Bitcoin Forum
May 30, 2024, 05:18:11 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 [234] 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 ... 317 »
4661  Bitcoin / Wallet software / Re: Eclair wallet on: April 11, 2018, 07:51:34 AM
~snip~
According to the developer they accidentally deleted the key (not compromised).
~snip~
Wether they really lost their key or wether it got compromised can't be said for sure currently.

They said that they lost the key and not that it was compromised. I think they would be panicking a bit more if the key was actually compromised.


Thats exactly what i have said.
But wether the developer are saying the truth can't be known at this moment.
There are several possibilities on what happened.
4662  Bitcoin / Bitcoin Technical Support / Re: Help me to understand Security breach with cryptocurrency on: April 10, 2018, 10:27:45 AM
As a developer you need to build your whole system with security in mind.
There is no magic formula to create a secured system with a few lines of code.

The most obvious would be to be secured against all already-known attacks against web applications.
But since you can't rely on an attacker to only use already known vulnerabilities, you have to implement different 'security-levels' in your application.

A system which detects anomalies itself and blocks any fraudelent attempts to gain access to parts of your application where it is not allowed,
is something you definetely want to have.
Binance, for example, has such a system. Some 3rd party 'trading tool' captured API keys and tried to make money with pumping a specific coin on binance,
giving the attacker a lot of money.

Fortunately the system detected this attempt and instantly stopped all actions. This lead to normal users balance being restored and to a heavy (financial) loss for the attacker.
4663  Bitcoin / Wallet software / Re: All Crypto assets stolen from Exodus - Anything I can do? on: April 10, 2018, 10:02:45 AM
or he entered his data on a phishing site.

There is no way funds get stolen from a desktop wallet by phishing.
(I am assuming people are not dumb enough to paste their seed into an online site)

Why or why people still don't understand the basics. Do you honestly believe that someone needs you to enter your seed on any phishing website in order to get compromised? No mate. A simple injection through an exploit on the page is all that's needed and voila, I now control your computer, be it via botnet, keylogger or whatever else, the rest is just details.


A phishing site does one thing: Phising.
This has NOTHING to do with any exploits/malware at all.

I'd suggest you to read this wikipedia page about phishing before trying to correct people with your wrong interpretations.





I now control your computer, be it via botnet, keylogger or whatever else, the rest is just details.

You can't 'control' a computer via a keylogger.
Controlling an PC implies access to this PC (full control = root access).

A keylogger just captures keystrokes + transmits them via the internet.
Additionally a bot net does not control your PC. Your PC will eventually get a part of a botnet.
The machine inside a botnet is usually controlled by a C&C server.


You obviously seems to lack the basic knowledge regarding security in IT system. I'd suggest you read a few books before commenting on that topic.
4664  Bitcoin / Wallet software / Re: Eclair wallet on: April 10, 2018, 09:46:01 AM
The devs removed the application because the lost their signing key.
Without this key the devs won't be able to push updates / new versions to the play store.

And since there has been a small bug discovered, they are currently not able to fix it (To be more correct: they are not able to upload a fixed version).
According to the developer they accidentally deleted the key (not compromised).

They will upload a new version (and hopefully won't lose the signing key again) soon.


It is recommended to NOT use the application until a new (fixed) version has been released.
Wether they really lost their key or wether it got compromised can't be said for sure currently.

4665  Bitcoin / Development & Technical Discussion / Re: Early stage mining why different address for each blocks mined? on: April 10, 2018, 09:42:57 AM
Ok, so it's the same situation as like one should use a new address for each receiving for privacy.

Correct.



But what changes now? Because looking at the miner stats, like https://blockchain.info/blocks/BTC.com , https://blockchain.info/blocks/F2Pool , although I didn't check all of their mined blocks, but latest several blocks mined by each are indeed using the same address.

Nothing has changed.
Miner do decide for themselve which address they include as receipent from the coinbase transaction (the mining reward).

The easiest way is to build the block always the same way.
Most miner probably have their address 'hard coded' in their software running.
This way they don't have to pregenerate a bunch of addresses and don't have to fill the list of addresses again once it is going to 'get empty'.

While i can't say for sure why they use the same address for every block they mine.. i would assume it is because of convenience.
4666  Bitcoin / Development & Technical Discussion / Re: If there is unconfirmed transaction, coin come back to original? on: April 10, 2018, 09:10:43 AM
There is some currency, such as nano, which is based on something similar to that.

Nano utilizes a directed acyclic graph. This is not similar to blockchain technology.
In a DAG-based currency people are simply adding transaction to the graph 'whenever they want to'.
Compared to blockchain currencies (where transactions get confirmed by miner who do a PoW to create a block) this is a completely different approach.

While it has the advantage of faster transactions ('confirmations') it is way more vulnerable to DoS attacks.
Additionally the security of all those DAG-based currencies havn't been tested yet. While Bitcoin (blockchain tech itself) has been attacked for several years now - without success.
4667  Bitcoin / Development & Technical Discussion / Re: How pool payout to multiple users? on: April 10, 2018, 08:59:01 AM
A Bitcoin transaction consists of Inputs and Outputs. Inputs of a transaction are unspent transaction outputs from previous transactions.
A transaction can be made of multiple inputs and multiple outputs.

In fact, you can chose as much inputs/outputs as you want (as long the size of the TX is smaller than 100Kb - i think).

Electrum for example lets you easily send coins to many addresses within the GUI.


For the sendmany command mentioned by achow101, you can look up the syntax here: http://chainquery.com/bitcoin-api/sendmany


An example:

Code:
bitcoin-cli sendmany "" "{\"1D1ZrZNe3JUo7ZycKEYQQiQAWd9y54F4XX\":0.01,\"1353tsE8YMTA4EuV7dgUXGjNFf9KpVvKHz\":0.02}"

This command sends 0.01 btc to 1D1ZrZNe3JUo7ZycKEYQQiQAWd9y54F4XX and 0.02 btc to 1353tsE8YMTA4EuV7dgUXGjNFf9KpVvKHz.
4668  Bitcoin / Development & Technical Discussion / Re: Early stage mining why different address for each blocks mined? on: April 10, 2018, 08:17:11 AM
It was not for safety purpose, but for anonymity.
While bitcoin itself is not anonymous at all (rather pseudonymous), using an address only once increases the anonymity by others not being able to link all of those transactions
until multiple UTXO's (from different addresses) are being spent together.

One of satoshis intentions was to create an partly anonymous digital currency.
Using the same address for every mined block would kind of kill this purpose.


Additionally it can't be said for sure that all of the first blocks have been mined by satoshi.
His miner crashed after 'a few' blocks. Other people were mining in the timeframe of his miner being down.
Wether an address from early mining does belong to satoshi or to other early-early-adpoter can't be told for sure.
 
4669  Bitcoin / Hardware wallets / Re: It is NOT secure to use hardware wallets (and it never was) on: April 10, 2018, 08:08:41 AM
Don't just disable the networking, break or remove the adapter. Then you have a machine that can only be interfaced with through the USB or other ports.

But how do you actually do that? You need to do it physically?

Yes. Removing all network adapter physically gives you a 100% guarantee that your offline machine won't communicate with any other device in its proximity.
Note that being 100% secured against an attack vector can almost never be reached.
This is one of the few cases where it is possible to absolutely secure yourself against an attack vector.



I've been using an offline wallet to sign for a while, but I just disabled network adapters. I figured it was kinda bullshit, but the reality is that the risk is already pretty low. The offline machine was formatted clean and never connected to the internet. It seems to me that in either case (networking disabled vs. actually removed) the thumb drive you use for transporting raw transactions is a required attack vector.

Let's say Windows forces a shutdown/update and re-enables network adapters. What then? Some malware from the thumb drive keylogs my wallet password, swipes my private keys and......but there's no unprotected network to connect to. I'm not crazy for thinking the risk is low here am I? If there's malware sophisticated enough to do the above, then copy itself to the thumb drive and push the data from the online computer, then it seems like a PC with network adapter removed is prone to the same attack.

You are right, the risks are very low. But it still exists.
It all depends on how much you want your storage to be secured against which attack vectors.

And you are also right with the USB drive being the attack vector which would probably be the first one abused.
And it is indeed independent from your network adapters.

But there are other possibilities to transfer your unsigned TX to your offline machine and move your signed TX to your online pc.
The simpliest would probably be witht he help of two webcams:
  • Create unsigned TX on online pc
  • Display QR code of this TX
  • Scan the QR code with webcam connected to your offline machine
  • Sign the TX
  • Display the QR code of the signed TX
  • Scan this QR code with your webcam connected to your online PC
  • Broadcast transaction

Note that to be on the safe side, you should NOT connect your webcam to an online PC after connecting it to your offline storage.
This attack vector (flashing webcam firmware with malicious version) is pretty unlikely.. but it also does exist.
4670  Bitcoin / Bitcoin Technical Support / Re: Transactions accelerators for BTC on: April 10, 2018, 07:57:19 AM
I think even a 0 fee tx will get confirmed in a reasonable timeframe at this moment.

I don't think a miner would include a transaction with zero fee, simply due to the fact that they would rather push the TX fees higher (to at least get any fee),
instead of including a transaction they don't earn anything from.

And additionally, if i am not mistaken (feel free to correct me), 0-fee transaction won't get relayed by the majority of nodes.
4671  Bitcoin / Bitcoin Technical Support / Re: HACKED PLS HELP on: April 10, 2018, 07:53:32 AM
We're gonna need a bit more info on how you were hacked or where you think the source of the hack originated.  But if the coins already left your wallet then theres not much that you can do.  IF you figure out who stole your bitcoins then you can attempt to contact them and threaten them with law enforcement or go directly to law enforcement with what you have.  The problem with this is that the hacker could be from another country which would render local law enforcement useless.

You should read the thread.
OP clearly mentioned all of his funds on cryptopia got sold for BTC which then got withdrawn.





@OP:
Contacting law enforcement agencies is the only way of having a chance to get your coins back.

For the next time, you might chose a more appropiate form of storage. 14 BTC being 'stored' on an exchange is a bad idea.
Exchanges alrady got hacked and always will be the target of hackers. Nothing one can do about this.
If you really want to store your coins on an exchange (because of whatever reason; not advised!) then at least chose an competent exchange (e.g. binance).
4672  Economy / Exchanges / Re: How to build a crypto exchange? on: April 09, 2018, 12:39:31 PM
Running an exchange is not a brainless task.
You need a team of competent developer with security in mind building your backend from scratch.

Without a properly coded exchange you definetely will get burned.
This happened to quite a few shitty exchanges (e.g. bitgrail).

If you can't afford to pay a developer team to build a solid exchange, you better don't start one by your own.

4673  Bitcoin / Hardware wallets / Re: Trezor or Paper Wallet? on: April 09, 2018, 12:26:38 PM
Haven't gotten to try Trezor or Paper Wallet yet. Maybe you wanna try Paxful.com? I've been cycling through the different wallets and I got on Paxful recently and it's pretty good so far as I'm concerned.

An online wallet is not comparable to a hardware wallet (trezor) or a paper wallet security-wise.

In an online wallet your private keys are stored (either encrypted or unencrypted) on the service providers server. This creates a lot of new attack vectors compared to hardware-/paper wallets.

With a hardware wallet you have a dedicated device which creates and holds the pivate keys in an airgapped device. It can be used on infected PC's without being exposed to theft.

A (properly created) paper wallet also is completely airgapped.
The whole security of a paper wallet relies on 1) the physical security and 2) the way it has been generated.
4674  Bitcoin / Development & Technical Discussion / Re: Possible Attack on Bitcoin's Network on: April 09, 2018, 11:37:13 AM
Indeed bitcoin attracted so much attention and I do believe some would attempt to attack the blockchain to gain control all the funds exist. But it would really be a long shot to do that  probably with a super ASIC computer miners will perform a brute force attack but like I have mentioned, its a long shot.

Application-Specific Integrated Circuits [1] can only perform one task (the one they were created for).
Miners ASICS do calculate SHA256 hashes. They can't start bruteforcing private keys.



Recently reported that many computers infected with bitcoin virus.

Bitcoin virus?  Roll Eyes



Professional bitcoin diggers will set up a system to infiltrate the computer to steal data and dig a bitcoin. They will receive free BTC.

Professional bitcoin miner don't do that.
Its the blackhat developer who creates malware which will then mine coins for them.



[1] https://en.wikipedia.org/wiki/Application-specific_integrated_circuit
4675  Bitcoin / Electrum / Re: Electrum segwit format on: April 09, 2018, 11:27:42 AM
I agree with you that Seed key is a best way of security if you properly use the seed key then it is the best way of securing your wallet.

The mnemonic seed [1] is not a key. Its purpose is NOT to secure your wallet.
This (random) seed is used to derive all of your private keys.



I am using electrum for more then 2 yrs and my computer  got 2 times hacked but they were not able to hack my electrum wallet.

You are definetely doing something wrong.
I assume your pc didn't get 'hacked' but you have downloaded malware.

You should consider using a safer option to store your coins if your pc already has been infected.
The reason the attacker hasn't already stolen your coins probably is that he was kind of incompetent.

Nevertheless, this is in NO WAY related to the mnemonic seed.


[1] https://en.bitcoin.it/wiki/Mnemonic_phrase
4676  Bitcoin / Electrum / Re: Bitcoin Core to Electrum 2018 on: April 09, 2018, 11:21:34 AM
Hello again and thank you for your reply! I've just imported the wallet to Electrum.

You did not import your wallet into electrum.
You created a new electrum wallet and imported private keys from your core wallet.



Is it OK that there is no seed option? You can't click on the Seed option.

There is no seed option because you have imported private keys.
To use the option of a seed you have to create a new wallet and send your funds to your new wallet.



I already created a password and saved a copy to a couple of flash drives. So if I format my drive, I just have to open the file, insert password and I should be ready to go? Is there another way to protect everything?

Yes.
There are a lot more ways to protect your holdings.
You first have to know against what you want to be protected.



Is there anything else I should do or can I just delete Bitcoin Core? I could really use the space in my HDD.

You should create a new wallet and use the seed option. This makes backing up your coins way easier.
Transactoin fees can't go lower than they are nowadays.

If its only because of the space.. you can use prune mode. This way core does not store the whole blockchain.

If your backups are correct (you have tested them), you can safely remove core from your hard drive.
4677  Bitcoin / Bitcoin Technical Support / Re: Help me figure out this Multisig issue Please :) on: April 09, 2018, 11:12:36 AM
Normally, I use a legacy address for multisig. I would enter the legacy address public key and it would spit back the same receive address. The platform would then create a transaction with that info.
This time I used a segwit address from my trezor for the multisig. This time it came back as a legacy address. A legacy address derived from a segwit public key.

Would you mind sharing the website you are talking about?
And what are you actually trying to accomplish?



I wanted to test and see if I sent funds to the legacy address that was derived from the segwit public key, would it be connected. The answer was no, lol.

Of course not.
Your hardware wallet is only monitoring the address it has generated.
Not any other addresses.



Any way I can access these funds in the address? I tried creating a legacy wallet with my trezor seed, but no transactions appeared. Is there a way to manually enter? Or am I completely off in my thinking. Does any of this make sense? It's late/early.

Probably not.
But this depends on how the address got created (from the suspicious(?) website).
A few more information about the site would definetely help to figure out what they exactly do.
4678  Bitcoin / Development & Technical Discussion / Re: Understanding Bitcoin's Hashing Function in Simple Terms on: April 09, 2018, 11:04:29 AM
I think they also include a check-sum as well but feel free to contest this and no one should trust services
provided by Windows black-box code with any data because it's all being stolen by Back-Door-Bill Gates who was working for the
CIA/NSA before half the users of Bitcoin were even born.

Noone was talking about anything related to windows.
Please start reading the threads you are shitposting in.

You additionally seem to miss the whole point regarding the checksum.
You post a few lines of code where the RIPEMD160 hash function is called and claim thats the only part you understand and that it is 'from windows' ?   Roll Eyes

I'd highly recommend you read this: https://en.wikipedia.org/wiki/Hash_function
4679  Bitcoin / Wallet software / Re: All Crypto assets stolen from Exodus - Anything I can do? on: April 09, 2018, 10:58:58 AM
Either OP had a trojan/keylogger

The malware on OP's PC being a trojan is the most probable.



or he entered his data on a phishing site.

There is no way funds get stolen from a desktop wallet by phishing.
(I am assuming people are not dumb enough to paste their seed into an online site)



Other options are sniffing while using wi-fi in public places, etc, etc.

Sniffing is not an option in this case.
With sniffing you are listening to (or recording) the wlan traffic.
Using a public wifi with a desktop wallet installed does not imply a higher risk of losing the private keys.
4680  Bitcoin / Hardware wallets / Re: It is NOT secure to use hardware wallets (and it never was) on: April 09, 2018, 08:36:22 AM
Yeah, but you don't want just any old laptop to do that on.  Like if you were to get one of your old laptops from 10 years ago that you were downloading a whole bunch of sketchy stuff on through limewire, I wouldn't think to recommend using something like that.  The most secure way is to buy a cheap laptop that has no wireless or bluetooth capabilities, and then load trusted/gpg verified files on the computer through booting it on a live-USB.

Using an old processor doesn't also mean you have to use your old (non-wiped) hard drive.
An old laptop with a formatted hard drive and wireless adapter removed does its job very well.

There is also no need for running an OS as live version from an USB stick. It is absolutely fine to install an OS to your hard drive.
No connection adapters mean no connection. Regardless of the OS you are running and from how you boot it.
Pages: « 1 ... 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 [234] 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 ... 317 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!