*freezes your account*

nothing personnel kid

Attached: freeze.png (1050x825, 36K)

Other urls found in this thread:

hackerone.com/eosio/hacktivity
reddit.com/r/eos/comments/8om96j/ethical_hacker_makes_120k_usd_in_one_week_by/
thehackernews.com/2018/05/eos-blockchain-smart-contract.html
cryptoslate.com/batchoverflow-exploit-creates-trillions-of-ethereum-tokens/
peckshield.com/2018/06/15/EPoD/
arstechnica.com/information-technology/2018/03/ethereum-fixes-serious-eclipse-flaw-that-could-be-exploited-by-any-kid/
twitter.com/AnonBabble

...

you were being mean to people on the internet, EOS has de-platformed you and appropriated your funds.

if the stake holders decide that you should be out, you should be out. It's their network.

his is 10000x better than bitcoin btc.

It's by design, not a flaw. If you're too dumb to understand that, stay poor and keep buying shitty btc / eth clones.

Sure is reddit in here

Attached: eosnolaunch.png (1055x120, 22K)

Follow the EOS way.

Attached: 484857.jpg (106x124, 2K)

, He says while defending his shitty eth clone

Anons predicting it's never going to launch were always wrong, but still, it's going to die within a year.
hackerone.com/eosio/hacktivity
The network is live and there are security holes found nearly everyday.
The code is shit.
One guy already decided to fuck the network up rather than take $10k. It was shrugged off.
Repeat that two-three times and eos becomes a total laughingstock.
If any bug allows stealing from exchanges (by selling stolen eos for real coins) eos is going to get delisted from all exchanges.

>copy pasting fud from the other thread
I really hope for your sake that you're being paid for this. It's pretty sad.

Attached: eosmemes.png (792x600, 83K)

i only have 165 eos. wat do

>fud
>23 security holes detected during last three weeks

>copy pasting facts
>facts
>facts
increasingly desperate bagholders call this fud
>not too smart

if the bps in a conf call decide that you should be out you mean. this slope looks pretty sliperry to me

According to your link, one bounty has been awarded. Where are these 23 security holes you speak of and why aren't they getting bounties for them?

*uploads CP to your dapp that can never be removed*
*forks your blockchain and rolls back the last month's worth of transactions because no one considered the possibility that software might have bugs*
nothing personnel kid

>According to your link, one bounty has been awarded
???
There are 23 $10k bounties paid in total

Attached: Screenshot-2018-6-19 Block one's Hacktivity - HackerOne.png (919x820, 45K)

You realize that anyone can create a bounty claim for any reason, right? That doesn't mean they actually found a bug. Only one of those bounties was paid.

fair enough actually, that's unironically a pretty good point

Attached: the_memer.jpg (700x525, 191K)

No they ever hired the guido guy after he made $120k from that side.
reddit.com/r/eos/comments/8om96j/ethical_hacker_makes_120k_usd_in_one_week_by/
closed means paid, not sure what's the difference between 'bounty awarded' and closed

The earliest payout for 'yukichen' is for this:
thehackernews.com/2018/05/eos-blockchain-smart-contract.html

I stand corrected, but this just goes to show that they're taking security seriously and hardening the code to the best of their ability. All software has bugs. Ethereum and BTC both had loads of bugs when they were new.

>but this just goes to show that they're taking security seriously
No it doesn't. They should have delayed the launch three months after the first RCE bug for a thorough security analysis. That would be responsible.
Finding 23 maximum severity security holes in three weeks means it's almost certain there are many more. Simple probability.
>Ethereum and BTC both had loads of bugs when they were new.
Ethereum had zero.

>They should have delayed the launch three months after the first RCE bug for a thorough security analysis.
They had obligations to their token holders.

>Finding 23 maximum severity security holes in three weeks means it's almost certain there are many more. Simple probability.
It's very likely that these bugs were known about for a long time and only disclosed once the bounty was announced. Also they were not all maximum security bugs. We don't even know the nature of the bugs since the reports aren't disclosed. Why make things up?

>Ethereum had zero
You're either new or delusional. Solidity is written in C++. The chances of someone writing a compiler in C++ with zero vulnerabilities is zero.

heh. solidity is just an abstract way of connecting to the EVM though. its not a vital part of the ecosystem.

You're desperation is strong. I won't even feel bad for you when eth is 2500$ and flippening commences while eos heads to the inevitable 0$

Nice mental gymnastics there bro. A quick google proves you wrong.
cryptoslate.com/batchoverflow-exploit-creates-trillions-of-ethereum-tokens/

>It's very likely that these bugs were known about for a long time and only disclosed once the bounty was announced.
Um... that's why they aren't disclosed.
Larimer had the arrogance to call the Chinese bug report 'FUD'. It turned out to be true.
That bug is what pushed them to make these pitiful bounties.
>The chances of someone writing a compiler in C++ with zero vulnerabilities is zero.
You don't know what you're talking about. Ethereum is a protocol. Solidity is a language that's compiled to EVM (Ethereum Virtual Machine). And it's absolutely possible to write secure code in C++ if you know what you're doing.

Attached: taking security seriously.jpg (576x1024, 106K)

*moons violently for the nth time in a bear market*
heh, nothing personal, ked.

That's a bug in a smart contract written by someone, not ethereum.

>being this delusional
I'm not the one sperging out in every Ethereum thread about how Ethereum is so terrible. That's what really reeks of desperation. You're so afraid for your investment that you're compelled to waste your time spreading FUD about its competition. This is how you spend your time.

>You don't know what you're talking about. Ethereum is a protocol. Solidity is a language that's compiled to EVM (Ethereum Virtual Machine). And it's absolutely possible to write secure code in C++ if you know what you're doing.
I'm a C coder, I know exactly what I'm talking about. There is no such thing as millions of lines of C++ code free of vulnerabilities. Linux, Windows, various SQL implementations, OSX, they all have had and will continue to have vulnerabilities. Ethereum is not a special snowflake, and neither is EOS.

Attached: eosprediction7.png (1882x941, 369K)

This.

Ethereum is proven and so long as scaling is successful it will be unstoppable

>cryptoslate.com/batchoverflow-exploit-creates-trillions-of-ethereum-tokens/
thats not a bug in the actual solidity language. its just a bug that somone made when using solidity in a non-safe way. overflows are common bugs in a lot of languages... its literally just a case of devs being incompetent and not doing
if(x > 0 && x < max) { }

or just using standard safeMath lib that ethereum made themselves.

I meant this image

Attached: taking security seriously.png (562x963, 526K)

Ethereum is proven what? It's been out for 2 years and the only thing anyone uses it for is pyramid schemes and pump n dump ICO's. Ironically, EOS is probably the most valuable thing that's ever come out of the ethereum ecosystem. And it will never scale. Sharding is about as realistic as the LN.

Why does solidity allow you to compile code with integer overflows?

>I'm a C coder, I know exactly what I'm talking about.
No you don't know shit, you don't even know the difference between solidity, evm, ethereum and code written in solidity.
Few hours of programming class that teached you how to write a console calculator doesn't mean you're a 'C coder'.

I've been writing secure distributed systems software for 5 years. You're just bad at reading.

The more overboard FUD I see about EOS, the more I am convinced it is the future.

Yes yes and I'm a Chinese Empress.
No actual coder would make the mistake of calling a bug in someone's smart contract a bug in solidity.

See: >the efficiency of Java and the safety of C

Hmm let's see if we can find more.

>On June 15th, Dr. Jiang, founder and CEO of PeckShield, announced that PeckShield had found a security breach that could lead to 60% of current Ethereum nodes to crash in seconds.
peckshield.com/2018/06/15/EPoD/

Oh look here's another one

>Developers of Ethereum, the world's No. 2 digital currency by market capitalization, have closed a serious security hole that allowed virtually anyone with an Internet connection to manipulate individual users' access to the publicly accessible ledger.
arstechnica.com/information-technology/2018/03/ethereum-fixes-serious-eclipse-flaw-that-could-be-exploited-by-any-kid/

t. loser brainlet

That's something new and there's no information yet.
It's not a network killing bug by their own admission - 40% nodes would remain.
That's also not a network killing bug, it would only impact new nodes trying to connect to the true network. It also required significant mining power to execute.

These bugs are nothing compared to network killing bugs that were found in eos, but even if counted as equivalent, that makes only two bugs over three years. EOS had 23 maximum severity bugs in 17 days.

Btw main ethereum node is written in Go, not C++.

>making people connect to malicious nodes isn't severe
>taking down 60% of the network isn't network killing
LOL i'm done with you kid. Have fun with your Ethereum bags.

>making people connect to malicious nodes isn't severe
This isn't EOS, malicious nodes can't change account balances. This attack would only allow double spending.
>taking down 60% of the network isn't network killing
???
It objectively isn't, because the network continues to function. To kill a decentralized network you must take almost everything down. For ethereum that means attacking Parity and Geth nodes at the same time.

That's one of the reasons why EOS is centralized - because it only has 21 nodes, all running same software.