Bitcoin Forum
July 03, 2024, 12:09:45 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 [137] 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 ... 262 »
2721  Bitcoin / Bitcoin Discussion / Re: How to "name" your public key? on: May 11, 2018, 05:54:12 AM
vanity gen is for when you want to create an address such as 1elect.....

tags is a option on blockchain.info to tag an address. for when some one looks at the adress on blockchain.info
https://blockchain.info/tags
Do you know how to get the private key securely?

What do you mean, "get the private key securely?". Just use a decent wallet on a clean computer (or even better: a hardware wallet), it'll generate your private keys for you in a secure way..

If you want a private keys whose public key hash results in a vanity address (an address starting with, or containing a certain sequence of desirable characters), franky1 already answered your question: vanitygen

https://en.bitcoin.it/wiki/Vanitygen
2722  Bitcoin / Development & Technical Discussion / Re: How easy do you think blockchain can utilized for patient data storage? on: May 09, 2018, 12:59:43 PM
I am 100% of the thought process that you just shared and I am not into any development and/or creating any group.

Being with the experience in the field, My aim is rather to understand how the groups currently working and advertising in this field doing so. Do they really think this is achievable(what is being promised), if so what is the process?

*disclaimer*: the following text reflects my personal beliefs, they talk about my gut feeling, so the following text should in no way be interpreted as an official statement

I personally believe that the altcoin/bounty subforums is filled with scams... Just pump and dumps, quick scams or worthless shitcoins. I guess a maximum of 10% of the announced projects in these subforums have some sort of legitimacy (at least, i belief a maximum of 10% of the announced tokens start with good intentions), and only a very few of those 10% actually result in a project that does what's promised. The other projects are just some get-rich-quick schemes, or just script kiddies trying to clone some coins in order to get famous.

As soon as i see a token/altcoin announcement talking about a serious subject in combination with the word ICO, bounty, campaign,... I just stop reading... It's not worth my time.
These scammers usually just pick a subject, any subject, create a colorfull ANN thread with a mock whitepaper, clone a clonecoin and try to scam the community by releasing an ICO, and try to draw community members into their madness by promising stakes of their scamcoin if they promote the hell out of it.

As far as i'm concerned, i haven't seen any believable project that combines medical data storage with a believable token... But like i said: i have an extremely short attention span when it comes to new altcoins. As soon as something (anything) seems off to me, i just walk away... It's not worth my time.
2723  Bitcoin / Development & Technical Discussion / Re: How easy do you think blockchain can utilized for patient data storage? on: May 09, 2018, 11:59:23 AM

Thanks, This is what i am trying to understand. Is it really so simple to utilize the blockchain in healthcare specially for the patient data. Are there complexities which either are already taken care of or are not yet understood and not even talked about.
Also considering that this data will be global and each country has different regulations, which would be considered?

Hoping to understand this is due course of this discussion and looking forward for some experts in this field to shed lights on how this is being done currently.



Well, like i said: it's a dual answer.
Easy technically: sure, just find a competent dev and he'll be able to create a blockchain in a matter of weeks
Easy legally: nope, not by a longshot... In a lot of developed countries, the medical secret outweighs even some legal affairs.

Just do the exercise without thinking about blockchain technology... Just imagine if you were uploading data onto a medium like facebook, redit, twitter but you only had an account that was able to post data, but doesn't have the authority to edit or delete data...
Which patient data would you be willing to upload? My initial reaction would be: none... Not even with a signed informed consent from the patient, Not even the initials of your patients, Not even the internal database's private keys (which would be utterly useless without a complete data breach of your hospital),...

Being from the EU myself, i can safely say that even within the EU there would be hardly any data you could ever upload without getting into ethical or legal problems. I mean: at the time i was working in the healthcare field, there were a couple of EU countries that had a law that forbid any patient data to leave the country. You could not rent secure data storage in the US and store encrypted backups of your patient data abroad without opening yourself up to a lot of lawsuits.

I think if you're really going to continue with this plan, it might be best to contact an international law firm with experience in the healthcare business in order to assist you... Nobody on this forum (not even the ones like me, with IT healthcare experience) will be able to give you any foolproof advice.
2724  Bitcoin / Development & Technical Discussion / Re: How easy do you think blockchain can utilized for patient data storage? on: May 09, 2018, 07:39:59 AM
I have worked in the healtcare industry myself for about 8 years in the past (i'm currently not working in the healthcare industry anymore), i do think you're touching a very delicate subject.
In the past, there were some really tough laws in place to protect patients data, and recently the laws seems to have gotten a lot tougher.

I remember having to encrypt all data that was being sent to the governement, upload it to a sftp whose keys were exchanged in person, then send the encryption key on a dvd via snail mail, and the password to unlock the key via text message, and the hash of the encrypted data in a signed letter to a different instance... I just wanted to point out that even in the past, the security measures with patient data were rather paranoid

The problem is that a blockchain is a public, immutable, trustless, decentralised ledger. Anything data you include in a block is there to stay.
  • What if the patient changes his mind? There is no way to "erase" his data
  • What if data that is considered harmless at this point in time, becomes something of great intrest/value to for example insurance companies (for example, at this moment in time, you think it might be a good idear to record your pollen alergy into a blockchain, but in 50 years pollen alergies get linked to a specific type of terminal iless and an isurance company decides to double the premiums for everybody having a pollen alergy based on this data
  • I've also heared some companies saying that anonimising the patient's data is the sollution, but what if the key gets leaked? What if one of the hospital's databases gets breached and a hacker is able to link each anonymous key to a real life person?

I'm not saying it's a bad idear, i just think a person who wants to develop such a blockchain should do their homework and think about as many attack vectors as humanly possible before writing a single line of code.
2725  Bitcoin / Bitcoin Discussion / Re: Keep safe your Bitcoin from hacker on: May 08, 2018, 01:55:05 PM
I think that instead of online wallets the offline ones are a lot safer though the process is a long one of getting registered and bejng able to buy and sell your Bitcoins but it's worth it for the added safety ..
The hardware wallets ar just too much for the ones who are holding just a little amount and.. it's only beneficial for the ones who have huge sum to save.
When we talk about security then one should check out wallets with segWit support like samourai ' .

Hmm... You don't need to register an offline wallet. Also, AFAIK, there is no link between extra security and segwit support (correct me if i'm wrong tough).

I think nowadays the best place and proven safest to store bitcoin you have is only in blockchain.com because there it is directly stored in place that use to menyimapn and bitcoin transactions.

I've repeated this soooo many times
blockchain.info and blockchain.com = private company
blockchain = technology for a decentral, trustless, immutable datastore on which bitcoin is built
blockchain.info/.com != the blockchain

blockchain.com/info is just using the blockchain name, they are not the inventors of the blockchain technology. They did not write the whitepaper, they are not the only ones that store the complete blockchain (that's why it's called decentral), they have no power to change anything without consensus, they do not have the power to modify transactions in the chain, they do not support anything but their own apps,...

blockchain.info is an online wallet. Eventough it's one of the safer ONLINE wallets, it's still an online wallet thus inherently unsafer than a truely vetted desktop wallet/hardware wallet/offline wallet/paper wallet.
2726  Bitcoin / Bitcoin Discussion / Re: Keep safe your Bitcoin from hacker on: May 08, 2018, 12:55:54 PM
--snip--
You're right, Hacker is the one of problem in Crypto world. And it's can be happened if we save our money in online wallet. So I offline wallet, hardware wallet, and paper wallet are best option to keep your money safe.

Real hackers (in the classical sense) are only a small part of the problem of online wallets.
It all starts with the fact that when you use an online wallet, you're usually not the only one in controll of your private keys (sometimes you don't even have access to the private keys at all).
You depend completely on the exchange or online wallet to handle all your needs (generating new private keys => public keys => addresses; safely storing those keys; managing your contacts; managing unspent outputs; generating and signing transactions; broadcasting; signing messages;...).

If the online wallet goes bancrupt => best case scenario you're able to restore your wallet somewhere else, worst case scenario you lose everything

If the online wallet doesn't support a certain feature => you're out of luck

If the online wallet has a bug => you'll have to wait untill they fix it

If you have a problem => the online wallet's support team will be the only ones that can help you, so you'll have to wait

If the online wallet turns scam => you lose everything

If the online wallet gets hacked => you lose everything

If you get hacked/infected => you lose everything

If the security scheme or RNG of the online wallet is bad => you lose everything

If you fall for a phising link => you lose everything


If you use at least a half-decent wallet, most of the things above do not apply... You should be the only one in controll of your keys, you should be in controll of the software running on your system, you should be in controll of generating new addresses, signing, managing, broadcasting...
Sure, things can still go wrong if you make mistakes, but at least they were YOUR mistakes, not the online wallets'. And IF things go wrong while you're using a decent wallet, at least the rest of the community *might* be able to help you fix things.
2727  Bitcoin / Bitcoin Discussion / Re: Keep safe your Bitcoin from hacker on: May 08, 2018, 12:38:27 PM
If you want to secure your bitcoin there are two is one ways to keep safe it.
1. Online wallets.
2.1. Hardware wallets.

If you chose  number one you have to take some steps for keep safe your bitcoin.
1. Take a very heard password.
2. Keep your password in a very secure place.
3. Don't save your password in online.
4. Activate two step authentication.
5. Don't share your password to any one.

For your help give some trusted wallet links...
1. https://www.coinbase.com
2. https://www.coinpayments.net
3. https://www.blockchain.com



If you chose number two you have to pay some money for keep safe your bitcoin but i think this is better to keep your bitcoin in a hardware wallet. It is more safe then any online wallets...

For your help i give some trusted hardware wallets link.
1. https://www.shiftcrypto.ch/
2.https://www.ledgerwallet.com/
3.https://opendime.com/
4.https://trezor.io/
5.https://tangem.com/

So now its your choice that how to keep safe your bitcoin now.......😊😊😊😊😊


Your ever😊


Fixed that for you  Smiley
Offcourse, you forgot about airgapped cold wallets and paper wallets... They are as safe as a hardware wallet. Online wallets and exchanges do not belong in the same sentence as the word "safe", unless preceded by the word "not"
2728  Bitcoin / Project Development / Re: Advanced Password Security - WhatPassword on: May 08, 2018, 07:08:45 AM
--snip--
Hello, Mocacinno!

Thanks for your comment, I'll give you more detailed information about the encryption and the site. I believe that everything you said will not cause any problems for WhatPassword.

From your two models I'm using B.

I am using the Laravel framework 5.6 for source code structure and this guarantees me a great security against bugs that I myself could cause by creating the source code. About cryptography I'm using bcrypt that already comes included in the framework. Another security factor that I have not yet created but I have already foreseen is the creation of device to send multiple emails and sms when a person requests your password, however only 1 of these are true and the other fakes. So for the hacker to try to know which one is true, it will cost more time and make it almost impossible to do everything in 1 minute.

The passwords in the database are also destroyed after that time, so it does not matter if he hacks the database, it will only have passwords valid for less than 1 minute.

I hope you have explained it clearly. hug

I'm glad to hear you hash your passwords instead of encrypting them, i really was under the impression you were using encryption instead of hashing...
You'd be supprised how many times i had arguments with developers about this subject, for some strange reason a lot of devs seems to prefer to put plaintext passwords in databases instead of using a proper hashing algos... A lot of them don't think they'll ever be a victim of a hacker attack, or they simply overestimate their own talent, or underestimate an evildoer...

Good luck with your project Smiley
2729  Bitcoin / Project Development / Re: Advanced Password Security - WhatPassword on: May 08, 2018, 05:45:34 AM
--snip--

Hello Friend! The text must have gotten a bit confusing, because it is actually the encrypted password entered in the database and then it will only be decrypted if it has the 5 parts together. Even if a hacker invades the database will not be a risk, because he needs to join the 5 parts in 1 minute and still access the database.

I've been writing web applications for my employer for quite a while... I'm not a good scripter/programmer and defenatly a bad designer, but i do know a thing or two about security... Things i've picked up over the years Smiley

Let's review 2 situations from a malicious person's view:
Situation A: You store your passwords, chopped in 5 pieces and encrypted into a database
  • Would it be imaginable you wrote a single bug somewhere in either your code or your webpages? An attack vector you didn't think about? A misconfiguration of your apache/nginx/lighthttpd? A misconfiguration in your database installation? A weak OS/db password? An unpatched binary? If so, would it be unimaginable that the attacker could find a backdoor or a sql injection point that allowed him to dump your database, thus getting his hands on all 5 encrypted pieces of all passwords stored in your database?
  • If the attacker got his hands on hundreds of chopped up passwords, would it be imaginable that he found the logic in how to decrypt your passwords? I mean, unless you encrypt the pieces using an offline machine, the passphrase or key *would* technically be hardcoded or stored in a database somewhere on an online machine, right? If the password or the logic wasn't stored online, how would you ever encrypt/decrypt the pieces yourself? The same attack vector as the one in step one *could* *potentially* be used to rip your sourcecode to look for the hardcoded password/password logic
  • IF an attacker managed to get past the first 2 hurdles, would it be imaginable he could then execute the first step and apply what he learned in the second step and decrypt NEW passwords in a matter of seconds?
  • Sure, this is a longshot, but if your service ever becomes *the next big thing*, you should be prepared for really smart evil people investing a lot of time into breaking your security model... So why not build it foolproof from the start?

Situation B: You store your passwords, not chopped but stored as a SALTED hash in your database (for example, bcrypt with a high cost)
  • Would it be imaginable you wrote a single bug somewhere in either your code or your webpages? An attack vector you didn't think about? A misconfiguration of your apache/nginx/lighthttpd? A misconfiguration in your database installation? A weak OS/db password? An unpatched binary? If so, would it be unimaginable that the attacker could find a backdoor or a sql injection point that allowed him to dump your database, thus getting his hands on the salted hash?
  • Now here is where things get different: even if he dumps all passwords, he needs to brute force each and every one of those passwords starting from 0. Since you have long passwords, and they got salted during the encryption process, there is simply no way he'll ever be able to brute force a single password within any reasonable timeframe

In situation B it doesn't even matter if your complete sourcecode, password file and database dump ever get leaked... The attacker won't be able to use that information to decrypt the password hashes.
As long as there are no rainbow tables for bcrypt passwords with a length of 23-25 characters are generated, your users will always be safe (hint: i don't think such rainbow tables will exist in our lifetime... It would require bcrypt asics and a corporate SAN to generate and store this data)

And from a programming point of view: what's the difference between comparing two plaintext strings and two hashes? The only extra cost is that you have to hash the user's input twice... Costing you a couple processor cycles and maybe a couple miliseconds... Seems like a fair price to protect your users, doesn't it?
2730  Other / Meta / Re: Poor translation, random word generator or something else? Mod, please review. on: May 07, 2018, 11:31:10 AM
So is there anything we can do to stop it? I've been looking for a thread to post this in, but havent' found any appropriate.

Forget about mod. It does not make sense for me, why the bounty manager is paying the guys LOL
Check his recent post history

You are right! On top of spamming the forum he's getting stakes for it.

Yes, there are things you can do:
1) open a thread in meta (which you already did) => Hope the dude gets banned, or at least red tagged by DT members

2) report his posts to the moderator(s) => hope he doesn't get payed because all his posts get nuked, thus remove the incentive to start all over when his account gets banned

3) contact the bounty manager of the campaign he's spamming for => hope he doesn't get payed, thus remove the incentive to start all over when his account gets banned.

As a matter of fact: if you contact the bounty manager and you receive no answer, it might be a good idear to update this topic with this information, maybe somebody on DT would be willing to red tag the bounty manager untill he complies in removing shitposters like this one...

BTW: my eyes actually hurt after trying to read his gibberish... WTF
2731  Local / Nederlands (Dutch) / Re: bitpay card on: May 07, 2018, 11:28:01 AM
Iemand deze gebruikt om zijn bitcoins uit te geven ? Ervaringen ?

Voorlopig is het afgelopen met Bitcoin debit karten en zie ik ook zo snel weer terug komen.


How come ?

Ik ben zelf geen bitcoin debit card gebruiker, maar heb wel langs de kantlijn gevolgd wat er gebeurde...
Blijkbaar is er een bedrijf, "WaveCrest" genaamd dat VISA kaarten mocht verdelen. Bijna alle exchanges die debit cards uitdeelden maakten gebruik van de diensten van "WaveCrest" (maw: de exchange had geen licentie van VISA, de kaarten die zij verdeelden werden dus eigenlijk door WaveCrest uitgegeven in hun naam).
Ergens begin 2018 heeft WaveCrest zijn licentie bij VISA verloren, dus werden van de ene dag op de andere bijna alle bitcoin debit cards waardeloos.
2732  Bitcoin / Project Development / Re: Advanced Password Security - WhatPassword on: May 07, 2018, 11:08:44 AM
--snip--
All passwords are sent or displayed to the user before going to the database and when it is saved in the database is already encrypted, this will not cause problems if the server is invaded.
--snip--

Could you elaborate on the quoted text? Do i understand it correctly if i presume the passwords go into an encrypted database, but they're stored in plain text in this database?
If so, this is a huge security risk, even if your database is encrypted... I'd rather use a system with an unencrypted database that stores a salted hash of my password than using a system with an encrypted database that stores my password in plain text...
2733  Bitcoin / Bitcoin Technical Support / Re: How to simulate a transaction between two bitcoin addresses? on: May 07, 2018, 08:15:58 AM
Why don't you just buy or earn a small amount of bitcoin for yourself? Also it is possible, if you run your client on testnet.
Which wallet are you using for the payments? I can tell you how to activate the testnet and how to get free coin to test it out with.

Testnet would also be my first choice. Another option would be to setup a node in regtest mode:
https://bitcoin.org/en/glossary/regression-test-mode
2734  Bitcoin / Development & Technical Discussion / Re: Bitcoin Block time on: May 04, 2018, 08:36:16 AM
Ok, but when there are "waves" of hash rate in the two weeks, the coin can not adapt.

Depending on BTC.com the difficulty will rise about 3 % in 6 days, but as I said at the moment 5 to 6 Blocks in 2 hours....

The network behaves as it was initially designed. Every 2016 blocks there is a retarget, the difficulty gets adjusted upwards or downwards so the AVERAGE time between two blocks is ~10 minutes.
You are correct tough, if the networks hashrate would drop to 50% in the first 10 minutes after a retarget, it would take about 4 weeks untill the next retarget, at which point the time between two blocks would once again be ~10 minutes. This is still "working as designed" tough, theoretically, there is no problem... Sure, blocks would probably be completely full for the next 4 weeks, a fee war could start, it would take a longer time to get a confirmation,.... But everything would sort itself out, without technical problems.

The fact that at this moment, the time between the last 6 blocks was ~20 minutes (i didn't verify this): no problem, it's completely possible... That's why the difficulty is adjusted so the AVERAGE time between two blocks is ~10minutes, and that's also why we don't retarget every 10 or 20 blocks (if we would retarget to often, the difficulty would jump up and down quite a bit, since the number of samples would be to low).

Solving a block requires the miners to increment a nonce in the block header, then create a sha256d hash of this new header and check if the result in under the current target. It's possible that after a miner receives a new block and start working on the next block, he finds a header whose sha256d hash is under the target in less than a second, it's also possible he'll never find a valid block...
2735  Bitcoin / Development & Technical Discussion / Re: Balances for accounts at a specific block on: May 03, 2018, 12:41:17 PM
Thanks for the advice. You guys have pointed me in the right redirection.

Are there any stats anywhere on how many addresses without zero balances are in existence?

I've generated a list of all funded addresses for somebody on this forum a while ago... I used this script: https://github.com/cryptah/utxo-dump

IIRC, at that time, there were ~40.000.000 unspent outputs in the UTXO set, don't remember how many addresses were funded (multiple unspent outputs can fund the same address).
I can only estimate this number to have grown since then (about a month ago iirc)
2736  Bitcoin / Development & Technical Discussion / Re: Balances for accounts at a specific block on: May 03, 2018, 12:19:53 PM
Or, even easier...

Start at the beginning aggregating balances. As you encounter each new block, record the block height and current balances in a database.  Then when you want to know any historical balance, your can just query your database for the block height in question.  Meanwhile, your node can continue to remain synchronized and can continue to update your database as new blocks are received.

Wouldn't that require a huge database?
I think it wouldn't be practical to save all balances for all addresses that ever existed at each blockheight, but you could probably save balance of each address whose balance was changed by a transaction in a block at each height... That way you should be able to query the value of the sum of the unspent outputs funding address x at height y where the blockheight = the max blockheight for an entry for address x.

Something like this
Code:
CREATE TABLE balances (
    id int NOT NULL AUTO_INCREMENT,
    address varchar(45),
    balance_at_height int(15),
    height int(10)
    PRIMARY KEY (id)
);

For example, if my address was funded for the very first time at height 40000, then was funded for a second time at 401000 and i spent both outputs at 402000, only 3 inserts would be needed for my total history...

Code:
insert into (address, balace_at_height, height) values ("1MocACiWLM8bYn8pCrYjy6uHq4U3CkxLaa", 100000, 400000);
insert into (address, balace_at_height, height) values ("1MocACiWLM8bYn8pCrYjy6uHq4U3CkxLaa", 200000, 401000);
insert into (address, balace_at_height, height) values ("1MocACiWLM8bYn8pCrYjy6uHq4U3CkxLaa", 0, 402000);

Each new block you'd have to parse 1500? transactions, so if you'd only have to save the balances of addresses whose balance changed at each blockheight, you'd have to insert at least ~1500 changes/block * ~144 blocks/day = 216000 changes each day... That seems doable
2737  Bitcoin / Development & Technical Discussion / Re: Balances for accounts at a specific block on: May 03, 2018, 10:53:37 AM
That makes sense.

If it is always aggregated, how are balance lookups so fast?

Because when you install a node, it syncs the complete blockchain. During this syncing, the blocks are parsed and verified, and a node builds the UTXO set while syncing (it aggregates from block #1 up untill the current height). This syncing process takes hours, sometimes even days (depending on your node's version, the IO capacity, the memory speed, the cpu,...). After the initial sync, the UTXO set up untill a certain height is built, so as long as you keep your node running 24/7, or at least start it a couple times a week, it can keep up with all the new blocks pretty fast, your node just parses a new block when it receives it, and adapts its utxo set accordingly.

So, when you use a full client, your PC/server already did all these aggregations in the past, so you can now see your balance instantly. If you use an SPV client (like electrum, or most of the hardware wallets), this SPV client is connected to a full node, this node built the UTXO set in the past when it was syncing, so it can also reply instantly when an SPV client querys the unspent outputs funding a certain address.
2738  Other / Beginners & Help / Re: Blockchain Hash is it possible to repeat it again on other Block? on: May 03, 2018, 08:30:02 AM
While the odds of a collision are extremely low, they rise with an increasing difficulty. And since the number of blocks is unbounded, the probability of a collision occurring approaches 100%.

Sure, given an infinite timeframe, the odds become 100%, but still, the block would get rejected, so it's just the miner who mined the block with the colliding hash loses the block reward + fees for that block, and that's about all that'll happen.

In our lifetime, i doubt we'll ever see such a collision happening... My math is not good enough to calculate the exact odds tough, but it would be an extremely small number...
2739  Bitcoin / Development & Technical Discussion / Re: Balances for accounts at a specific block on: May 03, 2018, 08:21:25 AM
Its possible to migrate a copy of the main ledger to a testnet and then reverse the data to a certain block for knowing what account balances were at that specific block?

Or would it be better to aggregate from the genesis block to the required block?

You always aggregate from the genesis block to the required block... The latest block does not specify all unspent outputs (which you can use to calculate the total value funding each of your addresses). Basically, a block contains a bunch of transactions. Each transaction just tells you which unspent output(s) from the UTXO set are used, and which new (unspent) outputs are generated. Offcourse, there is also some other data in a block (like the signature , the block header).

In order to generate the UTXO set (the set of unspent outputs that you can use to calculate your balance), you start from the genesis block and follow each unspent output. As soon as a transaction uses an unspent output from your current utxo set, it must be removed from the utxo set, and the output of the transaction will be added to the utxo set... The coinbase transaction also generates a new unspent output. If you do this upto height x, you automatically know all unspent outputs at height x, so you can use them to calculate the balances.
2740  Bitcoin / Development & Technical Discussion / Re: Wallet address's account needed? To manage users. on: May 03, 2018, 08:03:39 AM
~snip~

Account in bitcoin daemon is more like a lable string, address is enough to send and receive coins. But if you want to set a new account for each user for management purpose, you can do that using bitcoind's rpc, refer to getaccountaddress api.

Code:
getaccountaddress

Returns the current bitcoin address for receiving payments to this account. If <account> does not exist, it will be created along with an associated new address that will be returned.

I never used the accounts functionality of bitcoin core, but didn't i read somewhere it's deprecated?
But you are correct tough, the only thing the OP needs is a new, unique address per user (or a set of addresses). I'd say it might be a good idear to keep the account management in a seperate database (create a small relational db and keep track of which user "owns" which addresses, do make sure you keep track of change addresses when he spends his unspent outputs!!!)
Pages: « 1 ... 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 [137] 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 ... 262 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!