"Minutes ago, eurozone finance ministers announced that they've agreed to give Greece four months of breathing room in which to get its financial house in order. In that time, Greece will either work out a debt restructuring with its creditors or create a fully-functioning economy capable of managing the developed world's second highest ratio of government debt-to-GDP." Source : http://www.marketoracle.co.uk/Article49525.htmlWhat do you think guys, Can the Greece go "back" as it was before or not?
|
|
|
It seems that "this way" your cold wallet still gets effectively "connected" (even through an intermediary) to the Internet in the end. Do I still miss something?
Sorry but I've edited my thread , check the two link and if you want more info then google " how to sign a transaction offline". If they have connected on internet their cold wallet it is obvious you cannot "name" it " cold wallet" anymore . I guess that the only possible way to really "sign a transaction offline" and be 100% sure that the keys are not compromised would be to write down all necessary TX info manually on paper and then enter it into the client connected to the Internet by hand. When you sign the transaction offline you have only to "broadcast" it on an "online machine". So you can transfer this "transaction" through email, or .txt on an usb, etc... I t is not important how will you will transfer this signed tx, the only thing is the secure signing of the TX (offline). Perhaps, that's what the bter staff thought (and got burned). The method of transfer cannot be considered safe or "offline" if it can be used to secretly transfer your private keys as well. This way almost all means of electronic communications (email or a .txt file on an usb) should be deemed as potentially compromising and not far in effect from directly connecting a cold wallet to the net. For example, I've generated this TX offline and it gives me this raw transaction "code" : 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 So now everyone of you can "push/broadcast" it here : - https://insight.bitpay.com/tx/send- https://blockchain.info/it/pushtxSo it is impossible to "stole" a private key during this process (if the cold wallet is offline) . You generate the transaction and after broadcast it on another pc (connected on internet).
|
|
|
What signature campaign bot features would you like to see?
I would like to see clickable username in the list, that will transfer you on the user's profile here in the forum (if it is possible). As per your request: http://notify.elmeda.net/thebot/Thanks marcotheminer, but maybe I've find a bug. When I click for example "Start post number" and it gives me the list (in order) the "usernames" aren't clickable anymore. Ps: also for the other option.
|
|
|
What signature campaign bot features would you like to see?
I would like to see clickable username in the list, that will transfer you on the user's profile here in the forum (if it is possible). Thanks.
|
|
|
It seems that "this way" your cold wallet still gets effectively "connected" (even through an intermediary) to the Internet in the end. Do I still miss something?
Sorry but I've edited my thread , check the two link and if you want more info then google " how to sign a transaction offline". If they have connected on internet their cold wallet it is obvious you cannot "name" it " cold wallet" anymore . I guess that the only possible way to really "sign a transaction offline" and be 100% sure that the keys are not compromised would be to write down all necessary TX info manually on paper and then enter it into the client connected to the Internet by hand. When you sign the transaction offline you have only to "broadcast" it on an "online machine". So you can transfer this "transaction" through email, or .txt on an usb, etc... It is not important how will you will transfer this signed tx, the only thing is the secure signing of the TX (offline).
|
|
|
It seems that "this way" your cold wallet still gets effectively "connected" (even through an intermediary) to the Internet in the end. Do I still miss something?
Sorry but I've edited my thread post , check the two link and if you want more info then google " how to sign a transaction offline". If they have connected on internet their cold wallet it is obvious you cannot "name" it " cold wallet" anymore .
|
|
|
I used TOXCOIN for the first time and I am very impressed with their service and support. My support requests were handled very quickly and thoroughly.
Thanks for your feedback Good news for our customers: For the next 24 hours we charge only 1% for Perfect Money and Payeerexchanges!A good news would be : the use of a multiSig address as deposit addresses. It would be really interested ,because only a few exchange use it (like bit-x.com , theRocktrading.com & bitStamp.net).
|
|
|
It is most probably the first option, the hacker didn't have the access to their hot wallet, and this is demonstrate that the cold wallet it was not a real cold wallet. I think (maybe) :
1) a bad generation of the cold wallet's addresses, 2) an error/mistake of an employee, that had connected the cold wallet to "internet", 3)An inside job.
1) I think this option is the least probable among others. 2) Just connection is unlikely to be enough. They must have had a trojan in their 'cold' wallet system. What they were using their 'cold' wallet for, to get infected??? BTW if this option is really what happened, they likely were infected between Feb 2nd and Feb 14th. 3) Must be thoroughly investigated in any cold wallet theft case. 1) it depends of what wallet they have used to generate bitcoin addresses, 2) It is called "cold wallet" and it never should be never connected on internet,3) this is the most probable "option" but we should wait some news from them. Their weibo/twitter profile has not yet been updated. I don't quite understand what you mean here by "it should be never connected on internet". How on earth are you going to fill hot wallets from it if it is never to be connected to the Internet? Simple , you create/sign the transaction offline and then you "broadcast" it on another pc (connected on internet). Do you know this "technique" ? Here an example with "electrum" : https://electrum.org/offline_wallets.html and here a thread : https://bitcointalk.org/index.php?topic=651344.msg7306076#msg7306076 (with bitcoind).
|
|
|
It is most probably the first option, the hacker didn't have the access to their hot wallet, and this is demonstrate that the cold wallet it was not a real cold wallet. I think (maybe) :
1) a bad generation of the cold wallet's addresses, 2) an error/mistake of an employee, that had connected the cold wallet to "internet", 3)An inside job.
1) I think this option is the least probable among others. 2) Just connection is unlikely to be enough. They must have had a trojan in their 'cold' wallet system. What they were using their 'cold' wallet for, to get infected??? BTW if this option is really what happened, they likely were infected between Feb 2nd and Feb 14th. 3) Must be thoroughly investigated in any cold wallet theft case. 1) it depends of what wallet they have used to generate bitcoin addresses, 2) It is called "cold wallet" and it never should be never connected on internet, 3) this is the most probable "option" but we should wait some news from them. Their weibo/twitter profile has not yet been updated.
|
|
|
BIPOLARBOB Can you please type something here ? ![Sad](https://bitcointalk.org/Smileys/default/sad.gif) we've missed you for way to long now Have you missed him or his bitcoin ![](https://ip.bitcointalk.org/?u=http%3A%2F%2Fwww.zellfantasy.it%2Fpublic%2Fbalambforum%2Fimages%2Fsmilies%2Femo_asd.gif&t=663&c=fWRAGrd617GFqQ) ?// Sarcasm. However Bipolarbob was (is) a great and generous person, don't change !
|
|
|
420 is back ! I don't know you, but I like your username ! Welcome back 420. Almost 1 year of absence, what is happened?
|
|
|
Just to be clear: "D D 4 B C" is the one DDoS-ing them and trying to extort them to give BTC so he will stop DDoS-ing. Obviously he will repeat DDoS-ing after a few days, which is why no one should be paying him. https://bitcointalk.org/index.php?action=trust;u=353891He basically do this to all bitcoin sites or something. He complains in the topic so he hopes others will complain too and the site feels pressure to stop this asap. Thanks for the information, I suggest you to give him a negative feedback. I hate these type of users (Extortionists).
|
|
|
To all: sorry gan" ane ga ol kemaren, ada urusan di RL. 1. Ane ga pernah PM sama Candystripes, fiesta, quickseller. 2. Ane gatau kenapa trust ane bisa neg dan di sangka scammer. 3. Waktu ane nyadar kena hack, ga ada bekasnya, dari post, PM inbox ataupun outbox. 4. Ane ga pengen dan ga pernah niat ataupun bilang kalau mau jual akun, kalau ga salah ane pernah post di thread signature campaign kalau ntar udah Sr.member ane bakal pindah sig campaign. 5. Kalo menurut ane pas akun ane di hack, dan dpt neg trust si Candy lngsung ngehapus PM/inbox/post skenarionya. ~ikiCan someone translate his post? I don't know the indonesian language, thanks for the attention.
|
|
|
Can you prove the real ownership of the account with a simple signed message from an old bitcoin address?
With any old bitcoin address? Yes, but it is obvious that address should be posted in one of the "old posts" here in the bitcointalk forum.
|
|
|
Google translate on their Weibo page suggests that the hacker compromised the mechanism for refilling the hot wallet from the 'cold', allowing them to empty it.
That might explain the two transaction 10 minutes prior the 7K. 1 and 2Forget what I said, that doesn't make sense, since the funds went directly from the cold wallet to the hackers address and not to the hot wallet. So I looks like the "hacker" didn't have access to the hot wallet or it wasn't in his interest to empty it. It is most probably the first option, the hacker didn't have the access to their hot wallet, and this is demonstrate that the cold wallet it was not a real cold wallet. I think these are the three possible scenarios (maybe) : 1) a bad generation of the cold wallet's addresses, 2) an error/mistake of an employee, that had connected the cold wallet to "internet", 3) An inside job.
|
|
|
Can you prove the real ownership of the account with a simple signed message from an old bitcoin address?
|
|
|
Escrow is ok. Will shipp from Europe Latvia.
Perfect, I suggest you to add these information in your first post. Use the "edit" function (at the right side of your initial post): ![](https://ip.bitcointalk.org/?u=https%3A%2F%2Fi.imgur.com%2FfWw260c.png&t=663&c=oo7h8Ojc8tYuXA)
|
|
|
I suggest you to store them with a paper wallet and forget of these 2 bitcoin for about 3-4 years (or at least remember them before the next halving ~ July 2016). I want also to tell you : buy bitcoin now it is so cheap. Don't sell them now the price is not "true".
|
|
|
From what country will you ship this playstation? Will you use escrow or not ?
|
|
|
|