I purposely said post title search space and not post content search space. I can get you a 113 MB text file with all known titles, it will tell you this: 5177960:🚀 ⭐ MegaEther.co ⭐ Lottery Game Based On The Ethereum Blockchain Platform 🚀 5177981:[BOUNTY]🚀 ⭐ MegaEther.co ⭐ Lottery Game Based On The ETH Blockchain Platform 5177993:⭐ MegaEther.co ⭐ Lottery Swap Token Swap Event 5178036:MegaEther.co - fake team and plagiarized whitepaper
|
|
|
In my opinion the most likely scenarios are (3), (4). I guess it's #4. #3 would mean many more people would lose much larger amounts. So backup your data, factory reset your phone, and start over.
|
|
|
There is this close up of the upcoming Keystone 3, which really resembles a smartphone. I really hate it when companies try to hype their product by showing a picture of an insignificant corner of the device. If they need that, it makes me think the device itself isn't impressive enough. I doubt that anyone would want to use some old piece of hardware for their finances for say 10 years or more. Many Bitcoins haven't moved in 10 years, and ignoring the ones that are lost, many of those must belong to long-term HODLers. I haven't owned Bitcoin for 10 years yet, but I don't like moving funds either. I think that's more than enough lifespan for a device of this type because I doubt that anyone would want to use some old piece of hardware for their finances for say 10 years or more. Any lithium battery will die way before that even if it is maintained in a best way, but I hope there is still an option to power USB cable and power on device. I've seen many lithium batteries that still work after 10 years, although they lost maybe 40% capacity. I've also seen lithium batteries break phones because they inflated. It's convenient to have a battery in a hardware wallet, but adds a risk factor.
|
|
|
Weird. It looks like someone was testing his malware backend. If you want to explain further, I would appreciate it. Take a look at the receiving address, and "CTRL-F bc1qs9gxwj6497yk" on that page, then scroll down. That highlights when the address received funds, when it sent funds, and when it sent funds to itself. Some of the transactions are consolidating, but at high fee. Some are splitting inputs. Both actions are a waste of transaction fees. What does it mean that someone was testing his malware? It's just a guess because I can't think of any other reason to create such transactions. In my opinion there are the following options: 1. Someone tried to brute-force my wallet and they succeeded. Highly unlikely. Except if the attacker knew some of my words and therefore were able to reduce the search space. Is there any possibility to know some (most) of your seed words, without knowing all of them? I guess not, so this is the least likely scenario. 2. Someone saw my seed phrase on my piece of paper. Highly unlikely. Since where I store my seed phrase nobody has access except for me. It's possible. 3. My BlueWallet app is compromised somehow. I downloaded it from the playstore. It's possible. 4. My phone is compromised somehow and someone gained access to my phone's storage. It's possible. Option 5: someone had access to your phone for a moment, and swept your funds.
|
|
|
It's a trade-off between convenience and risks, and with LN, I choose convenience. But I wouldn't risk more than (say) $50. Yeah, you can't do much in lightning with just $50. I mean, if you open a $50 worth channel with someone, chances are, they aren't big in liquidity. So you're probably going to have lots of failures. So questionable convenience. (also, $50 are easily spendable, you'll quickly need another channel) Good point, opening small channels is problematic. Small custodial amounts work fine.
|
|
|
3Jp9hU........p6ai. I don't show the exact address because I don't want to expose all of my transactions for privacy reasons. You can't obfuscate addresses like this, it's trivial to find.Your topic would have been more clear if you kept windice out of it. This transaction has nothing to do with your previous transactions. It also means my first post still applies: Weird. It looks like someone was testing his malware backend.
|
|
|
I have read before that not your node key not your coin. Now it's correct But do you really mind for small amounts? It's a trade-off between convenience and risks, and with LN, I choose convenience. But I wouldn't risk more than (say) $50. If I am using Electrum for lightning payment, is it your coin? The reason I asked is because they said not your node not your coin. I want to know how true it is. Short answer: yes. But I never went through the trouble of actually testing if I can recover LN funds from Electrum just from the private key, without cooperation from the other end. It seems like much more work (and thus risk) than using a custodial wallet. Or just trusting Electrum does what it should do.
|
|
|
As I said, it's from the website where I sent some sats to play roulette You're contradicting yourself: I have never sent money to this address First, you say your Bitcoin was sent to the address above. Then you say it's from a website you've used, while you say you've never sent funds to that address. It doesn't add up. How do you know which website the address belongs to?
|
|
|
Could it be done with a SMF patch? But why? There's no point in denying a user to read someone's post history if he clicks on it. If there's anything that needs patching, is that you can't Merit a post on an ignored board. That's an actual flaw that confused many (established) members. My avatar is disabled in topics, posts but it still shows at top left corner. If you don't want to see your own avatar: remove it! Why would the rest of us have to see it if you don't even want it?
|
|
|
As I said, it's from the website where I sent some sats to play roulette, I think it's a scam. I'm confused: you said you "originally" created the seed phrase in Bluewallet. Does that mean you imported your seed phrase elsewhere? Which wallet did you use, and how can the website you sent funds to have anything to do with that?
|
|
|
Going forward I would advice you prioritize offline method of storing your keys and seeds OP had less than 0.001 BTC in a hot wallet. That's a totally acceptable amount to risk losing, and I assume OP has most of his funds in cold storage already. The interesting part is the receiving address: bc1qs9gxwj6497ykmj5txdk7aax0c6psyr62fwcuv6: it received many more transactions, all within 24 hours. It looks like someone targeted many wallets at once. Update: It gets weirder: many of those transactions are sending his own inputs to his own address: this transaction for example. I have no idea why. I am starting to think that I must create another wallet where each cosigner is 24 words long. Should I? Or am I ok? I trust 12 seed words. You should look elsewhere, changing to 24 words will only give you a false sense of security.
|
|
|
If you doubt your storage media, just create a new backup once in a while. Even $10 per year is enough to add a different brand stick to your collection annually.
|
|
|
Does it mean that the scammers have access to the generated wallet that you generate in the website? From what I've seen, the code is altered to create known private keys, even when used offline. Read my crazy idea (which I never attempted). I don't get why people use obscure sites to create their wallets It could have been a trusted site back in the days, until it got sold.
|
|
|
How can a scam site like this be taken down? Complain to their webhost (after which they'll move) or domain name registrar. It might work. It's really bad that 2 scamsites have been making victims for many years. Related reading: here.
|
|
|
I still don't know what did fix it. It's Cloudflare. Theymos has been making small adjustments for their hiccups for years now. It's like a big magic black box that decides whether or not you get to use (large) parts of the internet. Anyway, I'm glad that it works again
|
|
|
Have you seen time.txt yet? It happened more often: 14,2009-01-09 04:33:09 15,2009-01-10 04:45:46
27,2009-01-10 06:56:13 28,2009-01-10 15:30:57
168,2009-01-11 23:39:41 169,2009-01-12 03:22:03 My guess: Satoshi just turned off his Bitcoin node (or his entire PC) for some reason. It wasn't that important to keep running back then, and there were not thousands of other miners like now.
|
|
|
Didn't mean to insult or roast the US.but for a country that has very advanced tech, and so many inovation. The banking system in the U.S seems like archaic. I am from a 3rd world country, and I have enjoyed the instant transfer between different bank, 24/7 for years. It's the law of diminishing returns: far too many people have interests in keeping the current system, and replacing it would make their existing investments worthless. If your country started later, it could skip all those steps. Don't they still use checks in the US? We stopped using them decaces ago.
|
|
|
Neither I nor theymos know why I was stuck seeing "Sorry, you have been blocked" long after it was fixed for everyone else, nor why it seems to be fixed now. I've seen that message too in the past few weeks, and I still get that message when I use Shift-reload (a hard reload) in Firefox. When I do the same in Chromium, everything works fine. My guess is that a hard reload doesn't cache anything, and somehow Cloudflare doesn't like that. Could it be you've disabled all browser cache?
|
|
|
Thanks again for your flawless timing! I'm just curious if you found the (allegedly) missing flux capacitor again.
|
|
|
Yes I don't know that bitcoin can stay in the ungenerated address as well. I thought it can only store in the already generated ones. Well thank you for this. There's no way for the sending wallet to know how an address was generated. It could be a " burn waste" address with only a valid checksum, it could be someone created it offline. Either way, it looks the same from the sender's perspective.
|
|
|
|