There have just been too many issues with hardware wallets in the last few years, from the database hack you mentioned through to unpatchable vulnerabilities allowing extraction of seed phrases, for me not to believe there are not other vulnerabilities or issues which exist but either have not yet been discovered or have not yet been disclosed.
Other than the database hack, I don't think having the vulnerabilities is too much of an issue. Most of the vulnerabilities involves sophisticated equipment to glitch the firmware and seems like it came after hours of intensive research to discover. There's nothing much to research on for airgaps wallets because there isn't any incentives to do so. Of course, side channel attacks is not an issue for most but you can never really get too paranoid as well. Kind of helps that their competitors are always trying to hack each other's device as well. 1. Prepare the air gap pc using a dedicated laptop, with a LAN, WiFi, Bluetooth etc disabled in the BIOS.
2. Instal a fresh copy of Windows 10 from a Microsoft DVD onto the laptop, checking that all networking is disabled.
3. On an online PC, do virus and malware checks, format a USB and download Electrum onto the USB, checking the signature.
4. Transfer the USB to the air gap laptop, and instal, with wallet encryption.
Would this be secure enough?
My air-gapped storage before I started to use a HW wallet involves a Raspberry Pi which is much cheaper than even an old laptop. I'd check the signature on the airgapped wallet instead of the online computer, it's not the target computer to run the wallet after all.
|
|
|
Bitcoin Core should be asking you to do -reindex instead of -rescan. -rescan only makes the client run through the blockchain for any transactions associated with the address in the wallet. Running it with reindex simply means that Bitcoin Core attempts to rebuild the block database and the chainstate using the blocks that are already on the disk. It doesn't re-download existing blocks but it will verify and restructure the files instead.
|
|
|
You need to be careful of your computer not to have malware that can attack your hardware wallet during bluetooth connection for transaction signing. While I still believe more in electrum cold wallet signing with QR code generating from the watch-only which is malware resistant. Although, we still need to totally do all necessities to avoid malware.
An air-gapped is not malware resistant. It is possible to infect an airgapped wallet though transferring information from an air gap is hard. Hardware wallets are not susceptible to malware attacks. They are designed to not be compromised through any malware as the private keys should never leave the device. About malacious attacks, there are some vulnerabilities reported in some reputed hardware wallets, while also they can be attacked if your wallet extension device (the computer you use to access it) is having malware. An example is the malware that changes recipient's address to hackers address, that is why you need to check and recheck the address you inputed before sending. The malware can be trasmited through the USB while QR code is still resistant to such which is safest for transaction signing.
An important note, hardware wallet attacks are often fairly sophisticated, save for a few of the less developed ones. They often take advantage of any sidechannel vulnerabilities which can be evasive or costly and often comes after loads of research. In comparison, the main protection against any attacks is the airgap and the airgap only. Hardware wallets are designed to resist any malware attacks and would be alright to be connected to a computer infected with malware. Hardware wallets would always have a confirmation before signing such that the user is aware of the addresses that is in the transaction. The similar case can be made for an air gapped wallet if the user doesn't check the transaction properly.
|
|
|
If this is correctly set up, is the hardware wallet inherently more secure?
I'm compelled to say yes. Hardware wallets are specifically designed to be secure with convenience at the expense of their price tags. There are also hardware wallets which are able to be airgapped efficiently just like what you can do with Electrum. The only problem that I can see is with the leaks like Ledger's, telling everyone that you own a hardware wallet. I don't send any HW wallet to my residential address so that's fine with me. - Hardware failure?
Similar. Both can be imported into another wallet easily. - Malicious attacks?
Hardware wallets are mostly hardened against side channel attacks which most computers are not designed specifically for. The secure element present in some of them also prevents people from brute forcing or extracting the seeds out of the hardware wallet in the event that it gets stolen. AFAIK, some has limited attempts which will brick the entire device once that threshold is reached and thus making brute forcing pins ineffective. While the hardware vendor client database can be hacked, allowing criminals to come knocking on my door, can the same happen with Electrum?
No. Also, looking longer term, what would be the consequences of developers ceasing to maintain Electrum?
Nothing. You can extract the private keys from the HD seed generated with Electrum very easily and just import it into another wallet. It's open source as well so I highly doubt that it would just stop development and not create a fork from it and someone else taking the helm Should I also export my private keys, in addition to the seed phrase (with appropriate safety and storage precautions)?
No. The 12 word seeds is all you need. You can of course do that but you'll be having to secure more things and have to continually update that list if you use your wallet frequently.
|
|
|
You actually can generate compressed keys in v1.6, just not on the paper wallet itself. You'll have to generate it first and then convert it in the wallet details page. Don't think it matters if it's fake or not, unless the person is selling it?
|
|
|
The amount that you have depends on the amount of coins that you have at the point of fork. When did you move your Bitcoin Cash?
BSV was forked on 15/11/18 at the block height of 556766 from Bitcoin Cash. Did you move your Bitcoin Cash before that?
|
|
|
No. 1 Satoshi/vbyte is the absolute minimum for it to be a standard transaction for which Bitcoin nodes are willing to relay. You can obviously make a transaction without fees but that would only work with the participation of a miner.
There are thousands of transactions with 1 sat/vbyte fees right now. The order for which the transactions are confirmed at the same fee rate is unknown and other transactions which are paying the same fees can get confirmed sooner than yours, if you're unlucky. It's likely going to be pushed out of the mempool quite frequently given the current state, would be good for you to rebroadcast it periodically.
|
|
|
People going in different directions. Your crazy if you think genesis keys don't control the chain. You can make any changes and implement new features mint new coins if you hold genesis keys.
They don't. If you think they do, please provide evidence as to how this address (1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa) can do anything other than spending the coins which are not from the genesis block.
|
|
|
Most laptop aren't designed to run 24/7 and people who run Bitcoin Core on their laptop usually just need wallet functionally where they could use pruned mode or SPV wallet. Besides, most laptop i've seen have storage size between 0.5-1.0TB where blockchain size surpass laptop storage size in few years.
I think it's more of an anecdotal statement for me, I've been using my laptop to run Bitcoin Core for a while now and my use case is not always only for the wallet functionality. I think of SPV wallets as a (partial) substitute but not a full replacement for full clients. I was coming from the POV that any reasonable increase in block size to counter the current high fees would result in exponential growth of the blockchain. For which, most users wouldn't really consider purchasing additional disks for that or bother opening up their computer to upgrade.
|
|
|
As far as I see I have installed the latest version:
May be i'm missing something ? It is Ubuntu 18.04, not latest Ubuntu BTW
That Tor version appears to be quite old, I think that was about the time they started incorporating Tor V3 addresses. You want to download using the guide provided above. APT isn't always up to date and in this case appears to be unmaintained (from 2018).
|
|
|
That is interesting it's a physical block lol so he's selling private key to a block? I know that private key to the genesis block can control the entire blockchain.
No. You can't even spend the block rewards from the genesis blocks. Their isn't much info about it. If the priv key has a nonce which it does it must have a private key but it's weird because it doesn't seem to have a public key on the curve.
Private keys do not have a nonce. There are 2^256 priv keys and only 2^160 addresses does that leave priv keys for blocks or am I reading too much into lol
Blocks do not have private keys and blocks also do not have a public key. The main thing that uses a private-public key pair are your addresses, P2PKH, P2WPKH, etc.
|
|
|
They are not the only ones Infinito Wallet give you 12 wallet seed words that cannot be used elsewhere. You can extract the private key from these wallets the problem is if the wallet suddenly stops.
That will negate any benefit of HD wallets. They are designed such that anyone can derive the keys given a HD seed. By making the users manually extract each individual private keys, then they might as well not use HD wallets. Having a known derivation path is indeed useful. You can bruteforce the derivation path given a known address and the seeds though.
|
|
|
It turns out that the extraNonce is not included in the block or block header formats. This is a reply from theymos:
Correct. It's in the Coinbase transaction and since it's not a protocol standard, it can be a bit ambiguous, any changes in the transactions will alter the merkle root though I think using an extranonce makes it simpler. I'm kinda clueless here, but if it's private, it's not on the blockchain, right?
The r and s values are 32 bytes each and located in the signature. If you want to parse it but I imagine that will take sometime, not sure what this can yield though. They're meant to be completely random under normal circumstances.
|
|
|
LoyceV very nicely compiled all of the nonces used in the blocks here: https://loyce.club/blockdata/nonce.txt. I'm not sure where to find the extra nonce though, they're located in the Coinbase transaction.
|
|
|
1. Is -reindex-chainstate enough to fix the corrupted block files, or do I have to do a full -reindex? (Bandwidth is not an issue).
Reindexing the chainstate is faster, Bitcoin Core doesn't have to validate and reindex all the blocks in addition to the chainstate. It took me 2 hours to finish reindexing chainstate as opposed to the 6 hours it took for me to do a full reindex. It would depend on your type of corruption to the files to determine which option you should run. Does it throw an error when reading the chainstate or the blocks? 2. Is there anything else I need to do to gracefully recover an interrupted bitcoin core?
\ Database corruption is the only issue that I have during an unclean shutdown. Nothing else should be affected.
|
|
|
I upgraded to 0.21 on January 14. Tor only node. I dont get any inbound connection. Was running good on 0.20 with plenty of inbound connections. Restarted today, catched an error message that could be the reason of this issue: 2021-02-13T15:08:33Z tor: Successfully connected! 2021-02-13T15:08:33Z tor: Connected to Tor version 0.3.2.10 2021-02-13T15:08:33Z tor: Supported authentication method: COOKIE 2021-02-13T15:08:33Z tor: Supported authentication method: HASHEDPASSWORD 2021-02-13T15:08:33Z tor: Supported authentication method: SAFECOOKIE 2021-02-13T15:08:33Z tor: Using HASHEDPASSWORD authentication 2021-02-13T15:08:33Z tor: Authentication successful 2021-02-13T15:08:33Z tor: Add onion failed; error code 513
What does that error code 513 mean ? That Tor version is very old, I think it's from 2018. Can you try upgrading your Tor and try again?
|
|
|
Yeah. BTCrecover works as well. For either, Exodus does use BIP39 seeds. The derivation path for Segwit (bc1) is m/84'/0'/0' and for legacy (1) is m/44'/0'/0'.
|
|
|
I did 10.000+ searches and not even 1 1EEVEE!, must be something in the bitcoin address structure that doesnt allow this combination, if u dont belive me try it yourself.
The difficulty to compute 1eevee with case sensitive is roughly 264104224. Which makes it 1 in 264104224. I tried running it with vanitysearch (more optimized than vanitygen) with my 1080TI and I found like 7 of them within 5 seconds. You won't be able to find any of those vanity addresses if you only generate such a small space of addresses.
|
|
|
|