Pages: [1] 2 :: one page |
|
Author |
Thread Statistics | Show CCP posts - 0 post(s) |
Buzz Orti
State War Academy Caldari State
85
|
Posted - 2016.01.10 22:52:10 -
[1] - Quote
pretty self-explanatory. Can also go in skills for encryption methods, although not closely related, warfare and tactics for practical use and intent, and a few others...
Anyways, this thread is to discuss methods to find secret and how to keep them secret.
You can also discuss what secret you find, such as specific list of items, their related worth, and where it is worth that much. |
Alexi Stokov
State War Academy Caldari State
92
|
Posted - 2016.01.10 23:29:49 -
[2] - Quote
I once discovered a massive profitable secret buying ????? And I kept making big returns on it by not posting about it in the forums. |
Buzz Orti
State War Academy Caldari State
85
|
Posted - 2016.01.10 23:57:26 -
[3] - Quote
Alexi Stokov wrote:I once discovered a massive profitable secret buying ????? And I kept making big returns on it by not posting about it in the forums. I hope you made over 100%. |
Alexi Stokov
State War Academy Caldari State
92
|
Posted - 2016.01.10 23:59:19 -
[4] - Quote
Buzz Orti wrote:Alexi Stokov wrote:I once discovered a massive profitable secret buying ????? And I kept making big returns on it by not posting about it in the forums. I hope you made over 100%.
Yes I did. |
Jerry T Pepridge
Meta Game Analysis and Investment INC.
586
|
Posted - 2016.01.11 09:43:39 -
[5] - Quote
Selling profitable secret, 20b a year subscription, no promises you wont be laughed at by me to the tune of Europe |
lanyaie
Dead Rune Holder
1087
|
Posted - 2016.01.11 10:17:18 -
[6] - Quote
I encrypt using MD5 HASH
Spaceprincess.
|
Bumblefck
Kerensky Initiatives
10213
|
Posted - 2016.01.11 18:42:48 -
[7] - Quote
Jerry T Pepridge wrote:Selling profitable secret, 20b a year subscription, no promises you wont be laughed at by me to the tune of Europe
I want Pepridge 20bn
Got a HoleySheet1 corpse? I'll buy it for 200m!
Bumble's Space Log
|
Rhivre
TarNec Invisible Exchequer
847
|
Posted - 2016.01.12 01:09:45 -
[8] - Quote
Bumblefck wrote:Jerry T Pepridge wrote:Selling profitable secret, 20b a year subscription, no promises you wont be laughed at by me to the tune of Europe I want Pepridge 20bn
I want the secrets of your moustache my good Sir.
Please provide them.
Also, decoding market secrets?
Open market, find item with difference between buy and sell Profit.
Fluffy Bunny Pic!
|
Iria Ahrens
Space Perverts and Forum Pirates
572
|
Posted - 2016.01.12 01:40:44 -
[9] - Quote
Yea. So I'm not asking you guys for your secrets. Just the methods you used to find your secret. That way I can come up with my own secrets that are just like yours.
The real secret? Probably 50% of the market is totally untapped. Maybe more, so many things are sold or bought in Jita but no where else.
Just pick something, really.
My choice of pronouns is based on your avatar. Even if I know what is behind the avatar.
|
Buzz Orti
State War Academy Caldari State
85
|
Posted - 2016.01.12 03:04:50 -
[10] - Quote
Iria Ahrens wrote:Yea. So I'm not asking you guys for your secrets. Just the methods you used to find your secret. That way I can come up with my own secrets that are just like yours.
The real secret? Probably 50% of the market is totally untapped. Maybe more, so many things are sold or bought in Jita but no where else.
Just pick something, really. What if I were to tell you the design methods I use to find my secrets are the methods I use to find others secret, and even post it in the title in plain sight?
That way, you can come with your own secrets that are just like mine, and let me find them while hiding mine.
I really doubt you have 50% of the market since that would constitute more than half. Jita trades in volume. Other markets have lower volumes but may trade more expensive items.
Anyways, the poster that mentionned the encryption algorithm(s) use method to create info secret, maintain those methods to keep them secret, and so on. Secret and security can be related but it doesn't increase speed of process or procedure.
The EVE Uni Market audio files are loaded with information some of which is not published often.
Good analysis skills and tools helps to generate useful market information. There are many business factors that are not yet implemented , each aiming at optimizing market efficiency and , better control, and less loss of control through proper information.
You can also put it this way, if you find secret and others use the secret you find before you benefit (due to lack of protection or encryption), you work for them, and don't get the benefit you worked for, while they do. |
|
Iria Ahrens
Space Perverts and Forum Pirates
573
|
Posted - 2016.01.12 03:30:38 -
[11] - Quote
Buzz Orti wrote:
I really doubt you have 50% of the market since that would constitute more than half. Jita trades in volume. .
How the hell would you read my comment as claiming that I personally control 50% of the market. Man, I was gone two years, was it like the market woke up out of total dormancy while I was gone or what?
My choice of pronouns is based on your avatar. Even if I know what is behind the avatar.
|
Iria Ahrens
Space Perverts and Forum Pirates
573
|
Posted - 2016.01.12 03:41:16 -
[12] - Quote
Buzz Orti wrote:
You can also put it this way, if you find secret and others use the secret you find before you benefit (due to lack of protection or encryption), you work for them, and don't get the benefit you worked for, while they do.
The problem is the assumption Traders can only get rich by "secrets" or other unsavory habits. The equation for getting rich as a trader is as simple as it gets.
Yes, there are secret opportunities we find, but most of those are transitory or involve a significant investment people looking for "secrets" aren't willing to make anyway. Also, by picking a specific sector or item to trade in, we might discern pattern and respond accordingly but that is something learned through experience not subterfuge. Just like any other player skill.
The fact of the matter is, looking for secrets is not how you get rich. Looking for opportunities is. And an opportunity exists anywhere there is a margin between buy and sell orders.
My choice of pronouns is based on your avatar. Even if I know what is behind the avatar.
|
Sabriz Adoudel
Move along there is nothing here
5641
|
Posted - 2016.01.12 03:42:58 -
[13] - Quote
Buzz Orti wrote:pretty self-explanatory. Can also go in skills for encryption methods, although not closely related, warfare and tactics for practical use and intent, and a few others...
Anyways, this thread is to discuss methods to find secret and how to keep them secret.
You can also discuss what secret you find, such as specific list of items, their related worth, and where it is worth that much.
sdtahtTsacansfffaw123masfklnwr9sgnlaetmxm
asfgiwe00mcs3fx
srqnrkdvlsoxmftwntxklcw2clksm
If you can decode that, you'll have a great market secret. Have fun!
I support the New Order and CODE. alliance. www.minerbumping.com
Sabriz's Rule: "Any time someone argues for a game change claiming it is a quality of life change, the change is actually a game balance change".
|
Buzz Orti
State War Academy Caldari State
85
|
Posted - 2016.01.12 03:45:32 -
[14] - Quote
Iria Ahrens wrote:Buzz Orti wrote:
I really doubt you have 50% of the market since that would constitute more than half. Jita trades in volume. .
How the hell would you read my comment as claiming that I personally control 50% of the market. Man, I was gone two years, was it like the market woke up out of total dormancy while I was gone or what? I didn't say , nor read , that your comment was claiming that you personally control 50% of the market.
I didn't know that you were gone 2 years, and I didn't try to get that info from you, secret or not.
The point that 50% of the market is half of that market.
You mentionned about 50% of the market being untapped, which I did interpret in the sense that , if only one person or entity can control 50% of the tapped or untapped market, you had 50% chance or less not to be. If one had 50% of more, the other would have less than 50%.
plus, you also just posted as i redacted this port. and so did sabriz
|
Rhivre
TarNec Invisible Exchequer
847
|
Posted - 2016.01.12 05:02:30 -
[15] - Quote
Buzz Orti wrote:
You mentionned about 50% of the market being untapped, which I did interpret in the sense that , if only one person or entity can control 50% of the tapped or untapped market, you had 50% chance or less not to be. If one had 50% of more, the other would have less than 50%.
.
50% of the market being untapped = 50% of the market is not being actively traded to any large degree, nothing more, nothing less.
Fluffy Bunny Pic!
|
virm pasuul
The Congregation No Handlebars.
341
|
Posted - 2016.01.12 09:41:38 -
[16] - Quote
buy low, sell high |
Saxinis Kion
Su Giau Co Steelsworks Ltd.
0
|
Posted - 2016.01.12 10:09:20 -
[17] - Quote
1. Work harder than everyone else.
2. When you find yourself in a hole, stop digging.
3. The one the with the mostest, the firstest, wins. |
Buzz Orti
State War Academy Caldari State
85
|
Posted - 2016.01.12 15:54:12 -
[18] - Quote
Rhivre wrote:... 50% of the market being untapped = 50% of the market is not being actively traded to any large degree, nothing more, nothing less.
market do not consists of trading only, and yes , markets can be created. It is very possible, and , feasible for that matter, if at all possible, to create markets by adding forms of potential business profits to previous markets. Other methods to create market can be to create other new markets not related to previous ones. One more combination of those possibility factors is to improve existing markets by either increasing capitals or , integrating elements or entities related to it.
Valkyrie and even DUST 514 have such attributes even though it is not discussed much here.
Don't get me wrong, markets can fluctuate, and even tapped market can close.
Trading can be a good part of a market, and it doesn't have to be. The 80-20 rule, or 20-80 rule applies to market or business rather, where trading is the logarithm or base of the factor used for deriving the statement.
In other words, barter of military equipment during warfare can become a market in large scale war, while money is more scarce since it may be harder to secure than weapons. (Weapons can be more useful than money to get money in war.)
Edit: So yes, too much change too fast and without proper control can and often if not always led to system entropy in the past.
And market can be improved by 10,000% or less, or more. Good proportion and good measures often go hand in hand. |
Rykker Bow
The Scope
218
|
Posted - 2016.01.12 16:32:11 -
[19] - Quote
You sure do like commas. I counted 37 commas in 24 sentences in your last two posts.
yeah...I'm bored.
The Mjolnir Bloc - Lowsec PvP for the sophisticated -
The Mjolnir Bloc Killboards
|
Buzz Orti
State War Academy Caldari State
85
|
Posted - 2016.01.12 17:48:58 -
[20] - Quote
Rykker Bow wrote:You sure do like commas. I counted 37 commas in 24 sentences in your last two posts. yeah...I'm bored. I use commas to mark pause in time. You can tell on the first recording that I did that the speed is to fast in some instances although it conveys the message. It's easy to fix though.
I'm bored too tbh, I only bought one new pilot for JF and did nothing else for 2 months. My time expires in 4 days, and will stop posting on forums. Delays against my income and diversion / subterfuge again.
Edit 5: I don't think it's about what I like / don't like but what is right (or wrong). Buy high and sell low also exist to move bear market to bull market and make it impossible for competition to sell bear (high). For instance, the market being with too much capital makes it harder to pipe or track the money currency flow. To keep capital to a lower numerical amount of currency albeit still 100% simplifies that. Of course, it also makes it harder to get the currency and can increase the risk to have it.
Most possibilities have their own related condition which can be found with a bit of study without research or government research. If you were to spend a lot of studies, you would find out and be able to sell it. |
|
Adunh Slavy
1628
|
Posted - 2016.01.12 17:53:32 -
[21] - Quote
lanyaie wrote:I encrypt using MD5 HASH
MD5 is not secure
Necessity is the plea for every infringement of human freedom. It is the argument of tyrants; it is the creed of slaves.-á-á- William Pitt
|
Buzz Orti
State War Academy Caldari State
85
|
Posted - 2016.01.12 17:58:05 -
[22] - Quote
Why not?
|
Adunh Slavy
1628
|
Posted - 2016.01.12 21:41:13 -
[23] - Quote
https://en.wikipedia.org/wiki/MD5
Necessity is the plea for every infringement of human freedom. It is the argument of tyrants; it is the creed of slaves.-á-á- William Pitt
|
Buzz Orti
State War Academy Caldari State
85
|
Posted - 2016.01.12 22:11:45 -
[24] - Quote
Best public cryptanalysis A 2013 attack by Xie Tao, Fanbao Liu, and Dengguo Feng breaks MD5 collision resistance in 2^18 time. This attack runs in less than a second on a regular computer.[2]
In 1996 a flaw was found in the design of MD5. While it was not deemed a fatal weakness at the time, cryptographers began recommending the use of other algorithms, such as SHA-1GÇöwhich has since been found to be vulnerable as well.[4] In 2004 it was shown that MD5 is not collision resistant.[5] As such, MD5 is not suitable for applications like SSL certificates or digital signatures that rely on this property for digital security. Also in 2004 more serious flaws were discovered in MD5, making further use of the algorithm for security purposes questionable; specifically, a group of researchers described how to create a pair of files that share the same MD5 checksum.[6][7] Further advances were made in breaking MD5 in 2005, 2006, and 2007.[8] In December 2008, a group of researchers used this technique to fake SSL certificate validity.[9][10] As of 2010, the CMU Software Engineering Institute considers MD5 "cryptographically broken and unsuitable for further use",[11] and most U.S. government applications now require the SHA-2 family of hash functions.[12] In 2012, the Flame malware exploited the weaknesses in MD5 to fake a Microsoft digital signature. |
Cixi
15
|
Posted - 2016.01.14 17:07:16 -
[25] - Quote
Work smarter not harder |
Bumblefck
Kerensky Initiatives
10267
|
Posted - 2016.01.14 21:02:14 -
[26] - Quote
I occasionally smoke MD5 Hash
Got a HoleySheet1 corpse? I'll buy it for 200m!
Bumble's Space Log
|
Rhivre
TarNec Invisible Exchequer
848
|
Posted - 2016.01.14 21:24:59 -
[27] - Quote
Rykker Bow wrote:You sure do like commas. I counted 37 commas in 24 sentences in your last two posts. yeah...I'm bored.
You are very brave :p
Fluffy Bunny Pic!
|
Bumblefck
Kerensky Initiatives
10268
|
Posted - 2016.01.14 21:27:29 -
[28] - Quote
Rhivre wrote:Rykker Bow wrote:You sure do like commas. I counted 37 commas in 24 sentences in your last two posts. yeah...I'm bored. You are very brave :p
Are you German, by any chance?
Got a HoleySheet1 corpse? I'll buy it for 200m!
Bumble's Space Log
|
Chekov Nikahd
Viziam Amarr Empire
0
|
Posted - 2016.01.17 17:48:32 -
[29] - Quote
lanyaie wrote:I encrypt using MD5 HASH tbh there's little need to do much more than a double ROT13 |
Buzz Orti
State War Academy Caldari State
94
|
Posted - 2016.01.31 02:31:02 -
[30] - Quote
The encryption program that I have to use has to be modified to prevent additional theft and attacks against IP.
Fortunately, the previous USB storage device loss was encrypted and it still prevents the thief to use it.
This will make it easier to encrypt the whole medium while browsing will function in RAM only.
The encryption program used to run encrypted folders with no data sharing between the other separately encrypted files.
It however left the root more vulnerable.
Now , with the new encryption method implemented, it will be easy to copy the code and keep it secure. |
|
|
|
|
Pages: [1] 2 :: one page |
First page | Previous page | Next page | Last page |