Sid (98) : bitcoin package : Debian

Delightful Privacy

Delightful Privacy delightful

This is a collection of software, operating systems, and other miscellaneous tools to help the average user fight for their privacy and security online.

Operating Systems

Fedora

Fedora uses Security-Enhanced Linux by default, which implements a variety of security policies, including mandatory access controls, which Fedora adopted early on. Fedora provides a hardening wrapper, and does hardening for all of its packages by using compiler features such as position-independent executable (PIE). Wikipedia

Pop!_OS

Pop!_OS provides full out-of-the-box support for both AMD and Nvidia GPUs. It is regarded as an easy distribution to set-up for gaming, mainly due to its built-in GPU support. Pop!_OS provides default disk encryption, streamlined window and workspace management, keyboard shortcuts for navigation as well as built in power management profiles. The latest releases also have packages that allow for easy setup for TensorFlow and CUDA. Wikipedia

Debian

Debian is one of the oldest operating systems based on the Linux kernel. The project is coordinated over the Internet by a team of volunteers guided by the Debian Project Leader and three foundational documents: the Debian Social Contract, the Debian Constitution, and the Debian Free Software Guidelines. New distributions are updated continually, and the next candidate is released after a time-based freeze. Wikipedia

openSUSE Tumbleweed - Rolling Release!

Any user who wishes to have the newest packages that include, but are not limited to, the Linux Kernel, SAMBA, git, desktops, office applications and many other packages, will want Tumbleweed. openSUSE

For enhanced security

Qubes OS

Qubes OS is a security-focused desktop operating system that aims to provide security through isolation. Virtualization is performed by Xen, and user environments can be based on Fedora, Debian, Whonix, and Microsoft Windows, among other operating systems. Wikipedia

Tails

Tails, or The Amnesic Incognito Live System, is a security-focused Debian-based Linux distribution aimed at preserving privacy and anonymity. All its incoming and outgoing connections are forced to go through Tor, and any non-anonymous connections are blocked. Wikipedia).*

Whonix

Whonix is a Debian GNU/Linux–based security-focused Linux distribution. It aims to provide privacy, security and anonymity on the internet. The operating system consists of two virtual machines, a "Workstation" and a Tor "Gateway", running Debian GNU/Linux. All communications are forced through the Tor network to accomplish this. Wikipedia

Web Browsers

For Desktop

Firefox Needs manual tweaking to be more secure! Use ghacks

Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. Wikipedia Recommended addons: uBlock Origin | Https Everywhere | Privacy Badger | Privacy Possum | Decentraleyes | NoScript | CanvasBlocker

Tor

Tor is free and open-source software for enabling anonymous communication. The name derived from the acronym for the original software project name "The Onion Router". Tor directs Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult to trace Internet activity to the user. Wikipedia

UnGoogled-Chromium

Without signing in to a Google Account, Chromium does pretty well in terms of security and privacy. However, Chromium still has some dependency on Google web services and binaries. In addition, Google designed Chromium to be easy and intuitive for users, which means they compromise on transparency and control of internal operations.
ungoogled-chromium addresses these issues in the following ways:

For mobile

Bromite Android Only

Bromite is a Chromium fork with ad blocking and privacy enhancements; take back your browser! Bromite

Firefox Focus Android - iOS

Firefox Focus is a free and open-source privacy-focused browser from Mozilla, available for Android and iOS. Wikipedia

Tor Browser for mobile Android - iOS

Tor protects your privacy on the internet by hiding the connection between your Internet address and the services you use. We believe Tor is reasonably secure, but please ensure you read the instructions and configure it properly. GitHub

Email

Tutanota

Tutanota is an end-to-end encrypted email software and freemium hosted secure email service. Wikipedia

Mailbox

There are many ears listening on the Internet, which is why all our services require mandatory SSL/TLS-encrypted data transmission. For additional security, we also use enhanced (green) security certificates ("EV") by the independent SwissSign trust service provider from Switzerland (Check the padlock symbol in your web browser's URL field). But this is just the beginning – there is so much more that we do. Mailbox

Disroot

Disroot is a decentralized cloud-based service that allows you to store your files and communicate with one another. Established by a privacy-focused organization of volunteers, if we look at Disroot as an email provider specifically, it stands out thanks to its emphasis on security with a completly free open-source approach. ProPrivacy

ProtonMail

ProtonMail is an end-to-end encrypted email service founded in 2013 in Geneva, Switzerland by scientists who met at the CERN research facility. ProtonMail uses client-side encryption to protect email content and user data before they are sent to ProtonMail servers, unlike other common email providers such as Gmail and Outlook.com. The service can be accessed through a webmail client, the Tor network, or dedicated iOS and Android apps. Wikipedia

Search Engine

Searx

searx is a free metasearch engine, available under the GNU Affero General Public License version 3, with the aim of protecting the privacy of its users. To this end, searx does not share users' IP addresses or search history with the search engines from which it gathers results. Tracking cookies served by the search engines are blocked, preventing user-profiling-based results modification. By default, searx queries are submitted via HTTP POST, to prevent users' query keywords from appearing in webserver logs. Wikipedia - Find public instances of searx here searx.space

Startpage

Startpage is a web search engine that highlights privacy as its distinguishing feature. Previously, it was known as the metasearch engine Ixquick, At that time, Startpage was a variant service. Both sites were merged in 2016. Wikipedia

YaCy

YaCy is a free distributed search engine, built on principles of peer-to-peer (P2P) networks. Its core is a computer program written in Java distributed on several hundred computers, as of September 2006, so-called YaCy-peers. Each YaCy-peer independently crawls through the Internet, analyzes and indexes found web pages, and stores indexing results in a common database (so called index) which is shared with other YaCy-peers using principles of P2P networks. It is a free search engine that everyone can use to build a search portal for their intranet and to help search the public internet clearly. Wikipedia

VPN

If you need anonymity and privacy online use Tor instead, if you are looking to bypass a geo-restriction, don't trust public WiFi, or are looking to Torrent, a VPN will help you.

Mullvad

Mullvad is an open-source commercial virtual private network (VPN) service based in Sweden. Launched in March 2009, Mullvad operates using the WireGuard and OpenVPN protocols. Mullvad accepts Bitcoin and Bitcoin Cash for subscriptions in addition to conventional payment methods.
No email address or other identifying information is requested during Mullvad's registration process. Rather, a unique 16-digit account number is anonymously generated for each new user. This account number is henceforth used to log in to the Mullvad service.
The TechRadar review notes that "The end result of all this is you don't have to worry about how Mullvad handles court requests to access your usage data, because, well, there isn't any." Wikipedia

ProtonVPN

ProtonVPN utilizes OpenVPN (UDP/TCP) and the IKEv2 protocol, with AES-256 encryption. The company has a strict no-logging policy for user connection data, and also prevents DNS and Web-RTC leaks from exposing users' true IP addresses. ProtonVPN also includes Tor access support and a kill switch to shut off Internet access in the event of a lost VPN connection.
In January 2020, ProtonVPN became the first VPN provider to release its source code on all platforms and conduct an independent security audit. ProtonVPN is the only VPN to do so, even though experts say this is a crucial factor in deciding whether to trust a VPN service. Wikipedia

For information about alternatives to software and services.

If you are looking for alternatives to proprietary services like Discord and Facebook, or an open-source alternative to Photoshop, check out our list about Awesome-Alternatives

Mirrors are kept up to date, this post may lag behind as we add stuff in.

submitted by CipherOps to LinuxCafe [link] [comments]

Best Dedicated Server in Germany

https://hostingultraso.com/dedicated-serveGermany

Why Is Dedicated Server Needed?

Dedicated Servers are one of the strong and powerful servers that can be a very good and effective server hosting solution for different businesses regardless of business size and scale. Dedicated hosting comes with various options including Customized Cpanel loaded with highly efficient tools and services with various resources and security management technology that will fully be dedicated to you. No sharing will be done like Shared servers.

Business and Technology In Germany

This is a Western Europe Country with states and cities that are professionally rich as business centers and with the trending business culture, Germany has become one of the world’s largest business hubs. From every aspect, Germany has participated in its large business tradition and now continuously growing and evolving.
The main aim of Hosting Ultraso is to build a strong bond with this business culture and be the local international hosting provider of yours. We have our dedicated servers spread over 119 cities all around the world including cities Frankfurt, Dusseldorf, Berlin, etc in Germany. There are large and well-managed data centers spread in Europe and Dusseldorf in Germany is having a highly efficient Data Center. The load balancing capability of the data center in Dusseldorf and dedicated servers in Germany gives any website the first rendering speed.

Why Choose a Dedicated server in Germany?

Germany maintains a rich tradition in its business. Depending upon the size and scale of any business in Germany, the Dedicated servers provided by us in Germany are well capable of giving services that will be solely dedicated to the business. Germany Dedicated Servers are so built with enhanced technology and configuration that is suitable for any business in Germany.
All highly optimized and configured software and hardware resources come with a dedicated server hosting plan. In addition, the Control panel facility loaded with quality tools and services and skilled technical team will be dedicated to you. Everything will not be shared as it happens in the case of Shared servers. A unique IP address will keep you safe and secure which will not let your website face any SEO issue as well.
The business website with dedicated servers in Germany will run fluently and smoothly with enhanced customer engagement to the website which will turn in large business growth.
There will be low latency rates and that we are 100% sure about giving you the most satisfaction.
We have a skilled and smart technical team and the other management team is there to help you anyway at any point in time all 24 hours. We have several dedicated servers hosting plans like Cheap server hosting, a Basic dedicated server plan, Advanced dedicated servers, unmanaged dedicated hosting, etc. It’s entirely up to you for choosing any plan that is suitable for your business and whatever be it our assurance comes with all the plans you will choose.

What are the Types Of Operating System Provided in Germany?

What Are The Different Dedicated Servers We Provide in Germany?

Germany has more than 28 optimized and top performed dedicated servers. They are in high demand too and various businesses are opting to pre-book our servers and we highly recommend you too.

Dedicated Servers In Germany

The Dedicated hosting in Germany includes different Intel Xeon, Ryzen, Atom versions, and core series.
Intel Xeon D-1520 2.2 GHz 4 cores, Intel Xeon E3-1230 v6 3.5 GHz 4 cores, Intel Xeon E5-2609 v3 1 GHz 6 cores, Intel Atom S1260 2 GHs 2 Cores, etc are the processor’s option available in Germany data centers.
You will be having different RAMS as well like 16,32,64 GB DDR3 and DDR4. Bandwidth will be in the range of 1 Gbps unmetered fair usage to 1 Gbps 5 TB and several other options. Hard Drives have different capacities and have HDD SATA and SSD SATA labeling that performs best in the current market. For more details, Do view our dedicated server configuration page on our website.
Two types of IP addresses we provide are IPV4 and IPV6 and bundling or clustering different servers to make a full new package server is also easy for you. You will get from us an additional IP address which is fully unique for every website and that will be absolutely free of cost even we do not charge for setup. Since we mainly provide the unmanaged dedicated servers in Germany, therefore, you need to do all the basic levels of the setup yourself or in that case, you should have an expert technical team to handle all the management of the servers.

What Are The Benefits Of Buying Dedicated Servers in Germany From Hosting Ultrso?

Hosting Ultraso provides all suitable plans for buying Dedicated Servers in Germany. There are budget Dedicated servers available that can give you effective configuration maintaining high quality and well-built too. The Dedicated hosting plan we provide, can give your business website the extra boost by more customers engagements and they are long-lasting in nature. Choosing dedicated servers in Germany that we provide will open up a new horizon definitely for your extended business.
  1. Additional IP: You will be having an extra IP address or Internet Protocol address for your site. Every active website has a unique IP.
  2. Managed Dedicated Servers: There are both basic and advanced management services, We have for you depending on what you need.
  3. Guarantee for Money-Back: We provide you a money-back guarantee on the time left on your subscription if you are not satisfied with our service that we care for your money too.
  4. Bitcoin Payment Availability: We accept all types of payments including Bitcoin payment.
  5. 24/7 Support team: Our technical team is there to help you in all possible ways and will be active all 24 hours a day.
  6. IPMI Access facility: Our Dedicated servers in Germany have IPMI (Intelligent Platform Management Interface) with each of them
    https://hostingultraso.com/dedicated-serveGermany
submitted by Hosting_Ultraso1 to u/Hosting_Ultraso1 [link] [comments]

[IDEA] [PROPOSAL] Monero Debian (deb) packages / Debian package repository deb.getmonero.org (I can do)

I have the skills to implement this if wanted.
Possible User Experience
This is a proposal, i.e. not implemented yet. Instructions for users, simplified.
How to install monero using apt-get
Download the repository signing key.
wget https://www.getmonero.org/monero.asc
Add the signing key.
sudo apt-key --keyring /etc/apt/trusted.gpg.d/monero.gpg add ~/monero.asc
Add APT repository.
echo "deb https://deb.getmonero.org buster main" | sudo tee /etc/apt/sources.list.d/monero.list
Update your package lists.
sudo apt-get update
Install monero.
sudo apt-get install monero
A few technical implementation details
I would simply grab the binaries provided by getmonero.org, download them, check software (gpg) signatures, put these into deb packages, add these to a repository, and upload the repository.
What I would not do is creating the binaries during package creation. While this is nice to have, it doesn't help user experience and blocks the progress on reaching this goal. See next chapter.
Why simply put the pre-build Monero binaries into a deb package?
1) After bitcoin existing for more than 10 years, being popular and being in Debian unstable (sid) it still never made its way into Debian testing, let alone stable. Reason being explained that a difference in underlying libraries (even just security fixes) during compilation may result in a network split. Binaries compiled during packaging on different versions of Linux distributions might have different libraries that might cause a network fork / chain split.
References:
(Note: above website saying Tags: fixed-upstream is probably a mistake as discussion at bottom says.)
2) The github issue of packaging monero stalled.
3) By shipping the same binaries as provided by getmonero.org reduces the chances of introducing a backdoor.
Many Options
Timeline
Doable quickly. The electrum (bitcoin) AppImage was recently added to a Debian package (binaries-freedom) by me and is now easily installable in Whonix. Pre-installed in testers version of Whonix already.
About Me
I am the founder of Whonix, which I am maintaining at present for more than 7 years.
Whonix (formerly TorBOX) is a Debian GNU/Linux–based security-focused Linux distribution. It aims to provide privacy, security and anonymity on the internet.
You can see an overview of packages I am maintaining on my github profile.
To proof that this forum account adrelanos corresponds the same person maintaining whonix.org, it is added here.
Questions
What happened to, what is the successor of the forum funding system?
submitted by adrelanos to Monero [link] [comments]

Gavin tweets: Expect a 0.9.1 Bitcoin Core release soon, linked against openssl 1.0.1g, because #heartbleed

Gavin tweets: Expect a 0.9.1 Bitcoin Core release soon, linked against openssl 1.0.1g, because #heartbleed submitted by xrandr to Bitcoin [link] [comments]

Armory is Now in the Official Debian Unstable (Sid) Repositories (and Ubuntu Vivid)

Armory is Now in the Official Debian Unstable (Sid) Repositories (and Ubuntu Vivid) submitted by josephbisch to Bitcoin [link] [comments]

Huge performance difference doing the blockchain sync in bitcoin core 0.17.1 vs. snap bitcoin core 0.17.0.1

Hi, I recently installed a fresh Ubuntu 18.04 and, as it was already late and I wanted to sync the blockchain overnight, quickly searched for bitcoind in the graphical package manager and to my delight there was a package 0.17.0.1 that I misread for 0.17.1, so I installed it not looking further into it and started the sync. The software immediately hogged >90% CPU usage, the fans started to run at full speed, the laptop ran hot as hell and the sync lasted like 14 hours. Next day when the sync was done I realized the f***** graphical install tool had installed a so called snap package, what's the newest craziness in Ubuntu to drive users away to other distros. Then I found out that the package is maintained by a guy who is completely unrelated to bitcoin core and a known shitcoiner, someone who can't be trusted. The guy didn't even realize he was confusing 0.17.0.1 with 0.17.1, wtf. See here for more info: https://bugs.launchpad.net/snapstore/+bug/1803914
Of course I immediately wiped the whole crap off of my installation, luckily before restoring any wallet balances. I also wiped the complete snap system, whoever came up with this shit should be tared and feathered and then be forced to use MS Windows for the rest of their life.
Afterwards I installed 0.17.1 from https://bitcoincore.org/en/download/ and properly verified my download before starting the blockchain sync.
There was a *huge* difference in performance, no noticeable CPU usage, no fans spinning up, and the whole sync process took maybe 4 hours, so a whopping third than the bogus snap version needed. I looked into the release notes, there is some mentioning of performance enhancements, but nothing about a reduction of sync time by two thirds.
So here comes my question, anybody knows more about this dubious Ubuntu snap package? Why is there such a performance difference, is this thing a genuine bitcoind at all or has someone tampered with that thing?
At least this should also be a warning to Ubuntu users, disable that snap crap and use apt to install software, and install critical stuff like bitcoin per hand from the official download page. And better use Debian and ditch Ubuntu like I will do as soon as I find time for it.
submitted by kbdwarrior to Bitcoin [link] [comments]

Homelab collective ressources post!

Hey guys!
I'm fairly new to this sub and to having a home lab in general and I found this community to be so kind and helping, I wanted to give back what I've learned. I'm seeing a lot of questions asked around on improvements and on what to do with x extra hardware so I thought it would be nice to have a thread to regroup that.
 
I'll put here some stuff I gathered and the most common questions I've seen, feel free to contribute and i'll update the post along.
 
Latest Additions
 
Homelab Dashboard
Posts about dashboards have been growing lately and here are some of the best that were kind enough to provide us with their sources.
User Screenshot Source
yours truly http://imgur.com/a/GhCNH https://github.com/Gabisonfire/dashboard-q
lastditchefrt http://i.imgur.com/5zQdao4.png https://github.com/d4rk22/Network-Status-Page
_SleepingBag_ http://i.imgur.com/Ql9ZM4W.png https://github.com/jsank/homelabdash
NiknakSi https://niknak.org/extras/sysinfo TBA
DainBramaged http://imgur.com/jYNlUEQ https://github.com/gordonturneBigBoard
michaelh4u https://i.imgur.com/XkZwMKj.png https://github.com/michaelh4u/homelabfrontpage
spigotx http://imgur.com/a/1zMht https://github.com/spigotx/HomeLab2
SirMaster https://nicko88.com/ https://github.com/dashbad/plex-server-status
yourofl10 http://imgur.com/a/AyROa TBA
TheBobWiley http://imgur.com/a/oU6d3 https://github.com/TheBobWiley/ManageThis-LandingPages
0110010001100010 http://i.imgur.com/iwtQcsL.jpg https://github.com/danodemano/monitoring-scripts
mescon & SyNiK4L https://i.imgur.com/gqdVM6p.jpg https://github.com/mescon/Muximux
ak_rex http://i.imgur.com/a/RJkrT https://github.com/ak-rex/homelab-dashboard
 
Or build yours from scratch: PRTG API, ELK, Grafana, freeboard, JumpSquares
 
Some other resources: Custom Monitoring Scripts by 0110010001100010
 
Credits to apt64 for his original post
= Pi specific =
 
= Download Automation =
 
= Virtualization =
 
= Monitoring =
 
= Media Center =
 
= Remote access =
 
= VOIP =
 
= Networking =
 
= File Servers/Storage/RAID =
 
= Cameras =
 
= Documentation =
 
= Dynamic DNS =
 
= Backup =
 
= Creating network diagrams =
 
= Guides =
 
= Misc =
 
That's all I could come up with on top of my head + some research, passing over to you guys so we can get a nice complete list!
 
Let's try and stick with free(or mostly) softwares, let me know if you guys feel otherwise.
submitted by Gabisonfire to homelab [link] [comments]

Interesting technical facts about Groestlcoin that might explain price rise

Disclaimer: After doing some research, I own a small amount of Groestlcoin and no Vertcoin (I rkn VTC is overvalued currently). Might buy some VTC after it corrects. Here's why...
Original text: Posted by posted [–]jackielove4u 4 days ago https://www.reddit.com/groestlcoin/comments/78258z/is_grs_possibly_threatened_by_bitcoin_gold/dormg88/
Our selling points are:
submitted by enozym111 to CryptoCurrency [link] [comments]

Dogecoin on Linux - The Complete Beginner's Guide

I'm writing this because I couldn't find a single condensed guide on compiling the wallet and running mining software on linux, specficially Ubuntu/Linux Mint. I combed Bitcoin and Litecoin forums for similar problems I was running into and eventually got everything nailed down, so here it is in one place, for new Shibes.
If you want to make a Dogecoin directory in your downloads folder to keep things organized, you will need to modify these commands to refelct the change. So instead of going to ~/Downloads/ you will need to go to ~/Downloads/Dogecoin and be sure to put the zipped files there when you download them, but the commands will be the same otherwise.
cwayne18 put in the work to make a PPA for the QT client here.
Ubunutu/Mint/Debian users should be able to install the client with the following commands:
sudo add-apt-repository ppa:cwayne18/doge sudo apt-get update && sudo apt-get install dogecoin-qt 
To update using this method, run
sudo apt-get update && sudo apt-get upgrade dogecoin-qt 
Compiling the Wallet Manually
I suggest using the PPA above, but if you want to compile manually, here you go.
1)Download the newest source from here. If you want to check out the Github page, click here
2)Unzip the package with the native client OR, navigate to your downloads and unzip
cd ~/Downloads unzip dogecoin-master.zip 
3)Now it's time to compile. You will need to install the dependencies, just copy and paste the following code. It will be a fairly large download and could take some time. It is always important to update before installing any new software, so we'll do that first and then install the dependencies.
sudo apt-get update sudo apt-get upgrade sudo apt-get install libssl-dev libdb-dev libdb++-dev libqrencode-dev qt4-qmake libqtgui4 libqt4-dev sudo apt-get install libminiupnpc-dev libminiupnpc8 libboost-all-dev build-essential git libboost1.53-all-dev 
4)Once that is done, go to the doge-coin master directory and compile:
cd ~/Downloads/dogecoin-maste sed -i 's/-mgw46-mt-sd-1_53//g' dogecoin-qt.pro qmake USE_UPNP=- USE_QRCODE=0 USE_IPV6=0 make -j3 
After running the qmake command you will likely see some text similar to
Project MESSAGE: Building without UPNP support Project MESSAGE: Building with UPNP supportRemoved plural forms as the target language has less forms. If this sounds wrong, possibly the target language is not set or recognized. 
It's perfectly normal, so don't worry about that.
Your Dogewallet is ready to go! The executable is in ~/Downloads/dogecoin-maste and called dogecoin-qt. Your wallet information is in ~/.dogecoin. You can run the wallet at any time by opening terminal and typing
cd ~/Downloads/dogecoin-maste ./dogecoin-qt 
Future upgrades to dogewallet are easy. Back up your wallet.dat, and simply follow the same directions above, but you'll be unzipping and building the newer version. You will likely need to rename the old dogecoin-master directory in ~/Downloads before unzipping the newest version and building. Also, it is likely that you will not need to install the dependencies again.
Alternate Method For Installing Dogecoin Wallet from Nicebreakfast
After installing the dependencies listed in step 3, open terminal, then navigate to where you want Dogecoin Wallet stored and run:
git clone https://github.com/dogecoin/dogecoin ./autogen.sh ./configure make 
then when the wallet is updated just run
git pull 
from the dogecoin directory.
GPU Mining
GPU mining requires CGminer. My suggestion is to get the executable already built. The creator of cgminer has removed the built file from his website, but I've uploaded it here
sudo apt-get install pkg-config opencl-dev libcurl4-openssl-dev autoconf libtool automake m4 ncurses-dev cd ~/Downloads tar -xvf cgminer-3.7.2-x86_64-built.tar.bz2 
Don't use anything newer than 3.7.2. The newer versions of CGMiner don't support GPU mining.
That's it! You have cgminer ready to go! You will run cgminer with the following syntax
cd ~/Downloads/cgminer-3.7.2-x86_64-built/ ./cgminer --scrypt -o stratum+tcp://SERVERNAME:PORT -u WORKER.ID -p PASS 
A good guide for fine tuning cgminer can be found here; follow the litecoin example.
EDIT
I had trouble getting cgminer running with a single line command, but running it via an executable .sh file works. This is covered in the cgminer setup guide I posted above but I'll put it here too. In the same directory that has the cgminer executable, you need to make a file called cgminer.sh and make it executable. It should contain the follwing:
export GPU_USE_SYNC_OBJECTS=1 export GPU_MAX_ALLOC_PERCENT=100 export DISPLAY=:0 find *.bin -delete sleep 5 ./cgminer 
Then you can call cgminer in terminal by doing ./cgminer.sh You will need a cgminer.conf file containing all your options. All of this is covered in the guide that is linked above.
A quick note about AMD drivers: They used to be a huge PITA to install and get working, but the newest Catalyst drivers are great. There's a GUI installer, everything works out of the box, and there is a lot of documentation. You can download them here: AMD Catalyst 14.6 Beta Linux
CPU Mining
For CPU mining I use minerd because it doesn't require any work to get running, simply download it and get to work. Download the built file for your machine 32-bit or 64-bit, and then unzip it and you're ready to go!
cd ~/Downloads tar -xvf pooler-cpuminer-2.3.2-linux-x86.tar.gz 
The executable is called minerd and it will be in ~/Downloads but you can move it to wherever you like. To run it, pull up terminal and do
cd ~/Downloads minerd --url=stratum+tcp://SERVER:PORT --userpass=USERNAME.WORKERNAME:WORKERPASSWORD 
You're done! Happy mining!
Common Issues
I ran into this and I've seen others with this problem as well. Everything installs fine but there is a shared library file that isn't where it should be. In fact, it isn't there at all.
 libudev.so.1: cannot open shared object file: No such file or directory 
In terminal, do
sudo updatedb locate libudev.so.0.13.0 
And it will probably return a path /lib/x86_64-linux-gnu. Inside that directory there's a library file called libudev.so.0.13.0. You'll need to make a symlink (aka shortcut) that links libudev.so.1 to libudev.so.0.13.0 So, assuming you're working with libudev.so.0.13.0 do this
cd /lib/x86_64-linux-gnu sudo ln -s libudev.so.0.13.0 libudev.so.1 
Now if you do
ln -l 
You should see
libudev.so.1 -> ./libudev.so.0.13.0 
Meaning you've made the symlink. Also, the text for libudev.so.1 will be blue.
submitted by Boozybrain to dogecoin [link] [comments]

Mega FAQ (Or: Please come here for your questions first)

Qbundle Guide (Step by step setup & Bootstrap) https://burstwiki.org/wiki/QBundle
1( I want to mine or activate My account. Where do find the multiple coins?
You only need 1, an outgoing transaction or reward reassignment will set the public key. Get them from:
https://www.reddit.com/burstcoinmining/comments/7q8zve/initial_burstcoin_requests/
Or (Faucet list)
https://faucet.burstpay.net/ (if this is empty, come back later)
http://faucet.burst-coin.es
Or
https://forums.getburst.net/c/new-members-introductions/getting-started-initial-burstcoin-requests
2( I bought coins on Bittrex and want to move to my new wallet, but can't. Why?
Bittrex will only send to accounts with a public key (not a Burst requirement) so see number 1 and either set the name on the account (IF you will not mine) or set the reward recipient to the pool. Either action will enable the account and allow for transfers from Bittrex.
3( I sent coins from Poloniex/anywhere to Bittrex and they don’t show up after a considerable time. Why?
You need to set an unencrypted message on the transaction, informing Bittrex which account to send the funds to (this is in the directions on Bittrex). Did you do this? Contact Bittrex support with all the details and eventually you will get your funds.
4( How much can I make on Burst?
https://explore.burst.cryptoguru.org/tool/calculate
Gives you an average over time assuming a few things like: Average luck/100% uptime/no overlapping/fees on pool/good plot scan time (<20 seconds) if you do not have all of these, you may not see that number.
5( If I use SSD’s would I make more money?
No, it’s 95% capacity and 5% scan time that determine success. More plot area = better deadlines = better chance of forging a block, or better rates from a pool.
6( What is ‘solo’ and ‘pool’ (wasn’t his name Chewbacca?)
Solo is where you attempt to ‘forge’ (mine) a block by yourself; you get 100% of the block reward and fees. But you only receive funds if you forge, no burst for coming in second place.
Pools allow a group of miners to ‘pool’ together their resources and when a miner wins, they give the pool the winnings (this is done by the reward assignment you completed earlier), it is then divided according to different percentages and methods and burst is sent out according to pool rules (minimum pay-out, time, etc.)
7( I have been mining for 2 days and my wallet doesn’t show any Burst WHY?
Mining solo: it is win-or-lose, nothing in between, and wining is luck and plot size. Pool mining: because it costs 1 burst to send burst, the pools have either a time requirement (every X days) or a minimum amount (100 burst +) so you need to research your pool. Some pools allow for you to set the limit (cryptoGuru and similar) to be met before sending
8( How do I see what I have pending?
On CryptoGuru, based pools, it’s the ‘Pending (burst)’ column, other pools, look for the numbers next to your burst ID. One is Paid and the other pending.
9( I’m part of a pool and I forged a block, but I didn’t recieve the total value of the block, why?
A pool has 2 basic numbers that denote the pay-out method, in the format ‘XX-XX’ (i.e. 50-50) The first number is the % paid to the block forger (miner) and the second is the retained value, which is paid to historic ‘shares’ (or, past blocks that the pool didn’t win, but had a miner that was ‘close’ to winning with a good submitted deadline)
Examples of pools:
0-100 (good for <40TB)
20-80 (30-80TB)
50-50 (60-200TB)
80-20 (150-250)
100-0 (solo mine, 150+ TB)
Please note that there is an overlap as this is personal preference and just guidance; a higher historical share value means a smoother pay-out regime, which some people prefer. If fees are not factored in, or are the same on different pools, the pay-out value will be the same over a long enough period.
10( Is XXX model of hard drive good? Which one do you recommend?
CHEAP is best. If you have 2 new hard drives, both covered by warranty, get the one with the lowest cost per TB (expressed as $/TB , calculated by dividing the cost by the number of terabytes) because plot size is KING,
11( How many drives can I have on my machine?
For best performance, you can have up to 2 drives per thread (3 on a new fast AVX2 CPU). So that quad-core core-2-quad can have up to 8 drives, but a more modern i7 with 4 cores + hyper threading can squeeze 8 * 3 or 24 drives. (Performance while scanning will suffer)
12( Can I game while I mine?
Some people have done so, but you cannot have the ‘maximum’ number of drives and play games generally.
13( Can I mine Burst and GPU mine other coins?
Yes, if you CPU Mine Burst.
14( I’m GPU plotting Burst and GPU mining another coin, my plots are being corrupted, why?
My advice is dedicating a GPU to either mining or plotting, don’t try to do both.
15( What is a ‘plot’?
A plot is a file that contains Hashes, these hashes are used to mine burst. A plot is tied to an account, but they can be created (with the same account ID) on other machines and connected back to your miner(s).
16( Where can I trade/buy/sell Burst?
A list of exchanges is maintained on https://www.reddit.com/burstcoin/ (on the right, ‘Exchanges’ tab) the biggest at the moment are Bittrex and Poloniex, some offer direct Fiat-to-Burst purchase (https://indacoin.com for example)
17( Do I have to store my Burst off the exchange?
No, but it’s safer from hackers who target exchanges, if you cannot guarantee the safety or security of your home computer from Trojans etc, then it might be best to leave on an exchange (but enable 2FA security on your account PLEASE!)
18( What security measures can I take to keep my coin safe?
When you create an account, sign out and back in to your wallet (to make sure you have copied the pass phrase correctly) and keep multiple copies of the key (at least one physically printed or written down and in a safe place, better in 2 places) do not disclose the passphrase to anyone. Finally use either a local wallet or a trusted web wallet (please research before using any web wallet)
19( How can I help Burst?
Run a wallet, which will act as a node (or if you’re a programmer, contact the Dev team Bring attention to burst (without ‘shilling’ or trying to get people to buy) And help translate into your local language
Be a productive member of the community and contribute experience and knowledge if you can, or help others get into Burst.
20( Will I get coins on the fork(s) and where will they be?
There will be no new coin, and no new coins to be given/air dropped etc, the forks are upgrades to burst and there will not be a ‘classic’ or ‘new’ burst.
21( Will I need to move my Burst off of the exchange for the fork?
No, your transactions are on the block chain, which will be used on the fork, they will be visible after the move; nothing will need to be done on your side.
22( Where can I read about the progress of Burst and news in general on the community?
There is no finer place than https://www.burstcoin.ist/
23( What are the communities for Burst and the central website?
Main website: https://www.burst-coin.org/
Reddit: https://www.reddit.com/burstcoin and https://www.reddit.com/burstcoinmining/
Burstforum.net: https://www.burstforum.net/
Getburst forum: https://forums.getburst.net/
Official Facebook channel: https://m.facebook.com/groups/398967360565392
(these are the forums that are known to be supporting the current Dev Team)
Other ways to talk to the community:
Discord: https://discordapp.com/invite/RPhpjVv
Telegram (General): https://t.me/burstcoin
Telegram (Mining): https://t.me/BurstCoinMining
24( When will Burst partner up with a company?
Burst is a currency, the USD does not ‘partner up’ with a company, the DEV team will not partner up and give over to special interests.
25( Why is the DEV team anonymous?
They prefer anonymity, as it allows them to work without constant scrutiny and questions unless they wish to engage, plus the aim is for Burst to become a major contender, and this brings issues with security. They will work and produce results, they owe you nothing and if you cannot see the vision they provide then please do not ‘invest’ for short term gain.
26( When moon/Lambo/$100/make me rich?
My crystal ball is still broken, come back to the FAQ later for answer (seriously, this is a coin to hold, if you want to day-trade, good luck to you)
27( How can I better educate myself and learn about Dymaxion?
Read about the Dymaxion here: https://www.reddit.com/burstcoin/wiki/dymaxion
28( My reads are slow, why?
There are many reasons for this, if your computer has a decent spec it’s likely due to USB3 hub issues, or plugging into a USB2 hub, but other reasons can be multiple plots in the same folder, but it’s best to visit the mining subreddit. They can help more than an simple FAQ https://www.reddit.com/burstcoinmining/
29( I have a great idea for Burst (not proof of stake related)?
Awesome! Please discuss with the DEV team on discord https://discordapp.com/invite/RPhpjVv
(Please be aware that this is a public forum, you need to find who to ask/tell)
30( I have a great idea for Burst (Proof of stake related)?
No. if you want a POS, find a POS coin. On the tangle which is being implemented a POS/POW/POC coin can be created, but BURST will always be POC mined. You are welcome to implement a proof of stake coin on this!
31( Will the Dev team burn any coins?
Burst is not an ICO, so any coins will need to be bought to be burnt. You are welcome to donate, but the DEV team have no intention of burning any coins, or increasing the coin cap.
32( When will there be an IOS wallet?
IOS wallet is completed; we are waiting for it to go on the app store. Apple is the delaying factor.
33( Why do overlapping plots matter?
Plots are like collections of lottery tickets (and if only one ticket could win). Having 2 copies is not useful, and it means that you have less coverage of ‘all’ the possible numbers. It’s not good, avoid.
34( My local wallet used to run, I synchronised it before and now it says ‘stopped’. when I start it, it stops after a few seconds, what should I do?
I suggest that you change the database type to portable MariaDB (on Qbundle, at the top, ‘Database’ select, ‘change database’) and then re-import the database from scratch (see 35)
35( Synchronising the block chain is slow and I have the patience of a goldfish. What can I do?
On Qbundle , ‘Database’ select ‘Bootstrap chain’ and make sure the CryptoGuru repository is selected, then ‘start Import’ this will download and quickly stuff the local database (I suggest Portable MariaDB, see 34) (lol, loop)
36( What will the block reward be next month/will the block rewards run out in 6 months?
https://www.ecomine.earth/burstblockreward/ Rewards will carry on into 2026, but transaction fees will be a bigger % by then, and so profitable mining will continue.
37( How can I get started with Burst (wallet/mining/everything) and I need it in a video
https://www.youtube.com/watch?v=LJLhw37Lh_8 Watch and be enlightened.
38( Can I mine on multiple machines with the same account?
Yes, if you want to pool mine this can be done (but be prepared for small issues like reported size being incorrect. Just be sure to keep question 33 in mind.)
39( Why do some of my drives take forever to plot?
Most likely they are SMR drives, it’s best to plot onto another SSD and then move the finished plot/part of a plot across to the SMR drive as this is much quicker. SMR drives are fine on the read, just random writes that are terrible.
So plot an SMR drive quickly, plot to a non SMR or better still SSD drive, in as big a chunk as possible (fewer files better) and move. a version of Xplotter, called Splotter, can do this easily.
https://github.com/NoParamedic/SPlotter
40( I have a great idea; why not get listed on more exchanges!!
Exchanges list coins because of 2 reasons:
  1. Clients email and REQUESTING Burst and provide details like:
    i. https://www.burst-coin.org/information-for-exchanges
  2. The coin pays (often A LOT, seriously we’ve been asked for 50 BTC)
I suggest you speak with your exchange and ask ‘when will they offer Burst?’
41( Do you have a roadmap?
https://www.burst-coin.org/roadmap
42( Why is the price of Burst going up/down/sideways/looping through time?
The price of burst is still quite dependent upon Bitcoin, meaning that if Bitcoin gains, the value of Burst gains, if Bitcoin drops then Burst also drops. If there is news for Burst then we will see something independent of Bitcoin moving. Variations can be because of people buying in bulk or selling in bulk. There are also ‘pump and dump’ schemes that we detest, that can cause spikes in price that have nothing to do with news or Bitcoin, just sad people taking advantage of others.
43( Where is the best place to go with my mining questions?
https://www.reddit.com/burstcoinmining/
or https://t.me/BurstCoinMining
44( What hardware do you advise me to buy, is this computer good?
See question 43 for specific questions on hardware, it depends on so many variables. The ‘best’ in my opinion is a 36 bay Supermicro storage server, usually they have dual 6-core CPU’s and space for 36 drives. No USB cables, plotting and mining monster, anything else, DYOR.
45( Where do you buy your hard drives?
I have bought most from EBay in job lots, and some refurbished drives with short warranties. Everything else I have bought, from Amazon.
46( Can I mine on my Google drive/cloud based storage?
In short: no. If you want to try, and get to maybe 1 TB and then find that your local connection isn’t fast enough, or that shortly after, your account is blocked for various reasons. Please be my guest.
47( Can I mine on my NAS?
Some you can mine with the NAS (if it can run the miner, it can scan locally) but generally they’re not very fast. good for maybe 16 TB? Having a plot on a NAS and mining from another computer depends on the network speed between the NAS and scanning computer. I believe you can scan about 8 TB (maybe a bit more) and keep the scan times to within acceptable, but YMMV.
48( How can I set up a node?
No need to set up a node, just set up a wallet (version 2.0.4) or Qbundle (2.2) and it will do the rest
49( Are the passphrases secured?
I’ll leave the effort to a few people to show how secure a 12-word passphrase is: https://burstforum.net/topic/4766/the-canary-burst-early-warning-system Key point: brute forcing it will be around 13,537,856,339,904,134,474,012,675,034 years.
50( I logged into my account (maybe with a different burst ID) and see no balance!!
I have dealt with this very issue multiple times, and there are only 3 options:
  1. You have typed in the password incorrectly
  2. You have copy-pasted the password incorrectly
  3. You are trying to log into a ‘local wallet’ which the block chain has not finished updating
The last one generally leaves the burst ID the same, but old balances will show. No, this is not a security problem, and yes, windows loves to add spaces after the phrase you enter when copied, and that space is important in getting to your account.
51( Are there channels for my language?
Telegram:
Spanish: https://t.me/burstcoin_es
German: https://t.me/Burstcoinde
Italian: https://t.me/BurstCoinItalia
Forum:
Spanish: https://burst-coin.es/index.php/forum/index
Discord:
Spanish: https://discordapp.com/invite/RaaGna9
Bulgarian: https://discord.gg/r4uzTd
(there are others, please contact me to put up)
52( I am mining in a pool, and it says that my effective capacity is lower than I actually have, why?
  1. If you've not been mining for >48 hours, or just added additional capacity, it will take time.
  2. The value fluctuates (normally, +-5% but can be up to 10% at times)
  3. Read on the ‘Quick info’ tab about adjusting your deadline to compensate for changes i. revisit once a month for best results
  4. If you have overlapping plots it will also be lower so be aware of this (see question 33)
53( What pool should I join?
First of all, read question 9, after you have understood that it depends on the size (and how patient you are) select from the following list: https://www.ecomine.earth/burstpools/
54( What miner to use?
I use Blago’s miner, there are many out there but Blago’s works for me on CPU mining, it can be found in Qbundle.
55( What Wallet to use (I use windows)?
Qbundle: https://github.com/PoC-Consortium/Qbundle/releases/ guide: https://burstwiki.org/wiki/QBundle
56( What Wallet to use (Linux)?
https://package.cryptoguru.org/ for Debian and Ubuntu, for Mac. read:
https://www.ecomine.earth/macoswalletinstallguide/
57( Will i need to 'replot' after POC2 (second fork) happens?
No, there will be a tool which will optimise, but it is not CPU intensive (it basically re-shuffles your plot) and is just IO intensive. You do not need to replot.
TurboPlotter and https://github.com/PoC-Consortium/Utilities/tree/mastepoc1to2.pl are tools that will/can be used to actuate optimization, but PLEASE wait with optimization until after the hard fork.
58( Will the transaction fee always be 1 burst?
No, dynamic fees are coming in the next fork.
submitted by dan_dares to burstcoin [link] [comments]

Monero Subreddit Stats from last year.

Submissions Comments
Total 994 49530
Rate (per day) 2.73 135.74
Unique Redditors 582 8080
Combined Score 161184 231580

Top Submitters' Top Submissions

  1. 5300 points, 33 submissions: dEBRUYNE_1
    1. Monero GUI 0.12.0.0 "Lithium Luna" Megathread - Download links, instructions for upgrading, guide on how to get started, and guides to resolve common issues (missing a transaction / zero balance, freezing / buggy GUI, transaction stuck as pending, and GUI using all bandwidth) (386 points, 833 comments)
    2. [Reminder] monero is not the appropriate place to discuss the BTC/BCH debate (319 points, 73 comments)
    3. General information regarding the upcoming scheduled network upgrade and a call for community action (305 points, 223 comments)
    4. GUI v0.12.2.0 released! (299 points, 243 comments)
    5. Announcement - Proof-of-Work tweak and a note on key reuse (295 points, 250 comments)
    6. GUI v0.12.3.0 (with direct Ledger support) released! (280 points, 386 comments)
    7. Bitfinex reduces Monero withdrawal fees from 0.04 to 0.0001 XMR! (272 points, 9 comments)
    8. Poloniex also reduces Monero withdrawal fees to 0.0001 XMR! (220 points, 17 comments)
    9. Preliminary information thread regarding the scheduled protocol upgrade of October 18 (214 points, 208 comments)
    10. CLI v0.12.3.0 released! (195 points, 78 comments)
  2. 4228 points, 24 submissions: OsrsNeedsF2P
    1. Saying you don't need privacy because you have nothing to hide is like saying you don't need free speech because you have nothing to say. It's a right to everyone - It's a right to you, me, and even Mark Zuckerberg. (581 points, 138 comments)
    2. The official Fortnite Merch Store is accepting exclusively Monero as a cryptocurrency payment option... (445 points, 80 comments)
    3. Can we stop being assholes to newbies? (359 points, 94 comments)
    4. With all this Monero "is less untraceable than previously thought" FUD, let's all remember that huge fucking bounty of $$$ for anyone who can trace the origin of one of the devs transactions.. (343 points, 131 comments)
    5. Ever wanted to know how Monero is still around today? Well now you don't have to! This post has it all =D (297 points, 66 comments)
    6. Coinmarketcap shows Freewallet as a Monero wallet. Guys, whatever you do.. Don't use Freewallet. It's a scam. (286 points, 93 comments)
    7. SEC wants decentralized exchange creators to register as exchanges. Lol (182 points, 111 comments)
    8. "Please do your part in demanding exchanges to lower their XMR withdraw fee. I am submitting a complaint to Coinex who currently charge 0.04 XMR" - [x-post from /xmrtrader] (169 points, 43 comments)
    9. Can we get some appreciation for the people who maintain the Monero packages on Arch Linux? There are so many available, and every single one I've checked either make the package from source or validate the checksum. Amazing work <3 (156 points, 19 comments)
    10. [WARNING] DROPIL recently made a post announcing support for Monero. MOVE YOUR FUNDS if you used them!!! (119 points, 5 comments)
  3. 3954 points, 13 submissions: KnifeOfPi2
    1. Did John McAfee just sell all of his Monero?? (1277 points, 107 comments)
    2. We need to stop thinking about Monero as a “privacy coin.” (511 points, 200 comments)
    3. Selsta and I just completed the first Ledger-to-Ledger mainnet transactions ever. He sent me 0.1 XMR and I sent 0.4 XMR back. (482 points, 103 comments)
    4. Monero network hashrate just hit 1GH/s! (463 points, 166 comments)
    5. An upcoming Monero project: Render the entire blockchain. Here's a selection of blocks that we've done so far, in an early stage. (224 points, 31 comments)
    6. In Stunning Move, Bitmain Announces It's Launching A Doorstopper Business (193 points, 48 comments)
    7. Another red flag for X Wallet: The source code is incomplete. (190 points, 63 comments)
    8. MONERO IS DEAD! LONG LIVE MONERO! (155 points, 25 comments)
    9. Lithium Luna GUI released! (118 points, 66 comments)
    10. Cake Wallet - introducing Zendesk support! (100 points, 13 comments)
  4. 2421 points, 22 submissions: SamsungGalaxyPlayer
    1. Kasisto POS in 22 seconds (366 points, 76 comments)
    2. "Kudelski Security completed their [bulletproof] report. They found only a few minor issues that are trivial to correct, and no major issues." Overall, a huge win for Monero, bulletproofs, and privacy. Full report will be published soon. (338 points, 100 comments)
    3. Network upgrade scheduled for block 1544555 on 28 March (210 points, 56 comments)
    4. Fungibility is determined by the LOWEST common denominator of privacy, NOT the highest. Monero absolutely excels here. (103 points, 37 comments)
    5. [Discussion] Move to a Fixed Ringsize (102 points, 85 comments)
    6. The Monero Malware Response workgroup website is up! Direct people whose machines have been compromised here! (101 points, 22 comments)
    7. MoneroV: A Trap Laid for Monero Users? (93 points, 45 comments)
    8. Want to get the GUI point release faster? Help translate! (91 points, 18 comments)
    9. Introducing the Breaking Monero Series! (86 points, 26 comments)
    10. ShapeShift is moving to a membership model and will require personal information soon (83 points, 86 comments)
  5. 2295 points, 16 submissions: pinkphloid
    1. Cake Wallet - OPEN SOURCE - Here it is! (383 points, 167 comments)
    2. Our Monero wallet called CAKEWALLET for iOS is live! Please check the link to the Apple App Store below. (347 points, 379 comments)
    3. [MANDATORY UPDATE] Cake Wallet Version 3.0.9 - Network Upgrade Ready! (227 points, 19 comments)
    4. [UPDATE] Cake Wallet version 3.1.4, now with XMR.TO for exchanging XMR to BTC! (133 points, 15 comments)
    5. Cake Wallet - 10,000 unique downloads! (132 points, 29 comments)
    6. Thank for the positive feedback on Cake Wallet! (127 points, 62 comments)
    7. The new Cake Wallet Update version 3.0.1 is out now! (120 points, 50 comments)
    8. [UPDATE] CAKE WALLET 3.1.1 with Monero v0.13.0.4 and other stuff (118 points, 32 comments)
    9. Cake Wallet - UPDATE! (108 points, 75 comments)
    10. CAKE WALLET - new version live now with NEW FEATURES! (102 points, 97 comments)
  6. 2042 points, 16 submissions: Rehrar
    1. Core Team Announcement (344 points, 45 comments)
    2. Project FOSS (212 points, 37 comments)
    3. Write down your seed (200 points, 93 comments)
    4. Bulletproof audit needs some more funding. Details in the comments. (170 points, 55 comments)
    5. Extremely thorough introduction to Monero by cypherperro. Take a look. (122 points, 18 comments)
    6. Defcon Monero Village Update and Summary (116 points, 22 comments)
    7. MRL Bulletproof audit FFS request (115 points, 30 comments)
    8. I, rehrar,went on a YouTube show to talk about Morono (113 points, 28 comments)
    9. Fund the fundings! (107 points, 16 comments)
    10. The anonimal appreciation thread! (107 points, 21 comments)
  7. 1978 points, 15 submissions: Vespco
    1. Edward Snowden on Bitcoin Interview 2018 (at 50 minutes, he says that a traceable public ledger is a bigger problem then scalability) (362 points, 88 comments)
    2. Putting this on my invoices seems like a good way for me to promote Monero, give my customers a discount, & help me acquire more Monero. (325 points, 101 comments)
    3. It's fun to be a part of the Monero economy! (179 points, 26 comments)
    4. Honest Government Ad | Anti Encryption Law (178 points, 32 comments)
    5. Jeez, not much real conversation in here. Just junky news links. (129 points, 76 comments)
    6. The New York State Department of Financial Services just approved the trading of privacy-protecting cryptocurrency. | Coin Center (124 points, 11 comments)
    7. A good way to explain the importance of fungibility to the laymen: Bitcoin Roulette (99 points, 45 comments)
    8. Why I love Botnet & Browser Mining. (86 points, 39 comments)
    9. This needs more praise & attention: An Open Source, Client Side JS implementation that makes monero multisig fairly easy. Github link in comments. (82 points, 14 comments)
    10. Could we get even more cryptographers researching for Monero? (77 points, 31 comments)
  8. 1846 points, 14 submissions: SarangNoether
    1. Bulletproofs: let's raise some funds! (295 points, 94 comments)
    2. January monthly report from Sarang Noether (237 points, 39 comments)
    3. Bulletproofs: The Paper Strikes Back (153 points, 32 comments)
    4. July monthly report from Sarang Noether (142 points, 20 comments)
    5. March monthly report from Sarang Noether (129 points, 22 comments)
    6. August monthly report from Sarang Noether (122 points, 33 comments)
    7. February monthly report from Sarang Noether (119 points, 27 comments)
    8. Sarang is up for three more months! (107 points, 30 comments)
    9. October monthly report from Sarang Noether (102 points, 26 comments)
    10. September monthly report from Sarang Noether (99 points, 25 comments)
  9. 1470 points, 4 submissions: TheFuzzStone
    1. "I do not have any Bitcoin" (1182 points, 96 comments)
    2. Fluffypony at Consensus 2018 (134 points, 33 comments)
    3. Time for Monero "killers"! :-) (91 points, 34 comments)
    4. XMR.RU-report (March) (63 points, 14 comments)
  10. 1468 points, 5 submissions: philkode
    1. Overstock.com accepting Monero (and ETH, BCH, LTC, DASH) (499 points, 36 comments)
    2. Happy 4th Birthday Monero! 🎂🎉🎁 (455 points, 62 comments)
    3. Monero has been added to Debian unstable repo as of yesterday. (321 points, 52 comments)
    4. “Unhackable” BitFi wallet just got hacked (xpost /cryptocurrency) (130 points, 41 comments)
    5. X Wallet to App Store (Soon™) (63 points, 67 comments)

Top Commenters

  1. dEBRUYNE_1 (3762 points, 1243 comments)
  2. KnifeOfPi2 (3311 points, 347 comments)
  3. OsrsNeedsF2P (3189 points, 505 comments)
  4. fluffyponyza (3027 points, 272 comments)
  5. gingeropolous (2554 points, 320 comments)
  6. cryptochangements34 (2522 points, 261 comments)
  7. SarangNoether (2269 points, 185 comments)
  8. SamsungGalaxyPlayer (2108 points, 221 comments)
  9. john_alan (1993 points, 218 comments)
  10. smooth_xmr (1944 points, 279 comments)

Top Submissions

  1. Did John McAfee just sell all of his Monero?? by KnifeOfPi2 (1277 points, 107 comments)
  2. Paypal shares your personal data with over 600 companies! That's why we need Monero! by 0xf3e (1184 points, 146 comments)
  3. "I do not have any Bitcoin" by TheFuzzStone (1182 points, 96 comments)
  4. Found In Warsaw - Don't Buy Monero: Cryptocurrencies harm the banking system and can weaken the government by SecretApe (1114 points, 110 comments)
  5. Monero transactions are about to get 80% cheaper and faster. by WillMTB (1056 points, 120 comments)
  6. Bye bye ASICs by Swericor (874 points, 380 comments)
  7. Upvote if you would like to see @fluffyponyza as a guest on Joe Rogan Podcast by xmr_karnal (840 points, 44 comments)
  8. All right, my cat had kittens and I just realised one of them has Monero-like logo on its head 😂😂 by JNKO266 (817 points, 79 comments)
  9. Credit, where credit is due! by Experts-say (796 points, 53 comments)
  10. Yesterday I thought it might be fun to create some vintage crypto posters for a handful of coins. This was the first one I came up with. Bonus points if you spot similarities from an old movie by Beemoe4 (722 points, 67 comments)

Top Comments

  1. 495 points: mr670wl's comment in Found In Warsaw - Don't Buy Monero: Cryptocurrencies harm the banking system and can weaken the government
  2. 474 points: kieranc001's comment in Monero Zero looks like a scam, can you please confirm?
  3. 380 points: deleted's comment in Found In Warsaw - Don't Buy Monero: Cryptocurrencies harm the banking system and can weaken the government
  4. 356 points: deleted's comment in Ledger Hardware Wallet - Monero integration : some news #6
  5. 331 points: last_of_the_romans's comment in Monero transactions are about to get 80% cheaper and faster.
  6. 323 points: svenroy777's comment in "I do not have any Bitcoin"
  7. 311 points: deleted's comment in Did John McAfee just sell all of his Monero??
  8. 255 points: KnifeOfPi2's comment in Monero transactions are about to get 80% cheaper and faster.
  9. 237 points: live9free1or1die's comment in Banning privacy coins because of terrorism/drugs/laundering is like banning people from being allowed to have sex in privacy because pedophiles also like privacy.
  10. 203 points: fluffyponyza's comment in Botnets are Ruining the Integrity of the Monero Network
Generated with BBoe's Subreddit Stats (Donate)
Inspired by a post I found on /Pivx by turtleflax.
submitted by OsrsNeedsF2P to Monero [link] [comments]

Anatomy of crypto data destruction and RNG

Ever since the post-credits scene in season 2, I've been thinking about how the stage 1 "payload" that encrypted all of the E-Corp systems might have been built, and how it might be flawed enough to permit data recovery. No sci-fi time-travel magic required for this theory.
We never get a direct look at the malware, but we do get a smattering of references to what it is throughout the episodes so far. Not enough to get a totally clear picture, but it's somewhere to start with educated guesses.
In S01E01, Mr. Robot is explicit about the aims:
If we hit their data center just right, we could systematically format all the servers, including backup. It would be impossible to enforce outdated paper records. It would all be gone.
Okay. They want to irreversibly delete the data on all of E-Corp's servers and backups.
In S01E02, when tasking Elliot with blowing up the Comet electric natural gas plant to take out the tape backups at Steel Mountain, Mr. Robot elaborates:
Once we blow up the pipeline, Darlene's worm will kick into high gear at the US datacenter, which you helped us to install. Thank you very much. The redundant backups at their eastern datacenter in China? The dark army is covering us on that.
Okay, we've learned the way they'll do it is with a worm, which Darlene wrote. A worm is malware that is designed to replicate itself and carry a payload.
In S01E08, after successfully entering the work order to remove the honeypot around CS30, Elliot states:
In 43 hours, exactly, our server will no longer be a honeypot, and that rootkit you wrote will take down Evil Corp. We did it Darlene. It's going to happen.
Despite what Lloyd might have said, rootkits are not serial rapists with very big dicks. They're malicious code designed to hide the presence of an attacker (inc. processes they might be running, alterations to system login and authentication modes to accept a backdoor credential) and their tools on a system once it has been compromised. Unqualified, the term "rootkit" commonly refers to kernel-mode rootkits, which operate directly within the context of the operating system, and frequently loaded through the same facilities provided for installing new device drivers. They can hide files/directories, running processes, network connections, and themselves (e.g. in the list of loaded drivers) from scanning entities on the same system. One way to detect a rootkit is to look for discrepancies between what tools on the system report (e.g. in terms of active network connections) versus what is observed externally (e.g. on a network monitoring device).
That makes the discussion of "honeypots" a little bit strange. A honeypot usually refers to a target on a network that's designed to be enticing to attackers, so that they try to hack it, but isn't "real" in the sense that it processes real data. It might be instrumented such that probing and reconnaissance activities targeting the honeypot are tied to network hacking alerts.
I can think of one of three interpretations of what turning server cs30 into a honeypot might mean:
  1. They've installed additional monitoring software on cs30.
  2. They've replaced cs30 with a totally different system that looks like cs30 to an outsider.
  3. They've installed additional network monitoring around cs30.
But none of these interpretations really make sense. If it's #1, if the rootkit was written properly, it's likely that additional monitoring would be fruitless, and the attack could be carried out without the whole Whiterose meeting riddles.
If it's #2, then the rootkit would probably not have been copied over to the clone, and fscociety would have noticed their server misbehaving. Unless, of course, E-Corp discovers the rootkit on cs30 as part of this process, in which case, they could have just cleaned it up, and closed off fsociety access to the internal server.
If it's #3, then the periodic use of the backdoored access to cs30 by fsociety should have been noticed by looking at that network monitoring data, likewise leading to a server cleanup and removal of the backdoor.
I'll chalk this up to somewhat cavalier and imprecise use of technical terminology by a TV show, and press on.
What have we learned so far?
In S01E09, after Tyrell coerces Elliot into showing him the fsociety arcade:
Tyrell: What is it that you're doing exactly?
Elliot: Encrypting all the files. All of Evil-Corp's financial records will be impossible to access. The encryption key will self-delete after the process completes.
Wait a second? Encryption? Encryption key? I thought we were after data deletion.
Of course, there's a perfectly plausible explanation: deleting data takes time. If you go around rm -rf'ing servers, there's a good chance that recoverable data will be scattered around those hosts. By performing bulk encryption, you overwrite all data on the target systems once, can still permit access to everything on the system while the encryption is occurring, and then destroy the key once the encryption process is completed. This lowers the length of the window in which someone can realize that something has gone terribly wrong. The key is small (tens of bytes, not to gigabytes or hundreds of gigabytes), and can be deleted almost instantaneously.
Several full disk encryption systems, including FileVault in macOS, and the now-defunct TrueCrypt have the ability to do this: you start encrypting the drive, but can continue working while the data is read, encrypted, and overwritten unnoticed in the background.
Some ransomware strains also follow this practice, so it's not an unreasonable approach. However, cryptography is a loaded foot cannon for the unwary, and it's surprisingly easy to make a small mistake that unravels the whole thing.
In S01E10, as Elliot looks for Tyrell at the E-Corp building, in voice-over he says:
A simple program: a worm that can make data unreadable. Malware that took Darlene maybe 2 hours to code. Is that all it takes to kill the world?
And follows with:
I wonder what stage they're at. Denial? Muttering to themselves "no, this can be fixed." Maybe bargaining? Forcing their techs to work overtime to try to decrypt our data. Or have they come to the realization yet that Darlene encrypted everything with 256-bit AES, and it would take an incomprehensible amount of time to crack? That all of their data is actually gone, for good.
AES is a symmetric encryption algorithm in wide use. It's stood the test of time since its standardization in 2000, and lots of people trying to find weaknesses in the last 2 decades. At a 256-bit key length, it would take many multiples of lifetimes of the universe to break, at least so long as computers are still made out of atoms. A quantum computer would not meaningfully assist in this kind of attack, as Grover's algorithm would still require 2128 quantum operations, and this is still going to take many multiplies of lifetimes of the universe to break.
But it does raise questions about cryptographic hygiene. Mechanically: what mode of operation is AES being used in to encrypt files? Let's assume Darlene has heard of the ECB penguin and has picked something better like CBC with per-file random initialization vectors.
More importantly: where is that key coming from? The right answer is to read it from a operating system provided cryptographically secure random number generator like /dev/urandom on UNIX-like systems, or the equivalent on Microsoft Windows CryptGenRandom. Ideally, perform this random key generation process individually (resulting in unique keys) on every single target system. There have been cases where CryptGenRandom has produced sub-par quality randomness on earlier versions of Windows, but not since Windows XP SP2 or older.
My theory is that this is where the fsociety worm went wrong.
In S02E01, we see the night of the hack for the first time, and in the terminal we see:
[email protected]:~# ssh -l root bkuw300ps345672-cs30.serverfarm.evil-corp-usa.com [email protected] password: The programs included with the Debian GNU/Linux system are free software; the exact distribution terms for each program are described in the individual files in /usshare/doc/*/copyright. Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law. Last login: Thu May 8 16:26:57 2015 from cs30.serverfarm.evil-corp-usa.com [email protected]:~# cd /opt/2/task/2/fd1nfo/fsociety/hscripts/ [email protected]:/opt/2/task/2/fd1nfo/fsociety/hscripts# ls fuxsocy.py loadmod.py rootkitctrl sniff-out.pcap kernel_modules nuke.py sn1ff worm.py [email protected]:/opt/2/task/2/fd1nfo/fsociety/hscripts# ./fuxsocy.py 
And then:
Executing FuxSocy Loading Source of Entropy ####################### COMPLETE Generating Keys ####################### COMPLETE Locating target files. beginning crypto operations Encrypting /bin Encrypting /boot Encrypting /dev Encrypting /etc 
"Loading Source of Entropy" you say? That sounds awfully like a userspace random number generator. If the entropy pool is too small, or if the random number generation process is otherwise flawed, the key fed into the AES encryption process might be much more predictable than the 256-bit key length would suggest.
There was a major incident of this type discovered in 2006, where the Debian GNU/Linux package maintainers for OpenSSL (a popular, and widely used, though terrible) cryptography library commented out some lines that were generating code safety warnings when packaging it for the Debian distribution. Turns out these lines were essential to introducing any kind of real randomness for uses by the library, and this includes key generation and certain signing operations.
The fallout was that the affected versions of OpenSSL on Debian GNU/Linux would only generate 32,768 or 214 distinct keys. This also affected things like ECDSA signing, which was mirrored in 2013 when a similar vulnerability in Android led to the theft of about 56 Bitcoins.
You would have to know how the flawed key generation was implemented, and it would not necessarily be obvious looking at the keys from the outside, but if there was a flaw of this magnitude, you could break that "256-bit" key almost instantly with e.g. 14-bits of effort.
The use of Debian on the E-Corp servers might be a suggestive hint to this historical fiasco too.
The screen output also suggests that there might have been a single key generated at the start of the process that was copied as part of the data destruction payload to all of the E-Corp servers. Not ideal from a cryptographic hygiene standpoint.
In the post-credits scene of S02E12, Trenton and Mobley discuss:
Trenton: Have you given any more thought to what I said?
Mobley: I don't want to discuss this.
Trenton: Mobley...
Mobley: Fredrick.
Trenton: Seriously, Fredrick, what if we could? This might work.
Mobley: And also, it might not. I've taken enough risks for one lifetime, I don't want to discuss it anymore.
Trenton: But what if we could generate the keys...
Mobley: Tanya... will you just please shut up?
Trenton: What? This is important. We need to talk about it.
...
Trenton: Please, just look at it.
Mobley: Okay, so what? Say I did. Then what?
Trenton: If what I discovered is real, do you know what that means?
Mobley: Yeah, I know exactly what it means.
Trenton: Yeah, it means we could potentially undo this whole thing. Put everything back the way it was.
Mobley: I know. I know.
Trenton: Please. Just look at what I found.
I bet they've looked over the fsociety data destruction payload code and discovered a way to reproduce the key, precisely because there's this kind of flaw in it.
Finally, during Tyrell's AMA, a.k.a. S03E03, we get another shot of stage 1 running:
Thread #7 - 233 hosts online, initiating SCP transfer Waiting on thread updates ... Thread #2 - SCP complete. launched encryption tasks Thread #6 - SCP complete. launched encryption tasks Waiting on thread updates Thread #2 - Encryption tasks completed & verified Updating process log Thread #2 - Obtaining next hosts ... read 256 addresses Waiting on thread updates Thread #6 - SCP complete. launched encryption tasks Waiting on thread updates Thread #2 - Starting tasks on 10.0.0.29/24 
I interpret this as cs30 copying (via SCP) the data destruction payload to every server on the E-Corp network. The 10.0.0.0/8 IP addresses are designated internal network addresses, and are common for large internal business networks. It's odd that E-Corp would have a totally flat network, and also odd that cs30 itself seems to be copying the payload everywhere (not very worm-like), but perhaps this is just artistic license from the VFX guys.
Given how little we see of this screen, and how it was effective at wiping out E-Corp, I think it's safe to assume that the payload being transferred over SCP is both a propagator (i.e. the worm) and a data destruction payload, which would also address it spreading over the entire E-Corp network, even if it isn't flat. It is still suggestive of the single-key possibility though.
So, did Darlene fuck up the crypto? I think so. There's a few more suggestive quotes.
In S01E06, after dropping USB flash drives in the police parking lot for Elliot, the malware is blocked by antivirus.
Elliot: Did you write that exploit yourself?
Darlene: I had an hour.
Elliot: So what? You just pulled code from Rapid9 or some shit? Since when did you become a script kiddie?
Darlene: I repeat: I had an hour.
We learn that Darlene can be sloppy when doing things quickly, and re-iterating Elliot's voice-over in S01E10:
Malware that took Darlene maybe 2 hours to code.
And another off-hand remark in S01E08:
Elliot: How'd it go with the climate control hack?
Darlene: Handled. I happen to be really smart and good at things. Not like you give a shit.
There's a lot of ways that subtle faults in a cryptographic implementation can lead to the entire system coming tumbling down. Darlene might be an expert malware coder, but that's not a universal skill that necessarily translates over to other aspects of information security.
If you're curious about not falling into "bad noob practices" with crypto, there's a great set of cryptography building and breaking challenges that don't require much more than basic algebra, statistics, and coding skills.
Wildly speculating now:
submitted by DrElectolight to MrRobot [link] [comments]

Bitcoin dev IRC meeting in layman's terms (2016-01-14)

Once again my attempt to summarize and explain the weekly bitcoin developer meeting in layman's terms. Link to last summarisation
Disclaimer
Please bear in mind I'm not a developer so some things might be incorrect or plain wrong. There are no decisions being made in these meetings, but since a fair amount of devs are present it's a good representation. Copyright: Public domain

Logs

Main topics

Versionbits

background

BIP 9 Currently softforks have been done by the isSuperMajority mechanism, meaning when 95% of the last 1000 blocks have a version number higher than X the fork is deployed. A new way of doing this is currently being worked on and that uses all bits of the version number, appropriately being called versionbits. So instead of a fork happening when the version is larger than (for example) 00000000011 (3), a fork happens when (for example) the 3rd bit is up (so 00100000011). This way softforks can be deployed simultaneous and independent of each other.

meeting comments

Morcos is volunteering to take over championing this proposal as CodeShark and Rusty are busy on other things. He'll review both implementations and then decide on which implementation he'll base his work upon. He notes that if non-core implementations are trying to do something else (and are using nVersion for their signaling) while segregated witness is being deployed, not conflicting will be important so users of other versions can also support segregated witness. If there's an agreement with this approach it's necessary that versionbits is ready before the segregated witness deployment. jtimon has some suggestions to make the implementation less complicated and more flexible.

meeting conclusion

Morcos will champion the new reference implementation for BIP9: Versionbits.

Status of segregated witness

background

Segregated witness changes the structure of transactions so that the signatures can be separated from the rest of the transactions. This allows for bandwidth savings for relay, pruning of old signatures, softforking all future script changes by introducing script versions and solves all unintentional forms of malleability. During the last scaling bitcoin conference Pieter Wuille presented a way of doing this via a softfork, and proposed increasing the maximum amount of transactions in a block by discounting signature data towards the total blocksize. Segregated witness is part of the capacity increase roadmap for bitcoin-core. More detailed explanations: - By Pieter Wuille at the San Francisco bitcoin developer meetup (more technical) - By Andreas Antonopoulos in the let's talk bitcoin podcast (less technical)

meeting comments

Segnet, the testnet for segregated transactions, will be going to it's 3rd version soon. Luke-Jr has assigned all the segregated witness BIPs to a 14x range. Currently there are 4 BIPs: 141, 142, 143 and 144.

Status of 0.12 bitcoin-core release

background

Bitcoin Core 0.12 is scheduled for release around February and introduces a lot of fixes and improvements. (release notes) There's a release candidate 0.12rc1 available at https://bitcoin.org/bin/bitcoin-core-0.12.0/test/

meeting comments

Luke-Jr feels PR's #7149, #7339 and #7340 should have been in 0.12, but are now really late and possibly impractical to get in. For gitian builders: 0.12rc1's osx sig attach descriptor fails due to a missing package (that's not actually needed). Rather than using the in-tree descriptor, use the one from #7342. This is fixed for rc2. "fundrawtransaction" and "setban" should be added to the release notes. At some point it makes more sense to document these commands elsewhere and link to it in the release notes, as they've become very lengthy. Wumpus thinks the release notes have too much details, they're not meant to be a substitute for documentation.

meeting conclusion

Close PR #7142 as it's now part of #7148 Everyone is free to improve on the release notes, just submit a PR.

consensus code encapsulation (libconsensus)

background

Satoshi wasn't the best programmer out there, which leaves a pretty messy code. Ideally you'd have the part of the code that influences the network consensus separate, but in bitcoin it's all intertwined. Libconsensus is what eventually should become this part. This way people can more easily make changes in the non-consensus part without fear of causing a network fork. This however is a slow and dangerous project of moving lots of code around.

meeting comments

jtimon has 4 libconsensus related PRs open, namely #7091 #7287 #7311 and #7310 He thinks any "big picture branch" will be highly unreadable without merging something like #7310 first. The longest "big picture branch" he currently has is https://github.com/jtimon/bitcoin/commits/libconsensus-f2 He'll document the plan and "big picture" in stages: 1. have something to call libconsensus: expose verifyScript. (Done) 2. put the rest of the consensus critical code, excluding storage in the same building package (see #7091) 3. discuss a complete C API for libconsensus 4. separate it into a sub-repository Wumpus notes he'd like to start with 3 as soon as possible as an API would be good to guide this.

meeting conclusion

review #7091 #7287 #7311 and #7310

Locktime PRs

background

BIP 68 Consensus-enforced transaction replacement signaled via sequence numbers. BIP 112 CHECKSEQUENCEVERIFY. BIP 113 Median time-past as endpoint for lock-time calculations. In short: BIP 68 changes the meaning of the sequence number field to a relative locktime. BIP 112 makes that field accessible to the bitcoin scripting system. BIP 113 enables the usage of GetMedianTimePast (the median of the previous 11 blocks) from the prior block in lock-time transactions.

meeting comments

We need to make a choice between 2 implementations, namely #6312 and #7184. PR #7184 is a result of the CreateNewBlock optimisations not being compatible with #6312. jtimon thinks it could be merged relatively soon as #7184 is based on #6312 which has plenty of testing and review.

meeting conclusion

Close #6312 in favor of #7184. Morcos will fix the open nits on #7184 btcdrak will update the BIP-text

Participants

wumpus Wladimir J. van der Laan btcdrak btcdrak morcos Alex Morcos jtimon Jorge Timón Luke-Jr Luke Dashjr MarcoFalke Marco Falke jonasshnelli Jonas Schnelli cfields Cory Fields sipa Pieter Wuille kanzure Bryan Bishop droark Douglas Roark sdaftuar Suhas Daftuar Diablo-D3 Patrick McFarland 

Comic relief

19:54 wumpus #meetingstop 19:54 wumpus #stopmeeting 19:54 btcdrak haha 19:54 MarcoFalke #closemeeting 19:54 wumpus #endmeeting 19:54 lightningbot` Meeting ended Thu Jan 14 19:54:26 2016 UTC. Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4) 
submitted by G1lius to Bitcoin [link] [comments]

Subreddit Stats: Monero top posts from 2018-01-03 to 2019-01-02 13:47 PDT

Period: 364.01 days
Submissions Comments
Total 994 49530
Rate (per day) 2.73 135.74
Unique Redditors 582 8080
Combined Score 161184 231580

Top Submitters' Top Submissions

  1. 5300 points, 33 submissions: dEBRUYNE_1
    1. Monero GUI 0.12.0.0 "Lithium Luna" Megathread - Download links, instructions for upgrading, guide on how to get started, and guides to resolve common issues (missing a transaction / zero balance, freezing / buggy GUI, transaction stuck as pending, and GUI using all bandwidth) (386 points, 833 comments)
    2. [Reminder] monero is not the appropriate place to discuss the BTC/BCH debate (319 points, 73 comments)
    3. General information regarding the upcoming scheduled network upgrade and a call for community action (305 points, 223 comments)
    4. GUI v0.12.2.0 released! (299 points, 243 comments)
    5. Announcement - Proof-of-Work tweak and a note on key reuse (295 points, 250 comments)
    6. GUI v0.12.3.0 (with direct Ledger support) released! (280 points, 386 comments)
    7. Bitfinex reduces Monero withdrawal fees from 0.04 to 0.0001 XMR! (272 points, 9 comments)
    8. Poloniex also reduces Monero withdrawal fees to 0.0001 XMR! (220 points, 17 comments)
    9. Preliminary information thread regarding the scheduled protocol upgrade of October 18 (214 points, 208 comments)
    10. CLI v0.12.3.0 released! (195 points, 78 comments)
  2. 4228 points, 24 submissions: OsrsNeedsF2P
    1. Saying you don't need privacy because you have nothing to hide is like saying you don't need free speech because you have nothing to say. It's a right to everyone - It's a right to you, me, and even Mark Zuckerberg. (581 points, 138 comments)
    2. The official Fortnite Merch Store is accepting exclusively Monero as a cryptocurrency payment option... (445 points, 80 comments)
    3. Can we stop being assholes to newbies? (359 points, 94 comments)
    4. With all this Monero "is less untraceable than previously thought" FUD, let's all remember that huge fucking bounty of $$$ for anyone who can trace the origin of one of the devs transactions.. (343 points, 131 comments)
    5. Ever wanted to know how Monero is still around today? Well now you don't have to! This post has it all =D (297 points, 66 comments)
    6. Coinmarketcap shows Freewallet as a Monero wallet. Guys, whatever you do.. Don't use Freewallet. It's a scam. (286 points, 93 comments)
    7. SEC wants decentralized exchange creators to register as exchanges. Lol (182 points, 111 comments)
    8. "Please do your part in demanding exchanges to lower their XMR withdraw fee. I am submitting a complaint to Coinex who currently charge 0.04 XMR" - [x-post from /xmrtrader] (169 points, 43 comments)
    9. Can we get some appreciation for the people who maintain the Monero packages on Arch Linux? There are so many available, and every single one I've checked either make the package from source or validate the checksum. Amazing work <3 (156 points, 19 comments)
    10. [WARNING] DROPIL recently made a post announcing support for Monero. MOVE YOUR FUNDS if you used them!!! (119 points, 5 comments)
  3. 3954 points, 13 submissions: KnifeOfPi2
    1. Did John McAfee just sell all of his Monero?? (1277 points, 107 comments)
    2. We need to stop thinking about Monero as a “privacy coin.” (511 points, 200 comments)
    3. Selsta and I just completed the first Ledger-to-Ledger mainnet transactions ever. He sent me 0.1 XMR and I sent 0.4 XMR back. (482 points, 103 comments)
    4. Monero network hashrate just hit 1GH/s! (463 points, 166 comments)
    5. An upcoming Monero project: Render the entire blockchain. Here's a selection of blocks that we've done so far, in an early stage. (224 points, 31 comments)
    6. In Stunning Move, Bitmain Announces It's Launching A Doorstopper Business (193 points, 48 comments)
    7. Another red flag for X Wallet: The source code is incomplete. (190 points, 63 comments)
    8. MONERO IS DEAD! LONG LIVE MONERO! (155 points, 25 comments)
    9. Lithium Luna GUI released! (118 points, 66 comments)
    10. Cake Wallet - introducing Zendesk support! (100 points, 13 comments)
  4. 2421 points, 22 submissions: SamsungGalaxyPlayer
    1. Kasisto POS in 22 seconds (366 points, 76 comments)
    2. "Kudelski Security completed their [bulletproof] report. They found only a few minor issues that are trivial to correct, and no major issues." Overall, a huge win for Monero, bulletproofs, and privacy. Full report will be published soon. (338 points, 100 comments)
    3. Network upgrade scheduled for block 1544555 on 28 March (210 points, 56 comments)
    4. Fungibility is determined by the LOWEST common denominator of privacy, NOT the highest. Monero absolutely excels here. (103 points, 37 comments)
    5. [Discussion] Move to a Fixed Ringsize (102 points, 85 comments)
    6. The Monero Malware Response workgroup website is up! Direct people whose machines have been compromised here! (101 points, 22 comments)
    7. MoneroV: A Trap Laid for Monero Users? (93 points, 45 comments)
    8. Want to get the GUI point release faster? Help translate! (91 points, 18 comments)
    9. Introducing the Breaking Monero Series! (86 points, 26 comments)
    10. ShapeShift is moving to a membership model and will require personal information soon (83 points, 86 comments)
  5. 2295 points, 16 submissions: pinkphloid
    1. Cake Wallet - OPEN SOURCE - Here it is! (383 points, 167 comments)
    2. Our Monero wallet called CAKEWALLET for iOS is live! Please check the link to the Apple App Store below. (347 points, 379 comments)
    3. [MANDATORY UPDATE] Cake Wallet Version 3.0.9 - Network Upgrade Ready! (227 points, 19 comments)
    4. [UPDATE] Cake Wallet version 3.1.4, now with XMR.TO for exchanging XMR to BTC! (133 points, 15 comments)
    5. Cake Wallet - 10,000 unique downloads! (132 points, 29 comments)
    6. Thank for the positive feedback on Cake Wallet! (127 points, 62 comments)
    7. The new Cake Wallet Update version 3.0.1 is out now! (120 points, 50 comments)
    8. [UPDATE] CAKE WALLET 3.1.1 with Monero v0.13.0.4 and other stuff (118 points, 32 comments)
    9. Cake Wallet - UPDATE! (108 points, 75 comments)
    10. CAKE WALLET - new version live now with NEW FEATURES! (102 points, 97 comments)
  6. 2042 points, 16 submissions: Rehrar
    1. Core Team Announcement (344 points, 45 comments)
    2. Project FOSS (212 points, 37 comments)
    3. Write down your seed (200 points, 93 comments)
    4. Bulletproof audit needs some more funding. Details in the comments. (170 points, 55 comments)
    5. Extremely thorough introduction to Monero by cypherperro. Take a look. (122 points, 18 comments)
    6. Defcon Monero Village Update and Summary (116 points, 22 comments)
    7. MRL Bulletproof audit FFS request (115 points, 30 comments)
    8. I, rehrar,went on a YouTube show to talk about Morono (113 points, 28 comments)
    9. Fund the fundings! (107 points, 16 comments)
    10. The anonimal appreciation thread! (107 points, 21 comments)
  7. 1978 points, 15 submissions: Vespco
    1. Edward Snowden on Bitcoin Interview 2018 (at 50 minutes, he says that a traceable public ledger is a bigger problem then scalability) (362 points, 88 comments)
    2. Putting this on my invoices seems like a good way for me to promote Monero, give my customers a discount, & help me acquire more Monero. (325 points, 101 comments)
    3. It's fun to be a part of the Monero economy! (179 points, 26 comments)
    4. Honest Government Ad | Anti Encryption Law (178 points, 32 comments)
    5. Jeez, not much real conversation in here. Just junky news links. (129 points, 76 comments)
    6. The New York State Department of Financial Services just approved the trading of privacy-protecting cryptocurrency. | Coin Center (124 points, 11 comments)
    7. A good way to explain the importance of fungibility to the laymen: Bitcoin Roulette (99 points, 45 comments)
    8. Why I love Botnet & Browser Mining. (86 points, 39 comments)
    9. This needs more praise & attention: An Open Source, Client Side JS implementation that makes monero multisig fairly easy. Github link in comments. (82 points, 14 comments)
    10. Could we get even more cryptographers researching for Monero? (77 points, 31 comments)
  8. 1846 points, 14 submissions: SarangNoether
    1. Bulletproofs: let's raise some funds! (295 points, 94 comments)
    2. January monthly report from Sarang Noether (237 points, 39 comments)
    3. Bulletproofs: The Paper Strikes Back (153 points, 32 comments)
    4. July monthly report from Sarang Noether (142 points, 20 comments)
    5. March monthly report from Sarang Noether (129 points, 22 comments)
    6. August monthly report from Sarang Noether (122 points, 33 comments)
    7. February monthly report from Sarang Noether (119 points, 27 comments)
    8. Sarang is up for three more months! (107 points, 30 comments)
    9. October monthly report from Sarang Noether (102 points, 26 comments)
    10. September monthly report from Sarang Noether (99 points, 25 comments)
  9. 1470 points, 4 submissions: TheFuzzStone
    1. "I do not have any Bitcoin" (1182 points, 96 comments)
    2. Fluffypony at Consensus 2018 (134 points, 33 comments)
    3. Time for Monero "killers"! :-) (91 points, 34 comments)
    4. XMR.RU-report (March) (63 points, 14 comments)
  10. 1468 points, 5 submissions: philkode
    1. Overstock.com accepting Monero (and ETH, BCH, LTC, DASH) (499 points, 36 comments)
    2. Happy 4th Birthday Monero! 🎂🎉🎁 (455 points, 62 comments)
    3. Monero has been added to Debian unstable repo as of yesterday. (321 points, 52 comments)
    4. “Unhackable” BitFi wallet just got hacked (xpost /cryptocurrency) (130 points, 41 comments)
    5. X Wallet to App Store (Soon™) (63 points, 67 comments)

Top Commenters

  1. dEBRUYNE_1 (3762 points, 1243 comments)
  2. KnifeOfPi2 (3311 points, 347 comments)
  3. OsrsNeedsF2P (3189 points, 505 comments)
  4. fluffyponyza (3027 points, 272 comments)
  5. gingeropolous (2554 points, 320 comments)
  6. cryptochangements34 (2522 points, 261 comments)
  7. SarangNoether (2269 points, 185 comments)
  8. SamsungGalaxyPlayer (2108 points, 221 comments)
  9. john_alan (1993 points, 218 comments)
  10. smooth_xmr (1944 points, 279 comments)

Top Submissions

  1. Did John McAfee just sell all of his Monero?? by KnifeOfPi2 (1277 points, 107 comments)
  2. Paypal shares your personal data with over 600 companies! That's why we need Monero! by 0xf3e (1184 points, 146 comments)
  3. "I do not have any Bitcoin" by TheFuzzStone (1182 points, 96 comments)
  4. Found In Warsaw - Don't Buy Monero: Cryptocurrencies harm the banking system and can weaken the government by SecretApe (1114 points, 110 comments)
  5. Monero transactions are about to get 80% cheaper and faster. by WillMTB (1056 points, 120 comments)
  6. Bye bye ASICs by Swericor (874 points, 380 comments)
  7. Upvote if you would like to see @fluffyponyza as a guest on Joe Rogan Podcast by xmr_karnal (840 points, 44 comments)
  8. All right, my cat had kittens and I just realised one of them has Monero-like logo on its head 😂😂 by JNKO266 (817 points, 79 comments)
  9. Credit, where credit is due! by Experts-say (796 points, 53 comments)
  10. Yesterday I thought it might be fun to create some vintage crypto posters for a handful of coins. This was the first one I came up with. Bonus points if you spot similarities from an old movie by Beemoe4 (722 points, 67 comments)

Top Comments

  1. 495 points: mr670wl's comment in Found In Warsaw - Don't Buy Monero: Cryptocurrencies harm the banking system and can weaken the government
  2. 474 points: kieranc001's comment in Monero Zero looks like a scam, can you please confirm?
  3. 380 points: deleted's comment in Found In Warsaw - Don't Buy Monero: Cryptocurrencies harm the banking system and can weaken the government
  4. 356 points: deleted's comment in Ledger Hardware Wallet - Monero integration : some news #6
  5. 331 points: last_of_the_romans's comment in Monero transactions are about to get 80% cheaper and faster.
  6. 323 points: svenroy777's comment in "I do not have any Bitcoin"
  7. 311 points: deleted's comment in Did John McAfee just sell all of his Monero??
  8. 255 points: KnifeOfPi2's comment in Monero transactions are about to get 80% cheaper and faster.
  9. 237 points: live9free1or1die's comment in Banning privacy coins because of terrorism/drugs/laundering is like banning people from being allowed to have sex in privacy because pedophiles also like privacy.
  10. 203 points: fluffyponyza's comment in Botnets are Ruining the Integrity of the Monero Network
Generated with BBoe's Subreddit Stats (Donate)
submitted by OsrsNeedsF2P to subreddit_stats [link] [comments]

Headlines for week 06 of 2019

Listen to the Headlines for week 06

​Show notes for Security Endeavors Headlines for Week 5 of 2019
InfoSec Week 6, 2019 (link to original Malgregator.com posting)
The Zurich American Insurance Company says to Mondelez, a maker of consumer packaged goods, that the NotPetya ransomware attack was considered an act of cyber war and therefore not covered by their policy. According to Mondelez, its cyber insurance policy with Zurich specifically covered “all risks of physical loss or damage” and “all risk of physical loss or damage to electronic data, programs or software” due to “the malicious introduction of a machine code or instruction.” One would think that the language in the cyber insurance policy was specifically designed to be broad enough to protect Mondelez in the event of any kind of cyber attack or hack. And NotPetya would seem to fit the definition included in the cyber insurance policy – it was a bit of malicious code that effectively prevented Mondelez from getting its systems back up and running unless it paid out a hefty Bitcoin ransom to hackers. Originally, Zurich indicated that it might pay $10 million, or about 10 percent of the overall claim. But then Zurich stated that it wouldn't pay any of the claim by invoking a special “cyber war” clause. According to Zurich, it is not responsible for any payment of the claim if NotPetya was actually “a hostile or warlike action in time of peace or war.” According to Zurich, the NotPetya cyber attack originated with Russian hackers working directly with the Russian government to destabilize the Ukraine. This is what Zurich believes constitutes "cyber war." https://ridethelightning.senseient.com/2019/01/insurance-company-says-notpetya-is-an-act-of-war-refuses-to-pay.html
Reuters reports that hackers working on behalf of Chinese intelligence breached the network of Norwegian software firm Visma to steal secrets from its clients. According to investigators at cyber security firm Recorded Future, the attack was part of what Western countries said in December is a global hacking campaign by China’s Ministry of State Security to steal intellectual property and corporate secrets. Visma took the decision to talk publicly about the breach to raise industry awareness about the hacking campaign, which is known as Cloudhopper and targets technology service and software providers in order reach their clients.
https://www.reuters.com/article/us-china-cyber-norway-visma/china-hacked-norways-visma-to-steal-client-secrets-investigators-idUSKCN1PV141
A new vulnerability has been discovered in the upcoming 5G cellular mobile communications protocol. Researchers have described this new flaw as more severe than any of the previous vulnerabilities that affected the 3G and 4G standards. Further, besides 5G, this new vulnerability also impacts the older 3G and 4G protocols, providing surveillance tech vendors with a new flaw they can abuse to create next-gen IMSI-catchers that work across all modern telephony protocols.
This new vulnerability has been detailed in a research paper named "New Privacy Threat on 3G, 4G, and Upcoming5G AKA Protocols," published last year.
According to researchers, the vulnerability impacts AKA, which stands for Authentication and Key Agreement, a protocol that provides authentication between a user's phone and the cellular networks.The AKA protocol works by negotiating and establishing keys for encrypting the communications between a phone and the cellular network. Current IMSI-catcher devices target vulnerabilities in this protocol to downgrade AKA to a weaker state that allows the device to intercept mobile phone traffic metadata and track the location of mobile phones. The AKA version designed for the 5G protocol --also known as 5G-AKA-- was specifically designed to thwart IMSI-catchers, featuring a stronger authentication negotiation system But the vulnerability discovered last year allows surveillance tech vendors to create new models of IMSI-catchers hardware that, instead of intercepting mobile traffic metadata, will use this new vulnerability to reveal details about a user's mobile activity. This could include the number of sent and received texts and calls, allowing IMSI-catcher operators to create distinct profiles for each smartphone holder. https://www.zdnet.com/article/new-security-flaw-impacts-5g-4g-and-3g-telephony-protocols/
The Debian Project is recommending the upgrade of golang-1.8 packages after a vulnerability was discovered in the implementation of the P-521 and P-384 elliptic curves, which could result in denial of service and in some cases key recovery. In addition this update fixes two vulnerabilities in the “go get” command, which could result in the execution of arbitrary shell commands. https://www.debian.org/security/2019/dsa-4380
It is possible to trick user’s of the Evolution email application into trusting a phished mail via adding a forged UID to a OpenPGP key that has a previously trusted UID. It's because Evolution extrapolates the trust of one of OpenPGP key UIDs into the key itself. The attack is based on using the deficiency of Evolution UI when handling new identifiers on previously trusted keys to convince the user to trust a phishing attempt. More details about how the flaw works, along with examples are included in the article, which is linked in the show notes. Let’s take a minute to cover a bit of background on Trust Models and how validating identities work in OpenPGP and GnuPG:
The commonly used OpenPGP trust models are UID-oriented. That is, they are based on establishing validity of individual UIDs associated with a particular key rather than the key as a whole. For example, in the Web-of-Trust model individuals certify the validity of UIDs they explicitly verified.
Any new UID added to the key is appropriately initially untrusted. This is understandable since the key holder is capable of adding arbitrary UIDs to the key, and there is no guarantee that new UID will not actually be an attempt at forging somebody else's identity. OpenPGP signatures do not provide any connection between the signature and the UID of the sender. While technically the signature packet permits specifying UID, it is used only to facilitate finding the key, and is not guaranteed to be meaningful. Instead, only the signing key can be derived from the signature in cryptographically proven way.
GnuPG (as of version 2.2.12) does not provide any method of associating the apparent UID against the signature. In other words, from e-mail's From header. Instead, only the signature itself is passed to GnuPG and its apparent trust is extrapolated from validity of different UIDs on the key. Another way to say this is that the signature is considered to be made with a trusted key if at least one of the UIDs has been verified. https://dev.gentoo.org/~mgorny/articles/evolution-uid-trust-extrapolation.html
If you’re up for some heavy reading about manipulation and deceit being perpetrated by cyber criminals, it may be worth checking out a piece from buzzfeednews. It tells a woeful and dark tale that does not have a happy ending. A small excerpt reads: “As the tools of online identity curation proliferate and grow more sophisticated, so do the avenues for deception. Everyone’s familiar with the little lies — a touch-up on Instagram or a stolen idea on Twitter. But what about the big ones? Whom could you defraud, trick, ruin, by presenting false information, or information falsely gained? An infinite number of individual claims to truth presents itself. How can you ever know, really know, that any piece of information you see on a screen is true? Some will find this disorienting, terrifying, paralyzing. Others will feel at home in it. Islam and Woody existed purely in this new world of lies and manufactured reality, where nothing is as it seems.” https://www.buzzfeednews.com/article/josephbernstein/tomi-masters-down-the-rabbit-hole-i-go
Security researchers were assaulted by a casino technology vendor Atrient after responsibly disclosed critical vulnerabilities to them. Following a serious vulnerability disclosure affecting casinos globally, an executive of one casino technology vendor Atrient has allegedly assaulted the security researcher who disclosed the vulnerability at the ICE conference in London. The article covers the story of a vulnerability disclosure gone bad, one involving the FBI, a vendor with a global customer base of casinos and a severe security vulnerability which has gone unresolved for four months without being properly addressed. https://www.secjuice.com/security-researcher-assaulted-ice-atrient/
Article 13, the new European Union copyright law is back and it got worse, not better. In the Franco-German deal, Article 13 would apply to all for-profit platforms. Upload filters must be installed by everyone except those services which fit all three of the following extremely narrow criteria:
Available to the public for less than 3 years Annual turnover below €10 million Fewer than 5 million unique monthly visitors Countless apps and sites that do not meet all these criteria would need to install upload filters, burdening their users and operators, even when copyright infringement is not at all currently a problem for them. https://juliareda.eu/2019/02/article-13-worse/
Researchers from Google Project Zero evaluated Apple's implementation of Pointer Authentication on the A12 SoC used in the iPhone XS. There are bypasses possible, but the conclusion says it is still a worthwhile exploitation mitigation technique. Among the most exciting security features introduced with ARMv8.3-A is Pointer Authentication, a feature where the upper bits of a pointer are used to store a Pointer Authentication Code (PAC), which is essentially a cryptographic signature on the pointer value and some additional context. Special instructions have been introduced to add an authentication code to a pointer and to verify an authenticated pointer's PAC and restore the original pointer value. This gives the system a way to make cryptographically strong guarantees about the likelihood that certain pointers have been tampered with by attackers, which offers the possibility of greatly improving application security. There’s a Qualcomm white paper which explains how ARMv8.3 Pointer Authentication was designed to provide some protection even against attackers with arbitrary memory read or arbitrary memory write capabilities. It's important to understand the limitations of the design under the attack model the author describes: a kernel attacker who already has read/write and is looking to execute arbitrary code by forging PACs on kernel pointers.
Looking at the specification, the author identifies three potential weaknesses in the design when protecting against kernel attackers with read/write access: reading the PAC keys from memory, signing kernel pointers in userspace, and signing A-key pointers using the B-key (or vice versa). The full article discusses each in turn. https://googleprojectzero.blogspot.com/2019/02/examining-pointer-authentication-on.html
There is a dangerous, remote code execution flaw in the LibreOffice and OpenOffice software. While in the past there have been well documented instances where opening a document would result in the executing of malicious code in paid office suites. This time LibreOffice and Apache’s OpenOffice are the susceptible suites. The attack relies on exploiting a directory traversal flaw, identified as CVE-2018-16858, to automatically execute a specific python library bundled within the software using a hidden onmouseover event. To exploit this vulnerability, the researcher created an ODT file with a white-colored hyperlink (so it can't be seen) that has an "onmouseover" event to trick victims into executing a locally available python file on their system when placing their mouse anywhere on the invisible hyperlink. According to the researcher, the python file, named "pydoc.py," that comes included with the LibreOffice's own Python interpreter accepts arbitrary commands in one of its parameters and execute them through the system's command line or console. https://thehackernews.com/2019/02/hacking-libreoffice-openoffice.html
Nadim Kobeissi is discontinuing his secure online chat Cryptocat. The service began in 2011 as an experiment in making secure messaging more accessible. In the eight ensuing years, Cryptocat served hundreds of thousands of users and developed a great story to tell. The former maintainer explains on the project’s website that other life events have come up and there’s no longer available time to maintain things. The coder says that Cryptocat users deserve a maintained secure messenger, recommends Wire.
The Cryptocat source code is still published on GitHub under the GPL version 3 license and has put the crypto.cat domain name up for sale, and thanks the users for the support during Cryptocat's lifetime. https://twitter.com/i/web/status/1092712064634753024
Malware For Humans is a conversation-led, independent documentary about fake news, big data, electoral interference, and hybrid warfare. Presented by James Patrick, a retired police officer, intelligence analyst, and writer, Malware For Humans covers the Brexit and Trump votes, the Cambridge Analytica scandal, Russian hybrid warfare, and disinformation or fake news campaigns.
Malware For Humans explains a complex assault on democracies in plain language, from hacking computers to hacking the human mind, and highlights the hypocrisy of the structure of intelligence agencies, warfare contractors, and the media in doing so. Based on two years of extensive research on and offline, Malware For Humans brings the world of electoral interference into the light and shows that we are going to be vulnerable for the long term in a borderless, online frontier. A complete audio companion is available as a separate podcast, which can be found on iTunes and Spotify as part of The Fall series and is available for free, without advertisements. https://www.byline.com/column/67/article/2412
Security Endeavors Headlines is produced by SciaticNerd & Security Endeavors with the hope that it provides value to the wider security community. Some sources adapted for on-air readability.
Special thanks to our friends at malgregator dot com, who allow us to use their compiled headlines to contribute to show’s content. Visit them at Malgregator.com.
Additional supporting sources are also be included in our show notes
More information about the podcast is available at SecurityEndeavors.com/SEHL
Thanks for listening and we'll see you next week!
submitted by SecurityEndeavors to SEHL [link] [comments]

Why is Debian updating old package versions instead of ... Debian Package of the Day S02E14 - #34 - mrboom Unix & Linux: Get the Debian version of the sources of a ... Debian Package of the Day S02E15 - #35 - dateutils Debian Package of the Day S03E08 - #43: ccze

[bitcoin_0.18.1~dfsg-1.debian.tar.xz] Betreuer: Debian Cryptocoin Team Jonas Smedegaard Micah Anderson ... This package provides Bitcoin Core daemon bitcoind, and command-line tool bitcoin-cli to interact with the daemon. Bitcoin Core is the reference implementation of Bitcoin. Bitcoin (₿) is the world's first cryptocurrency, a form of electronic cash sent peer-to-peer without the need for a ... The package is severely out of date with respect to the Debian Policy. Latest version is 4.4.0 and your package only follows 3.9.5... This package is neither part of unstable nor experimental. This probably means that the package has been removed (or has been renamed). Thus the information here is of little interest ... the package is going to ... This package provides Bitcoin Core tool Bitcoin-Qt, a graphical user interface for Bitcoin. Bitcoin (₿) is the world's first cryptocurrency, a form of electronic cash sent peer-to-peer without the need for a financial intermediary. Bitcoin Core is the reference implementation of Bitcoin. Beware that unless pruning is enabled, full global transaction history is stored locally at each client ... to see control information (name, description, version, dependencies...) and basic stats like size or $ dpkg-deb -f package.deb Version to print only version. Examples: full info (note that first 4 lines are beyond typical control info) [email protected]:~$ dpkg-deb -I in/sw/minutor_2.0_amd64.deb new debian package, version 2.0. size 131594 bytes ... Note that same packages might appear in several distributions, but with different version numbers. View package lists View the packages in the stable distribution. This is the latest official release of the Debian distribution. This is stable and well tested software, which changes only if major security or usability fixes are incorporated. See the stable release pages for more information ...

[index] [21450] [18113] [19535] [12723] [6477] [25825] [23211] [14372] [39772] [31596]

Why is Debian updating old package versions instead of ...

Welcome to Debian Package of the Day, where we explore a package from the Debian archives. In today's edition we take a look at steghide, a tool that can embed hidden data into another file. Welcome to Debian Package of the Day, where we take a look at a package from the Debian archives. Today's package is sgt-puzzles, a collection of 39 puzzles written by Simon Tatham. Unix & Linux: Why is Debian updating old package versions instead of offering new versions? (openssl)? Helpful? Please support me on Patreon: https://www.pat... Unix & Linux: Debian: version numbers (now/then) and changelog for all upgradable packages Helpful? Please support me on Patreon: https://www.patreon.com/roe... Welcome to Debian Package of the Day, where we take a look at a package from the Debian archives. In today's edition we take a look at mrboom, a bomberman inspired game written all the way back in ...

#