Governments will never use bitcoin as their national currency. Why should they give up all of their control? They have the ultimate power. Printing money like bitfinex prints tether. That would be nutty of them.
Additionally i don't agree with the assertion of bitcoin not having any value comparable to fiat.
Bitcoin brings the value of a free trustless system, which allows you to transfer wealth over the internet in no time. This is not achievable with any centralised system. Not having to trust a 3rd party and still enjoying all the benefits from transfer speed and security is definetely something which brings bitcoin a lot of value.
|
|
|
Unfotunately there is no real solution to your problem.
But you could prevent this from happening in the future. You might consider using a mixing service. ChipMixer allows you to split/merge into smaller/bigger units of BTC and export these private keys. This way you will have different amounts of BTC's sitting on your addresses. This will prevent anyone to see how much you really own, assuming you don't mix all of those UTXO's together in one transaction afterwards.
|
|
|
it shows an Error: The entered address does not refer to a key. Please check the address and try again. How i can sign message and proof my ownership of my address? What I am doing wrong?
Wow. You didn't even read the first reply in this thread? It is stated, that it is currently not possible to sign messages from P2SH addresses (starting with 3..). If you are interested in the reason why its currently not possible, you can read the replys to this post: https://github.com/bitcoin/bitcoin/issues/10542
|
|
|
Basically private key is use to store public key data into the wallet Right .
The private key is used to derive the public key, to sign transactions/messages and prove the ownership of the corresponding public key. There is no other existence of private key while transaction. Miners validate the public key and then they will add new block to the ledger.
The private key itself is not 'stored inside' the transaction. But it is used to create a valid signature which basically says: 'I want to spend the UTXO from this public key'. A valid signature can only be created with the private key corresponding to this public key. This signature can then be verified with the public key. Miners do validate the transaction before including it into a block. After a block containing this transaction has been added to the blockchain, every full node does validate the whole block for itself. This prevents miner from adding transactions with an invalid signature into a block.
|
|
|
Just curious about how wallet and addresses works behind the scene. So I think I know briefly, but still there is something I don't know. Very complicated about whole.
A wallet is basically a piece of software which manages your private-/public keypairs. Most wallets are Hierarchical Deterministic wallets. Those derive a new private key from a so called master private key (MKP). Upon encrypting (or changing password of) your wallet.dat, core generates a new MPK. Any generated address after this will onle be cointained in this version of your wallet.dat + futures backups, not in older ones. Therefore if you (or the second person who has a copy of yor wallet file) spend(s) a part of the coins, the change of the transaction goes to a change address which has only been generated by the wallet the transaction came from. The actual amount of coins not being 'available anymore' in the older version depends on the UTXO's which have been included into the transaction.
|
|
|
I think the problems comes in with the different implementation of SegWit by these wallet providers. I signed a SegWit
address with Electrum a while ago and someone used a Brainwallet app to read it and they were unable to verify it. The two
different implementations of SegWit is causing all the problems at the moment.
It is not the segwit 'implementations' who cause a failure when signing/verifying messages. You can't verify messages signed with with P2SH addresses since you can't know whether the public key corresponds to a nested p2wpkh address. You can't be sure what p2sh address it would correspond to, since a public key can be a part of multiple ps2sh addresses. With a p2pkh address, on the other hand, the public key only corresponds to one p2pkh address.
|
|
|
How much will be accessable from the other copy of the wallet.dat depends on how much UTXO's are available. After one user encrypts the wallet (new seed / addreses being generated afterwards), the next transaction from this user will have an output (change address) which the other user doesn't have control of. If there is only one UTXO, the figure will be like shown by ranochigo. Depending on how much UTXO's are used in the transaction, the amount of 'remaining btcs' for the first user to spend is varying. For more information about the change: https://en.bitcoin.it/wiki/Change
|
|
|
.. like the above said and it's for security purposes.
To make this more clear: While the risk when using the same address multiple times is slightly higher (due to the revealed public key), this can be neglected. The real advantage when using change addresses is the privacy factor you gain. It makes it harder to trace your payments and increases your level of anonymity.
|
|
|
I do not remember where I downloaded it from, but I have used the wallet several times before and it worked just fine. Using this wallet's seed on a newly downloaded wallet is good advice, thanks!
You may also check wether your electrum version is the original one before loading up more funds. You can either check the signature (best way of verifying the file) (small guide: https://steemit.com/bitcoin/@jklepatch/how-to-verify-the-integrity-of-electrum-wallet-executable-on-windows). Or you go the fast way and simply compare the hashes. Assuming you are in windows, you can use this command (on command line) to hash your executable: certutil -hashfile YOUR_FILE_YOU_WANT_TO_HASH sha256
SHA256-Hash of electrum-3.1.2-setup.exe: ab82319dff3bef0604fe173d45d94e3ede7dc3947d41ce59976a0b07c0357c71SHA256-Hash of electrum-3.1.2-portable.exe: ef64c35821c86d94ba11e075405e34c60d3f8992c59f2ca3024f52748f26fc55
|
|
|
Well as far as i know any Cryptocurrncy based on any algorithm does not support mobile mining. i.e They have not released mobile supported wallets.
Mining on a mobile does not have 'to be supported'. Neither do you need a wallet on your mobile to mine cryptos. All you need is a small application which uses the mobiles processor to make the POW. POW(Proof of work) based Cryptocurrencies can not mine in any mobile devices as these algorithms need extensive processing power simply which any mobile device cannot provide.
They can definetely be mined on a mobile. But depending on the hashrate a mobile phone is able to achieve, this whole process is kind of senseless. But mining itself is possible on a mobile. In the end, mining is just a 'specific way of calculations' (which any processor can do). May be in the future POS(Proof of stake) based Crypto projects will release mobile wallets as POS algorithms does not require extensive processing power.
For PoS mining, your funds have to be staked. This can be done from any device where you can access your wallet and the internet. Mining software != wallet
|
|
|
I'm talking about segwit. Wrapped P2WKH addresses are still backwards compatible and are described by what I said above. Doesn't have to be bech32, but I have seen an increasing amount of adoption recently.
Segwit nested into P2SH was thought as a way of transition from legacy to segwit (bech32). While nested segwit does reduce the transaction weight, it is still not as efficient as bech32. Changing user habits is a tedious process. Moving from legacy to nested segwit is definetely a step in the right direction. But the goal should be to get widespread bech32 adoption. It doesn't just improve the user experience, but also contributes to the overall network health. @OP: Is there a particular reason you want to use an legacy addresse? General rejection towards segwit?
|
|
|
The lower levels of the ISO reference model deal with bit's being flipped, it happens all the time but all a socket can receive in one chuck is 65535 bytes so really I am sending images and bigger files just like web-site pump out data and that works.
But 2mb are still sent as 2mb blocks from sockets regardless of the trouble in keeping a thread open to send data in little block or encryption..
While 65535 bytes is the theoretical maximum for a 'tcp packet', which by the way is stream based (why do you care about packet size when using TCP?), lower layers are not able to process such big packets without errors. In the end a single packet sent over a tcp connection is always lower than those 65535 byte.
|
|
|
I thought that using those hardware wallets is the most secure way of storing Bitcoins but now I am doubting, i guess i will keep my BTC on my online wallets with a password that i put on a safe place.
While a hardware wallet is not 100% secured (nothing is 100% secured) it is definetely better than an online wallet. The attack surface of a web wallet is by far bigger than the attack surface of a hardware wallet. The point is: If you decide to stop using your hardware wallet and put it in a safe place.. your coins are safe. Regardless of a vulnerability. But a web wallet on the other hand can be attacked 24/7. Not that you just have to trust the developer of the wallet, you also have to trust they are able to secure their whole infrastructure good enough. While hardware wallets may not be the most secured storage option, it definetely can be regarded as more secured than an online wallet.
|
|
|
Because is the trust of the source code instruction set. Machine code inside the data its called source code.
Hardware wallets which use a secure element (e.g. ledger nano s) are not completely open source. This is simply due to the fact that those chips are mostly available to developer/manufacturer only. Most of the hardware is under CDA. Ledger simply is not allowed to disclose how they interact with the element. The majority of the source code is on github. But unfortunately not completely.
|
|
|
Unfortunately there are way to less mobile apps for windows or iOS. It is possible to run android apps on a windows phone. But this requires to connect the phone with your PC in debugging mode and access/modify the firmware. Then you could simply copy an android .apk onto your phone and install it.
However, this is not recommended since messing with the firmware of your phone might cause some damage when not being careful.
|
|
|
My speculation with bitcoin market price drop to basic as 1k USD per btc will happen.
I'd like to introduce you at least one entity with a) massive power and b) tons of money in this unregulated market which never would BTC fall that low again: Miners. It just doesn't make any sense to me for miners NOT to push the price up while sitting on huge stacks of BTC's. Its not like its not possible to push the price up successfully. The market reacts highly volatile. Manipulation is way easier than in a regulated market. So until you can explain to me why miner should sit on ther BTC's and watching the value to drop instead of 'investing' a small portion into a pump to overall increase their $ value, i'd label your post as FUD.
|
|
|
Now if you log into lastpass or keepass, then say you store your seed in that wallet.
With wallet you are referring to the password manager file, right? Now when you log into say dropbox or say gmail, then go to your google drive account, upload their lastpass or keepass file into it... and the lastpass or keepass is encrypted since you cannot open it without the password, that is safe or not?
In a perfect world (where you password manger doesn't have a vulnerability (and never will have) and the encryption is chosen ight), yes. It is safe. The problem is.. once you are uploading it.. it may be (somehow) read / accessed by an attacker (who at this time can't read it because its encrypted). But if in the future someday a vulnerability would be found (e.g. encryption algorithm implemented wrong), then he may be able to access your file, abusing the flawed implementation. Because assuming you don't encrypt the lastpass or keepass file, by that you mean encrypt it, then its not safe? Thus someone could read the lastpass or keepass file?
If its not encrypted, this is possible. Either by Man-in-the-Middle attacks or through accessing the server of your storage provider. Storing/sending files unencrypted can definetly lead to a loss of your funds. Well you have a copy of lastpass or keepass in your computer and most likely a usb stick or external hard drive. So when you say why would you upload a copy to your email or dropbox etc, well its a digital copy in case something happens to your laptop or usb stick or external hard drive. Thus if you lost all these items, you could still log into your dropbox or gmail and then open your lastpass or keepass as long as you remember the password for both. So that is bad idea? Again im not talking about you typing out your seed in gmail and then sending it to yourself and anyone who hack your password can read it. That would be a very bad idea etc.
The probability of an attacker accessing your file + vulnerability found and used itself is pretty low. But this can't be excluded. This all depends on how much you trust the devs from your password manager and of course the 'level' of security you want to reach. While this may work well in most cases.. the risk still exists.
|
|
|
So in mobile phone Game (Android, iOS), PC game, how to implement that (title)?
In game, game company's specific crypto currency's address, QR code appears for payment receiving,
gamers see that, and send amount to that address, it should be automatically recognize and when it confirmed, game should automatically give item to users.
How this be done technically behind the scene?
There are several possibilities to implement it. You can either use a 3rd party service to process the payments or you do it yourself. An example: Once a customer decides to buy an article, you request a new address from your local daemon (or take one unused pregenerated address) and assign it to your customer in your database. Then you display the QR and after the (correct) transaction has been received by your node and has the amnount of confirmation you decided to set, you can afterwards release the digital item to your customer. Im not sure 'how behind the scene' you are asking for. But there are a lot of code snippets available on github which can deliver you an technical insight.
|
|
|
|