There's a support channel for these matters. If you still choose to resort to a forum post, the least you could do is to provide proof of what you are purporting, and attach some log files.
|
|
|
Blockchain.info has a lot to answer for, since they are the single biggest contributing factor to spreading the address reuse poison throughout the ecosystem.
At least Mycelium is actively working on BIP32 - I've heard of no such commitment from BC.i
For various reason, not only privacy, it's about time the community moves on to BIP32 wallets. Can't really point fingers as we are lagging behind currently (not for long though!).
|
|
|
Awesome, I was thinking of using it as my laptop wallet, maybe I should just stick to multibit
I use Mycellium for Phone & Multibit for PC
I absolutely LOVE the way Mycelllium works and lets you work with one address at a time. Here is where I am getting at - I have a cold storage which is in a hidden spot offline - I have Mycellium on my phone which has this address in VIEW mode only meaning no private key is on my phone- But lets just say I want to use only 0.5 or 1BTC and keep the rest exactly where it is? All I need to do is grab my cold storage paper backup select Scan key "Scan it & then shut the Safe door, locking the cold storage back up again" Now in Mycellium it has automatically changed the mode of that address into Send & Receive Instead of Just receive, at this point I send out 1BTC into my transit wallet address and then permanently delete the key from mycellium turning this back into a read only address again and a cold storage.
I am wondering if there is really any-point to use armory on my laptop, instead of multibit.
You're exposing your private key to an online machine. If you can't see what's going wrong here, you need to do more research. You are literally negating the whole cold storage part. Also, using a single address is bad for your privacy, and the privacy of everyone who trades with you.
|
|
|
On a side note, we have some massive backend overhauls coming in soon. We're considering striking the beta tag off once the improved code is hardened and thourougly tested.
That doesn't change the fact that you are running this code at your own risk. I think a lot of open source projects defer responsibility to the user, but I digress.
Due to Bitcoin's decentralized nature and how we work with it, we can't realistically accept the ultimate responsibility of your coins. We simply lack the technological "jurisdiction" to properly investigate a case of coin loss, and have to trust end users word for more than we are comfortable with. It would waste a huge amount of man power to deal with weekend con artists.
Insurance comes a cost. Conventional financial tools and services are insured at a cost to the end user, in the form of various fees and legislations, which trickle down to customer. They also rely on centralized architectures that offer an extreme level of damage control to the service providers. Simply put, the risk is easy to calculate, and the central authority has the power to revert the damage.
On the other hand, charging for pure bitcoin services is hardly sustainable. The technology is open source and decentralized, and purely software. The barrier to entry is essentially inexistent. Competitors would take over your market share in no time. We can't realistically charge you for insurance to cover ourselves.
Neither the technology nor the economic model support what you have been used to for so long in the fiat system. The protection we offer is raw technological performance, without legal nor implementation boiler plate. If you do not understand the technology, or don't use it as intended, we can't do anything for you.
I think insured Bitcoin funds will only apply in 2 cases: at the customer level with centralized services, and at the business level with trained and trusted operatives who will manipulate the funds within precisely defined steps, in accordance to the insurer and technology provider's strict guidelines. I'd be wary of a service that guarantees your coins outside of these parameters.
|
|
|
Hey, I've just upgraded from 0.91.2 to 0.92. All my wallets are listed normally but the Transactions list are missing transactions and Maximum and Spendable funds just displays about 30% of my funds. I've tried restarting Armory and Rescan Databases but it didn't help.
Do you think Rebuild and Rescan Databases could help? Do I need to reimport the wallets? How else can I troubleshoot this issue?
Thanks
Make a ticket, add your log. Verify in the bottom left corner drop down list that "all wallets" is selected.
|
|
|
Hey everyone. I have some good news and bad news. The good news is that 0.92 has been released! The bad news is that the OS X build is borked. I'm looking into it and think I know what happened. In the meantime, hang tight. We'll get a corrected build out ASAP. (As far as I know, the Linux and Windows builds are fine.) Sorry about the botched launch. I'll look into solutions to ensure that this doesn't happen again. In the meantime, I just confirmed that the 0.91.99.11 build works. You can download it from here if you can't wait. It's 0.92 minus a few very small, last-minute changes. would this include Ubuntu versions installed within a VM on a Mac? You shouldn't be concerned
|
|
|
Out of curiosity, I have a Raspberry Pi with the 256mb of RAM instead of 512. Would an offline Armory still run on this one?
It uses about 50MB RAM on its own, plus whatever your wallets' kdf is set at, assuming you encrypted it and will use your pi to decrypt it.
|
|
|
Our priority at Armory is security
Security is not a product of just having no known exploits. Sledgehammer has no exploits, but it's ridiculously cumbersome to store bitcoins in it. If your product is as good at being a wallet as sledgehammer, you have a problem. Usability has as much to do with security as access control. When using your product ends in denial of service, it's security failure. My quote also implies that we can't just implement a random fix and call it a day. It needs to integrate with the model properly and be thoroughly tested. There has been quite an effort deployed to overhaul the backend, which should hit the next release. It will offer a lot more stability, speed and scalability. Scalability we can leverage to implement other sources for the blockchain data and hybrid modes, in a way we think is robust. The DB version of Armory was introduced in 0.90, and it should be overhauled for 0.93. You are using a proof of concept version and will get to enjoy the rock solid implementation in 0.93. This is the speed at which we deploy releases, and keep in mind 0.90 was essentially a single man effort. Generally the full blockchain approach was the cheapest solution to implement, and these kind of choices are easy to make when you are putting a proof of concept together. 0.91 was mainly a 3 job, and the whole team of 5 worked on 0.92. Now that we are functioning at full capacity, a lot is getting improved, and much faster. Also, before we go after this particular issue you suffered from, we had to address the scalability issue that affected a lot more of our users. In contrast, your issue is actually fixable at the cost of a fresh blockchain download, which we did speed up with an integrated bootstrap downloader in 0.91. Keep in mind we identified this issue while deploying 0.90 test releases. This is isn't ideal of course, just side stepping the issue, but cheap enough that we offered this solution while working on something a lot stronger.
|
|
|
Along with the BIP32 wallet version, so either 0.93 or 0.94.
|
|
|
If I have signed a transaction on an offline computer - can I take the signed file and broadcast it from any Armory installation that's online, or must it be from the one that initiated the transaction?
AFAIK, any online Armory can broadcast it, although it may tell you it doesn't control the accompanying public key and then ask if you want to proceed. Somebody else will have to confirm. My understanding is that to broadcast the signed tx, you need to load Armory with at least a WO copy of the corresponding wallet
|
|
|
A few short disconnects from bitcoind? That's a benign bug that shouldn't get in the way. It happens on every platform and setups (Win8 RAID0 here), and my old system too (Win7 and single SSD).
|
|
|
What you want to delete is /cppForSwig, which has all the C++ code and compiled intermediary files. You can also get rid of /pytest and /extras, and the obivous windows and osx build folders.
|
|
|
For some reason the bitcoin folder autodetect code fails and passes None to the backend, which crashes. So far we have never experienced the issue in house. A few users have reported the issue but we couldn't guess much from their setup. It may get to the point where we'll put out a high verbose debug version and have you guys run it to give us a clue...
|
|
|
Some failure in the auto bitcoin folder detection.
Force the bitcoin path with the --satoshi-datadir=*bitcoinpath* command line
|
|
|
So basically a memory protection feature. But I'd fathom a simple fix can be made by making armory detect sleep and waking and forcing itself to restart/reinit when it happens.
Maybe, but this definitely isn't a priority for a months to come
|
|
|
Any 0.9x release would be great, don't think there's anything in 0.92 that I need as much as just a working 0.90-0.91 on Fedora. I guess I'll have to keep trying the command line wrangling...
With the upcoming change to the messaging format to support multisig, anything 0.92 and above will be incompatible with older versions.
|
|
|
Did we ever get an rpm package for Armory? I'm not seeing anything on bitcoinarmory.com
Oh boy... not quite there yet, wait till we get a Debian package out first o.o
|
|
|
3. The primary concern would be that it's not part of your paper backup, only in digital backups created after you imported the private keys.
You can add imported private keys to a paper backup, but you'll end with extra pages. Also you cannot be under the assumption than an already existing paper backup will cover newly imported private keys, which implies you'll have to print new ones every time.
|
|
|
|