Free for life ! KVM storage 1tb hdd for the customer number 100-200-300-400-500-600-700-800-900-999!

1910121415

Comments

  • The magic concatenated crowdsourced digits are: 2562852951896884411038506926702020752420420242042018472438753189

    The hash is: 85f6281b34035fe6dc33a920d1fbea5e08d3a207b2a7227693220ad20286ca33

    The lucky winner is @pascal (member #389) - and as luck would have it, it seems that @pascal is indeed active here.

    Assuming they respond to my PM within the next 72 hours to claim the fine fine superfine free for life 1 TB KVM storage prize, then it's a done deal!

    (Otherwise we'll move on to the backup selection #584 and after that if necessary #239 ...)

    Congratulations @pascal! And thanks @cociu for the generous prize!

    Also big ups to all the people who contributed their very best pseudorandom digits to facilitate a fair selection process :)

    I'll start the magic numbers for the next selection for signup #900: 389584239

    plus a secret to be revealed before the next selection, after signup #900

    the secret hashes to: dd4a7df5114bcc9c0c8b506923637e48fb2d5b94a01512c4a11b24758d1ca1b8

    Please add your favorite magic numbers to the mix!


    notes:

    >>> import random
    >>> random.seed(0x85f6281b34035fe6dc33a920d1fbea5e08d3a207b2a7227693220ad20286ca33)
    >>> random.randint(1,800)
    389
    >>> random.randint(1,800)
    584
    >>> random.randint(1,800)
    239
    
    echo -n "2562852951896884411038506926702020752420420242042018472438753189" | sha256sum
    85f6281b34035fe6dc33a920d1fbea5e08d3a207b2a7227693220ad20286ca33
    

    @uptime said: I'll start with 256285295189 followed by a secret salt sequence.

    The secret salt will be revealed before the next hash/seed is generated, after the 800th signup.

    The secret salt hashes to f704239842f4001e8d47210e9b818af1e1ea345c3e4743d2a3a92f722a8ed36b

    teh secret salt revealed: 68844110385069

    echo -n "68844110385069"
    68844110385069df@re:~$ echo -n "68844110385069" | sha256sum
    f704239842f4001e8d47210e9b818af1e1ea345c3e4743d2a3a92f722a8ed36b
    

    @souen said: 2670 - from the latest Joy of Tech comic

    @Rahul said: 2020

    @IV said: 752, provided by google random number generator

    @dahartigan said: 420420

    @terrorgen said: 2^420420 + 1

    ah ... that's going to be like 10 pages of tl;dr digits, so let's just call it 24204201 mkay? :smiley:

    @flips said: 8472 (Ref. Star Trek Voyager)

    @deepak_leb said: 4387

    @MS said: 53189

    Thanked by (1)pascal

    HS4LIFE (+ (* 3 4) (* 5 6))

  • Oh my! That is awesome, thanks @uptime and @cociu. I’ll try to be a little more active around these parts, though I am indeed excellent at lurking around... :-)

    Thanked by (1)uptime
  • Well played @pascal, well played indeed.

    Lurkers are legit <3

    Thanked by (1)pascal

    HS4LIFE (+ (* 3 4) (* 5 6))

  • 131026 for next draw

    Thanked by (1)uptime
  • £2.50

    Thanked by (1)uptime
  • ~$3.50

    Thanked by (1)uptime

    Get the best deal on your next VPS or Shared/Reseller hosting from RacknerdTracker.com - The original aff garden.

  • WSSWSS Retired

    Butts.

    Thanked by (1)uptime

    My pronouns are asshole/asshole/asshole. I will give you the same courtesy.

  • 8008135

    Thanked by (2)WSS dahartigan

    HS4LIFE (+ (* 3 4) (* 5 6))

  • Thanks to @cociu for the VPS!
    Here are some benchmarks:


    nench.sh v2019.07.20 -- https://git.io/nench.sh

    benchmark timestamp: 2020-01-25 20:57:03 UTC

    Processor: Common KVM processor
    CPU cores: 1
    Frequency: 1795.672 MHz
    RAM: 990M
    Swap: 819M
    Kernel: Linux 3.10.0-1062.1.1.el7.x86_64 x86_64

    Disks:
    sda 1T HDD

    CPU: SHA256-hashing 500 MB
    7.711 seconds
    CPU: bzip2-compressing 500 MB
    CPU: AES-encrypting 500 MB
    8.973 seconds

    ioping: seek rate
    min/avg/max/mdev = 170.8 us / 356.7 us / 29.0 ms / 855.0 us
    ioping: sequential read speed
    generated 9.10 k requests in 5.00 s, 2.22 GiB, 1.82 k iops, 455.1 MiB/s

    dd: sequential write speed
    1st run: 177.38 MiB/s
    2nd run: 348.09 MiB/s
    3rd run: 313.76 MiB/s
    average: 279.74 MiB/s

    IPv4 speedtests
    your IPv4: 193.148.71.xxxx

    Cachefly CDN:         39.01 MiB/s
    Leaseweb (NL):        0.24 MiB/s
    Softlayer DAL (US):   3.41 MiB/s
    Online.net (FR):      5.56 MiB/s
    OVH BHS (CA):         4.07 MiB/s
    

    I am unsure what I'll use the instance for... But I'll find a use :smiley:

    Thanked by (1)uptime
  • 2^80, then take first 10 digits if longer than 10

    Thanked by (1)uptime

    The all seeing eye sees everything...

  • uptimeuptime OG
    edited January 2020

    @terrorgen said:
    2^80, then take first 10 digits if longer than 10

    As you wish:

    python -c 'print(str(2**80)[:10])'

    1208925819
    

    EDIT: by the way, 2^420420 + 1 is (probably) not prime :)

    HS4LIFE (+ (* 3 4) (* 5 6))

  • Congrats

    Thanked by (1)uptime
  • 11001101 10011101 11101111 11100110

    Thanked by (1)uptime
  • Here we go again

    69

    Thanked by (1)uptime
  • 6881
    2915
    62925
    13278

    Either treat them as one or as four.

    Thanked by (1)uptime
  • 97087

    Thanked by (1)uptime
  • 8305

    Thanked by (1)uptime
  • 46156

    Thanked by (1)uptime
  • 84225

    Thanked by (1)uptime
  • souensouen OG
    edited January 2020
  • uptimeuptime OG
    edited January 2020

    Thanks @beagle and @souen for freshening up our prem pseuodrando digits

    Llooks like we just got to the 900th signup a few hours ago: https://talk.lowendspirit.com/profile/900/name

    which was after the 84225 from @beagle - but before the 20090526 from @souen (so we'll end the current string for hashing with 84225, and begin the next one with 20090526)

    and I shall commence to gather the spoons to do the needful hashery for the current selection shortly :)

    Thanked by (3)beagle Kyle_ souen

    HS4LIFE (+ (* 3 4) (* 5 6))

  • secret was 3594351797809761419

    crowsourced digits: 389584239359435179780976141913102625035080081351208925819110011011001110111101111111001106691456881291562925132789708783054615684225

    first three selections: 600, 235, 23

    https://talk.lowendspirit.com/profile/600/name

    https://talk.lowendspirit.com/profile/235/name

    https://talk.lowendspirit.com/profile/23/name

    of which I see the first @Baris (#600) looks to be bogus (that is to say, "unconfirmed" since December 2019) - let's not waste time waiting to hear back from that one.

    so ... next up is @Piso91 (#235) - who has indeed made a few visits ... last active January 1st. Alrighty then! I'll send them a PM and hope for response within 72 hours

    And after that will move on to a true OG (#23) ... omg it's @ITLabs


    Notes:

    echo -n 3594351797809761419 | sha256sum
    dd4a7df5114bcc9c0c8b506923637e48fb2d5b94a01512c4a11b24758d1ca1b8

    echo -n "389584239359435179780976141913102625035080081351208925819110011011001110111101111111001106691456881291562925132789708783054615684225" | sha256sum
    5cd16c7be8e777dea9fa08e6feb1d01cace344401233ba74437e8fa1ff6df094
    
    python3
    Python 3.6.9 (default, Nov  7 2019, 10:44:02)
    [GCC 8.3.0] on linux
    Type "help", "copyright", "credits" or "license" for more information.
    >>> import random
    >>> random.seed(0x5cd16c7be8e777dea9fa08e6feb1d01cace344401233ba74437e8fa1ff6df094)
    >>> random.randint(1,900)
    600
    >>> random.randint(1,900)
    235
    >>> random.randint(1,900)
    23
    >>> random.randint(1,900)
    134
    >>> random.randint(1,900)
    746
    

    @uptime said:
    I'll start the magic numbers for the next selection for signup #900: 389584239
    plus a secret to be revealed before the next selection, after signup #900
    the secret hashes to: dd4a7df5114bcc9c0c8b506923637e48fb2d5b94a01512c4a11b24758d1ca1b8

    the secret is: 3594351797809761419

    echo -n 3594351797809761419 | sha256sum
    dd4a7df5114bcc9c0c8b506923637e48fb2d5b94a01512c4a11b24758d1ca1b8
    

    @beagle said: 131026 for next draw

    @uhu said: £2.50

    @dahartigan said: ~$3.50

    @WSS said: Butts.

    @uptime said: 8008135

    @terrorgen said: 2^80, then take first 10 digits if longer than 10

    python -c 'print(str(2**80)[:10])'
    1208925819
    

    @flips said: 11001101 10011101 11101111 11100110

    @Rahul said: 669

    @Iroshan464 said: 145

    @debaser said:
    6881
    2915
    62925
    13278

    @beagle said: 97087

    @MS said: 8305

    @dosai said: 46156

    @beagle said: 84225

    HS4LIFE (+ (* 3 4) (* 5 6))

  • 02022020

    Thanked by (1)uptime
  • 123

    Thanked by (1)uptime
  • 88888888

    Thanked by (1)uptime
  • 30321
    45512
    11713
    82314
    35315

    Thanked by (1)uptime

    Cheap dedis are my drug, and I'm too far gone to turn back.

  • hmmmm ... I've got some catching up to do here.

    Apologies for the delay - I got a bit drunk last night and ummmmm ... found myself challenged to muster the required attention to detail for this very important business.

    (shit's getting real here yo!)

    no response from @Piso91, so ... next up is OG @ITLabs (!) - I will take some time to compose a proper "hey what's up" PM and then come back to do the needful for SELECTION #999 and beyond ...! :scream:

    Thanked by (1)Kyle_

    HS4LIFE (+ (* 3 4) (* 5 6))

  • 96937

    Thanked by (1)uptime
  • we actually hit signup #999 yesterday: https://talk.lowendspirit.com/profile/999/name

    and 1000 ... and ... and ...

    as I type, it looks like we are up to https://talk.lowendspirit.com/profile/1024/name aka @StopForumSpam

    but let's just take a moment to celebrate all the friends we've made along the way!

    with an extra special shout out to @xraycreampie and @maskedmilfdp

    (it's times like these I ask myself: "What Would Nekki Do?" ... Okay, just keep calm and carry on I guess!)

    tl;dr: we've been moving just a wee bit faster than originally anticipated, but damn the spammers - full speed ahead! :scream:

    @uptime said: we'll end the current string for hashing with 84225, and begin the next one with 20090526

    the secret is: there was no secret! The only digits submitted before #999 were the 20090526 from @souen

    hahahahahaha deal with it! :sunglasses:

    echo -n "20090526" | sha256sum
    6240f41f843aa0ea74ed613bb0ba050ca02f3451e7df58f79772941a2b5de70b
    
    python3
    Python 3.6.9 (default, Nov  7 2019, 10:44:02) 
    [GCC 8.3.0] on linux
    Type "help", "copyright", "credits" or "license" for more information.
    >>> import random
    >>> random.seed(0x6240f41f843aa0ea74ed613bb0ba050ca02f3451e7df58f79772941a2b5de70b)
    >>> random.randint(1,999)
    18
    >>> random.randint(1,999)
    319
    >>> random.randint(1,999)
    410
    >>> random.randint(1,999)
    510
    >>> random.randint(1,999)
    155
    

    and (drumroll ...) https://talk.lowendspirit.com/profile/18/name is ...

    alrighty then - will send a PM and let's see what's up, doc!

    some backup selections, if we go a few days (aka 72 hours) without hearing back:

    https://talk.lowendspirit.com/profile/319/name

    https://talk.lowendspirit.com/profile/410/name

    https://talk.lowendspirit.com/profile/510/name

    :smiley:

    Also, I sent a PM to @ITLabs (backup for previous draw) a few hours ago - really hoping to hear back by the end of the week, let's see what happens.

    As for the drawings for #1000 and beyond - we're going to open a new thread for those. Maybe we can take a little time to gather our wits and see if any adjustment to our ... process ... might be warranted.

    (I'm thinking mainly about how to account for the recently increasing number of spam accounts - though that particular issue may have been resolved at this point.)

    Questions, suggestions, and of course moar rando digits welcome

    Thanked by (3)poisson ouvoun beagle

    HS4LIFE (+ (* 3 4) (* 5 6))

This discussion has been closed.