Bitcoin Forum
June 30, 2024, 01:13:07 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 [24] 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 ... 481 »
461  Bitcoin / Development & Technical Discussion / Re: Bitcoin Notes on: December 16, 2022, 10:11:56 AM
Recently, I saw a chap post online about bitcoin denominated cards that have the private key embedded in them. (My concern is, how can you know the private key without opening the card, and even then, how can you know someone else does not also have a copy?
You don't need to know the private key until you want to send the bitcoins. There is no way to know if someone else has a copy of a private key unless they use it or reveal it.

Could you reveal part of the private key (so that you have some authenticity) then have some kind of gadget that sends a message on chain to keep a record that the card has been opened, or something like that?

The card could have a chip that will sign a message to prove that it has the private key. It could also destroy the private key after revealing it to prevent anyone from using the card after the private key has been revealed.
462  Bitcoin / Development & Technical Discussion / Re: An IDEA for BTC ˝ ing structure. on: December 13, 2022, 09:30:52 AM
And BTC has a real issue not very far away. By 2056 block reward is only 0.0122xxxx

What is the issue and how bad is it?
463  Bitcoin / Development & Technical Discussion / Re: An IDEA for BTC ˝ ing structure. on: December 12, 2022, 08:18:46 PM
Eventually, the subsidy will be 0. It cannot be avoided. I don't think that delaying the inevitable accomplishes anything.

By slowing the cycle down the rewards continues at a reasonable pace for miners

Slowing down the pace does not help the miners, and increasing the 21 million limit only subsidizes inefficient miners.


and the incentive to use LN network to avoid fees on the chain is increase.

Creating artificial incentives to use LN will only hurt Bitcoin and LN as the value derived from those incentives must be taken from someone.
464  Bitcoin / Bitcoin Discussion / Re: 4000BTC encrypted wallet.dat (HELP NEEDED) on: December 07, 2022, 10:40:12 PM
Recently I got access to an encrypted wallet.dat which contains 4000 Bitcoins.

I hope you didn't pay for it. If you did, you have been scammed.
465  Bitcoin / Bitcoin Discussion / Re: An Unknown Individual Signed a Message Associated With BTC Block 1,018 -Jan/2009 on: December 07, 2022, 10:31:43 PM
"... a newly created bitcointalk.org profile, called “Onesignature,” shared a signed message tethered to an extremely old block reward created on Jan. 19, 2009. The key was associated with bitcoin block 1,018 which was created 16 days after Satoshi Nakamoto launched the network."

Personally, I have no idea what the excitement is all about.

Is it because someone still has access to a private key from 2009? Is it because that person may have been of the earliest miners?

What makes this person so newsworthy?
466  Bitcoin / Development & Technical Discussion / Re: Format of the keys on: December 07, 2022, 10:29:17 AM
Actually every wallet or key took I've seen uses WIFs which is base58 encoding and they may show the hexadecimal format on top of that but not as the main encoding.

In the Bitcoin world, the private keys we see are usually encoded with Base58Check, but in other applications they are typically encoded as base-64 after being encrypted.
467  Other / Beginners & Help / Re: Blockchain can underatand , but BTC price where it comes on: December 07, 2022, 10:18:33 AM
I know the economics, demand and supply determines the price. But here how technically price comes from?

I'm not sure what you mean by "technically" as you have stated that the price is determined by supply and demand.

Maybe you are asking about how prices are reported. The reported price is simply the price of the most recent trade on an exchange, or an average of most recent trades across different exchanges or over time. The precise source of a reported price depends on who is reporting it.
468  Bitcoin / Development & Technical Discussion / Re: Simple private key to public key converter on: December 07, 2022, 10:08:51 AM
If you want C code, this will give you plenty: https://duckduckgo.com/?q=elliptic+curve+library+C

Keep in mind that most people don't write their own because there are already libraries in most languages that have been tested.
469  Bitcoin / Development & Technical Discussion / Re: Randomly picking 24 words from the BIP39 wordlist on: December 04, 2022, 10:48:09 PM
@larry_vw_1955

If you strongly believe that you have a better method, then the best thing to do would be to publish a BIP so that everyone can see the merits of your proposal. Those who like your proposal will adopt it, and those who don't will not.

That's one of the beauties of open source development -- you can implement anything you want without the permission or approval of anyone else.
470  Bitcoin / Project Development / Re: old Bitcoin addresses as 'NFT' on the Bitcoin blockchain - 'signature chain' on: December 03, 2022, 10:22:55 PM
The transfer does not include the private key for the address, so how can it be claimed that ownership of the address has been transferred? Furthermore, even if the private key is also transmitted, then ownership is only shared and not transferred because the previous owner still has the private key.
In this 'NFT' project we call it 'ownership'.

I think I understand completely.

My question is what does "ownership" in this system mean? What is the significance of "ownership" beyond simply controlling the address in the last signed message in the chain? How does it relate to the real world? How does it relate to the common definition of the word "ownership"?
471  Bitcoin / Bitcoin Discussion / Re: Is this Satoshi? Did he sign that message? on: December 03, 2022, 09:26:03 PM
Note that Bitcoin itself is based on the this concept. When you transfer bitcoins you are simply extending a signature chain.

However, the system proposed here has a problem shared with NFTs -- the system transfers only an abstract notion of ownership. It doesn't have the ability to transfer full ownership, by which I mean all of the capabilities, rights, and responsibilities commonly inferred by that term.

Specifically this:
The transfer does not include the private key for the address, so how can it be claimed that ownership of the address has been transferred? Furthermore, even if the private key is also transmitted, then ownership is only shared and not transferred because the previous owner still has the private key.
472  Bitcoin / Project Development / Re: old Bitcoin addresses as 'NFT' on the Bitcoin blockchain - 'signature chain' on: December 03, 2022, 09:24:34 PM
The transfer does not include the private key for the address, so how can it be claimed that ownership of the address has been transferred? Furthermore, even if the private key is also transmitted, then ownership is only shared and not transferred because the previous owner still has the private key.
473  Other / Beginners & Help / Re: Most suitable way to confirm transaction using cryptography? on: December 03, 2022, 08:31:20 PM
Payments are not handled by the cashier, it is a system where the customer can pay via a QR code printed on the product which only allows the user to view the details of the product and pay for it.

Yes the payment is in FIAT

Fake payments/ Theft is basically a situation where the customer picks the product and walks away without paying for it, I am thinking about how can I possibly stop this using cryptography.

Only product details and a predefined payment button after the QR is scanned are what I intend to be public.

The main goal of this product is that the cashier should be the 2nd option for the customer.

RFID tags are kinda useful in this situation, but not exactly. I don't want some employees to remove the tag from products after the payment is made so that it could leave the store. If the payment is made for the product, then the product/tag should be smart enough to detect whether or not it was a successful transaction.

I think you are overthinking it. Here is a solution:

Every item has a RFID. An app on the customer's phone scans the item and pays for it. The payment is recorded in a database. When the customer walks out, the tag is scanned again and the database is queried  to determine if has been purchased. There is no need for a smart tag. The scanners do all the work. The tag doesn't have to be removed. In fact, you probably want to make it difficult to remove.

However, Amazon is already way ahead of you. They have stores where you just walk in, take what you want, and then leave. The store's cameras identify you and everything you take, and then charge your credit card.
474  Bitcoin / Bitcoin Discussion / Re: Is this Satoshi? Did he sign that message? on: December 02, 2022, 11:24:09 PM
Guys did seriously no one notice that the guy you're talking about went and signed yet another message within this thread?

I noticed. I don't know what the significance is, though.

It doesn't prove much except that OneSignature was able to obtain (or create) two signed messages, and that the signer of the first message was aware of the address used to sign the second.

It would not be unreasonable to assume that OneSignature mined block 1018 (as well as many others) unless something important is at stake, but that does not make them Satoshi.
475  Bitcoin / Development & Technical Discussion / Re: Randomly picking 24 words from the BIP39 wordlist on: December 02, 2022, 10:48:08 PM
Quote
Bech32 does have better error detection, but that doesn't make BIP-39's error detection bad and SHA-256 is an appropriate choice for a checksum.
why? why is sha-256 an appropriate choice for a checksum? it was not designed for that purpose. all it has the ability to do is detect errors but not correct them right? so how is that appropriate? not being able to correct a certain minimal number of errors. it can do zero in that regard.

The purpose of a SHA-256 hash is to detect corruption of the data. It is a checksum. If you don't agree, then what is its purpose?

you could even require a valid seed phrase to be 46 words long by just duplicating the original 23 word phrase. then the last 23 words would be your checksum for the first 23 words. and they could detect AND fix errors.  Cheesy

You are contradicting yourself. Your 46-word phrase would detect an error, but it could not fix it because if the duplicates don't match, you don't know which one is wrong. So, it is no better than the BIP-39 checksum.
476  Other / Archival / Re: delete on: December 02, 2022, 10:37:33 PM
It is much easier for someone to blame others for their misfortunes than it is to accept their own greed and ignorance as the real cause.
What do you achieve with this mindset? Nothing. Fraud must be acknowledged for there to be any improvement on anything.

I acknowledge that there has been a lot of fraud in the crypto space. Educating people about fraud is important. Scammers should be punished, but victims need to learn from their mistakes.

Now, I ask you. What do you hope to achieve by your witch hunt?
477  Bitcoin / Development & Technical Discussion / Re: Randomly picking 24 words from the BIP39 wordlist on: December 02, 2022, 01:38:01 AM
if there's only 128 possibilities for the last word then what's the point of having one since it is easily guessed. easily brute forced.

First of all. It is not just a missing last word that has 128 possibilities. Every word has 128 possibilities if it is missing, assuming that no others are also wrong or missing.

I think the checksum idea is a badly implemented one. Sha256 is good for checksums why? I think bech32 has a more robust checksum thing going on but I found it impossible to find a good explanation of that made much sense.

Bech32 does have better error detection, but that doesn't make BIP-39's error detection bad and SHA-256 is an appropriate choice for a checksum.


Also the whole concept of a checksum embedded into your seed phrase is questionable since someone could write down a wrong seed phrase and the software could just correct it for them and they would never even know they were entering something wrong. i guess?

Embedding a checksum may not be the best solution, but it is better than nothing. Also, your assumption that the software can correct a seed phrase is wrong. The software does not have enough information and would have to resort to brute force search. And that would only be practical if you know which words are wrong or missing.
478  Alternate cryptocurrencies / Service Discussion (Altcoins) / Re: I wanna be rich! on: December 02, 2022, 12:24:12 AM
I suggest that you compute your hourly rate. You will find that it is much more lucrative to get a low-paying job.
479  Bitcoin / Bitcoin Technical Support / Re: Raspberry Pi 4 Noob Trying for the first time to download Bitcoin Core on: December 01, 2022, 11:56:06 PM
I've downloaded bitcoin-24.0-x86_64-linux-gnu.tar.gz

From bitcoincore.org/bin/bitcoin-core-24.0/

Raspberry Pi 4 is not x86. It is ARM, so you want to download bitcoin-24.0-aarch64-linux-gnu.tar.gz assuming that your version of Ubuntu is 64-bit (otherwise bitcoin-24.0-arm-linux-gnueabihf.tar.gz).

I recommend that you follow this guide: https://raspibolt.org/

Note that the guide assumes that you are using RPi OS Lite 64-bit which is derived from Debian 11. There might be slight differences in the commands.
480  Bitcoin / Development & Technical Discussion / Re: private key generation always in 256bit range or even lower ? on: December 01, 2022, 11:30:55 PM
I wonder if wallet tools fundamentally and exclusively generate private keys in the 256 bit range. Or can it happen that such a tool generates a 103bit or 87bit private key when generating addresses/wallets?

Bitcoin private keys have exactly 256 bits. A private key with fewer would require that the remaining bits be set to something.

From a security perspective, there would be nothing inferior about the keys that are closer to 1, and nothing superior about the keys that are closer to 10.
I am not entirely sure that this is true. One might think that the keys from the lower range tend to be found much sooner than their counterparts further up. With the simple reason that most cracking tools and their developers naturally start counting at one and increment linearly. Only a small exception would come up with the idea to start counting at eg 30% of a range, or to start counting backwards, or randomly. As for the rest, I'm with you.
That is true. Brute force attempts that check a range generally prioritize ranges that are likely to have more use. Due to bugs or laziness, the low end of the 256-bit range probably deserves a higher priority. If the attempt assumes that any key is equally likely, then there is no benefit to start at the beginning of the 256-bit range, but on the other hand, starting at 1 is as good as any number, so why not.

Thus, most brute force attempts checking a range start at 1, making the low end of the 256-bit range more vulnerable simply because it is the range checked most often.

On the other hand, since there are so many people already checking the low end, an attacker might want to choose a different range that does not have as much attention in order to avoid the competition.

In the end, a randomly generated private key is extremely unlikely to be in a range that any attacker is searching, so there is no practical reason to be concerned.
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 [24] 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 ... 481 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!