<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://en.bitcoin.it/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Notawake</id>
	<title>Bitcoin Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://en.bitcoin.it/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Notawake"/>
	<link rel="alternate" type="text/html" href="https://en.bitcoin.it/wiki/Special:Contributions/Notawake"/>
	<updated>2026-04-10T14:30:03Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Tor&amp;diff=21726</id>
		<title>Tor</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Tor&amp;diff=21726"/>
		<updated>2012-01-05T20:03:54Z</updated>

		<summary type="html">&lt;p&gt;Notawake: Fixed broken bitcoin forum link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Tor&#039;&#039;&#039; is a distributed &#039;onion&#039; network, that makes it more difficult for an adversary to track any one peer on the network.  Tor also is very useful to access the &#039;uncensored&#039; internet in countries such as China and Iran. Preserving privacy means not only hiding the content of messages, but also hiding who is talking to whom (traffic analysis). Tor provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis.&lt;br /&gt;
&lt;br /&gt;
Bitcoin can run easily on the Tor network. &lt;br /&gt;
&lt;br /&gt;
=Tor installation &amp;amp; use=&lt;br /&gt;
&#039;&#039;todo explain: onion routing (how tor network helps to anonymize), encryption used, exit nodes, routers&#039;&#039;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please follow the instructions provided with installation files and read the [http://www.torproject.org/download/download.html.en#warning list of warnings]. &#039;&#039;Tor doesn&#039;t magically anonymize all your traffic just because you install it.&#039;&#039;&amp;lt;br /&amp;gt;&lt;br /&gt;
Down the page you can find examples how to configure applications to use Tor to anonymize the origin of your traffic.&amp;lt;br /&amp;gt;&lt;br /&gt;
[http://www.torproject.org/docs/tor-doc-windows.html.en This] is a detailed installation guide for Windows. Before you setup Bitcoin or mIRC to use Tor, please install Tor and start in.&amp;lt;br /&amp;gt;&lt;br /&gt;
[[{{ns:file}}:20110109-tor-running.png]] On the taskbar of your compute you&#039;ll see a small green onion when Tor is running.&lt;br /&gt;
[[{{ns:file}}:20110109-bitcoin-mirc-vidalia.png]]&lt;br /&gt;
&lt;br /&gt;
=GUI=&lt;br /&gt;
Once you have your Tor client up &amp;amp; running, you can configure your Bitcoin client to use it.&amp;lt;br /&amp;gt;&lt;br /&gt;
Select in menu Settings -&amp;gt; Options&amp;lt;br /&amp;gt;&lt;br /&gt;
[[{{ns:file}}:20110108-btc-options.png]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Check &amp;quot;Connect through socks 4 proxy&amp;quot; with the address 127.0.0.1 and port 9050 (the Tor default port number)&amp;lt;br /&amp;gt;&lt;br /&gt;
[[{{ns:file}}:20110108-btc-client-tor-as-proxy.png]]&amp;lt;br /&amp;gt;&lt;br /&gt;
Configuring an application to use Tor is also called to torify it.&lt;br /&gt;
(needs a brief howto here)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;the note about bitcoin-otc promote on a more appropriate place in this page? reference to trading and IRC&#039;&#039;&lt;br /&gt;
Conducting business using [[bitcoin-otc]] can be done more anonymously when directly connected to a Freenode IRC hidden service.&lt;br /&gt;
&lt;br /&gt;
=bitcoind=&lt;br /&gt;
&lt;br /&gt;
Run bitcoind with -proxy=127.0.0.1:9050 (or whatever your SocksPort is).&lt;br /&gt;
&lt;br /&gt;
bitcoind will detect that you are using a proxy on 9050 and will force the &amp;quot;nolisten&amp;quot; flag.  If you are not running tor on 9050, you need to set &amp;quot;nolisten&amp;quot; manually otherwise you will listen on your public IP and possibly reveal that you are running a node.&lt;br /&gt;
&lt;br /&gt;
=Hidden services=&lt;br /&gt;
These services are running within the tor network. You can connect to them for example using the -connect= parameter to bitcoind. Note that you do not need to use them - tor can also anonymize your normal internet traffic, including bitcoin connections. There are some technical reasons why hidden services may be beneficial, see the tor documentation if you&#039;re really interested.&lt;br /&gt;
&lt;br /&gt;
Services are listed at [[Fallback_Nodes#Tor_network]] along with instructions for using them.&lt;br /&gt;
&lt;br /&gt;
=Pooled Mining=&lt;br /&gt;
&lt;br /&gt;
Some mining pools are available as a hidden service on the tor network.  Any pool can be reached over tor.  The general methodology here is to tell your mining client to use your local Tor proxy.  This is client specific but there are some helpful hints.&lt;br /&gt;
&lt;br /&gt;
==Linux / BSD==&lt;br /&gt;
&lt;br /&gt;
Any client can have its traffic routed via Tor by using the torify command and invoking the miner with that.  Another method is to set the http_proxy environment variable as some miners use libraries which support that.&lt;br /&gt;
&lt;br /&gt;
==Windows / OS X==&lt;br /&gt;
&lt;br /&gt;
It is possible to set the http_proxy environment variable as some miners use libraries which support that.&lt;br /&gt;
&lt;br /&gt;
=mIRC=&lt;br /&gt;
&lt;br /&gt;
mIRC is a popular IRC client. This is a guide how to connect to Freenode IRC using Tor + SASL + mIRC.&amp;lt;br /&amp;gt;&lt;br /&gt;
==Register your nick with freenode nickserv&amp;lt;br /&amp;gt;==&lt;br /&gt;
Freenode only allows SASL authenticated users to connect to the onion IRC server. SASL authentication works only with a registered nickname.&amp;lt;br /&amp;gt;&lt;br /&gt;
Connect to Freenode IRC without using tor &amp;amp; execute&amp;lt;br /&amp;gt;&lt;br /&gt;
/msg nickserv register &amp;lt;password&amp;gt; &amp;lt;email&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
You will see something like this&amp;lt;br /&amp;gt;&lt;br /&gt;
-NickServ- An email containing nickname activation instructions has been sent to &amp;lt;email&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
-NickServ- If you do not complete registration within one day, your nickname will expire.&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
To finish your nick registration go the provided email and copy/paste the command from e-mail to irc.&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Add SASL support to your mIRC installation&amp;lt;br /&amp;gt;==&lt;br /&gt;
Download the SASL.dll and sasl.mrc files and copy them to your mIRC installation directory&amp;lt;br /&amp;gt;&lt;br /&gt;
Load sasl.mrc script (Alt + R to open script editor, Ctrl + L to load file, browse to sasl.mrc, press OK or &amp;quot;save &amp;amp; exit&amp;quot;).&amp;lt;br /&amp;gt;&lt;br /&gt;
[[{{ns:file}}:20110109-sasl-script-loaded.png]]&amp;lt;br /&amp;gt;&lt;br /&gt;
Type /dialog -m SASL.main SASL.main to open the SASL connection manager.&amp;lt;br /&amp;gt;&lt;br /&gt;
[[{{ns:file}}:20110109-sasl-dialog.png]]&amp;lt;br /&amp;gt;&lt;br /&gt;
Add Freenode entry.&amp;lt;br /&amp;gt;&lt;br /&gt;
[[{{ns:file}}:20110109-sasl-manager.png]][[{{ns:file}}:20110109-sasl-manager-network.png]]&amp;lt;br /&amp;gt;&lt;br /&gt;
Network is Freenode.&amp;lt;br /&amp;gt;&lt;br /&gt;
Username and NS Password must match your nickserv reservation.&amp;lt;br /&amp;gt;&lt;br /&gt;
Auth Type can be PLAIN&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==setup mIRC to use Tor&amp;lt;br /&amp;gt;==&lt;br /&gt;
Add the entry for Freenode onion IRC server&amp;lt;br /&amp;gt;&lt;br /&gt;
[[{{ns:file}}:20110109-onion-irc-add.png]]&amp;lt;br /&amp;gt;&lt;br /&gt;
Configure mIRC to use a Proxy (your local Tor proxy)&amp;lt;br /&amp;gt;&lt;br /&gt;
[[{{ns:file}}:20110109-mirc-proxy.png]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
Now you should be able to connect.&amp;lt;br /&amp;gt;&lt;br /&gt;
[https://www.bitcointalk.org/index.php?topic=2602 Bitcoin forum where this topic is discussed]&lt;br /&gt;
&lt;br /&gt;
=How Tor works=&lt;br /&gt;
Unlike Freenet, I2P, etc., Tor&#039;s security is very well-defined. While weaknesses do exist (described below), they have been known since Tor was created, and new weaknesses of significance are not expected.&lt;br /&gt;
&lt;br /&gt;
Tor sends TCP packets over 3 (normal) or 7 (hidden services) Tor relays. This is why it is so slow: your packet might have to go through 100 computers (counting Internet routers) before it reaches its destination. Tor uses multiple &#039;&#039;layers&#039;&#039; of encryption that are &#039;&#039;pulled away&#039;&#039; for each node. Hence the name &#039;&#039;&#039;T&#039;&#039;&#039;he &#039;&#039;&#039;O&#039;&#039;&#039;nion &#039;&#039;&#039;R&#039;&#039;&#039;outer, which is always capitalized as &#039;&#039;&#039;Tor&#039;&#039;&#039;, and never TOR or t.o.r.&lt;br /&gt;
&lt;br /&gt;
Say that I want to connect to bitcoin.org through Tor. I first select three Tor relays that I know about. Then, I send a message to my ISP that looks like this:&lt;br /&gt;
 Send to this IP: &amp;lt;IP of Relay1&amp;gt;&lt;br /&gt;
 &amp;lt;Encrypted data for Relay1&amp;gt;&lt;br /&gt;
When Relay1 receives this, he decrypts the payload using his private key. The payload contains this:&lt;br /&gt;
 Send to this Tor node: &amp;lt;Relay2&amp;gt;&lt;br /&gt;
 &amp;lt;Encrypted data for Relay2&amp;gt;&lt;br /&gt;
Relay2 decrypts his payload:&lt;br /&gt;
 Send to this Tor node: &amp;lt;Relay3&amp;gt;&lt;br /&gt;
 &amp;lt;Encrypted data for Relay3&amp;gt;&lt;br /&gt;
Relay3 receives the real TCP payload, which he sends to the destination:&lt;br /&gt;
 Send to this IP: &amp;lt;IP of destination&amp;gt;&lt;br /&gt;
 &amp;lt;Unencrypted payload&amp;gt;&lt;br /&gt;
The payload is not and can not be further encrypted by Tor. However, if the protocol itself uses encryption (HTTPS, SSH, etc.), the data will be encrypted. This means that the last node (the &#039;&#039;exit node&#039;&#039;) can see everything you do on HTTP sites, and can steal your passwords if they are transmitted unencrypted. Many people become exit nodes just so they can view this information -- Tor is much more dangerous than open WiFi for snooping!&lt;br /&gt;
&lt;br /&gt;
The encryption arrangement described above ensures that no single Tor node knows both the sender and the destination. Relay1 and your ISP know that you are using Tor and sending a packet at a certain time, but they don&#039;t know what you&#039;re sending or who you&#039;re sending to. Relay3 knows exactly what you&#039;re sending, but he can&#039;t determine who is sending it because Relay2 and Relay1 are blocking him. All three relays need to work together in order to conclusively connect the sender and the destination.&lt;br /&gt;
&lt;br /&gt;
However, Tor is weak to a &#039;&#039;timing attack&#039;&#039; that allows only two participants in certain positions to determine the sender with high accuracy. Consider this Tor connection:&lt;br /&gt;
 Sender &amp;lt;-&amp;gt; S-ISP &amp;lt;-&amp;gt; Relay1 &amp;lt;-&amp;gt; Relay2 &amp;lt;-&amp;gt; Relay3 &amp;lt;-&amp;gt; D-ISP &amp;lt;-&amp;gt; Destination&lt;br /&gt;
If the sender&#039;s ISP (S-ISP) and the destination are working together, they can record the size and times of packets sent and received. Over a large number of packets, they can determine with very high accuracy that the sender is, in fact, the person sending packets to the destination. This requires active surveillance or detailed logging by both sides. Relay1 can also perform the same role as S-ISP.&lt;br /&gt;
&lt;br /&gt;
Additionally, more configurations are possible if the underlying connection is not encrypted (normal HTTP, for example):&lt;br /&gt;
*S-ISP &amp;amp; Relay3&lt;br /&gt;
*Relay1 &amp;amp; Relay3&lt;br /&gt;
*S-ISP &amp;amp; D-ISP&lt;br /&gt;
*Relay1 &amp;amp; D-ISP&lt;br /&gt;
This second set can always see that the sender is connected to the destination, but they can only see what the sender is doing on the site if the connection is not encrypted. (Pathnames are encrypted in HTTPS.)&lt;br /&gt;
&lt;br /&gt;
Because the first relay (the &#039;&#039;entry node&#039;&#039;) is a weak point in the connection, Tor takes certain defensive measures. When you first start Tor, it chooses three &#039;&#039;entry guards&#039;&#039; that don&#039;t change for the entire time that you run Tor. You will always use one of those three unless one goes down. If all of those nodes are safe and your ISP is safe, then you are OK.&lt;br /&gt;
&lt;br /&gt;
These timing attacks are of special importance to Bitcoin because anyone can be the &amp;quot;destination&amp;quot; in a connection. Packets are broadcast to every peer in the Bitcoin network. This might allow your ISP alone to associate your transactions to you without much difficulty. However, a timing attack relies on receiving at least several dozen packets from the sender, so the &amp;quot;destination&amp;quot; might actually have to be one of your direct Bitcoin peers. It&#039;s not too difficult to flood the Bitcoin network with peers, though. Because of this attack, it is wise to use an [[EWallet]] instead of the Bitcoin client when using Tor.&lt;br /&gt;
&lt;br /&gt;
To discover Tor relays, Tor uses a centralized directory server model. There are nine authoritative directory servers. To become a relay, you register with one of these. The directory servers share their data and produce a &#039;&#039;network status consensus&#039;&#039; document every so often containing all Tor nodes. Tor clients don&#039;t connect directly to the authoritative directory servers -- they connect to one of many &#039;&#039;directory mirrors&#039;&#039;, which have a copy of the network status consensus. Since there is no peer-to-peer bootstrap mechanism in Tor, the entire network can be destroyed if half of the authoritative directory servers are destroyed, and the entire network can be subverted if half of the authoritative directory servers become evil.&lt;br /&gt;
&lt;br /&gt;
Hidden services allow both the sender and destination to remain anonymous. A hidden service connection is made like this:&lt;br /&gt;
*The destination tells several Tor relays to act as &#039;&#039;introduction points&#039;&#039; for the hidden service. The destination stays connected to all of these introduction points through a regular three-node Tor circuit.&lt;br /&gt;
*The destination registers these introduction points on a Tor DHT. The introduction points are associated with the first 16 characters of an encoded SHA-1 hash of the destination&#039;s key. This is the information in .onion addresses. The use of SHA-1 is a possible weakness.&lt;br /&gt;
*The sender creates a four-node Tor circuit. The fourth node is called the &#039;&#039;rendezvous point&#039;&#039;.&lt;br /&gt;
*The sender searches the DHT for the introduction points of the desired hidden service. The sender connects to one through a regular three-node Tor circuit and, through the introduction point, tells the destination about the rendezvous point he has chosen.&lt;br /&gt;
*The destination connects to the rendezvous point over a three-node Tor circuit. The sender and destination are now in contact over a seven-node connection.&lt;br /&gt;
&lt;br /&gt;
For clients, hidden services are more secure than encrypted Tor HTTPS connections because:&lt;br /&gt;
*If the destination remains anonymous, they are less likely to become controlled by an evil party.&lt;br /&gt;
*The destination&#039;s ISP isn&#039;t involved as they are in the HTTPS case. Only these configurations are possible for a timing attack:&lt;br /&gt;
**S-ISP &amp;amp; Destination&lt;br /&gt;
**Relay1 &amp;amp; Destination&lt;br /&gt;
&lt;br /&gt;
Running a hidden service is more dangerous, however. A simple intersection attack can be performed by the hidden service&#039;s ISP alone:&lt;br /&gt;
*Your Internet service is cut off.&lt;br /&gt;
*If the hidden service went down at that exact moment, you are unmasked.&lt;br /&gt;
The same sort of timing attacks as above are also possible.&lt;br /&gt;
&lt;br /&gt;
See the [http://www.usenix.org/events/sec04/tech/full_papers/dingledine/dingledine_html/index.html Tor design paper] for more info.&lt;br /&gt;
&lt;br /&gt;
=External Tor Hidden Services=&lt;br /&gt;
&lt;br /&gt;
* [http://vms43o4cqysakvyb.onion Bitcoin 4 Cash] ([[Bitcoin 4 Cash|info]])&lt;br /&gt;
* [irc://p4fsi4ockecnea7l.onion Freenode hidden service]&lt;br /&gt;
&lt;br /&gt;
=External links=&lt;br /&gt;
&lt;br /&gt;
* [http://tor.eff.org/ Tor project]&lt;br /&gt;
* [http://www.torproject.org/docs/tor-doc-windows.html.en Tor installation guide - Windows]&lt;br /&gt;
* [https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ Tor FAQ]&lt;br /&gt;
* [http://www.torproject.org/about/overview.html.en how Tor works - overview]&lt;br /&gt;
* [http://freenode.net/irc_servers.shtml#tor Freenode over Tor info]&lt;br /&gt;
* [http://wiki.honk-honk.org/wiki/SaslServ#mIRC howto enable SASL in mIRC]&lt;br /&gt;
* [http://honk-honk.org/SASL/SASL.dll SASL.dll library for mIRC]&lt;br /&gt;
* [http://honk-honk.org/SASL/sasl.mrc sasl script for mIRC]&lt;br /&gt;
* [http://freenode.net/sasl/ Freenode resources on SASL]&lt;/div&gt;</summary>
		<author><name>Notawake</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Abe&amp;diff=20008</id>
		<title>Abe</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Abe&amp;diff=20008"/>
		<updated>2011-11-27T02:38:52Z</updated>

		<summary type="html">&lt;p&gt;Notawake: Fixed broken bitcoin forum link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:penny-abe-160.png|thumb|160px|Abe]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Abe&#039;&#039;&#039; is a free, open-source [[block chain browser]] released by [[User:JohnTobey253|John Tobey]] under the [[wikipedia:Affero General Public License|Affero General Public License]].&lt;br /&gt;
&lt;br /&gt;
Written in [[wikipedia:Python (programming language)|Python]] and portable [[wikipedia:SQL|SQL]],&amp;lt;ref&amp;gt;https://bitcointalk.org/index.php?topic=16141.0&amp;lt;/ref&amp;gt; Abe draws inspiration from [[Bitcoin Block Explorer]] and seeks some level of compatibility with it but uses a completely new implementation.&amp;lt;ref&amp;gt;https://raw.github.com/jtobey/bitcoin-abe/master/README.md&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
* [[Block chain browser]]&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
* [http://abe.john-edwin-tobey.org/ Demonstration site]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=16141.0 Project announcement]&lt;br /&gt;
* [https://github.com/jtobey/bitcoin-abe Project on Github]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Block chain browsers]]&lt;br /&gt;
[[Category:Free Software]]&lt;br /&gt;
[[Category:Open Source]]&lt;/div&gt;</summary>
		<author><name>Notawake</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Gribble&amp;diff=20006</id>
		<title>Gribble</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Gribble&amp;diff=20006"/>
		<updated>2011-11-27T02:37:51Z</updated>

		<summary type="html">&lt;p&gt;Notawake: Fixed broken bitcoin forum link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[http://gribble.sourceforge.net/ gribble] is a modified Supybot IRC bot, carrying some useful bitcoin-related commands and factoids. The bot&#039;s command sequence is &#039;;;&#039;, to issue any command just start a line with two semicolons. You can also issue inline commands with two commas.&lt;br /&gt;
&lt;br /&gt;
It is present on #bitcoin-dev (bitcoin information queries), #bitcoin-market (real time streaming quotes from bitcoinmarket.com and mtgox.com), #bitcoin-otc (facilitate over-the-counter trading, with the OTC order book and OTC web of trust). You can also PM commands to gribble and it will PM back.&lt;br /&gt;
&lt;br /&gt;
==General Info==&lt;br /&gt;
&lt;br /&gt;
To get help on any command, try &#039;help &amp;lt;command&amp;gt;&#039;, to get a list of bitcoin-related commands, run &#039;apropos bc&#039;, and to get a list of factoids, run command &#039;facts&#039;, and click on the link supplied.&lt;br /&gt;
&lt;br /&gt;
==List of commands==&lt;br /&gt;
&lt;br /&gt;
===Mining/network/hashrate stats===&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;bc,blocks&#039;&#039;&#039; - show the current number of blocks in the bitcoin block chain&lt;br /&gt;
* &#039;&#039;&#039;bc,calc&#039;&#039;&#039; - given a hash rate in Khps, calculate the expected average time to generate a block, at current difficulty. For example, to see the average time for 1000 Khps, run &#039;bc,calc 1000&#039;.&lt;br /&gt;
* &#039;&#039;&#039;bc,calcd&#039;&#039;&#039; - given a hash rate in Khps, and a difficulty level, calculate the expected average time to generate a block at that difficulty. For example, to see the average time for 1000 Khps at difficulty 1, run &#039;bc,calc 1000 1&#039;.&lt;br /&gt;
* &#039;&#039;&#039;bc,diff&#039;&#039;&#039; - show the current generation difficulty&lt;br /&gt;
* &#039;&#039;&#039;bc,diffchange&#039;&#039;&#039; - show estimated percent change in difficulty&lt;br /&gt;
* &#039;&#039;&#039;bc,estimate&#039;&#039;&#039; - show the estimate of the next difficulty&amp;lt;ref&amp;gt;[https://bitcointalk.org/index.php?topic=3247.0 Estimate is usually wildly inaccurate for 100-200 blocks after a difficulty change due to insufficient sample size.]&amp;lt;/ref&amp;gt;&lt;br /&gt;
* &#039;&#039;&#039;bc,gen&#039;&#039;&#039; - given the hash rate in Khps, calculate expected BTC generation per day and per hour, at current difficulty.&lt;br /&gt;
* &#039;&#039;&#039;bc,gend&#039;&#039;&#039; - given the hash rate in Khps, and a difficulty level, calculate expected BTC generation per day and per hour at that difficulty.&lt;br /&gt;
* &#039;&#039;&#039;bc,hextarget&#039;&#039;&#039; - show the current difficulty target in hex.&lt;br /&gt;
* &#039;&#039;&#039;bc,nethash&#039;&#039;&#039; - current 3-day estimate of network hash power, in Ghps.&lt;br /&gt;
* &#039;&#039;&#039;bc,nexttarget&#039;&#039;&#039; - show the block at which the next difficulty change will take place&lt;br /&gt;
* &#039;&#039;&#039;bc,interval&#039;&#039;&#039; - show the average time between blocks, over the past 1000 blocks. If given optional integer argument, use that many blocks for the estimate.&lt;br /&gt;
* &#039;&#039;&#039;bc,prob&#039;&#039;&#039; - show the probability of getting at least one block at given Khps, in a given time period. E.g., to see probability of getting a block at 1000 Khps, in 2 years and 1 week, try &#039;bc,prob 1000 2y 1w&#039;. Time takes input in years, weeks, days, hours, minutes, and seconds.&lt;br /&gt;
* &#039;&#039;&#039;bc,probd&#039;&#039;&#039; - show the probability of getting at least one block at given Khps, given difficulty, in a given time period. Same as &#039;&#039;&#039;bc,prob&#039;&#039;&#039; but supply a difficulty after the hash rate. E.g., &#039;bc,probd 10000000 600000 1w 2d&#039;&lt;br /&gt;
* &#039;&#039;&#039;bc,spotestimate&#039;&#039;&#039; - current 3-day estimate of network power, in terms of difficulty.&lt;br /&gt;
* &#039;&#039;&#039;bc,stats&#039;&#039;&#039; - show some statistics about the block chain - number of blocks, difficulty, estimated next difficulty target, time to next difficulty&lt;br /&gt;
* &#039;&#039;&#039;bc,timetonext&#039;&#039;&#039; - show estimated time to reach the next difficulty target&lt;br /&gt;
* &#039;&#039;&#039;bc,totalbc&#039;&#039;&#039; - show total number of bitcoins in existence.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Big kudos goes out to theymos for providing a web interface to [http://blockexplorer.com/q/ real time statistics about the bitcoin block chain].&lt;br /&gt;
&lt;br /&gt;
===Markets and exchange rates===&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;bc,bcm&#039;&#039;&#039; - show the market snapshot from bitcoinmarket.com&lt;br /&gt;
* &#039;&#039;&#039;bc,mtgox&#039;&#039;&#039; - show the market snapshot for mtgox.com&lt;br /&gt;
* &#039;&#039;&#039;bc,avgprc&#039;&#039;&#039; - show average 24h, 7d, and 30d trading prices of BTC in various currencies.&lt;br /&gt;
* &#039;&#039;&#039;bc,24hprc&#039;&#039;&#039; - show average 24h price of BTC in USD.&lt;br /&gt;
* &#039;&#039;&#039;bc,convert&#039;&#039;&#039; - convert bitcoin price, based on MtGox last, to currency you specify. e.g., try &#039;bc,convert eur&#039; for euros.&lt;br /&gt;
* &#039;&#039;&#039;bc,fx&#039;&#039;&#039; - show various currency exchange rates&lt;br /&gt;
* &#039;&#039;&#039;bc,xau&#039;&#039;&#039; - show price of gold in BTC&lt;br /&gt;
* &#039;&#039;&#039;ticker&#039;&#039;&#039; - show pretty-printed mtgox ticker. Takes optional argument of &#039;--bid&#039;, &#039;--ask&#039;, &#039;--last&#039;, &#039;--high&#039;, or &#039;--low&#039;, to show just that numeric value (useful for command nesting in calculations)&lt;br /&gt;
* &#039;&#039;&#039;bids&#039;&#039;&#039; - given a numeric argument, shows how many total btc are being demanded on MtGox at or over the given price. If optional &#039;--under&#039; argument given, looks under the price.&lt;br /&gt;
* &#039;&#039;&#039;asks&#039;&#039;&#039; - given a numeric argument, shows how many total btc are being offered on MtGox at or below given price. If optional &#039;--over&#039; argument given, looks over the price.&lt;br /&gt;
&lt;br /&gt;
===Mining pool statistics===&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;bc,slushpool&#039;&#039;&#039; - show the mining hash rate of the [http://mining.bitcoin.cz slush mining pool], in Khps.&lt;br /&gt;
* &#039;&#039;&#039;bc,eligius&#039;&#039;&#039; - show the mining hash rate of the Eligius mining pool, in Khps&lt;br /&gt;
* &#039;&#039;&#039;bc,swepool&#039;&#039;&#039; - show the mining hash rate of the Swepool mining pool, in Khps&lt;br /&gt;
* &#039;&#039;&#039;bc,btcguild&#039;&#039;&#039; - show the mining hash rate of the Btcguild mining pool, in Khps&lt;br /&gt;
* &#039;&#039;&#039;bc,deepbit&#039;&#039;&#039; - show the mining hash rate of the Deepbit mining pool, in Khps&lt;br /&gt;
&lt;br /&gt;
===Other===&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;bc,help&#039;&#039;&#039; - show list of &#039;bc,&#039; commands - same as &#039;apropos bc&#039;.&lt;br /&gt;
* &#039;&#039;&#039;bc,wiki&#039;&#039;&#039; - fetch a link to a page in this wiki, based on a search string. For example, to see a link to this page, try &#039;bc,wiki gribble&#039;. &lt;br /&gt;
&lt;br /&gt;
===bitcoin-otc related info===&lt;br /&gt;
&lt;br /&gt;
* See [http://wiki.bitcoin-otc.com/wiki/Using_bitcoin-otc OTC guide] about using the order book&lt;br /&gt;
* See [http://wiki.bitcoin-otc.com/wiki/GPG_authentication OTC GPG guide] about using the gpg authentication system&lt;br /&gt;
* See [http://wiki.bitcoin-otc.com/wiki/OTC_Rating_System Web of Trust guide] about using the rating system/web of trust&lt;br /&gt;
&lt;br /&gt;
===General commands===&lt;br /&gt;
&lt;br /&gt;
The above list is specifically for bitcoin-related commands. See [http://sourceforge.net/apps/mediawiki/gribble/index.php?title=Using_Gribble_on_Sourceforge this page] for list and help of most commonly used non-bitcoin-related gribble commands. You can find more helpful info on the [http://gribble.sourceforge.net/ gribble] project page, or by exploring the bot with &#039;list&#039; and &#039;help&#039; commands.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Factoids==&lt;br /&gt;
&lt;br /&gt;
* [http://gribble.dreamhosters.com/viewfactoids.php?db=%23bitcoin-dev factoids for #bitcoin-dev channel]&lt;br /&gt;
* [http://gribble.dreamhosters.com/viewfactoids.php?db=%23bitcoin-otc factoids for #bitcoin-otc channel]&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;me&amp;gt; ;;bc,blocks&lt;br /&gt;
 &amp;lt;gribble&amp;gt; 96009&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;me&amp;gt; Check out the current difficulty! ,,bc,diff&lt;br /&gt;
 &amp;lt;gribble&amp;gt; 8078.19525793&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;me&amp;gt; Here is a list of all gribble bitcoin commands: ,,(apropos bc)&lt;br /&gt;
 &amp;lt;gribble&amp;gt; Alias bc,bcm, Alias bc,blocks, Alias bc,btcex, Alias bc,calc, Alias bc,diff, Alias bc,estimate, Alias bc,mtgox, Alias bc,nexttarget, Alias bc,stats, Alias bc,timetonext, and Alias bc,totalbc&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;me&amp;gt; ;;list&lt;br /&gt;
 &amp;lt;gribble&amp;gt; Admin, Alias, Anonymous, [...]&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;me&amp;gt; ;;list Alias&lt;br /&gt;
 &amp;lt;gribble&amp;gt; ?, about, add, bc,bcm [...], sfwikisearch, sl, slap, smack, [...]&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;me&amp;gt; ;;sl bitcoin&lt;br /&gt;
 &amp;lt;gribble&amp;gt; http://www.bitcoin.org/ | Bitcoin is a peer-to-peer digital currency. Peer-to-peer (P2P) means [...]&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;me&amp;gt; Some commands have more than one argument. Surround with parens.  &lt;br /&gt;
 &amp;lt;me&amp;gt; e.g., Is your wallet safe?  ,,(bc,wiki secure wallet)&lt;br /&gt;
 &amp;lt;gribble&amp;gt; https://en.bitcoin.it/wiki/Securing_your_wallet | Apr 6, 2011 ... However a few [...]&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;me&amp;gt; ;;calc 25 USD in EUR&lt;br /&gt;
 &amp;lt;gribble&amp;gt; 25 US dollars = 17.2248 euros&lt;br /&gt;
&lt;br /&gt;
===list of commands===&lt;br /&gt;
&lt;br /&gt;
?, about, action, add, alert, alias, announce, announce add, announce list, announce remove, any, aol, apply, apropos, asks, at, auth, author, azn, ban add&amp;lt;br /&amp;gt;&lt;br /&gt;
ban list, ban remove, base, bashorg, bc,24hprc, bc,avgprc, bc,bcm, bc,blocks, bc,btceur, bc,btcgbp, bc,btcguild, bc,btcrub, bc,calc, bc,calcd, bc,channels, bc,convert, bc,deepbit, bc,diff, bc,diffchange, bc,eligius, bc,estimate, bc,fx, bc,gen, bc,gend, bc,help, bc,hextarget, bc,interval, bc,mtgox, bc,mtgoxask, bc,mtgoxbid, bc,mtgoxlast, bc,nethash, bc,nexttarget, bc,price, bc,prob, bc,probd, bc,slushpool, bc,spotestimate, bc,stats, bc,swepool, bc,timetonext, bc,totalbc, bc,wiki, bc,xau, bids, binary, blockmonitor, bold, book, bot, botsnack, boturl, botweb, buy&amp;lt;br /&amp;gt;&lt;br /&gt;
cache, calc, call, cand, capabilities, capability add, capability list, capability remove, capability set, capability setdefault, capability unset, capitalize, ceq, change, changekey, changename, channel, channeldb, channels, channelstats, check, cheer, chr, cif, clearq, cmd, coin, collect, color, colorize, command, commands, concat, config, configure, connect, contributors, convert, cor, countargs, cpu, crypt, ctell, ctime, cut, cxor, cycle&amp;lt;br /&amp;gt;&lt;br /&gt;
decode, default, defaultcapability, defaultplugin, dehalfop, deleteuser, deop, devoice, dice, dict, dictionaries, direct, disable, disconnect, dns, do, doctype, driver&amp;lt;br /&amp;gt;&lt;br /&gt;
eauth, ebay, echo, ed, eightball, elapsed, enable, encode, environ, eregister, errno, eval, everify, exec, exn, export&amp;lt;br /&amp;gt;&lt;br /&gt;
factlist, facts, feed, fetch, field, fight, fit, flush, forget, format, fortune&amp;lt;br /&amp;gt;&lt;br /&gt;
ge, get, getprefix, getrating, gettrust, ghost, give, giveme, giveout, gnu, google, gribble, gt&amp;lt;br /&amp;gt;&lt;br /&gt;
h, halfop, headers, hebrew, help, hexip, hexlify, histsearch, hostmask, hostmask add, hostmask list, hostmask remove, hug&amp;lt;br /&amp;gt;&lt;br /&gt;
icalc, ident, identify, ignore, ignore add, ignore list, ignore remove, info, insert, invite, ircquote, isitdown&amp;lt;br /&amp;gt;&lt;br /&gt;
jeffk, join&amp;lt;br /&amp;gt;&lt;br /&gt;
kban, key, kick&amp;lt;br /&amp;gt;&lt;br /&gt;
last, latency, le, learn, leet, len, levenshtein, limit, list, lithp, load, lobotomy add, lobotomy list, lobotomy remove, lock, logmark, lower, ls, lt, lucky&amp;lt;br /&amp;gt;&lt;br /&gt;
match, md5, mode, moderate, monologue, more, morse, mp&amp;lt;br /&amp;gt;&lt;br /&gt;
names, nceq, ne, net, netcraft, networks, nge, ngt, nick, nicks, nle, nlt, nne, notes, notice&amp;lt;br /&amp;gt;&lt;br /&gt;
oobhresponse, op, ord, otc, outfilter&amp;lt;br /&amp;gt;&lt;br /&gt;
part, password, pet, petuser, pgp, phonebook, pid, ping, plugin, plugins, pong, private, processes, progstats&amp;lt;br /&amp;gt;&lt;br /&gt;
quit&amp;lt;br /&amp;gt;&lt;br /&gt;
rainbow, random, rank, rate, rated, re, reconnect, redo, refresh, register, reload, remove, rename, reorder, repeat, replace, replies, reply, repr, restore, reverse, rot13, roulette, rpn, rss&amp;lt;br /&amp;gt;&lt;br /&gt;
sample, say, scramble, search, seconds, seen, sell, sendquote, separator, server, set, set password, set secure, settrace, sfideasearch, sflaconica, sfticketsearch, sfuserpage, sfwikisearch, sha, show, shrink, shuffle, simpleeval, since, size, sl, slap, slogan, smack, soundex, source, spell, spellit, squish, start, stats, status, stop, stripcolor, success, sudo, suicide, supa1337, swap, synonym&amp;lt;br /&amp;gt;&lt;br /&gt;
targetproject, tell, texthelp, threads, ticker, time, title, tn,blocks, tn,diff, topic, translate, trustinfo&amp;lt;br /&amp;gt;&lt;br /&gt;
ud, unauth, unban, unbinary, underline, undo, undup, unhexlify, unidentify, units, uniud, unload, unlock, unmoderate, unmorse, unrate, unregister, unrename, unsettrace, until, upkeep, upper, uptime, urlquote, urlunquote, user, username&amp;lt;br /&amp;gt;&lt;br /&gt;
vacuum, verify, version, view, voice&amp;lt;br /&amp;gt;&lt;br /&gt;
whatis, whoami, whois, wk, wp, wtf&amp;lt;br /&amp;gt;&lt;br /&gt;
xor&amp;lt;br /&amp;gt;&lt;br /&gt;
yt&lt;/div&gt;</summary>
		<author><name>Notawake</name></author>
	</entry>
</feed>