As I wrote. I have a computer on the MAC and used it only on it. Here are just one made put a new version. Here is this site https://electrum.org/#download How could they steal ![Huh](https://bitcointalk.org/Smileys/default/huh.gif) I really don't understand. Already, developers began to suspect on this ![Cry](https://bitcointalk.org/Smileys/default/cry.gif) Are you 100% certain you downloaded the binary from the link you posted? Eventough there is no chance of recovering your funds, i'd still advise you to find out what went wrong in order to make sure your mac isn't infected. Do you still have the dmg file on your mac? If so, do you know how to check a signature or do we have to talk you trough this? There are several attack vectors: - Very old electrum versions (maybe the one you used to run before yesterday) used to have a vulnerability that allowed a thief to steal from a running electrum binary as long as the wallet was unencrypted
- You could have downloaded a fake electrum version that was programmed to immediately send all your funds to an attacker, or maybe send the xprv by a call-home function
- Your mac might be infected with a virus/backdoor/keylogger
- Somebody might have gotten their hands on your seed or an unencrypted wallet file
I've seen loads of people lose funds due to the use of several different wallets... In electrum's case, i've never had any reason to think the actual dev's (ThomasV) involvement. ThomasV is a public figure, he is known by his real name and has been a member of this community for a long time. All code he writes is open source and should be community vetted. He doesn't even compile all sourcecode for all os's by himself.
|
|
|
Sorry to be the barer of bad news, but if somebody stole your funds, they are gone...
Horrible(((( I forgot to say one more thing. Yesterday I installed the program from the official website 3.3.6. Prior to this, the old version was installed. Aaah, this might be the cause... Did you check ThomasV's signature? A lot of fake electrum download sites are floating around. They try to make you download fake electrum versions that are built for stealing funds.
|
|
|
Sorry to be the barer of bad news, but if somebody stole your funds, they are gone... As soon as the thief's transaction is confirmed, the odds of recovering your funds are ~0, that's the way the bitcoin protocol was built... It's trustless and immutable, there is no central bank that can roll back transactions... Sorry. Best you can do is find out how you were robbed. - Are you sure you're running an official version? Loads of fake electrum versions are floating around
- Are you running the latest version?
- Is your PC 100% spyware free?
- Are you sure the seed phrase isn't stored online?
- Are you sure nobody has physical access to the seed phrase
- Is your wallet password encrypted? Strong password?
Personally, i don't use 2FA on my electrum wallet. I find it expensive (since it's a paying thirth party plugin AFAIK... I have never used it so i have no experience).
|
|
|
ok ill see into upgrading to the newest version do you know how do i calculate the number of inputs in my transaction to calculate the size?
Just a remark: my post wasn't urging you to upgrade... It was warning you the account function is depreciated and will be removed in 0.18 (the latest version). About the fee: if you create and sign a tx in the cli of bitcoind, you can always decode the signed tx before you broadcast. You'll get a json that shows you both size and vsize. If you don't like the fee in sat/vbyte, you can skip the broadcasting and re-create a tx with a better fee in sat/vbyte
|
|
|
Do you mean you're using bitcoin core's account feature? Maybe it would be interesting to read following release notes https://bitcoin.org/en/release/v0.17.0In detail, following subsection might be interesting to you: A new ‘label’ API has been introduced for the wallet. This is intended as a replacement for the deprecated ‘account’ API. The ‘account’ can continue to be used in V0.17 by starting bitcoind with the ‘-deprecatedrpc=accounts’ argument, and will be fully removed in V0.18.
source: https://bitcoin.org/en/release/v0.17.0I've never used the account feature myself, but i've seen several people getting confused with this deprecated feature and reporting errors... Best not to use it. Also: there is no such thing as an actual negative balance... It's only because the account feature doesn't work properly... So you'll probably have a negative balance for one account matching a positive balance for a different account...
|
|
|
Edit: removed my post since all 20 slots are filled
Never mind, just realised you already have 20 testers... Sorry for bumping your thread, i'll remove this application as soon as the 24 hour lockdown period has ended
Hi, we will be glad if you join our campaign. In this case the last 20th slot will be yours ![Wink](https://bitcointalk.org/Smileys/default/wink.gif) I'd be happy to be the 20th reviewer ![Smiley](https://bitcointalk.org/Smileys/default/smiley.gif) My address is: 1MocACiWLM8bYn8pCrYjy6uHq4U3CkxLaa
|
|
|
Edit: removed my post since all 20 slots are filled
Never mind, just realised you already have 20 testers... Sorry for bumping your thread, i'll remove this application as soon as the 24 hour lockdown period has ended
|
|
|
why don't you just run bitcoin core on your server and use json-rpc queries to create transactions?
An alternative would be to run an electrum daemon...
Do test out your setup on the testnet before you go live tough, creating raw transactions can be tricky if you're doing it for the first time... You wouldn't want to mess up your fee calculation and end up overpaying...
|
|
|
--snip--
You're ignoring the fact that his software is a complete joke, show me one instance where someone has successfully used this, all I see is people being scammed by commentators on the bin.
--snip--
How naive are you? This is a complete joke of a program and will not help anyone it is a not a feasible means to recover your password.
Ok... We started namecalling... Sure, why not... Let's go there. Well... I have NEVER said that people won't get scammed... Ofcourse scammers jump on any opportunity or technology that isn't well understood trying to scam innocent users... btcrecover is no exeption. I'm pretty sure the OP will get several offers of people wanting to help him that are, in fact, scammers without even bringing any tool into the conversation. I never said btcrecover is the holy grail, i never said it's the go-to application, i even clearly stated that for a strong, random password the odds of finding the password are very low. Sure, there are better tools out there, but i have used btcrecover in the past and i found it pretty easy to run, so from time to time i do give this as one of the potential options a user can try so he doesn't have to give his wallet.dat to a thirth party. I don't think tools like these have many success stories anyways... It's pretty hard to brute force a password, so i guess most people that try never succeed, and people that succeed only very seldomly post their success story. Only the people that try and fail start to ask questions. I'm not naive, i'm a realist. I did use this tool myself, and since i have no stake in this question (i'm not trying to charge the op for brute forcing his password), i do hope i'm a credible witness (i'm sure you'll disagree, but i don't really care). If not, i did a quick google and did find this story: https://github.com/gurnec/btcrecover/issues/286I know this proves nothing, but at least you can't say the tool doesn't work at all. I'm not affiliated with btcrecover, the OP is free to chose whatever tool or person he wants... Based on your last post i can only assume you claim to have found a weakness in the way bitcoin core implemented wallet encryption (since you bring up the fact you claim to have 7 years of C++ and reverse engineering experience, i can only assume you're not planning on brute forcing the password). Eventough i haven't seen proof of any of your claims, i wish you the best, and if you're for real and did find an exploit, you'll have a much better chance of helping the op than anybody with a brute force tool... But for now you'll have to understand it's a big if, i haven't seen any proof... Good luck, i have no intention to keep bickering with you, so i'll remove this topic from my watchlist and hope the OP makes a wise decission.
|
|
|
I'll explain it really easy for you.
Post the txt file that contains his password and the other 5,000,000 combination incorrect passwords.
Where do you get these 5,000,000 incorrect passwords from? The op didn't mention he had a list of 5,000,000 passwords and only one is/was correct... If he had an ascii file with 4999999 incorrect passwords and 1 correct one, i would defenately have pointed him towards btcrecover... Using such a small password file would have been pretty easy. Even if his password is only 9 characters long (lower, upper, number, special), there would have been 572,994,802,228,616,704 combinations... Where do you get 5.000.000? OP: whatever you do, don't send you wallet file to somebody you don't trust... It's ok to let somebody write a walktrough for you tough. I'm out, good luck
|
|
|
The "btcrecover" is not an option and merely a false hope to whoever has lost their bitcoins, in theory when explained it sounds good. But that's it, it just sounds good.
I have used other methods and done so successfully but if anyone here expects me to go ahead and post a proof of concept when there is 3 BTC being offered as a reward, you're sadly mistaken.
Can you tell me what sounds good when i initially explained btcrecover in this very thread.. Here is how i explained the OP's odds: BTW: there is no magic trick for recovering a wallet.dat password. It's basically always brute-forcing, so the easyer your password was, or the more you know about your password, the higher the odds it can be recovered. If you picked a strong password and you have no clue as to what it might be (or contain), the odds of recovering a password are very, very, very small, even if you use a "professional" recovery service.
And i still stand by my words... I have used btcrecover on my own wallets in the past, but i had a relatively decent idear about what my password might have been... I clearly stated that if the OP has no clue, and he chose a relatively strong password, his odds are very, very, very small... And i don't know about any "tricks" that make password recovery for an encrypted core wallet any easyer... Sure, you can use other, more performant, tools, but it'll always be brute forcing...
|
|
|
This transaction was included in a valid block about 9 days ago, since then it has +5000 confirmations... If an online wallet provider tells you that this transaction is unconfirmed, they're lying. I've never heared about an unspent wallet... There are unspent outputs funding an address whose private key you controll, but afaik there is no think like an "unspent wallet". You can use those unspent outputs funding addresses you controll to create new transactions funding an address from coinbase... Is this what you want to say? In this case, my initial answer is still correct. If the transaction you posted is the one you created to fund a coinbase address, and coinbase is not crediting your account, you either copied the wrong address, or coinbase's wallet is not sync'ed (or they're having some other kind of technical problem)
|
|
|
Hello everybody! Help me please. Already for eight days all LTC and BCH which is sent to me in coinbase is unconfirmed transaction . But when sending to other wallets, everything is fine, something happened with coinbase ? What should I do ?
If you used the same wallet to create transactions funding "other wallet" and "coinbase", the same algorithm should have been used to calculate the fee, so there should be no technical difference between those transactions.... Ofcourse, there's always a chance one of the transactions contained dust outputs or the fee calculation contained a bug so one of the transactions is technically different from the others. Are you sure the transaction is actually unconfirmed, and it's not just coinbase's wallet that's out of sync? But, in the end, the only way we can actually diagnose what went wrong is if you share transaction id's... Sharing txid's is not harmfull security-wise, but it can reduce your anonimity...
|
|
|
Graag gedaan,
Ik zie die markt op zich wel, maar hij is zo klein en specialistisch dat in die vraag al is voorzien door de huidige mogelijkheden op de markt...
Als het weinig moeite kost kun je't proberen maar ik zou zelf idd "betere" manieren weten om m'n tijd te investeren...
Mooi gezegd, Ben het er volledig mee eens, als ShopemNL deze dienst zou aanbieden zou ik er enkel van gebruik maken als hij onder de prijs van de huidige sellers zou gaan én toch evenveel kwaliteit en betrouwbaarheid zou bieden... Het lijkt me idd wel niet zo bijzonder moeilijk om deze dienst aan te bieden, ik weet bijvoorbeeld dat bitgild niet zelf over een stock beschikt maar gewoon een reseller is van een betrouwbare duitse aanbieder dewelke geen cryptomunten aanneemt.
|
|
|
--snip--
wow, the paper wallets it contains a unique design, but do you know any paper wallets website that provides a segwit/bech32 address?
WARNING: i do not know anybody who vetted this code (yet), so i am not sure if the RNG used by this website is real/safe. Untill the sourcecode is truely vetted by senior community members, i would not completely trust this site!!!https://segwitaddress.org/bech32/#entropyRef WARNING: i do not know anybody who vetted this code (yet), so i am not sure if the RNG used by this website is real/safe. Untill the sourcecode is truely vetted by senior community members, i would not completely trust this site!!!
|
|
|
What about purchasing of virtual products eg. e-books. U don't need to give PayPal your real address and the seller does not need to know it since he isn't going to physically mail it to you. Just fake it.
On the part of using a card, can you bypass that with virtual credit cards?
As far as i know, paypal is a licenced credit institution... I'm no lawyer, but my best bet would be that faking a name when opening an account would be some sort of fraud... Worst case scenario you could probably end up in jail for faking a name when opening a paypal account... Best case scenario they'll probably lock your account and demand KYC documents so you can prove you're the person who initially opened the account... Which is impossible since you faked the details. Don't want to give your real name? Stay away from paypal... Just my 2 satoshi's.
|
|
|
Ik ben al een tijdje klant bij bitgild (geen grote aankopen hoor, maar zo nu en dan enkele grammetjes)... Mij maakt het eigenlijk niet uit in welke vorm goud/zilver bij me aankomt, zolang de verkoper maar eerlijk en betrouwbaar is, het metaal zo zuiver mogelijk is en de prijs zo kort mogelijk tegen de huidige spot price aanzit. Persoonlijk zou ik nooit 18 of 22 kr goud kopen...
In praktijk komt dit voor zilver vooral neer op munten aangezien die belastingsvrij zijn, voor goud meestal op goudbaren...
|
|
|
You're basically asking how to make a paper wallet... In this case, i'd say to use https://www.bitaddress.org/ . I have no idear why you'd chose an online wallet like blockchain.com to create a paper wallet, that's really not what they're designed for. If you create a paper wallet, follow following steps for maximum security: - DOWNLOAD their sourcecode (at this moment, the latest version of their sourcecode can be downloaded from https://github.com/pointbiz/bitaddress.org/archive/v3.3.0.zip , But you shouldn't trust anybody that shoves a link in your face and surf to bitaddress.org yourself and find a link to the lastest version of their sourcecode)
- disconnect from the internet
- unpack the sourcecode, open the index page
- create a paper wallet (bip38 encrypted), print it on a directly attached printer... Make several copies
- Reboot the printer + PC before you even attempt to reconnect from the internet
- Laminate the paper wallet(s) and store them in multiple dry, dark, cool, physically protected places (like a banksafe)... If a fire destroys your house, you still need to have a copy of the paper wallet in order to access your funds
|
|
|
You can always try to setup https://github.com/gurnec/btcrecover or pay somebody to write you a walktrough on how to get btcrecover running... That way you can controll the recovery process yourself, it's never a good idear to send a wallet.dat to a thirth party. If you chose this path, make sure you (or the person writing the walktrough) read this section in particular: https://github.com/gurnec/btcrecover/blob/master/docs/GPU_Acceleration.mdBTW: there is no magic trick for recovering a wallet.dat password. It's basically always brute-forcing, so the easyer your password was, or the more you know about your password, the higher the odds it can be recovered. If you picked a strong password and you have no clue as to what it might be (or contain), the odds of recovering a password are very, very, very small, even if you use a "professional" recovery service.
|
|
|
|