but when I use the python data here he gives me another key about both cases.
You need to be careful with Python and make sure that you're feeding it the correct "type" of data... a lot of the Crypto libraries require "byte" data... so: 'fbbd3ddc686904eaf454' and b'fbbd3ddc686904eaf454' are actually 2 different representations... first one is a string (ie. ASCII characters) and the 2nd is stored as actual bytes... You can refer here for a good example: https://www.w3resource.com/python/python-bytes.php#hex-string-byte
|
|
|
An SSL certificate has nothing to do with scams or fraud or trustworthiness of a website... Although it's a common sign of a scam website to make a big deal about the fact that they do have an SSL certificate ![Roll Eyes](https://bitcointalk.org/Smileys/default/rolleyes.gif) All an SSL cert does is allow them to offer https:// connectivity so that the connection to/from the website is encrypted.
|
|
|
WHY are we allowing campaign managers in these positions that even need to take out loans? this looks like needless risk and temptation. Bring in some wealthy people who do it fairly and transparently for some "extra" non essential income. Less temptation to scam or game the entire thing and ensures fairer treatment for all those that apply for the campaign.
Why should anyone be prevented from being a campaign manager if they so choose and other parties are happy to hire them to do so? For someone who is keen on everyone being treated fairly and equally... are you actually suggesting that only rich people should be allowed to have certain jobs now? ![Huh](https://bitcointalk.org/Smileys/default/huh.gif)
|
|
|
Would be a solution IF Electrum Android allowed me to create a transaction using an specific address, which it doesn't. The ANDROID watch-only wallet has no option to spend from that specific address, or does it?
If you can't (and I'm fairly you can't) specify a specific UTXO to spend or choose a specific address to spend from, you could just create a "dummy" transaction that spends your entire balance. That way it is guaranteed that the change address will be included.
|
|
|
Yeah... it comes from this accusation: https://bitcointalk.org/index.php?topic=5158055.0The "evidence" is a bit messy... a screenshot of a PM saying "message me on the skype on my profile"... currently listed as: "Skype Hassan.bouh7"... and then some skype chat in Spanish (which made it difficult). Anyway, the skype profile links up with the screenshots... and along with this accusation would indicate that the account has gone rogue. So, I've supported the other flag. If OP can create another flag, I'll support that one too based on the evidence in this thread. Also, for the record, OPs thread and replies by Traderpolo212 has been archived here: http://archive.is/3w4nB
|
|
|
I doubt this has anything to do with Electrum itself... and is more likely that you have a clipboard hijacker virus/malware installed on your system. I would suggest that at the very least you run some of the common anti-malware scanners like MalwareBytes or Spybot Search and Destrory... and preferably, backup your important data, then wipe/format your computer and reinstall the Operating System. It is highly likely you have all sorts of nasty stuff infecting your system! ![Undecided](https://bitcointalk.org/Smileys/default/undecided.gif)
|
|
|
If you mean the forum bitco.in then they have a twitter account listed that you might be able to contact... or failing that, just register a new account and then post in their "meta" section to see if you can get the attention of some mods/admins.
|
|
|
electrum.net is already offline However the electrumsky domain is still up and running. I've reported it to Google SafeBrowsing and have also filed an "abuse" complaint with the domain registrar here: https://publicdomainregistry.com/report-abuse-complain/WHOIS result for electrumsky.com Domain Name: ELECTRUMSKY.COM Registry Domain ID: 2404872319_DOMAIN_COM-VRSN Registrar WHOIS Server: whois.PublicDomainRegistry.com Registrar URL: http://www.publicdomainregistry.comUpdated Date: 2019-06-21T19:12:14Z Creation Date: 2019-06-21T19:12:13Z Registry Expiry Date: 2020-06-21T19:12:13Z Registrar: PDR Ltd. d/b/a PublicDomainRegistry.com Registrar IANA ID: 303 Registrar Abuse Contact Email: abuse-contact@publicdomainregistry.comRegistrar Abuse Contact Phone: +1.2013775952 Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibitedName Server: NS1.ITITCH.COM Name Server: NS2.ITITCH.COM Name Server: NS3.ITITCH.COM Name Server: NS4.ITITCH.COM DNSSEC: unsigned
|
|
|
Do you need it to support different coins? as the paths you are showing don't appear to be standard "BTC" derivation paths...
If you just need it to support just BTC, you could probably write a script to generate the necessary wallets in Electrum (on Linux or MacOSX) using the commandline. (NOTE: Commandline not available on Windows)... but given that most wallets don't even allow for customisation of the derivation path, I doubt you'll find any that will let you do it "automatically" from a list.
|
|
|
You're not an idiot... you've just been tricked by nasty thieves using a very convincing social engineering attack ![Sad](https://bitcointalk.org/Smileys/default/sad.gif) At this stage, it appears that the malware was simply designed to modify transactions to send all funds to the thieves... and doesn't appear to be installing any other malware like keyloggers or RATs etc... but there is no guarantee that this has not occurred. You can try running scanners like MalwareBytes or Spybot Search n Destroy etc... If you want to be 100% sure, you're need to backup your data, then wipe/format the computer and reinstall your OS.
|
|
|
Yes, sadly, your money is gone. ![Undecided](https://bitcointalk.org/Smileys/default/undecided.gif) This is a very old scam method... create a watching only wallet for someone with X BTC in it, claim the user needs to deposit to "unlock" funds... wait until they deposit then simply move all the funds to another wallet. The variation on this is to setup a wallet for someone on a service like blockchain.com and tell the user they need to log in and then change the password. Meanwhile, the thief has the 12 word recovery phrase already and can therefore restore the wallet, regardless of password being changed. Then simply wait for user to start using wallet and deposit funds, then steal them all having cloned the wallet using the 12 word recovery phrase. The learning from this scam is that you should NEVER let anyone create a wallet for you... EVER!
|
|
|
You can't have multiple "dobet" functions. You have to have exactly ONE dobet() function. Also, there is no "betlow" variable. It seems that you don't quite understand the flow of how the bot works through a script. You don't make a call to dobet() to make the bot make a bet... the bot will automatically make the first bet with the site (based on the values that are set for nextbet and chance etc). Then the bot will call dobet() with the results, process your code in dobet() and then at the end attempt to place the next bet with the website before looping back through to dobet() again. There is a very good description of it (with a flow chart) available in the programmer mode tutorial. So, you might want to read: https://steemit.com/dicebot/@seuntjie/dicebot-programmer-mode-tutorial-02-processSo, what are you actually attempting to do? What is the logic for your script? ![Huh](https://bitcointalk.org/Smileys/default/huh.gif)
|
|
|
so many requirements how am I to get the details of my btc account of 2017 the btc address should have been long gone I can post the previous signature I used though
Why would the btc address(es) be long gone? They don't expire or cease to exist... assuming you don't delete the wallet file and you're not using an exchange or other custodial wallet, they should remain in your wallet "forever". What wallet software were you using? ![Huh](https://bitcointalk.org/Smileys/default/huh.gif)
|
|
|
Actually it doesn't fully explain it... Unfortunately people are still forgetting to use services like archive.is or similar to archive threads: ![](https://ip.bitcointalk.org/?u=https%3A%2F%2Ftalkimg.com%2Fimages%2F2023%2F11%2F15%2Fz9G09.png&t=663&c=bHccjAL4PiuNjA) I can only assume that Core.i7 has deleted his thread (in an attempt to cover up the ANN bumping service)... or it has been deleted by a moderator. Either way, I can't "support" the red trust based on the available evidence.
|
|
|
The difference between his and mine is only that it displays the numbers a bit better. I had a quick look at your commits... so basically all you're doing is adding the 000's separator? ![Huh](https://bitcointalk.org/Smileys/default/huh.gif) Where exactly is this used? Because in the parts of the UI that I would think need to display the separator (for me, the fiat values)... I can already see it... for instance: ![](https://ip.bitcointalk.org/?u=https%3A%2F%2Ftalkimg.com%2Fimages%2F2023%2F11%2F15%2Fz9mmN.png&t=663&c=KSutKHbFIN1k3Q) Is it if you have your units set to mBTC or something? ![Huh](https://bitcointalk.org/Smileys/default/huh.gif)
|
|
|
I also tried a new wallet with the original key from Multibit, it took them ok (this required an older version of Electrum last time) and it shows my original address as the recieving address. Which was reassuring to see ... But it is still sychronising too.
Older versions of Electrum will not synchronise properly. You need at least v3.3.4... the current version is v3.3.6. DO NOT download any version from any site other than: https://electrum.org/#downloadAlso, follow the instructions to verify the digital signature: https://bitcoinelectrum.com/how-to-verify-your-electrum-download/As for not accepting the keys, it is likely because Electrum supports creating addresses in all three formats: - Legacy... aka P2PKH... aka "1"-type addresses - Nested SegWit... aka P2SH-P2WPKH... aka "3"-type addresses - Native SegWit... aka P2WPKH... aka "bc1"-type addresses To import your multibit keys, you will need to import them in the format: p2pkh:YOUR_PRIVATE_KEY_GOES_HERE ![](https://ip.bitcointalk.org/?u=https%3A%2F%2Ftalkimg.com%2Fimages%2F2023%2F11%2F15%2Fz96Va.png&t=663&c=yfdZ1z_SGrqmdA) So I made a new wallet with the seed words, and it just sits there synchronising. The receiving address is not my original code, is this ok?
Did you import your old MultiBit keys... or did you sweep your old keys?. The two things are very different... importing simply clones the keys into your Electrum wallet... whereas sweeping actually sends the coins from your old keys/addresses to new keys/addresses. So, if you simply imported the multibit keys, then the seed words you have will likely not contain the coins from your multibit keys. In any case, the Electrum seed will definitely not create the same keys as your multibit wallet did.
|
|
|
What were the exact steps you took to verify the files? Having installed Kleopatra, you should be able to simply navigate to the directory holding the .exe and the .asc files in Explorer, then right click on either of them, select "More GpgEX options" and then select Verify: ![](https://ip.bitcointalk.org/?u=https%3A%2F%2Ftalkimg.com%2Fimages%2F2023%2F11%2F15%2Fz9Ppo.png&t=663&c=ZmkFVw_rk9ssRw) Kleopatra should automatically open and verify the signature. NOTE: there might be a brief pause while Kleopatra starts up if it isn't already running. Also, given the location of your files, it's possible that you have some weird file permissions issue... you might find that you need to run Kleopatra as administrator so it can read the files. #yayWindows
|
|
|
A friend in Sweden got the same. "Upgrade to Electrum 4.0" (and let us steal all your money). electrum.org should maybe have a warning for this but they have no adress where I can contact them...
The webpage says right at the top: Warning: Electrum versions older than 3.3.4 are susceptible to phishing. Do not download Electrum from another source than electrum.org, and learn to verify GPG signatures. The "phishing" link goes to the github issue discussing the prolem... and the fact that it was fixed. The website also has links to github: https://github.com/spesmilo/electrum where you can use the issues register to contact the devs and also a link to their twitter: https://twitter.com/ElectrumWalletFailing that, PM ThomasV here:
|
|
|
It would seem that as of 2019-06-28 2100hrs UTC... the Electrum website ( https://electrum.org/#home) is fully operational again. If you need to download it... now is your chance. Also, as mentioned previously, it seemed you could go straight to the download domain: https://download.electrum.org/3.3.6/ to get the latest 3.3.6 version.
|
|
|
|