pool – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Mon, 03 Jan 2022 03:39:49 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png pool – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Double Server Jeopardy | LINUX Unplugged 439 https://original.jupiterbroadcasting.net/147172/double-server-jeopardy-linux-unplugged-439/ Sun, 02 Jan 2022 15:00:00 +0000 https://original.jupiterbroadcasting.net/?p=147172 Show Notes: linuxunplugged.com/439

The post Double Server Jeopardy | LINUX Unplugged 439 first appeared on Jupiter Broadcasting.

]]>

Show Notes: linuxunplugged.com/439

The post Double Server Jeopardy | LINUX Unplugged 439 first appeared on Jupiter Broadcasting.

]]>
Layout the DVA | BSD Now 342 https://original.jupiterbroadcasting.net/140392/layout-the-dva-bsd-now-342/ Thu, 19 Mar 2020 05:00:00 +0000 https://original.jupiterbroadcasting.net/?p=140392 Show Notes/Links: https://www.bsdnow.tv/342

The post Layout the DVA | BSD Now 342 first appeared on Jupiter Broadcasting.

]]>

Show Notes/Links: https://www.bsdnow.tv/342

The post Layout the DVA | BSD Now 342 first appeared on Jupiter Broadcasting.

]]>
Dormant Docker Disasters | TechSNAP 212 https://original.jupiterbroadcasting.net/81407/dormant-docker-disasters-techsnap-212/ Thu, 30 Apr 2015 10:30:45 +0000 https://original.jupiterbroadcasting.net/?p=81407 The man who broke the music business, the major downsides to the container culture & yes, they really are trying to sell you Security Snake Oil. Plus your great questions, our answers & much, much more! Thanks to: Get Paid to Write for DigitalOcean Direct Download: HD Video | Mobile Video | MP3 Audio | […]

The post Dormant Docker Disasters | TechSNAP 212 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The man who broke the music business, the major downsides to the container culture & yes, they really are trying to sell you Security Snake Oil.

Plus your great questions, our answers & much, much more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | OGG Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Foo

— Show Notes: —

The man who broke the music business

  • A story from inside one of the original warez and mp3 distribution groups on the Internet
  • The guy worked at a CD pressing plant, and smuggled out the latest music up to a month before it hit stores
  • He traded these mp3s for access to the “top sites”
  • The top sites were the top of the warez scene hierarchy, and contained all of the latest movies and other pirated content
  • He built some recording towers and burned movie disks he sold for $5
  • He didn’t selling music to avoid raising suspicion on himself, because the cd pressing plant started cracking down
  • It also covers how the FBI broke up the ring and prosecuted the members
  • An interesting story especially if you were around at the time

The sad state of sysadmins in the age of containers

  • “System administration is in a sad state. It in a mess. I’m not complaining about old-school sysadmins. They know how to keep systems running, manage update and upgrade paths.”
  • “This rant is about containers, prebuilt VMs, and the incredible mess they cause because their concept lacks notions of “trust” and “upgrades”.”
  • “Consider for example Hadoop. Nobody seems to know how to build Hadoop from scratch. It’s an incredible mess of dependencies, version requirements and build tools.”
  • “None of these “fancy” tools still builds by a traditional make command. Every tool has to come up with their own, incompatible, and non-portable “method of the day” of building. And since nobody is still able to compile things from scratch, everybody just downloads precompiled binaries from random websites. Often without any authentication or signature.”
  • “The Hadoop Wiki Page of Debian is a typical example. Essentially, people have given up in 2010 to be able build Hadoop from source for Debian and offer nice packages.”
  • “To build Apache Bigtop, you apparently first have to install puppet3. Let it download magic data from the internet. Then it tries to run sudo puppet to enable the NSA backdoors (for example, it will download and install an outdated precompiled JDK, because it considers you too stupid to install Java.) And then hope the gradle build doesn’t throw a 200 line useless backtrace. I am not joking. It will try to execute commands such as e.g.:
  • /bin/bash -c “wget https://www.scala-lang.org/files/archive/scala-2.10.3.deb ; dpkg -x ./scala-2.10.3.deb /”
  • “Note that it doesn’t even install the package properly, but extracts it to your root directory. The download does not check any signature, not even SSL certificates.”
  • “Instead of writing clean, modular architecture, everything these days morphs into a huge mess of interlocked dependencies. Last I checked, the Hadoop classpath was already over 100 jars. I bet it is now 150, without even using any of the HBaseGiraphFlumeCrunchPigHiveMahoutSolrSparkElasticsearch (or any other of the Apache chaos) mess yet.”
  • “Stack is the new term for “I have no idea what I’m actually using”. Maven, ivy and sbt are the go-to tools for having your system download unsigned binary data from the internet and run it on your computer.”
  • “And with containers, this mess gets even worse. Ever tried to security update a container?”
  • “Feels like downloading Windows shareware in the 90s to me.”
  • “When will the first docker image appear which contains the Ask toolbar? The first internet worm spreading via flawed docker images?”
  • “Update: it was pointed out that this started way before Docker: »Docker is the new ‘curl | sudo bash’«. That’s right, but it’s now pretty much mainstream to download and run untrusted software in your “datacenter”. That is bad, really bad. Before, admins would try hard to prevent security holes, now they call themselves “devops” and happily introduce them to the network themselves!”
  • I for one, am now less excited about the idea of building something docker like for FreeBSD Jails

Security Vendor Snake Oil

  • “As security breaches increasingly make headlines, thousands of Internet security companies are chasing tens of billions of dollars in potential revenue.”
  • “we are alarmed at the kind of subversive untruths that vendor “spin doctors” are using to draw well-intentioned customers to their doors.”
  • “What would do more good for most organizations than increased Internet security spending, is a tough love school out in the mountains where the leadership team learns what actual threats feel like and what kind of team work and planning it takes to build a secure environment. Security does not come from locks or weapons or cameras — rather, it comes from attitude and awareness and positioning. “
  • “In the Cloud, everything is crystal clear, look here, we instantly see where attacks are coming from.” Except that we don’t! Most of the time we have absolutely no clue as to where an attack is really originating from.
  • “In the Cloud, we can neatly distinguish benign user behavior from attack behavior.” Except, we can’t! This is actually one of the really hard problems of information security.
  • “In the Cloud, we have instant knowledge and visibility when an attack occurs.” Except, we don’t! We really don’t! The latest statistics say it usually takes around 200 days to discover an espionage intrusion.
  • “Just as “data” is being sold as “intelligence”, a lot of security technologies are being sold as “security solutions” rather than what they for the most part are, namely very narrow focused appliances that as a best case can be part of your broader security effort. “
  • “Too many of these appliances do unfortunately not easily integrate with other appliances or with the rest of your security portfolio, or with your policies and procedures”
  • What is needing is a platform where we can plug in various modules and do scoring and make intelligent decisions
  • “The buyers of magical security boxes they don’t understand based on the promise of permanent safety are probably not applying vendor patches to their infrastructure, and that infrastructure is likely to be made up of other magical boxes that nobody quite understands.“
  • “The weaknesses exploited by bad guys may appear to be on the perimeter of a victim’s network, or in the components of a victim’s infrastructure, but in fact the weaknesses we mostly see are in the culture of organizations and in the psychology of the staff and especially of the leadership, and no “security solution” wrapped in a black box can fix that. “
  • “There are no silver bullets in Internet security — no way to kill the monster in a way that it stays dead. We in the Internet security business look for current attacks and learn from those how to detect and prevent those attacks and maybe how to predict, detect, and prevent what’s coming next. But rest assured that there is no end game — we put one bad guy in prison for every hundred or so new bad guys who come into the field each month.”
  • “There is no device or method, however powerful, which will offer a salient defense for more than a short time. The bad guys endlessly adapt; so must we. Importantly, the bad guys understand how our systems work; so must we.“
  • Speaking of how Attack Maps are all flash and no substance
  • Threat Butt Attack Map

Feedback:

(OPEN GIFT)


Round Up:


The post Dormant Docker Disasters | TechSNAP 212 first appeared on Jupiter Broadcasting.

]]>
TrekSNAP | TechSNAP 134 https://original.jupiterbroadcasting.net/45602/treksnap-techsnap-134/ Thu, 31 Oct 2013 17:09:43 +0000 https://original.jupiterbroadcasting.net/?p=45602 That Adobe breach we told you about? It’s about 10x worse than originally reported, we’ll share the details.

The post TrekSNAP | TechSNAP 134 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

That Adobe breach we told you about? It’s about 10x worse than originally reported, we’ll share the details.

Plus PHP.net gets compromised, howto future proof your storage, and much much more!

On this week’s TechSNAP!

Thanks to:


\"GoDaddy\"


\"Ting\"

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

Adobe breach worse than originally thought, number of impacted customers now atleast 38 million

  • Adobe is continuing its flurry of password resets, which now extend to more than 38 million customers
  • Adobe has also revised its original list of applications for which the source code was leaked to include the entire photoshop family of programs
  • “This past weekend, AnonNews.org posted a huge file called “users.tar.gz” that appears to include more than 150 million username and hashed password pairs taken from Adobe” – This number apparently includes inactive and test accounts, the 38 million number mentioned earlier are those considered ‘Active’
  • A company spokesperson said Adobe has no indication that there has been any unauthorized activity on any Adobe ID involved in the incident
  • As part of its resolution of the breach, Adobe is offering customers a years worth of free credit monitoring… from Experian (See last weeks story about how Experian was caught selling personal data to identity thieves)
  • Additional Coverage

PHP.net compromised, serves malware and is blocked by Google Safe Browsing

  • On 24 Oct 2013 06:15:39 +0000 Google started saying www.php.net was hosting malware. The Google Webmaster Tools were initially quite delayed in showing the reason why and when they did it looked a lot like a false positive because we had some minified/obfuscated javascript being dynamically injected into userprefs.js.
  • To summarise, the situation right now is that:
  • JavaScript malware was served to a small percentage of php.net users from the 22nd to the 24th of October 2013.
  • Neither the source tarball downloads nor the Git repository were modified or compromised.
  • Two php.net servers were compromised, and have been removed from service. All services have been migrated to new, secure servers.
  • SSL access to php.net Web sites is temporarily unavailable until a new SSL certificate is issued and installed on the servers that need it.
  • Over the next few days: php.net users will have their passwords reset. Note that users of PHP are unaffected by this: this is solely for people committing code to projects hosted on svn.php.net or git.php.net.
  • As part of this, the php.net systems team have audited every server operated by php.net, and have found that two servers were compromised: the server which hosted the www.php.net, static.php.net and git.php.net domains, and was previously suspected based on the JavaScript malware, and the server hosting bugs.php.net.
  • All affected services have been migrated off those servers. We have verified that our Git repository was not compromised, and it remains in read only mode as services are brought back up in full.
  • As it\’s possible that the attackers may have accessed the private key of the php.net SSL certificate, we have revoked it immediately.

Researchers at Vicarious software claim to be able to defeat 90% of Captchas

  • “Vicarious is developing machine learning software based on the computational principles of the human brain. Our first technology is a visual perception system that interprets the contents of photographs and videos in a manner similar to humans.“
  • The claim that using this technology, they can defeat 0% of common anti-bot technology used to defect websites from automated usage
  • While no paper or code has been shared, they provide a demonstration video that appears fairly compelling
  • If their claim is true, this could be a huge setback for the internet
  • Captchas are often used to prevent automated signups for services, to defend login systems from brute force attempts, and to moderate spam in online discussion and comment forums
  • CAPTCHA creator Luis von Ahn of Carnegie Mellon University says “This is the 50th time somebody claims this. I don\’t really get how they think this is news :)”
  • The writing from ScienceMag jumped on a skype call with the company and send them 4 sample captchas, a recaptcha and a paypal captcha were both solved, however another containing cyrillic characters was not (the company says they have not trained their system on non-latin characters yet), and one containing a checkerboard pattern was also not solved immediately.
  • If this research got into the wrong hands, it could be used to defeat protection systems across the internet, flooding websites with spam, evading brute force protection systems and otherwise wreaking havoc

Feedback:


Round Up:


The post TrekSNAP | TechSNAP 134 first appeared on Jupiter Broadcasting.

]]>
Bitcoin Will Disrupt Big Media | Plan B 9 https://original.jupiterbroadcasting.net/38276/bitcoin-will-disrupt-big-media-plan-b-9/ Tue, 04 Jun 2013 16:52:23 +0000 https://original.jupiterbroadcasting.net/?p=38276 How Bitcoin could potentially disrupt the big media monopolies and fund a new generation of independent honest content, controlled by its audience.

The post Bitcoin Will Disrupt Big Media | Plan B 9 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The best of Bitcoin podcasting join forces to discuss how Bitcoin could potentially disrupt the big media monopolies and fund a new generation of independent honest content, controlled by its audience.

Plus more challenges facing Mt. Gox, fixing Bitcoin’s infrastructure problem, and the quiet little Litecoin hack no one is talking about.

Downloads:

MP3 Audio | OGG Audio | Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | Video Feed | Torrent Feed | iTunes Audio | Ogg Feed

\"coinbaseqr\"

— Support the Show —

— Show Notes: —

— Feedback —

Help spread the word on iTunes with a Rating and Review:

Call or txt the Show:

1 (352) 587-5262

(352) 58-PLANB

— Discussion —

That means bitcoin exchanges like Tradehill would have to register as a money transmitter with the federal government. That is the easy part, says Kenna, requiring little more than a single page form. The hard part is getting the relevant licence in each US state. They all have different rules, and some (sources single out New York and California) are particularly difficult.

Time (at least a little of it) is on Tradehill\’s side, however. Even though the FinCEN guidance came into immediate effect, it only applies to businesses 180 days after they begin trading in bitcoin. This gives it until mid-September to get its paperwork in order.

In the real world, if you lose your credit card, checkbook, or even bank account log-on password, your money isn\’t gone. In fact there are lots of services and laws to protect you and your money. Not so in the e-currency world — check out a statement posted on a Bitcoin Wiki Faq regarding the potential loss of Bitcoins: \”Consider it a donation to all other bitcoin users.\”

Ultimately, most e-currencies possess the security of whatever your email address and password is. If hackers break into your computer, learn your password — or even break in and steal all your money at the bank — it will be replaced fairly quickly. This is absolutely not true of e-currency sites.

I\’m not saying that e-currency schemes are evil. And I\’m not saying fiat money is perfectly trusted or protected — the runaway inflation that led to wheelbarrows of money being exchanged in Weimar Germany come to mind. I\’m just saying that by comparison, over the long run, there is no comparison. The trust equation isn\’t even close.

“That committee has chosen to grow its balance sheet by $85 billion per month, to well above $3 trillion in total, by monetizing US Treasury and Agency debt. Accordingly, the long term outlook for the value of the USD will be subject not only to the supply of new money, but also bubbles caused by synthetic support for state-favored asset classes, and record high national debt.”

“In a world of increasing global communication and trade, a nation-agnostic currency would solve many of the problems we’ve seen repeated throughout history and potentially ease the associated international tensions. An asset for which the value is determined solely by international demand, immune to influence from central planners, is a necessary step forward towards a free market.”

“Suspected fake miners were clocking at up to150MH/s for 3-4 days. We suspect more cheaters were involved over the past 3-4 days which could have been at least partially to blame for the pools bad luck.”

“During deployment of the fix, we logged changes in valid hash rates. The biggest detected confirmed cheater was Cryptopower who went from 30MH/s to 1MH/s”

“After some deliberation and discussion with Technocash, an Australian service for Mt. Gox customer account funding and withdrawals, it has been decided that our customers in Australia will no longer be able to deposit and withdraw funds in AUD using Technocash starting June 15th, 2013.”

Writer & Speaker with a passion for explaining complicated topics in understandable terms.

He is the founder and Editor-in-Chief of Let\’s Talk Bitcoin!


Happy Cakeday bitcointip bot

— Watch Live —

Tuesday 2pm PDT / 5pm EDT / 9pm GMT

— Plan B Subreddit —

— Contact us —

— Music —

\"coinbaseqr\"

— Support the Show —

The post Bitcoin Will Disrupt Big Media | Plan B 9 first appeared on Jupiter Broadcasting.

]]>
Then They Fight You | Plan B 8 https://original.jupiterbroadcasting.net/37871/then-they-fight-you-plan-b-8/ Tue, 28 May 2013 15:46:04 +0000 https://original.jupiterbroadcasting.net/?p=37871 The funding methods around Bitcoin are under attack, and we chat with TheGenesisBlock.com’s managing editor about what this for Bitcoin, and more.

The post Then They Fight You | Plan B 8 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The funding methods around Bitcoin are under attack, and we chat with TheGenesisBlock.com’s managing editor about what this means for the future of Bitcoin, and more.

Plus picking the right wallet for offline cold storage, a look at BitAngels the distributed Bitcoin angel fund, our concerns with Ripple, your emails, and much more!

Downloads:

MP3 Audio | OGG Audio | Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | Video Feed | Torrent Feed | iTunes Audio | Ogg Feed

\"coinbaseqr\"

— Support the Show —

— Show Notes: —

— Feedback —

Help spread the word on iTunes with a Rating and Review:

Call or txt the Show:

1 (352) 587-5262

(352) 58-PLANB

— Discussion —

Although OKPAY themselves provided no rationale for their decision, OKPAY’s trust in the viability of bitcoin in their system may have been shaken after an OKPAY user reported on bitcointalk.org that they had successfully double-spent over 211 BTC to OKPAY and a seperate address controlled by the user during the block chain fork of 12 March 2013. The same user also reported that an approximately 65 BTC he had sent separately to OKPAY was not successfully credited to the appropriate account. Somewhat of a standoff ensued, but was resolved with OKPAY refunding the 65 BTC only after the customer returned the double-spent 211 BTC. OKPAY support staff confirmed the situation on a bitcointalk.org forum thread started by the double-spender.


We now have our first answer from FinTRAC. Generally, it views bitcoin exchanges as entities that do not have to register, identify clients, and report under the money services business rules.


Primer Interest Producer Bob English and Perianne traveled to the Bitcoin conference in San Jose, California over the weekend. They got a chance to speak to many of the movers and shakers in the up and coming crypto-currency realm. Bob interviewed Chris Larsen, CEO and co-founder of OpenCoin, which is developing Ripple.


BitAngels is launching (what it believes to be) the first multi-city angel network and incubator created to invest exclusively in cryptocurrency startups. Fittingly, in the spirit of Bitcoin, it\’s a distributed network of angels and entrepreneurs and one that was hacked together in a few days after the Bitcoin 2013 Conference.

BitAngels brings together a posse of angel investors who are looking to help entrepreneurs turn their Bitcoin side projects into full-time jobs. To do that, the angel network pooled together about $6.7 million in Bitcoin, which it will invest in approximately $20K chunks.

BitAngels is not a formal fund, so the Bitcoins are soft-circled, not in escrow, but all 60 angels that have joined thus far (the number of angels has almost doubled in the past week) are all accredited investors with extensive experience investing and, naturally, have a lot of Bitcoin.


Trace Mayer on Prime Interest May 24, 2013.

Greg Managing Editor of The Genesis Block.COM

  • DHS Inquiry Leads to Lowest USD/Bitcoin Trading Volume In Months
    > Bitcoin trading volume has plummeted since news broke that the Department of Homeland Security issued a seizure warrant that stopped all activity between Dwolla and the Mt. Gox exchange. As of today, the 5-Day moving average of USD trading volume is at the lowest level in at least a year and a half (the data is a bit spotty beyond that), other than the last week in December 2012.

In addition to total market volume declining, Mt. Gox is losing footing as the dominant player in the space. As of May 17, Gox was doing roughly 81% of total USD bitcoin volume. Today they did just 59%.


Yesterday we wrote about the low volatility after Mt. Gox\’s accounts were seized. The following graph from that article illustrates how we haven\’t seen volatility this low on Mt. Gox since December of 2012.


— Watch Live —

Tuesday 2pm PDT / 5pm EDT / 9pm GMT

— Plan B Subreddit —

— Contact us —

— Music —

The post Then They Fight You | Plan B 8 first appeared on Jupiter Broadcasting.

]]>
Spending Your Coins | Plan B 6 https://original.jupiterbroadcasting.net/37176/spending-your-coins-plan-b-6/ Tue, 14 May 2013 16:24:59 +0000 https://original.jupiterbroadcasting.net/?p=37176 We’ll cover some of our favorite ways to buy things with bitcoin, and chat with Forbes writer Kashmir Hill about her week of Living on Bitcoin.

The post Spending Your Coins | Plan B 6 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We’ll cover some of our favorite ways to buy things with bitcoin, from the new and exciting, to the dark and shady.

Plus we chat with Forbes writer Kashmir Hill about her week of Living on Bitcoin, tackle the big stories of the week, answer your emails, and more!

MP3 Audio | OGG Audio | Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | Video Feed | Torrent Feed | iTunes Audio | Ogg Feed

— Show Notes: —

— Feedback —

Frequently n00bed

Help spread the word on iTunes with a Rating and Review:

Call or txt the Show:

1 (352) 587-5262

(352) 58-PLANB

— Discussion —

Microsoft Chairman Bill Gates and Berkshire Hathaway’s Warren Buffett and Charlie Munger on Bitcoin, tax rates, bank regulation and the Federal Reserve policy.


New York City-based Liberty City Ventures is announcing its Digital Currency Fund, a $15 million commitment to Bitcoin and other digital currency startups.

The latest buzz comes by way of the Bitcoin Boost Fund, a new Silicon Valley fund that announced on Tuesday that it will hand out $50,000 to seven or so Bitcoin startups.

All of the startups will be graduates of Boost VC, an accelerator program that seeks to mentor would-be Bitcoin barons. The accelerator, created earlier this year, is run by Adam Draper, who describes himself as a “fourth generation VC” and who is hosting a hackathon at the “Bitcoin: Future of payments” conference in San Jose this weekend.


In this episode of the Keiser Report, Max Keiser and Stacy Herbert discuss the currency of an independent Scotland. Max argues that bitcoin will force the banking system to reinvent itself or die, for what can be more of an invisible hand but a cryptologically guarded, invisible currency.


The bitcoin network hashrate estimate on bitcoinwatch.com passed 1 exaFLOPS (1,000 petaFLOPS) this week – over 8 times the combined speed of the top 500 supercomputers.

The FLOPS estimate is based on the opportunity cost of computers using their hardware for mining instead of other applications. Miners are using their graphics cards to perform hashes instead of other FLOPS-based distributed computing.


The Department of Homeland Security appears to have shut down the ability to use Dwolla, a mobile payment service, to withdraw and deposit money into Mt. Gox, a Bitcoin trading platform. A Dwolla representative confirmed the move to Betabeat.

— Spending Your Coins —

I lived on Bitcoin for a week. This is what I learned.


Humble Bundle, known for its flash sales of millions of $s worth of games from high quality developers, is now accepting Bitcoin using Coinbase merchant tools.


Mobile gift card company Gyft has partnered with BitPay to start accepting bitcoins within its app.

This is a big partnership for both, as BitPay’s CEO, Tony Gallippi, says that the company currently processes $5 million per month in bitcoin transactions for its merchants. Gyft allows you to purchase gift cards at more than 50,000 retail locations in the U.S., including Brookstone, Lowe’s, GAP, Sephora, Gamestop, American Eagle, Nike, Marriott, Burger King and Fandango. So, technically, you’ll now be able to use bitcoin to pay for a Whopper.


BitPremier’s mission is to provide astute buyers in the Bitcoin community with access to unique, high-end luxury items and opportunities. We believe in a customer-centric, secure, and friendly marketplace environment where we give individual attention to every item proudly listed on our site.

BitPremier is backed by the NYC-based Bitcoin Opportunity Fund. Other investments of the fund include CoinLab, BitPay, BitSpend, OpenCoin/Ripple, Coinsetter, TradeHill, and Coinapult.


“We’re just looking for a solution where we can bank legitimately like any other industry,” Smith said. “Wherever you stand on the marijuana issue, it serves everybody’s interest to have banking access.”

Aaron Smith, executive director of the Washington-based National Cannabis Industry Association

  • Bank officials say they are complying with federal law:

At Wells Fargo, “our policy of not banking marijuana dispensaries is based on applicable federal laws and our own assessment of our responsibility,” said Seitz, the bank’s spokesman.

American Express Co. (AXP), the biggest U.S. credit-card issuer by customer purchases, “has made a decision to not allow card acceptance for medical marijuana,” Sanette Chao, a spokeswoman for the New York-based company, said by e-mail. “It is our policy to adhere to federal law in such matters.”

U.S.-based BitPay, has refused to enter the fray. As a processor, BitPay offers same-day conversion of merchant bitcoin into a US dollar bank account. CEO Tony Gallippi explained in an interview that although several have applied, “medical marijuana is not allowed in our terms of service.” Of course to be consistent, other merchant types not allowed by BitPay include ecstasy, MDMA, any controlled substances, weapons, gambling, and sports betting. They will however support transactions for file sharing, storage/backup services, and VPN services, because “freedom of information is important.”


Enter the Silk Road

Making small talk with your pot dealer sucks. Buying cocaine can get you shot. What if you could buy and sell drugs online like books or light bulbs? Now you can: Welcome to Silk Road.

— Watch Live —

Tuesday 2pm PDT / 5pm EDT / 9pm GMT

— Plan B Subreddit —

— Contact us —

— Music —

\"coinbaseqr\"

— Support the Show —

The post Spending Your Coins | Plan B 6 first appeared on Jupiter Broadcasting.

]]>
BETA | Plan B 1 https://original.jupiterbroadcasting.net/35166/beta-plan-b-1/ Wed, 10 Apr 2013 20:15:08 +0000 https://original.jupiterbroadcasting.net/?p=35166 We look at the media’s slowly improving bitcoin coverage, discuss the major selloff today, and why people shouldn’t fixate on the price.

The post BETA | Plan B 1 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

From the trenches of discount Wednesday, we launch the beta of our new show: Plan B. We look at the media’s slowly improving bitcoin coverage, discuss the major selloff today, and why people shouldn’t fixate on the price.

Plus: the Mt. Gox problem that faces the bitcoin community, and how it gets gamed.

Then a look at the self appointed “face of bitcoin” Max Keiser and the big money he’s trying to get involved in bitcoin speculation, and brief Litecoin chat…

And so much more!

Direct Download:

MP3 Audio | OGG Audio | Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | Video Feed | Torrent Feed | iTunes Audio | iTunes Video

Show Notes:

— Getting Started —

Through the lens of the ever increasing media coverage of Bitcoin, we\’ll explain some of the reasons we find bitcoin fascinating. And the fundamentals we believe show bitcoin\’s about to see an availing of new uses and speculators.

Previous Jupiter Broadcasting Coverage of Bitcoin:

— Discussion —

— Litecoin —

— Watch Live —

Tuesday 2pm PDT / 5pm EDT / 9pm GMT

— Plan B Subreddit —

— Contact us —

— Music —

— Support the Show —

The post BETA | Plan B 1 first appeared on Jupiter Broadcasting.

]]>
Ultimate ZFS Overview | TechSNAP 28 https://original.jupiterbroadcasting.net/13052/ultimate-zfs-overview-techsnap-28/ Thu, 20 Oct 2011 18:57:12 +0000 https://original.jupiterbroadcasting.net/?p=13052 Buckle up and prepare for the our Ultimate ZFS overview! Plus, the next generation of Stuxnet is in the wild, but this time is laying low, collecting data.

The post Ultimate ZFS Overview | TechSNAP 28 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Coming up on this week’s TechSNAP…

Buckle up and prepare for our Ultimate ZFS overview!

Plus, the next generation of Stuxnet is in the wild, but this time is laying low, collecting data.

All that and more, on this week’s TechSNAP!

Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

Subscribe via RSS and iTunes:

[ad#shownotes]

Show Notes:

Jupiter Broadcasting Gear

https://www.printfection.com/jbgear

  • Coupon Code: SuperDuperShip – Free Shipping on Super Saver, International, and Canadian Airmail orders. No minimums
  • Coupon Code: SuperSave$10 – $10 off orders with a subtotal of $50+
  • Coupon Code: Scary35% – 35% off orders with a subtotal of $100+

Next generation of Stuxnet seen in the wild?

  • Called Duqu, the malware appears to be based on the same concepts as Stuxnet, and likely was written by some of the same people, or someone with access to the Stuxnet source code.
  • The malware is designed to be stealthy and silent, rather than exploiting the system to some gain, like most malware
  • The rootkit loads it self as a validly signed driver. It appears to have been signed by the certificate of a company in Taiwan identified as C-Media Electronics Incorporation. It is possible that their systems were compromised and their private key is being used without their knowledge. The certificate was set to expire on August 2, 2012, but authorities revoked it on Oct. 14
  • The malware is not a worm, as it does it spread, and has no destructive payload
  • It appears to only gather intelligence and act as a espionage agent, collecting data to be used a future attack.
  • Analysts claim it appears to be seeking information on an unidentified industrial control system
  • Duqu appears to have been in operation, undetected for more than a year
  • Symantec has declined to name the countries where the malware was found, or to identify the specific industries infected, other than to say they are in the manufacturing and critical infrastructure sectors
  • Duqu analysis paper

Google switching to SSL for logged in users’ searches

  • Users who do a search while logged in, will do the search over SSL, meaning their search query and the results will be protected from snooping by their ISP, Government, Law Enforcement and WiFi hackers.
  • This is an important step as google works to personalize your search results more and more.
  • An interesting side effect of this is that browsers do not pass referrer headers when you transition from an SSL site. So the sites you visit from the search results page will no longer see what your search query was. Clicks on Adwords and other sponsored links will still pass your search query.
  • The primary impediment to SSL for everything is performance, encrypting all traffic on the web would require a great deal more hardware. This is why Google defaults to a weaker encryption for things like search results, than what online merchants typically use.
  • Another impediment to SSL is the certificate system, typical setups require a unique IP for each SSL certificate (because the name based virtual hosting typically done by web servers relies on an HTTP header, that is not sent until after the encryption session is started). However modern browsers and web servers support ‘SNI’ (Server Name Indication) to allow that information to be passed as part of the initial encryption setup. There are also solutions such as wildcard certificates (ie, *.google.com) and Unified Communications Certificates (UCC, typically used for MS Exchange servers and the like).
  • Google will also provide website owners with the top 1000 search queries that lead visitors to their site via Google Webmaster Tools.
  • HTTPS Everywhere | Electronic Frontier Foundation

Feedback:

ZFS Segment

  • This week we will be taking a look at ZFS as a storage solution
  • ZFS was originally developed by Sun Microsystems to be able to store a zetta byte of data (A zetta byte is equal to 1 billion tera bytes)
  • ZFS is both the Volume Manager and the File System. This gives it some unique benefits, including the ability to increase the size of the file system on the fly and improves performance for the ‘scrub’ (integrity check all data) and resilver (recover from a failed disk) operations, as only data blocks that are actually in use need to be rewritten, whereas a hardware RAID controller must resilver the entire disk because it is unaware of the file system.
  • ZFS is a ‘Copy-On-Write’ file system, this means that data is not immediately overwritten when it is changed
  • Features
    • Multiple mount points – You can create various mount points from the same storage pool, allowing you to have different settings for different types of files.
    • Passive Integrity Checking (Fletcher Checksum or SHA–2) – As data is read, it is compared against the checksum (or hash, depending on settings). If the data is found to be corrupted, ZFS attempts to recover it (from a mirrored device, RAID Z, or copies). This feature allows ZFS to detect silent corruption that normally goes unnoticed.
    • RAID Z – RAID Z works very similar to RAID 5, except without the requirement for a hardware RAID controller. RAID Z2 provides two parity drives, like RAID 6. Recently, RAID Z3 was also introduced, using 3 drives for parity, providing exceptional fault tolerance.
    • Compression – Allow you to compress the data stored in this mount point (defaults to lzjb for speed, or you can choose a specific level of gzip). This can be great for storing highly compressible information such as log files
    • Deduplication – Since ZFS already knows the hash of your files as it writes them, it can detect that a file with the identical content already exists in your storage pool, and it will simply link the new file to the old one, and because ZFS is copy-on-write, if either file changes, it does not effect the other. ZFS also supports an optional ‘verify’ setting, where even if the checksum/hash matches, it will do a byte-by-byte verification to ensure the files are the same, to avoid a cache collision resulting in data corruption, even though the chances of this happening are around 10^–77. Deduplication uses a lot of ram, so it is recommended that you only use it on datasets where there is a high probability of duplication (It requires 320 bytes per block, meaning 1TB of data in 8kb blocks requires 32GB of ram. ZFS allows blocks up to 128kb). Deduplication will only use up to 25% of ARC memory, after that performance is degraded.
    • Purposeful Duplication (Copies) – Allows you to ask ZFS to maintain more than 1 copy of each file in a mount point. This is in addition to any redundancy provided by mirrors/RAID Z etc. Where possible the additional copies are stored on different physical devices. This allows you to get the benefit of a system like RAID Z but only for a specific set of data, while using regular striping for the rest, to maximize your storage capacity. (The ‘Copies’ system was not designed to protect against entire drives failing, just the loss of specific sectors, also this setting only effects newly created files, so you should set it when you create the mount point)
    • Snapshots – A read only copy of the file system from a specific point in time, great for backups etc.
    • Clones – A writable snapshot. Allows you to create a second copy of the file system that shares all of the same disk space, and any changes to either the original or the clone get saved separately.
    • Dynamic Striping – As you add more disks to your ZFS pool, the strips are automatically adjusted to take advantage of the write performance of all available disks.
    • Space Reservation – Since all mount points share the same pool of free space, you can set reservations to make sure specific mount points always have access to free space, even if another mount point is trying to use all of the space.
  • In summary, ZFS can be a great solution for your home file server, as it allows you the flexibility to add additional storage at any time, deduplicate files, provided limited redundancy without needing RAID and can even provide some Drobo like functionality.
  • If you keep at least one SATA port available in your file server, you can replace smaller devices by attaching the newer drive, and using the ‘zpool replace’ command, to copy all of the data to the new device, then remove the smaller one. You can eventually replace every device in the system this way, and the storage pool sizes up automatically.
  • RAID Z pools cannot currently have devices added to them, although this feature is in the works. If you create a RAID Z (or Z2/Z3) pool, you can still increase it’s storage capacity by replacing each disk one at a time, and waiting for it to resilver (unlike in non-redundant setups, you do not have to connect the new device before removing the old one). Again, because ZFS is both the Volume Manager and the File System, the resilvering process is faster, because only data that is actually in use needs to be written to the new device.

Round Up:

The post Ultimate ZFS Overview | TechSNAP 28 first appeared on Jupiter Broadcasting.

]]> Bitcoin Explained | TechSNAP 9 https://original.jupiterbroadcasting.net/9276/bitcoin-explained-techsnap-9/ Fri, 10 Jun 2011 07:41:55 +0000 https://original.jupiterbroadcasting.net/?p=9276 We’ll dig into bitcoin and explain what it is, and how it works. Is there a future for this Cryptocurrency?

The post Bitcoin Explained | TechSNAP 9 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We’ll dig into bitcoin and explain what it is, and how it works. Is there a future for this Cryptocurrency?

Plus Sony is in the news again, and its not good… And we talk about a new ruling on how far your bank has to go to protect you from cyber criminals.

Please send in more questions so we can continue doing the Q&A section every week! techsnap@jupiterbroadcasting.com


Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

Subscribe via RSS and iTunes:

[ad#shownotes]

Show Notes:



Topic: Sony hacked yet again

  • Lulzsec has compromised a few more Sony properties in the last week
  • at 11 a.m. EST on June 6, Lulzsec leaked the source code to the Sony PSN Developers Network
  • This could allow people to find more flaws with the Sony system very quickly
  • This also opens up the possibility of a ‘private’ version of the PSN network, allowing owners of hacked playstations to get the benefits of a number of PSN services without cost or worrying about being identified.
  • The fact that Lulzsec was able to access the source code also opens up the possibility that they could have made changes to the code, allowing all sorts of mayhem (unlocking paid content for everyone, or damaging the users by streaming all credit card transactions offsite somewhere)
  • Lulzsec also uses an SQL injection attack against Sony Pictures, and was able to export 150,000 records from a database of more than 4.5 million records
  • SQL injection attacks are very common, with the number that have been successfully executed against Sony in the last 2 months, one would expect that would have made efforts to repair some of their software
  • One apparent member of Lulzsec, Robert Cavanaugh, was taken in to custody by the FBI. Lulzsec claims he is not a member.
  • Lulzsec also compromised a Nintendo server and published it’s configuration file as proof. No corporate or customer data was taken.
  • Lulzsec has also started going after sites affiliated with the FBI
  • In addition, Lulzsec has taken responsibility for compromising Fox TV, and publishing a list of X-Factor contestants.

Topic: RSA Admits SecurID tokens compromised

  • RSA is expected to have to replace all 40 million tokens that are in use world wide
  • Popular users of RSA SecurID Tokens: The Pentagon, Lockheed Martin and other military contractors, World of Warcraft, PayPal/eBay, major account holders at some banks

Topic: US Court ruling to define ‘Reasonable Security’

  • An ongoing court battle is nearing an end, the final ruling will likely determine the standard for how much commercials banks must do to protect their customers from cyber thieves.
  • The case stems from an incident where a construction company that used online banking to do it’s payroll, had it’s PC compromised with the ZeuS trojan. The botnet operators managed to siphon $588,000 out of the companies account using a series of ACH transfers over the course of 7 days.
  • The Bank managed to recover $243,406 of the funds, leaving the contractor on the hook for the remaining $345,445
  • The bank had recently changed its policies to require users to answer one of their security questions for each transaction. This change actually made it easier for the botnet operators to capture the answers to these questions, which allowed them to initiate their own transfers
  • Guidelines established in 2005 by the Federal Financial Institutions Examination Council (FFIEC) require two-factor authentication
  • The bank claims it was doing two factor authentication by checking the username/password (something you know) and a ‘device id’ (something you have). The device ID appears to have been nothing more than the browser string, which is easily faked, or in this case, circumvented by the ZeuS trojan, which users the victims own browsers on their own PC to initiate the fraudulent transfers.

Topic: Bit Coin farmers raided by police for suspected pot farm

  • A local law allowed the police to get a warranty for any property that used more than an average amount of electricity each month

Topic: What is bitcoin?

Bitcoin is a digital currency created in 2009 by Satoshi Nakamoto. It is also the name of the open source software designed in order to use this currency.
Bitcoin is one of the first implementations of a concept called cryptocurrency, which was first described in 1998 by Wei Dai on the cypherpunks mailing list.

Building upon the notion that money is any object, or any sort of record, accepted as payment for goods and services and repayment of debts in a given country or socio-economic context, Bitcoin is designed around the idea of using cryptography to control the creation and transfer of money, rather than relying on central authorities.

Great video: https://www.weusecoins.com/
Ars Technica also has a great write up.

Isn’t it just a fake vaporware currency?

  • It’s already valued at $200 million USD.
  • There are various definitions of success here. Bitcoin may always see value as simply serious competition to PayPal.
  • Bitcoin’s value is as “fake” as the dollar, or many other things we as a people agree to collectively assign value to.

Ugh.. Another virtual money? Linden dollars, Xbox Points, Atari Credits, ENOUGH!!

  • bitcoin goes beyond just another online “virtual dollar”.
  • It’s distributed P2P nature means no single controlling interest can shutdown your account, or refuse a transaction, or charge a transfer fee.
  • No single controlling party can impact the value of the bitcoin.
  • Bitcoin could have the potential to unify everything to a single online currency.
  • Users value would move with them between games/services. This is more critical to those with limited funds to spend on these types of services/games.
  • Mining bitcoins gives advantages that level the playing field to those who otherwise can not economically participate in the common up-sale environments found with online gaming and services.

What are the REAL issues?

One pool to rule them all?
deepbit.net: If too much of the network power goes to one pool, don’t we just create a single point of failure? MANY in the bitcoin community are very worried about deepbit.net aproaching 50% of the mining power of the network. Many are calling/asking for miners to switch to new pools to balance things out.

Hashrate Distribution:

Comparison of mining pools

What about the Exchange?
Mt. Gox is the #1 way to get cash into Bitcoin, if this site were taken down by the gov, or something else, it would be a massive blow to the value of bitcoin.

What happens if Mt. Gox goes down?

What is next?

More places* need to accept bitcoin, this is starting to happen more and more:

*The online porn industry could really win big here. Bitcoin for porn could be huge. Anonymous money, that can be generated via your GPU.

Legal Battles:
US senitors seek crackdown of Bitcoin and could possibly try to target Mt. Gox

Safley transfer bitcoin between parties with escrow?

Bitcoin for a little fun?

Bitcoin Poker Room
Chris’ captured footage of the live poker stream

How to Mine & Get Started with Bitcoin:

Is it worth it? Use this: Bitcoin Mining Calculator
Check out Nean’s guide in the Colony

Download any of these bitcoin miners:

How to get started with GPU Mining with bitcoin:
Mining hardware comparison
Ubuntu Natty Narwhal 11.04 Mining Guide / HOWTO
Profit Calculator

Buy them:
Trade bitcoins IRL
Mt Gox
#bitcoin-otc marketplace – Currently the best way to buy bitcoin with PayPal.

How can bitcoin help business like JB?

Donate some coins: 1CirPhywbP9qNEL1CH8dTMPiqSfY1SmV4m

Community pooling, with a network “fee” that goes to support the network. The community mines for each other, and the network. Fans helping fans.

Bitcoin Javascript page, easy mining to help the network –

  • Could less reputable sites hide/embed this JS code to steal your CPU cycles? YES.
  • Could it become a way to replace Ads on a site? Maybe…

Follow Chris’ always up-to-date obsession feed with bitcoin!

Want to know more about bitcoin?

Download & Comment:

The post Bitcoin Explained | TechSNAP 9 first appeared on Jupiter Broadcasting.

]]>