You need to navigate into the folder containing the file first, using cd. For example, enter the following to get into the root directory: Then navigate into the folder containing the script, for example: cd Users cd USERNAME cd Desktop
Then start the script again. But obviously after connecting the drive.
|
|
|
One thing that hasn't changed is the fact that ChipMixer IS a money laundering service. Period.
No, it is not. It is a mixing service to increase privacy. Nothing more. Just because some people might abuse it to launder money, it doesn't make it a money laundering service.. The arguments I saw for legal use of it were a bit ridiculous. You don't want a barista to see how much BTC is in your wallet so you use a coin mixer??
What would be an alternative to that ? With BTC, you don't have any other alternative than using a mixer. Without proper coin control and much effort, you will always be traceable. Using a mixer is quite easy and handy for that. Nothing wrong with that IMO. Serious blockchain analytics companies hoping to provide actionable information to clients like Binance don't need to think of coins in terms of "clean" or "dirty." They are going to follow all 4 outputs and see where they go. The process is much more complicated than just deciding "clean" and "dirty." It involves making observations and identifying patterns based on larger amounts of data than simply a single transaction.
Yes.. and you see all 4 outputs going to an exchange, 4 different accounts. And now ? There is nothing you can do. If there is not much more data than just this one (or maybe a few more) transactions, there is simply nothing you can do. Of course.. mistakes made by people decreases the privacy. But without any mistakes, there is simply no way. And saying 'bla bla there are companies which can do that' without providing any evidence or explaining how exactly they would achieve that, just makes it sound ridiculous.
|
|
|
Were you able to verify whether the address indeed belongs to your wallet? ( In electrum console: ismine("1YourAddressHere") -> Returns either true or false). Also, what version of electrum are you using ? Are you connected to an electrum server ? It might be just a connection- / display- issue. Maybe next time better use erc20 wallet for received your payment, you can use eth as payment platform your product because is easy and transaction need short time.
What ? Why would OP want to accept some shittokens not being used by anone in his online store ? The time it takes for a transaction to propagate is the same. And the confirmation times is different, yes. But 1 confirmation on the bitcoin network is worth way more than 3 confirmations on the ETH network, security-wise.
|
|
|
Using an RBF supported wallet is always a better option but still there are many wallets which do not allow RBF transactions
Most wallets support RBF. At least the proper wallets. So no web wallets or other kind of custodial wallets. Good desktop wallets (e.g. Core, Electrum, Wasabi) have the option to enable RBF. Same applies to mobile wallets. There are many third party accelerators which are not run by mining pools but they can rebroadcast the transactions. These are useful when the transactions are dropped by mining pools. Few of them are mentioned in the article.
The standard time a transaction is being held in the mempool is 14 days. If a transaction does not confirm within that timeframe, it probably would be wiser to create a new one with a higher fee instead of rebroadcasting it (especially if the RBF flag is not set).
|
|
|
What exactly are you trying to do, and for what reason ?
Can you explain what you previously did and in which situation you currently are ? Because, as nc50lc already mentioned, private keys are not deleted when being exported. Why do you need to import it again into the same wallet ?
If you have an issue, feel free to describe it as precisely as you can. This makes it much easier for us to identify the cause and to solve it.
|
|
|
Unfortunately they are gone and you can't get them back.
0.05 BTC is not a negligible amount of coins. If you intend to store such an amount again, you should really consider buying a hardware wallet. They cost roughly 70$ and are safe to be used with online-/infected computers.
The most important thing now would be to determine how the attacker could gain access to your coins.
Since the transaction took place 3 days ago and you didn't log in for 2 weeks, can we assume your wallet is password protected ? Did you already log in into the 3.3.8 wallet after downloading (unlocked wallet) ? Did you verify the signature of the file, where did you download it from ?
If your wallet is password protected and you opened (unlocked) it 2 weeks ago, the infection must have took place within the last 2 weeks. Do you remember downloading any software within this timeframe ?
If you can't be sure of what caused your funds to be stolen, consider your system as compromised. Reinstall your OS is a mandatory step (please no cracked version of windows. They are always infected with malware).
|
|
|
No, as you can read up above he havent download anything aside on that 3.3.8 version into that official site. There were no pop-outs yet he do knows about such thing but he do still end up on losing those coins.A really mind boggling on my part.
Your statement doesn't make any sense. Are you implying that he never downloaded any software besides electrum ? Because that has not been mentioned anywhere. The post you have quoted did not say that he has downloaded a malicious version of electrum. Getting infected with malware does not only happen through downloading a fake electrum version Abdussamad's statement completely makes sense. Either the secrets (mnemonic code / private keys) got stolen by malware, or OP entered them into a site. And OP already had a previous version of electrum. And if he didn't verify the signature, this might be the infected (fake-) version. Just supposedly downloading from the official site, does not guarantee that you will in fact get the original file. There are still multiple techniques an attacker can use to bring a malicious version onto your computer.
|
|
|
I disagree.
I rather have a qualitative wallet for BTC than a somewhat shitty one for multiple currencies. There are enough wallets for shitcoins already, even forks of electrum.
There is no need for some BTC wallet developer to focus on implementing other coins which the majority of electrum user simply does not need. I'd rather have (even more) additional features than support for shitcoins,.
If you want a multi-curreny wallet, choose one of the ones already existing. But keep in mind that they will never be able to be as feature-rich as a pure single-currency-wallet.
|
|
|
Don't get a blockchain lockbox.
That's basically a cheap version of the nano s with support for way less coins than the original nano s and AFAIK also only working with the blockchain.com interface. And it costs almost the same.
Better just get the original ledger nano s. Costs the same, but you can store way more than just 4 different coins on it. And you can use any compatible wallet you want (ledger live, electrum, wasabi, etc..).
Yubikey, as already mentioned, is not a hardware wallet, but a security-token. It is being used for 2FA (to secure accounts which support 2 FA) and can be used for other stuff too (e.g. decrypting your harddrive and unlocking your computer / locking it upon removing). But it can't hold your seed or private keys.
For secure crypto storage -> Hardware wallet For securing accounts with 2 FA -> Security-token (e.g. yubikey)
|
|
|
This is a very stupid move and it might lead to the hacker being caught a lot quicker. A mixer service takes your coins and mix them with other people's coins, but the larger the amount of coins being mixed, the higher the chances that those coins might be mixed by the coins being send. It is rumoured that mixing services are less anonymous with larger amount of coins being mixed. So let's hope this backfires on them and that they dug their own grave by doing this. The companies tracking these coins, might just have received a jackpot from these hackers bombarding a single mixer service with a lot of coins. It also would depend on how long the mixing service held the coins for in order to perform the mix. Some coin mixers may cause a longer delay in order to assure that the coins were successfully mixed well. Not sure ChipMixer's procedure for this (or if they have this built in) ChipMixer does not mix like Kakmakr thinks they do. The procedure is: 1) You deposit BTC 2) You get 'chips' worth your BTC 3) You can split or merge those chips (e.g. split a 0.4BTC chip into 2x 0.2 BTC chips; or merge 2x 0.8BTC chips into one 1.6 BTC chip. 4) You want to withdraw these chips -> You get private keys worth exactly the amount of the chip The UTXO's you get with the private keys have been created before you deposited into chipmixer. Therefore, if you do everything right it gets close to impossible to trace the money back to you. You could wait one month before creating a transaction. This would circumvent any chain analysis. Especially if you do not send the whole amount at once, but only small percentages.
|
|
|
Core definitely is a secure desktop wallet, just as most open-source desktop wallets are.
A strong password prevents access from people having access to your computer or from attackers to stolen wallet files. However, if someone has access to your computer (i.e. either physically or via the internet), he doesn't have to steal your wallet file, but can simply install malware to gain access to your computer. With access to it, he can steal your coins the moment you unlock your wallet file.
Regular malware scans help to prevent mass-malware, but does not really protect you against malware which is not being spread around the internet or which is quite new. Most AV's use fingerprinting and runtime analysis. A properly coded malware unfortunately won't be detected by an AV. An additionally scans only show you that you have been infected in the past. If you have opened your wallet file between getting infected and the time of the scan, your funds are most likely gone. Scans do not prevent your funds from getting stolen.
While this sounds like doom-mongering, it actually is not too much of an issue. Most malware being spread is extremely horrible (e.g. just clipping hijacker instead of RAT). And if you don't download shady stuff (or are running a cracked OS), you are fine.
However, you definitely should not store funds which can not allow to lose on an online computer. For higher amounts, i'd recommend to either 1) get a hardware wallet, 2) use a dedicated offline device or 3) use a paper wallet.
|
|
|
As per modlog information the last report handled on the ban evasion/autoban case was from me.
As long as the user gets banned, i don't care whether my report is being marked good, bad or stays unhandled. Which user has been banned ? I don't see TRexx, neither Smart man being banned in the modlog. I thought perma bans don't even show up in the modlog ? How do you actually report it? Mine was something like this. Ban evasion > [link - where the post or the proof located is - (for easy checking of the mods)] Basically the same way.
|
|
|
There is a maximum Thanks for responding here. I still think it's too high though, I wouldn't have paid that when I joined Bitcointalk, and I'm probably not the only one. But there is nothing wrong with registering without tor and start using it afterwards, is it ? If one is privacy-orientated, he/she doesn't have to use his own IP address. But using a VPN to register the first time or using a public WIFI is definitely an option. And after registering, you can freely connect via tor without having to pay any fee. I don't think honest user would gain anything from reducing the fee. The least people care about their privacy that much that they would only register via tor. Using another private method is possible as well without paying such a high fee.
|
|
|
You completely avoided my question. Are the investors also scam promoters?
Huh ? Investing money is not the same as running around telling everyone how great the project is. So.. if they just invested money, no. If they however created threads in forums and tried to convince others to buy into it, then yes. How are they not supposed to know it was a scam yet a Bitcointalk bounty manager is?
People investing in ICOs are stupid. Wapinter did not just create a bounty, but he promoted their ICO with an ANN. He put his reputation behind this project. He has to be sure of what kind of project he is promoting. As a Legendary you are promoting a money laundering service, isn't that bad enough? Just because Chipmixer isn't a scam it doesn't mean they aren't helping scammers clean their dirty bitcoins.
Excuse me ? A money laundering service ? No. I am promoting a privacy based mixing service. This has nothing to do with money laundering, but with privacy for everybody. Do you know what is helping scammers too ? Medicine. Shall we now stop producing and researching medicine, just because some scammer also get healthy again because of medicine ? That's nonsense. Just because something is abused by a few, you can't just take it away from everybody. "If you promote something, you have to stand behind it."
That's not true at all. Wapinter dissociated himself from Kepler a long time ago. I suggest you read up on the matter before rushing to judgment. Blaming him for what happened makes about as much sense as blaming the investors.
And still i see the ANN is up without any scam warning, not taken down or anything. It still reads "We.." and "Our project..". Doesn't seem like he truly disassociated himself from this scam project. Or what would be the reason to keep the ANN up instead of striking it through and marking it as a scam in a big bold red font ?
|
|
|
It is good to use bookmark, but bookmark does not completely help you to be safe from threats. Eg.tampering attacks on bookmark. Remember site address is the best.
To tamper with the bookmarks you made, someone needs access to your device or browser. And with access to one of them, you are in more trouble than just having your bookmarks changed. Remember the sites and typing them each time can lead to misspelling them. So that's not a perfect solution either. A better solution would be to remember the IP address of the web server, and each time before visiting it you do a DNS lookup to check whether the hostname resolves to that given IP address. Then visit the webserver via the IP address. But if they are using cloudflare, that's not possible. This was obviously overexaggerated. But visiting the site properly is not such a trivial task. Each method has its ups and downs. There is no 'best' solution. There are countless attacks on each way of visiting a website. Some are trivial to detect while others are not. The most important thing is to use your common sense and be careful. Regardless of which method you are using.
|
|
|
Well, i reported one of his posts stating he is evading a ban in the russian local section (against fenyks) on July 31, 2019, before this thread was created. This report got marked bad within a few hours. I don't know whether the russian moderator simply don't think ban evasion is a punishable offense or whether they didn't understand the proof But i honestly don't think you can misunderstand that. At least not it you are moderating a sub as it is supposed to be. I mean.. russian mods understand english, don't they ? The reports against Smart man (2 already) have been submitted July 31, 2019 and August 8, 2019 (1 Meta section, 1 Altcoin section; Those are the only two subs i found posts of him besides the russian local sub). Both are unhandled as of today. Usually my ban evasion reports get handled within a few days. Lets see, maybe there is such a huge backlog of unhandled reports that they indeed didn't have time to look at it yet. But the russian local mod marking my report as bad is still suspicious as hell..
|
|
|
Scammers Profile Link: CEO Giorgi Topuria doesn't have an account here, and Wapinter is not at fault
So, in your opinion it is fine to promote a scam if you don't operate it yourself ? Yes. If you don't know its a scam, then sure. I personally would never touch a project like Keplertek but that didn't stop plenty of investors from getting duped by it. Are they all scam promoters as well? That's a weird point of view. So.. you say i could start some scam promoting service today ? I mean.. i am a legendary, i could probably earn a few bucks by promoting scams. And in the end i claim "well uh.. didn't know its scam, sorry bruh" ? I don't agree with that. I will start a newbie warning flag against Wapinter, whenever i have time to gather all the information together. This is not the first scam ICO he was promoting. If you promote something, you have to stand behind it. If it turns out to be a scam.. you promoted a scam. As easy as that.
|
|
|
a btc wallet with anonymous transactions and open source? is a must try but i will wait for a final version before downloading it...
It does not have anonymous transaction per se, but offers the option to use coinjoin, which results in anonymizing your coins (anonymity set = 100). Most (if not all) open source wallets are work in progress. The latest wasabi version is 1.1.6. I don't know how you define 'final version', but 1.0 is release (no longer beta etc.).
|
|
|
No, definitely not. A good fingerprint sensor is pretty safe. Which means that it is hard to fake your fingerprint. You'd definitely need an imprint of your finger and use some good material to fake it. But all the fingerprint sensors on mobiles are surprisingly easy to cheat on. This applies to any other biometric identification on mobile phones. Mobile phones have to be relatively cheap. You can't use a sensor which would cost 3 times more than the whole mobile costs in the end. Those fingerprint sensors of a mobile are just gimmicks. They aren't very secure at all. time to buy ledger nano That's definitely a good decision. A hardware wallet combines security and usability. It is way more secure than a software wallet.
|
|
|
What you are describing (with your 2 input - 2 output transactions) sounds like a standard transaction.
2 Inputs (from your wallet) -> 1 output (to the recipient) + 1 output (change to your wallet).
Did you send a transaction, or did it happen 'automatically' ? Where did you try to send the TX to ? To another address in your wallet ? Or to another person / wallet ?
|
|
|
|