Bitcoin Forum
May 24, 2024, 07:23:57 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 [135] 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 ... 233 »
2681  Bitcoin / Armory / Re: armoryd not broadcasting transactions on: May 26, 2016, 06:01:53 PM
Also, please double check these wallets on the GUI version.
2682  Bitcoin / Armory / Re: armoryd not broadcasting transactions on: May 26, 2016, 04:37:51 PM
Are you spending without change?
2683  Bitcoin / Armory / Re: armoryd not broadcasting transactions on: May 25, 2016, 10:20:18 PM
I haven't tested this broadcasting code directly but it looks valid. You should figure out if the tx is valid at first. I suggest you look at your bitcoin node debug log to identify the error message attached with this tx. Once you have figured if the it's the tx that is off or the broadcasting code, we can figure out the next step.

2684  Bitcoin / Armory / Re: Armory 0.94.1 is out on: May 24, 2016, 10:15:45 AM
Armory's key points of differentiation are privacy and security of cold offline signing +/- multisig lockboxes.

If you're not using an air-gapped cold offline signing process with Armory (especially if running windows), then you're no more secure than just using a phone wallet.

And he still hasn't provided that level of details. Are the wallets offline or online? How long are the passwords, do they contain easily identifiable tokens? Does he use the password same for each wallet? Has he manipulated his wallets within the week leading to the event and how? What about month? Has he changed encryption on his wallet recently? Does he has cloud storage backups? What password do they use? Does he know of the addresses that received the coins? Has he scanned his online machine for infection? Any logs we can look at?

I've spent enough time on this. Short of some new significant evidence, this is in the hands of the community.
2685  Bitcoin / Armory / Re: Armory 0.94.1 is out on: May 23, 2016, 10:55:34 PM
There is some brief window in time that allows this to be read from bitcoind after unlocked?

What has bitcoind to do with this? Have you imported your private keys into a Core wallet before this event? Armory wallets are entirely separate from the underlying node. Armory never communicates private nor public keys to the Bitcoin node, nor does it need to.
2686  Bitcoin / Armory / Re: Armory 0.94.1 is out on: May 23, 2016, 09:13:50 PM
Whatever it was appeared to push all my coins to this wallet:

18mhcZ4tdD2GQquSrMda5TPzgRodAEfYeF


I am hoping it's a bug.. I just spent money and time to lose money.. $2000 is alot of money for me.

This is 1/3rd of the story at best.

We are talking about 5BTC, split in 2 wallets, ~2.9 BTC in wallet A, ~2.1 BTC in wallet B.

On May 6th, 3 transactions in block #410492 moved coins from wallets A and B to address 18mhcZ4tdD2GQquSrMda5TPzgRodAEfYeF:

- tx 1&2 move all coins from wallet A. All coins in this wallet were split between 2 addresses. The spending tx each sweep one of these addresses.
- tx 3 moves all coins out of out of 1 address from wallet B, about 0.28 BTC.

In all cases, there was no change and all outputs were spent regardless of how small they were (a few were >0.02 BTC). This pattern is indicative of a private key sweep.

However, all transactions came with small fees. All fees were >0.002BTC. Considering one of these tx spends 10 utxos and another one 7, we're far below the proper fee/kB for quick confirmation. The fact that all 3 tx were confirmed within the same block with such low fees is possibly an indicator that they sat in the mempool for some time.

This to me doesn't characterize theft, rather deliberate private key sweeping. You would expect a thief targeting your private keys would be sophisticated enough to pay a 0.01 total fee on 3 tx stealing some 3 BTC just to get included in the next block.

This accounts for ~3.2 BTC. If the story ended there, and you claimed 3.2 BTC were stolen, then you would have more evidence supporting your claim than otherwise. The fee analysis alone is not strong enough on its own refute theft. However, you are claiming 5 BTC are missing, and the last ~2 BTC leave your wallet in a different fashion.

---------------

About half a day later, in block #410581, 6 transactions move coins from wallet B.

- 5 tx spend to address 1CDyeeCHcReYhfaeTb37Piwq8ZWqLtHU5o
- 1 tx spends to address 12DaNV3b6iSobe5uMwBELYdMkoLJ1V4eto
- 4 out of 6 addresses return change
- As a result of change, wallet B currently has a balance, albeit rather small. Nonetheless, this balance remains larger than some of the smaller utxos that were redeemed among all these transactions.
- The fee/kB density of these 6 transactions is over 2~3 times superior (guesstimate) that that of the first 3 transactions.

---------------

It is also notable that prior to these 9 transactions, you only spent coins once, from wallet B, in November 2015. This implies, in case you use online wallets, that you rarely if ever typed in your password to decrypt your private keys. The point is moot if your wallets are offline. On the other hand, there is not much to discuss if your wallets are online and unencrypted.

This observation narrows down the possible attack vectors. Since you didn't spend any coins for months prior to the event, this couldn't have been an attack on the recipient address (swapping a payment address for the attacker's), nor an adversary process trying to steal your password/encryption key or decrypted private keys in RAM. This also rules out RNG snafu.

Again this point is moot if you toyed around with your password a few hours before the coins moved. This comment in particular and this post in general should be a reminder that you need to provide as much details as possible if you hope to find out what happened to your coins. Your wallets only speak that much.

The only credible attack vector that remains is that someone has access to your encrypted wallets (physical access to your computer, cloud storage backup, infected machine, etc...) and your passwords (possibly brute forced if they are weak, again need more details here). However, this would contradict the sweeping pattern: why sweep private keys if you crack a wallet? Just spend it all in one go.

Still this doesn't explain why the attacker would sweep all keys from one wallet and only ~15% from the other, nor his spending pattern (you'd expect 1:1 spend address to wallet address, or a single address for all wallets), nor why he deemed useful to return change, nor why he paid low fees to steal >60% of your coins and much higher fees for the remainder, and lastly why he did it 12h apart.

2687  Bitcoin / Armory / Re: Armory 0.94.1 is out on: May 23, 2016, 07:41:05 PM
There is a set of transactions moving coins from your wallets but again the pattern does not reflect theft, rather deliberate spending. It would make little sense for a thief to steal your coins the way this was done. Without further investigations, I cannot qualify this spending pattern as theft.

To confirm or infirm this case, you would need to present more information and/or enlist the community into helping with the investigation. You would would have to at least divulge the addresses involved, your spending habits, and whether you know the recipient addresses.

I cannot assert if this is theft with what information I have, and so far I remain skeptical.
2688  Bitcoin / Armory / Re: Armory offline bundles on: May 23, 2016, 09:47:11 AM
https://github.com/goatpig/BitcoinArmory/releases/tag/v0.93.3
2689  Bitcoin / Armory / Re: Armory 0.94.1 is out on: May 22, 2016, 11:22:22 AM
Ok, hope it's going OK. Looking forward to new version. Thanks

Your wallets helped me identify and fix 2 GUI bugs, but nothing in there indicates the balances are off.

Most of the wallets funds were moved in some 15 transactions, all spending coins to a same address. Half of them had change, and the pattern does not suggest someone stealing coins or trying to sweep the wallet, rather deliberate, incremental spending. I invite you to look into that, notably that one recipient address.
2690  Bitcoin / Armory / Re: Bad signature for *.deb files in bitcoinarmory.com on: May 20, 2016, 06:13:19 PM
https://github.com/goatpig/BitcoinArmory/tree/master/PublicKeys

You can find my key here.
2691  Bitcoin / Armory / Re: Bad signature for *.deb files in bitcoinarmory.com on: May 20, 2016, 04:27:13 PM
Armory uses the same package verification process as Bitcoin Core:

1) Check the sig on sha256sum file vs my public key (https://github.com/goatpig/BitcoinArmory/releases/download/v0.94.1/sha256sum.asc.txt)

2) Hash the package you want to check, verify the hash and file name match what's in the signed sha256sum file
2692  Bitcoin / Armory / Re: Armory 0.94.1 is out on: May 18, 2016, 09:58:43 PM
So even if I don't use --dbdir to choose an alternate db folder Armory 0.94.1 will not use the old directory, e.g.: "databases"?

It will use the default folder lacking any specific CLI arg, i.e ~/.armory/databases

Quote
One question about key-stretching: which algorithm are you using? ROMix? Scrypt?

ROMix I believe.
2693  Bitcoin / Armory / Re: [HELP] Unable to get the private keys from a paper wallet on: May 18, 2016, 06:32:33 PM
when i import the paper backup, i can't see the public keys, neither the private keys. i tried to backup the wallet, but i can't find anything in order to export the private keys.
Is it normal ? How can i recover my bitcoins ?

Click the receive bitcoin button to reveal addresses once it has been scanned. Also, pick expert mode to see the backup option for printing out private keys.

You shouldn't export private keys though, you should spend from the wallet or just sweep it entirely.
2694  Bitcoin / Armory / Re: [HELP] Offline transaction issue on: May 18, 2016, 01:01:55 PM
Restore from your paper backup. WO wallets do not carry private keys.
2695  Bitcoin / Armory / Re: Armory 0.94.1 is out on: May 18, 2016, 10:12:43 AM
working on just the Armory DB
2696  Bitcoin / Armory / Re: Armory 0.94.1 is out on: May 17, 2016, 11:48:31 PM
No I meant picking Rebuild & Rescan in Armory's Help menu...
2697  Bitcoin / Armory / Re: Armory 0.94.1 is out on: May 17, 2016, 11:13:08 PM
Do a rebuild & rescan
2698  Bitcoin / Armory / Re: Armory 0.94.1 is out on: May 17, 2016, 08:45:20 PM
Looks like it happens under certain (yet to be determined) conditions when the sender address is used as the change address. Will let you know when I figure out the bug and fix it.
2699  Bitcoin / Armory / Re: [HELP] Offline transaction issue on: May 17, 2016, 01:53:37 PM
In fact, in my PC coldstorage i've restored wallet from my backup (one with extension .watchonly and another with .watchonly_backup.wallet...) but i see this offline in my armory online (see image http://postimg.org/image/xaq43hjyp/)

Restoring from a WO backup is what got you in this situation to begin with. WO wallets do not carry private keys. You need private keys to spend coins.

Quote
I've my paper backup, can I restore my wallet?

Yes, you should have done that to begin with.

2700  Bitcoin / Armory / Re: [HELP] Offline transaction issue on: May 17, 2016, 01:30:20 PM
Somehow you turned your wallet into a watching only copy, which you can't spend from. Find your backup and restore from that.
Pages: « 1 ... 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 [135] 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 ... 233 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!