockchain/bitcoin-0.18.0/bin)
./bitcoind -datadir=/home/ec2-useblockchain/data
You will see the program either start to sync and download, or start to read the existing blockchain file that you put in the share from before.

Congrats!

There are a couple extra steps to have it automatically start on reboot, but let's see if anyone gets this far first. I use the "screen" program to do this, but there's also a daemon mode, and some other functionality that is discussed in the hackernoon tutorial.
The primary cost will be outgoing bandwidth. AWS charges $0.10/GB beyond 15GB; You can limit the outgoing bandwidth easily according to your budget: https://bitcoin.org/en/full-node#reduce-traffic

Hope this encourages people to try running a free, or very low cost, cloud node, with a substantially reduced threat profile.
submitted by xtal_00 to Bitcoin [link] [comments]

PHP Script Casino Management System Online Casino Full Feature

[ Removed by reddit in response to a copyright notice. ]
submitted by Champion01 to u/Champion01 [link] [comments]

Your guide to NYZO

NYZO is the highly efficient Proof-of-Diversity (PoD) blockchain for everyday spending.
NYZO has been developed from the ground up, it is an open-source initiative and isn't a copy of any existing blockchain project.
The network has been running for more then one year now and the source code can be found on GitHub. The NYZO codebase is going to start acting as an API server. This will be run-mode dependent, just like the various web server functions that are available now. It will interact with the mesh on one side and whatever it needs to interact with on the other side.
Developers update NYZO all the time with fixes and performance and stability improvements. Every update which has been created for the network so far has been accompanied by a release note, a detailed document detailing every change to the network to make it better.
We can find these release notes on the website of the developers: What's new? - as you can see, the network has been worked on on a regular basis and each release note is multiple pages long - developers are dedicated to making this a success and this is their testament.
Whitepaper 
Proof-of-Diversity (PoD) consensus mechanism requires active participation in the form of time and verifier behaviour in the blockchain to be allowed to exert a certain influence on the system as a whole. The Proof-of-Diversity blockchain uses verification cycles to establish the authoritative form of the blockchain. The basic concept of proof-of-diversity is simple. Verifiers take turns producing blocks in a circular order. Some simple rules ensure that verifiers are neither added to nor removed from that circular order too quickly. In order to produce a believable forgery of the blockchain for any meaningful amount of time, an attacker would need to obtain more than half of the private keys of verifiers currently working on the blockchain. The design and technology are simple and clearly explained in NYZO whitepaper. This document was created in the very beginning and it might not cover all aspects as it should, the release notes make up for this.
Still too lazy and didn't read NYZO whitepaper? Relax, and listen to the soothing audio version.
Verifier 
Mesh (cycle) participants are called verifiers. Verifiers are in charge of verifying transactions and producing blocks. In exchange for securing the network, verifiers collect transaction fees which are distributed fairly among all of them. Each verifier gets a chance to verify one block in one mesh cycle. NYZO don't need mining equipment and large amounts of processing power like others, only unique IP address and always on Linux VPS is required.
Sentinel 
The purpose of the NYZO Sentinel is to provide improve stability of the cycle by producing blocks for in-cycle verifiers that are unable to produce blocks due to temporary hardware and network issues. The Sentinel should not be run on an instance that is running the verifier. The NYZO sentinel is a seperate version of the nyzoVerifier designed to protect your in-cycle verifiers. Its job is to constantly check up on your verifiers. If one of them is unresponsive, the sentinel will initiate communication on behalf of the verifier, this all to ensure future cycle inclusion.
The Mesh (cycle) 
is simply a network of computers known as verifiers all running NYZO and communicating information to each other. The Mesh (cycle) is a central point of PoD system. For securing the Mesh these computers are given 10% reward of transaction fees for each block they secure.
Check your NYZO verifier status, search for your nickname or IP
Newcomers can sometimes get confused with how Nyzo verifier lifecycle works in practice or how to join the cycle.
Block files 
One part of the consensus algorithm is the block consolidation process which ensures that a small machine such as a Rock64 Pro or a beefy Raspberry Pi can run a NYZO verifier with little storage space. 1000 blocks are consolidated into 500 Kb of storage space. Very efficient.
51% attack resistance and energy efficiency 
NYZO has a properly designed economic model that relies on time. Therefore, the cost for 51% attacks (relative to market cap) is huge, there is ongoing incentive to participate in the network, and attacks based on computing power (PoW) or ownership of token (PoS) aren't feasible. NYZO uses only a tiny fraction of Bitcoin’s resources while performing the same tasks. 58 000 000 000 kwH - 58 TWh : current BTC power cons. per year vs 36500 kwH - 0.0000365 TWh : current NYZO power cons. per year = 1,589,041 times more efficient and 51% attack resistant.
Roadmap 
NYZO developers have been asked many times for a roadmap. The roadmap is to keep making the code more stable, more robust, and more efficient.
Nyzo development: 15 months of hard work (and beyond)
Scalability 
NYZO doesn’t require any Layer 2 scaling solutions and is able to handle high transaction volumes per second which is only dependent on the performance of the verifiers in the mesh. The block time is 7 seconds and block size is 28 Kb.
Micropay is a lightweight way of using NYZO that shifts as much burden as possible to the person receiving the payment to make it as easy as possible for someone to send small payments. Next step is an API server for Micropay.
Useful guides and articles 
2k verifiers/nodes are in the cycle and 24k verifiers are patiently waiting to join the mesh/cycle. Following video tutorials will explain in detail how to set up your own NYZO mesh verifier node. For more information about set up visit Nyzo DISCORD.
VIDEO TUTORIAL - How to setup a NYZO verifier and sentinel on a VPS - video tutorial from Refortuna Analytics
VIDEO TUTORIAL - How to set up a Nyzo Verifier on Hetzner - from community website Nyzo.io
Nyzo review and guide how to set up verifier - very detailed review and guide by MyAltcoins.info
Nyzo - Time and diversity as a currency (+ 4 translations here) This article goes into detail about the consensus algorithm and its benefits, it sketches a hypothetical attack scenario and the cost of an attack at this point in time (while the market cap is still low).
Arguments against early entrants This article goes into detail about the early stages of the project, what has happened, how certain events have unfolded and the diversity of the project, it creates a parallel between Bitcoin and NYZO to cover an important aspect of the network in detail.
Time An article going deeper into the time aspect of the network, written by a community member
Ethereum An article comparing NYZO’s consensus algorithm to the development state of Ethereum, written by the same user as the article above.
Bitcoin Yet again an article comparing NYZO, this time with Bitcoin.
Proof of Diversity - A novel solution for limitless blockchain scalability | Micky.com.au
Thoughts on Tor and Nyzo
Developer fund 
The initial developer fund plan can be found here, this has been followed up and the details have changed. The developers effectively own 0.6% of the total supply. So far around 11 million has been “mined” and the remainder is spendable by the network through governed voting, with a minimum amount of votes required for NYZO to be released (51% of the network needs to agree).
IMPORTANT LINKS: 
Official website
Nyzo mobile wallet for Android phones on Google Play - Multilingual support (EN, DE, CN, ES, FR, RU, NL, HR) - developed by ThreeDots Technologies
Nyzo key tool and Web wallet
Nyzo Space - Paper wallet - developed by Angainor Dev
Nyzo DISCORD - There are currently 1600 active members and developers in the discord group with multiple joining every day. Most of the community communicates here. Here is where you’re guaranteed to have a one-on-one with the developers.
GitHub
New Community Forum website (You can get here lots of useful information. If you are ready to build for Nyzo and get paid, please read this article... Nyzo and its protocol which facilitates building)
Chinese Community website NYZO社区
Nyzo Twitter
Nyzo Gang Twitter
Facebook
Telegram
Instagram
Tumblr
Reddit
Bitcointalk
Weibo
QQ: 1007477423
Zedge
NYZO wallpapers for desktop and mobile devices
Trading: 
qTrade
BILAXY
Hotbit
QBTC
Citex
BiHodl


https://preview.redd.it/brh7hm2n6m241.png?width=2560&format=png&auto=webp&s=8d8b45235fcc34200bcad5603249ae49a89c2612
submitted by Mobilenewsflash to CryptoMoonShots [link] [comments]

Writing a short early history of ICOs, starting with altcoins - anything important I've missed?

This is for the forever-forthcoming ICO book. But I figured I needed to talk about altcoins first, the previous generation of shitcoins. This is mostly from dredging early altcoin stuff on Bitcointalk.
There needs to be a bit of the end that leads from The DAO as a world-famous ICO to the 2017 crypto bubble, and ICOs booming in that. Is there anything super-relevant I've missed? In the context of ICOs as we now know them, not just altcoins. Ethereum and Ripple probably.
The early history of ICOs
In the beginning was Bitcoin.
That’s the start for every cryptocurrency and blockchain story. Different parts are important to different people — fun and interesting technology, decentralised money, fighting the oppressive statist jackboots of taxation, sticking it to the man.
What ICOs inherit from Bitcoin is the notion of inventing your own magical Internet money — so you can get rich for free. Bitcoin was released in January 2009 as an open protocol, implemented as open source code — anyone could take a copy of it, twiddle it a bit and have a new coin. It took until April 2011 for the first “fork” of the Bitcoin code to come out — Namecoin, an attempt at a decentralised replacement for the Internet’s Domain Name Service (DNS).[1]
It was another four months until someone came up with a general altcoin, usable as a Bitcoin-style payment system — Ixcoin, on 10 August 2011.[2] The creator, “Thomas Nasakioto” — an anagram of "Satoshi Nakamoto"; he used a picture of Japanese actor Hiroyuki Sanada as his forum avatar — disappeared less than a month later, having scored about 50 bitcoins in the process. “Pretty sure it’s dead,” said one commenter. “It has served his purpose. Many people made quite a few BTC out of it.”[3]
A flood of what were rapidly labeled “altcoins” followed — i0coin, Solidcoin, RRCoin, Tenebrix, Litecoin. The Freenode Internet Relay Chat network started banning cryptocurrency servers that made automated network announcements around this time, rather than deal with what looked “like a botnet using their network.”[4]
The first Initial Coin Offering as we know it is commonly held to be Mastercoin in July 2013.[5] Mastercoin became OmniLayer — the platform for Tether. Mastercoin was the first sale of a token that ran as an application on top of another blockchain — in this case, Bitcoin: “I am VERY excited to announce that I now have a complete specification for building a protocol layer on top of bitcoin (like how HTTP runs on top of TCP/IP).”
Mastercoin didn’t use the phrase “Initial Coin Offering.” The phrase “IPO” — “Initial Public Offering,” in the manner of stock offerings for companies going public — was being used for altcoin offerings by 2014. IronBankCoin used “initial coin offering” and “ICO” by July 2014 — “The initial coin offering will be of 21% of the coin cap during the PoW (Proof of Work) stage” and “Initial Distribution of the Land (ICO info): ICO? Aren't those all scams?”[6]
Mastercoin never really took off as a token platform — that didn’t come until Ethereum made tokens easy to set up in 2015, and The DAO got press worldwide in 2016 by showing just how much money an ICO could pull in. Even as The DAO proceeded to lose $50 million to a hacker five days after launch.
  1. vinced. “(announce) Namecoin - a distributed naming system based on Bitcoin.” BitcoinTalk Bitcoin Forum > Bitcoin > Bitcoin Discussion, 18 April 2011.
  2. Nasakioto. “[ANNOUNCE] Mining on Ixcoin, a new Bitcoin fork.” Ixcoin Forum, 10 August 2011. (archive)
  3. Mindphlux. “Re: What happened to the ixcoin founder? Is Ixcoin dead?” BitcoinTalk Bitcoin Forum > Other > Alternate cryptocurrencies, 9 September 2011.
  4. DannyM. “Ixcoin, I0coin, future forks: Please respect Freenode Network.” BitcoinTalk Bitcoin Forum > Other > Alternate cryptocurrencies, 16 August 2011
  5. Dacoinminster. “OFFICIAL LAUNCH: New Protocol Layer Starting FromNew Protocol Layer Starting From ‘The Exodus Address’.” BitcoinTalk Bitcoin Forum > Bitcoin > Project Development, 31 July 2013.
  6. IronBankCoin. “(Pre-ANN)(IBC) IronBankCoin | 90-day PoW~PoS | Own part of the Known World.” BitcoinTalk Bitcoin Forum > Alternate cryptocurrencies > Announcements (Altcoins), 17 June 2014, updated 28 July 2014.
submitted by dgerard to Buttcoin [link] [comments]

The importance of being mindful of security at all times - nearly everyone is one breach away from total disaster

This is a long one - TL;DR at the end!

If you haven't heard yet: BlankMediaGames, makers of Town of Salem, have been breached which resulted in almost 8 million accounts being leaked. For most people, the first reaction is "lol so what it's just a game, why should I really care?" and that is the wrong way to look at it. I'd like to explain why everyone should always care whenever they are part of a breach. I'd also like to talk about some ways game developers - whether they work solo or on a team - can take easy steps to help protect themselves and their customers/players.
First I'd like to state that there is no practical way to achieve 100% solid security to guarantee you'll never be breached or part of a breach. The goal here will be to get as close as possible, or comfortable, so that you can rest easy knowing you can deal with problems when they occur (not if, when).

Why You Should Care About Breaches

The sad reality is most people re-use the same password everywhere. Your email account, your bank account, your steam account, your reddit account, random forums and game websites - you get the idea. If you haven't pieced it together yet the implication is that if anyone gets your one password you use everywhere, it's game over for you - they now own all of your accounts (whether or not they know it yet). Keep in mind that your email account is basically the holy grail of passwords to have. Most websites handle password changes/resets through your email; thus anyone who can login to your email account can get access to pretty much any of your accounts anywhere. Game over, you lose.

But wait, why would anyone want to use my password? I'm nobody!

It doesn't matter, the bad guys sell this information to other bad guys. Bots are used to make as much use of these passwords as possible. If they can get into your bank they might try money transfers. If they get into your Amazon account they might spin up $80,000 worth of servers to mine Bitcoin (or whatever coin is popular at the time). They don't care who you are; it's all automated.
By the way, according to this post (which looks believable enough to be real) this is pretty much how they got into the BMG servers initially. They checked for usernames/emails of admins on the BMG website(s) in previous breach dumps (of which there are many) and found at least one that used the same password on other sites - for their admin account!
If you want to see how many of your accounts are already breached check out Have I Been Pwned - I recommend registering all of your email addresses as well so you get notified of future breaches. This is how I found out about the Town of Salem breach, myself.

How You Can Protect Yourself

Before I go into all the steps you can (and should) take to protect yourself I should note that security is in a constant tug of war with convenience. What this means is that the more security measures you apply the more inconvenienced you become for many tasks. It's up to you to decide how much is too much either way.
First of all I strongly recommend registering your email(s) on https://haveibeenpwned.com/ - this is especially important if your email address is associated to important things like AWS, Steam developer account, bank accounts, social media, etc. You want to know ASAP when an account of yours is compromised so you can take steps to prevent or undo damage. Note that the bad guys have a head start on this!

Passwords

You probably need to have better password hygiene. If you don't already, you need to make sure every account you have uses a different, unique, secure password. You should change these passwords at least once a year. Depending on how many accounts you have and how good your memory is, this is your first big security vs convenience trade-off battle. That's easily solved, though, by using a password manager. You can find a list of password managers on Wikipedia here or you can search around for some comparison articles.
Some notable choices to consider:
Regardless of which one you choose, any of them is 100x better than not using one at all.

Multi-Factor Authentication / Two-Factor Authentication (aka MFA / 2FA)

The problem with all these passwords is that someone can still use them if they are found in a breach. Your passwords are only as strong as the website you use them on. In the case of the BMG breach mentioned above - all passwords were stored in an ancient format which has been insecure for years. It's likely that every single password in the breach can be reversed/cracked, or already have been. The next step you need to take is to make it harder for someone else to login with your password. This is done using Multi-Factor Authentication (or Two-Factor Authentication).
Unfortunately not every website/service supports MFA/2FA, but you should still use it on every single one that does support it. You can check which sites support MFA/2FA here or dig around in account options on any particular site. You should setup MFA/2FA on your email account ASAP! If it's not supported, you need to switch to a provider that does support it. This is more important than your bank account! All of the big email providers support it: GMail, Outlook.com, Yahoo Mail, etc.
The type of MFA/2FA you use depends on what is supported by each site/service, but there is a common approach that is compatible on many of them. Most of them involve phone apps because a phone is the most common and convenient "thing you have" that bad guys (or anyone, really) can't access easily. Time-based One-time Password or TOTP is probably the most commonly used method because it's easy to implement and can be used with many different apps. Google Authenticator was the first popular one, but it has some limitations which continue the security vs convenience battle - namely that getting a new phone is a super huge chore (no backup/restore option - you have to disable and setup each site all over again). Many alternatives support cloud backup which is really convenient, though obviously less secure by some measure.
Notable choices to consider:
Some sites/services use their own app, like Blizzard (battle.net) and Steam, and don't allow you to use other ones. You will probably have a few apps on your phone when all your accounts are setup, but it's worth it. You'll definitely want to enable it on your password manager as well if you chose a cloud-based one.
Don't forget to save backup codes in an actual secure location! If you lose your backup codes and your auth app/physical key you will be locked out of accounts. It's really not fun recovering in that situation. Most recommendations are to print them and put in a fireproof safe, but using some other secure encrypted storage is fine.
There is such a thing as bad MFA/2FA! However, anything is at least better than nothing. A lot of places still use SMS (text messaging) or e-mail for their MFA/2FA implementation. The e-mail one has the most obvious flaw: If someone gets into your email account they have defeated that security measure. The SMS flaws are less obvious and much less likely to affect you, but still a risk: SMS is trivial to intercept (capture data over the air (literally), clone your SIM card data, and some other methods). Still, if you're not a person of interest already, it's still better than nothing.

What Does This Have To Do With GameDev?

Yeah, I do know which subreddit I'm posting in! Here's the section that gets more into things specific to game development (or software development in general).

Secure Your Code

Securing your code actually has multiple meanings here: Securing access to your code, and ensuring your code itself is secure against exploitation. Let's start with access since that's the easier topic to cover!
If you're not already using some form of Source Control Management (SCM) you really need to get on board! I'm not going to go in depth on that as it's a whole other topic to itself, but I'll assume you are using Git or Mercurial (hg) already and hosting it on one of these sites (or a similar one):
First, ensure that you have locked down who can access this code already. If you are using private repositories you need to make sure that the only people who have access are the people who need access (i.e. yourself and your team). Second, everyone should have strong passwords and MFA/2FA enabled on their accounts. If 1 person on the team does not follow good security practices it puts your whole project at risk! So make sure everyone on the team is following along. You can also look into tools to do some auditing and even automate it so that if anyone's account becomes less secure over time (say they turned off MFA one day) they would automatically lose their access.
Additionally you should never commit secrets (passwords, API keys, tokens, social security numbers, etc) to your code repository. Probably 90% of cases where people have their AWS/Google Cloud/Azure accounts compromised and racking up huge bills for bitcoin mining is due to having their passwords/keys stored in their git repo. They either accidentally made it public or someone got access to the private repo through a compromised account. Never store sensitive information in your code repository!
Next topic: Securing your code from vulnerabilities. This one is harder to talk about for game dev as most engines/frameworks are not as susceptible (for lack of a better word) to these situations as others. In a nutshell, you need to keep track of the following:
A lot of these things cannot be solved automatically, unfortunately, but some of it can. If you are using Javascript for your game you likely will be using packages from npm - luckily they (recently) added security auditing for packages. For other languages you can look at tools like Snyk or some other alternatives to audit the libraries you use in your project. Unfortunately none that I know of are aimed at game dev in particular, but it's still important to use these tools when you can. In general, be aware of all of your code dependencies and what impact they can have on your game or your customers if there are security bugs. Impact can range from "can cheat in multiplayer" to "can get IP addresses of all players in the world" or even "can get all information I ever put on my server", etc.
In general you'll want to look into Secure Software Development Lifecycle (commonly SDLC) practices. Microsoft has some information on how they do it.

Secure Your Computer

I'm not going to go in depth on this one because at this point everyone should have a handle on this; if not there are limitless articles, blogs, and videos about the how/what/why. In summary: Keep everything updated, and don't open suspicious links.

Secure Your Website

I will have to add more to this later probably, but again there are tons of good articles, blogs, and videos on these topics. Hopefully the information in this section is enough to get you on the right track - if not feel free to ask for more info. Lots of guides can be found on Digital Ocean's site and they are relevant even if you don't use DO for your servers.
A lot of this will apply to your game servers as well - really any kind of server you expect to setup.

That's it, for now

I ran out of steam while typing this all up after a couple hours, but I may revisit it later to add more info. Feel free to ask any questions about any of these topics and I'll do my best to answer them all.

TL;DR (y u words so much??)

... in general... in general... in general... I sure wrote those 2 words a lot.

Why Should I Trust This Post?

Hopefully I have provided enough information and good links in this post that you can trust the contents to be accurate (or mostly accurate). There is certainly enough information to do some searches on your own to find out how right or wrong I might be about these things.
If you want my appeal to authority answer: I've been working at a major (network/computer) security company for almost 7 years as a software developer, and I've had to put up with pretty much every inconvenience brought on by security. I've also witnessed the aftermath of nearly every type of security failure covered in this post, via customers and the industry at large. None of the links I used are related to my employer or its products.
Edit: Fixed some typos and added some more links
More edit: added a few more points and links
submitted by exoplasm to gamedev [link] [comments]

What is NYZO?

What is NYZO?
NYZO is a highly efficient Proof-of-Diversity (PoD) blockchain for everyday spending.
NYZO has been developed from the ground up, it is an open-source initiative and isn't a copy of any existing blockchain project.
The network has been running for more than one year now and the source code can be found on GitHub. The NYZO codebase is going to start acting as an API server. This will be run-mode dependent, just like the various web server functions that are available now. It will interact with the mesh on one side and whatever it needs to interact with on the other side.
Developers update NYZO all the time with fixes and performance and stability improvements. Every update which has been created for the network so far has been accompanied by a release note, a detailed document detailing every change to the network to make it better.
We can find these release notes on the website of the developers: What's new? - as you can see, the network has been worked on a regular basis and each release note is multiple pages long - developers are dedicated to making this a success and this is their testament.
Whitepaper 
Proof-of-Diversity (PoD) consensus mechanism requires active participation in the form of time and verifier behavior in the blockchain to be allowed to exert a certain influence on the system as a whole. The Proof-of-Diversity blockchain uses verification cycles to establish the authoritative form of the blockchain. The basic concept of proof-of-diversity is simple. Verifiers take turns producing blocks in a circular order. Some simple rules ensure that verifiers are neither added to nor removed from that circular order too quickly. In order to produce a believable forgery of the blockchain for any meaningful amount of time, an attacker would need to obtain more than half of the private keys of verifiers currently working on the blockchain. The design and technology are simple and clearly explained in NYZO whitepaper. This document was created in the very beginning and it might not cover all aspects as it should, the release notes make up for this.
Still too lazy and didn't read NYZO whitepaper? Relax, and listen to the soothing audio version.
Verifier 
Mesh (cycle) participants are called verifiers. Verifiers are in charge of verifying transactions and producing blocks. In exchange for securing the network, verifiers collect transaction fees which are distributed fairly among all of them. Each verifier gets a chance to verify one block in one mesh cycle. NYZO don't need mining equipment and large amounts of processing power like others, only unique IP address and always-on Linux VPS is required.
Sentinel 
The purpose of the NYZO Sentinel is to provide improved stability of the cycle by producing blocks for in-cycle verifiers that are unable to produce blocks due to temporary hardware and network issues. The Sentinel should not be run on an instance that is running the verifier. The NYZO sentinel is a separate version of the nyzoVerifier designed to protect your in-cycle verifiers. Its job is to constantly check up on your verifiers. If one of them is unresponsive, the sentinel will initiate communication on behalf of the verifier, this all to ensure future cycle inclusion.
The Mesh (cycle) 
is simply a network of computers known as verifiers all running NYZO and communicating information to each other. The Mesh (cycle) is a central point of PoD system. For securing the Mesh these computers are given a 10% reward of transaction fees for each block they secure.
Check your NYZO verifier status, search for your nickname or IP
Newcomers can sometimes get confused with how Nyzo verifier lifecycle works in practice or how to join the cycle.
Block files 
One part of the consensus algorithm is the block consolidation process which ensures that a small machine such as a Rock64 Pro or a beefy Raspberry Pi can run a NYZO verifier with little storage space. 1000 blocks are consolidated into 500 Kb of storage space. Very efficient.
51% attack resistance and energy efficiency 
NYZO has a properly designed economic model that relies on time. Therefore, the cost for 51% attacks (relative to market cap) is huge, there is ongoing incentive to participate in the network, and attacks based on computing power (PoW) or ownership of token (PoS) aren't feasible. NYZO uses only a tiny fraction of Bitcoin’s resources while performing the same tasks. 58 000 000 000 kWh - 58 TWh : current BTC power cons. per year vs 36500 kWh - 0.0000365 TWh : current NYZO power cons. per year = 1,589,041 times more efficient and 51% attack resistant.
Roadmap 
NYZO developers have been asked many times for a roadmap. The roadmap is to keep making the code more stable, more robust, and more efficient.
Nyzo development: 15 months of hard work (and beyond)
Scalability 
NYZO doesn’t require any Layer 2 scaling solutions and is able to handle high transaction volumes per second which is only dependent on the performance of the verifiers in the mesh. The block time is 7 seconds and block size is 28 Kb.
Micropay is a lightweight way of using NYZO that shifts as much burden as possible to the person receiving the payment to make it as easy as possible for someone to send small payments. Next step is an API server for Micropay.
Useful guides and articles 
2k verifiers/nodes are in the cycle and 24k verifiers are patiently waiting to join the mesh/cycle. The following video tutorials will explain in detail how to set up your own NYZO mesh verifier node. For more information about setting up please visit Nyzo DISCORD.
VIDEO TUTORIAL - How to setup a NYZO verifier and sentinel on a VPS - video tutorial from Refortuna Analytics
VIDEO TUTORIAL - How to set up a Nyzo Verifier on Hetzner - from community website Nyzo.io
Nyzo review and guide how to set up verifier - very detailed review and guide by MyAltcoins.info
Nyzo - Time and diversity as a currency (+ 4 translations here) This article goes into detail about the consensus algorithm and its benefits, it sketches a hypothetical attack scenario and the cost of an attack at this point in time (while the market cap is still low).
Arguments against early entrants This article goes into detail about the early stages of the project, what has happened, how certain events have unfolded and the diversity of the project, it creates a parallel between Bitcoin and NYZO to cover an important aspect of the network in detail.
Time An article going deeper into the time aspect of the network, written by a community member
Ethereum An article comparing NYZO’s consensus algorithm to the development state of Ethereum, written by the same user as the article above.
Bitcoin Yet again an article comparing NYZO, this time with Bitcoin.
Proof of Diversity - A novel solution for limitless blockchain scalability | Micky.com.au
Thoughts on Tor and Nyzo
Developer fund 
The initial developer fund plan can be found here, this has been followed up and the details have changed. The developers effectively own 0.6% of the total supply. So far around 11 million has been “mined” and the remainder is spendable by the network through governed voting, with a minimum amount of votes required for NYZO to be released (51% of the network needs to agree).
IMPORTANT LINKS: 
Official website
Nyzo.net
Nyzo.today
Nyzo.io
Nyzo mobile wallet for Android phones on Google Play - Multilingual support (EN, DE, CN, ES, FR, RU, NL, HR) - developed by ThreeDots Technologies
Nyzo key tool and Web wallet
Nyzo Space - Paper wallet - developed by Angainor Dev
Nyzo DISCORD - There are currently 1600 active members and developers in the discord group with multiple joining every day. Most of the community communicates here. Here is where you’re guaranteed to have a one-on-one with the developers.
GitHub
New Community Forum website (You can get here lots of useful information. If you are ready to build for Nyzo and get paid, please read this article... Nyzo and its protocol which facilitates building)
Chinese Community website NYZO社区
Nyzo Twitter
Nyzo Gang Twitter
Facebook
Telegram
Instagram
Tumblr
Reddit
Bitcointalk
Weibo
QQ: 1007477423
WeChat: Nyzo
Zedge
NYZO wallpapers for desktop and mobile devices
Trading: 
qTrade
BILAXY
HOTBIT
QBTC
Citex
BiHodl

https://preview.redd.it/brh7hm2n6m241.png?width=2560&format=png&auto=webp&s=8d8b45235fcc34200bcad5603249ae49a89c2612
submitted by Mobilenewsflash to Nyzo [link] [comments]

Gerald Cotten, aka Sceptre

Gerald Cotten, aka Sceptre
Using a variety of OSINT tools and research, we're going to demonstrate the chain of evidence confirming that Gerald Cotten, QuadrigaCX CEO, was also known as "Sceptre" online.

Let's start with the gerryenterprises.com name servers. Gerryenterprises.com was a domain registered by Cotten and used for custom name servers for a variety of domains. Using your own name servers instead of relatively inexpensive and powerful 3rd-party options (such as Cloudflare, which QuadrigaCX used) suggests you have other motives in mind, and perhaps obscuring or obfuscating logs attached to your domain/s were amongst them.

Using Domain Research Suite (paid sub required) we can trace all domains that ever used ns1.gerryenterprises.com as a name server. You can verify this for yourself.

https://preview.redd.it/xfsf1fk98xt21.png?width=2100&format=png&auto=webp&s=2a555e9ae07081269e5a5c9791e3a3fdd481e2ae
This search turns up a number of interesting domains, and one in particular - the "contentbysceptre.com" domain, which we can link to a post on BlackHatWorld, along with other data points from other domain research.

Let's have a closer look at some of those domains:

https://preview.redd.it/uavml56y8xt21.png?width=2100&format=png&auto=webp&s=b37d9dad06bd11f1af3f0e4d8c5ec8a545c2c572
OK, so they have all clearly been registered to Gerald Cotten.

Let's take a closer look at the BlackHatWorld posts and profile:
https://preview.redd.it/8wuhj4s29xt21.png?width=2100&format=png&auto=webp&s=9a84e85f4ef9b395453485d2bc5fce385b1fd4cd

From this we can deduce the following:

  1. Cotten registered and ran the gerryenterprises.com name servers, both for his own domains and a number of friends and associateds, such as:
    1. Patryn (vfs-securities.com, michaelpatryn.com)
    2. Christine Lako, his ex-girlfriend (schnugglebunny.com)
    3. Nicky Correa, his friend (nickycorrea.com, studioimpression.com)
  2. He also ran a number of his own domains through this server, such as:
    1. Allergictocorn.com
    2. Barbara-corcoran.com
    3. Canadian-airport-guide.com
    4. Cooltripbro.com
    5. Hide-your-ip.org
    6. Howdoihidemyip.com
    7. Etc. and many others
  3. From other research and domain analysis, we know Cotten had a number of “Sceptre” email addresses, including
    1. [[email protected]](mailto:[email protected])
    2. [[email protected]](mailto:[email protected])
    3. [[email protected]](mailto:[email protected])
    4. [[email protected]](mailto:[email protected])
  4. These email addresses were used on domain registrations, forums, payment processors, and a variety of services linking back to Gerald Cotten (more on this later)
  5. Given the preponderance of inexpensive, cheap and more powerful options for name servers (such as Cloudflare, which was used by QuadrigaCX), and Cotten’s preoccupation with security, using proxy services and hiding his IP we can assume this would have been primarily for security reasons
  6. Cotten used the “contentbysceptre.com” domain in connection with his “Sceptre’s Spectacular Content Services” on BlackHatWorld
  7. Cotten posted an advertisement on Blackhatworld for a programmer for a “Website like Bitstamp”, which was just a few months prior to launching QuadrigaCX in December 2013. It’s a short timeframe but we know it fits because QuadrigaCX uses the generic WLOX exchange script, which dramatically reduces the work required to build a crypto exchange (Note: we didn’t say a great crypto exchange). This is mentioned in a post on coinforum.ca where user @yerofeyev admits that another exchange, Taurs (founded with PATRYN, mentioned earlier) uses Quadriga code based on WLOX. Strangely that thread is no longer accessible (https://coinforum.ca/discussion/2448/taurs-soft-launch) as the whole coinforum.ca website has been mysteriously shut down in the last few days
  8. Cotten posted a number of threads asking for advice on how to monetise his network of sites, includijg the aforementioned proxy sites, and his celebrity news sites, including celebritydaily.net. Here’s the link to that post as well “BHW - Hiring Celebrity Article Writer”
  9. Cotten’s profile on BlackHatWorld was initially Sceptre and later changed to “Murodch1337” , perhaps after QuadrigaCX began to become popular and he realised he might need to conceal links to his past. Link to Cottens BlackHatWorld profile here: https://www.blackhatworld.com/members/murdoch1337.273596/
  10. Patryn was also active on BlackHatWorld, and posted to the following thread “10K budget need suggestions on passive income streams - help”, suggesting “HYIPs are investment scams promising returns of 5-20% weekly, generally.” You can view that thread here: https://www.blackhatworld.com/seo/10k-budget-need-suggestions-on-passive-income-streams-help.548790/page-4
  11. We know form other research and analysis that both Sceptre and Patryn were highly active in the HYIP/Ponzi/exchanger space (more on this later)
  12. In conclusion, we believe that Gerald Cotten, QuadrigaCX CEO, was known as "Sceptre" on BlackHatWorld and other sites.

This has been a QCXINT release. If you have more information regarding QuadrigaCX, Michael Patryn (aka Omar Patryn, Omar Dhanini, Voleur), Gerald Cotten (aka Sceptre), please send to [[email protected]](mailto:[email protected]) . Your submission will be 100% confidential.

Update 23/04: Reddit dropped the entire post whilst editing so it had to be re-uploaded.
  1. Added link to Freelancer post by Cotten: https://www.freelancer.com/projects/bitcoin-related-project/ showing his skype (gerrywc) and "Sceptre" email ([[email protected]](mailto:[email protected]))
  2. There is also a crosspost for the "Bitstamp clone" BHW post here: https://www.freelancer.com/projects/PHP-Website-Design/Bitstamp-Clone-Bitcoin-Trading-Platform/ using exactly the same text.
  3. This further confirms that Gerald Cotten was the poster on Freelancer (as he includes his Skype and email address) and Sceptre/Murdoch1337 on BlackHatWorld

https://preview.redd.it/f0hyq9o7axt21.jpg?width=1233&format=pjpg&auto=webp&s=c019aca89823c78717a5345d17194d7f1c14fceb
submitted by QCXINT to QuadrigaCX2 [link] [comments]

Bitcoin Server Mining Pwede eMultiple Mining (Tagalog) Local IIS Configuration with sql server connectivity - YouTube Lesson 3 - So You Want To Use Bitcoin On Your Website? A Free Legit Bitcoin Cloud Mining Website In 2020 - YouTube Cryptocurrency Mining Script - ICO mining script PHP - dogecoin cloud mining script

Free IP Stresser at registration, you can try our ip stresser before buying. The best Support team, We do the support 24/7 on livechat, telegram and support ticket center. We constantly update the ip stresser and work on new methods to feet your need. The ip stresser is very easy to use. Any beginner can use it without special knowledge The server generates a brand new Bitcoin public key and sends it to your client. Your client sends coins to this public key. Unfortunately, the implementation provided no authentication, so any "man in the middle" could have intercepted your bitcoins during the transaction. When they see that you're sending a Bitcoin payment by IP address, they pretend to be the actual destination and send ... About Us. FreeStresser.to is a free stresser or booter service that allows admins to stress test there servers to ensure it is safe from network attacks. Enter your servers IP address and press launch to see if your server is vulnerable to UDP flood. After fix your firewall rules until you are no longer vulnerable and now protected from similar floods. I have built Catcoind (a fork of the Bitcoin / project) and I can access the commands in my terminal by doing this from root: cd catcoin/src ./catcoind -daemon That will start Catcoind, open the port, and allow me to type commands like './catcoind getdifficulty', but I want to access them from a PHP JSON-RPC client running on another server ... -addnode=<ip> Add a node to connect ... # # server=1 tells Bitcoin-Qt and bitcoind to accept JSON-RPC commands #server=0 # Bind to given address to listen for JSON-RPC connections. Use [host]:port notation for IPv6. # This option can be specified multiple times (default: bind to all interfaces) #rpcbind=<addr> # If no rpcpassword is set, rpc cookie auth is sought. The default `-rpccookiefile ...

[index] [45328] [7139] [18521] [40878] [37616] [420] [37189] [38171] [15367] [26611]

Bitcoin Server Mining Pwede eMultiple Mining (Tagalog)

Share your videos with friends, family, and the world Website Link : https://bit.ly/2z7KcXe bitcoin mining, bitcoin in arabic, bitcoin pro, bitcoin free, bitcoin miner, bitcoin cash, bitcoins, bitcoin faucet, bi... Step 1:First Create User Account in your SQL server management Studio Step2: Give new Password for your own sa account Step 3: Select SQL server authenticati... How to Make a Bitcoin Price Widget Javascript, PHP, CSS & HTML - Duration: ... How to give your bitcoin node commands using a web server - Duration: 21:06. m1xolyd1an 991 views. 21:06 . Facebook ... Hi Guys. In this video, we will tell you guys how to fix the internet problem that Server IP Address Could Not Be Found. So if you all cannot connect to some...

#