New difficulty factor 244.213223092 +35% I updated the first post. date, difficulty factor, % change 2009 1.00 30/12/2009 1.18 +18% 11/01/2010 1.31 +11% 25/01/2010 1.34 +2% 04/02/2010 1.82 +36% 14/02/2010 2.53 +39% 24/02/2010 3.78 +49% 08/03/2010 4.53 +20% […]
Read moreCategory: Bitcoin Talk
Re: Bitcoin x86 for Windows
Quote from: Olipro on July 26, 2010, 13:04:41 Crypto++ 5.6.0: http://www.cryptopp.com/ Cached SHA256: http://pastebin.com/rJAYZJ32 (although I’m pretty sure this is publically submitted elsewhere, I was linked to it on IRC) I added the cached SHA256 state idea to the SVN, rev 113. The speedup is about 70%. I credited it […]
Read moreRe: Bitcoin x64 for Windows
Quote from: Olipro on July 26, 2010, 06:39:17 Credit to tcatm for the caching part of the SHA context – this offers absolutely brilliant performance. Additionally, the Intel compiler really comes into its own here as its parallelisation abilities give a massive performance boost over Visual Studio. Performance: 4700khash/s on […]
Read morebitcoind without wxWidgets
I replaced the last of the few wxBase dependencies in bitcoind. bitcoind now compiles without wxWidgets or wxBase in SVN rev 112. main(int argc, char* argv[]) is added to init.cpp. CMyApp and the Startup folder stuff are moved to ui.cpp. ui.cpp and uibase.cpp aren’t linked by bitcoind. The makefiles have […]
Read moreRe: Stealing Coins
So the way I read it. Given two numbers p and q. Which for RSA are supposed to be large primes. Then n = p*q The public key is the two fields (n, e). e is called the public exponent and appears to be chosen from a set of common […]
Read moreRe: md5?
I don’t seem to be able to find any md5s for your code downloads. Is it just me, or are there none? For future reference, here’s my public key. It’s the same one that’s been there since the bitcoin.org site first went up in 2008. Grab it now in case […]
Read moreRe: JSON-RPC password
Quote from: gavinandresen on July 25, 2010, 21:38:19 Great catch! Simpler fix is to specify the BIO_FLAGS_BASE64_NO_NL in the rpc.cpp/EncodeBase64 function SVN rev 111 Related posts: Re: JSON-RPC password Quote from: gavinandresen on July 21, 2010, 12:11:10 I just… Re: JSON-RPC password Quote from: gavinandresen on July 23, 2010, 15:11:45 […]
Read moreRe: JSON-RPC password
Quote from: BitLex on July 25, 2010, 20:45:38 i got some problems here too trying to get this run on PHP. so far i had no luck, neither the wiki-sample (jsonRPCClient trying to fopen(http://username:password@localhost:8332/)), nor my curl-sample (using setopt CURLOPT_HTTPAUTH, CURLAUTH_BASIC) seem to work. That’s strange, didn’t someone just say […]
Read moreRe: JSON-RPC password
Quote from: lachesis on July 25, 2010, 19:52:35 I found what appears to be a bug: with a long enough username and password combination, the base64 encoder in bitcoind produces authorization headers that look like this: Code: … Authorization: Basic YWJiYWJiYWFiYmE6aGVsbG93b3JsZGhlbGxvd29ybGRoZWxsb3dvcmxkaGVsbG93 b3JsZGhlbGxvd29ybGRoZWxsb3dvcmxk It inserts a newline every 64 characters, which […]
Read moreRe: Stealing Coins
Quote Here is a paper that claims to find SHA-1 collisions in 2^52 crypto operations. And optimally secure hash would take 2^80 operations. 2^52 time is still large, but it is getting into cluster and botnet range. 2^80 is if you can use a birthday attack. You can’t use a […]
Read more