Bitcoin Forum
June 25, 2024, 06:47:23 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 [21] 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 »
401  Bitcoin / Mycelium / Re: Recreating a wallet using a mnemonic in different software? on: January 29, 2015, 10:10:58 PM
it is my understanding that Armory and Electrum use different mnemonics. so you can't create the same wallets with the same mnemonic

Thank you for the simple explanation. That is what I kind of suspected but I thought that there might be some kind of standard where the different mnemonics came out to the same thing. Glad I didn't try it! Thanks again.

For starters, Armory doesn't currently support any form of mnemonic....

That aside, there is a standard (called BIP39), although Electrum 1.x was created before BIP39 was envisioned. Electrum 2.x (and many other wallets I hope) will be interoperable and support BIP39 in the not-very-distant future.
402  Other / Meta / Re: PM restriction for new accounts is needed on: January 29, 2015, 12:39:50 AM
Maybe a flashing bright red "NEWBIE" warning on PMs by newbies would be enough to deter impersonators/scammers, while not preventing legitimate new users from asking their questions?

Onkel Paul

I don't care for the idea of completely restricting a newbie's ability to send PMs either, but a very visible warning is definitely something I'd support.

Is there a reason why they can['t] post the question publicly?

Yes, at least in my limited case. People don't often like discussing their password details publicly (for the purposes of attempting to recover a wallet with a forgotten password; see btcrecover). I'd be lying if I said I've received tons of such PMs (I've only received a handful), but at the same time I'm sure that newbies who have contacted me are appreciative that they can.

(Full disclosure: although btcrecover is open source, I've rarely (exactly once) agreed to a paid password recovery at the unsolicited request of another.)
403  Bitcoin / Electrum / Re: HELP Forgot Password and Lost Seed on: January 28, 2015, 12:51:30 AM
There are some brute-forcing tools out there available for Electrum (assuming you have a decent idea of what your password is).

I rather like btcrecover (tutorial is here). It's free and open source; of course, being the dev of that one I'm a just a little bit biased...

You can also find a tool towards the end of this thread for Electrum: https://bitcointalk.org/index.php?topic=85495

There are also paid services that can help you out, although I'm unsure of which ones support Electrum. Here are some starting points for the paid services:

If you have any questions about btcrecover, please just let me know.

Good luck!
404  Bitcoin / Bitcoin Wallet for Android / Re: A few questions. on: January 27, 2015, 07:31:42 PM
Phones get lost, IIRC its hard to restore the wallet if you do not have another phone that can run the app.

There is an open-source tool which can extract the mnemonic (seed words) from a Bitcoin Wallet for Android 4.x backup file. The mnemonic is a standard BIP39 mnemonic using the English word list. Although there aren't a whole lot of wallets which directly support the importing of a BIP39 mnemonic yet, that's likely to change in the upcoming months.
405  Bitcoin / Development & Technical Discussion / Re: Are BTC Devs Doing Enough To Encourage Adoption of BTC? on: January 26, 2015, 09:04:58 PM
Core dev work is *almost* orthogonal to making it go "mainstream".  

It's like arguing TCP/IP developers aren't doing enough to make Facebook go viral.

You want Core devs to make sure the core consensus mechanism is humming along. Almost nothing else. 

edit: The blockchain is to give a partial ordering off data published. Nothing else. It's not magic.

You're really not giving the core devs enough credit IMO by claiming their only significant contribution (even if filtered to "mainstream" promotion) is the Bitcoin Core client itself. Where would Bitcoin as a whole be without BIP32, BIP7x, mutlisig, P2SH, etc. despite that fact that some of those are only partially (if at all) implemented in Bitcoin Core (not to mention contributions to the bitcoin.org website as well)?
406  Bitcoin / Development & Technical Discussion / Re: Are BTC Devs Doing Enough To Encourage Adoption of BTC? on: January 25, 2015, 04:51:11 PM
I'm not a big fan of this approach because a third party service owns one of your keys. With 2 of 3 sigs, if they go offline you have to get your 3rd key out of cold storage. Plus they charge for the service.

Charging for the service hopefully decrease the likelihood that they will go out of business, but ultimately it's a judgement call: is the added protection against malware (although not bulletproof) worth the extra transaction fee and the inconvenience should they go offline? I rather think so (although the fee is a bit high for my taste), but to each their own.
407  Bitcoin / Electrum / Re: Any possibility of gaining access to my money? on: January 25, 2015, 04:40:30 PM
Code:
>> wallet.change_gap_limit(200)

Thanks for the hint!
I'm getting this error:
NameError: name 'change_gap_limit' is not defined
after using this command:
change_gap_limit(200)

You mean this command...?
wallet.change_gap_limit(200)
408  Bitcoin / Development & Technical Discussion / Re: Are BTC Devs Doing Enough To Encourage Adoption of BTC? on: January 25, 2015, 03:47:34 PM
Why couldn't 2FA be decentralized and integrated into the bitcoin infrastructure?  It's already proven that bitcoin is transparent and traceable. 

Exactly! "2FA" like Yubikey or Google Authenticator or SMS passcode couldn't be decentralized and integrated into the bitcoin infrastructure BECAUSE bitcoin is transparent.


grendel25,

To put it in a less technical way, any 2FA-style device has to provide a way to prove to someone else that it is in the operator's control. This is done by the 2FA device providing a code.

For Google Auth, YubiKey, and the like, both the device and the someone else (a centralized online service provider) have a common "shared secret", and this secret can be used to generate short codes that are just a few digits long. The shared secret can't be stored in the blockchain because then anyone could generate the codes.

Hardware wallets (and Bitcoin in general) use public-key cryptography and can use a publicly-viewable blockchain to prove that the codes they generate (called signatures) are valid. Unfortunately, the codes that they generate as proof are 155 digits long (or 88 if encoded in Base58), so it wouldn't be very practical to ask a user to type these codes in. That's (one reason) why they transfer these codes via USB.

The point is that you can't have the advantages of both: you can't have a 2FA device which uses public-key cryptography and would be publicly verifiable via the blockchain which also provides short codes. This means we're stuck with either centralization, or hardware wallets which need a digitial connection (USB today, possibly Bluetooth or audio in the future?).

Incidentally, Electrum 2.x does plan on implementing both styles of 2FA, with Trezor and HW.1 on the hardware wallet side, and with TrustedCoin on the centralized short-code side.
409  Bitcoin / Electrum / Re: Any possibility of gaining access to my money? on: January 25, 2015, 12:18:34 AM
Just for future reference, you can use change_gap_limit() instead which doesn't require a restart, e.g.:

Code:
>> wallet.change_gap_limit(200)
410  Bitcoin / Electrum / Re: Any possibility of gaining access to my money? on: January 24, 2015, 01:15:47 AM
You're in a tough situation, pretty much your only option is to attempt to a brute-forcing solution.

There are free (but not necessarily easy) options, and there are paid options. To make matters more complicated, you'll need to decide if you want to try to brute-force your wallet password or your seed. Here's the break-down, as far as I'm aware.

Free options:
  Brute-forcing an Electrum seed: see this thread.
  Brute-forcing an Electrum wallet password: see btcrecover (tutorial is here) or this thread.

Paid options:
  Brute-forcing a seed: ??
  Brute-forcing a wallet password (I don't know which if any of these support Electrum):
    - https://bitcointalk.org/index.php?topic=85495.0
    - http://www.walletrecoveryservices.com/
    - https://bitcointalk.org/index.php?topic=717334.0

FYI I can help out with the btcrecover option if you choose to try it. Good luck....
411  Bitcoin / Bitcoin Technical Support / Re: Encrypted wallet.dat, lost password, any solutions? on: January 18, 2015, 03:00:40 AM
Hello there. I am trying to recover a password of which I think I know the first letters, but where I can't remember the last ones, which were digits if I remember well.

I know I'm not exactly answering your question (sorry, I don't really know ruby either), but if you'd like to try btcrecover (if someone with ruby experience doesn't respond), I can help you with that.

You'd basically need to download it (from the "download zip" button at the page linked above), and then take what's below and save it to a text file named "btcrecover-tokens-auto.txt" in the same directory as the Python script, and then follow the instructions under Quick Start in the Tutorial.

Code:
#--pause --wallet /home/lapa/.electrum/wallets/default_wallet
guili%1,6d

Let me know if you have any questions...
412  Bitcoin / Electrum / Re: Is it safe to store encrypted wallet files all over the internet? on: January 18, 2015, 12:01:52 AM
I have heard that the encryption used for electrum wallets is somewhat open to brute force attacks, which makes me think that even if I've encrypted the wallet, I should still try and keep it offline.

Thoughts?

You do need to be more careful when it comes to storing Electrum wallets online compared to many other wallets.

As others have already noted, nearly all wallets are open to brute force attacks. However, given a strong-enough password, any wallet can be safely stored online. The big problem is in determining whether or not your password is strong enough to resist brute forcing attacks, and there's no easy way to be sure.

This javascript site is the best I know of (thanks to Newar) at estimating password strength: https://dl.dropboxusercontent.com/u/209/zxcvbn/test/index.html. There's an accompanying article discussing its method's strengths and weaknesses here (spoiler: it might be very good, but it's definitely not perfect): https://tech.dropbox.com/2012/04/zxcvbn-realistic-password-strength-estimation/.

What's different about Electrum is that it doesn't use any key stretching, so if you don't use a very strong password, you're much more vulnerable to brute force attacks than some other wallets such as Bitcoin Core or Armory. Here's a quick overview of how many cryptographic operations must be done to check a single password for these two wallet formats:

Electrum: 2 SHA-256's (each a single block long) and 1 block of AES-256 decryption
Bitcoin Core: approximately 100,000 SHA-512's (each a single block long) and 2x blocks of AES-256 decryptions

TL;DR: use a strong-enough password, and you'll probably be safe from brute force attacks, but it's really hard to know what "strong-enough" means.
413  Bitcoin / Electrum / Re: Issue with wallet, restoring from seed creates a new wallet. on: January 15, 2015, 08:21:42 PM
Oh sorry, I ran the tool. What I mean is I think the seed I have is not correct at all for my wallet for some reason. I know there are no misspelling or plural words.

I think the question is did you run the second tool created by jonald_fyookball which assumes your seed is off by one word, and tries all possible seed combinations starting with that assumption (and takes a few hours to complete).
414  Bitcoin / Armory / Re: Armory - Discussion Thread on: January 13, 2015, 10:18:26 PM
what's this Bitcoin Core 0.9.4 update notification i'm getting from Ubuntu?  it's from Launchpad Bitcoin PPA.  what do we do with it?
If 0.9 still works for you, you don't need 0.9.4. It's an(other) OpenSSL libraries clanger

To elaborate a bit, if you follow the advice next to the "News" alert at the top of every bitcointalk.org page, you don't need 0.9.4. It's a minor update whose main reason for existence is to work around the OpenSSL change mentioned in the News alert (plus a few other pretty minor bug fixes).
415  Bitcoin / Development & Technical Discussion / Re: Are big capacity mutli-sig transaction still non-standard on: January 13, 2015, 09:47:31 PM
The last I heard, they were looking into allowing "standard" P2SH multisig up to 15-of-15 for Bitcoin 0.10

There was an issue opened on the bitcoin.org repo (to update the increasingly impressive developer docs) stating that 15-of-15 P2SH transactions have been standard since 0.9.0, and it included this link to the bitcoin repo as evidence of a 1650 maximum byte scriptSig: https://github.com/bitcoin/bitcoin/blob/0.9/src/main.cpp#L543

So it appears that they're already standard unless something else is in the way (in which case I'm sure the bitcoin.org folk would want to know so they can correct the developer docs)...
416  Bitcoin / Electrum / Re: Issue with wallet, restoring from seed creates a new wallet. on: January 12, 2015, 08:14:51 PM
Do you have any older backups of your wallet file?
417  Bitcoin / Bitcoin Technical Support / Re: Bitcoin Core in multi user environment on: January 12, 2015, 05:53:25 PM
You could and I don't know for sure but I'd start with trying symbolic links from the ~/home to the public folder you want to use.

Then several instances of BC will try to write to the same files at the same time.

I don't think there's a straightforward solution to this.

Depends on what you mean with “multi user environment”. If it's a desktop or laptop shared by a family, it's impossible that two people are using it at the same time. Switching accounts may leave programs open, but (as far as I know) they get suspended and should not conflict with others. If it's a server (maybe like an online wallet), then definitely many people can use it, but in that case you should have a single program (other than Bitcoin Core) managing all accounts.

It depends on the OS and settings. In a Unix based multiuser environment (eg OS X) nothing get suspended. Likewise you can have two people using the machine via screen sharing for example.

:-)

Likewise on Windows -- if you lock your account either explicitly (shortcut: windows-L) or implicitly (starting a Remote Desktop session with user #2 while user #1 is logged in), all programs will remain running in the background (except Win8 Metro-style apps, but that's irrelevant). I think shorena's option of running a single Bitcoin Core instance w/o a wallet and then configuring mSIGNA or Multibit clients to connect to localhost is probably the best option.
418  Bitcoin / Electrum / Re: Issue with wallet, restoring from seed creates a new wallet. on: January 12, 2015, 03:54:33 PM
I've blurred out the hex string, even though it just converts to garbage characters- in case there is a way that it could be used to derive the actual seed.


That would seem to indicate that you either no longer have the correct password for the wallet file, or that multiple bytes in the wallet file have changed. Between these two options, the former seems more likely....

If only a single byte were corrupted, then at least the PKCS7 padding would be valid or the count of valid hex-encoded digits would be 16 or greater (because at least one of the three 16-byte AES blocks would still be decrypted successfully).

I can think of three things you might want to try:

1. Have you tried to run jonald_fyookball's (excellent) tool yet with a higher numberofreceivingaddresses and numberofchangeaddresses to see if any of the generated addresses are yours (if any of them exist on the block chain)?

2. Attempt to brute-force your wallet password with either an open source bitcoin password recovery tool or using one of the paid services in the Services section of the forum.

3. Attempt to brute-force your mnemonic on the assumption that one of the words is wrong or swapped with an adjacent word (although I'm not aware of any tools or services that exists to do this).
419  Bitcoin / Electrum / Re: Issue with wallet, restoring from seed creates a new wallet. on: January 11, 2015, 07:00:12 PM
I actually was able to (with help from a friend) get the code to work after you updated it, and my password did not work.
What are all of the error messages it produces?

however my password seems to show the seed on electrum now, but just with 0 words..
I've no idea why that is....
420  Bitcoin / Electrum / Re: Issue with wallet, restoring from seed creates a new wallet. on: January 11, 2015, 01:33:46 PM
This is a tool that might (emphasis on might) give a more detailed error message on why your password isn't working. It simply displays your Electrum seed if the password is correct, and if not it prints one or more error messages.

If you choose to run it, post the results back here and I'll let you know what I think (it's a Python script which I wrote).

(Obviously, if it reports back any actual seed information, don't post it!)

Traceback (most recent call last):
  File "D:\Downloads\decrypt_electrum_seed-master\decrypt_electrum_seed-master\decrypt_electrum_seed.py", line 217, in <module>
    seed_str, mnemonic_str = decrypt_electrum_seed(wallet_file, get_password)
  File "D:\Downloads\decrypt_electrum_seed-master\decrypt_electrum_seed-master\decrypt_electrum_seed.py", line 121, in decrypt_electrum_seed
    if unicodedata.normalize('NFC', password) != unicodedata.normalize('NFD', password):
TypeError: must be unicode, not str

Sorry about that; there was a bug related to ASCII/Unicode conversion, now fixed. Could you download a new copy and try it again?
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 [21] 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!