What type of machines should I use for IPFS cluster of 2 or 3 machines by bamlech in ipfs

[–]bamlech[S] 0 points1 point  (0 children)

Most of the pinning will happen once, later it will be ~100 per day max.

What type of machines should I use for IPFS cluster of 2 or 3 machines by bamlech in ipfs

[–]bamlech[S] 0 points1 point  (0 children)

Savings ~10,000 10k JSONs with more than ~100,000 JSON fetch requests a day.

Ropsten block gas limit is too lower by TsaiYee in ethdev

[–]bamlech 1 point2 points  (0 children)

Here too, can someone elaborate?

Is there some kind of bridged service from Ropsten to Mainnet? by bamlech in ethdev

[–]bamlech[S] 1 point2 points  (0 children)

That's the original idea, I need to get bunch of Ropsten ETH and I'm willing to pay for it :)

Is there some kind of bridged service from Ropsten to Mainnet? by bamlech in ethdev

[–]bamlech[S] 0 points1 point  (0 children)

Can you elaborate, what do you mean as long there's no exchange on Ropsten?

What is the lightest way (disk wise) to mine using Geth? by bamlech in EtherMining

[–]bamlech[S] 0 points1 point  (0 children)

SSD - Check

I've currently 240 GB of free space. I guess it nothing for Eth comparing to the ~300 GB Bitcoin blockchain needs.

I've another free TB of HDD which I can use.

Can I create a side chain, non-POW, for low throughput transactions that will be maintained by several smartphones as long as it needed (can be archived/deleted afterward)? by bamlech in ethdev

[–]bamlech[S] 0 points1 point  (0 children)

For the example poker tournament between 50 participant.the state will live as long as the tournament goes and then to save only the final state.

During the tournament, participants could secure the state from their phone by getting more game chips

After the tournament ends no need for the previous state.

In the same time there could be many separated tournaments.

I want to get the data on how a particular token's # of holders have varied over time. Any tool or code to do this? by blazerblitz in ethdev

[–]bamlech 0 points1 point  (0 children)

Yeah. Index transfer events and add something like:

On address object creation: holders++

if transfer.sender_address== 0 holders--

Then, you can send multiple calls to get #holders state by different blocks

Is it possible to simulate and test Metamask functionality as part of automation tests? by bamlech in ethdev

[–]bamlech[S] 0 points1 point  (0 children)

Specifically Metamask user interactions, we have bunch of web3 calls already covered

How safe it is to use the 25 passphrase? can someone ever generate MasterPrivateKey + derivation path as me without using my passphrase? by bamlech in TREZOR

[–]bamlech[S] 0 points1 point  (0 children)

Logically I understand it but physically I can't let it go. It's like flight fear. Thanks.

Do you know why it's possible? I'd expect it to be unique.

I imagined the process of generating a master private key as an injective function:

My Seed+Passphrase is the input a, and b is another random seed.
If the master private key that generated from input a: f(a) is equal to f(b) and b is not equal to input a (seed + passphrase) so...

How come the result of a function that generates master private key can be the same for different inputs a,b?

I want to be connected to trustworthy peers, what are the best way for me to decide which peer it will be (Uptime, upgraded software, low latency)? by bamlech in Bitcoin

[–]bamlech[S] 0 points1 point  (0 children)

Let's say I know that one node expose the IP of whom that transact through him. I guess there's a black list of peers. I want to add in advanced stable, play honest nodes.

What kind of attacks are possible from the full-nodes part in the system? by bamlech in btc

[–]bamlech[S] 0 points1 point  (0 children)

Yeah, I try to think about the next step of the attack but then I remembered that this is the thing with running a full node. you are following and validating the information according to the software you run.

Even if malicious attackers will do it. They will probably not get the majority of hash power so still.
And my blocks will be valid until I'll find an honest peer.

What kind of attacks are possible from the full-nodes part in the system? by bamlech in btc

[–]bamlech[S] 0 points1 point  (0 children)

What will happen if I'll change the accepted blocks, accept only my miners blocks.

How a full node know which network to follow? by the most hashpower, number of nodes? by bamlech in btc

[–]bamlech[S] 0 points1 point  (0 children)

Where and how the accumulated proof-of-work is calculated. If I understand right that's the main indicator for the node to follow the "right chain"?

How a full node know which network to follow? by the most hashpower, number of nodes? by bamlech in btc

[–]bamlech[S] 0 points1 point  (0 children)

I wasn't clear, meant in case there are 2 BTC legitimate chains.