Try to ask the buyer if the power source is 110v? Or if he has 220v? You can only run this unit on 220v lower than that the miner will not run properly.
If not try to ask him to replug cables and the metal parts of PSU. There might be some shorted parts due to a loose heatsink. Thermal adhesive is the solution for loose heatsinks.
|
|
|
I think it should work if you generated an unsigned transaction from a watch-only wallet's latest version it will generate a PSBT file you can then import it to your electrum 3.8.8 and be able to sign it. And transfer it back to a new Electrum wallet to broadcast.
I don't heard yet that it didn't work but if it didn't work you can able to use coinb.in to generate an unsigned transaction and sign it with your old Electrum wallet.
|
|
|
It seems that blockchain wallets remove the forgot password option from their recovery page so there is no way to get the password through their site. Even installing or hosting the blockchain.info wallet on your PC seems it won't work as the other people said from here https://github.com/blockchain/service-my-wallet-v3/issues/320Do you have the wallet.aes.json file? It seems brute-forcing this file is the only one you can do to recover your password and decrypt this file.
|
|
|
Are you trying to recover something with this payload? Is that payload comes from wallet.aes.json from the old blockchain.info that thing is encrypted. However, you can able to decrypt it through brute-force usually they use BTCrecover tool to decrypt this wallet. If this is your wallet why not recover your wallet through Email or walletID?
|
|
|
You seem a marketer to me after reading this thread. must be promoting the same thing
He might be an alt account of this dongqudalaoli who promoting Canaan's official website that includes a fake telegram link. Canaan never use telegram to contact their customers. So there is a big possibility that this man is one person trying to promote something or the telegram link. I believe sooner or later if this thread is already buried in a few pages in this section he will edit his post and add the telegram link just like other users who try to manipulate the forum(Blackhat strategy).
|
|
|
using tool will be slow
i think if there is a script who will brute the middle words... and at same time check the last word generated if word== word then brute ok
Does it seem you didn't click the link provided by BlackHatCoiner? The FinderOuter is what you need just ask your friend if he knows his BTC address with balance. If you don't know how to click the link then this is the direct link https://github.com/Coding-Enthusiast/FinderOuter then read the quick guide. And what are you talking about "using tool will be slow"? Do you mean that the FinderOuter tool is slow? It seems this tool currently does not support GPU so the speed depends on your Ram and CPU.
|
|
|
I think no one will take this risk such huge money from the unknown users? Why don't you just go directly buy BTC with Binance P2P or local exchange here https://coins.ph/buy-bitcoin/Or you can buy BTC through Bitcoin ATMs limits depending on you if you can provide documents to increase the buy limit up to 1m PHP. Use this link below to scan your location to find ATMs near you - https://coinatmradar.com/bitcoin-atm-near-me/
|
|
|
I don't get it what text are you talking about that changed?
The image doesn't show anything it looks the same unless you talking about the bolded parts like your username?
You can simply zoom in and out on that page if you want to make your fonts look big or small. You can also use CTRL+scroll Wheel down or up to zoom in and out.
|
|
|
Next time if you don't know how to speak English I suggest you use a Google translator so that we can understand a bit what are you talking about. I'm a bit confused it seems that you have 3 missing words the first, middle, and the last word, or does your friend only have 2 words the first and the last word?
Anyway, I think all you need is already posted above.
What I would you to do before you use those tools above after downloading them make sure to run them offline or run them on an Airgapped PC for safety purposes.
|
|
|
That's because "sha256sum.txt.asc" isn't the signature for the binaries. It already contains both the signature of the message and the SHA256sum of each binaries (as signed message).
You verify the signed hash file via gpg --verify sha256sum.txt.asc to see if it's legit. After passing verification, open it using your notepad or text editor, then compare the SHA256sum of the binaries to the listed SHA256 hashes.
That's the only thing that works for me the result is below. C:\Users\Admin\Downloads\Programs\New folder>gpg --verify sha256sum.txt.asc gpg: Signature made 24/12/2018 4:16:07 pm Malay Peninsula Standard Time gpg: using RSA key 8C5211764922589A gpg: Good signature from "goatpig (Offline signing key for Armory releases) <moothecowlord@gmail.com>" [unknown] gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. Primary key fingerprint: 745D 707F BA53 968B DF63 AA8D 8C52 1176 4922 589A gpg: WARNING: not a detached signature; file 'sha256sum.txt' was NOT verified! I just trying to include the installer when verifying but it didn't work except on verifying only the sha256sum.txt.asc So to make sure it's genuine I manually created the checksums with GpgEX and check the hash inside with the notepad and compared it to sha256sum.txt.asc the hash are the same so it's guinuine as I said on my previous suggestion above.
|
|
|
Thanks OP for sharing your story. Mine is similar but unfortunately I found out too late and I lost much more than you from CBOT. It appears that different scam team members use different URLs which point to the same web app. In my case, it is https//suspcious-link.com.
~snip~
I suggest you better don't help them to get a link(backlink) here because that way you are helping them to promote the website you just simply remove this below so that it won't link here. ~snip~
Same to you don't quote the post that includes the scam website because there is a big help in that website to boost in rankings if you have knowledge about SEO you shouldn't help them to get a link(Backlink) here. If they have a link here on the forum they can easily rank up on the SERP(Google) and more people will be a victim of their scheme.
|
|
|
I installed Electrum 4.2.2 on this Windows 8.1 system via the Windows installer EXE and it runs without any hiccup. My Windows 8.1 has been in use for quite some time, has seen some programs and gets the monthly security updates (optional ones only if it's about something I need).
How did you make it work? What kind of windows 8.1 is in your system isn't that the pro version or the enterprise version? The OP might be experiencing issues with the 8.1 before due to the firewall blocking or the system itself have missing system files that Electrum needs? How about the Electrum 4.2.1? Is this version also work on your PC?
|
|
|
If your wallet before was created on that device and you remember that you save the seed phrase before you can recover it but if you forgot it then you can try to check the Electrum wallet data from your PC. You can simply check this folder %appdata%\Electrum then go to the wallet folder you should see something like "default_wallet" "wallet_1" or any name of the wallet you can restore and check those files by opening these files. To restore these wallet files you can simply open it or simply use the shortcut button "CTRL+O" check the image below ![](https://ip.bitcointalk.org/?u=https%3A%2F%2Fi.imgur.com%2Fa87qBm4.png&t=663&c=csbInCigzmGVfw) And let's hope that one of the wallet files is your wallet.
|
|
|
Well, thing is that I didn't want to expose the priv key to the internet. I create these addresses in offline nodes so that the priv keys never "sees" the internet! If I don't have another way, I'll do that, and then, I will create a fresh new address in my offline node and transfer the Bitcoin there!
For now, there is no other way but you can still use Electrum on an offline PC without the internet or transfer the portable Electrum through a USB flash drive and open it from your offline PC/Node. Since you said you never connect it to the internet it is safe to simply import the private key to Electrum and make a signed message. Or if you think or feel after doing that address is not safe anymore then you can generate a new address with Bitcoin core and then transfer all of your funds to that address.
|
|
|
I tried to search and it seems there is no direct guide to making a python script to bulk convert xprv to wif key or hex. Why not try to play with this python that I found on Github. - https://github.com/ELHARAKA/MassPrivatekeysToWIFJust take note only run this offline I do not know if this one is safe I just found it on Google when I search for a guide. Or you can get some idea there and build your own python script,.
|
|
|
If it solo mine with a USB stick miner exchange address is not advisable since you don't have full control of your keys and exchanges are regulated then if you are lucky to mine a block with 6.25BTC and received it on exchanges there is a big possibility that your account/wallet will be monitor and possible withdrawal locked.
That is why people always recommend you to use a non-custodial wallet and remember "Not your keys, Not your coins".
However, if you are mining and making a profit daily GPU or ASIC receiving it directly to your exchange is fine I have a Viabtc account and receive it there and transfer it to Coinex exchange and Binance when withdrawing since I don't have free electricity I need them to withdraw and pay for monthly expenses.
|
|
|
I did try to verify it through command prompt as the administrator but it fails after verifying the installer with the signature even if I use the sha256sum.txt.asc or the above keys. ![](https://ip.bitcointalk.org/?u=https%3A%2F%2Fi.imgur.com%2FRLn5A90.png&t=663&c=B6cMLtLc_9094A) I also got this below I tried to verify it with the sha256sum.txt.asc from releases but got this error below C:\Users\~snip~\Downloads\Programs\New folder>gpg --verify sha256sum.txt.asc armory_0.96.5_win64.exe gpg: not a detached signature edit: Since the error above gpg not a detached signature I tried to edit the sha256sum.txt.asc and remove the hashes or the whole PGP signed message and save only the PGP signature and this is the result below. C:\Users\Test1\Downloads\Programs\New folder>gpg --recv-keys --keyserver keyserver.ubuntu.com 4922589A gpg: key 8C5211764922589A: "goatpig (Offline signing key for Armory releases) <moothecowlord@gmail.com>" not changed gpg: Total number processed: 1 gpg: unchanged: 1
C:\Users\Test1\Downloads\Programs\New folder>gpg --verify sha256sumsignature.txt.asc armory_0.96.5_win64.exe gpg: Signature made 24/12/2018 4:16:07 pm Malay Peninsula Standard Time gpg: using RSA key 8C5211764922589A gpg: BAD signature from "goatpig (Offline signing key for Armory releases) <moothecowlord@gmail.com>" [unknown]
|
|
|
|