What service are you using? There is nothing that users here can do. All you can do is to contact support of whatever online wallet you are using.
As for the medium priority transaction, Blockchain.info's time estimates are usually wrong. If you need help with confirming a transaction, then it we need to know what the transaction id of it is.
|
|
|
There is no description of the format of leveldb files that I know of. You will have to write your own client which uses LevelDB in order to read the data from those db files.
|
|
|
If I must read specific block for example 200000, in which file and which position in this file this block begin? I must read indices, where described is indices format? In https://en.bitcoin.it/wiki/Block I can't see block heights I can't see block hash, only previous hash. In blockchain are also blocks from alternative branch? The indices for the blocks are in a separate LevelDB database. The blk*.dat files are simply where the blocks are stored, but it means nothing to the software without the database which indexes the blocks. Those indices are kept in the index folder inside of the blocks folder. Bitcoin Core will write to the disk every valid block it receives, so this does include forks and stale blocks in case of blockchain reorgs.
|
|
|
Just out of interest i was wondering how the likes of Blockchain.info and Blocktrail.com know who mined a block?
IP address of the miner/pool node that relays the block that is solved is also available and can be compared to know mining pool addresses. The IP address is not an identifier. Because Bitcoin is a p2p network, the ip that relayed a block is most likely not the ip of the miner. Having miner IP out there is not a bad thing? Would think they need to have extra protocol to protect from being hacked. Did not know their was such a connection for miners,interesting.
ip addresses are public addresses. Unless your computer is not behind a firewall or not secure, than simply knowing an ip is not particularly useful. Every internet connection has an ip address, and that includes Bitcoin which uses the internet.
|
|
|
Litecoin uses a different algorithm than Bitcoin. Mining Bitcoin is pretty much unprofitable unless you have a couple TH/s. 360 kH/s is not going be enough to make any significant amount mining Bitcoin.
|
|
|
The blocks are written to the disk exactly in the way that Bitcoin Core receives them. It just writes the actually block messages. What exactly are you asking?
|
|
|
I use the regular original blockchain wallet tBTCBTC
Blockchain.info is neither regular nor the "original". The original wallet is bitcoin 0.1.0 released by Satoshi, and its successor is Bitcoin Core. So if you want to run a modern wallet that is the "original" then you are using Bitcoin Core.
|
|
|
Why?
|
|
|
TPTB_need_war, you cannot prove nor disprove that the Sartre text Craig Wright supposedly hashed is a collision for SHA256. The hash that he published is the exact hash that is signed by the signature that spent the Block 9 coinbase. Because calculating that hash is trivial and the signature is already public, it is reasonable and safe to assume that Craig Wright simply took that hash and claimed that it was the hash of the sartre text. You also pointed out that he supposedly has access to a supercomputer. Even with access to a supercomputer, he would not be able to find a collision as other researchers have already tried. Simply having a lot of computing power does not mean that he can find a collision. Alternatively, Craig could have found a vulnerability in sha256, in which case a lot more things than just Bitcoin is screwed. If Craig did not responsibly disclose such a vulnerability and instead exploited it, this would be incredibly sketchy and dishonest behavior. The theory that the sha256 double hash is weaker than sha256 is false. It has been proven that performing multiple iterations of a hash is more secure than just one iteration. Specifically, many websites will store users passwords in the form of a multiple iteration hash. This is significantly more secure than a single iteration hash. The resulting hash of a multihash function (including multiple iterations) has the same collision resistance as the collision resistance of the weakest hash. This means that sha256d has the same collision resistance as sha256. What multiple hashes protect against is a preimage attack.
Other than the OP
How is any of this "Meta"?
~BCX~
It isn't really, it started as a complaint against the removal of his thread and then he promptly continued the thread here.
|
|
|
hi everyone,
It is not working for me... Wallet properties> Receive bitcoins, just keeps generating empty Bitcoin addresses.
That is what it is supposed to do. If you don't see your full balance, try rescanning. Continuing to get new addresses will only work if your backup didn't have all of the addresses you previously used.
|
|
|
It would be pretty strange if he changed his settings to make his account more vulnerable/ less safe
It would be pretty normal if he didn't sign up with an email, thus that setting would not be enabled by default. Also, note how he says that Anyways, I didn't have any secondary security enabled.
Anyways, this is a pointless argument. Either way, he probably got malware on his computer which stole his password or his private keys, or both.
|
|
|
The private keys got compromised, blockchain.info is rock solid otherwise
I beg to differ. Blockchain.info has had multiple security issues in the past. His private keys were not compromised unless he imported them. He most likely got his password stolen. A password alone cant get you into a blockchain.info account, if you are trying to sign into your account with a new IP, you need email confirmation [/quote] It depends on your security settings. You don't need to have an email linked to the account and if you did, you could also have it not set to email you. It really just depends on what he set for security, and based upon previous cases, the most common issue is password theft, not private keys being compromised which is insanely difficult and almost impossible to do with a web wallet unless the service is hacked.
|
|
|
When we buy an account on auction section how can we know if that account wasn't already banned from a signature campaign for an example? Any way to know it or we only have the seller word to trust?
There is no way except to either ask every single campaign whether the account was banned or trust the seller. So it's very risk. If someone sells a neutral trust account, but that passed for many signature campaigns and was banned from all, this account won't worth. The buyer will think he can make some profit joining a campaign and in the end he can't anything. If a user has been banned from a campaign, the reason is usually negative trust or spam. It is fairly easy for someone to check whether the account has neg trust or if the posting history is spammy.
|
|
|
Relatively new wallet (2-3 months old) Used for pocket change Imported priv key that was generated online Can't remember if I swept it or just added it If I sweep a priv key into a wallet, does that mean if that key is compromised the entire wallet funds are available? No, that is only when you import. When you sweep, the funds are automatically moved from the private key being swept to an address in your wallet via a transaction. Anyways, I didn't have any secondary security enabled.
I'm just wondering if the wallet password was compromised or was it that priv key that caused this?
blockchain
Your password was probably stolen. Check that you don't have any malware. The private keys got compromised, blockchain.info is rock solid otherwise
I beg to differ. Blockchain.info has had multiple security issues in the past. His private keys were not compromised unless he imported them. He most likely got his password stolen.
|
|
|
When we buy an account on auction section how can we know if that account wasn't already banned from a signature campaign for an example? Any way to know it or we only have the seller word to trust?
There is no way except to either ask every single campaign whether the account was banned or trust the seller.
|
|
|
Block height in the coinbase transaction
- wow didn't know about this one. have no idea where this may be useful, perhaps bug forks or spv nodes to make it easy compare block heigts? who knows. thanks
I'm not entirely sure why they did that, but it does make indexing blocks easier and tracking forks. what about segwit? lightning stuff is there but lack of info how the use of the nop code, how segwit could be added to header and so on
Segwit doesn't replace any NOPs and it doesn't change the block header. The specs for segwit deployment have not been decided yet.
|
|
|
You have two confirmations already. If your wallet doesn't show that, then something is wrong.
|
|
|
And when you've done that, tada you have segwit (specifically, you get the _exact_ construction that was used in elements alpha). But a version of it with a ugly construction that requires every Bitcoin speaking program to upgrade _simultaneously_, and invalidates any pre-created nlocktimed transactions which _will_ confiscate some amount of users' Bitcoins (because some parties have been signing payments then destroying private keys as a time-lock-safe mechanism).
Isn't this a user problem rather than a protocol issue? First, the protocol doesn't specify that a user must destroy their private key when creating nLockTimed transactions. Second, since there's no guarantee that any given transaction will ever be successfully mined, it doesn't seem prudent to pre-sign transactions which sit off-chain and only become valid for broadcast and potential mining in some distant future whilst also deleting the private key. If this destructive behaviour can be condoned, it beggars belief that zero conf transactions are considered unsafe. While that is a user issue, it is not something that changing the protocol should mess with. If you change the protocol and you cause several users to suddenly have transactions that they just sent suddenly be invalid, you will anger many users and potentially cause them to stop using Bitcoin. About destroying the keys, there are some companies that provide multisig addresses and a pre-signed timelocked transaction to allow users to withdraw their balance should the service suddenly go down. If the service went down and this change happened, those users would no longer be able to access their coins.
|
|
|
Hi every one. Does this mean we can not use 0.93.9 version of Armory anymore or it doesn't make a difference?
You can still use it, but it is recommended that you use 0.94.1 because it is the latest version that has fixed several bugs. Because I have been trying to build the Armory 0.93.3 version and it takes up all my 267GB memory space, I do not know why...:-(
The databases for 0.93.3 and earlier are much much larger. Use 0.94.1 and the databases will only be a few hundred MB instead of several Gb
|
|
|
I have 9 AWS codes that I would like to sell. Each one is good for $100. They are all from the 2015 MLH Season so only one code can be used per account. They expire December 31st, 2017.
Price is 0.025 BTC per code. PM me to buy. You must either go first or use an escrow.
Good price! Do you know if I can redeem the code only in the US or also on foreign amazon websites like germany? This is for aws, so it doesn't work on Amazon's normal sites. Since aws doesn't have regions, you can use it wherever you want.
|
|
|
|