Electrum on tails is outdated.
In order to send BTC from electrum on tails, you have to either
1) download and install electrum on the persistent storage. This will allow you to have this version of electrum between several boots, or 2) download electrum on another external storage (e.g. usb), mount it inside tails and use that version of electrum.
In both cases, make sure to verify the pgp signature of electrum before installing (installer) or running (appimage) it.
|
|
|
I don't think it is necessary for them to be integrated into the forum. Everyone can install them, if needed. hatshepsut93 made two userscripts for forum users. They are all great, but there are not too many users have technical skills to use userscripts, they are not coders.
It takes roughly 1 minute (15 seconds if you have greasemonkey installed already) to activate such a script. 1. Download greasemonkey 2. Copy the script 3. Click on the greasemonkey button -> new user script 4. Paste the script 5. Profit You don't need to be a coder or techsavy at all to install these scripts.
|
|
|
The above would be better suited to use cryptography technology.
What do you mean with ' cryptography technology' ? Cryptography is a mandatory component of the blockchain. There is little advantage to using blockchain technology for any of the above, because once an entity has access to the information, they can trivially replicate it in unencrypted format.
While you are right with some use cases, especially the patient chart, i disagree with all of these being unsuitable. Digital Identity, would for example be used to 'sign' documents or contracts using a private key. You could also implement something a viewing key to read the information (like with monero). So it wouldn't be publicly available for everyone and you'd have a proper handy system.
|
|
|
you should not even care where you download the binaries from because even if you download them from the official website it still is not safe until you cryptographically verify its digital signature.
And if you ever wonder why the average person won't adopt bitcoin, see the above quote. Lol. The average person is not ready yet to take responsibility for their own money. It is the average person who gets involved into credit card fraud because they entered it into a shady site or in an open wifi. Verifying signature is a mandatory step which takes less than a minute. And with all the guides available and all the messages telling you to verify it, it is quite sad that people still don't do that. We definitely can have adoption of bitcoin. But first we need some idiot-proof wallets (e.g. hardware wallets embedded into mobile phones with triple checking of everything). Hardware wallets can already be used by average persons, if they are capable of reading and double checking the address on the display. It is just that the riskier wallets (desktop-, mobile- and paper wallets) need more tech savy people who know how to protect digital information and how to verify integrity of data.
|
|
|
Do I understand correctly that the second address is the address for the Bitcoin cash? It turns out that I am automatically assigned an additional wallet?
It is the same address. You were in possession of BTC at the moment btrash forked from bitcoin. Therefore you have these same amount of bcash associated to the same public key (accessible with the same private key). The funds are assigned in the blockchain. No one created a wallet for you. If you are interested in accessing them, you need to download a bcash wallet and import your private key into it. But better first move your BTC funds to a new address to be on the safe side.
|
|
|
CryptoAleczar is banned at the moment, he cannot write in any way. Then that's one of the few (are there even more than one?) banned profiles which are not shown to be banned on bpip.org, weird. @Vod might want to check the reason for that
|
|
|
May be they need someone in BitcoinTalk as their representative to build up some reputation.
I doubt that would be possible for them. Yobit is extremely shady and is involved in scam activities. Building up reputation won't be possible here anymore. All they can do is trying to minimize their reputation damage. And even this won't be easy.
|
|
|
Hacker-owned BTC is now the vast majority of its use case volume, if it wasn't already. I'm sure a few people use it for non-criminal purposes, but they are in the minority.
Do you have anything to back up these statement ? Or is it just 'your feeling' ? As far as opsec for interacting with a fictional coffee barista is concerned, yes. Just think about it for a second: You have a bitcoin stash that you are very concerned over. Now move 0.01 BTC of it to a different, day-to-day wallet that you use to buy your coffee. How is said barista going to know the stash wallet belongs to you? Even if they did (which they don't), what are they going to do about it?
By monitoring the address the 0.01 BTC are coming from. With regular transactions going out to addresses which then are used to buy said coffee, it is not hard at all to combine one with the other. Bottom line: You are promoting a service thats overwhelming use is to help criminals launder bitcoin. No analogy to medicine or food or water changes this. ChipMixer confiscating the funds and returning them to Binance might.
Again.. allegations without anything to back them up. So.. ChipMixer scamming their customer would make them 'good' in your eyes? That's a delusional point of view.
|
|
|
I don't feel like electrum is responsible for anything.
You mix things that should not be mixed - banks, universities or fiat are something completely different then cryptocurrency. How can you say that Electrum developers "is responsible for anything", they develop that software and they did not see that vulnerability which was used for distribution of fake wallet. Let's put aside ignorance of users, they are the victims of their ignorance, but it all start with exploit in Electrum - saying that all blame is on users is not fair in my opinion. There is not a single software without vulnerabilities. Not a single one. And the vulnerability in electrum has a CVSS score of roughly 3/10. That is very far away from a sever vulnerability. The severity is low.. at max. There is absolutely nothing which can happen based on this vulnerability. The user has to make several mistakes in a row (falling to phishing message, downloading from a fake site, not verifying signature, executing malware ..) in order to lose coins. Those people most likely also would fall for a cheap phishing mail. IMO absolutely their fault. No one forced them to use electrum. And neither did anyone force them to download malware from a fake site.
|
|
|
Minen wollte ich damit nicht ich dachte vielleicht eher das man eine wallte darauf laufen lassen kann.
Klar, das offensichtlichste hab ich vergessen Einen bitcoin node und evtl. einen electrum server kann man drauf laufen lassen. Okay aber das Betriebssystem ändert sich ja noch unnötig jetzt den kleineren zu kaufen oder?
Kommt ganz darauf an, was du machen willst. Der 3b+ hat halt nur 1GB RAB. Dafür ist er halt günstiger. Die Software beim Neuen ist noch nicht ganz ausgereift, wird sich aber bald ändern. Beide erfüllen Ihren Zweck, und meistens wird der alte auch reichen. Aber gegen mehr Leistung ist nie was einzuwenden
|
|
|
You're playing a game of semantics. "Mixing" is just a pleasant substitute for "laundering."
Ah, i see. So anyone who wants to remain some privacy and mixes his coin is automatically laundering money. Good to know that keeping things private is a crime in your eyes. An alternative is moving your coffee purchasing funds from your bigger wallet into a smaller one. Simple.
Remaining private 101. Good job No.. honestly.. are you serious about that statement Yes.. and you see all 4 outputs going to an exchange, 4 different accounts. And now ? There is nothing you can do.
Of course there's something you can do, and that is follow all 4 outputs. Follow where ? They already reached their destination.. They are being exchanged into money or another currency (e.g. monero) at that point.. from 4 seperate accounts. You can not follow it anymore. Please elaborate how you keep following them
|
|
|
So we can say that users are guilty of becoming victims of phisning, and this is true - same as Electrum is guilty for served as the perfect platform for such an attack.
I don't feel like electrum is responsible for anything. It is an open source wallet and everyone should use common sense when dealing with sensitive information (what private keys are). You can't blame electrum for serving as a kind of platform to perform such attacks. You'd have to also make banks responsible for online-banking or check-fraud and the universities of the US for creating email - which is the most common 'platform' for phishing. Just because someone offers a platform or technology, doesn't mean he is responsible for anything which happens with it. You don't blame Satoshi for creating bitcoin and the involved crimes (blackmailing, money laundering, etc..), do you ? Or the Gov for their FIAT and the involved crimes (drug dealers and hitmen being paid with FIAT, etc..) ?
|
|
|
EG btc is capable of ~600k tx a day a bus is cable of60 passengers
take users off the btc network to use LN take people off the bus to use a train
does not increase btc capacity does not increase the bus capacity
btc remains at ~600k capacity bus remains at 60 seat capacity
again the bus still has 60 seats and btc still can only do ~600k tx a day
You still don't understand it.. sigh.. We already had that discussion. And i explained it to you several times. What you describe as 'btc' in your example is just an on-chain transaction, not the whole network. The BTC network would be to get people from X to Y. And in this case it doesn't matter whether they take the bus (on-chain) or the train (off-chain). That's how i would explain it to a kid (i.e. to you). In reality nothing works like that and your example is pure garbage. You can not compare network transactions to taking a bus/train. I mean.. you keep using something like 'increasing blocksize means twice as much seats'. Well.. it works for such extremely simple things. But what about segwit ? How would you describe segwit with busses ? Or schnorr signatures ? Things aren't as simple as you believe them to be. You are alone with your opinion, accept that and move on. No one cares what you think or have to say.
|
|
|
If you are a copper member, you just get copper member and thats it. I want to be able to grow my account up to full member and eventually legendary like yourself. If you are a copper member can you rise above copper to become senior or hero?
Of course you will be able to further rank up. The copper membership is used to post images and reduce action delays which you have as a newbie. You can read about it here: https://bitcointalk.org/index.php?topic=2385104
|
|
|
I'm not worried about Bluetooth hacking or something, it's not turned on for a long time and it's just a few minutes when it is turned on.
The amount of time you are using bluetooth doesn't really matter. If you are using it at all, there theoretically is an attack vector. I say theoretical, because ledger's nano is build the way that even if it is communicating with a compromised device (which also includes a compromised connection such as a hijacked bluetooth connection), it still can not be exploited. If you double check the amount and recipient address, you should be fine regardless of whether bluetooth or cable is being used to communicate.
|
|
|
Seems so. But if he starts to post, feel free to report that post as ban evasion with a link to the evidence.
|
|
|
Ich überlege mir einen raspberry pi4 mit 4gb zuholen einfach zum ausprobieren. Irgendwelche Tipps was man damit anstellen kann?
Also minen wirst du damit nicht können, das wäre es einfach überhaupt nicht wert. Aber es gibt viele andere Anwendungsgebiete, unter anderem: - Webserver
- Cloud
- Anonyme Suchmaschine
- DNS-server (PiHole, nutzbar als Adblocker)
- VPN-Server (Zum connecten wenn ausserhalb, für Sicherheit ohne einem zufälligem Provider vertrauen zu müssen)
- Eigenen Messenger Server (z.B. XMPP)
- Smart Home Automation
- Mail server
- Gaming server
- uvm.. Eine Liste von etlichen Möglichkeiten welche man auf dem Pi hosten kann gibt es hier: https://github.com/Kickball/awesome-selfhosted
|
|
|
So if the /dev/random produces the same output two times, the difference in mouse movements will cause the software to produce two private keys.
This won't happen. /dev/random uses multiple sources as entroy, including CPU interrupts and noise from drivers. You won't produce the same result twice. Adding mouse movement won't change much. /dev/random and /dev/urandom both are considered good PRNGs. And even tho an attacker might be able to compromise those files, this also means he already compromised the system and therefore does not need to change /dev/random at all.
|
|
|
Of course it is electrum faullt, because software has holes. I opened original programm not fake and it adviced me to down load upgrade, my fault is only that i have not learnt all these information before.
A message from the electrum server you were connected to told you to update the software. If you would have checked the link, you would have realized that it lead you to a fake website (or to github without any source code). This, combined with the fact that you didn't verify the signature, lead to your funds being stolen by malware. But how do i know if i open ORIGINAL SOFTWARE!?
As already mentioned, verify the signature before installing (as stated on the website). Again, the software was installed very far before and would never use in future, the money was safe untill i open that programm
1) It was never very secured if you stored it on an online computer AND your mobile phone. 2) They got stolen once you downloaded and installed malware, electrum is not at fault.
|
|
|
That's not how things work. And if you properly airgap your computer, the risks of using this website are very low (or non existent)
Not necessarily. If the PRNG is sabotaged or it is coded to only create X (e.g. 1.000.000) different private keys, then even using it offline would not be safe. And that would probably be the most realistic attack if an bad actor would use such a site to steal funds.
|
|
|
|