Jump to content




Krist - Minable currency that works across servers (paste updated)


  • You cannot reply to this topic
1697 replies to this topic

#1221 bauen1

  • Members
  • 102 posts
  • LocationIn your Computer

Posted 15 February 2016 - 05:58 PM

View Postnayrnayr1, on 15 February 2016 - 05:56 PM, said:

When does it update the database and I get my minecraft money?
Most miners tell you when you mined a block, 12 (or more) krist are then immediately transferred to your account.

#1222 ___

  • Members
  • 42 posts
  • LocationAt exactly 32.251198, -64.822480

Posted 15 February 2016 - 06:02 PM

It says last block updated but I have none.

View Postbauen1, on 15 February 2016 - 05:58 PM, said:

View Postnayrnayr1, on 15 February 2016 - 05:56 PM, said:

When does it update the database and I get my minecraft money?
Most miners tell you when you mined a block, 12 (or more) krist are then immediately transferred to your account.

It says last block updated but I have none. I have done more than 12 blocks.

#1223 bauen1

  • Members
  • 102 posts
  • LocationIn your Computer

Posted 15 February 2016 - 06:02 PM

View Postnayrnayr1, on 15 February 2016 - 06:01 PM, said:

It says last block updated but I have none.
last block updated says someone else got the block, it usually says 'solved' somewhere when you mine one, have pation, it could take multiple hours.

#1224 ___

  • Members
  • 42 posts
  • LocationAt exactly 32.251198, -64.822480

Posted 15 February 2016 - 06:03 PM

View Postbauen1, on 15 February 2016 - 06:02 PM, said:

View Postnayrnayr1, on 15 February 2016 - 06:01 PM, said:

It says last block updated but I have none.
last block updated says someone else got the block, it usually says 'solved' somewhere when you mine one, have pation, it could take multiple hours.

Successfully Submitted, you are correct.

#1225 bauen1

  • Members
  • 102 posts
  • LocationIn your Computer

Posted 15 February 2016 - 06:05 PM

Btw, could we get a static (no web socket, no fancy updating) page for Lottery, because it doesn't work on my mobile device (iPad)

#1226 Lemmmy

  • Members
  • 218 posts

Posted 15 February 2016 - 06:10 PM

View Postbauen1, on 15 February 2016 - 06:05 PM, said:

Btw, could we get a static (no web socket, no fancy updating) page for Lottery, because it doesn't work on my mobile device (iPad)

Suggest this at the KLottery thread.

#1227 apemanzilla

  • Members
  • 1,421 posts

Posted 15 February 2016 - 06:22 PM

View PostTron, on 15 February 2016 - 05:42 PM, said:

Are v2 addresses really safe? Just on an 8-core cloud server I get 600 thousand addresses (Not really a full address, since I only calculate part of the address to check if it matches) per second, which when put into this site http://calc.opensecurityresearch.com/ says would take about 6 years to crack, if you estimate a 100x speedup using a GPU it would only take about 20 days to crack an address

Edit: Forgot to mention I got 8 MA/S when I used a 32 core AWS server.
There won't be much of a speedup, if any, when using GPUs to crack Krist addresses. In fact, it would probably just slow down cracking. Why? Because of the way graphics cards work.

GPUs are very good at doing the same thing on a lot of data. For example, if you have a list of numbers and you want to add 1 to each item in the list, on a CPU you would have to iterate over the entire array and add 1 each time. On a GPU, you can simply add 1 to the entire array almost simultaneously - each of the 1000+ cores on the GPU will add 1 to a specific item in the array.

One limitation, however, is that the cores have to be doing the same thing, just on different data. One core cannot be adding while the rest are multiplying. This is fine for things like mining, you're doing the exact same operations each time, on different data.

However, when generating krist addresses, there are variable length loops. This means that, for some addresses, it will take more iterations of the loops than others. This is VERY bad on a GPU - if one core needs to loop extra times, ALL the cores must stop and wait for it before moving on to the next address.

Additionally, graphics cards are EXTREMELY slow (compared to CPUs) when you are performing comparisons or branching - so if statements are very slow. And generating a v2 address requires 2 if statements and multiple comparisons.

And don't forget about double vaults either - they are much more secure than regular addresses.

View PostCreator, on 15 February 2016 - 05:43 PM, said:

How difficult would it be to make an ASIC miner? (Or however that special box is called.)

Well, you'd have to create the chips yourself and everything. Have fun with that.

Edited by apemanzilla, 15 February 2016 - 06:22 PM.


#1228 Tron

  • Members
  • 63 posts
  • LocationMinecraftia

Posted 15 February 2016 - 06:31 PM

View Postapemanzilla, on 15 February 2016 - 06:22 PM, said:

There won't be much of a speedup, if any, when using GPUs to crack Krist addresses. In fact, it would probably just slow down cracking. Why? Because of the way graphics cards work.

GPUs are very good at doing the same thing on a lot of data. For example, if you have a list of numbers and you want to add 1 to each item in the list, on a CPU you would have to iterate over the entire array and add 1 each time. On a GPU, you can simply add 1 to the entire array almost simultaneously - each of the 1000+ cores on the GPU will add 1 to a specific item in the array.

One limitation, however, is that the cores have to be doing the same thing, just on different data. One core cannot be adding while the rest are multiplying. This is fine for things like mining, you're doing the exact same operations each time, on different data.

However, when generating krist addresses, there are variable length loops. This means that, for some addresses, it will take more iterations of the loops than others. This is VERY bad on a GPU - if one core needs to loop extra times, ALL the cores must stop and wait for it before moving on to the next address.

Additionally, graphics cards are EXTREMELY slow (compared to CPUs) when you are performing comparisons or branching - so if statements are very slow. And generating a v2 address requires 2 if statements and multiple comparisons.

And don't forget about double vaults either - they are much more secure than regular addresses.
First off, double vaults are just regular addresses to the Krist server and so are as easy/hard to crack.
Secondly, until the protein is created all the GPU cores would do the same thing, and almost all addresses can be discarded after this step, any remaining addresses can be safely and quickly calculated by the CPU.
GPU pseudocode

Edited by Tron, 15 February 2016 - 06:34 PM.


#1229 bauen1

  • Members
  • 102 posts
  • LocationIn your Computer

Posted 15 February 2016 - 06:43 PM

Well i guess its best to spread your krist to multiple addresses.
So if the work goes low enough that its better to mine for addresses (using cpu or gpu) we are gonna have a problem

Edited by bauen1, 15 February 2016 - 06:46 PM.


#1230 apemanzilla

  • Members
  • 1,421 posts

Posted 15 February 2016 - 06:50 PM

View PostTron, on 15 February 2016 - 06:31 PM, said:

View Postapemanzilla, on 15 February 2016 - 06:22 PM, said:

There won't be much of a speedup, if any, when using GPUs to crack Krist addresses. In fact, it would probably just slow down cracking. Why? Because of the way graphics cards work.

GPUs are very good at doing the same thing on a lot of data. For example, if you have a list of numbers and you want to add 1 to each item in the list, on a CPU you would have to iterate over the entire array and add 1 each time. On a GPU, you can simply add 1 to the entire array almost simultaneously - each of the 1000+ cores on the GPU will add 1 to a specific item in the array.

One limitation, however, is that the cores have to be doing the same thing, just on different data. One core cannot be adding while the rest are multiplying. This is fine for things like mining, you're doing the exact same operations each time, on different data.

However, when generating krist addresses, there are variable length loops. This means that, for some addresses, it will take more iterations of the loops than others. This is VERY bad on a GPU - if one core needs to loop extra times, ALL the cores must stop and wait for it before moving on to the next address.

Additionally, graphics cards are EXTREMELY slow (compared to CPUs) when you are performing comparisons or branching - so if statements are very slow. And generating a v2 address requires 2 if statements and multiple comparisons.

And don't forget about double vaults either - they are much more secure than regular addresses.
First off, double vaults are just regular addresses to the Krist server and so are as easy/hard to crack.
Secondly, until the protein is created all the GPU cores would do the same thing, and almost all addresses can be discarded after this step, any remaining addresses can be safely and quickly calculated by the CPU.
GPU pseudocode

The 'password' for double vaults is much longer than a normal address, however.

Additionally, on a GPU you would be generating somewhere in the realm of ~2000 krist addresses per cycle. The problem is that if any one of those addresses takes more loops than usual, ALL of the other cores have to stop and wait for it to finish. Not to mention there are a lot of comparisons and branching, which also slow down generation a lot.

There's also no 'string' object for GPUs. Minor inconvenience.

And finally, GPU code is an absolute pain in the arse. Difficult to write, difficult to debug, difficult to use, and extremely verbose. I would know as I had to write, from scratch, a SHA256 implementation in OpenCL. You're more than welcome to try to write an address cracker for the GPU, but I highly doubt you will get anything out of it. And in the end, it's just Krist.

Edited by apemanzilla, 15 February 2016 - 06:51 PM.


#1231 Tron

  • Members
  • 63 posts
  • LocationMinecraftia

Posted 15 February 2016 - 07:00 PM

View Postapemanzilla, on 15 February 2016 - 06:50 PM, said:

The 'password' for double vaults is much longer than a normal address, however.

Additionally, on a GPU you would be generating somewhere in the realm of ~2000 krist addresses per cycle. The problem is that if any one of those addresses takes more loops than usual, ALL of the other cores have to stop and wait for it to finish. Not to mention there are a lot of comparisons and branching, which also slow down generation a lot.

There's also no 'string' object for GPUs. Minor inconvenience.

And finally, GPU code is an absolute pain in the arse. Difficult to write, difficult to debug, difficult to use, and extremely verbose. I would know as I had to write, from scratch, a SHA256 implementation in OpenCL. You're more than welcome to try to write an address cracker for the GPU, but I highly doubt you will get anything out of it. And in the end, it's just Krist.
I just want to say you are completely right, coding a GPU miner address cracker would be very difficult and will likely never be done, I just wanted to point out the theoretical possibility of a GPU miner address cracker.
Secondly, and I've mentioned this before, when brute forcing and address I'd assume you will not find the original password, but one that makes a collision with the real one, I've demonstrated a few posts back the collisions do exist with v2 addresses. Once your password is beyond ~20 characters the original doesn't really matter for brute forcing, what collides with the address does.
Finally, the GPU code would not really do more loops, the same code would be executed, an address cracker would likely save the final loop that determines placement of characters for addresses with a protein containing only characters that are in the address being cracked for the CPU.

Edited by Tron, 15 February 2016 - 07:08 PM.


#1232 apemanzilla

  • Members
  • 1,421 posts

Posted 15 February 2016 - 07:02 PM

View PostTron, on 15 February 2016 - 07:00 PM, said:

View Postapemanzilla, on 15 February 2016 - 06:50 PM, said:

The 'password' for double vaults is much longer than a normal address, however.

Additionally, on a GPU you would be generating somewhere in the realm of ~2000 krist addresses per cycle. The problem is that if any one of those addresses takes more loops than usual, ALL of the other cores have to stop and wait for it to finish. Not to mention there are a lot of comparisons and branching, which also slow down generation a lot.

There's also no 'string' object for GPUs. Minor inconvenience.

And finally, GPU code is an absolute pain in the arse. Difficult to write, difficult to debug, difficult to use, and extremely verbose. I would know as I had to write, from scratch, a SHA256 implementation in OpenCL. You're more than welcome to try to write an address cracker for the GPU, but I highly doubt you will get anything out of it. And in the end, it's just Krist.
I just want to say you are completely right, coding a GPU miner would be very difficult and will likely never be done, I just wanted to point out the theoretical possibility of a GPU miner.
Secondly, and I've mentioned this before, when brute forcing and address I'd assume you will not find the original password, but one that makes a collision with the real one, I've demonstrated a few posts back the collisions do exist with v2 addresses. Once your password is beyond ~20 characters the original doesn't really matter for brute forcing, what collides with the address does.
Finally, the GPU code would not really do more loops, the same code would be executed, an address cracker would likely save the final loop that determines placement of characters for addresses with a protein containing only characters that are in the address being cracked for the CPU.

Just want to point out that you said a GPU miner will never be created...
Posted Image

#1233 Tron

  • Members
  • 63 posts
  • LocationMinecraftia

Posted 15 February 2016 - 07:08 PM

View Postapemanzilla, on 15 February 2016 - 07:02 PM, said:

View PostTron, on 15 February 2016 - 07:00 PM, said:

View Postapemanzilla, on 15 February 2016 - 06:50 PM, said:

The 'password' for double vaults is much longer than a normal address, however.

Additionally, on a GPU you would be generating somewhere in the realm of ~2000 krist addresses per cycle. The problem is that if any one of those addresses takes more loops than usual, ALL of the other cores have to stop and wait for it to finish. Not to mention there are a lot of comparisons and branching, which also slow down generation a lot.

There's also no 'string' object for GPUs. Minor inconvenience.

And finally, GPU code is an absolute pain in the arse. Difficult to write, difficult to debug, difficult to use, and extremely verbose. I would know as I had to write, from scratch, a SHA256 implementation in OpenCL. You're more than welcome to try to write an address cracker for the GPU, but I highly doubt you will get anything out of it. And in the end, it's just Krist.
I just want to say you are completely right, coding a GPU miner would be very difficult and will likely never be done, I just wanted to point out the theoretical possibility of a GPU miner.
Secondly, and I've mentioned this before, when brute forcing and address I'd assume you will not find the original password, but one that makes a collision with the real one, I've demonstrated a few posts back the collisions do exist with v2 addresses. Once your password is beyond ~20 characters the original doesn't really matter for brute forcing, what collides with the address does.
Finally, the GPU code would not really do more loops, the same code would be executed, an address cracker would likely save the final loop that determines placement of characters for addresses with a protein containing only characters that are in the address being cracked for the CPU.

Just want to point out that you said a GPU miner will never be created...
Posted Image
Meant to say a GPU address miner/cracker, sorry.

Edited by Tron, 15 February 2016 - 07:13 PM.


#1234 bauen1

  • Members
  • 102 posts
  • LocationIn your Computer

Posted 15 February 2016 - 07:21 PM

If the work gets to the point where it should take multiple hours to get a block with available tools, krist will not get so much popularity as people aren't able to get a decent amount of krist and people might start mining for addresses.
Addresses which are generated using KVanity can also get generate again using KVanity, making it faster because it only uses some characters. (This is for addresses like yours (Your funds still "have" to go through your real address using a double vault, so an attacker could automatically check and transfer any money that gets in there.))

Edited by bauen1, 15 February 2016 - 07:23 PM.


#1235 Tron

  • Members
  • 63 posts
  • LocationMinecraftia

Posted 15 February 2016 - 07:28 PM

View Postbauen1, on 15 February 2016 - 07:21 PM, said:

If the work gets to the point where it should take multiple hours to get a block with available tools, krist will not get so much popularity as people aren't able to get a decent amount of krist and people might start mining for addresses.
Addresses which are generated using KVanity can also get generate again using KVanity, making it faster because it only uses some characters. (This is for addresses like yours (Your funds still "have" to go through your real address using a double vault, so an attacker could automatically check and transfer any money that gets in there.))
I am by no means an expert on KVanity but I believe it includes the option of a prefix and probably uses enough characters that it will not often use the same key while looking for a vanity address, and I find it highly unlikely it will output the same vanity address multiple times.

#1236 bauen1

  • Members
  • 102 posts
  • LocationIn your Computer

Posted 15 February 2016 - 07:33 PM

It uses no random generator meaning that if given the same arguments, it should produce the same results, as the arguments you can use the target address as the prefix.
It also only uses A-Z and 0-9 for the password in the generation process.
Now use KVanity with
java -jar kvanity.jar -p k5ztameslf
It should produce the same results (and the same cpu cycle used).

Example explaining the above:
-- The Programm uses no random gen and when given a number for arg it will always produce the same output for the same argument
print (arg + 1)
-- This Programm uses a random generator and 'should' output different results for the same number for arg
print (arg + math.random ())

For the geeks:
This also applies to most random generators, give it a seed and the output of the next random calculation is always the same

Edited by bauen1, 15 February 2016 - 07:39 PM.


#1237 ___

  • Members
  • 42 posts
  • LocationAt exactly 32.251198, -64.822480

Posted 15 February 2016 - 07:39 PM

Anyone want to donate to me?
Feeling generous:
k38gq88ehl

#1238 ___

  • Members
  • 42 posts
  • LocationAt exactly 32.251198, -64.822480

Posted 15 February 2016 - 07:45 PM

I am going to set up my own cluster and post what I get on that. Should take a little while...

#1239 bauen1

  • Members
  • 102 posts
  • LocationIn your Computer

Posted 15 February 2016 - 07:53 PM

There is an internal server error displayed, maybe related to the latest update.

#1240 Lemmmy

  • Members
  • 218 posts

Posted 15 February 2016 - 07:55 PM

View Postbauen1, on 15 February 2016 - 07:53 PM, said:

There is an internal server error displayed, maybe related to the latest update.

That's me working on something new, that will be fixed when I push the latest changes to git.





1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users