Bitcoin Forum
July 18, 2024, 06:47:07 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 [318] 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 ... 837 »
6341  Bitcoin / Hardware wallets / Re: [LIST] Bitcoin Seed Backup Tools on: September 13, 2021, 08:05:58 PM
The metal I used so far was 1.5mm stainless steel.
That's probably your issue there. If you take a look at a variety of proprietary stainless steel back up products, the good ones are usually much thicker than this.

Coldbit - https://coldbit.com/product/coldbit-steel/ - 4mm
Cryptoetch - https://cryptoetch.com/ - 5mm
Cryptotag - https://cryptotag.io/ - 6mm

But especially for those, it's nice to have a tamper evident seal, be it a steel wallet that offers this feature or just a paper wallet stored in a ShiftCrypto tamper evident seals for example.
You can always make your own by screwing a second stainless steel plate on to the one which has your words stamped/etched on it, obviously obscuring the words, and then affixing a tamper evident sticker across the two plates, or drilling holes in at least 2 opposite corners and passing through tamper evident wire seals or something similar.
6342  Bitcoin / Bitcoin Discussion / Re: Passphrase wallet on: September 13, 2021, 07:43:34 PM
Is there any safer options than allowing the wallet to generate it?
Depends on what you mean by "safer". If you mean that you don't trust your wallet to generate truly random entropy, then the method I would suggest would be flipping a coin 128 times. However, you still need to calculate the checksum, so will need to input your entropy in to some software since you cannot do that by hand, and you will still need to turn the resulting 132 bit number in to a seed phrase, which is prone to error if you are doing it manually, and you will still need to import that seed phrase in to some wallet software to generate private keys and addresses.

Yes I understand that it is probably the least odds to generate the same word 12 times in a row but it is possible. I do not know the math it prolly is below 0.000001% chance but for the sake of being accused to be wrong I included it is possible but IRL it is not likely.
As I said above, it's 1 in 340,282,366,920,938,463,463,374,607,431,768,211,456.
Time to be completely pedantic, but actually it's around 1 in 2121, rather than 1 in 2128.

We know there are 2048 possible 12 word seed phrases which repeat the same word 12 times. Of these, we know that only 128 will have a valid checksum, since the checksum has 24 = 16 possibilities. (Note that this is an average. I've not actually tested every seed phrase to see if we end up with exactly 128 valid ones.) So you have 128 (27) possible seed phrases out of 2128. 2128/27 = 2121.

Not that any of that matters. They are equally impossible.
6343  Economy / Service Announcements / Re: Bitcoin Dust Address Made Simple on: September 13, 2021, 07:27:28 PM
Which makes me wonder is there a private key to those addresses?
Almost certainly.

could someone get lucky and unlock those bitcoins?
Almost certainly not.

If we take the address 1BURNbitcoinBURNbitcoinBURP3vqZJo as an example, working backwards along the process all we can say that is generated from a RIPEMD-160 hash output of 01FB0C820F0995E24AAD95DB98BA96BA28F4AD66. To work out the private key we would first have to reverse RIPEMD-160, then reverse SHA-256, then solved the DLP to get the private key. Alternatively, we would just need to brute force trillions upon trillion upon trillions of private keys until we stumbled on to a collision. Both are so incredibly unlikely as to be safely considered impossible.

I wouldn't install software for this, but if it can be integrated as an Electrum Plugin, it could actually work!
Now there's a nice idea, although the usual caveats with Electrum would apply - if you create a single signed transaction spending all your change outputs and send it via your Electrum server to the central server running this service, then which server you are using can link all your change outputs.
6344  Economy / Service Announcements / Re: Bitcoin Dust Address Made Simple on: September 13, 2021, 12:41:38 PM
-snip-
Your suggestion doesn't really solve the problem though. Either I have dust which is too small to send without combining it with another input, in which case I would still have to do that and compromise my privacy to send to this new service, or my dust is large enough to send on its own, in which case I can just do that but send it to a mixer or instant exchanger or something similar. I don't see the use case for a service where I have to send my dust, as I'm either losing my privacy or losing my coins (or both) to use it.

I've spoken before about Peter Todd's Dust B Gone proposal, which would do exactly as you are describing but without the requirement to first compromise your privacy by sending him your dust. Unfortunately, the demand for such a service would be too small that the anonymity set of people using it would also be too small to be useful.
6345  Other / Beginners & Help / Re: My System for Security/Protection of Hardware Wallets and Valuables on: September 13, 2021, 12:19:36 PM
Hardware wallets are not durable and should not be treated as such. They will fail quickly at mildly deranged temperatures, susceptible to water or even excess humidity, impact, crush, they will fail over time, or even might just have a faulty component and will fail randomly at any moment. Putting it in a fireproof box is an incomplete solution to only one of these issues.

Hardware wallets are designed for easily and securely interacting with your private keys, not for durability. If you want durable long term storage, then the answer is to inscribe your seed words on some stainless steel or similar. You can also mitigate all these issues by having at least two back ups (even just simple paper back ups) in two separate physical locations.
6346  Bitcoin / Bitcoin Discussion / Re: How to time-lock your coins with the new Schedule an email (gmail) to send later on: September 13, 2021, 12:02:28 PM
I'm not at all surprised that a lot of people trust Google, not only when it comes to their daily activities, but they would also entrust their crypto assets to them for safekeeping.
Even if you naively believe Google are a completely benevolent company and dont exist for the sole purpose of harvesting your data and making profit from selling that data, do you also believe the same about every single one of their employees? What about every employee of every third party that they farm out their services to, or works for them, or provides their services, or hosts their servers, or repairs their hardware, and so on. There is a huge list of unknown people whom you need to trust when you start storing anything with third parties. It's a very risky position to be in.

It is nonsense to say the least, but I would say "your money, your risk", so let everyone decide what they want to do - some keep their crypto backups in Gmail anyway.
Sure, but that risk needs to be informed. Many people incorrectly believe Google is completely safe and impervious to hacks, leaks, bugs, or vulnerabilities, and so may choose to store their seed phrase in their email or something similar because they wrongly think it is safe. If you are aware of how risky it is and choose to do it anyway, well, that's a different story.
6347  Bitcoin / Bitcoin Discussion / Re: Passphrase wallet on: September 13, 2021, 10:18:02 AM
I am using a extreme example of if a seed was 12 of the same words in a row they will be attempted by amateur people trying to get into wallets.
Sure, but any seed phrase with the same word 12 times in a row will not have been generated randomly but rather chosen manually, and any seed phrase chosen manually will be highly insecure.

I have never tried to manually generate a seed can you pick words which are not in the random list that wallets have or do you pick from the words already there?
You should never manually generate a seed phrase. If you want your seed phrase to be BIP39 compatible, then the words must come from the set wordlist of 2048 words.

I think manually choosing a bigger database of words and then randomly selecting them could be safer. If the wallet seed generation has 100 words to pick from but allows custom words you could use 1000 words and then use a script that randomly chooses from that list which would make it more secure than if you used the wallet generation script.
A pointless task. Your seed phrase with more words or a bigger wordlist might be harder for someone to brute force compared to a standard seed phrase, but no one can brute force a standard seed phrase anyway. The resulting wallet and private keys it generates will not be any more secure.
6348  Bitcoin / Bitcoin Discussion / Re: How to time-lock your coins with the new Schedule an email (gmail) to send later on: September 13, 2021, 10:01:55 AM
i just did this with a vanity address i created, i am regifting my self bitcoin on a special date a few years out
Even after everything discussed in this thread, you still decide to go ahead and do it? We'll, here's hoping you only committed a small amount of bitcoin, since if anything happens with Google or your receiving email provider, or they discontinue the service, or even just a minor bug, your coins are lost forever.

If you really wanted to irreversibly lock up some coins, then just sign a timelocked transaction to yourself and delete the relevant private key. Still a stupid thing to do, but far far safer than trusting an unknown number of intermediary third parties.
6349  Bitcoin / Bitcoin Discussion / Re: Passphrase wallet on: September 12, 2021, 08:31:34 PM
The only seeds which are guessed would be ones which have repeated words.
Why do you say this? There is nothing inherently wrong with repeated words in seed phrases, and there is absolutely nothing in the code to prevent words being repeated in seed phrases. Assuming your seed phrase is generated truly randomly, then you have around a 1 in 31 chance of a 12 word seed phrase naturally containing the same word twice, and you have around a 1 in 8 chance for a 24 word seed phrase.

Sure, if your seed phrase contains the same word 4+ times, then it is probably because you have manually picked the words, but any seed phrase with manually chosen words will have very poor security.
6350  Bitcoin / Bitcoin Discussion / Re: How to time-lock your coins with the new Schedule an email (gmail) to send later on: September 12, 2021, 08:20:45 PM
I wonder, is it possible to schedule a transaction to be sent at X date? If that were possible one could only just schedule that all his funds will be moved over to X wallet at Y date. If the person is still alive / not incapacitated it was just a matter of time to cancel the transaction and just schedule another one to another point in time. I don't know if it's possible though ...
There is no way to broadcast a transaction today which will be scheduled to be mined at a future date. I suppose you could set up some software to broadcast a transaction for you at a set date, but then you run the risk of the software not working, or the computer dying, or going offline, or anything else, which you wouldn't be around to fix. The best thing you can do is to sign a transaction today which cannot be mined until a set date, and then share it (or where to find it) with a third party for them to broadcast in the event you can't.

I can make a transaction moving all my coins to your wallet, and say that it cannot be mined before block 800,000. I can then either store it my safe, knowing that as the inheritor of my estate you'll be able to access it after I die, or I can send you the signed transaction to keep yourself, knowing that it cannot yet be mined. At some point before block 800,000, if I'm still alive, I can either simply open my safe, destroy the transaction, and replace it with a new one which cannot be broadcast until block 900,000, or (if you already have the signed transaction), I can move all my coins to a new address to invalidate the transaction you are holding, and then send you a new one timelocked to block 900,000.
6351  Bitcoin / Bitcoin Discussion / Re: Passphrase wallet on: September 12, 2021, 07:56:21 PM
So I can randomly select 12 words from the 2048 and generate a bitcoin wallet? Thats pretty neat
No, you can't.

So far every 12 words I've chosen have not opened a wallet
The final word in every seed phrase contains a checksum. If the checksum is not correct then usually the software you are using will not accept the seed phrase. By randomly picking words, you only have a 1 in 16 chance of selecting a word with the correct checksum for a 12 word seed phrase. This falls to 1 in 256 for a 24 word seed phrase.

But more importantly, selecting words yourself is a terrible way to generate a wallet, will massively decrease your security, and could easily lead to loss of funds. Don't do it.

How come the fees for legacy addresses are so much high then addresses that start with a 3?
Some address which start with a 3 are nested segwit addresses. Segwit moves part of the transaction data (the witness) to a separate section and counts it differently when calculating the weight of the transaction. Since these transactions now have a lower weight, they will pay a lower fee. Addresses which start with bc1 are native segwit addresses and will reduce the fee even further.
6352  Bitcoin / Wallet software / Re: BITCOIN WALLET on: September 12, 2021, 07:44:10 PM
A solution to this is presented by the https://seedsigner.com/ device, which is fully open source hardware and software, and totally air gapped. You can enter the private key and it calculates a public key for you and it can even sign a transaction to spend those funds.
That's one option, sure. An easier option without having to buy a specific device will to be use a permanently airgapped computer running a clean install of an open source reputable Linux distro of your choice with full disk encryption. Lots of people would recommend Tails for such a purpose, with handily comes bundled with Electrum. If you only want to store your wallet on paper after you have generated an address on Tails, then you can just shut it down once you've backed up your seed phrase on paper. If you want to continue to access your wallet on Tails to use as a cold wallet, then you'll need to enable persistent storage.

6353  Bitcoin / Bitcoin Discussion / Re: How to time-lock your coins with the new Schedule an email (gmail) to send later on: September 12, 2021, 07:10:20 PM
First of all, I will not encourage you to create a paper wallet and store your fund there. I don't have enough faith in it, don't ask me why because I don't know. I am using hardware wallet and open-source noncustodial wallet Electrum, so I have faith in these two.
If paper wallets aren't for you that's totally fine, but some people (myself included) use them, and if used properly they are one of the most secure ways you can store your coins. I don't think the term "paper wallet" still necessarily refers to the classical paper wallet of a single private key printed on a piece of paper. I have a number of wallets I would consider paper wallets as they are only stored on paper and nowhere electronic/digital, but those paper wallets are standard BIP39 seed phrases which I will recover to an airgapped device as and when I want to spend from them.

Here's their main "service" offering as described in their website[2]
What the...? People actually use this? Take literally every piece of information and document about themselves, enough for an attacker to completely empty all their financial accounts and open huge amounts of credit in their name and take over every single account they have ever opened anywhere, and store all that in a single location with a company which were found to be storing passwords in plaintext for more than a decade. Wow.

Even on-chain timelocking is risky because one mistake and your coins will be locked for way longer than you intended.
Well, you would double check the timelocked transaction after signing it. If it turns out you signed it for 1,000,000 years in the future by mistake, then you can just delete it and create another one.

But I always found timelocking in general a very poor practice. You don't know how the future will change. Maybe you or your loved one will get cancer and you will need all the money you can get, but because you bought into the HODL STRONG HANDS NEVER SELL meme you will lock yourself out of the very much needed funds.
Yeah, I would only ever use timelocked transactions to potentially move some funds to someone else I wanted to inherit them in the event of my death/incapacitation. I would still have access to the relevant private keys, so could move the coins to invalidate the timelocked transaction and then generate a new one if needed.
6354  Bitcoin / Development & Technical Discussion / Re: Zpub safety on: September 12, 2021, 02:27:16 PM
I'm a little confused about how we have gotten to the leaking of a private key?
Because the combination of a Zpub plus any one individual private key is enough to derive the Zprv and all the associated individual private keys.

It 100% impossible to obtain A private key from a Zpub(or any derivation of a master public key).
Correct.

And to my original question...In the case of a multisig wallet if someone stores all of their Zpubs in an unsecure place, the only risk is privacy, correct?  You are just giving someone the ability to create a watching-only wallet, correct?
Mostly correct. There is a hypothetical security risk in the scenario described above where you have accidentally leaked a private key, and there is the also the concern that if someone can recreate your watch only wallet and see how much bitcoin you own, that they may target you specifically for further attacks.
6355  Bitcoin / Hardware wallets / Re: [LIST] Bitcoin Seed Backup Tools on: September 12, 2021, 01:40:09 PM
Why not just etch/engrave your words rather than stamping them? You can get an etching pen for 5 bucks on Amazon or a local hardware store, or just go old school and get a scrap sharp piece of similar metal. No issues with bending or deforming the plate, but you just need to make sure your writing is clear and legible.

What metal are you using? Make sure it is both thick enough and not a malleable metal. Stainless steel and titanium are good choices.
6356  Bitcoin / Bitcoin Technical Support / Re: It can be possible generate working QR of a privkey from empty squared sheet? on: September 12, 2021, 11:03:52 AM
Yes. I just haven't decided if I want to dynamically compute it on each click or add a "finalize" button that user has to click which computes the checksum in the end.
I suppose the issue with computing it on each click is if your tool is being used by someone with an incomplete understanding of seed phrases and their checksums. For example, someone who selects 24 words but gets fed up half way through and just copies the first 12 words, not realising the checksum will be invalid. Or maybe someone who enters 132 bits of entropy, your tool computing the checksum and turns it in to a 13th word, and they just copy the first 12. I would have thought a "Compute checksum" button which is greyed out unless the user has entered exactly 128 bits or 256 bits of entropy would be less prone to errors.
6357  Other / Beginners & Help / Re: Question regarding links between oldish bitcoin addresses and segwit ones on: September 12, 2021, 08:11:23 AM
As I understood, an private key starting with 5, give a legacy address only, and also give an uncompressed adress.
Yes. Uncompressed WIF keys start with 5 and should only generate uncompressed legacy addresses. You can use them to generate other addresses, but these address will be non-standard and it will be very difficult to successfully spend any coins sent to such addresses.

Obviously the public key generated by my 5xxx private key gave me a compressed key, probably compressed for ease of use.
You can use uncompressed private keys to generate both uncompressed and compressed public keys. Similarly, you can use compressed private keys to generate both uncompressed and compressed public keys.

Is there a way to find out our uncompressed key and perform send a transaction, just for science ?
You can use the latest version of bitaddress from here: https://github.com/pointbiz/bitaddress.org
Download, verify, and run offline.
Enter your compressed or uncompressed WIF key in the box under "Wallet Details", and it will show you both your compressed and uncompressed private keys, public keys, and addresses.
6358  Bitcoin / Wallet software / Re: How secure are the hardware wallet sold online in the market? on: September 12, 2021, 08:00:05 AM
The presence of a tamper-evident seal provides more value when the person checking for the seal is familiar with the seal, what it should look like unbroken, and what it should look like broken.
Sure, but as you say, almost everyone buying a hardware wallet is going to be unfamiliar with the exact design of the seal being used. Any documents put inside the box showing what the seal should look like or linking to a webpage showing what the seal should look like can also be manipulated by an attacker.

They provide additional value when there is a serial number on the seal that needs to match some kind of log that was received separately.
This is a good idea. Are there any hardware wallet providers which do this? Although it still doesn't stop an attacker who can print their own tamper proof seals from intercepting your package, manipulating your hardware wallet, and then immediately printing and attaching an identical seal.
6359  Bitcoin / Legal / Re: How to leave KYC for good on: September 12, 2021, 07:52:22 AM
Yes well, I gave that example, but the criminal could claim it was in 2017 at the peak or whenever suits him best for tax purposes.
Sure, but you didn't pick up 20 bitcoin for nothing in 2017 like you could back in 2010. If someone claimed they had bought $400,000 worth of bitcoin but had no paper trail, then I agree that would be very suspicious and would likely lead to an IRS audit.

I'm obviously no expert in money laundering, but if you are looking to launder amounts of $50-200 million as is being discussed here, then head overseas. You can buy citizenship in a number of countries for tiny fractions of that sum, countries which have very loose tax laws or very corrupt and bribeable officials. There are tax haven countries and off shore companies which launder huge sums for below 20% in fees or taxes. Hell, most of the big banks around the world are complicit in money laundering, and perfectly legal companies such as Amazon and Starbucks manipulate the system to pay tiny percentages in taxes all the time.
6360  Bitcoin / Development & Technical Discussion / Re: Zpub safety on: September 11, 2021, 07:42:57 PM
Publishing (or leaking) a derived address/privkey pair allows anybody to use the master-zpubs to generate the master-zprivs and with that, any private key that can be derived by the master private keys.
Leaking a single private key would only allow an attacker to use that private key and the corresponding master public key to derive a single master private key. In the case of a multi-sig wallet, funds would still be safe since the attacker would only have one master private key, and not the threshold number of master private keys. For the coins to be at risk, OP would have to leak multiple private keys derived from different master private keys, which is very unlikely if his multi-sig wallets are all stored separately (as they should be) and he takes reasonable security precautions.



Throughout this thread, people are using Zpub and zpub interchangeably. They are not the same thing. zpubs are for P2WPKH addresses, Zpubs are for P2WSH addresses. See here for more info: https://github.com/satoshilabs/slips/blob/master/slip-0132.md
Pages: « 1 ... 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 [318] 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 ... 837 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!