WE NEED AN ACCOUNT FREEZE CODE CAPABILITY A USER CAN LOAD INTO THE BLOCKCHAIN AS A PAID MESSAGE THAT ALL NODES WILL RECOGNIZE AND REJECT ALL TRANSACTIONS OUT OF THIS ACCOUNT UNTIL A USER REVERSES IT AND TURNS IT OFF WITH A SECOND PASSWORD. No need to shout, but yes. +1 ### woulda saved me 107000 NXT ![Sad](https://bitcointalk.org/Smileys/default/sad.gif)
|
|
|
Yeah OP did you have vanity address on all 3? something about vanity coding a 64 char account # when you could just buy an alias makes me say WTF
No, that is the thing, i only used the vanity generator for 1 address, Do you know where you downloaded the vanity from? Have you still got those downloaded files? From the links in the forum. I still have both java files. Where can i upload those, so noone, uses them? Post the sha256 sum of each file. I am pretty sure they are clean and weren't the issue. Vanity.jar : hex: 4d2e1e182637c564f95fea1e8864fa2364769f42e28ed4135b99b5514a7f4f1f HEX: 4D2E1E182637C564F95FEA1E8864FA2364769F42E28ED4135B99B5514A7F4F1F h:e:x: 4d:2e:1e:18:26:37:c5:64:f9:5f:ea:1e:88:64:fa:23:64:76:9f:42:e2:8e:d4:13:5b:99:b5:51:4a:7f:4f:1f base64: TS4eGCY3xWT5X+oeiGT6I2R2n0LijtQTW5m1UUp/Tx8= vanitygen_64.exe: hex: e307cd6b49b2059fd993ce3a2e2975fc76654f90a5ee07ad04f03462f3add61d HEX: E307CD6B49B2059FD993CE3A2E2975FC76654F90A5EE07AD04F03462F3ADD61D h:e:x: e3:07:cd:6b:49:b2:05:9f:d9:93:ce:3a:2e:29:75:fc:76:65:4f:90:a5:ee:07:ad:04:f0:34:62:f3:ad:d6:1d base64: 4wfNa0myBZ/Zk846Lil1/HZlT5Cl7getBPA0YvOt1h0=
|
|
|
Yeah OP did you have vanity address on all 3? something about vanity coding a 64 char account # when you could just buy an alias makes me say WTF
No, that is the thing, i only used the vanity generator for 1 address, Do you know where you downloaded the vanity from? Have you still got those downloaded files? From the links in the forum. I still have both java files. Where can i upload those, so noone, uses them?
|
|
|
Yeah OP did you have vanity address on all 3?
something about vanity coding a 64 char account # when you could just buy an alias makes me say WTF
No, that is the thing, i only used the vanity generator for 1 address, and some others while i was doodling around. The majority of funds where on a random password address. I have aliases, but i still think vanity addresses look awesome. Had a long night replacing all the passwords on my other accounts and emails and onlinebanking ect. One strange thing i noticed was that i have some funds on exchanges, that were not touched, ONLY the NXT accounts were touched. They didn't even try to enter my gmail accounts to reset something or get additional info. Very strange all. Sad shit right there.
|
|
|
thanks, got: 12345678612257264594 interesting. Why were all wastedbit's posts deleted? omg i hope i didnt loose my coins because i wanted a pretty address, i feel so stupid. Would it help if I posted the files?
|
|
|
did you use any additional program? non official client? ballancer?
well, i used the 2 Java vanity files posted in this thread. But that was days ago.
|
|
|
Also i never type the keys always copypaste them, so would a keylogger really get these passwords?
Damn.... I guess i have to format my PC and setup a new OS. Atleast my BTC are in cold storage and still safe.
keylogger can log clipboard too would you mind posting all 3 passwords just to prove you were the owner. posted them. Also i did setup a new OS. Fucking hacker scam.... ![Sad](https://bitcointalk.org/Smileys/default/sad.gif) check the browser history - which sites did you use for alias registrations? I deleted most of my data, but i saved my the NXT links. Link 1: Here i read about all http://wiki.nxtcrypto.org/wiki/How-To:Alias Link 2: Here i registered all: https://localhost:7875/alias.html
|
|
|
Also i never type the keys always copypaste them, so would a keylogger really get these passwords?
Damn.... I guess i have to format my PC and setup a new OS. Atleast my BTC are in cold storage and still safe.
keylogger can log clipboard too would you mind posting all 3 passwords just to prove you were the owner. posted them. Also i did setup a new OS. Fucking hacker scam.... ![Sad](https://bitcointalk.org/Smileys/default/sad.gif)
|
|
|
Also i never type the keys always copypaste them, so would a keylogger really get these passwords?
Damn.... I guess i have to format my PC and setup a new OS. Atleast my BTC are in cold storage and still safe.
keylogger can log clipboard too would you mind posting all 3 passwords just to prove you were the owner. 34412fbdb96bba1b2e20edc6f6ebc20fbfc9e6e91a2282035b6feb2f2da2534b es4678jhGR5.,uTTGGGdef35ujfg!7e3 af5c73ca7cf5f25ffa3b6b1689f40aaf60fd040b0de298c1ca661f8602d38311 what about my aliases?
|
|
|
If this story is true, someone has to be remotely on your PC to get the passes out of KeePass. That's not possible through console. How do you type in the master password of Keepass? If you type it manually, Keylooger will be back on topic. If someone got your master password, he only has to download your .kdb-file and you're completely fucked.
I type it in manually, is there another way? If it is true that my .kdb file is compromissed, i need to change about 150 passwords and lock some online banking accounts. Fuck my life seriously. I am off now, need to fix this mess.
|
|
|
TwinWinNerD: check browser history - where did you download NRS? check download history - where did you download it exactly? really no nxtcripto.org..? check hash of downloaded client
I use firefox and when i rightclick on the download and choose: Go to download page, it takes me straight to: http://www.nxtcrypto.org/nxt-coin/client-downloadNow i really think i got myself a keylogger/virus. Fuck.
|
|
|
Errr...the hex string in question is just a big number in decimal: 3.39197779385E+27 is what it converts back to. Might be possible that someone is running a bruteforce attack on all the numbers, but seeing that 3 accounts on the same PC were compromised at the same time, malware/trojan is a much more likely explanation.
Getting a feeling of deja-vu here, feels like the EpicThomas story again
I downloaded this software today, and the download matches the hash shown on the site. http://www.nxtcrypto.org/nxt-coin/client-downloadIf so, this indicates that your client was not the problem. Either your OS is infected or somebody somehow got access to your passwords. How did/do you store the passwords? Passwords are stored in a Keepass 2 database that is locked by a masterpassword that is >50 digits long. I have 2 USB backups of that file and one that sits on my computer.
|
|
|
Errr...the hex string in question is just a big number in decimal: 3.39197779385E+27 is what it converts back to. Might be possible that someone is running a bruteforce attack on all the numbers, but seeing that 3 accounts on the same PC were compromised at the same time, malware/trojan is a much more likely explanation.
Getting a feeling of deja-vu here, feels like the EpicThomas story again
I downloaded this software today, and the download matches the hash shown on the site. http://www.nxtcrypto.org/nxt-coin/client-download
|
|
|
Omg, someone cleared 3 of my accounts.... I used 256bit keys generated by Keepass 2. I am using NRS 0.5.8 that installed today and downloaded from nxtcrypto.org. I am using Windows 7 Professional and am running Avira and Microsoft Security Essentials. The NXT was transferred about half an hour ago, also while i was forging. My PC was running unlocked but i can be 99.99% sure that no one had access to it physically. So I don't really know how this happend?!? It can't be bruteforce right? My accounts: 8423671173148912884 107,217 12345678612257264594 71 13486646175575465553 998 The NXT are now in this account: 696356957947686421 Balance Total : 108,286 NXT Fuck me... Btw the password of the third account was for example: af5c73ca7cf5f25ffa3b6b1689f40aaf60fd040b0de298c1ca661f8602d38311 Any chance of seeing these NXT again? ![Sad](https://bitcointalk.org/Smileys/default/sad.gif) had you used online wallet? or local client? always local client. @anon why do you say windows is the problem? I used it for >2 years and never had any problems ect. Also i never type the keys always copypaste them, so would a keylogger really get these passwords? Damn.... I guess i have to format my PC and setup a new OS. Atleast my BTC are in cold storage and still safe.
|
|
|
|