Forum Home
    • Register
    • Login
    • Search
    • Recent
    • Tags
    • Popular

    Information on attacks

    Feathercoin Discussion
    54
    204
    118268
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P
      Piedaddy last edited by

      [quote name=“spynappels” post=“11864” timestamp=“1370813941”]
      All my miners have dropped off FCPool now, although their website is up. Anyone else having problems with them? Wonder if they’re being DDoSed, as they’ve always been rock stable before for me…
      [/quote]

      Yes mine say slow or invalid users but blocks are being confirmed and paid

      1 Reply Last reply Reply Quote 0
      • S
        svennand Regular Member last edited by

        Hashrate at 2,2ghash/s
        Another attack or just really popular coin?

        1 Reply Last reply Reply Quote 0
        • T
          Tuck Fheman last edited by

          With FTC off of Coinchoose (apparently) and/or CC getting DDoS’d that would not be a good thing.

          1 Reply Last reply Reply Quote 0
          • G
            gen last edited by

            Just wondering who are doing all the attacks? Anti-FTC group? seems like they are doing the attack at important change of events (the hard fork@33000) and now the new lower diff.

            I am just guessing :

            What is the objective of doing the attacks?

            to prove or to make a point that the particular currency isn’t safe/stable that it can be attacked, creating a fear and losing trust.
            to prevent the particular currency from gaining popular foothold.

            Who will benefit from the attacks.

            1. Banks or Government that doesn’t want want a crypto currency.
            2. other currency holder that only wants their own currency success by trying to kill off others.
              (eg, BTC fanboys wants to kill LTC, LTC wants to kill FTC… etc…)
            3. someone who just wants to prove a point… hmm…

            for group 1, not likely, they would want to hit the big boys which should be BTC, why hit FTC?

            for group 2, very possible, in fighting happens alot of time in history.

            for group 3. may also belongs to the group 2, but with a heart for doing things they feel right.

            All of the above are just speculation.

            1 Reply Last reply Reply Quote 0
            • D
              deeltje last edited by

              https://bitcointalk.org/index.php?topic=230308.0;all

              Interesting read

              1 Reply Last reply Reply Quote 0
              • J
                justabitoftime last edited by

                If the value of Feathercoin was left up to a few guys chatting it up on a message board, we’d all be screwed. :)

                1 Reply Last reply Reply Quote 0
                • M
                  Mogumodz last edited by

                  I vote the attacker was bored.

                  1 Reply Last reply Reply Quote 0
                  • E
                    Entimp Regular Member last edited by

                    Are there any protocols in development that could prevent 51% control of a coin?

                    1 Reply Last reply Reply Quote 0
                    • ghostlander
                      ghostlander Regular Member last edited by

                      [quote name=“Entimp” post=“12301” timestamp=“1370858190”]
                      Are there any protocols in development that could prevent 51% control of a coin?
                      [/quote]

                      Install v0.6.4.1 of the client with checkpoints introduced.

                      [url=https://forum.feathercoin.com/index.php?topic=1525.0]Feathercoin 0.6.4.1 Released - Checkpoints Added[/url]

                      1 Reply Last reply Reply Quote 0
                      • R
                        Radacoin last edited by

                        The problem of FTC and all the other scrypt based coins is that they use an identical hashing algorithm.

                        How about we [i]slightly[/i] modify this algorithm, to make it impossible for attackers to simply switch an LTC, WDC, CNC,etc. pool to FTC?
                        Plus create a fork of cgminer - or talk to ckolivas to include our new hashing algorithm in cgminer.

                        1 Reply Last reply Reply Quote 0
                        • zerodrama
                          zerodrama Regular Member last edited by

                          [quote name=“Radacoin” post=“12314” timestamp=“1370859787”]
                          The problem of FTC and all the other scrypt based coins is that they use an identical hashing algorithm.

                          How about we [i]slightly[/i] modify this algorithm, to make it impossible for attackers to simply switch an LTC, WDC, CNC,etc. pool to FTC?
                          Plus create a fork of cgminer - or talk to ckolivas to include our new hashing algorithm in cgminer.
                          [/quote]

                          No. Because they would have the hashrate anyway and could just get the new miner.

                          Hashrate power is not the problem. Surprise hashrate power is the problem. Merged mining would be a boost to FTC if we got it.

                          1 Reply Last reply Reply Quote 0
                          • R
                            Radacoin last edited by

                            [quote name=“zerodrama” post=“12434” timestamp=“1370875079”]
                            [quote author=Radacoin link=topic=853.msg12314#msg12314 date=1370859787]
                            The problem of FTC and all the other scrypt based coins is that they use an identical hashing algorithm.

                            How about we [i]slightly[/i] modify this algorithm, to make it impossible for attackers to simply switch an LTC, WDC, CNC,etc. pool to FTC?
                            Plus create a fork of cgminer - or talk to ckolivas to include our new hashing algorithm in cgminer.
                            [/quote]

                            No. Because they would have the hashrate anyway and could just get the new miner.
                            [/quote]

                            Wait! Do you think an individual / group can put something like 500 MH/s at FTC?

                            I thought it’s maybe a rogue pool operator (or a group of pool operators) that redirect hashes from LTC, WDC, DGC, etc. to attack FTC.

                            I mean for a big LTC pool with 2000 MH/s, redirecting 500 MH/s for 1/2 days or so isn’t that much of a problem. Many people won’t notice they got paid out 15% less on a specific day. And the pool operator can always say it was temporary problems with the pool software, an update that took longer than expected … something like that.

                            We are looking for

                            • someone that has the hashing power
                            • someone that suffers if LTC looses miners / supporters / value.

                            imho one of the big LTC pool operators is behind this attack.

                            1 Reply Last reply Reply Quote 0
                            • zerodrama
                              zerodrama Regular Member last edited by

                              [quote name=“Radacoin” post=“12440” timestamp=“1370876123”]
                              [quote author=zerodrama link=topic=853.msg12434#msg12434 date=1370875079]
                              [quote author=Radacoin link=topic=853.msg12314#msg12314 date=1370859787]
                              The problem of FTC and all the other scrypt based coins is that they use an identical hashing algorithm.

                              How about we [i]slightly[/i] modify this algorithm, to make it impossible for attackers to simply switch an LTC, WDC, CNC,etc. pool to FTC?
                              Plus create a fork of cgminer - or talk to ckolivas to include our new hashing algorithm in cgminer.
                              [/quote]

                              No. Because they would have the hashrate anyway and could just get the new miner.
                              [/quote]

                              Wait! Do you think an individual / group can put something like 500 MH/s at FTC?

                              I thought it’s maybe a rogue pool operator (or a group of pool operators) that redirect hashes from LTC, WDC, DGC, etc. to attack FTC.

                              I mean for a big LTC pool with 2000 MH/s, redirecting 500 MH/s for 1/2 days or so isn’t that much of a problem. Many people won’t notice they got paid out 15% less on a specific day. And the pool operator can always say it was temporary problems with the pool software, an update that took longer than expected … something like that.

                              We are looking for

                              • someone that has the hashing power
                              • someone that suffers if LTC looses miners / supporters / value.

                              imho one of the big LTC pool operators is behind this attack.
                              [/quote]

                              Or a rogue pool that isn’t even listed.

                              1 Reply Last reply Reply Quote 0
                              • A
                                ASDASDASD last edited by

                                Successful attack was successful. Difficulty just went down when it was supposed to rise.

                                1 Reply Last reply Reply Quote 0
                                • R
                                  RIPPEDDRAGON Regular Member last edited by

                                  [quote name=“ASDASDASD” post=“12469” timestamp=“1370877475”]
                                  Successful attack was successful. Difficulty just went down when it was supposed to rise.
                                  [/quote]

                                  unless the system is completely broken the system will adjust the diff back up in a few hours

                                  1 Reply Last reply Reply Quote 0
                                  • A
                                    attacker last edited by

                                    :)

                                    1 Reply Last reply Reply Quote 0
                                    • R
                                      Radacoin last edited by

                                      [quote name=“zerodrama” post=“12445” timestamp=“1370876497”]
                                      Or a rogue pool that isn’t even listed.
                                      [/quote]

                                      I don’t believe in conspiracy theories, secret societies - and “unlisted pools”. People always have the need to talk. Can’t keep such things secret.

                                      1 Reply Last reply Reply Quote 0
                                      • Bushstar
                                        Bushstar last edited by

                                        [quote name=“ASDASDASD” post=“12469” timestamp=“1370877475”]
                                        Successful attack was successful. Difficulty just went down when it was supposed to rise.
                                        [/quote]

                                        This was really nifty how they did this.

                                        It took less than than the target time to get to the next difficulty adjust so the difficulty should have gone up. Because the attacker overwrote the starting block with one from a day before it looked to the network like it took an extra day. This made the difficulty go down.

                                        This is the first time that I have ever seen this sort of attack. We currently have an unexpected easy batch of coins to mine. Perhaps this is the attackers way of compensating miners for the orphaned blocks :)

                                        Donate: 6hf9DF8H67ZEoW9KmPJez6BHh4XPNQSCZz

                                        1 Reply Last reply Reply Quote 0
                                        • T
                                          Tuck Fheman last edited by

                                          [quote name=“Bushstar” post=“12504” timestamp=“1370891673”]
                                          This was really nifty how they did this.

                                          It took less than than the target time to get to the next difficulty adjust so the difficulty should have gone up. Because the attacker overwrote the starting block with one from a day before it looked to the network like it took an extra day. This made the difficulty go down.

                                          This is the first time that I have ever seen this sort of attack. We currently have an unexpected easy batch of coins to mine. Perhaps this is the attackers way of compensating miners for the orphaned blocks :)
                                          [/quote]

                                          I tried to say it yesterday (it was not received well) but you said it far better than I.

                                          1 Reply Last reply Reply Quote 0
                                          • M
                                            meetrat1 last edited by

                                            Haha well, the attacker(s) helped get us a lot of attention, now we must capitalize on that attention. Plus, they have not achieved their goal, Feathercoin is still alive and kicking.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post