Ich hatte bisher das Bitcoin-Verzeichnis auf einer externen HDD und als ich vor ein paar Tagen mein System neu aufgesetzt hatte gab es eine Fehlermeldung von Bitcoin-Core, dass ein resync (oder rescan so genau weiß ich das nicht mehr) notwendig ist und alles nochmal heruntergeladen werden muss.
Das passiert sogar relativ häufig wenn die Blockchain auf einer externen Festplatte gespeichert wird. Core braucht eine ständige Verbindung zur HDD. Und bei Externen Festplatten kann die Verbindung gelegentlich mal kurz einbrechen. In der Regel ist das kein Problem, aber Core meckert da rum. Ein rescan muss da sogar relativ häufig durchgeführt werden. Wenn man die ganze Blockchain heruntergeladen hat (also ohne Prune), dann dauert das aber auch nicht all zu lang weil die Chain nur neu verifiziert wird und das UTXO Dataset aufgebaut wird.
|
|
|
Bitkey is actually different. The distribution was built more as a cheaper cold-storage solution, with all tools that you can find in one package.
And where is the differernce to any random live distro containing the packages you need (or installing them yourself, it's just one command after all) ? I'm with ETFbitcoin here. Installing any distro (e.g. Tails) with the necessary software (electrum or whatever) is better than using outdated software.
|
|
|
Mir scheint das ledger wallet nicht sicherer zu sein als wenn ich ein altes iPhone nehme meine coins da auf eine Exodus mache und mir die 12/24 Worte merke/aufschreibe und dann das iPhone ausschalte und in den Schrank lege.
Da liegst du sehr daneben. Um es kurz zu halten: - Dein Iphone: Closed Source
- Exodus: Closed Source
- Iphone im Schrank: Keine Hardwaresicherheit
Jeder könnte an dein Mobiltelefon gehen und deine Coins versenden. Oder mit Malware infizieren. Und das nächste mal, wenn du es verwendest, werden die Coins gestohlen. Die Möglichkeiten sind hier vielfältig. - Kein extra Account bei ledger
Den hast du so oder so nicht. - Keine Hardware die nicht repariert werden kann. (iPhone schon!)
Wozu? Wenn die Hardware hinüber ist, dann holst du dir eben eine neues HW Wallet. Kostet ja auch weniger als 1/10 eines Iphones (und hält vermutlich länger).
|
|
|
Der Gründer/CEO von Atomic Wallet ist ein Mitgründer von Changelly und demnach ist der Trustscore auch schonmal höher als bei Projekten mit unbekannten Gesichtern.
Changelly? Trustscore schonmal höher? Bist du betrunken? Alle "Instant Exchanges" sind eine Plage. Sie frieren ohne irgendeinen Grund Transaktionen ein und verlangen KYC. Sie bieten horrend schlechte Wechselkurse. Warum jemand so etwas nutzt ist mir ein Rätsel. Gibt mehr als genug Fälle von Betrug seitens Changelly. Mal ganz davon abgesehen, dass die in einem Land operieren in denen das verboten ist währen sie über ihre Herkunft lügen... Sehr Vertrauen erweckend ist das nicht. Bei Wallets sollte es nicht um Vertrauen und Trust gehen, sondern um Verifizierbarkeit. Ein Closed-Source Wallet braucht hier wirklich niemand.
|
|
|
Der Nachteil dabei ist, das andere Netzwerkknoten nicht alle Daten von deinem Knoten herrunterladen können, da du eigentlich nur eine "light" Version hast.
Und ein weiterer Nachteil ist, dass wenn die Wallet Datei verändert bzw. eine andere verwendet wird oder auch ein Fehler auftritt der einen neuen Aufbau der internen Datenbank erfordert, die gesamte Blockchain erneut heruntergeladen werden muss. Ist die gesamte Blockchain bereits vorhanden, muss diese nur neu validiert werden und die UTXO Datenbank wird dabei neu aufgebaut. Bei einem pruned Node muss sie neu heruntergeladen werden, was Zeit kostet.
|
|
|
I put my nano ledger s in one of those containers HCP suggested and put the silica pack gel inside. Now if i keep it there for a few weeks, then open it and use it and put it back in, do i need to replace the silica gel packs? I put two of those gel packs.
Only if they absorbed lots of moisture, which they probably didn't within a few weeks depending on where you live. Also... do i need to put that usb cable in the container as well? If so, is it safe to put both the cable and the nano ledger s in the container with a few silica packs? Or best to use a different container for each?
You can basically use any USB cable with data pins. It doesn't need to be the original one. So in the end.. it doesn't matter. If they break, use a different one. There is absolutely no issue with that procedure.
|
|
|
He has mycelium and the coins are in SA watch only account. [...] Is there a way to import private keys for this account if I don't have the keys encrypted nor the QR code?
Sure, there is. But you actually need to have/know the private key. If you have the private key, you can simply import a "new account" and use that private key. Without knowing the private key, you won't be able to spend the BTC. A watch-only wallet is just an imported address without any ability to spend from (therefore watch-only). That's basically the same as looking at any random address. Without the private information required (the private key), you can't spend from it. If your friend does not have any backup / QR / private key, he can't spend the coins.
|
|
|
Doesn't that require having malicious hardware and software though?
Of course. But that's also the reason to disconnect hard drives, remove speakers, led's, etc.. Is it more secure than CSPRNG library or /dev/urandom?
IMO, no. /dev/random and dev/urandom are both absolutely fine for an average user. It has been tested extremely accurate and is being used by governments and 3 letter agencies. But you'd need to make sure that your not using compromised software or hardware.
|
|
|
~snip~
If OP would have taken his xpriv and converted it into whatever himself, i am sure he would remember. And then the post wouldn't just be " ... lost bitcoin core wallet ... only have 12 words ...". In fact, he probably could restore his wallet on his own if he'd be techy enough to use a random script/technique to convert his xpriv into a sequence of words himself.
|
|
|
It seems to me that even with txindex=1 you'll just get stuck after using getrawtransaction / gettxout on TXID A. This will just return information on the address/ txid A.
With -txindex used, you are able to build your own database of all transactions. Then a simple search for the desired address can yield the result you are interested in. This wouldn't even be lots of coding, just a small script to store and search for the required information.
|
|
|
I would agree, but 1) its complicated [...]
There are several types of cold storage methods. Some of them are more and some are less complicated. A hardware wallet for example is pretty straight forward and not complicated to use at all. [...] and 2) ledger keeps getting hacked. the keys are safe, but your personal data is all over the web (twice now in as many months).
Ledger is not the only hardware wallet available. There are other vendors to choose from. Each hardware wallet has its pros and cons.
|
|
|
Depends on your node.
If you have indexed all transactions (-txindex flag), then definitely. If you didn't, i doubt that's possible the way you imagine (not sure tho).
|
|
|
Anyone know why that wallet version is removed from github repo?
My wallet.dat only decrypts part of the keys and passphrase seems not accepted with other versions.
Did you by accident miss this: [READ BEFORE POSTING] Tech Support Help Request FormatClick the link, read the post and adapt. This is a perfect example of a XY problem. Follow the format in the above thread and explain what exactly the problem is and what exactly you want to achieve.
|
|
|
I found my wallet.dat in my old computer. but i dont remmember the key and passord. Anyone can help me. I will pay 15%
Which "key" are you talking about? If you don't know the password, you'll have to bruteforce it. Depending on the length and complexity of the password this either is a possible or impossible task. The more you know about the password, the better your chances are. Unfortunately you gave us very little information, so we can't really say anything else. If you however bought the wallet file, then you got scammed and the wallet does not contain any keys and therefore no bitcoins can be retrieved.
|
|
|
It is just a coincidence that users lost XRP. That coin is surely not targeted for some reason. Yes, users received a link telling them to download a new version of the software. Once installed, it asked users to enter their 24-word seeds. Those who did, sent their seed to the hackers.
The attack: - A phishing mail targeting badly informed user to retrieve a hardware wallet mnemonic code.
The targeted Coin: - A coin which is a fully centralized shitcoin no sane and informed person would buy.
There might be some correlation
|
|
|
Dann erklär dich mal, warum zB Crypto.com - die auch Wirecard als Kartenaussteller hatten, dennoch nach wie vor operativ sind?
Naja, es hatte nur die deutsche Wirecard AG das Problem. Wirecard Card Solutions Ltd. aus England lief problemlos weiter. Dort wurden die Karten auch ausgestellt und gemanaged. Und des weiteren werden die Karten/Konten von crypto.com nicht mehr von Wirecard Card Solutions Ltd. gemanaged, sondern von Payrnet Limited. Der Wechsel fand vor ein paar Wochen im Hintergrund statt.
|
|
|
Allow me to add some steps (off the top of my head), depending on your level of paranoia, not necessarily in this order: [...] 2. Disconnect your PC speakers. 3. Disconnect your hard drive ( read why) [...] If you are that paranoid, you also shouldn't use any computer at all. Using the main power line is another way to exfiltrate data from air-gapped systems. And this actually does work. Powerhammer is doing exactly this. So, you might want to add this to your list: - Do not use any electronic device (your computer included).
- Do only create your paper wallet 1000 ft. below the surface. You know, there might be microphones and cameras built into your house wall. And the NASA is spying on every on us from the space.
- Never get vaccinated because bill gates is trying to turn us all into zombies.
A little bit of paranoia might be fine, but there definitely is a too much.
|
|
|
Okay so are you saying its not possible for the social engineering message that happened with electrum... to happen with ledger live? Or its still possible?
"Not possible" is a very strong phrase. It is possible, definitely. But an attacker would need to compromise ledgers server, their private key and basically the whole company. The probability for that is.. pretty low to say at least. You definitely shouldn't worry about this.
|
|
|
How many people here got that phishing email? I checked my email and don't see it. So it affect one percent of the nano ledger users database?
We don't have exact numbers. But it seems like a not too small percentage is affected. I, personally, didn't receive any mail either. Also in an article it was said that this phishing lead to many users losing their crypto... especially ripple. Can someone explain this? So the phishing email tricked users into downloading a fake ledger live or was it some other program? Then how did users lose their ripple then which i heard was the main coin that was lost here? Am i assuming those users typed their ledger seed into the software?
Possible. Basically, they either downloaded malware which asked them to enter the mnemonic code or created a transaction which the user blindly accepted (for whatever reason) or they entered the mnemonic code somewhere online. Because since nano ledger is a hardware wallet, even if your computer is compromised as in virus/malware/keylogging, doesn't the seed as long as its not typed in the computer somewhere still safe?
Yes, that's correct. If you follow the basic guidelines (e.g. not typing your mnemonic into malware), you are fine.
|
|
|
[...] als kleiner Tipp: Nachdem du den Seed generiert hast und den vom Nano abgeschrieben hast diesen nochmal zurücksetzen (bspw. 3 Mal das falsche Passwort eingeben) und neu mit dem Seed initialisieren. Dann kannst du dir 100%ig sicher sein den auch richtig abgeschrieben zu haben. Das spart unglaublich Nerven solltest du den Seed mal brauchen Alternativ lässt sich über Ledger Live auch eine "Recovery Check" Applikation herunterladen. Damit kann man den Mnemonic Code überprüfen ohne seinen Nano resetten zu müssen. Eingegeben werden müssen die Worte sowieso am Nano (niemals wo anders), ist also beim ersten Einrichten kein wirklicher Vorteil. Aber falls man schon einiges eingerichtet hat und sich nicht sicher ist ob der Mnemonic Code stimmt -> Dafür ist die Applikation nützlich
|
|
|
|