Bitcoin Forum
June 30, 2024, 06:17:32 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 [325] 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 ... 837 »
6481  Bitcoin / Hardware wallets / Re: How To Verify the Downloaded Version of Ledger Live on: August 30, 2021, 08:10:05 AM
Reason I didn't download directly from ledger site is because people mention you need to make sure to verify the signature of the download and I didn't know how to do that... so I didn't download download any update since then.
An attacker who can compromise the Ledger website and make it link to a malicious download could equally compromise whichever server Ledger Live connects to when you hit the "Update" button and make that point towards a piece of malicious software too.

With any piece of software, just downloading it from the "correct" source (while good practice) is never enough to ensure your safety. You should always verify it against the developer's keys or hashes.
6482  Bitcoin / Development & Technical Discussion / Re: A. Antonopoulos’ Take on Seed Splitting and Bruteforcing on: August 30, 2021, 07:56:02 AM
but I'd be kinda surprised if Andreas actually made that mistake tbh.
He actually does state this incorrectly.

https://youtu.be/p5nSibpfHYE?t=280
Quote
because only the one word which fits perfectly completes the checksum

https://youtu.be/p5nSibpfHYE?t=311
Quote
that means there are 7 words which contain key material in the missing share - how hard is it to crack or brute force 7 words?

He does then go on to correctly state that it would be brute forcing 80 bits though. Whether or not he actually made a mistake or whether he was just "dumbing it down" for his viewers or not is another question. I did see another video where he incorrectly stated (multiple times) that the BIP39 wordlist starts at "about" and ends at "zebra", though.
6483  Bitcoin / Electrum / Re: Adding the thirteenth word to the existing seed phrase? on: August 30, 2021, 07:32:12 AM
Surely, technically speaking, anything longer than 128 bits isn't adding any additional security since it would no longer be the weakest link in your set up, assuming an attacker doesn't have partial knowledge of your passphrase with which to reduce the search space?

The obvious scenario where someone would (and should) use more than 60 characters in their passphrase is if their passphrase is not randomly generated like the example I gave above - ]$wQ^;g2q94@$HRY. If you choose dictionary words, names, places, quotes, words from a book/movie/song/poem/etc. as your passphrase, then 60 characters will result in far less than 60 bytes of entropy.
6484  Bitcoin / Electrum / Re: Problem verifying download's signature on: August 29, 2021, 05:43:30 PM
-snip-
Sure, but reading OP's posts, he is brand new to using GPG and is importing a single key belonging to ThomasV to verify a single piece of software. He is highly unlikely to be importing other keys at this stage, and even less likely to be using them to build a web of trust since he doesn't know whose keys to trust or even how to sign that he trusts them. Yes, it is a good idea to sign keys once you understand why you should do so (which is explained in the link I gave), but I think forcing him to sign a key when he doesn't understand why is counterproductive to assisting him to safely install Electrum, which is what his ultimate goal here is.
6485  Bitcoin / Electrum / Re: Adding the thirteenth word to the existing seed phrase? on: August 29, 2021, 11:28:59 AM
13 word can be absolutely anything? Not from the BIP39 list ?
Not only not from the BIP39 list, but it doesn't even have to be a word. You can use an entire phrase or sentence (but don't choose a famous quote or song lyric, since you decrease your security by doing so), you can use numbers and characters, you could use something that looks like this: ]$wQ^;g2q94@$HRY

Just make sure you write down your passphrase on paper the same as you (hopefully!) did with your seed phrase when you first set it up, and keep it safe and secure. You want to store your seed phrase and your passphrase back ups separately, so if one is compromised by an attacker they still cannot steal your coins.

Correct, i just tried 500+ character as 13th word and it works.
I did this a few a years ago:

As a quick test, I just created and then recovered an Electrum wallet with a passphrase of 20,000 characters.
Perhaps just a touch excessive. Tongue
6486  Bitcoin / Bitcoin Technical Support / Re: A quick help please on: August 29, 2021, 11:19:46 AM
Soo, when I use a software or hardware wallet, it's not deriving multiple addresses from the same private key, instead it derives multiple private keys from the seed and then one address (or up to 3, technically) per private key?
That's correct.

The seed phrase (plus any additional passphrase you set) is used to first derive a 512 bit seed number. This seed number is then used to derive a master private key, a master public key, and a master chain code. The master private key is termed "m", which you see appear in derivation paths such as m/44'/0'/0'/0/0. The next private key in the derivation path - 44' - is derived from the master private key combined with the master chain code and the index number (in this case 231 + 44). The next private key in that path is derived from that private key, following a similar process. And so on down the tree (the process is similar but slightly different at non-hardened paths missing the ' symbol) until you reach the end of your derivation path. Then that final private key is converted to an address, which is what your wallet displays.

I'd recommend this link for a detailed explanation of how HD wallets work: https://github.com/bitcoinbook/bitcoinbook/blob/develop/ch05.asciidoc
6487  Bitcoin / Development & Technical Discussion / Re: Using two layers of mixers to further obfuscate address history on: August 29, 2021, 11:10:07 AM
Most mistakes are made by people reusing addresses but if we exclude that, and combine Tor, vpn and different browsers with mixers, that would be enough to break any possible connection between addresses.
Using Tor with a different circuit each time you deposit, withdraw, or otherwise interact with the mixer is probably better than using a VPN and a variety of browsers. VPNs don't guarantee anonymity by any means, and really you are just shifting your trust from the mixer provider to the VPN provider. Other browsers are also not hardened in the same way Tor is to avoid leaking information which may identify you, such as your real IP address via WebRTC even if you are using a VPN - Tor stops this by having NoScript installed automatically. As soon as you start customizing any browser, be that with add-ons, themes, even resizing the window, you start making yourself more identifiable. Using a clean install of Tor with nothing changed is your best bet to both protect your information from leaking, as well as keeping your browser as common as possible.
6488  Bitcoin / Bitcoin Discussion / Re: Hackers/Public will have Access to Quantum Computers in 5-10 years? on: August 29, 2021, 08:23:55 AM
For example speed of light is a constant 299,792.458 km per second. This value never changes always the same as its like its has been programmed to be from the start and never goes below or higher than it.
The value absolutely does change. Light propagates at different speeds in different medium, and different wavelengths of light also propagate at different speeds in those medium. In the most simple example, that's how a rainbow forms - from the different wavelengths of light from the sun propagating at different speeds through water droplets.

Sounds impossible I know but Quantum is making impossible seem the possible.
Quantum computers make some specific things which are simply too difficult with standard computers much easier, but they can not solve any and every problem, such as turning an address back in to a private key.

If Quantum can do the impossible then getting private keys is a walk in the park for quantum.
No, it isn't. It will be possible in select cases as we've discussed above, but even when finally possible, will still take a prohibitively long time for many years until quantum computers are much improved.

I wonder how governments & central banks are preparing against quantum computers that are a threat to their CBDC's?
CBDCs will be entirely centralized, and so there is zero trade off for them to implement quantum resistant algorithms.
6489  Economy / Economics / Re: Debate: Bitcoin vs Gold with Anthony Scaramucci and Peter Schiff on: August 29, 2021, 08:04:17 AM
Hell, Jim Cramer built an entire career out of yelling aggressively.
Genuinely laughed out loud at that. Grin

They're essentially the same untrustworthy personalities peddling pseudo-nonsense, but for some reason have devoted followings, most likely by virtue of simply appearing on mass media, which implicitly gives them credibility.
But at some point people must question it, no? When Schiff has been regularly promising for 20 years that gold is going to hit $5,000 within a few years, and in that entire time it has only been over $2,000 for like a week, surely the people who listen to him must start having doubts? I suppose I just continue to be amazed at how long someone can peddle complete bullshit before they lose their following.
6490  Bitcoin / Bitcoin Technical Support / Re: What info can be gathered using my receiving address btc on: August 29, 2021, 07:51:58 AM
One day if receiving addresses are crackable, then there may be information leakage, like how the generating key had a certain pattern that classifies a group of users. For example, a certain range of "random" keys that weren't random. But that's a very long distance into the future, hopefully.
To turn a receiving address back in to a private key requires reversing a RIPEMD-160, SHA256, and an elliptic curve multiplication. Even advanced quantum computers which are still decades away will not be able to achieve this. And even if we ever get to a stage that SHA256 can be broken, then an attacker can at most find a collision. Given that there are 296 public keys per address (on average), then that's still far too many possibilities to draw any meaningful conclusions from. In short, this is not a concern.

Your other point regarding Electrum is an important one, though. If OP starts going around looking up this address on various block explorers or querying it through light wallets, then it links his IP address to that bitcoin address. Whether or not that information ever finds its way back to the person he is concerned about is another matter, though.
6491  Economy / Economics / Re: Debate: Bitcoin vs Gold with Anthony Scaramucci and Peter Schiff on: August 28, 2021, 08:31:57 PM
Although, it is a debate but why would someone make many lies all because he wanted to support gold, the lies that can mislead people.
For the same reason most people do anything - money. The more people he can convince not to buy bitcoin and to buy gold instead, the more his bags of gold are worth. He doesn't care if what he is saying is true or not; he cares about his own personal wealth. He's quite happy to lie about bitcoin and see other people lose money, as long as he gets richer. See also: John McAfee, Elon Musk, CSW.

he generally doesn't know what he's talking about when prediction after prediction about how doomed the dollar was failed to materialize for years.
He's been predicting gold will hit $5,000 since the year 2000, and he's been predicting bitcoin will hit $0 since 2013. He is a broken record, completely insulated from the real world. It is a wonder he keeps getting invited back on TV when he has been so consistently and monumentally wrong with every single one of his predictions.
6492  Bitcoin / Development & Technical Discussion / Re: Using two layers of mixers to further obfuscate address history on: August 28, 2021, 08:18:47 PM
If someone is not using two mixers, they might not otherwise use a similar time interval to mix their coins. Also, once a person's coin has passed through (a) mixer(s), they might spend their coin at a diverse set of merchants.
Yes, that was the point I made in my first reply. If I deposit 0.5 BTC in ChipMixer, and then withdraw a variety of smaller chips over a period of days, weeks, or even months, as and when I require them to spend directly with a merchant or other third party, without ever withdrawing them in to my own wallet, then my privacy is far greater than if I deposit 0.5 BTC and then immediately withdraw 0.5 BTC. If I repeat that action of depositing and immediately withdrawing the same amount, then my privacy is lessened further. If I always withdraw the same amount to an address associated with the same service, be that another mixer or something else entirely like an exchange, then my privacy is lessened further still.

All things considered, I think you are far better sticking with a single mixer. If you are at the stage of considering combining two or more mixers or other privacy techniques, then you would probably be better off just using Monero.
6493  Bitcoin / Hardware wallets / Re: P2PKH Wallets from ColdCard MIA / any alternative routes? on: August 28, 2021, 04:46:05 PM
My first attempt I used account number 22 ( m/84'/0'/22'/0/0..) and it structed the command with a certain XPUB.  I next tried to use the m/84'/0'/0"/0/0.. and noted that the command it created for this importmulti command was a completely different XPUB file.  Is this normal?  I would of imagined that the XPUB it used would be the same but there's where my understanding of XPUBs derived from the master public key vs. the derivation path kind of breaks down.
I don't own a ColdCard so cannot comment on the specifics you have mentioned, but yes, this is normal.

An xpub is your account extended public key. Lots of places refer to it as your master public key, but technically speaking, this is incorrect. Your master public key is at derivation path m. Your xpub from those two wallets will be at derivation path m/84'/0'/22' and m/84'/0'/0' respectively, and therefore, completely different. Not that the derivation path structure as laid out in BIP44 is as follows:

Code:
m / purpose' / coin_type' / account' / change / address_index

As you can see, you changed the account (the third number) from 0' to 22', which is the level the xpub is derived from. The two xpubs will therefore allow you to restore all the addresses in each respective wallet, but they will not allow you to restore addresses from a different wallet.

Also worth noting that the first three levels are hardened, as denoted by the ' symbol after the number. This means that if you were indeed dealing with the master public key at level m, you could not derive any addresses in either of your wallets, since you need the corresponding private keys to move down hardened paths.

6494  Bitcoin / Development & Technical Discussion / Re: Using two layers of mixers to further obfuscate address history on: August 28, 2021, 01:32:32 PM
-snip-
Sure, but I would argue that if you repeatedly perform the same deposits and withdrawals of the same amount with the same delay and the same transaction heuristics then you are going to reduce your privacy, regardless of whether or not you are withdrawing your coins back to your own wallet or to a second, compromised mixer. Using a honeypot might speed up the process of identifying all your transactions for the honeypot operators, but if you repeat the same behavior enough then anyone who can read the blockchain would be able to link your transactions with a reasonable amount of certainty.
6495  Bitcoin / Development & Technical Discussion / Re: Using two layers of mixers to further obfuscate address history on: August 28, 2021, 12:41:51 PM
If one mixer is actually a government honeypot, or information about its users is otherwise leaked, and you use it last, the privacy you received from the first mixer will be reduced.
I take your point about consistently sending coins from mixer A to mixer B - doing so is a fairly unique transaction and so potentially links all your mixed coins together. But can you elaborate on the part I've quoted above? I assume when you say "information about its users" you are talking about things like IP addresses, browser fingerprints, etc? If so I understand, but if you are referring to blockchain or transaction information, then I don't follow your line of reasoning. If I withdraw (for argument's sake) 0.256 perfectly anonymized bitcoin from ChipMixer, send it to government honeypot (using a perfectly anonymized Tor session), and then receive a different 0.256 BTC from the government to my own wallet, what additional information have they gained?
6496  Bitcoin / Bitcoin Discussion / Re: Hackers/Public will have Access to Quantum Computers in 5-10 years? on: August 28, 2021, 12:32:44 PM
But wouldn't the quantum computers be able to decipher the hash of those private keys? Because they're made to make calculations that could last for about a million years to be solved shortened in a matter of seconds, will it be a threat?
No. Not every calculation is the same. Some calculations would be exponentially faster with a quantum computer, some would be linearly faster, and some wouldn't be faster at all.

Turning a public key in to a private key is particularly susceptible to quantum computers. A quantum computer running what is known as Shor's algorithm could reduce the number of operations required from 2128 to somewhere in the region of only 1283. This number of operations is trivial for a standard computer, and so quantum computers will eventually reach this stage also.

However, reversing a hash and calculating a public key from an address would only experience a linear speed up. The best method for doing this, Grover's algorithm, only reduces the search space for SHA256 from 2256 to 2128. 2128 is simply too large a number to be threatened by any computer, quantum or otherwise. The entirety of bitcoin is built on security of 2128, and nothing has ever come even close to a tiny fraction to the number of operations required to break it.
6497  Bitcoin / Bitcoin Discussion / Re: Hackers/Public will have Access to Quantum Computers in 5-10 years? on: August 28, 2021, 08:49:33 AM
As for whether it's possible, bitcoin uses two algorithms for signing. While private-public key pairs will be more easily determined, I believe that segwit resolves this by obscuring the public keys behind hashes
All addresses, be they legacy or segwit, are derived from hashes of the public key. It is only very early transactions which used P2PK - pay to pub key - which do not use hashes of the public key and would be inherently vulnerable to quantum computers. All addresses in current use are only vulnerable if they have already made an outgoing transaction and therefore revealed their public key.
6498  Bitcoin / Development & Technical Discussion / Re: Using two layers of mixers to further obfuscate address history on: August 28, 2021, 07:36:25 AM
I am considering a scenario where I have sent coins to ChipMixer, and now instead of withdrawing the chips to either send the coins back to my own wallet or to pay for a good/service/other transaction, I instead send them to a second mixer. Even if the second mixer is horrendously buggy or filled with weaknesses, I don't see how any of those bugs or weaknesses could decrease the privacy I have already gained from ChipMixer. The only scenario I can see which might decrease my privacy is that if I am mixing coins a second time, I am probably far more likely to withdraw all my chips at once and send to the second mixer. If I deposit 0.5 BTC to ChipMixer and then withdraw different amounts at a time over a period of days or weeks, my privacy is much better than if I withdraw all 0.5 BTC in one transaction shortly after I deposited it.
6499  Bitcoin / Bitcoin Technical Support / Re: What info can be gathered using my receiving address btc on: August 28, 2021, 07:30:13 AM
Take note that by freezing the address, it's just frozen in that specific client and wallet file.
It can still be spent in other instance of that wallet, say, your Trezor Wallet/Suite app.
Yeah, if you plan on continuing to use Trezor Suite then freezing it in Electrum won't achieve very much, and you still run the risk of accidentally combining it with funds from other addresses in a future transaction, therefore revealing your other addresses to be linked to the addresses we are discussing here.

If it were me, I would just get those coins out of my wallet so I never trip up and accidentally spend them when I didn't mean to in the future. Maybe create a new wallet (you could create a simple software wallet using Electrum if you are going to be downloading it anyway) and send the coins there just to get them out your wallet, or alternatively, send the coins through a service such as ChipMixer so you can return them to your wallet completely obfuscated from your original address.
6500  Economy / Economics / Re: Debate: Bitcoin vs Gold with Anthony Scaramucci and Peter Schiff on: August 28, 2021, 07:16:07 AM
so their discussions on Twitter are already known as conflicts between father and son, although I doubted that they just want to attract even more attention to themselves.
They are just manipulating their followers. Schiff comes out and says "I'm holding 0.001 BTC as an experiment, here's my address, I sure hope no one sends me any more!" and gets a bunch of free bitcoin. Then he says "Now my son has just bought some bitcoin, look at his account here!" and then he gets a bunch more sent to him for free. Listening to Schiff on anything bitcoin related is stupid, but sending him or his son free bitcoin "to teach him a lesson" or "to spite him" or something is just downright moronic. As I said above, he is just the same as an altcoin shiller, manipulating his followers for his own benefit.

Pages: « 1 ... 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 [325] 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 ... 837 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!