Bitcoin Forum
June 25, 2024, 10:41:02 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 [37] 38 39 40 41 »
721  Alternate cryptocurrencies / Announcements (Altcoins) / Re: [ANN] Zipcoin [ZIPC]- X13 PoW/PoS - NO Premine - 7 days PoW - Ninja on: August 05, 2014, 09:15:27 PM
I just checked the archived original post at Bitcointa.lk:

https://bitcointa.lk/threads/ann-zipcoin-x13-pow-pos-no-premine-7-days-pow-ninja.350313/

The link under the "Wallet" category that the Windows .png is the anchor for, happens to be:

https://mega.co.nz/#!6cAxzBjT!KVntyW_y8j4QVwobEHROrRhpuKnX_2uxd-KML_S4ips

You can check it yourself by going to the Bitcointa.lk thread and using "Copy Shortcut" yourself. Bitcointa.lk automatically archives Bitcointalk threads, but does not change them to reflect after-the-fact edits. It also archives posts from self-modded threads that are later deleted, which does make it useful in certain cases. Wink 


I hope this clears things up.

Not entirely... where did the virus-version come from, and was it created by the same author of Zipcoin?

As far as I can tell, this link has been claimed to be the link where the virus version originally came from (although its content has since been removed): https://mega.co.nz/#!JAoyiajC!0ND16g-6qVDRGVuxnNBZmd-NInXzpbdaW9Pe9dDlDUo

The first reference I can find of that link is over in this forum by an admin, so I doubt it was created by them: https://cryptocointalk.com/topic/13908-zipcoin-zip-information/?p=116755

I posted a question asking where the link came from, we'll see if there's any reply.
722  Alternate cryptocurrencies / Announcements (Altcoins) / Re: [ANN] Zipcoin [ZIPC]- X13 PoW/PoS - NO Premine - 7 days PoW - Ninja on: August 05, 2014, 09:09:46 PM
can we decide for good now, please --

Virus or no Virus

There definitely is a version which contains a virus. What hasn't been decided is where that version came from, and if it was created by the author of the official Zipcoin wallet. So far, the currently posted version has not been found to contain any malware, but since any semblance of Gitian has been ripped out of it, it's very difficult to know for sure. (Gitian is what allows people to compile the software from source and see if the .exe is exactly the same as what's posted.)

As of right now, I honestly don't know, but I'd err on the safe side if I were you.
723  Bitcoin / Bitcoin Technical Support / Re: Bitcoin Wallet Empty, no transactions, no nothing on: August 05, 2014, 07:16:33 PM
Yer I installed the wallet from the exe. I dont even have any of these coins I just wanted to see if the "anon" feature of the coin was a scam. Which it was. Fuck.

Files located in that directory are ztor.exe and zipcoin-qt.exe

Lesson learnt about this crypto game. Certainly wont happen a second time.

That stinks. I'm at least glad you found the source...
724  Alternate cryptocurrencies / Announcements (Altcoins) / Re: [ANN] Zipcoin [ZIPC]- X13 PoW/PoS - NO Premine - 7 days PoW - Ninja on: August 05, 2014, 07:13:38 PM
Has any asked a mod to see if the original post had the malicious link (not that I really doubt it)?
725  Alternate cryptocurrencies / Announcements (Altcoins) / Re: [ANN] Zipcoin [ZIPC]- X13 PoW/PoS - NO Premine - 7 days PoW - Ninja on: August 05, 2014, 07:11:38 PM
sorry took a while...here is what i believe to be the virus QT...

https://mega.co.nz/#!L1IBwTzB!sHUsuf3fLQ-PJrtScL7IZaT99DPNesSSrUfJ_ehFjkg



Thanks, I just tested this and it is the same thing that happened on my compromised PC. This was the original windows wallet that was posted. It starts with the ztor.exe process, and creates the C:/user/Appdata/local/spoon backdoor program.

Anyone in doubt should test this themselves on a vm or sandbox, DO NOT RUN THAT EXE ON YOUR NORMAL SYSTEM.

NP thanks for verify. Could some more people do this for credibility please?

I can't verify that URL referenced above was in the original post, but I can definitely verify that it drops malware:

726  Bitcoin / Bitcoin Technical Support / Re: can't open database wallet.dat on: August 05, 2014, 05:58:21 PM
that's very helpful, thank you!
I installed Berkeley DB tools but when execute db_recover -c wallet.dat in the .bitcoin dir i get just
".bitcoin$ db_recover -c wallet.dat
usage: db_recover [-cefVv] [-h home] [-P password] [-t [[CC]YY]MMDDhhmm[.SS]]"


also when i run bitcoind, it finds the corrupt wallet and attemps salvagint automatically. It actually reports it salvaged the data (and just copied a back-up of the original file before the salvaging as .bak file)
but then when i start it again with the supposedly salvaged wallet it says "Wallet corrupted"

so, the bitcoin salvaging doesn't seem to work for me, hopefully the db tool will do the trick as soon as i can get it to work Smiley

My mistake, do not include the wallet file name, I should have said run "db_recover -cv" from inside the .bitcoin directory and it will attempt to do a recovery of all wallets in the directory. On second thought though, I don't think this will help. I think it only helps if there are BerkeleyDB .log files still present, and Bitcoin removes all BerkeleyDB logs before exiting, so this command probably won't do anything (but it doesn't hurt).

I'd try the db_dump/db_load process instead, starting with the original wallet file (not the one which Bitcoin created in its attempt to do a salvage). If that still doesn't work, then it's on to pywallet...
727  Bitcoin / Bitcoin Technical Support / Re: Bitcoin Wallet Empty, no transactions, no nothing on: August 04, 2014, 11:03:03 PM
By the way, are you sure that it doesn't look like a normal change transaction (not normal/a stealing tx would be a whole bunch of inputs and just one output). If you're not sure, please post the transaction id up...
728  Bitcoin / Bitcoin Technical Support / Re: Bitcoin Wallet Empty, no transactions, no nothing on: August 04, 2014, 11:01:07 PM
Yer just as we suspected, the keys were created only a couple of hours ago when i opened the wallet. This sucks. So the hacker just removed the wallet.dat file completely and when i opened the client it created new keys? Is this what happened?
Thanks for the help btw

Probably, Bitcoin will create 100 new addresses if wallet.dat is missing, and given that they got two different wallets, it sure doesn't sound like a technical glitch.

I'm sure you don't want to hear this, but to be safest you should probably reinstall everything from scratch at this point. Sad

If your wallets were encrypted, it's very likely you have a keylogger on your system. This means: (1) don't log into anything, and (2) after your system is reinstalled (or better yet, from a different system), change all your important passwords, especially financial ones, cause it's a good bet someone else could have them now...
729  Bitcoin / Bitcoin Technical Support / Re: Bitcoin Wallet Empty, no transactions, no nothing on: August 04, 2014, 10:42:50 PM
I couldnt find a bunch of reserve requests in the log file. Im not much of a techie but how do i use the the dumpwallet in the debug console? I typed dumpwallet into the console but it is asking for a string?

I'm not sure it'll help you much, but here it is anyways (with the quotes, assuming you're on Windows):

Code:
dumpwallet "c:\walletdump.txt"

Then you can double-click it (the file), and it will display the creation time of all of the reserve addresses (I think in the UTC time zone).
730  Bitcoin / Bitcoin Technical Support / Re: Bitcoin Wallet Empty, no transactions, no nothing on: August 04, 2014, 10:19:25 PM
Thanks for the reply.

It seems I may have been hacked. I checked the address I have sent bitcoins to from an exchange and the blockchain says my balance is zero and a transaction was made yesterday emptying the wallet. MY Minerals Coin address has also been emptied too Sad
Will there be a trace of this transaction in the debug file? I have run a virus scan and all seems clean. Does anyone have any ideas how they got in?

That really stinks, I was optimistic it may have just been a technical glitch, so sorry if I got your hopes up. Sad

Is there any chance the transaction you're looking at was something you initiated, and you're just confusing a full-out transfer with a change address, or was there only one output?

Regarding the log file: maybe. Most hacker victims just have their wallets or keys stolen, and then the hacker transfers the Bitcoin out later. If the hacker actually used your PC to transfer the coin out, then it would be in the logs. Also in the logs will be a bunch of "reserve" address creation messages around the time your wallet.dat was recreated.

Did you have your wallet encrypted? Did you have RPC enabled?

Have you installed or upgrading any software on your PC recently (especially from this or another Bit/Altcoin forum)?
731  Bitcoin / Bitcoin Technical Support / Re: Bitcoin Wallet Empty, no transactions, no nothing on: August 04, 2014, 09:41:33 PM
If all the saved addresses are gone, I'd guess that either the wallet.dat file moved or was deleted (by accident? technical glitch? a hacker? hard to say...), or the place where Bitcoin Core is looking for the wallet.dat file changed/got reconfigured.

Usually hackers don't matter deleting the wallet.dat as far as I'm aware (they usually just transfer the Bitcoin out leaving you with a 0 balance but the same keys), so maybe that's a good sign....

Have you installed or upgrading any software on your PC recently? Do you have a backup of the wallet.dat? Did you ever intentionally choose an alternate datadir?

How much was in there (don't have to tell me, I just mean ask yourself)? If it was a lot and you have no backups, and if you're a techie yourself or if you're willing to enlist the aid of one (a friend or paid), you should probably assume a technical glitch (it's the best case) and do something drastic, like shut down your PC right now, and boot off of a rescue CD with some data recovery tools.

Otherwise, I guess I'd start by searching the whole HD for any wallet.dat file, including the Trash/Recycle Bin, in the hopes it was just an accident/technical glitch. If you do a dumpwallet via the debug console / RPC, it would be interesting to see the creation dates of all of the keys. I'm guessing they were all created just now when you opened your wallet, which means the original wallet.dat file wasn't where it was expected and it got recreated.

That's all I can think of for now...
732  Bitcoin / Development & Technical Discussion / Re: Feature Request for Bitcoin Core: Replace by Fee on: August 04, 2014, 09:00:59 PM
Hi there,

I have a feature request for Bitcoin Core. (I'm not a programmer, so I am unable to contribute technical skills to getting this implemented. I can just type up my feature request here. Wink)

I recently lost $1 worth of BTC, because one of my transactions got permanently stuck in an "unconfirmed" state. This is because my iOS wallet app (BitWallet) didn't require me to include the required .0001 fee with it. As a result, my transaction never confirmed. To make matters worse, my app doesn't have the ability for me to cancel unconfirmed transactions so I can rebroadcast the transaction with a fee attached. Full details in this thread: https://bitcointalk.org/index.php?topic=722880.0 
    <snip>
I would like to express my support of seeing these "Replace By Fee" tools implemented into the Bitcoin Core app. This would help prevent users like myself from having their transactions lost permanently if they forget to attach a fee!

Thanks! Smiley

I'd guess that if your wallet software were smart enough to implement Replace By Fee (and if it was standard on the network), it would probably also be smart to not have caused this situation in the first place. In other words, I think the better option would be to get your wallet's developers to implement warnings when the transaction fee is too low, and also methods to remove stuck transactions, first (not to knock the devs, all things take time to work the bugs out).

If Replace By Fee were standard, no transaction would ever be instant, even very small ones. Some see this as an improvement in security at the expense of convenience and choice, others see the improvement in security to be so minuscule, especially with small transactions, that the cost in convenience makes it not worthwhile (although I'm probably summarizing all this incorrectly).

I tried importing the private keys into another wallet app (MultiBit), but it wouldn't let me create a new transaction because it saw the "unconfirmed" transaction as a valid transaction. So, my "available to spend" BTC balance had already reflected the lower balance, as if the transaction had already gone through.

Have you tried the advice over on this support page of theirs?

If that doesn't help, here's what I'd eventually consider.

  • Transfer the remaining balance (via the Bitcoin network) from your old wallet to one of the new MultiBit addresses. This is just to ensure that you don't lose anything on the off-chance MultiBit didn't like the keys you imported (I really don't think that's the case, I'm just being safe).
  • Once that transaction has confirmed, uninstall the old wallet so that it stops trying to broadcast the stuck transaction, wait a day or so, and try the advice on the linked page once again.

733  Bitcoin / Electrum / Re: Recovering Electrum Password for OSX on: August 03, 2014, 12:03:11 PM
Currently, I am struggling with step #5 of your guide:
...
cd \Users\Chris\Downloads\btcrecover-master
C:\python27\python btcrecover.py --wallet wallet.dat --tokenlist tokens.txt --other-options...[/color]

I am having trouble writing the command lines to identify my wallet file name and token file. I am very confused by the example that you have provided. What does the code "cd" mean? Is the code that you indicated above as an example the same step as step #5? How would this differ for someone using a Mac? 

Those commands were an example for Windows. I'm not much of an OS X person, so I might be wrong, but give this a try.

Start in the Applications folder, then open the Utilities folder, then open the Terminal application. From here, type in this:

Code:
cd /Users/Ben/Desktop/btcrecover-master
python btcrecover.py --wallet Wallet --tokenlist tokens.txt --other-options...

You shouldn't need to, but if you're interested there's a Terminal tutorial for OS X you can read over here: http://blog.teamtreehouse.com/introduction-to-the-mac-os-x-command-line
734  Bitcoin / Development & Technical Discussion / Re: Will we ever see automatically pushed updates? on: August 02, 2014, 08:43:59 PM
Blockchain-style wallets, while certainly less secure than desktop clients in most cases, shouldn't be compared equal to coinbase-style wallets, which is a phenomenon I see occurring all the time (not to imply that your doing so).
They should be— they're much closer in security model than you're giving them credit for— though this is a bit off-topic.  They can be silently and very subtly changed to give bad random numbers to signing operations, for example, thus constantly leak keys for months without being noticed.  You cannot argue that they're strictly superior to centralized wallets, since the centralized kind may be using things like HSM spending limits, offline keys, and insurance policies to make fairly strong guarantees on potential losses.  (not that I favor either… I just think the "but you have the private keys!" argument is highly misleading about the true security model)

In both cases (javascript-crypto despite its many weaknesses vs server-stored keys), the level of trust you're required to give the developers is roughly the same*, as far as I'm concerned. However in the someone-hacked-the-server case, I'd argue that you'd be safer with javascript-crypto. As you pointed out a clever hacker should certainly inject difficult-to-detect malicious javascript (and javascript being a dynamic language only makes this easier to go undetected), but I'd argue that the developers/admins would eventually catch such an exploit, decreasing the count of affected users.

In the end it's all shades of grey. A particularly clever hacker might do the same to a desktop client (e.g. a pull request whose true nature went undetected for some period of time), it's just a matter of likelihood. If that's true, the question then becomes what are the chances that someone could succeed in stealing any given wallet in such an attack? For example, maybe it's 0.1% for a particular desktop wallet, 25% for a javascript-crypto wallet on a compromised server, and 100% for a fully hosted wallet on a compromised server. Or maybe it's 0.1% / 95% / 100%. I'm sure I'm not qualified to guess, though.

* You could argue that you need to trust javascript-crypto developers more, simply because creating safe javascript-crypto is somewhere between hard and impossible, and you have to trust that the devs really know what they're doing.
735  Bitcoin / Development & Technical Discussion / Re: Will we ever see automatically pushed updates? on: August 02, 2014, 08:07:14 PM
Automatic updates are not a good idea.

I would personally never run a client that attempted any form of auto-update mechanism and I believe the same is true for many others.

It is very important that users audit the client before running it. Or if they are unable, to at least wait for some more experienced people to.

This, by the way, is one of the reasons why services such as blockchain.info's wallet should be considered insecure.
Fancy 'client-side' JS doesn't mean a lot when remotely served (the auto-update mechanism is built in).

Completely agree, with two caveats...

I wouldn't have a problem if there was a by-default-off automatic update mechanism (although the type of user who would most benefit from this probably wouldn't know enough to enable it, which kind of defeats the purpose...).

Blockchain-style wallets, while certainly less secure than desktop clients in most cases, shouldn't be compared equal to coinbase-style wallets, which is a phenomenon I see occurring all the time (not to imply that your doing so).

Edited to add: it's not that there isn't a clear benefit to automated updates, it's just that IMHO the risks outweigh the benefits, especially for the type of user who I'd expect to be running the full-node clients.
736  Other / Beginners & Help / Re: Newbie DO'S and DONT'S? on: August 02, 2014, 05:58:03 PM
Blockchain.info is cool though, because the site owner doesn't have access to the private keys of the users.

That is not entirely true.

The blockchain.info wallet is code that runs in the browsers, if it can work with your bitcoins after you've unlocked your wallet, and they provide the code, then it stands to reason that they can modify the code to take actions using your private key after you have unlocked it.

Or simply, they can change their javascript to be malicious. It is still a trust based service.

Or their server could be hacked and then give you malicious code and steal your password for decrypting the server side wallet file.

The important point is that online wallets are less secure than desktop ones, but at the same time not all online wallets are created equally.

Some, like Blockchain, publish their in-browser code as open source (on GitHub) and do not do any private key handling on their servers making them somewhat safer. Others store your private keys on their servers, making the service more PayPal-like than Bitcoin-like.

You could lose your Bitcoin in either scenario, but the former (Blockchain-style) service is the safer of the two.
737  Bitcoin / Bitcoin Technical Support / Re: [HELP] Import web wallet to Bitcoin core. on: August 02, 2014, 05:30:08 PM
Yes i have the private key. in AES format

And where i type bitcoind importprivkey WIF_KEY false ?

You'll need them in unencrypted format. The easiest way to get them is to log into Blockchain, go to Import / Export, then Export Unencrypted, and finally choose Bitcoin-Qt format. The private keys are the text that come after each "priv" element, and usually start with a 5 (but might start with an L or K).

If you're running the "normal" graphical version of Bitcoin, you can go to the Help menu, choose Debug window, and then click the Console tab. You can type the importprivkey commands into this window. For an example, type in: help importprivkey

Edited to add: it's much safer to simply send your Bitcoin from Blockchain to you desktop wallet. The problem with exporting/importing is that you're dealing with unencrypted keys, which might get saved to the browser's cache for example, and might get later stolen by malware. It may sound far-fetched, but as they say, "better safe than sorry."
738  Bitcoin / Bitcoin Technical Support / Re: Warning: error reading wallet.dat! All keys read correctly, but transaction .... on: August 02, 2014, 05:02:10 PM
perhaps a -rescan flag would fix it?

It might, although Bitcoin Core is already smart enough to do an automatic rescan if it thinks the corruption is inside a transaction record.

Check your debug.log file (Help menu -> Debug window, then click the Open button), and search for the text "Error reading wallet database" which should have a more specific error message following it, and let us know what you find.
739  Bitcoin / Bitcoin Technical Support / Re: I Lost My Wallet Balance on: August 02, 2014, 04:54:01 PM
ok my password at last worked

I'm glad things are working for you. This answer is a little late, but for future reference, MultiBit also creates encrypted backup files of the private keys as explained here which can be imported should the wallet file become corrupted for some reason.

What do you think about the wallet electrum?

It's biggest advantage of course is that it's a deterministic wallet: as long as you write down/print out your seed, you can always recreate the wallet with all its keys should you run into any trouble.

On the down side, it relies on a somewhat centralized system for checking transactions and balance (compared to MultiBit), and it doesn't scale well to thousands of addresses. These are pretty minor concerns if you ask me though.

MultiBit HD which is MultiBit's deterministic wallet is getting closer to release (although it's downside is that it probably won't be entirely free...)
740  Bitcoin / Armory / Re: Why the Security of USB Is Fundamentally Broken on: July 31, 2014, 09:26:56 PM
This has actually been done before, but not to the extent that the new researchers have reached.

The basic moral of the story is "don't let someone else plug something into your PC, it might be dirty." (this rule works IRL, too, if you  s/your PC/you/  Wink)

In other words, if you're using a USB stick to bridge the air gap, make sure it's one you bought yourself from a reputable seller, and then you'll probably be OK. I say probably because in theory, if your online PC is compromised, there are some USB sticks whose firmwares could be reprogrammed turning a clean USB stick into a dirty one.

It will be interesting to see if any malware in the future tries to do this automatically....

There was a thread that talked about this not too long ago: Offline wallet - USB key alternatives - security concerns
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 [37] 38 39 40 41 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!