Do you think this is good move to securing my funds much better and more safe?
Yes, assuming you already check your device is genuine[1] and you already backup the recovery words. Do you all have the better confidence in using these hardware wallets vs using just software?
When the comparison is between Ledger and closed-source software, i have higher confidence on Ledger. [1] https://support.ledger.com/hc/en-us/articles/4404389367057-Is-my-Ledger-device-genuine-
|
|
|
Just curious if any breakthroughs have come in the SC space, or are we still where we were at when I last posted on here?
Aside from Taproot which now avaialble on mainnet, some people discuss RGB[1] and Taro[2] protocol. Kind of like the cpunk mailing list, but for non-experts like myself? That part is harder. I think searching the web and asking questions is the only way to learn things, because if you want to understand experts, you have to become an expert. Learning takes a lot of time, if you don't want to learn all needed technical details, then you can only ask questions, I can't see any other way. Some technical from article Bitcoin Magazine[3] might be good source. They usually don't use meaningless buzzword or technical jargon when it's not needed. [1] https://bitcointalk.org/index.php?topic=5382633.0[2] https://bitcointalk.org/index.php?topic=5393585.0[3] https://bitcoinmagazine.com/technical][url]https://bitcoinmagazine.com/technical[/url]
|
|
|
First of all, do you have additional information (either public key/address)? Brute forcing 1 million combination is fast, but far slower when you don't have those information. I tried Finder Outer but work failed
What exactly do you mean by "work failed"? is there 1 another solution...python scrypt or others?
If you're willing to write your own script, there are many library to to generate address from private key such as https://github.com/1200wd/bitcoinlib. You'll need to write private key/address on separate file, then check whether the address has balance (e.g. using list mentioned by @LoyceV).
|
|
|
As per his trust rating the account is also hacked but as per his bpip.org merit information he has sent 57 merits to 49 profiles while he has only earned 11 merits over time so does this mean he was merit source or what? You forget initial merit airdrop for existing user which also drop some sMerit depending on their rank or how active they are. While i don't remember the exact drop number, it's unlikely he's merit source since he only send 57 merit so far.
|
|
|
Hi fellow Bitcointalknaires, to all this who have been here before me and those who have been investing in crypto for the past years have there been any cases of projects with a good hardworking team that give their best shots and yet the project still fails? Tell me one project that face this same fate.
Hard work doesn't always equal to good work, especially when it's build on top of fragile foundation (e.g. clone another coin source code, fork existing coin network or token without any practical usage). --snip--
The 0.24x on NEO means what? The entire returns since 2017? That's a big lie and not accurate, in 2020 I bought some NEO coins for 6$ each and I sold them for 118$ in 2021, how much return is this? Are you for real? The problem lies with those that bought at high price and sell at another high price not those that bought at All time low. It simply mean NEO price ratio between 2017-12-17[1] and 2022-01-24[2]. 0.24x simply means NEO price ratio between those 2 date. While it's biased, i wouldn't say it's a lie. [1] https://coinmarketcap.com/historical/20171217/[2] https://coinmarketcap.com/historical/20220124/
|
|
|
You are getting implementation-dependent garbage numbers. It is hard to say how to get those numbers, because without code, we have no idea, where you made a mistake in your own code.
But I guess it is related to float precision. Maybe check basic things, for example that adding 0.1 ten times gives you exactly 1.
There's even website about it at https://0.30000000000000004.com/. I don't know modmath / keymath
OP might be referring to this repository, https://github.com/albertobsd/ecctools.
|
|
|
I wouldn't bother with such challenge when they don't respect GPLv3 which used by WifSolverCuda[1]. Besides, it's more sensible to rent GPU on remote server or ask professional instead which have lots of GPU. Why is the program without source codes? The correct ranges and other parameters are sewn into the WifSolverCuda program. Knowing them, the user can find the key on his own and take everything for himself.
[1] https://github.com/PawelGorny/WifSolverCuda/blob/main/LICENSE
|
|
|
Some problems with install fpylll
Developer using Ubuntu >= 20.04 So try on Ubuntu 20.04
pip install git+https://github.com/bitlogik/lattice-attack pip install git+https://github.com/fplll/fpylll.git
All command try installs not successful both on os windows and Linux
using conda not successful too conda install -c conda-forge fpylll
all methods include update apt too
sudo add-apt-repository universe sudo apt update sudo apt install python3-fpylll
pip install Cython
all fail
There might be problem with your Ubuntu 20.04 or library's setup.py. I tried it on Debian 11 (inside VM) and could run the library without any problem. git clone https://github.com/bitlogik/lattice-attack cd lattice-attack/ sudo apt install python3-cryptography python3-fpylll python3 gen_data.py # generate example data python3 lattice_attack.py -f data.json # perform attack with example data
This is the output. ----- Lattice ECDSA Attack ----- Loading data from file data.json Running with 6 bits of k (LSB) Starting recovery attack (curve SECP256K1) Constructing matrix Solving matrix ... LLL reduction Key found \o/ 0xb75d59be7755c7af999687b769aeac541422ace964eb92d00f1c9a8017b1b7f9
|
|
|
If it was always about software and not hardware, don't you think we would be having so many such software that would let GPUs/CPUs be very profitable against the latest ASICs? The kind of pool you are planning to use is even going to eat up some of your profits since they will do the exchanging for you.
Stop daydreaming brother.
yeah, after some research I found what you say true,so I’m gonna change to slush pool, and that not a issue, and did you say my os gonna make your gpu better than latest asic? Bro, asic price are high, some ppl are poor to buy a asic and just buy some gpus, in this case this ppl gonna need to search the biggest hashrate, and maybe my os can give him this hashrate, I’m gonna try to write some algorithms and memory allocations to make mining experience with GPU better, and y’a, btw C is not easy like you think Since you said "Mine Bitcoin With Gpu/Cpu!", i'd like to mention that GPU/CPU is far slower and less efficient than ASIC. Why don't you check try to calculate the profit loss based on SHA-256 hashrate for CPU/GPU[1] with any online Bitcoin mining calculator[2]? [1] https://en.bitcoin.it/wiki/Non-specialized_hardware_comparison[2] https://www.coincalculators.io/coin/bitcoin
|
|
|
My questions; 1. Does these apply to every transactions?
No. 2. If no, please explain the phenomenon behind it?
There's no rule which forbid you to spend output from non-coinbase transaction with less than 100 confirmation (even if it has 0 confirmation). 3. What happens when combined reward of the block with its transaction fee is bigger than the output value
The unclaimed amount of Bitcoin is lost forever.
|
|
|
Blockchain.com timestamps each transaction inside each block. Not every transaction has the same timestamp. As above, this is when blockchain.com's node first learns of that transaction. This is not related to bitcoin at a protocol level. well it's a nice feature to be able to see when a transaction was done. maybe they should add that to the protocol. everything should have a timestamp i would think. or some way of deciding the ordering of objects in time. even down to the transaction level. if blockchain.com can do it why can't bitcoin? It's possible, but 1. It introduce small bloat. Could be 4 or 8 bytes depending on whether you concerned about year 2038/2106 problem. 2. Since transaction could broadcaster far before it's included on block, it's hard to verify acuuracy of the timestamp on transaction. that's because they don't care about quality, they are concerned with pumping crap out the door. getting it to market to make more bucks. But most of those vendor are big IT company with big net worth. Can you give few example of vendor or application who cares about quality?
|
|
|
I can see how fees can be zero, but is it possible for CAmount in a transaction (e.g. p2wh address1 --> address2) be zero?
It's definitely possible if address2 actually refer to OP_RETURN output.
|
|
|
All question you asked already answered on the repository. what is data.json From https://github.com/bitlogik/lattice-attack#use, data.json contain some information needed to perform lattice attack.
how to make it
You can either make it manually or use gen_data.pypython3 gen_data.py -f data1.json -m "HelloYou" -c SECP256R1 -b 8 -t MSB -n 50
how to run without error
You need to specify what kind of error you encountered. Have you fulfilled requirements which mentioned at https://github.com/bitlogik/lattice-attack#requirements?
|
|
|
Okay, I managed to run it the first time and it created a config file in which I can change the datadir. It now tries to install it in the proper place when I rerun it, but thinks I only have 3 GB free... (I have a free terabyte) https://imgur.com/a/tyuzsl3 for screenshot Since you mentioned that you install Bitcoin Core via Snap, have you checked whether you give Bitcoin Core permission to access your external drive?
|
|
|
Brute force 4 missing Electrum words isn't cheap, so i have to ask whether you already think another way to restore your Bitcoin? For example, 1. Check whether your OS made backup of that .txt file. For example, Windows have feature "Enable Previous Version" which AFAIK enabled by default. 2. If you accidentally delete Electrum wallet file, you could use file recovery tool software (such as Recuva) to restore the file. FinderOuter is more user-friendly, but 2048^4 is rather large combination and FinderOuter lacks GPU acceleration.
|
|
|
The mailing mention NTRU would make node perform extra validation, yet NTRU implementation show it's far faster than ECC-NIST (closest one to cryptography which Bitcoin use). Can someone explain why? Source: https://tbuktu.github.io/ntru/
|
|
|
|