uTalk

Official forum for Utopia Community

You are not logged in.

#76 Re: General Discussion » mobile app. When? » 2021-09-20 13:11:26

Pirat;628 wrote:
Makedonskiy;622 wrote:

soon. Im sure.

at next few months?

this question is better addressed to 1984

#77 Re: Channels and Groups » Russian about russians » 2021-09-20 12:27:36

youtube;610 wrote:

"...they know about Russia that people live in it, and even Russian people, but what kind of people? This is still a mystery, although, however, the Europeans are sure that they have long comprehended us ... "
Fyodor Dostoevsky

in fact, everything is simple. A proper Russian person is something between an Arab and a European. With the mentality of both groups.

#80 Re: Developer Thread » Idea: Build a social network in Utopia » 2021-09-20 09:19:36

a good idea. An uncensored social network is what we need!

#82 Re: Questions and Help » Why may wallet show 0 CRP » 2021-09-20 09:12:03

I also encountered it. At that time it was a network problem, now everything is fine.

#83 General Discussion » Exploring the potential of gambling » 2021-09-20 08:47:41

Makedonskiy
Replies: 15

Good morning

As you know (if you don't already know, welcome to the NEWS channel), for more than a year I have been conducting "Utopian Roulette", where you don't need to place bets at your own expense, the prize fund is provided by the organizer.

How about making roulette really a gambling game? Are there many people who want to take a risk?

If you would participate in a gambling game where the prize fund is formed from the contributions of participants, write in the topic!

By the activity in the topic, I will understand how timely the transition to the next stage of the event will be, which has already become familiar

#84 Re: Utopia Guides » Docker-mining on dedicated servers. » 2021-09-20 08:39:09

indeed, a lot of work has been done. Docker is an ASIC for utopia, it is difficult, but the output performance exceeds all expectations

#85 Re: Crypton Purchase, Sale and Exchange » Crypton Exchange - Native trading experience with Utopia » 2021-09-20 08:33:02

Are there any additional trading pairs planned for the future? The exchange does not have KYC, which makes it unique.

Recently, there has been a tendency to introduce KYC even in countries with a very liberal banking regime.

#86 Re: Mining and Proof-of-Stake » Having problems starting mining bot (UAM)? » 2021-09-20 08:28:03

often users run into a double NAT. This is when neither your own router nor the provider's side has taken the necessary measures.

Or, when they forget to enable replication and bridging on the virtual machine, with the inability to enable upnp on the router.

We forgot to add that a good router of at least the microtic or kinetic level is needed for successful network support

#87 Re: Official Announcements » Utopia launches fully anonymous currency soft-pegged to the US Dollar » 2021-09-20 08:20:32

good step. TUSD recently fell in love with blocking accounts, no anonymity

#88 Channels and Groups » UJOB » 2021-07-19 08:13:54

Makedonskiy
Replies: 129

We are pleased to present you a channel for those looking for earnings or personnel for organizations! Ad placement is free of charge!

Channel ID: 87C51128F43D87E4F9613474E5DCCCF5

For all questions, you can contact me in private messages using the public key: 4FB62131A403EE7D00C0ECAA85D68A6F8C21B717023B45EF8B26F81C03DF1A18

The rules of the channel are simple: do not flood. For free communication, a warning is issued for the first time, and a block is issued for the second time. Ads only!

Sample for submitting an application:

- The name of the organization, channel, website – the name of the structure where workers are required
- Vacant position
- The essence and meaning of the work/job responsibilities
- Requirements for the applicant (mandatory/desirable)
- The form of remuneration/amount. Preference is given to payment in the CRP, but you are free to choose any form of it
- Contacts for feedback (ONLY WITHIN THE UTOPIA ECOSYSTEM, please, exchange social networks and other things in personal messages)
The template for filling out the application is located in the first message of the channel. If you didn't find it, it's okay, the moderator will duplicate it for you when submitting an application!

Welcome!

#89 Articles and News » Anonymity. Expensive pleasure? » 2021-02-16 15:08:37

Makedonskiy
Replies: 11

Oh, that brings me to mind. Apparently, not everyone who knows the word "anonymity" understands the word in its full sense.

So what is anonymity? The root of the word goes back to the word "noname" and its progenitors. And by name, as we know, a person can be identified, and surveillance can be organised. So it turns out that anonymity as an attribute of any action is the absence of any trace leading to the identification of the real name of its perpetrator.

Now, let's get to the subject of the monologue. How realistic is real anonymity? In what ways can a person be de-anonymised online? Which ones are most often used by law enforcement agencies, and how did famous spies fail?

For example, a group of Richard Sorge (a famous Soviet spy) was caught on a band-aided radio, at one of the points from which he was regularly sending information. And when they caught the group - they could not believe their eyes: they believed to the last that Sorge was a simple German journalist.

There are stories of how someone blabbed when drunk and one of the spies once forgot a briefcase with copies of important documents in a bar. The briefcase was opened by the special services, who were summoned to the scene and thought it might contain an explosive device.

But those were things that happened in the past. But what about today? How did they catch the owner of the famous Silk Road site?

Very simple. Ridiculously simple. Following the text of the indictment revealing the details of the operation to de-anonymise him, this was done using the usual open sources: comparing dates, activity and the very information that could be obtained. The funny thing is, the man wasn't really hiding anything, it was enough to do a lot of systematic work without involving a huge number of specialists, the more so because on linked.in this man didn't even hide that he was going to create something similar (we are talking about Silk Road).

So what is the main enemy of a person who wants to remain anonymous? The answer is simple and banal - himself. If you register at the U and choose the same nickname you have on public sites, then you can forget about anonymity once and for all: Anyone can easily google, and find your profiles in social networks and God knows where else, without resorting to special means.

Anonymity is not a set of tools. Since the main problem with anonymity is the human factor (and we all live in society), the problem is multiplied by exactly how many people are able to see you. You may be a good salesman and be incognito online, but if the barmaid at the doorway sees you driving an expensive car and doesn't know what you're doing, they will eventually become suspicious, and then you'll be reported.

The same is true for other places where you live. There is one harmful characteristic of the man: he tends to fill the vacuum of information with all sorts of speculation. If you do not fill the vacuum in time you need information, he will do it himself, or someone will do it for you, and, as you know, there are no guarantees.

Going back to the question. Anonymity is a way of thinking and therefore, a way of life. True anonymous are scouts who give themselves away (and usually everything is documented!), who knows the enemy's language perfectly well, and who lead a double or even triple life, but they too can make mistakes, and they are usually caused by human error. 

Pay close attention to detail! It's the best thing you can do to protect your information.

I hope I have been helpful.

#90 General Discussion » What is currently missing within the ecosystem? » 2021-02-11 16:18:52

Makedonskiy
Replies: 366

Share our opinions, gentlemen!

In my opinion, we need some kind of constructor that will allow even beginners in IT to make sites "on the knee".

upd: the constructor authored by the user @Tony has appeared on the network.

#91 Channels and Groups » Russian about russians » 2021-01-28 11:36:37

Makedonskiy
Replies: 46

Good day, users of the utopia ecosystem!

Being born and raised in Russia, I run the channel Russian about Russians, where I tell you everything you might be interested in about my country in English.

If you have any questions that may become topics for publications, please write in the comments.

I hope it will be interesting!

key of channel: CA3987F3743E064B1C6CB215CE73AF8D

#92 Re: General Discussion » Why do you use Utopia as a best privacy tool? » 2021-01-22 11:37:45

Easy and convenient network support. When there are many thousands of nodes, catching someone becomes a very difficult task.

#93 Re: General Discussion » Anonymity of utopia ecosystem » 2021-01-22 11:36:43

in my opinion, utopia > TOR

For a TOR, you need to contain a bunch of nodes that can't be anonymous. In the utopia ecosystem, each participant is a node, with such a scheme, you will have to suspect the first person you meet - no one will do this.

#94 Articles and News » Don't follow the rules? Then you're a potential victim! » 2021-01-19 12:50:36

Makedonskiy
Replies: 9

Despite all its simplicity, the issue needs separate coverage:

"Cryptocurrency trader robbed of $450,000 in Hong Kong".

"Recall that in December a bitcoin trader was robbed of 12 million rubles in a Moscow pub."

"The managing director of cryptocurrency exchange EXMO was kidnapped near his office in Kyiv. The robbers, wearing dark clothes and face-hiding balaclavas, forcibly dragged the blockchain specialist into a Mercedes-Benz car and drove him away in an unknown direction."

These are all excerpts from news reports in the recent past, the methods of robbery are different each time, but they all have one thing in common: the victims were either media personalities or simply not shy about openly showing off their savings. To put it simply, in Russian parlance, they were "selling their faces". Is this wise?

The answer is no, not at all. You don't reveal your fiat money schemes to anyone except trusted people, do you? So why go for a large crypto deal without taking security measures? That's just it.

The rule of thumb from the above is to never, ever, ever "shine" your actual disposable income, storage conditions, shipping details to anyone, anywhere. Don't conduct transactions from hand to hand without taking the necessary security measures, and then your chances of losing what you've gained are drastically reduced.

Second, and equally important is the viral load on the network and existing network vulnerabilities. I see three methods as the most dangerous:

1.    Theft of coins through software that substitutes the contents of the buffer while copying the wallet address. I.e., when you copy the wallet address, the program replaces the address at the moment of "paste" operation, and your coins will go to another address.
2.    making transfers via open Wi-Fi networks. This is what they are: the traffic can always be monitored. Beware of such places, especially if you visit some expensive places.
3.    Phishing sites. They are like Chinese copies of real sites - transfer any funds to the addresses listed there, and you can forever say goodbye to the amount transferred.

What are your thoughts on the above?

Rule one: get in the habit of using official applications on the gadget or computer that is involved in the cryptocurrency exchange. Otherwise, there is a great risk of catching a bug, and after all, respect the work of the programmers (this does not apply to pirated "windows"). If you need to run something questionable - install a virtual machine. Any thumb drives that have been inserted into other computers should also be run in a virtual machine first.

Rule number two: Always check the credentials with great care. Check the address bar of your browser. There is no other way.

Rule three: only use a secure connection. No open networks, for everyone.
By following the four simple and obvious (apparently not to everyone) rules outlined above, your chances of losing your money are reduced manifold.

#95 Articles and News » Classic cryptocurrencies vs. utopia ecosystem » 2021-01-18 12:05:28

Makedonskiy
Replies: 7

Not all newcomers understand the mining system in the Utopia ecosystem. How, why, and why is it better?

Let's start by taking apart the features of classic mining:

1.    Too high hardware requirements. While ASICs are a highly specialized, high-performance solution for a narrow range of tasks, they are complex and expensive to manufacture and operate.
2.    Energy consumption. When using ASICs to support a bitcoin, etherium, etc. network, electricity costs are the lion's share of expenses.
3.    Peculiarities and nuances of "classic" cryptocurrency networks themselves. For example, the same bitcoin is bursting with many transactions: commissions can be $50 or more, making it very difficult to use it as a payment instrument.

It seemed to be just a nuance - find cheap electricity, space and everything will be fine!

However...

All of the above can not be taken out of context, our context is the economic and political situation in the world: we need to understand the trends of the 21st century so that we do not create "rubbish" (bitcoin cash, bitcoin gold, Litecoin and so on).

The main trend of the late 20th-early 21st century is the fight for ecology. There are two ways to reduce harm to the environment: the first is to reduce emissions from various industries, and the second is to optimize the consumption of the products of those industries.

It must be understood that electricity does not come from nowhere: it is the product of the combustion of hydrocarbons or the decay of atomic nuclei, and power plant equipment itself cannot be produced without emissions. There is already a huge emphasis on energy consumption, and in the future, it will be a major prerequisite and criterion for the selection of one equipment or another. Let's keep that in mind.

The next trend of the 21st century is de-globalization. And, this process is characterized by numerous political barriers, speculation on energy sources and resources - the swings around the price of oil/gas is nothing short of spectacular, and electricity, as we remember, is the product of their combustion one way or another.

What is the output? For classical mining, the situation in the future does not look good: on the one hand bans, on the other - energy shortages, on the other - imperfections in the technology of the networks themselves. Even small miners can be easily caught simply by analyzing energy consumption statistics, and the "old" cryptocurrencies cannot grow in price indefinitely either. On top of that, there is an opinion that bitcoin was created to "drain" dollar inflation into it, which would also add fuel to the fire.

Ecosystem Utopia is devoid of these problems. All at once. The energy consumption to support the network is extremely low, the network is as distributed as possible, and the commissions are low. If Greta Thunberg had any idea what she was doing - I'm sure she would approve.

Of course, all of the above is just the author's thoughts. There is always something to argue about.

#96 Articles and News » Mikrotik and Mining » 2021-01-15 09:57:35

Makedonskiy
Replies: 11

Utopia has been set up, all ticks burn green, and utopia, in turn, does not want to dial in incoming connections, even in a few days of continuous operation of the client or bots. This is the picture that routerboard users expect from the mikrotik company.

Brief summary: mikrotik - router for advanced, ideally skilled network engineers, people, allows you to manage traffic as you want. Without appropriate knowledge, it is better not to take the setup.

For our joy, there will be no special tricks associated with deviating from the default configuration of the routerboard settings. But still, there are nuances, including those related to the use of UpNp:

1.    When using UpNp, it is possible to connect to you from the outside. It is crucial to configure the firewall correctly so that you do not get unwanted patients around your neck. The fact is that routerboard can be easily turned into a hacker Noda or vpn for dark cases, so hackers of different stripes just love these routers

2.    The use of some specific technologies in traffic routing dictates special configuration requirements if you want to fully contain the master node.

Protecting the router:

1.    The first thing to do is to disable unnecessary services through which you can access the router. Click IP > Services. The correct configuration should look like this: we leave only "winbox" enabled for access, from your IP range. How to do this - can be found on the Internet, unfortunately, at this stage I did not find how to upload an image to the forum.

2.    The second, very important point is to disable the definition of your router through the service "neighbors" on the WAN. Click IP > Neighbors > Discovery settings. Personally, I have the option of defining the router within the home network, as evidenced by the inscription "LAN". Again, I sincerely apologize, without images

3.    The third and most important point is the correct firewall configuration. A default configuration is quite enough. Let's not overload the manual with screenshots, let's take the rule print out of the console, with an explanation to each rule. Console in Router OS is intuitive, if desired, there will be no difficulties to recreate the rules in GUI.

0 D ;;; special dummy rule to show fasttrack counters
      chain=forward action=passthrough
Default rule for observation. If you want, you can't do anything to him.

1 ;;; defconf: accept established, related, untracked
      chain=input action=accept connection-state=established,related,untracked
      log=no log-prefix=""
A rule that allows ALL management packets on the router itself. That's what the "Input" chain says. You can find more information on the Internet.

2 ;;; defconf: drop invalid
      chain=input action=drop connection-state=invalid log=no log-prefix=".
Rule for dropping unidentified connections. We'll talk about him separately later.

3 ;;; defconf: accept ICMP
      chain=input action=accept protocol=icmp log=no log-prefix=".
Enables ICMP packets to pass directly to the router. Simply put, it allows you to use the "ping" command to get an answer.

4 ;;; defconf: accept to local loopback (for CAPsMAN)
      chain=input action=accept dst-address=127.0.0.1 log=no log-prefix=""
Default capsule rule. Doesn't affect anything.

5 ;;; defconf: drop all not coming from LAN
      chain=input action=drop in-interface-list=!LAN log=no log-prefix=""
One of the most important. Completely forbids the router to pass control commands OUTSIDE. You can see from the descriptor that all the incoming ones that didn't come from the local network are crashing.

6 ;;; defconf: accept in ipsec policy
      chain=forward action=accept log=no log-prefix="" ipsec-policy=in,ipsec
IPsecurity policy. It doesn't affect us in any way, we can keep it.
At this point, the protection setting can be considered complete. Not the most meticulous option, but for a safe start of mining on microtycles is quite suitable, especially if you do not want to get into all the details.

0 D ;;; special dummy rule to show fasttrack counters
      chain=forward action=passthrough
Default rule for observation. If you want, you can't do anything to him.

1 ;;; defconf: accept established, related, untracked
      chain=input action=accept connection-state=established,related,untracked
      log=no log-prefix=""
A rule that allows ALL management packets on the router itself. That's what the "Input" chain says. You can find more information on the Internet.

2 ;;; defconf: drop invalid
      chain=input action=drop connection-state=invalid log=no log-prefix=".
Rule for dropping unidentified connections. We'll talk about him separately later.

3 ;;; defconf: accept ICMP
      chain=input action=accept protocol=icmp log=no log-prefix=".
Enables ICMP packets to pass directly to the router. Simply put, it allows you to use the "ping" command to get an answer.

4 ;;; defconf: accept to local loopback (for CAPsMAN)
      chain=input action=accept dst-address=127.0.0.1 log=no log-prefix=""
Default capsule rule. Doesn't affect anything.

5 ;;; defconf: drop all not coming from LAN
      chain=input action=drop in-interface-list=!LAN log=no log-prefix=""
One of the most important. Completely forbids the router to pass control commands OUTSIDE. You can see from the descriptor that all the incoming ones that didn't come from the local network are crashing.

6 ;;; defconf: accept in ipsec policy
      chain=forward action=accept log=no log-prefix="" ipsec-policy=in,ipsec
IPsecurity policy. It doesn't affect us in any way, we can keep it.
At this point, the protection setting can be considered complete. Not the most meticulous option, but for a safe start of mining on microtycles is quite suitable, especially if you do not want to get into all the details. On most routers, this setting is installed "out of the box".

Configuration nuances. Drop of inactive compounds and fast-track technology.

Fast-Track is a technology for accelerating the transmission of packets through a miKrotiK, bypassing queue rules. It's hard to say how much faster. The point is, she marks the bags in a special way. According to the author's observations, while the fast track was on, the mining didn't want to start. It was worth disconnecting - after some time the incoming connections appeared. Disables in Ip >Firewall 

Rule of dropping inactive compounds. In the screenshot above, item #10, that's exactly the rule. An alleged mechanism to influence utopia: traffic at certain points stops waiting for the next packet, leaving the connection open. Accordingly, this rule closes the connection at this point ("fluttering"), which may prevent the mining. After it was turned off, the author's mining also became more active.

Turning on Upnp. It is written in detail on the Internet, it will not be difficult to enable.

After all the described manipulations the mining is fully available from the author. Remember that it doesn't start instantly, once the bot or client is started (current for version 5490) it takes time for the network to accept the master node, it can happen in an hour or a day.

Important!

After updating the network protocol, everything worked fine with the "FASTTRACK" and "drop invalid" functions enabled. Turn them on or off - at your discretion!

Thank you for your attention and successful mining!

#97 Re: Off Topic » Why It’s Dangerous to Share Your Birthday Online? » 2021-01-15 08:10:21

I don't think anything. You just don't need to" shine " personal information anywhere. From a nickname, you can make a mini-brand, then you will be trusted everywhere!

#98 Re: Alternative Currencies » Bitcoin » 2020-11-20 17:23:03

Bitcoin is a natural utopia. At the moment, it is centralized, and it requires huge resources to maintain the network. And the further, the more.

Miners will eventually become unprofitable to work with the bitcoin network, this is my forecast.

#99 Re: General Discussion » Crypton (CRP) price » 2020-11-20 17:20:32

Utopia in its functionality is the next step in cryptosystems. I'm sure 500 dollars or more for one coin is not the limit.

#100 Re: Crypton Purchase, Sale and Exchange » Buy & Sell UUSD using 24/7 bot in Utopia » 2020-11-20 13:49:14

The seller is verified through the transaction. Can deal with.

Board footer

Powered by FluxBB