Bitcoin Core version 0.20.0 released

Groestlcoin 6th Anniversary Release

Introduction

Dear Groestlers, it goes without saying that 2020 has been a difficult time for millions of people worldwide. The groestlcoin team would like to take this opportunity to wish everyone our best to everyone coping with the direct and indirect effects of COVID-19. Let it bring out the best in us all and show that collectively, we can conquer anything.
The centralised banks and our national governments are facing unprecedented times with interest rates worldwide dropping to record lows in places. Rest assured that this can only strengthen the fundamentals of all decentralised cryptocurrencies and the vision that was seeded with Satoshi's Bitcoin whitepaper over 10 years ago. Despite everything that has been thrown at us this year, the show must go on and the team will still progress and advance to continue the momentum that we have developed over the past 6 years.
In addition to this, we'd like to remind you all that this is Groestlcoin's 6th Birthday release! In terms of price there have been some crazy highs and lows over the years (with highs of around $2.60 and lows of $0.000077!), but in terms of value– Groestlcoin just keeps getting more valuable! In these uncertain times, one thing remains clear – Groestlcoin will keep going and keep innovating regardless. On with what has been worked on and completed over the past few months.

UPDATED - Groestlcoin Core 2.18.2

This is a major release of Groestlcoin Core with many protocol level improvements and code optimizations, featuring the technical equivalent of Bitcoin v0.18.2 but with Groestlcoin-specific patches. On a general level, most of what is new is a new 'Groestlcoin-wallet' tool which is now distributed alongside Groestlcoin Core's other executables.
NOTE: The 'Account' API has been removed from this version which was typically used in some tip bots. Please ensure you check the release notes from 2.17.2 for details on replacing this functionality.

How to Upgrade?

Windows
If you are running an older version, shut it down. Wait until it has completely shut down (which might take a few minutes for older versions), then run the installer.
OSX
If you are running an older version, shut it down. Wait until it has completely shut down (which might take a few minutes for older versions), run the dmg and drag Groestlcoin Core to Applications.
Ubuntu
http://groestlcoin.org/forum/index.php?topic=441.0

Other Linux

http://groestlcoin.org/forum/index.php?topic=97.0

Download

Download the Windows Installer (64 bit) here
Download the Windows Installer (32 bit) here
Download the Windows binaries (64 bit) here
Download the Windows binaries (32 bit) here
Download the OSX Installer here
Download the OSX binaries here
Download the Linux binaries (64 bit) here
Download the Linux binaries (32 bit) here
Download the ARM Linux binaries (64 bit) here
Download the ARM Linux binaries (32 bit) here

Source

ALL NEW - Groestlcoin Moonshine iOS/Android Wallet

Built with React Native, Moonshine utilizes Electrum-GRS's JSON-RPC methods to interact with the Groestlcoin network.
GRS Moonshine's intended use is as a hot wallet. Meaning, your keys are only as safe as the device you install this wallet on. As with any hot wallet, please ensure that you keep only a small, responsible amount of Groestlcoin on it at any given time.

Features

Download

iOS
Android

Source

ALL NEW! – HODL GRS Android Wallet

HODL GRS connects directly to the Groestlcoin network using SPV mode and doesn't rely on servers that can be hacked or disabled.
HODL GRS utilizes AES hardware encryption, app sandboxing, and the latest security features to protect users from malware, browser security holes, and even physical theft. Private keys are stored only in the secure enclave of the user's phone, inaccessible to anyone other than the user.
Simplicity and ease-of-use is the core design principle of HODL GRS. A simple recovery phrase (which we call a Backup Recovery Key) is all that is needed to restore the user's wallet if they ever lose or replace their device. HODL GRS is deterministic, which means the user's balance and transaction history can be recovered just from the backup recovery key.

Features

Download

Main Release (Main Net)
Testnet Release

Source

ALL NEW! – GroestlcoinSeed Savior

Groestlcoin Seed Savior is a tool for recovering BIP39 seed phrases.
This tool is meant to help users with recovering a slightly incorrect Groestlcoin mnemonic phrase (AKA backup or seed). You can enter an existing BIP39 mnemonic and get derived addresses in various formats.
To find out if one of the suggested addresses is the right one, you can click on the suggested address to check the address' transaction history on a block explorer.

Features

Live Version (Not Recommended)

https://www.groestlcoin.org/recovery/

Download

https://github.com/Groestlcoin/mnemonic-recovery/archive/master.zip

Source

ALL NEW! – Vanity Search Vanity Address Generator

NOTE: NVidia GPU or any CPU only. AMD graphics cards will not work with this address generator.
VanitySearch is a command-line Segwit-capable vanity Groestlcoin address generator. Add unique flair when you tell people to send Groestlcoin. Alternatively, VanitySearch can be used to generate random addresses offline.
If you're tired of the random, cryptic addresses generated by regular groestlcoin clients, then VanitySearch is the right choice for you to create a more personalized address.
VanitySearch is a groestlcoin address prefix finder. If you want to generate safe private keys, use the -s option to enter your passphrase which will be used for generating a base key as for BIP38 standard (VanitySearch.exe -s "My PassPhrase" FXPref). You can also use VanitySearch.exe -ps "My PassPhrase" which will add a crypto secure seed to your passphrase.
VanitySearch may not compute a good grid size for your GPU, so try different values using -g option in order to get the best performances. If you want to use GPUs and CPUs together, you may have best performances by keeping one CPU core for handling GPU(s)/CPU exchanges (use -t option to set the number of CPU threads).

Features

Usage

https://github.com/Groestlcoin/VanitySearch#usage

Download

Source

ALL NEW! – Groestlcoin EasyVanity 2020

Groestlcoin EasyVanity 2020 is a windows app built from the ground-up and makes it easier than ever before to create your very own bespoke bech32 address(es) when whilst not connected to the internet.
If you're tired of the random, cryptic bech32 addresses generated by regular Groestlcoin clients, then Groestlcoin EasyVanity2020 is the right choice for you to create a more personalised bech32 address. This 2020 version uses the new VanitySearch to generate not only legacy addresses (F prefix) but also Bech32 addresses (grs1 prefix).

Features

Download

Source

Remastered! – Groestlcoin WPF Desktop Wallet (v2.19.0.18)

Groestlcoin WPF is an alternative full node client with optional lightweight 'thin-client' mode based on WPF. Windows Presentation Foundation (WPF) is one of Microsoft's latest approaches to a GUI framework, used with the .NET framework. Its main advantages over the original Groestlcoin client include support for exporting blockchain.dat and including a lite wallet mode.
This wallet was previously deprecated but has been brought back to life with modern standards.

Features

Remastered Improvements

Download

Source

ALL NEW! – BIP39 Key Tool

Groestlcoin BIP39 Key Tool is a GUI interface for generating Groestlcoin public and private keys. It is a standalone tool which can be used offline.

Features

Download

Windows
Linux :
 pip3 install -r requirements.txt python3 bip39\_gui.py 

Source

ALL NEW! – Electrum Personal Server

Groestlcoin Electrum Personal Server aims to make using Electrum Groestlcoin wallet more secure and more private. It makes it easy to connect your Electrum-GRS wallet to your own full node.
It is an implementation of the Electrum-grs server protocol which fulfils the specific need of using the Electrum-grs wallet backed by a full node, but without the heavyweight server backend, for a single user. It allows the user to benefit from all Groestlcoin Core's resource-saving features like pruning, blocks only and disabled txindex. All Electrum-GRS's feature-richness like hardware wallet integration, multi-signature wallets, offline signing, seed recovery phrases, coin control and so on can still be used, but connected only to the user's own full node.
Full node wallets are important in Groestlcoin because they are a big part of what makes the system be trust-less. No longer do people have to trust a financial institution like a bank or PayPal, they can run software on their own computers. If Groestlcoin is digital gold, then a full node wallet is your own personal goldsmith who checks for you that received payments are genuine.
Full node wallets are also important for privacy. Using Electrum-GRS under default configuration requires it to send (hashes of) all your Groestlcoin addresses to some server. That server can then easily spy on your transactions. Full node wallets like Groestlcoin Electrum Personal Server would download the entire blockchain and scan it for the user's own addresses, and therefore don't reveal to anyone else which Groestlcoin addresses they are interested in.
Groestlcoin Electrum Personal Server can also broadcast transactions through Tor which improves privacy by resisting traffic analysis for broadcasted transactions which can link the IP address of the user to the transaction. If enabled this would happen transparently whenever the user simply clicks "Send" on a transaction in Electrum-grs wallet.
Note: Currently Groestlcoin Electrum Personal Server can only accept one connection at a time.

Features

Download

Windows
Linux / OSX (Instructions)

Source

UPDATED – Android Wallet 7.38.1 - Main Net + Test Net

The app allows you to send and receive Groestlcoin on your device using QR codes and URI links.
When using this app, please back up your wallet and email them to yourself! This will save your wallet in a password protected file. Then your coins can be retrieved even if you lose your phone.

Changes

Download

Main Net
Main Net (FDroid)
Test Net

Source

UPDATED – Groestlcoin Sentinel 3.5.06 (Android)

Groestlcoin Sentinel is a great solution for anyone who wants the convenience and utility of a hot wallet for receiving payments directly into their cold storage (or hardware wallets).
Sentinel accepts XPUB's, YPUB'S, ZPUB's and individual Groestlcoin address. Once added you will be able to view balances, view transactions, and (in the case of XPUB's, YPUB's and ZPUB's) deterministically generate addresses for that wallet.
Groestlcoin Sentinel is a fork of Groestlcoin Samourai Wallet with all spending and transaction building code removed.

Changes

Download

Source

UPDATED – P2Pool Test Net

Changes

Download

Pre-Hosted Testnet P2Pool is available via http://testp2pool.groestlcoin.org:21330/static/

Source

submitted by Yokomoko_Saleen to groestlcoin [link] [comments]

Another one (old wallet recovery)

Hey everyone,
I've been out of the crypto game for a long time, but managed to dig up a wallet that I had stored on an old PC from early 2015. It wouldn't have much in it, maybe a few BTC at most, but it would be nice to recover it and cash out. The machine had Bitcoin Core installed, hasn't been connected to the internet since 2015, and is currently interstate - I've copied wallet.dat and that's all I have access to for now. The wallet is encrypted, backed up, copied to multiple secure locations, etc, and I remember the passphrase, but from what I've read in other threads, the private keys are the important part and I may need to do a "key dump"?
I tried installing Electrum and importing the wallet, but Electrum doesn't recognise the file. Am I right in thinking that the following would be the best solution?
  1. Download and install Bitcoin Core.
  2. Place wallet.dat into the appropriate directory.
  3. Open Bitcoin Core and allow it to "catch up" and download 240 GB worth of blockchain history.
  4. Possibly be forced to input the passphrase to access the wallet again, and transfer BTC out to an exchange of my choosing (unsure if this is how it would work at this stage).
Is there a way to recover the wallet without being forced to download hundreds of GB worth of data? I live in Australia, with typical Australia-tier internet, and it could quite literally take up to a week to download.
Apologies if there's any shortfall of knowledge on my end of things, it's been a long time since I've kept up with crypto and things seem to have changed quite a bit over the last four years. I appreciate any advice, and y'all are welcome to shame me on my relative ignorance, lol. Thanks!
submitted by ChronicLoser to Bitcoin [link] [comments]

Running a Monero Node vs Bitcoin

Edit: warning, rant
Has anyone else had the experience that running/maintaining a Monero node is much easier than Bitcoin? I've been dorking around since July, doing everything in the terminal on a Qubes VM.
Monero comes with simple monerod status and monerod sync_info commands to give you a range of useful info and overview of the current state of your node. Bitcoin has a bunch of individual commands you can aggregate to partially deduce progress, which I have arranged into my own little script. But I didn't find the target block until parsing through the log file. And you have to use other terminal commands like du - ahmd 1 | grep .bitcoin and then run a timer, just to see what your dl speed is, whereas Monero tells you outright. This is important for monitoring your connection over multiple days of download.
I had a hard time finding a BTC wallet that could remotely connect to my own damn node without installing additional software (such as electrum server). I had the silly idea that I could just point a mobile SPV wallet to my own remote node. Hell, the BTC core wallet didn't even have code separation between the node and wallet until just a few months ago.
And now I'm restoring an old Bisq wallet which I only have the seed for. While Bisq was scanning my node, it got hung up at corrupt blk01234.dat file, which actually crashes my Bitcoin node when it receives the data request. So my node had a corruption for 2 months without it knowing, which I only found caz Bisq (I think occurred during a hiccup in transfer from 512GB SD card to SSD).
I tried to drop/replace the blk and rev files, then reindex. But once again, stupid reindex doesnt show progress with any obvious terminal commands. Monitoring disk space, it seemed to be progressing abysmally slow with most my CPU/RAM dedicated to it. I was close to done until a power outage overnight and not enough battery to complete. And even though Bitcoin Core stores everything as individual files, seems it lacks the ability to detect corruption/discard corrupt files and go backwards to the last good file. So I get to start over.
At this point Im actually syncing from scratch in a separate VM while simultaneously reindexing just in case reindex doesnt fix the problem. I give it 50/50.
I know this is kind of a rant. But I wanted to share my experience with some people who can relate or at least understand. It's weird that for a project like Bitcoin, that the core software and UI would be so rudimentary, non-versatile, and even fragile.
Given the ease to configure Monero (including using Qubes qrexec to isolate the wallet in an offline VM), it's straightforward UI and documentation, that it was designed to have separate node and wallet functions, I'm guessing that these problems are much more rare, and easily fixed. That's just an educated wild ass guess of course, since I haven't had any problems.
At any rate, props to the Monero devs for making software that is straightforward and easy to use.
submitted by bawdyanarchist to Monero [link] [comments]

The biggest cryptocurrency thefts in the last 10 years

In this article, we will try to remember all the major theft of cryptocurrencies over the past 10 years.
1. Bitstamp $5.3 mln (BTC), January 4th, 2015
On January 4, 2015, the operational hot wallet of Bitstamp announced that it was hacked by an anonymous hacker and 19,000 Bitcoins (worth of $5 million) were lost.
The initiation of the attack fell on November 4, 2014. Then Damian Merlak, the CTO of the exchange, was offered free tickets to punk rock festival Punk Rock Holiday 2015 via Skype, knowing that Merlak is interested in such music and he plays in the band. To receive the tickets, he was asked to fill out a participant questionnaire by sending a file named “Punk Rock Holiday 2015 TICKET Form1.doc”. This file contained the VBA script. By opening the file, he downloaded the malware on his computer. Although Merlak did not suspect wrong and has opened the "application form", to any critical consequences, this did not open access to the funds of exchange.
The attackers, however, did not give up. The attack continued for five weeks, during which hackers presented themselves as journalists, then headhunters.
Finally, the attackers were lucky. On December 11, 2014, the infected word document was opened on his machine by Bitstamp system administrator Luka Kodric, who had access to the exchange wallet. The file came to the victim by email, allegedly on behalf of an employee of the Association for computer science, although in fact, as the investigation showed, the traces of the file lead deep into Tor. Hackers were not limited to just one letter. Skype attacker pretending to be an employee of the Association for computing machinery, convinced that his Frame though to make international honor society, which required some paperwork. Kodric believed.
By installing a Trojan on Kodriс's computer hackers were able to obtain direct access to the hot wallet of the exchange. The logs show that the attacker, under the account of Kodric, gained access to the server LNXSRVBTC, where he kept the wallet file.dat, and the DORNATA server where the password was stored. Then the servers were redirected to a certain IP address that belongs to one of the providers of Germany.
There are still no official reports of arrests in this case. Obviously, the case is complicated by the fact that the hackers are outside the UK, and the investigation has to cooperate with law enforcement agencies in other countries.
2. GateHub $9.5 mln (XRP), June 1th, 2019
Hackers have compromised nearly 100 XRP Ledger wallets on cryptocurrency wallet service GateHub. The incident was reported by GateHub in a preliminary statement on June 6.
XRP enthusiast Thomas Silkjær, who first noticed the suspicious activity, estimates that the hackers have stolen nearly $10 million worth of cryptocurrency (23,200,000 XRP), $5.5 million (13,100,000 XRP) of which has already been laundered through exchanges and mixer services.
GateHub notes that it is still conducting an investigation and therefore cannot publish any official findings. Also, GateHub advises victims to make complaints to the relevant authorities of their jurisdiction.
3. Tether, $30.9 mln (USDT), November 19th, 2017
Tether created a digital currency called "US tokens" (USDT) — they could be used to trade real goods using Bitcoin, Litecoin and Ether. By depositing $1 in Tether, the user received 1 USD, which can be converted back into fiat. On November 19, 2017, the attacker gained access to the main Tether wallet and withdrew $ 30.9 million in tokens. For the transaction, he used a Bitcoin address, which means that it was irreversible.
To fix the situation, Tether took action by which the hacker was unable to withdraw the stolen money to fiat or Bitcoin, but the panic led to a decrease in the value of Bitcoin.
4. Ethereum, $31 mln (ETH), July 20th, 2017
On July 20, 2017, the hacker transferred 153,037 Ethers to $31 million from three very large wallets owned by SwarmCity, Edgeless Casino and Eternity. Unknown fraudster managed to change the ownership of wallets, taking advantage of the vulnerability with multiple signatures.
First, the theft was noticed by the developers of SwarmCity.
Further events deserve a place in history: "white hackers" returned the stolen funds, and then protected other compromised accounts. They acted in the same way as criminals, who stole funds from vulnerable wallets — just not for themselves. And it all happened in less than a day.
5. Dao (Decentralized Autonomous Organization) $70 mln (ETH), June 18th, 2016
On June 18, 2016, members of the Ethereum community noticed that funds were being drained from the DAO and the overall ETH balance of the smart contract was going down. A total of 3.6 million Ether (worth around $70 million at the time) was drained by the hacker in the first few hours. The attack was possible because of an exploit found in the splitting function. The attackes withdrew Ether from the DAO smart contract multiple times using the same DAO Tokens. This was possible due to what is known as a recursive call exploit.
In this exploit, the attacker was able to "ask" the smart contract (DAO) to give the Ether back multiple times before the smart contract could update its own balance. There were two main faults that made this possible: the fact that when the DAO smart contract was created the coders did not take into account the possibility of a recursive call, and the fact that the smart contract first sent the ETH funds and then updated the internal token balance.
It's important to understand that this bug did not come from Ethereum itself, but from this one application that was built on Ethereum. The code written for the DAO had multiple bugs, and the recursive call exploit was one of them. Another way to look at this situation is to compare Ethereum to the Internet and any application based on Ethereum to a website: if a website is not working, it doesn't mean that the Internet is not working, it simply means that one website has a problem.
The hacker stopped draining the DAO for unknown reasons, even though they could have continued to do so.
The Ethereum community and team quickly took control of the situation and presented multiple proposals to deal with the exploit. In order to prevent the hacker from cashing in the Ether from his child DAO after the standard 28 days, a soft-fork was voted on and came very close to being introduced. A few hours before it was set to be released, a few members of the community found a bug with the implementation that opened a denial-of-service attack vector. This soft fork was designed to blacklist all the transactions made from the DAO.
6. NiceHash, 4736.42 (BTC), December 6th, 2017
NiceHash is a Slovenian cryptocurrency hash power broker with integrated marketplace that connects sellers of hashing power (miners) with buyers of hashing power using the sharing economy approach.
On December 6, 2017, the company's servers became the target of attack. At first, Reddit users reported that they could not access their funds and make transactions — when they tried to log in, they were shown a message about a service interruption. In the end, it became known that the service had undergone a major cyberattack and 4736,42 Bitcoins disappeared without a trace.
Despite heavy losses, NiceHash was able to continue working, but CEO and founder Marco Koval resigned, giving way to a new team. The company managed to maintain the trust of investors and began to strengthen the protection of its systems.
7. Mt.Gox, 850000 (BTC), June 19th, 2011
The Hacking Of Mt.Gox was one of the biggest Bitcoin thefts in history. It was the work of highly professional hackers using complex vulnerabilities.
A hacker (or a group of hackers) allegedly gained access to a computer owned by one of the auditors and used a security vulnerability to access Mt.Gox servers, then changed the nominal value of Bitcoin to 1 cent per coin.
Then they brought out about 2000 BTC. Some customers, without knowing it, conducted transactions at this low price, a total of 650 BTC, and despite the fact that the hacking hit the headlines around the world, no Bitcoin could be returned.
To increase investor confidence, the company has compensated all of the stolen coins, placed most of the remaining funds in offline storage, and the next couple of years was considered the most reliable Bitcoin exchanger in the world.
However, it was only an illusion of reliability.
The problems of the organization were much more serious, and the management probably did not even know about them.
CEO of Mt.Gox, Mark Karpeles, was originally a developer, but over time he stopped delving into technical details, basking in the rays of glory — because he created the world's largest platform for cryptocurrency exchange. At that time Mt.Gox handled over 70% of all Bitcoin transactions.
And, of course, there were those who wanted to take advantage of the technological weakness of the service. At some point, hackers made it so that Bitcoins could be bought at any price, and within minutes millions of dollars worth of coins were sold — mostly for pennies. World prices for Bitcoin stabilized in a few minutes, but it was too late.
As a result, Mt.Gox lost about 850,000 Bitcoins. The exchange had to declare bankruptcy, hundreds of thousands of people lost money, and the Japanese authorities arrested CEO Mark Karpeles for fraud. He pleaded not guilty and was subsequently released. In 2014, the authorities restored some of the Bitcoins remaining at the old addresses, but did not transfer them to the exchange, and created a trust to compensate for the losses of creditors.
8. Coincheck, $530 mln, January 26th, 2018
The sum was astonishing, and even surpassed the infamous Mt.Gox hack.
While Mt.Gox shortly filed for bankruptcy following the hack, Coincheck has surprisingly remained in business and was even recently approved as a licensed exchange by Japan’s Financial Services (FSA).
Coincheck was founded in 2014 in Japan and was one of the most popular cryptocurrency exchanges in the country. Offering a wide variety of digital assets including Bitcoin, Ether, LISK, and NEM, Coincheck was an emerging exchange that joined the Japan Blockchain Association.
Since Coincheck was founded it 2014, it was incidentally not subject to new exchange registration requirements with Japan’s FSA — who rolled out a framework after Mt. Gox –, and eventually was a contributing factor to its poor security standards that led to the hack.
On January 26th, 2018, Coincheck posted on their blog detailing that they were restricting NEM deposits and withdrawals, along with most other methods for buying or selling cryptocurrencies on the platform. Speculation arose that the exchange had been hacked, and the NEM developers issued a statement saying they were unaware of any technical glitches in the NEM protocol and any issues were a result of the exchange’s security.
Coincheck subsequently held a high-profile conference where they confirmed that hackers had absconded with 500 million NEM tokens that were then distributed to 19 different addresses on the network. Totaling roughly $530 million at the time — NEM was hovering around $1 then — the Coincheck hack was considered the largest theft in the industry’s history.
Coincheck was compelled to reveal some embarrassing details about their exchange’s security, mentioning how they stored all of the NEM in a single hot wallet and did not use the NEM multisignature contract security recommended by the developers.
Simultaneously, the NEM developers team had tagged all of the NEM stolen in the hack with a message identifying the funds as stolen so that other exchanges would not accept them. However, NEM announced they were ending their hunt for the stolen NEM for unspecified reasons several months later, and speculation persisted that hackers were close to cashing out the stolen funds on the dark web.
Mainstream media covered the hack extensively and compared it to similar failures by cryptocurrency exchanges in the past to meet adequate security standards. At the time, most media coverage of cryptocurrencies was centered on their obscure nature, dramatic volatility, and lack of security. Coincheck’s hack fueled that narrative considerably as the stolen sum was eye-popping and the cryptocurrency used — NEM — was unknown to most in the mainstream.
NEM depreciated rapidly following the hack, and the price fell even more throughout 2018, in line with the extended bear market in the broader industry. Currently, NEM is trading at approximately $0.07, a precipitous fall from ATH over $1.60 in early January.
The extent of the Coincheck hack was rivaled by only a few other hacks, notably the Mt.Gox hack. While nominally Coincheck is the largest hack in the industry’s history, the effects of Mt.Gox were significantly more impactful since the stolen funds consisted only of Bitcoin and caused a sustained market correction as well as an ongoing controversy with the stolen funds and founder. Moreover, Mt.Gox squandered 6% of the overall Bitcoin circulation at the time in a market that was much less mature than it is today.
Despite the fallout, Coincheck is now fully operational and registered with Japan’s FSA.
As practice shows, people make mistakes and these mistakes can cost a lot. Especially, when we talk about mad cryptoworld. Be careful and keep your private keys in a safe place.
submitted by SwapSpace_co to BitcoinMarkets [link] [comments]

The International 2018 in Vancouver FAQ (Updated!)

Hey there again, you punks.
So with a tip coming from some of the moderators on the board, I've decided just to quickly update this FAQ that I wrote a few months back since TI is next week and I'm sure many of you still have a ton of questions. I've gotten some more information that I can pass down to you in regards to Vancouver but also now TI as well, including updated marijuana laws and beer recommendations.
Two quick notes:

VANCOUVER WEATHER

This summer has been an extremely hot season in Vancouver (at least in Vancouverite standards). Like anyone who attended in Seattle last year, there is noticeable smoke in the air in the city due to the fires all over the Pacific North West. If you have breathing issues or health related problems do to particles in the air, be advised that there is currently an Air Quality Advisory in effect so act accordingly. Wind/Rain will most likely clear up any issues going into next week, but just a heads up in case new fires flare up or we aren't blessed with some light rain. Forecast is looking to be sunny through midweek and the finals, with an average of about 23-25C.

THE PACIFIC NATIONAL EXHIBITION IS OPEN!

A staple for Vancouver residents since 1910, the PNE will be open from August 18th-September 3rd (closed on August 20th & 27th). If you're looking to do something after a midweek day, the PNE is the perfect place to go checkout for a fun night out filled with events, concerts, beer gardens, crazy carny food, rides, maybe BSJ, shopping and a lot more. This article will tell you everything you need to know about the PNE, how to get there and what's going on.
ALSO BOYZ II MEN AUGUST 18TH GET HYPED.

PLACES TO STAY

Yes, but it's not exactly regulated by AirBnB. Feel free to stay at one through AirBnB but know that it might be a little tricky to deal with issues if they come up with your rental. Also while you're at it, check out VRBO.
The general piece of advice you'll get from any local about where to stay for TI is going to be anywhere that's on the Skytrain Expo Line (the line in dark blue). The Expo Line will take you to Stadium-Chinatown station, which is where Rogers Arena is 30 seconds away. As in Seattle, the closer to downtown you are, the more expensive it is to stay.
Unlike Seattle Center, there aren't very many budget hotels left, if at all in the Downtown core. The cheaper hostels are available, though fair warning, many of them are placed on Granville Street, which is a place that many Vancouverites will tell you to avoid while you're here (Though I have never stayed at a hostel on Granville, if anyone has an experience, feel free to share). Check out the Ramada Inn and the Days Inn near Waterfront for some cheaper-ish options.
In my mind, there are two places that I would keep a look-out for avoiding while you visit Vancity.
  1. Granville Street. During the day time it's normally fine, filled with some cool shops (Golden Age Collectibles, The Rock Shop, Movieland Arcade) but it's packed to the absolute max with dumbasses at night due to the amount of night clubs. There's police around every weeknight, but since you're in Vancouver for a good time, head towards Gastown, Chinatown or Main Street for places to party.
  2. Downtown East Side. If you've researched anything about Vancouver, you'll know that this area as where a large portion of the cities homeless reside. There is rampant drug use, poverty and sex work in this neighborhood, focused mainly between 5-10 blocks in the area of Main/Hastings. That being said, the community is an especially strong one, with fantastic human beings supporting the less fortunate. Though there isn't too much danger in terms of being robbed, you might want to just avoid the area at night. Be respectful to the people of this community and you'll have no problems.

TRANSIT

Sadly, no there isn't. We know, it absolutely sucks and everyone in Vancouver is aware. Your options are public transit or a taxi.
Super shitty if you don't like paying for parking. If you can, park outside of the Downtown core near a Skytrain and then head over to the Arena. Commercial Drive is pretty good for this if you can find certain spots. Tinseltown as well if you buy a movie ticket on non-event days.
If you've ever been to any major city, you'll notice that Vancouver shares the same load-up card/tap system that places like London share. It's called Compass Card and it's fairly easy to use. Just load up money onto the card, tap it when you enter and tap when you leave. It'll do all the calculations for you. Note that certain zones will cost more just due to how far you're traveling.
Yes it does! Car2Go and Evo are two of Vancouver's most popular car share services. Hot tip would be to register before you head over to Vancouver and it'll help mitigate the fact that UbeLyft aren't in Vancouver just yet. Just drive safely.
The easiest way to get to downtown from YVR, if you aren't getting picked up/taking a taxi is to take the Canada Line. It will take you directly to Waterfront station, from there you can take multiple buses, the Expo Line (the main line that will take you to Rogers Arena) or the Seabus (going to North VancouveLonsdale).

ALCOHOL

19 years old.
Vancouver has an exploding craft beer culture and you'll be happy to find that the variety of different beers/ciders to drink is absolutely massive, probably to the point of being intimidating.
Here are some of my favorite breweries and the beers that you should look out for when you're at the liquor store/pub:
Twin Sails Brewing
Dat Juice Pale Ale
Two Straws MilkShake IPA
Short Pants Mosaic IPA
Brassneck Brewing
Changeling Sour
Passive Aggressive IPA
Bjorn Again Farmhouse Ale
Steel & Oak
Changeling Sour
Passive Agressive IPA
Bjorn Again Farmhouse Ale
Bomber Brewing
Bomber Parklife Passionfruit Ale
Bomber Pilsner
Bomber Snow White IPA
Yes. First, there isn't any drinking in public if you already didn't know. Second, you must have TWO pieces of ID on you whenever you go to buy drinks in case you're asked for your ID. First piece must be photo ID, the second piece must be something with your name on it (in order for bartenders/servers to validate the first piece). I see a lot of tourists thrown off by this, so just know that Vancouver's liquor laws are much more strict than other places.
I've heard from a few Vancouver residents that this isn't exactly enforced harshly, but just to note that it is an actual law. Piece of mind.
%.05. There will be a ton of pubcrawls and side events going on for people that are attending TI and I'm sure that you'll be blasted one night or another. Please don't drink and drive. If you need a cab, here are the numbers you can contact in order to grab a taxi from downtown.
Yellow Cab: (604) 681-1111
Black Top Cab: (604) 731-1111
MacLure's Cabs: (604) 831-1111
Also, a note for people from outside of Vancouver: the cab drivers in this city are notorious for being hard to deal with at times. Broken debit machines, cash up front, not providing receipts. Use your common sense to get you through pushy cabbies. If they have a broken debit machine and they are still driving, kindly reject them and give your business to another cabbie that will. UbeLyft will be here soon and karma will bite them back.
If at anytime you are in an emergency and don't know what to do, please DM me and I will provide my contact info.

FOOD

Vancouver is a glutenous paradise of places to eat. Instead of giving you specific places to go eat, here are some links that you might find helpful in terms of recommendations:
Meowjin's Guide to TI8
The 38 Essential Vancouver Restaurants
It's To Die For List
This is not confirmed at the moment, but if the rules were anything like Seattle, you will be able to bring outside food into the arena. You are not permitted to bring liquids into the venue. You'll have to dump out your water bottle and refill it once inside. Rogers Arena might have different policies, but thankfully the venue has twice the amount of food stalls including a much more varied selection.
Everyone from Vancouver attending will hate me, but this is going to be one of the hottest tips I can give you: there is a Costco food court DIRECTLY across the street on the lower level of Rogers Arena that DOES NOT require a membership in order to buy food. It is the only Costco food court in Canada that doesn't need a membership to eat there. Hot dogs, poutine, pizza, soft drinks, ice cream and it's all lovingly Costco cheap. Enjoy!

MONEY

Visa/Mastercard are widely accepted everywhere. Cards such as American Express/Discover are also accepted most places, though a few places might reject them for whatever reason (higher charge rates, issues with their machines etc..) Best case would be to make sure you have a Visa/Mastercard with you at all times as a back-up in case you run into any issues. Most places in Vancouver also allow you to use Android/Apple Pay now as well. No bitcoin though.
Well, that's entirely up to you. If you're staying the full week, a few hundred dollars in spare Canadian currency won't hurt you, especially if majority of your spending is going to be on plastic. There's going to be the Secret Shop, but that'll be done through online ordering and not cash payments. Just don't come with nothing. Worst case, always have at least $30-$40 cash on you just in case you run into a bind. It's really entirely up to you and how you plan on spending your time here. Do note that because of the low Canadian dollar, don't be surprised if the price of certain things is higher than usual.
By far it would be the Vancouver Bullion & Currency Exchange due to their lower exchange rates. Banks will more than likely charge you higher rates than the VBCE.

ETIQUETTE

Due to the amount of fires that have started in the Pacific North West the past month or so, please do not throw your cigarette/joint butts into the street, sidewalk, bushes or wherever that isn't a proper garbage. You'll get a ton of dirty looks by locals if you do otherwise.
Canadians are known to be rather polite, we'll answer questions for you or guide you in the right direction (as long as we aren't in a huge rush). As long as you're respectful of the people around you, take care of your hygiene, don't spit on the ground, talk over people in conversation or just avoiding being a total dick, you'll be fine. Though Vancouver is a somewhat socially cold city, that's mainly in dating circles. Get some new Bumble photos up!
Most places won't have the tip included in your bill. It's common courtesy to tip between %10-%15 of your final bill if you enjoyed your meal/drink/service. Feel free to go higher if you had a really excellent time. Some places do include the tip in the bill, but will have it noted usually at the bottom of the menu.
A few. Remove your backpack when you're boarding a bus/SkyTrain in order to create more space for the people around you. Hygiene again is a big one. Remember to fill your Compass card and check your remaining balance at least once a day in case you're transiting a lot. If you see elderly/disabled/parents with strollers attempt to come on board, the polite thing to do would be to offer your seat etc..
Don't worry at all! Vancouver is an extremely multicultural city and the residents here are used to hearing many different languages daily. Best bet is if you struggle communicating with anyone for any reason, download the Google Translate app and use it to answer questions you might have in a discussion.
Use common sense. Most players/talent would be more than willing to sign an autograph or pose for a photo with you. But also be aware that much of the on-screen talent (Slacks, Kaci, panel members) will often have to be running from segment to segment, taking in matches and so on. If they seem to have a minute, ask nicely, thank them for their time and cross one off of the bucket list.
Don't throw things at Slacks.

THE ARENA

No update on this. Rogers Arena is mainly a concrete concourse, surrounded by a viaduct and multiple lower roads. Unlike Seattle Center (which had multiple fields and smaller available venues), the only place large enough outside the Arena that could hold a large crowd with a big screen would most likely be the "main" entrance through Expo Blvd/Pat Quinn Way. There are a few other options in the area, but we're going to have to wait to see how creative Valve is with the space around the Arena. Perhaps they rent out the adjacent parking lots?
No update on this also, but again, there's a lack of outdoor space beyond the concrete concourse. Sportsbar Live will be open, which also gives a view of inside the Arena while you're eating/drinking. But again, it's indoors.
From what I remember from Canucks games, yes, there are stations where you can plug your phone in to charge. But don't be surprised if a company like NVIDIA pops up a charging station outside much like in Seattle.
18,630.
One of the more obvious differences that most people will find from Key Arena to Rogers Arena, is that unlike Key Arena, Rogers doesn't have an open space concept between levels. Meaning, you won't be able to just look up to the third floor and see players hanging out like you normally would. This year, they most likely will be held in the boxes above or in the dressing rooms in the lower levels. Look for autograph times scheduled throughout the week to see your favorite players.
The only thing right now is a Vancouver Whitecaps (MLS) game on August 18th and a BC Lions (CFL) on the 25th. So if you really feel inclined, now you know.

WEED

When: On October 17th, weed will officially be legalized in British Columbia and most parts of Canada.
How: Normally you need a medicinal prescription to purchase marijuana legally. Though, because of the soon to be legalization coming up in a few months, most dispensaries will most likely write you a prescription if you tell them a valid medical reason for the marijuana (Trouble sleeping, chronic joint pain, back pain, headaches, trouble eating etc.). My friends who smoke themselves told me that hot tip, so do with it what you will. Please DO NOT buy weed from a source that isn't verified by another trusted person or a licensed dispensary. You never know what your weed could be laced with.
Where: Here are some dispensaries located close to Rogers Arena.
Bloom Medical Dispensary
The Dub Dispensary
The Medical Cannibis Dispensary
You can't smoke anywhere that frequents children, even if there aren't kids around. So no beaches, public parks, playgrounds etc..
So just, anywhere that's away from people that don't want to partake essentially.
????????????

TICKETS

If you weren't able to buy tickets from Ticket Master, you have a few options.
Post in the TI8 Vancouver Subreddit and ask if anyone has a spare ticket.
Buying tickets from scalpers in front of Rogers Arena is fairly easy and shouldn't be difficult if you understand the basics of haggling.
  1. Know what you're comfortable paying and stick to it. Always remember that number.
  2. Be prepared to just walk away. The longer you stay negotiating, the more you show the scalper how important it is for you to buy the tickets. Play the long game.
  3. The less you talk, the less information you give the scalper. If he says he's got a Midweek ticket for $300, shrug and say no thanks.
  4. Have money in your hand/wallet when you're trying to buy tickets. When they see that the cash is right there, they'll be more inclined to just make the deal and move onto the next one.
You will most likely miss the opening ceremonies, but after that the prices for Midweek tickets will normalize and scalpers will want to just get rid of their tickets at a lesser price.
The advantage you have in this instance is that Vancouver, outside of the LoL tournament at Pacific Colosseum, doesn't have much experience with esports tournaments. So scalpers themselves won't have the same level of patience. The longer you wait to buy your tickets from them, the cheaper you can get them for. Only downside is that you'll be missing games.
The other thing you can do is literally just walk around the outside of the Arena and spot non-scalpers with extra tickets. There are always people who buy extra tickets and are just wanting to get their money back (friends flake on them, they couldn't flip them like they thought).
DO NOT panic and end up buying an overpriced ticket from StubHub, Craigslist or wherever. Tickets will be available, you just have to keep your cool.
The box office at Rogers Arena is located at the bottom of the venue on Expo/Pat Quinn Way at the Toyota Ticket Center. You can pick up your tickets between these times:
Mon, August 20th: 7AM - 9PM
Tue, August 21th: 8AM - 9PM
Wed, August 22nd: 8AM - 9PM
Thu, August 23rd: 8AM - 9PM
Fri, August 24th: 8AM - 9PM
Not sure about the box office times for the Finals. Will update that when I know.

FIRST TIME ATTENDING TI

So first off, understand that EVERYONE there is going for the same reason you are, DOTA. Don't be afraid to go up to people, say hello and start conversations. If they shrug you off, fuck them, they don't deserve your brilliance. Enjoy yourself. Worst case, just create a thread on DOTA saying that you want to go shotgun a few beers. My first TI was pretty much by myself, but the combination of a beer + a garden really did wonders.
Simply put, don't worry as much as your mind is telling you to worry. All the talent (casters/players) are incredibly friendly and are pretty much the same as us, just super stoked to be there. But do give them space if they're working or running around to the next thing.
During TI, after every First Blood in a match, there are potential drops given to in arena attendee's who have registered their badge with their Steam ID. There will be a Steam Link kiosk/section OUTSIDE of Rogers Arena, so look out for it. You must have tapped into the Arena in order to be eligible for those drops.
The link to register your badge to be eligible for these drops will be on the back of your badge when you receive it.
Try to pack as lightly and efficiently as possible. My two main staples during the last two TI's were a water bottle (usually given out in a goody bag for midweek + finals ticket holders) and a portable battery pack for my phone. Also know that you might buy things from the Secret Shop, do some shopping downtown and the last thing you want to do is carry that stuff around with you all day. Though consider bringing a sweater for inside the Arena, as Rogers is a fairly cold one.
HOT TIP
Try checking with bell boys/concierge at any hotels if they can possibly check in some of your bags for you. I tried this at TI7 and was surprised how chill they were. I left them a $5 tip for taking my bags and was free for the rest of the day.
Avoid the Secret Shop on the first day or else you'll just spend the entire day waiting in line. Midweek the shop lines will be much more reasonable.

MISC

Well formatted thread to get you started.
Also a well-detailed Google Map of venues/places that should interest people attending TI for places all across Vancouver
Depending on your situation, here are numbers for emergencies in British Columbia.
Ambulance, fire, police: 911
Poison Control: Lower Mainland: 604-682-5050 Toll-free: 1-800-567-8911
Healthlink BC: 811 Deaf or Hearing Impaired: 711
Crisis Intervention & Suicide Prevention: Call 1-800-SUICIDE (1-800-784-2433) if you are considering suicide or are concerned about someone who may be.
Mental health support: Call 310-6789 (no need to dial area code) for emotional support, information and resources specific to mental health.
That is Roger Neilson, former Vancouver Canucks head coach and the inventor of towel power. Please treat it nicely!
Right here.
How sweet of you to ask! That would be Lush by Snail Mail.
Please, if you feel like you need to ask any questions, or there should be things added to this FAQ, post here or DM me. There are obviously some things that no one knows right now in regards to potential additions or subtractions from moving the event from Key Arena to Rogers. But I'll try my best to keep this thing updated if people bookmark it for future use.
Enjoy planning your trip to TI!
submitted by Arashie to DotA2 [link] [comments]

The biggest cryptocurrency thefts in the last 10 years

In this article, we will try to remember all the major theft of cryptocurrencies over the past 10 years.
1. Bitstamp $5.3 mln (BTC), January 4th, 2015
On January 4, 2015, the operational hot wallet of Bitstamp announced that it was hacked by an anonymous hacker and 19,000 Bitcoins (worth of $5 million) were lost.
The initiation of the attack fell on November 4, 2014. Then Damian Merlak, the CTO of the exchange, was offered free tickets to punk rock festival Punk Rock Holiday 2015 via Skype, knowing that Merlak is interested in such music and he plays in the band. To receive the tickets, he was asked to fill out a participant questionnaire by sending a file named “Punk Rock Holiday 2015 TICKET Form1.doc”. This file contained the VBA script. By opening the file, he downloaded the malware on his computer. Although Merlak did not suspect wrong and has opened the "application form", to any critical consequences, this did not open access to the funds of exchange.
The attackers, however, did not give up. The attack continued for five weeks, during which hackers presented themselves as journalists, then headhunters.
Finally, the attackers were lucky. On December 11, 2014, the infected word document was opened on his machine by Bitstamp system administrator Luka Kodric, who had access to the exchange wallet. The file came to the victim by email, allegedly on behalf of an employee of the Association for computer science, although in fact, as the investigation showed, the traces of the file lead deep into Tor. Hackers were not limited to just one letter. Skype attacker pretending to be an employee of the Association for computing machinery, convinced that his Frame though to make international honor society, which required some paperwork. Kodric believed.
By installing a Trojan on Kodriс's computer hackers were able to obtain direct access to the hot wallet of the exchange. The logs show that the attacker, under the account of Kodric, gained access to the server LNXSRVBTC, where he kept the wallet file.dat, and the DORNATA server where the password was stored. Then the servers were redirected to a certain IP address that belongs to one of the providers of Germany.
There are still no official reports of arrests in this case. Obviously, the case is complicated by the fact that the hackers are outside the UK, and the investigation has to cooperate with law enforcement agencies in other countries.
2. GateHub $9.5 mln (XRP), June 1th, 2019
Hackers have compromised nearly 100 XRP Ledger wallets on cryptocurrency wallet service GateHub. The incident was reported by GateHub in a preliminary statement on June 6.
XRP enthusiast Thomas Silkjær, who first noticed the suspicious activity, estimates that the hackers have stolen nearly $10 million worth of cryptocurrency (23,200,000 XRP), $5.5 million (13,100,000 XRP) of which has already been laundered through exchanges and mixer services.
GateHub notes that it is still conducting an investigation and therefore cannot publish any official findings. Also, GateHub advises victims to make complaints to the relevant authorities of their jurisdiction.
3. Tether, $30.9 mln (USDT), November 19th, 2017
Tether created a digital currency called "US tokens" (USDT) — they could be used to trade real goods using Bitcoin, Litecoin and Ether. By depositing $1 in Tether, the user received 1 USD, which can be converted back into fiat. On November 19, 2017, the attacker gained access to the main Tether wallet and withdrew $ 30.9 million in tokens. For the transaction, he used a Bitcoin address, which means that it was irreversible.
To fix the situation, Tether took action by which the hacker was unable to withdraw the stolen money to fiat or Bitcoin, but the panic led to a decrease in the value of Bitcoin.
4. Ethereum, $31 mln (ETH), July 20th, 2017
On July 20, 2017, the hacker transferred 153,037 Ethers to $31 million from three very large wallets owned by SwarmCity, Edgeless Casino and Eternity. Unknown fraudster managed to change the ownership of wallets, taking advantage of the vulnerability with multiple signatures.
First, the theft was noticed by the developers of SwarmCity.
Further events deserve a place in history: "white hackers" returned the stolen funds, and then protected other compromised accounts. They acted in the same way as criminals, who stole funds from vulnerable wallets — just not for themselves. And it all happened in less than a day.
5. Dao (Decentralized Autonomous Organization) $70 mln (ETH), June 18th, 2016
On June 18, 2016, members of the Ethereum community noticed that funds were being drained from the DAO and the overall ETH balance of the smart contract was going down. A total of 3.6 million Ether (worth around $70 million at the time) was drained by the hacker in the first few hours. The attack was possible because of an exploit found in the splitting function. The attackes withdrew Ether from the DAO smart contract multiple times using the same DAO Tokens. This was possible due to what is known as a recursive call exploit.
In this exploit, the attacker was able to "ask" the smart contract (DAO) to give the Ether back multiple times before the smart contract could update its own balance. There were two main faults that made this possible: the fact that when the DAO smart contract was created the coders did not take into account the possibility of a recursive call, and the fact that the smart contract first sent the ETH funds and then updated the internal token balance.
It's important to understand that this bug did not come from Ethereum itself, but from this one application that was built on Ethereum. The code written for the DAO had multiple bugs, and the recursive call exploit was one of them. Another way to look at this situation is to compare Ethereum to the Internet and any application based on Ethereum to a website: if a website is not working, it doesn't mean that the Internet is not working, it simply means that one website has a problem.
The hacker stopped draining the DAO for unknown reasons, even though they could have continued to do so.
The Ethereum community and team quickly took control of the situation and presented multiple proposals to deal with the exploit. In order to prevent the hacker from cashing in the Ether from his child DAO after the standard 28 days, a soft-fork was voted on and came very close to being introduced. A few hours before it was set to be released, a few members of the community found a bug with the implementation that opened a denial-of-service attack vector. This soft fork was designed to blacklist all the transactions made from the DAO.
6. NiceHash, 4736.42 (BTC), December 6th, 2017
NiceHash is a Slovenian cryptocurrency hash power broker with integrated marketplace that connects sellers of hashing power (miners) with buyers of hashing power using the sharing economy approach.
On December 6, 2017, the company's servers became the target of attack. At first, Reddit users reported that they could not access their funds and make transactions — when they tried to log in, they were shown a message about a service interruption. In the end, it became known that the service had undergone a major cyberattack and 4736,42 Bitcoins disappeared without a trace.
Despite heavy losses, NiceHash was able to continue working, but CEO and founder Marco Koval resigned, giving way to a new team. The company managed to maintain the trust of investors and began to strengthen the protection of its systems.
7. Mt.Gox, 850000 (BTC), June 19th, 2011
The Hacking Of Mt.Gox was one of the biggest Bitcoin thefts in history. It was the work of highly professional hackers using complex vulnerabilities.
A hacker (or a group of hackers) allegedly gained access to a computer owned by one of the auditors and used a security vulnerability to access Mt.Gox servers, then changed the nominal value of Bitcoin to 1 cent per coin.
Then they brought out about 2000 BTC. Some customers, without knowing it, conducted transactions at this low price, a total of 650 BTC, and despite the fact that the hacking hit the headlines around the world, no Bitcoin could be returned.
To increase investor confidence, the company has compensated all of the stolen coins, placed most of the remaining funds in offline storage, and the next couple of years was considered the most reliable Bitcoin exchanger in the world.
However, it was only an illusion of reliability.
The problems of the organization were much more serious, and the management probably did not even know about them.
CEO of Mt.Gox, Mark Karpeles, was originally a developer, but over time he stopped delving into technical details, basking in the rays of glory — because he created the world's largest platform for cryptocurrency exchange. At that time Mt.Gox handled over 70% of all Bitcoin transactions.
And, of course, there were those who wanted to take advantage of the technological weakness of the service. At some point, hackers made it so that Bitcoins could be bought at any price, and within minutes millions of dollars worth of coins were sold — mostly for pennies. World prices for Bitcoin stabilized in a few minutes, but it was too late.
As a result, Mt.Gox lost about 850,000 Bitcoins. The exchange had to declare bankruptcy, hundreds of thousands of people lost money, and the Japanese authorities arrested CEO Mark Karpeles for fraud. He pleaded not guilty and was subsequently released. In 2014, the authorities restored some of the Bitcoins remaining at the old addresses, but did not transfer them to the exchange, and created a trust to compensate for the losses of creditors.
8. Coincheck, $530 mln, January 26th, 2018
The sum was astonishing, and even surpassed the infamous Mt.Gox hack.
While Mt.Gox shortly filed for bankruptcy following the hack, Coincheck has surprisingly remained in business and was even recently approved as a licensed exchange by Japan’s Financial Services (FSA).
Coincheck was founded in 2014 in Japan and was one of the most popular cryptocurrency exchanges in the country. Offering a wide variety of digital assets including Bitcoin, Ether, LISK, and NEM, Coincheck was an emerging exchange that joined the Japan Blockchain Association.
Since Coincheck was founded it 2014, it was incidentally not subject to new exchange registration requirements with Japan’s FSA — who rolled out a framework after Mt. Gox –, and eventually was a contributing factor to its poor security standards that led to the hack.
On January 26th, 2018, Coincheck posted on their blog detailing that they were restricting NEM deposits and withdrawals, along with most other methods for buying or selling cryptocurrencies on the platform. Speculation arose that the exchange had been hacked, and the NEM developers issued a statement saying they were unaware of any technical glitches in the NEM protocol and any issues were a result of the exchange’s security.
Coincheck subsequently held a high-profile conference where they confirmed that hackers had absconded with 500 million NEM tokens that were then distributed to 19 different addresses on the network. Totaling roughly $530 million at the time — NEM was hovering around $1 then — the Coincheck hack was considered the largest theft in the industry’s history.
Coincheck was compelled to reveal some embarrassing details about their exchange’s security, mentioning how they stored all of the NEM in a single hot wallet and did not use the NEM multisignature contract security recommended by the developers.
Simultaneously, the NEM developers team had tagged all of the NEM stolen in the hack with a message identifying the funds as stolen so that other exchanges would not accept them. However, NEM announced they were ending their hunt for the stolen NEM for unspecified reasons several months later, and speculation persisted that hackers were close to cashing out the stolen funds on the dark web.
Mainstream media covered the hack extensively and compared it to similar failures by cryptocurrency exchanges in the past to meet adequate security standards. At the time, most media coverage of cryptocurrencies was centered on their obscure nature, dramatic volatility, and lack of security. Coincheck’s hack fueled that narrative considerably as the stolen sum was eye-popping and the cryptocurrency used — NEM — was unknown to most in the mainstream.
NEM depreciated rapidly following the hack, and the price fell even more throughout 2018, in line with the extended bear market in the broader industry. Currently, NEM is trading at approximately $0.07, a precipitous fall from ATH over $1.60 in early January.
The extent of the Coincheck hack was rivaled by only a few other hacks, notably the Mt.Gox hack. While nominally Coincheck is the largest hack in the industry’s history, the effects of Mt.Gox were significantly more impactful since the stolen funds consisted only of Bitcoin and caused a sustained market correction as well as an ongoing controversy with the stolen funds and founder. Moreover, Mt.Gox squandered 6% of the overall Bitcoin circulation at the time in a market that was much less mature than it is today.
Despite the fallout, Coincheck is now fully operational and registered with Japan’s FSA.
As practice shows, people make mistakes and these mistakes can cost a lot. Especially, when we talk about mad cryptoworld. Be careful and keep your private keys in a safe place.
submitted by SwapSpace_co to ethtrader [link] [comments]

(Updated) [Staking] Reddcoin Core client GUI wallet on a Raspberry Pi Model 3B

Intro

This thread is an update to my first Reddcoin staking tutorial that was written 7 months ago.
 
The reason for the update
My Reddcoin Core software crashed and became unusable. My Raspberry Pi 3B would lag and freeze, I couldn't stake anymore.
 
Instead of just redoing everything the same way, I wanted to see if I could improve on 3 points:
 
The updates
 
If you would like to tip me
Writing a tutorial like this takes time and effort; tips are appreciated. My Reddcoin address: RqvdnNX5MTam855Y2Vudv7yVgtXdcYaQAW.
     

Overview

 

Steps

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
     

Video

https://www.youtube.com/watch?v=Snr5e8bzftI
This video shows how long it takes to start Reddcoin Core.   TL;DR:
     

Extra

Backup
Backup your wallet to prevent losing the RDDs in your wallet! There are two methods to backup, do both. Make new backups if you create a new receiving address!
 
 
   
Boot with only 1 USB drive plugged in:
Make sure only the USB drive (with the swap partition and data partition) is plugged in when you boot up your Raspberry Pi. This to make sure the swap partition (/dev/sda1) is recognized correctly.   If you boot up with multiple USB drives, Lubuntu might see the USB drive with the swap partition as the second drive (instead of the first drive), and ignore the 2 GB swap partition. If this happens, starting Reddcoin can render the Raspberry Pi unresponsive.
   
Connection issues If you have issues syncing the blockchain because you have 0 network connections, please follow the instructions in this thread.
   
Start Reddcoin Core easier
Run a shell script (.sh file), so you can start Reddcoin just by double clicking on an icon on your Desktop.
   
Minimization options
Adjust minimization options, so you can safely press on the X button (the close/exit button on the upper right corner).
   
RealVNC VNC Viewer (client) and VNC Connect (server): To remote connect to the Raspberry Pi, I use VNC Viewer ad VNC Connect from RealVNC.
 
   
Chromium as browser: The updates break Firefox, the browser crashes when you try to run it. Install another browser, Chromium, to solve this issue.