Bitcoin Forum
June 17, 2024, 06:03:54 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 [24] 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 »
461  Bitcoin / Armory / Re: My windows is dead, I have Hackintosh, can I open my armory there? on: November 21, 2014, 10:53:32 PM
Perfect! I just imported them. Now, I can't seem to get my Armory client online to check my balance with the blockchain and download a database. Is Armory online feature not available on mac?

I'm sure that feature is available, but I'm afraid I know next to nothing about OS X and so I probably can't help you very much...

Just like on other OS's, you do need Bitcoin Core installed and synced. Have you done that yet?
462  Bitcoin / Armory / Re: My windows is dead, I have Hackintosh, can I open my armory there? on: November 21, 2014, 10:15:06 PM
The Armory file format is the same across platforms, so you should be able to use the 'Wallets -> Import or Restore Wallet' menu option to import an Armory .wallet file.

This will tell you where to find your wallet file on your old hard drive for most operating systems: https://bitcoinarmory.com/faq/#q3
463  Bitcoin / Electrum / Re: Displaying "incorrect password" when i'm sure it is correct. on: November 20, 2014, 11:59:27 PM
Do you mean that when you created your wallet, you chose a password that was the same as your seed?

Although there shouldn't be any problem with that, I have to ask... how do you remember it? The point of having a separate password is so that you don't need to remember the seed....

In any case, if you have the full seed (it should be twelve words long), you can just do a File -> New/Restore, create a new wallet file, choose to Restore from its seed, and then paste it in.
464  Bitcoin / Hardware wallets / Re: Bitcoin Wallet for Android on: November 20, 2014, 11:19:18 PM
Since my own thread doesn't get much attention I'm going to ask it here:

Is there by chance any method to remove an address from my wallet? Either by modifying the backup (which I just can't decode for some reason) or in the app itself?

I have an address that receives many big transactions and it completly kills the app, yet I want to keep using the other addresses that I have if possible.

Assuming that the address you want to remove was created prior to version 4.0 (roughly the beginning of October), and that you're running a recent version today (3.47 or later), it is theoretically possible but would be a giant pain, not to mention fraught with peril. (If you're currently running a version older than 3.47, it's actually much easier. If the address you want to remove was created after version 4.0, it may not even be possible).

So, how important is it to keep your old addresses? Is it worth a few hours of your time? More importantly, is it worth paying somebody else for a few hours of their time to figure out and document how to do this (would involve decrypting a backup (easyish), modifying a protobuf-format wallet file (not so easy...), and re-encrypting it (easyish) so that it can be restored in the app)?

If you're an IT person and would like to try figuring it out yourself, I could give you some starting points, but like I said it won't be easy....
465  Other / MultiBit / Re: bitcoinj - running support node on: November 20, 2014, 09:48:41 PM
Although bitcoinj has a full node option, I don't think MultiBit can be configured to use it (I could be wrong though).

You can run bitcoind or btcd on the same machine (or on another) and then force MultiBit to connect to it and only it. This gives you the benefit of using full height-based transaction validation. To do so, locate your multibit.properties file (in the %AppData%\MultiBit folder on Windows) and add this (it's just a text file):

Code:
singleNodeConnection=127.0.0.1

(or some other IP or DNS name)
466  Other / Beginners & Help / Re: GPU brute forcing an encrypted wallet on: November 20, 2014, 08:26:10 PM
silverfuture and btchris, would you mind telling me (or through PM) about how complicated the password is (length? consists of upper-case/lower-case/special/numeric characters?) and how long the brute-forcing process takes?

I hope you'll understand that I will not... that's up to silverfuture to decide.

Although if you have a set of password criteria in mind, I might be able to estimate such a thing for your circumstances, but you'd need to be fairly specific (about the password, about your wallet software, and possibly about your PC as well).
467  Other / MultiBit / Request for a MultiBit HD beta tester on: November 06, 2014, 04:27:59 PM
I have a favor to ask of someone who already has MultiBit HD built and installed.

I'd like to get a copy of a newly created & empty wallet file. I could d/l the JDK and build it myself.... I'm just being lazy and hopeful that someone might take a few minutes to help me out.

If anyone's willing, specifically I'd like a:

  • Newly created wallet,
  • this password used to protect it: btcr-test-password
  • nothing else added to it or changed.

FYI this is so that I can test bitcoinj support I recently added to btcrecover.

If anyone's willing, please email the wallet file to cenrug-mbhd@yahoo.com. I'll lock this thread if I get any takers.

Thanks!


n/m
468  Other / MultiBit / Re: WALLET GONE AND BACKUP NOT WORK █ earn 2 coins for fixing this4me █ on: November 03, 2014, 10:56:28 PM
Wow, thanks for the insight, I really do appreciate it. Even if I do find that it isn't a password problem, I am still convinced that I likely did something wrong and I am going to feel like a complete dick for wasting everyones time. I have a curiosity that often drives me into situations where I really have no business being because I know nothing about what I am getting myself into. When I was younger this wasn't a problem because I could learn from my mistakes and be better off because of it. Now I am 32 and my brain decided a while back it will no longer retain any new information. That being said, I absolutely DO NOT expect anyone to try and walk me through this step by step, but I absolutely DO appreciate any input or help because I am very anxious to get this resolved. So if this does get resolved and it ends up being a mistake on my part, I do apologize in advance.

A lot of people on this forum choose to help out just for the heck of it, or just because they believe that Bitcoin has a future. For me, it's also (in part) because I hope to learn something new. So, for whatever it's worth, you're helping me Smiley (and by the way, I'm actually older than 32 by a little...)

As far as openssl goes, I am willing to give it a shot. If I end up feeling it is too much for me, then I will pass the information on to a friend. But the info that has been given for openssl is for Windows, I am using an iMac OSX version 10.9.5.

Sorry, I really know almost nothing about OS X. I suspect that OpenSSL comes pre-installed on it, so that should actually make your life easier, it's just a matter of navigating the command line interface.
469  Bitcoin / Armory / Re: Armory not accepting password? on: November 03, 2014, 10:47:31 PM
There are many pitfalls here, e.g. the caps lock key (as VanityMemory already mentioned), the input method editor, using different keyboard layout languages, and just plain-old-typos. However, if there's something wrong with the wallet file itself, there are two ways you can attempt a recovery. (These are Windows-specific instructions; Linux will differ.)



Method 1 - restore from digital backup

1. Open Armory and take note of the ID of the wallet you're having trouble with.
2. Close Armory.
3. Go to the Start Menu, click Run (or hold down the Windows key and press R -- on Windows 8 this is the right alternative).
4. Type this in the text box: "%appdata%\Armory", and then click OK to open the wallet storage directory.
5. Right click on the wallet file that has the ID you noted in step 1 (and doesn't contain "backup"), and click "Cut".
6. Minimize your windows, right click anywhere on the Desktop, and click "Paste" to move your wallet file to the Desktop for safe keeping.
7. Open Armory.
8. Click the "Import or Restore Wallet" button (you'll have to wait until Armory reaches an "Online" state).
9. Choose the "Import Digital Backup" option.
10. Type this in the Filename text box: "%appdata%\Armory", and click the "Open" button.
11. Select the wallet file that has the ID you noted in step 1 (and does contain "backup"), and click the "Open" button.
12. Click "Yes" when prompted.


If this doesn't work, you'll need to restore from your paper backup (you did print one out, right? Wink)

Method 2 - restore from paper backup
(This method may not restore all of comments you've added to your wallet, but it should recover all of your bitcoin funds.)

1. Follow steps 1 through 8 above, if you haven't already.
2. Click the "Import or Restore Wallet" button.
3. Choose the "Single Sheet Backup" option, and then just follow the instructions.

If neither of these options work for you, there might be a typo in your password. There are tools that can try to search for typos in your password (e.g. btcrecover), but they they do require some effort to use....

Let us know how this turns out (hopefully well!)
470  Other / MultiBit / Re: WALLET GONE AND BACKUP NOT WORK █ earn 2 coins for fixing this4me █ on: November 03, 2014, 05:59:32 PM
At this point my best bet would probably be trying to bribe a friend to come over and give it a shot. I'll try to do that soon and let you know if I make any progress.

That sounds like a good idea Smiley

With that being said, I'm still going to remain VERY skeptical that a typo was made until proven otherwise.

I agree... I'm grasping at straws here.

I discussed this on another message board with one of the developers and the user "clubshaft", who originally started this thread. I joined in on the discussions clubshaft started because it was the only user with a similar problem I could find and wasn't on a really old thread. His english doesn't translate very well, and this stuff is already over my head so I'm not sure I understand 100%, but it seems he did find a solution.
If you are interested and have time, check out the conversation and let me know what you make of it. Here is a link:
https://github.com/jim618/multibit/issues/620

Thanks for the link, I added a note to that issue a short while ago. It appears that clubshaft was using the correct password, but more than one of his .wallet and .key files were corrupted, and he eventually was able to recover an older .key file he retrieved using a file restoration utility. I'm not sure I agree with his conclusion that the file corruption was the result of a bug in MultiBit, but I've no way to tell. It would be interesting to examine both his corrupted and uncorrupted files to look for differences... that might give some insight as to the source of the corruption (or it might not).

Have you tried following gary-rowe's advice regarding openssl yet? I'll repost it below (slightly modified for a default Windows install):

Now that you have a .key file do the following (I've made the instructions step by step for Windows):

1. Ensure you have OpenSSL installed. Specifically, you should choose "Win32 OpenSSL v1.0.0o Light".
2. Copy your multibit key file into the C:\OpenSSL-Win32\bin folder, and rename it to "multibit.key".
3. Open the command prompt and navigate to C:\OpenSSL-Win32\bin (on Windows type "cd \OpenSSL-Win32\bin" at the command prompt).
4. Enter the following at the command prompt on a single line:
Code:
openssl enc -d -p -aes-256-cbc -a -in multibit.key -out decrypted.txt -pass pass:yourpassword
Change "yourpassword" to your password (but leave the "pass:" prefix in there).

OpenSSL will attempt to decrypt the file and will tell you if it is successful. The decrypted keys will be placed in decrypted.txt and should now be considered compromised. You'll need to sweep funds out of them as soon as possible into a safe area. If you have those keys you have your bitcoins.

If you open the decrypted.txt file in a text editor like Notepad, you should see one or more lines like this, one for each key:
Code:
L3BdsUEuHb15LgPp8ZpEhckMdRj4bPnrj352RgqgUUVKvngnBDph 2014-05-20T18:38:41Z

You can see the key file format here: https://multibit.org/en/help/v0.5/help_exportingPrivateKeys.html
471  Other / Off-topic / Re: Am I the only girl on here? : ( on: October 30, 2014, 09:57:10 PM
So much spam and the signature is a mere happy face

*sigh*
Women
Stick to the topic.

Agreed.
472  Other / Off-topic / Re: Am I the only girl on here? : ( on: October 30, 2014, 09:33:25 PM
So much spam and the signature is a mere happy face

*sigh*
Women



what do you mean spam? Also, what's wrong with a happy face?

Spam-- as in the junk that people like awesome31312* add to their sig in the hopes of netting a few pennies. (yeah I know I should just enable the "Don't show users' signatures" option and stop complaining)

* nothing personal, I just hate sig spam
473  Economy / Digital goods / Re: CoinJack 1.5 - start your own blackjack casino! on: October 30, 2014, 09:23:03 PM
Regardless of shoe size, a reshuffle occurs before every hand. (Implementing it any other way would be problematic due to the the provably-fair requirement.)

so you are saying that this script is set to reshuffle before every new hand?
Correct.

At first glance, that seems... silly. But if you consider how it works, and how it might work if there wasn't a reshuffle before each hand, it makes more sense.

Right now, at the beginning of each hand you're given access to a hash of the shoe. At the end of a hand, you're given access to the entire contents of the shoe. This supposedly* makes the game fair because the server can't change the shoe after the game has begun.

Obviously, once the shoe is revealed, it can't be used for the next hand, so a reshuffle is in order. An alternative would be to only show the entire contents of the shoe right before a reshuffle, e.g. once 66% or 75% (or some other %) of the shoe was used up and a reshuffle would be "normally" required.

But what happens if the player wants to leave before the next reshuffle? In other words, if the player wants proof that the game isn't rigged, should they be forced to continue playing until the next reshuffle?

One option might be to allow the player to view the contents of the shoe at the end of any hand of their choosing (which of course would be followed by a reshuffle), but this isn't any better. A card counter could use this to their advantage and force a reshuffle whenever the count gets too low. (This sort of strategy is possible IRL but more difficult because it involves moving between tables under the watchful eye of security.)

So there probably isn't a better option; had I been the coder I probably would have made the same decision.

* I haven't actually looked at CoinJack's provably fair algorithm, so I don't claim it actually is provably fair, I'm just taking their word for it. If all they provide is a hash of the shoe and nothing more, there would definitely be some problems....
474  Economy / Digital goods / Re: CoinJack 1.5 - start your own blackjack casino! on: October 30, 2014, 08:20:15 PM
the dev is a nice guy and knows how to code, but  (no offense) he has no clue about Black Jack.
we should try to help him to give the script buyers and future OPs the right rules so the OP can chose the %age he wants to offer to the players.

I get the same impressions (not that I'm any sort of BJ expert though... I haven't played in years). There's a lot of good information available on the topic, though.

regarding number of decks, lests ay 6 decks are used how deep will the shoe go until it reshuffles? I would prefer if there would be an option to reshuffle after each round

Regardless of shoe size, a reshuffle occurs before every hand. (Implementing it any other way would be problematic due to the the provably-fair requirement.)
475  Bitcoin / Development & Technical Discussion / Re: Signature Mining (to embed messages into the blockchain without using OP_RETURN) on: October 30, 2014, 06:04:44 PM
I was just bringing up that point -- none of this really applies to open source implementations.

Okay - yes - I understand the issue of poor k values (which have been exploited already in Android).

Although deterministic is most likely a more secure method of generating addresses it of course would make this data injection method unfeasible.

The two are incompatible with one another, but there would remain no way that an outside observer (who doesn't have the privkey used for a signature) to determine if k was generated deterministically or it was "mined", so your method remains possible (and it's pretty cool that you went and implemented it Smiley).
476  Bitcoin / Development & Technical Discussion / Re: Signature Mining (to embed messages into the blockchain without using OP_RETURN) on: October 30, 2014, 06:00:02 PM
...
I was just bringing up that point -- none of this really applies to open source implementations.

In theory.  

But look at heartbleed, shellshock, Ken Thompson's self-referencing Unix C compiler, perhaps truecrypt etc.

Open source does not imply that one is safe.  It certainly is helpful to verify that there are not back doors, but if you don't have enough people looking at it and security audits, well hidden bugs or intentional backdoors are easy to miss.  Obfuscated code that has intentional vulnerabilities can be difficult to spot.

Consequently, it is important to bring up vulnerabilities like this and discuss them - I'm glad you mentioned it.

 Smiley


Yes, and it's quite salient that you brought up TrueCrypt -- it has some leaky side channels which (before the ongoing audit began) were pointed out as avenues for exactly this kind of evil-implementation attack (and yes the source code was examinable at the time, but there wasn't a reproducible build process for Windows).
477  Economy / Digital goods / Re: CoinJack 1.5 - start your own blackjack casino! on: October 30, 2014, 05:34:59 PM
Here are the rules of a version that I tested a little while back (I don't know what's changed since then).

  • number of decks: configurable according to OP
  • dealer wins ties (very uncommon, typically it's a push)
  • double after hit allowed and on any card values (fairly uncommon)
  • can't split more than once (split 3 times for up to 4 hands is more common)
  • double after split allowed
  • hitting (and/or doubling) after splitting aces allowed
  • BJ pays 3 to 2 or 6 to 5: configurable according to OP
  • dealer peeks (if dealer starts with 21, the hand immediately ends)
  • can't double for less (uncommon)
  • dealer hits on soft 17: configurable according to OP
  • no insurance
478  Bitcoin / Development & Technical Discussion / Re: Signature Mining (to embed messages into the blockchain without using OP_RETURN) on: October 30, 2014, 04:57:11 PM
I thought that the ability to create subliminal messages in a security protocol was generally considered a flaw of that protocol.

For example, an evil ECDSA implementation could leak a user's private key to the implementation's authors. Isn't that (one) reason that newer ECDSA implementations deterministically generate k?

(I'm just repeating what I've read elsewhere on the forums and on the web, e.g. DJB's blog.)

For a start you'd need to *be aware* that the subliminal message exists (there is no way to tell by just looking at the sigs especially if you don't know how the code that encoded them is working as the placement of the message bytes can be made arbitrary).

Also this is only removing 1 or 2 bytes of security (assuming you could work out what had been purposely injected) which is not going to let you crack a private key.

If you consider a "vanity address" it is the same thing. Just because you know that I have an address that is prefixed with 1ciyam does not mean you are going to be able to *crack its private key* (if it were that easy then there should be zero BTC at my sig address - but there isn't).

Sorry, I wasn't very clear.

The "attack" I was trying to refer to involves an evil (and closed source) ECDSA implementation that intentionally leaks X successive bytes of a privkey in each signature it creates. Only someone aware of the leak, e.g the authors of the implementation, would able to take advantage of it. Given multiple signatures, the evil authors could reconstruct privkeys of those using their implementation.

An advantage (perhaps not the main advantage though) of a deterministically generated k is that one can validate the output of a closed-source implementation without needing the source code (assuming the method of generating k is published). If for example ProprietarySoft Corp. published an ECDSA library, researchers could verify that it wasn't using this channel to leak privkeys.

I was just bringing up that point -- none of this really applies to open source implementations.
479  Bitcoin / Development & Technical Discussion / Re: Signature Mining (to embed messages into the blockchain without using OP_RETURN) on: October 30, 2014, 03:21:05 PM
I thought that the ability to create subliminal messages in a security protocol was generally considered a flaw of that protocol.

For example, an evil ECDSA implementation could leak a user's private key to the implementation's authors. Isn't that (one) reason that newer ECDSA implementations deterministically generate k?

(I'm just repeating what I've read elsewhere on the forums and on the web, e.g. DJB's blog.)
480  Other / MultiBit / Re: WALLET GONE AND BACKUP NOT WORK █ earn 2 coins for fixing this4me █ on: October 30, 2014, 01:58:17 PM
I get message "The private keys unlock failed. The error was "Could not decrypt input string". Unlike when I try to change or remove the password, I get that same error message regardless of what password is attempted.

I hate to say it, but that makes it seem like a mistake in the password you're using (I'm still not 100% sure though). You've already tried a bunch of combinations, but did you follow bitbaby's advice regarding the use of an Input Method Editor (if you've ever used one)? Do you ever switch keyboard layouts (e.g. between English/ASCII and Cyrillic)?

If it is a typo in the password, you'll have to look into a password recovery tool (or a paid service). This one can try different combinations of typos in a starting password, it's free but it's tricky to get working if you're not familiar with using the command line: btcrecover. The Quick Start is here.
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 [24] 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!