I Just Remembered My Password!!!
Thanks!!!
Glad to hear it, that's always the easiest solution ![Cheesy](https://bitcointalk.org/Smileys/default/cheesy.gif) Exactly. By the way, are you the developer of that software? That depends... do you like it? ![Wink](https://bitcointalk.org/Smileys/default/wink.gif) (yes, I am)
|
|
|
I Just Remembered My Password!!!
Thanks!!!
Glad to hear it, that's always the easiest solution ![Cheesy](https://bitcointalk.org/Smileys/default/cheesy.gif)
|
|
|
I tried that, but it threw an error with google.protobuf, and I found how to fix it on linux, but I am running windows... I've bolded it above.... Although it is possible to use btcrecover against a MultiBit wallet file, it's much slower and it's harder to install the prerequisites on windows (I haven't even added instructions for this in the tutorial yet, but will eventually). Instead use one of your .key files, see here: https://github.com/gurnec/btcrecover/blob/master/TUTORIAL.md#finding-multibit-wallet-files
|
|
|
is now showing "Building Databases 61.5%"
Are you sure you're running 0.93 (this is the 0.93 thread after all...)? 0.92 and older had a Building Databases step, 0.93 replaced this with a much faster (1 - 2 hours long) Organizing Blockchain step AFAIK.
|
|
|
You may want to consider some updates to the online dllinks.txt file at some point...
Will Bitcoin 0.10.0 become available through the secure downloader, now that Armory officially supports it?
Speaking of updates to the dllinks.txt file ![Wink](https://bitcointalk.org/Smileys/default/wink.gif) (that's the file that would need updating and re-signing for 0.10.0 to become available).
|
|
|
getting dependency error not satifiable: libstdc++6(>=4.7) in Ubuntu 12.04 32 bit on attempted install of 0.93
Note that 0.93 can't go online in x86. Also, it requires C++11 so you'll need a libstd that is recent enough. You can probably get that package from the LTS backports repo. do we have to install 0.93 on both online and offline pc's?
Only the online machine Ugh, I just realized I bet we broke the 12.04 offline bundle with this release. I bet no one tested that... we really need to widen the testing net better. In the future, we might offer quadruple bounties for the first bug found in each of a bunch of categories. That would include testing the offline bundles, and lots of corner case features... I might need to update the offline bundles and re-release 0.93... You may want to consider some updates to the online dllinks.txt file at some point to reflect all of this... E.g., removing the 32 (bit) flag from all of the Armory 0.93 versions (keeping it for ArmoryOffline though), and removing 12.04 from the Armory & ArmoryOffline Ubuntu lines until/unless you intend to distribute your own libstdc++6 (FYI a newer version isn't in the backports repo unfortunately). It's a judgement call though....
|
|
|
Easiest thing would probably be to backup the full Armory data directory, if you are able to. That would save you from having to let Armory build the database again, and you will backup any wallets, transaction comments, etc.
Hrm, good point. Not having to let Armory build the database again would be a pretty big benefit to that approach, so I think I'll do that. If you think there's any chance of a hardware issue, I'd avoid copying anything besides the wallet files if I were you.... I had an issue that turned out to be bad RAM causing Armory database corruption issues each time I tried a rebuild... copying a potentially bad database might propagate whatever problem you're having. Also, with the 0.93 just around the corner, you can either wait for 0.93 or grab the most recent beta from the 0.93 thread which offers much faster database rebuild times thanks to goatpig's efforts (I recently did a database rebuild and it took about 1.5 hours on a HD, not even an SSD). Even Bitcoin Core blockchain downloads with 0.10 are much better, if you choose not to copy over its data directories. It can still take a number of hours, but that's a whole lot better than the day or two it used to take.
|
|
|
You should probably be sure to point this out the download page (and in future download links here) so that people stuck on 32-bit machines do not inadvertently overwrite their 32-bit versions with non-working 64-bit versions... just a suggestion.
That's for Windows only, and something we should do at installer level really. We won't remove the link to 0.92.3 till we got a x86 Windows build for 0.93.1. Yup, I meant only for the future. And if you've never done it in NSIS before, it's as easy as "!include x64.nsh" and then "${IfNot} ${RunningX64}" to check...
|
|
|
I notice that this version is 64-bit only (I haven't checked earlier 0.92.99 releases though). Was that intentional? Historically the installs have been 32-bit executables, even on 64-bit Windows. Do you plan to drop support for pre-built Win32 binaries? Just wondering...
(also, an extremely minor nitpick: the installer installs this 64-bit executable into the x86 Program Files directory, probably because the installer itself is a 32-bit app and its directories are being virtualized by Windows)
LMDB maps the entire underlying dataset in RAM. Can't address 30GB of data in x86. And that's just fullnode, supernode requires 3x that currently. For 0.93.1, fullnode should be around 120MB so it could function in x86, but we still do not plan on releasing x64 Windows builds for online Armory. There will be a x86 Windows build to support people using Windows on their offline signer (hopefully I'll manage something for WinXP), but it won't be able to sync due to LMDB's RAM requirement. Thanks for the detailed response. ...but we still do not plan on releasing x64 Windows builds for online Armory.
You meant no x86 releases for online Armory, correct? (otherwise I'm confused) You should probably be sure to point this out the download page (and in future download links here) so that people stuck on 32-bit machines do not inadvertently overwrite their 32-bit versions with non-working 64-bit versions... just a suggestion.
|
|
|
I notice that this version is 64-bit only (I haven't checked earlier 0.92.99 releases though). Was that intentional? Historically the installs have been 32-bit executables, even on 64-bit Windows. Do you plan to drop support for pre-built Win32 binaries? Just wondering... (also, an extremely minor nitpick: the installer installs this 64-bit executable into the x86 Program Files directory, probably because the installer itself is a 32-bit app and its directories are being virtualized by Windows)
|
|
|
But if I use "disablewallet=1" the "dbcache=4" option won't reduce the needed amount of RAM, or am I wrong?
(By the way I've upgraded the RAM size to 1024 MB of my VPS and now bitcoind is more responsive, but still far from the perfect!)
I guess my post was too long, sorry ![Wink](https://bitcointalk.org/Smileys/default/wink.gif) disablewallet=1 disables the wallet cache, which is 1MiB. It won't save you much, but it doesn't hurt. dbcache=4 decreases the other caches to 4 MiB, which by default total 100 MiB. Setting this too low might decrease performance, though... I don't know what a good number would be, but if DnT and shorena both say 4 is a good starting point, I'd trust them, and then maybe tweak it up a bit if you have any spare ram.
|
|
|
I dont know, gmaxwell DnT suggested it when I someone else had problems with memory and it worked like a charm. Let me dig that thread up. See the thread linked below[1]. I remember that it reduced the amount of RAM my node needs, while I had problems with 2 GB before. It used to be that Berkeley DB was used for the wallet, block indexes and tx indexes. -dbcache affected the in-memory cache for Berkeley DB. Version 0.8.0 moved the block and tx indexes to Google's LevelDB (it's faster), and kept the wallet in Berkeley DB format (presumably so that the wallet.dat format remained unchanged for backwards compatibility). In 0.8.0, -dbcache affected both the Berkeley DB and LevelDB caches. The patch referenced above was introduced in 0.8.2, and it modified the -dbcache option so that it only affected the LevelDB caches (since the wallet is relatively small, there shouldn't be any need to adjust it's cache size, so it was hard-coded to 1 MiB). The default -dbache in 0.8.0 was 25 MiB. Version 0.9.0 increased the default to 100 MiB. It has a hard-coded minimum of 4 MiB (and a maximum of 1 GiB on 32-bit machines, 4 GiB on 64-bit machines). I'd imagine setting it down to 4 MiB would have a noticeable affect.
|
|
|
Interesting tree: Peter Todd's replace-by-fee fork.
Interesting, and also quite controversial ![Wink](https://bitcointalk.org/Smileys/default/wink.gif) A (slightly related) interesting fork: Tom Harding's Double-Spend Relay and Alerts. It actually made it into Bitcoin Core's master for a short while before being reverted (which I think is a shame; he put a lot of work into it and it had at least some chance of being very useful, but there were some legitimate concerns as well). Double-Spend Relay and Alerts
VERY IMPORTANT: It has never been safe, and remains unsafe, to rely on unconfirmed transactions.
Relay When an attempt is seen on the network to spend the same unspent funds more than once, it is no longer ignored. Instead, it is broadcast, to serve as an alert. This broadcast is subject to protections against denial-of-service attacks.
Wallets and other bitcoin services should alert their users to double-spends that affect them. Merchants and other users may have enough time to withhold goods or services when payment becomes uncertain, until confirmation.
Bitcoin Core Wallet Alerts The Bitcoin Core wallet now makes respend attempts visible in several ways.
If you are online, and a respend affecting one of your wallet transactions is seen, a notification is immediately issued to the command registered with `-respendnotify=<cmd>`. Additionally, if using the GUI: - An alert box is immediately displayed. - The affected wallet transaction is highlighted in red until it is confirmed (and it may never be confirmed).
A `respendsobserved` array is added to `gettransaction`, `listtransactions`, and `listsinceblock` RPC results.
Warning If you rely on an unconfirmed transaction, these changes do VERY LITTLE to protect you from a malicious double-spend, because:
- You may learn about the respend too late to avoid doing whatever you were being paid for. - Using other relay rules, a double-spender can craft the double- spend to resist broadcast. - Miners can choose which conflicting spend to confirm, and some miners may not confirm the first acceptable spend they see.
|
|
|
JackJack,
do you have any plans to support AES encrypted JSON wallets in future releases? I've toyed around with PYwallet and its cool!
Are you talking about Blockchain.info wallets? That's the only wallet client I can think of that uses AES encrypted JSON. Or something else?
|
|
|
btcrecover supports searching for blockchain.info passwords, including double encryption/second passwords (you must use the --blockchain-secondpass command-line option). It's free and open source, but it does require a bit of reading to get it up and running. The tutorial is available by clicking here. Let me know if you have any questions about it. Edited to add: a number of individuals have commented that blockchain.info support will be able to help... unfortunately that's not true. Blockchain.info claims (and I have no reason to disbelieve them) that they have no access to either your main nor your second password.
|
|
|
For example, if a single Electrum seed was used to deterministically generate address A and address B, would it be possible to somehow link the two addresses together and deduce that they are both owned by the same individual? (Of course this is assuming that both addresses are kept separate with no mixing of coins occurring between them.)
Assuming, of course, that your adversary does not have access to your master public key, deducing that the two addresses were produced from the same seed is roughly as difficult (mathematically) as stealing bitcoin from those addresses. It would involve solving four SHA256 preimages and the two discrete logarithms (which is what secures transaction signatures in bitcoin), and would in the process give the attacker access to your master private key as well. If it were possible, there'd be far worse problems to be worrying about....
|
|
|
Is electrum 2 using bip32
Yes. 39?
No. Even if they chose to use both bip32 & bip39, that would not be sufficient to guarantee mnemonic interoperability. I said something fairly bone-headed above: (and many other wallets I hope) will be interoperable and support BIP39 in the not-very-distant future.
I don't know what I was thinking.... Even if wallets supported bip39+bip32+bip44, it would be close but it still wouldn't be quite enough to guarantee a mnemonic could be moved easily from one wallet software to another.
|
|
|
I've written (and have been improving I hope) a password recovery tool for a while now, and it includes support for Armory (that was the first wallet it supported as a matter of fact). You can find it here (it's open source): https://github.com/gurnec/btcrecover; the quick start is here: https://github.com/gurnec/btcrecover/blob/master/TUTORIAL.md#btcrecover-tutorialAlthough it's not the easiest to use, it is fairly well documented, and it doesn't required that you send your wallet information to anyone else if that's a problem (if you run it offline, of course). It's also probably faster than any alternative -- it's multi-threaded, so if you have a quad-core CPU, it'll run about four times faster than most alternatives. It also supports GPU-accelerated searches, although it's not very effective on that front for Armory. *Instead of directly encrypting the private key with the user passcode, we could encrypt the private key with a long random key, which is encrypted with the user passcode. When a user forgot the passcode, he may pay other people to brute-force the random key, without the risk of losing bitcoin.
That would be excellent. Of all of the wallets currently supported by btcrecover, Armory is the only one where I couldn't find a way to extract enough information from a wallet file to test for passwords without putting funds at risk. Armory encodes private keys as 32-bit blobs with no padding (which is not a weakness by any means, just an inconvenience when it comes to this particular task). Every other wallet I've encountered so far offers some form of "trick" that allows me to extract only a portion of a private key (or a hash thereof) for password testing purposes. For example, many wallets add PKSC7 padding to the end, which allows me to extract just 16 bytes of key material (50%) plus the (useless) 16-byte padding in order to search for passwords. Others encode their passwords in hex or base58 prior to encryption, which allows a similar trick of extracting only a portion of any private key/seed material. It's not that Armory is inferior for being more concise (by not including padding and by using binary instead of unnecessary encoding) -- it's just that it's the only wallet I've encountered so far where you need an entire private key to test for password validity. *** It depends a whole lot on your GPU memory size and the KDF parameters used during wallet creation to determine whether or not GPU-based acceleration can help in password searches. Armory's excellent use of ROMix makes GPU acceleration hard (even with btcrecover's time-space tradeoff), so a GPU might help by a factor of 5x or so, or it might not help at all....
** which in combination with the (unencrypted) chaincode and master public key does put funds at risk
|
|
|
Electrum 2.x (and many other wallets I hope) will be interoperable and support BIP39 in the not-very-distant future.
This is not true. Electrum 2.0 uses BIP39 wordlists, but seed generation is non-standard, so it is not technically BIP39 compliant. You will not be able to import BIP39 mnemonics into Electrum. That's a shame, but thank you for the correction.
|
|
|
|