m0wer's avatar
m0wer
m0wer@stacker.news
npub1w3va...4c5c
Bitcoiner.
m0wer's avatar
m0wer 53 mins ago
There is an ongoing attack against JoinMarket makers where a random nick not serving onion constantly sends !orderbook requests through directory servers. The makers and directories mostly cope with the load, but the log files, which have a hardcoded debug log level, grow several gigabytes per hour and crash many makers. A solution is to setup hourly log rotation. In Debian systems, you can move logrotate from daily to hourly cron using: ``` dpkg-divert --add --rename --divert /etc/cron.hourly/logrotate /etc/cron.daily/logrotate ``` The default user data directory is `$HOME_DIR/.joinmarket`. Create a logrotate config: ``` /home/user/.joinmarket/logs/*.log { hourly size 100M copytruncate rotate 24 notifempty missingok } ``` To install and test, save the config to `/etc/logrotate.d/joinmarket-logs`, test it with `sudo logrotate -d /etc/logrotate.d/joinmarket-logs`, and force run manually with `sudo logrotate -f /etc/logrotate.d/joinmarket-logs` or wait for automatic hourly execution via cron.
m0wer's avatar
m0wer 0 months ago
Advent of Code 2025 Advent of Code is an Advent calendar of small programming puzzles for a variety of skill levels that can be solved in any programming language you like. People use them as interview prep, company training, university coursework, practice problems, a speed contest, or to challenge each other.
m0wer's avatar
m0wer 1 month ago
Analyze JoinMarket Bitcoin CoinJoin transactions using ILP. # JoinMarket Analyzer: Understanding CoinJoin Change Outputs I've released a tool called **joinmarket-analyzer** to match inputs and change outputs in JoinMarket transactions, identifying who the taker was. **Goal:** The purpose is **not to spread FUD**, but to raise awareness. It's crucial to understand that this analysis **only affects change outputs**. The equal-amount outputs—which provide the actual privacy in a CoinJoin—remain indistinguishable. The tool uses Integer Linear Programming (ILP) to match inputs with their respective changes and determine which participant is the likely "Taker" (the one initiating the transaction and paying fees) and which are the "Makers" (liquidity providers earning fees). ## Example Usage You can run it easily with Docker: ```bash docker run --rm ghcr.io/m0wer/joinmarket_analyzer:master \ 0cb4870cf2dfa3877851088c673d163ae3c20ebcd6505c0be964d8fbcc856bbf \ --max-fee-rel 0.001 --max-solutions 1 ``` ## Results The tool outputs the probable structure of the transaction: ``` ... Taker: Participant 4 (pays 21,368 sats) 💰 Participant 1 (maker) Inputs: [0] Outputs: Equal=6.3M sats, Change=113M sats Fee receives: 458 sats ... 🎯 Participant 4 (taker) Inputs: [4] Outputs: Equal=6.3M sats, No change output Fee pays: 21,368 sats ... ``` [View this transaction on mempool.space]( ## Future Possibilities This tool lays the groundwork for more advanced privacy research: * **Entropy Evaluation:** Measure how "ambiguous" change outputs are. If multiple valid solutions exist, the Taker is harder to pinpoint. * **Algorithm Design:** Evaluate and improve taker algorithms to intentionally create ambiguous change structures. * **Market Stats:** Analyze historical CoinJoins to gather statistics on fee limits used by takers and earnings by makers. Check out the code and contribute: https://github.com/m0wer/joinmarket-analyzer
m0wer's avatar
m0wer 1 month ago
polyarb: Polymarket arbitrage bot for overlapping markets # Made Some Free Money During the 2024 Presidential Election (PolyArb) ⚠️ **SHITCOIN ALERT** ⚠️ This involves USDC on Polygon. You've been warned. So during the 2024 presidential election, I built this Python tool called [PolyArb](https://github.com/m0wer/polyarb) to find arbitrage opportunities on Polymarket. The basic idea: when you have overlapping prediction markets (like "Trump wins presidency" AND "Trump wins the presidency and the popular vote"), sometimes the prices get out of whack. The sum of the atomic outcomes should equal the price of the combined markets, but they don't always. When that happens, there's free money on the table. During the election, there was insane liquidity in these markets, and the tool would automatically scan for these mispriced combinations and execute trades to capture the spread. No directional betting, no predictions needed – just pure math arbitrage. It worked surprisingly well. The election created the perfect storm: high volume, multiple overlapping markets, and enough volatility to create regular mispricings. The repo has the full code, CLI tools for managing wallets and positions, and even a daemon mode to run it automatically. There's a whole breakdown of the election strategy in the README if you're curious how it worked. Anyway, thought some of you might find it interesting. Again, shitcoins involved, but the arbitrage logic is pretty fun.
m0wer's avatar
m0wer 1 month ago
The Perfect Router Does Not Exi— - YouTube This build redefines what a router can be. Haven is an open-source, portable Wi-Fi HaLow mesh router that runs on a Raspberry Pi 4, capable of linking devices over kilometers without internet or subscriptions. It uses the same sub-GHz spectrum as LoRa and Meshtastic but supports full IP networking — meaning all your regular apps just work. Built entirely from open hardware and open firmware, Haven runs 802.11s + BATMAN for self-healing, peer-to-peer communication you truly own.
m0wer's avatar
m0wer 1 month ago
Why does nobody believe the theft of 215 bitcoins from Luke Dashjr? > Luke Dashjr, one of Bitcoin's leading developers, has been making headlines lately after having 215 bitcoins stolen. Dashjr explained that a hacker gained access to his server, his Pretty Good Privacy (PGP) system, his wallet, and his bitcoins. It's unbelievable that one of the people who has contributed the most to the cybersecurity of the Bitcoin protocol could have been hacked so easily and lost such a large sum of money.
m0wer's avatar
m0wer 1 month ago
DEF CON 33 - Stories from a Tor dev - Roger 'arma' Dingledine - YouTube > What is it actually like to support and balance a global anonymity network, with users ranging from political dissidents to national security analysts? You say it's important to teach law enforcement and governments about privacy and end-to-end encryption, but how do those conversations go in practice? I heard you accidentally got Russia to block all of Azure for a day? Are you ever going to do a Tor talk in China? Wait, who exactly tried to bribe you to leave bugs in Tor to support their criminal schemes? > Historically I've tried to downplay some of the excitement from operating the Tor network and teaching the world about Tor, but this year I'm going to try my hand at the "war stories" track.
m0wer's avatar
m0wer 2 months ago
DEF CON 33 - Kill List: Hacking an Assassination Site on the Dark Web - YouTube Four years ago, Chris found a vulnerability with a murder for hire site on the dark net. He could exploit that vulnerability to intercept the murder orders that were being placed: names, addresses, pattern of life information, photos, and, in some cases, bitcoin payments. He reached out to Carl for help, and a small team was built in secret to intercept and triage these orders. However, after their warnings to the police fell on deaf ears, they ultimately decided to warn the targets on the kill list directly. After an initial series of successes, the investigation expanded rapidly and they formed a global cooperation with the FBI and police forces around the world, resulting over 175 murder orders being disclosed, 34 arrests 28 convictions and over 180 years of prison time being sentenced. This talk will be about those years: about the dangers and threats the team had to navigate, the times of isolation when the police wouldn’t take them seriously, about raids in Romania to uncover the cyber-criminal gang running the site and the psychological impact of racing against time to try to stop people getting murdered.