Bitcoin Forum
May 30, 2024, 06:43:37 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 [167] 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 ... 317 »
3321  Bitcoin / Development & Technical Discussion / Re: Dead man's switch on: November 15, 2018, 07:04:18 PM
~snip~

This is basically the solution but it's kind of redundant.
A simpler one would be to just sign the tx that would spend all his coins right now. And store that transaction on a server. Write code in your favourite language that broadcasts the tx after Y amount of time just for an added layer of security. And open up a port on your server where the application can listen to.

If the application doesn't get pinged once every X months, weeks, whatever, then it calls the function, and after Y amount of time, the tx will be broadcasted.

So he has to ping the server every X interval, and if he somehow fucks up and forgets, he has Y more time to stop the application from broadcasting his coins.

Hell if you want I can probably set this up for you in node.js right now.



That's not really redundant.

Your solution involves trust. OP could theoretically broadcast the transaction earlier (e.g. working together with the recipient).
This should definitely be considered.

Heretik's solution on the other hand doesn't involve any trust.
The owner of the coins is the only one who can initiate that transaction (by not creating a new one).

IMO that's the best solution for a dead mans switch (at least the best i can think of).
3322  Bitcoin / Electrum / Re: How do i verify Electrum installer on Linux? on: November 15, 2018, 05:48:13 PM
That's the preferred way, yes.

I am not aware of a way to verify the version PIP installs automatically.

However, i believe PIP is verifying the signature itself. But i'm not sure about this.
3323  Other / Beginners & Help / Re: Bitcointalk.org 2FA option/feature on: November 15, 2018, 01:37:55 PM
Bitcoin doesn’t use 2FA. I don’t see why the forum would need to.

Bitcoins aren't simply accessed using a publicly known account name and a (probably less than 10 character long) password.

Sure, for people with a very good memory or user who use a password manager, that's not a problem at all.

But the majority does probably have a relatively(!) weak password, i believe.
A 2FA (a simple mail would be enough) wouldn't hurt and should be relatively easy to implement, IMO.
3324  Bitcoin / Electrum / Re: How do i verify Electrum installer on Linux? on: November 15, 2018, 11:33:42 AM
To verify electrum on linux:

1. Get ThomasV's PGP key:
Code:
gpg --keyserver pool.sks-keyservers.net --recv-keys 2BD5824B7F9470E6

(verify yourself, don't trust me)

2. Get the signature file (from electrum.org)

3. Verify:
Code:
gpg --verify electrum_signature_file.asc electrum_downloaded_file.tar


You should see this line output (among others):
Code:
Good signature from "Thomas Voegtlin (https://electrum.org) "

That's the important line.
3325  Bitcoin / Bitcoin Technical Support / Re: Transaction not found by TX #, but it is by Wallet.... Someone please help.... on: November 14, 2018, 11:10:42 PM
Yes, it is showing up fone on my end now too.... except that in Bitpay's new desktop wallet, it shows that there is no transaction. I sent  another small amount to the same wallet and it appeare instantly, and now has already confirmed. yet, the wallet does not show anything on the firsttransaction

Did you send your second (small) transaction to the same address ?

If so, it seems like bitpay's wallet does have some connection/display issues.

If not, can you verify that the address you have sent your first transaction to does indeed belong to your wallet ?
You can see all addresses of your wallet under Settings -> Advanced > Wallet information
3326  Bitcoin / Bitcoin Technical Support / Re: Help With Coinbase transfer to Electrum wallet on: November 14, 2018, 06:02:26 PM
You need to export/import the private key, not the public address.


But it probably is easier if you simply create a new wallet in electron cash using the seed (24 word seed) from electrum.

If you however want to use the single private key, simply go to the 'address' tab in electrum, right click on the address which received the btrash, and click on 'private key'.
Then copy it and create a new wallet in electron cash using this private key.

3327  Bitcoin / Bitcoin Technical Support / Re: I'm freaking out here. Some good soul please HELP! on: November 14, 2018, 05:32:19 PM
It will, your client is missing the up-to-date information. Therefore it is showing you the last state it has.


Regarding the fees, 40 sat/B would be a bit overkill.

You can check the current mempool status at https://jochen-hoenicke.de/queue/#1,8h.

Currently a fee between 10 and 20 sat/B is enough to get a relatively quick confirmation.
3328  Bitcoin / Bitcoin Technical Support / Re: I'm freaking out here. Some good soul please HELP! on: November 14, 2018, 04:05:42 PM
It seems like your client isn't properly synced. A rescan should fix this.

First, did you already create a backup of your wallet.dat ? If not, immediately do one!

Second, if you don't necessarily want to use core, you might simply use a lightweight client (e.g. electrum).
You can export your private keys from core and import them into electrum. Since electrum is a lightweight client you don't need the whole blockchain stored.

For your next transaction pick a slightly higher fee. Or, if you have time, 1 sat/B should be fine (which could take longer to confirm).
3329  Bitcoin / Development & Technical Discussion / Re: Safe to run BitcoinCore 0.11.0? on: November 14, 2018, 01:37:06 PM
Running XP is heavily discouraged.

It is full of bugs and vulnerabilities which aren't (and never will be) fixed.

Anyone which is capable of downloading kali linux would be able infect your system without you noticing it.
This could (and most probably will) lead to a loss of funds.

There are multiple bots online who are actively searching for XP hosts, simply to infect them and include them into their botnet.


The only way to run XP which isn't completely discouraged would be in a complete isolated offline environment. Anything else is just asking for getting hacked.
3330  Bitcoin / Development & Technical Discussion / Re: How does vanitygen find a pattern? on: November 14, 2018, 01:33:23 PM
You're basically telling me that I need this many keys 2.207.984.167.552, -at least- to run through every possible combination of 7-letter words, and maybe land into the pattern I want.
I'll (slightly) go against bob123's answer here: that number doesn't give you all possible combinations (it also gives you duplicate (wrong) combinations). Without doing the math, I guess it's the number of combinations you need to try for 50% chance of getting the right one.

It is not the number to have a 50% chance. It is the average number needed to find the correct key.

The correct amount of tries until you find the suitable private key (on average) is 2.207.984.167.552 (58^X with X = 7).
The amount of keys to have a 50% chance (on average) would be 1.103.992.083.776 (58^X / 2 with X = 7)


I have mentioned that's the average (multiple times). Is there anything else which you think is wrong (even slightly)?  Cheesy
3331  Bitcoin / Electrum / Re: Bitcoin Cash Fork? on: November 14, 2018, 07:25:17 AM
i still will get the forked coins later on in the future right? 

For the 100th time.. YES.



So its the 12 word electrum phrase that is what is needed? 

You need the PRIVATE KEYS
But they can be derived FROM THE SEED. So basically.. YES.



Thus that is the phrase that is needed for bch claim in electron cash and the bitcoin fork soon?

It is needed for ANY fork.. ANY.
3332  Bitcoin / Armory / Re: Armory states not to be online and does nothing to change this on: November 13, 2018, 07:10:50 PM
Code:
2018-11-11 12:27:53 (ERROR) -- ArmoryQt.py:1862 - Failed to setup SDM
Traceback (most recent call last):
  File "ArmoryQt.py", line 1857, in startBitcoindIfNecessary
  File "SDM.pyc", line 190, in setupSDM
BitcoindError: bitcoind not found


You need core to be synced AND running.

Also make sure it is the latest version (0.17.0)
3333  Bitcoin / Development & Technical Discussion / Re: How does vanitygen find a pattern? on: November 13, 2018, 07:06:47 PM
If you take my own address for example : 1KingZeeW97uLvngcUA3R6QJx18Fn78ddb

You're basically telling me that I need this many keys 2.207.984.167.552, -at least- to run through every possible combination of 7-letter words, and maybe land into the pattern I want.

Basically, yes.

But you also could have found the private key to that address after your first or second key.
But on average, yes. You need to calculate that many keys to find an address with a prefix of 7 chars.

Since there is quite some good hardware available currently, this doesn't take too much time.
3334  Bitcoin / Bitcoin Technical Support / Re: Bitcoind requests on: November 13, 2018, 03:02:41 PM
The amount of request your personal core instance can handle depends on your hardware.

The CPU and Disk I/O are the main bottleneck. Your network bandwidth will probably allow more requests than your hardware can handle.

I can't give you an exact (or estimated) number since i haven't tried overwhelming my full node yet  Cheesy
3335  Bitcoin / Development & Technical Discussion / Re: How does vanitygen find a pattern? on: November 13, 2018, 02:59:52 PM
Are you sure? I thought it showed worst case scenario time? I'm talking about samr7's vanitygen. I know it might take a lot less if you get lucky, but it shouldn't go above that time. It calculates the time to reach 100% probability of getting a specific pattern.

I don't know how this specific vanitygen works in terms of displaying the estimated time.
But searching randomly is the best approach (You can't get better than randomly searching; searching successively would create vulnerabilities since those private keys wouldn't even be close to random anymore).

Calculating the maximum amount of time and the time it takes to have a 50% probability is the same for all vanity address generator.




You mean 34? The pattern is inside the address, not the private key! I'm going to edit your maths in the next quote.

34 (more or less) is the length of the address. But the set of possible characters is 58 (addresses are encoded in base58). The charset is:
Code:
123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz




See this part I don't understand. How are you calculating all this? The pattern is in the output, not the input.

If you want to have 1 (specific) out of 58 characters at the first position, you need to generate 58 private keys (which will result in 58 addresses starting with different characters ON AVERAGE, since the hash function is producing a pseudo-random output).

For 2 chars, you need to create 58 * 58 addresses (which also means creating 58*58 private keys) to get your desired prefix (again: on average).

Therefore it is: 58^X with a prefix of X chars to find the correct private key / address. And for a 50% probability (how it is displayed in another vanitygen (not sure about the name currently)) you'll have to divide it by 2.
Therefore (58^X) / 2 for a 50% probability.




See what I dont understand is how does calculating n number of private keys, gets you closer to generating your wanted private key. How does the process of elimination go? If it were truly random then we'd just be blindly generating random keys constantly.

It doesn't get you any closer.

You are just calculating a massive amount of private keys (and addresses) until you have found one with the desired prefix.
There is no elimination at all.

You can compare it to calculating the probability of having 10 times a 6 in a row when rolling a dice.

You can not predict when you will have those 10 6's in a row. But you can mathematical estimate a number of rolls to get a 50% probability (it gets boring, i know.. but: on average).


So, vanitygens DO randomly generate private keys. They estimate that you need Y private keys (and therefore addresses) generated until you have found your desired one.
3336  Bitcoin / Development & Technical Discussion / Re: How does vanitygen find a pattern? on: November 13, 2018, 12:05:48 PM
In fact, it is randomly generating private keys, trying to find a private key which results in an address with the desired prefix.

The estimated time can be calculated using stochastic. Note that this time is always an average. There is never a guarantee that you'll find your desired private key in the estimated time.
It might take 1 second or 10 years.

Since the hashing function is generating a pseudo-random output, you can calculate how much private keys needs to be generated to find an address with a specific prefix (on average!).

To be more precise:
There are 58 different characters inside an address. To find a private key which results in an address with the prefix of 1 chosen character, you'll need to calculate 24 (= 58 / 2) private keys to have a 50% probability.
To get an address with a prefix of 2 chosen chars, you'll need to calculate 1682 (= 58 * 58 / 2) private keys ( to have a 50 % chance of finding a suitable private key).

The formula for X chosen chars (with a 50% probability) is:
Code:
Priv_Keys_to_be_calculated = 58^X / 2
3337  Bitcoin / Bitcoin Technical Support / Re: bitcoin core 0.16.3: high resource usage on: November 13, 2018, 12:00:58 PM
High ressource usage while reindexing is completely normal.
 
Core is verifying each block currently. This results in high CPU/HDD usage.

If you are running the GUI, you should be able to see how long it takes at the bottom bar.

According to your log, you are currently at blk00695.dat.
Without the GUI, you can check how much blk**.dat files there are to estimate the time it still needs to index.
3338  Bitcoin / Armory / Re: Armory to BCH (again) on: November 13, 2018, 11:45:10 AM
If you already have the correct private keys (those which contained BTC when the fork happened), simply download a BCH wallet [1] and import them into the wallet.

I'd recommend to run the BCH wallet inside of a virtual machine.. just to be on the safe side.


[1] e.g. https://www.bitcoinabc.org/ (no guarantee that this wallet works and is non-malicious)
3339  Bitcoin / Bitcoin Technical Support / Re: Need help with strange TX (thief stole btc) on: November 13, 2018, 06:48:30 AM
Unfortunately there is no way for you to get the BTC back (neither by 'refunding' in terms of reverting the transaction nor by finding the thief).

It is not possible to send more than received. The last transaction contains more than 20 inputs. blockchain.com just isn't showing them without clicking on the transaction itself.


Instead of trying to find the thief (which is kind of uselesss, especially if he has used a mixer) you should rather try to find out how he got access to your private keys (which i assume he had since you are talking about a thief and not about a scammer).

If you had a desktop wallet and don't know how he got access to your private keys, make sure to check your whole system for malware. And in case of doubt rather set up a fresh OS.

Do you have any clue on how the theft happened ?
3340  Bitcoin / Armory / Re: Armory states not to be online and does nothing to change this on: November 13, 2018, 06:40:24 AM
I'm not going to show you the log file, since this wouldn't help. I alreade checked the log file and there is nothing unusual. But thank you.

If it's not working for you, the solution is inside of the logs.

Just because you weren't able to find it, it doesn't mean that the logs are useless.

If you don't want to post your log files, that's alright. But don't claim that it 'would not help', since this is definitely up to us.
Pages: « 1 ... 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 [167] 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 ... 317 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!