Is your friend sure the address got generated and shown by cryptopia? Can you tell your friend to verify the website he used (non-malicious, original website?) And are you sure there is no clipping malware installed? Did he try to copy/paste an address?
For example, try to copy this address: 1JaTmUSZEdYubYuR7SKEH1Y8PgmDM2FtHc and paste it into notepad. Does it work properly?
If he used the correct website and has no clipping malware on his PC, the support is the only one who can help with this problem.
|
|
|
The "long term storage problem" is the simplest thing in the world to solve. Consider that a bitcoin address is no more than a 50-some digit long number All you need is a copy of that number in a safe depot box.
An 'address' is a 160 binary number. This, of course, can be encoded in any format. Just like it is done with the displayed addresses (Base 58 encoding). But to be able to gain access over the funds sent to the address you need the private key (256 bit binary number), which also can be encoded into *any* format. The question is wether you want to put it into a depot box. It matters on how much you trust the phsysical security of this box. If you want to keep it away from everyones knowledge, such a storage might not be the best idea.
|
|
|
I have so far tried to export my private keys and import them via Coinomi but I am starting to get errors on there. ~snip~ 3) Tried coinomi to transfer ZEC (only 2/4 worked, connection errors now..) ~snip~
Did you try to reinstall coinomi? It sounds strange that you get connection errors after already successfully transfering 2 out of 4 wallets out. What other wallets did you try? Regarding your connection issue: Did you try the mobile wallets with your wifi connection or mobile connection?
|
|
|
After the implementation of reply protection, is it not possible to send bitcoin from BTC to BCH network , and vice versa?
This was never possible. A lot of people confused their BTC/bcash addresses and sent their coins to an address (on the same chain). This was a problem for exchange deposits, who were only monitoring the corresponding chain for this address. Replay protection was implemented to distinguish between BTC- and bcash transactions. Before replay protection it was possible to take a (feshly broadcasted) bcash transaction and broadcast it into the btc network (and vice versa). This would have led to 'the same' transaction being mined on the other chain.
|
|
|
Exchanges are requesting verifications (for KYC) and it's an obvious wrong move for him.
Not very exchange is requiring verification. Especially not for crypto-to-crypto trades. If the attacker is somewhat competent he probably used an exchange without verification with a proxy to exchange the btc to an anonymous currency (e.g. monero). From there on it would be a pretty easy task to sell those monero on an exchange which complies with the KYC policy.
|
|
|
I don't think pywallet will do the trick here. This project hasn't got an update since 4 years now. It doesn't work properly with new wallet files since there are parameters inside which are not understood by this tool.
|
|
|
Why this is risky? (bump)
So user can try http injection attack to know wallet's secret key? When user click that [generate address] button?
You don't have to store the private keys / seed on your online server just to create new addresses. You could simply use the Master public key. Public keys (and therefore addresses) can be dervied from this key, without the risk of private keys getting exposed/compromised. So point is, you saying about make bunch of addresses before (like 1 million addresses) and store them in DB?
This can definetely be done. It does not expose any private keys to theft.
|
|
|
How long does it take to update values within a two-party channel?
Theoretically: Just as long as it takes for the packets to travel through the network + the time it needs to be processed by the processors. Since there is no need to wait for a block being mined there shouldn't be any other factors which have an influence.
|
|
|
Much easier is to simply take the PC and delete email and web browsers. That will leave the machine capable of operating system and AV updates, but will eliminate most routes of infection.
Or (to get back to topic): Just use a hardware wallet. This does not require to remove the most used (and probably most needed) software on a pc. A pc without browser/email/etc.. is a neither a cold storage nor an online pc someone wants to use.
|
|
|
,,, But yeah, to each his own I guess. I personally don't engage in crypto activities with my smartphone because I feel like PCs are much more secure (being much more customizable), and I don't think a mobile device fine tuned for crypto is likely to change that.
Imagine that your phone got stolen or got crash because of any major disaster so yeah PC much safer ! There is a difference between safety and security. Regarding crashes, stolen phone, etc. this is a reason for the PC being safer to use. But i would not call a PC more secure than a mobile. Android is utilizing a linux kernel. With proper settings a mobile can be just as secured (and even more secure) than a windows pc. The security mostly depends on the hardware/software used and on the configuration.
|
|
|
Generally, you should always have the newest version. Practically, there has not been any exploit/vulnerability/whatsoever found. So its not mandatory to update the firmware (but still recommended). The key-elements of the update are the following: - Improving user pin security
Instead of starting with '5' when entering pin it is now randomized This prevents from people nearby you to count the clicks - Improving recovery phrase security:
Starting letter of seed is not 'A' anymore, but also randomized Same reason as above - Getting rid of confusing error messages
- Improving application checks
You can read more from ledgers post: https://www.ledger.fr/2018/04/17/announcing-ledger-firmware-1-4-2/
|
|
|
In electrum wallet the default is to use 1 receiving address. Although multiple addresses are generated when I initially create a wallet, they are never used (not even for change) unless I specifically transfer funds to them. I don't know why.
Is electrum a bad implementation?
Where do you get your address from (in electrum) ? The receive-tab should always give you a new address (if the prior one has alread received funds). May it be possible that you are always using the top address from the address-tab? Electrum is a TOP 2 wallet (together with core), imo.
|
|
|
The seed should be fine, if it was only a clipboard Malware attack? These attacks detect when you copied a Bitcoin address and replace it with the hackers address, right? If OP's PC is only infected with a clipping malware, yes. The seed should be fine. But due to the fact that he can't open the command line (closing automatically), he probably does not only have a clipping- , but a more dangerous malware. With what kind of malware his pc got infected can only be said after fastidiously inspecting his computer. I would definetely also recommend to use a new seed. Better safe than sorry.
|
|
|
MEW is not secured as you think every time you open your MEW wallet you need to copy paste your private key from time to time to open your wallet online. So if your computer is infected with malware and viruses any time soon thief can get your copy pasted private key history and stole all of your altcoins and ERC20 token.
MEW is just as secured as any other online wallet is (wether it is blockchain.info, coinbase, etc.. doesnt matter). With an compromised PC the only (relatively) secure way of accessing coins is to use a hardware wallet. I would never consider to use a web- or desktop wallet on an infected PC.
|
|
|
I think the LN is definetely a good way for realizing such a MMO currency system.
But i doubt wether this is what game publisher want. They could simply use a centralized system (e.g. buy ingame currency with btc) to earn more from people who aren't even going to spend every last 'cent'. It is definetely more lucrative for them to realize it that way than using a decentralized system.
At the current state the LN is not ready yet. It is still in beta and still has to be proven stable and secure before it is going to be used for 'mainstream' payments.
|
|
|
I tried to copy and paste the code you just put up and it came up with the same receive ID that I sent my btc to have I been conned? D:
and Ive been trying to open command prompt for a good couple hours it keeps closing itself Im trying to fix it.
This indicates that you have a clipping malware which also does restrict your access to the OS (therefore the automatic exit command when starting the command line). You should do what Xynerise suggested (backing up important data and format your drive) as soon as possible! It is NOT necessary to install a unix OS. Windows is fine. You just have to take the right security precautions. 1) Install a good AV 2) Never download any suspicious files 3) Keep away from torrents and cracked software, etc..
|
|
|
Can you check wether you have the correct version of electrum (non-malicious)? The best would be to check the signature, but using a checksum should be fine too. Do the following: - Press WIN-key + R
- Type in: cmd
- Run this command: certutil -hashfile C:\path\to\electrum.exe sha256 (Use the path to (1) the electrum installer or (2) the standalone executable (depending on what you are using))
- Compare the output to the hashes below
Hash of the portable version: d42391fe8069be5ebfab9d3e1e4f4f8dbd0e36d80bc841677d76359510e22b6e
Hash for the installer: ab82319dff3bef0604fe173d45d94e3ede7dc3947d41ce59976a0b07c0357c71
|
|
|
the ismine command came back false?
This is weird. This means this address is not part of your wallet. Did you somehow (maybe by accident) create a second wallet file? And since you have already received 4 payments to your address, did they at any moment show up in electrum? Did you download electrum from the official site ( https://electrum.org/)?
|
|
|
|