Hi, I would like to know if it is the latest version.
Bitcoin Core 0.14.2 is the latest version of Bitcoin Core. I need download the last versión the official wallet.
There is no such thing as "the official wallet" of Bitcoin. No wallet is "the official wallet".
|
|
|
CppBlockUtils.py does not appear to exist in the source distribution....
That's a file that is generated by SWIG when you compile the C++ code.
|
|
|
No such ads have been added to Bitcointalk. You probably have adware on your computer. You should run a malware scan and make sure that you don't have any malware on your computer.
|
|
|
Please, make it a bit more explicit. Does it mean I should shut down my miners? Or just try to avoid any send /receive transaction from / to my wallet? And what about activities on altcoins - btc Exchanges?
You should try to not make any transactions around August 1st. That means both make and receive as you can easily be tricked into thinking you have money when you don't or your transactions may not be confirmed when you think it has been. If you have miners, then read up on what all of the proposals are and point your hashrate towards a pool that mines the proposal that you support.
|
|
|
so it couldn't be the platform? upgrading the client or trying it on another comp wouldn't work?
The platform doesn't matter. The Armory version might make a difference, but none of the wallet code as been changed in any of the latest versions. the thing they are clearly marked .dat files for wallets for armory..
Armory doesn't use .dat files. If you are seeing .dat files that are supposedly for armory, those aren't Armory files. if anyone can please help we can sign some agreement saying ill a % of the wallet. They don't seem all the way corrupted can someone please help.
How would you know they aren't corrupted? Do you happen to know the Armory binary file format? Armory uses a binary file format that you wouldn't know whether it was corrupted unless you examine it byte by byte. Have you tried the Armory wallet recovery tool? It's in the software itself. That's for wallet.dat files which are for Bitcoin Core only, not Armory.
|
|
|
Yeah, I just heard it helps, I wouldn't expect it to be definitive.
I did a little digging on google but didn't find much on how it creates it's "ban score". Do you know? I'm assuming it just rates the quality of information it receives from another node, time stamp, attempted double spends etc?
The banscore is incremented for each piece of data that is received that an honest node wouldn't be sending. For example, receiving an invalid block from a node increments the banscore by 100, resulting in an instant disconnect and ban for that node for 24 hours. There are a variety of other things that can increase the ban score and its all littered throughout the message processing and validation code.
|
|
|
I'm trying to import them but it says it is corrupted or something at startup then when i try to manually import digital copy it won't let me hit continue or go on, for all copies that i saved from recuva.
can developers plz help me? I know there is a way to get my root key from that wallet.
If your wallet files are corrupted and you don't have any backups, there is nothing that anyone can do. Try using Armory's recover wallet tool and see if it can recover anything. edit: i'm sure these are not watch only cause it doesn't say when i opened used notepad..
The wallet files are not text files, and actually contain basically zero readable text except for descriptions and labels. You won't get any information out of the files by opening them in a text editor.
|
|
|
banscore=<n> Threshold for disconnecting misbehaving peers (default: 100) bantime=<n> Number of seconds to keep misbehaving peers from reconnecting (default: 86400)
which can be adde to the /home/username/.bitcoin/bitcoin.conf
I've heard it helps prevent DDOS, I'm no expert, but now I'm curious as to how effective it is. Just thought it was worth a mention as you had security as an issue in your first post.
The banning system in Bitcoin Core is supposed to help prevent DoS attacks, not just DDoS specifically. It does work, but it really is only used for disconnecting and temporarily banning nodes that are misbehaving and sending mangled data, not necessarily attacking you. If you were under a DoS or DDoS attack, the ban system may not be all that effective although it may help a bit.
|
|
|
Hmm, this is quite interesting, then what happens to your Bitcoins after a long period of time? Will your Bitcoins be 'locked' until the transaction is confirmed or you can choose to resend your Bitcoins? This is something that I'm still quite unsure too, as I have never used low fees. Always thought that transactions would be cancelled and refunded if fees are too low. Some wallets will choose to forget that a transaction happened or allow you to respend the coins after a certain amount of time or after you tell it to do so. This allows you to create another transaction which spends those coins, but that does not necessarily mean that the second transaction will be confirmed or will be the one that confirms. If nodes still remember your first transaction, then the second one will be rejected as a double spend, because that's what it is. The first transaction can still confirm too. Once one of the two transactions confirms, the other one instantly becomes invalid and will be dropped by all nodes on the network. If your wallet does not support such features, then it may seem like your coins are "locked" or "lost" or unspendable, but they actually aren't. It just means that your wallet does not provide enough advanced functionality for you to make these double spends (and rightfully so). There is nothing in the network rules that prevent you from creating multiple double spends, just that only one of those double spending transaction will confirm.
|
|
|
the transaction was cancelled so the bitcoin was returned to my original wallet.
Contrary to popular belief, transactions are not actually canceled. There is no mechanism which can "cancel" a transaction and make it no longer "active". What happens is that your wallet chose to forget about the transaction after a while. However that does not necessarily mean that other people's nodes did too or that they don't have a copy of your transaction. If someone has a copy of it and decides to rebroadcast the transaction, then the transaction will be on the network again and can still confirm. Even if it isn't rebroadcast, it can still be confirmed. All paying a low transaction fee will do is make your transaction take longer to confirm. Once the transaction has been broadcast, the transaction has potential to be confirmed regardless of how many nodes have "forgotten" it. All it takes is one person to rebroadcast your transaction and the whole network will "remember" it again.
|
|
|
Very strange.... The last transaction on your link is a send to: 1EExPs6ykuk7hfHbQZfpdf39cqMuC5LuWL @ 4.4999 BTC on 23rd Jan 2014. There is no record of this in my wallet transactions:
Yes there is, the transaction that you highlighted is that transaction. 1EE... is a change address of yours; the other output in that transaction corresponds to who you actually sent the Bitcoin to as indicated by the transaction list.
Did pywallet work? Your private keys will be 51 or 52 characters long and begin with a 5, K, or L. If you see any strings like that, then you have private keys which you can try to import into another wallet.
|
|
|
wait even if the digital backup was watch-only if i have the encryption PW i still have access to private keys right??
No, you don't. A watch-only wallet means that there are no private keys whatsoever in that wallet. Your password is useless here as no private keys are generated from your password. Your password is only used to encrypt the private keys, not anything else with them.
Do any of these three files exist: C:\Users\Admin\AppData\Roaming\Armory\armory_26BzNYf9H_.wallet, C:\Users\Admin\AppData\Roaming\Armory\armory_2gJKi3aoH_.wallet, C:\Users\Admin\AppData\Roaming\Armory\armory_2AYDvuXW7_.wallet? If they do, are you able to import them? If you can, what do you see when you do import them?
Sidenote: please stop spamming other threads about your issue. You already have this thread for it and people are helping you. By constantly asking for help in other threads you are breaking the forum rules.
|
|
|
Sure, It was not contentious, Given the Bips 70-73 luv2drnkbr provided. I was wrong.
BIPs 70-72 didn't exist until July 2013, and BIP 73 did not exist until August 2013. The thread I linked to was from 2011, and IP transactions were actually being removed before then. The removal of IP transactions was completely non-contentious even without the existence of BIP 70 or anything like it.
|
|
|
Armory 0.93.3 won't work with Bitcoin Core 0.13.1+ after segwit activates. However if you use an older version, the older versions of Armory should work fine after segwit. You just won't be able to use any of the functionality provided by segwit.
|
|
|
However, this explanation is useful but not sufficient. So it was a contentious removal. But now that no one vocally wanted this feature in the past years, it looks like that we can safely remove it. Maybe we will add it after decades. Just keep it in mind.
What makes you think it was a contentious change? Here's the thread discussing this change: https://bitcointalk.org/index.php?topic=9334.0. It is very non-contentious. Pretty much everyone agrees with the removal.
|
|
|
First of all, this is not "Core's decision". Bech32 was not created by "Core" and has not yet been adopted and implemented by the other developers of Core. It is the proposal of a few people who work on Core but they are not and do not represent Core. This is all explained in the BIP here: https://github.com/bitcoin/bips/blob/master/bip-0173.mediawiki#rationaleWhy use 'bc' as human-readable part and not 'btc'? 'bc' is shorter.
|
|
|
So as long as you keep your Master Public Key safe there is a very low chance of someone finding your Master Private Key even if they manage to use a Quantum computer and crack 1 private key from a public key that was used in a previous transaction in the same wallet?
Yes. If someone has a quantum computer that can get private keys from public keys, then if that person gets just your Master Public Key, you're screwed anyways as they can then get your Master Private Key.
|
|
|
I did not know that.
Because when I exported my private keys in Electrum there is a warning "EXPOSING A SINGLE PRIVATE KEY CAN COMPROMISE YOUR ENTIRE WALLET!"
So if 1 Private Key is exposed AND one's computer gets hacked which has only the watching address, they can get the Master Public key from there and calculate the rest of the private keys in the wallet using those 2 variables?
Yes. This only applies to non-hardened derivation, which is what most wallets use (including Electrum) as that is what allows for watching only wallets. Hardened derivation prevents this but also means that you can't have a watching-only wallet as easily (it requires going back to the offline machine to generate a bunch more addresses instead of generating from the master public key).
|
|
|
|