Bitcoin Forum
June 25, 2024, 09:54:21 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 [40] 41 »
781  Alternate cryptocurrencies / Mining (Altcoins) / Re: MedusaMiner ??? on: July 02, 2014, 01:24:49 PM
the source code shows in C++ - https://github.com/medusaminer/medusaminer , Im sure if you took time to look through the source code rather than accusing you will find this is most likely not a virus, some people have had good results with it, I personally am struggling to build it from source but I found no evidence of any malicious code.

There's a good reason you can't compile it... the source code isn't complete. Even it it were, the source code which is there is clearly just a 99% copy of CGMiner, except for removing any references to the CGMiner name and replacing some of the copyright notices (which itself is a GPL violation...) with bogus names ("Michael Bubble"? really?). In short, the binaries and the source code are not the same.

Just because something claims to be open source, doesn't make it safe.
782  Other / Beginners & Help / Re: Newbie DO'S and DONT'S? on: July 02, 2014, 01:06:12 PM
Probably already been said but be wary of installing wallets for new alt-currencies, I've heard of at least two wallets with keyloggers. Also make sure to download from official websites and not random links posted up on the forum.

Would you mind sharing a little bit details? I have tried to search with Google but got no results.

  • Don't download programs from the Internet. This rule is difficult to follow 100%; just be aware that each new program you download and run could be the one that steals your BTC.

Have there actually been any cases of people downloading software and having their BTC coins hacked? I know there's a lot of 'automatic bitcoin' software out there that are obvious scams, but I'm saying more subtle things like Alt Coin wallets, someone downloads an Alt Coin wallet installation and all of a sudden their BTC coins are gone. Any cases of that yet?

I guess that depends on your definition of "subtle", but one thing is for certain: there's some new piece of malware posted on the forums every couple of weeks, and it's been getting a bit more clever each time. This is a trend that I'd guess is very likely to continue.

Take this one for example. The website it points to looked surprising professional even though it had some broken links (it's currently down, so you'll just have to take my word for it). It wasn't posted by a newbie which gave it a little credibility (I'm pretty sure the forum account it was posted under was hacked). The malware itself wasn't all that clever given that it tripped a bunch of antivirus (probably some existing RATware if I had to guess), but overall it wasn't immediately obvious.

Here's another one that's a little more clever. Not the nicest looking website, and it is posted by a newbie, but it claims to be open source and even has a link the the supposed source on GitHub. There's also someone who's not a newbie who is somewhat defending it. The malware itself isn't an off-the-shelf package-- it appears to have been custom written and doesn't trip antivirus unlike the first example.

I'd have to guess that these kinds of examples are already fooling at least some people, otherwise why would their respective authors keep bothering (both of those examples were not the first of their kind...)?
783  Other / Beginners & Help / Re: Newbie DO'S and DONT'S? on: July 02, 2014, 12:28:51 PM
RodeoX, baitty, Acidyo, thanks for the kind words.

Awesome list! Did you compile it yourself?

This should be a sticky in this section.

Yes, it comes from years of trial and error ( mostly the latter...  Roll Eyes )
784  Other / Beginners & Help / Re: Newbie DO'S and DONT'S? on: July 01, 2014, 08:08:52 PM
Some of these are repeats... but they deserve being repeated!

  • Do encrypt (passphrase protect) your wallet. Don't use a simple passphrase. Don't use a passphrase you use elsewhere. Encryption helps, but understand that it doesn't prevent all types of theft.
  • Do backup your wallet. Different wallet software work in different ways: some wallets you only need to backup once, others you need to backup after every new receiving address is created, and others are somewhere in-between. Understand how this works for the wallet software you've chosen, and be vigilant with your backups!
  • Don't start off owning more BTC than you can afford to lose/have stolen. If you find yourself getting close to your personal limit, search for "cold storage" and find out how to use it. Don't put this off until it's too late.
  • Do choose one of the wallet options from the official choose-your-wallet page here: https://bitcoin.org/en/choose-your-wallet. Not all online wallets are bad, however Do heed the warnings on this page regarding some of the less-safe online wallets. Choosing an online wallet does not exempt you from backing up your wallet.
  • Don't download programs from the Internet. This rule is difficult to follow 100%; just be aware that each new program you download and run could be the one that steals your BTC.

Regarding that last rule, here are some guidelines that can help you decide how (un)safe a download is. Note that these are not hard-and-fast rules!

  • Do research a program before downloading it. Are there a lot of websites discussing it if you search for it? Does it have a Wikipedia page that wasn't created yesterday? If either answer is No, Do be more suspicious of it.
  • Software that is open source, especially if the answers above were No, is generally more trustworthy, but Don't assume that something is safe simply because it's authors claim it's open source!
  • Software that is written in a popular scripting language such as Python, Ruby, Perl, JavaScript, etc. is generally more trustworthy, but Don't assume that something is safe simply because it's a script unless you can read and fully understand the entire script! Never download and run something claiming to be a script if it's actually an EXE file.
  • Do look at the number of pages in a thread before downloading any software referenced on the first post of the thread. More pages means a smaller chance of the software being malware (but there's always still a chance it could be malware!). Do avoid software with only a few pages worth of posts - let someone else be the guinea pig!
  • Do look at the Activity count and the Date Registered of users when trying to decide if they're trustworthy, and be more suspicious of Newbies, but Don't automatically assume that a Hero Member is 100% trustworthy.
  • Do err on the side of caution/paranoia. It only takes one piece of malware to steal all of your BTC even if you've encrypted your wallet and even if you're using two-factor authentication.
  • If you've decided to risk downloading something, Do take the time to find the single official download link or website.

Sorry if I sound scary... most people around here are the honest type, but there absolutely are scammers around here too. Use common sense, and have fun!
785  Bitcoin / Bitcoin Technical Support / Re: Encrypted wallet.dat, lost password, any solutions? on: June 30, 2014, 07:52:18 PM
is your script compatible with Multibit?

Btcrecover supports Multibit.

Does this new python password recovery tool bypass the RPC to make it way faster?

Btcrecover (written in Python) doesn't use the Bitcoin RPC API. With Bitcoin Core wallets, on a single core CPU it's around 15% slower. On a machine with more than one CPU core it's faster. There's also experimental GPU support which makes it much faster, if it works at all...

For Armory, it's exactly the same speed (because it uses the Armory library) except that it can use multiple CPU cores which again makes it faster.

For Multibit (classic) and Electrum, it's quite a bit faster than any of the wallet types above because these two wallets unfortunately don't use any key stretching...
786  Alternate cryptocurrencies / Altcoin Discussion / Re: Recover wallet passphrase - special circumstance? on: June 26, 2014, 07:21:29 PM
Guess I have a lot of work ahead of me. Grr. Thanks for the helpful answers guys. I was really hoping to be able to get the LTC back and not have to do as much manual work.

The LTC might be a lost cause, assuming you don't remember anything about the password, but why is there a lot of manual work for your BTC? It should just be a single dumpwallet, rename the wallet.dat file, and then a single importwallet, correct?
787  Alternate cryptocurrencies / Altcoin Discussion / Re: Recover wallet passphrase - special circumstance? on: June 26, 2014, 06:00:59 PM
Firstly, you're hopefully aware if your wallet is unlocked, you can export all the keys at once (unencrypted) with dumpwallet (which can then be imported all at once into a new wallet with importwallet)?

Regarding your password, sorry to be the bearer of bad news, but it is not stored anywhere in memory and cannot be retrieved. When the wallet is unlocked, the password is used to generate a decryption key which is then used to decrypt your Master Key, and then the password is removed from memory (it is securely overwritten). The decrypted Master Key (which is simply 32 random bytes) alone is stored in memory while the wallet is unlocked, and it is used to decrypt individual private keys on demand. When the wallet becomes locked, the decrypted Master Key is securely overwritten.

So to get your LTC back, I imagine your only options would be recovering your password, restoring your LTC wallet from a backup should you have one, or brute-forcing your LTC wallet if the password is short enough and/or you remember some portion of it...
788  Bitcoin / Bitcoin Technical Support / Re: where to put bootstrap file? on: June 18, 2014, 05:46:49 PM
Look here for Windows:

https://bitcointalk.org/index.php?topic=652909.msg7362979#msg7362979

TL;DR: %appdata%\Bitcoin
789  Bitcoin / Bitcoin Technical Support / Re: Faster loading on: June 17, 2014, 08:31:13 PM
Yes, but when Im not uploading I am not hurting the network I just dont contribute. I dont know if "erono" meant that.

Your still hurting the network in a way as your taking without giving back which means the networks supporting your client and not getting anything out of it. Not that it really matters I think he just wanted to point out that it will damage the network as more people are doing it

I certainly understand that point of view, but I thought that it was generally understood that as Bitcoin continues to get more popular, there will be a diminishing percentage of full nodes compared to SPV/lite nodes. Of course it's always good to encourage the use of a full node client, but I see no reason to discourage the use of an SPV/lite client... just my 2c.
790  Other / MultiBit / Re: Help! 3 BTC Stuck in MultiBit Wallet on: June 17, 2014, 08:24:26 PM
If I simply copy the multibit.wallet file over my current one would it work?

I agree with the other posters here that this should work, assuming you back up anything before overwriting it. I'm concerned that in the screenshot you provided, there was a noticeable change in file sizes between the backup files. As long as you get back all of the addresses/keys you need, this seems the easiest & safest option.

Or if I have access to the private key backups could I just import them into a new client and bypass the whole password process?

The private key backups (at least the ones that MultiBit creates automatically) are encrypted with the same password(s) as the wallet files...

If restoring a wallet file doesn't work, you can try to look for password typos with this: btcrecover (full disclosure: I wrote that...), quick start is here.

Good luck...
791  Bitcoin / Bitcoin Technical Support / Re: Faster loading on: June 17, 2014, 02:39:18 PM
Users don't do it because you need to download the whole blockchain, which as you noted is a real pain. Also, if you don't keep the computer running 24/7, it ends up damaging the network health.

Damaging network health...? Can you explain?
792  Bitcoin / Bitcoin Technical Support / Re: Faster loading on: June 17, 2014, 02:36:20 PM
Or you could download the Bitcoin bootstrap.dat, which is almost all the blocks. You can get that through direct download or torrent, which is better than random nodes.

The Armory folk maintain a bootstrap.dat torrent you can use. Visit here for the current link to their torrent file: https://s3.amazonaws.com/bitcoinarmory-media/announce.txt. As of today, it's only a couple of months behind.

Once you have the bootstrap.dat file all downloaded, place it in the Bitcoin directory (%appdata%\Bitcoin on windows) before you start it for the first time, and that will speed things up a bit. You can also ask Bitcoin to use more RAM with the -dbcache=# command-line option (I use a value of 2048 (that's in MB) on my 8 GB machine on only the first start, YMMV). If you have an SSD, the initial indexing and the remaining block downloads can be as short as 3 hours. (Once done, the Bitcoin client renames the file to bootstrap.dat.old, and you can delete it.)

The Armory client tries to automate all this, but I've had some issues with it in the past (which were probably my fault...) so I usually do it manually.
793  Bitcoin / Wallet software / Re: Clients accepting dynamically loading plugins on: June 16, 2014, 09:58:49 PM
I would like to develop a plugin for a Bitcoin wallet. Does any wallet accept dynamically loading plugins?

Electrum does, though I don't know anything about their (Python) plugin interface.

Armory is adding plugins support, but's only in the initial planning phases now, so it'll probably be a while.
794  Bitcoin / Wallet software / Re: Idea for "hybrid hosted" wallet on: June 16, 2014, 09:54:44 PM
The benefit is that you can access your bitcoin wallet from anywhere.

Blockchain.info is designed so that the private keys are stored in the client's browser and never make it to the server. Some people think this is more secure because blockchain.info never sees the private key, but now the private keys live in your browser's localStorage. Its just as likely to get hacked there is it is to get hacked on blockchain.info

There are some things that sound interesting to me... you get most of the advantages of both running a full node and an SPV or web client (full blockchain validation but lightweight on your client devices).

I'm not sure what you mean with regards to blockchain.info though. Keys are stored encrypted both on their server and in localStorage (but not in RAM). If you enable two factor auth, even the encrypted keys are no longer stored in localStorage by default. Not that it's perfect, in particular their default key stretching is pretty minimal.

Also I wonder how long a $5/mo. DigitalOcean VPS with it's 512M of RAM would take to do the initial blockchain indexing.... you could always beef it up during the initial indexing I suppose.
795  Bitcoin / Bitcoin Technical Support / Re: Bitcoin-qt Passphrase stopped working after clone/ghost of hard drive on: June 13, 2014, 08:43:44 PM
Thank you so much for your response. The answer to all those is no. I did update my bitcoin-qt, just to see if it would fix it.

im on windows and trying your suggestion. i downloaded the zip and python and am running the script in elevated cmd and this is what im getting:

"The wallet is encrypted and the passphrase is incorrect"

Should i just give up?

perhaps a stupid question.. but when you open the bitcoin client you have the exact same RX addresses, right ?

Justin00 had a good question, but assuming the answer is Yes, I'm thinking it's not worth the effort trying other things if you don't have much in that wallet. It'd be possible to check for single-bit or single-byte errors in the mkey for example, but someone would have to write some custom software to do that which wouldn't be that easy...
796  Bitcoin / Bitcoin Technical Support / Re: Bitcoin-qt Passphrase stopped working after clone/ghost of hard drive on: June 10, 2014, 05:01:40 PM
Sure sounds mysterious to me...

You mentioned cloning your drive. Did you need to:

  Reinstall the OS?
  Reinstall Bitcoin-Qt?

Do you have an older backup of your wallet file?

Have you made any other recent changes (other than the HD upgrade) to your PC?

Does your passphrase contain any non-ASCII characters (any characters not in this table: http://en.wikipedia.org/wiki/ASCII#ASCII_printable_code_chart)?

If the answer is no to all of those questions, I'd probably try dumping your wallet file with pywallet which might provide some clues.

You can download it from here: https://github.com/jackjack-jj/pywallet/archive/master.zip If you're on Windows, you'll also need Python 2.7 from here: https://www.python.org/download/ (you don't need any other libraries, despite what the README for pywallet says)

Next run it from the command line, something along these lines* (after you unzip the pywallet-master.zip file somewhere):

Code:
C:\python27\python C:\Downloads\pywallet-master\pywallet.py --dumpwallet --passphrase="the passphrase" > wallet-dumped.txt

If any of the private or public keys in your wallet file are corrupted, Bitcoin-Qt will complain about a bad password, but pywallet only checks the first key it finds. In the dump file, check for a message that says "The wallet is encrypted and the passphrase is correct" or "is incorrect". If correct, you probably have a single corrupted key which could be found and removed. If incorrect, then it could be your master key that's corrupted, or the password actually has changed, which might not be repairable....

* If you're paranoid like me, the output file should be something like " > e:\wallet-dumped.txt" where e: is a disposable thumb drive which you can later destroy. One thing about SSDs is that there's usually no good way to securely delete a file from them, and the dump file will contain all your unencrypted keys... if you have a hard disk drive, you could use Microsoft's SDelete (Google for it...).
797  Bitcoin / Armory / Re: Armory - Discussion Thread on: June 07, 2014, 03:34:30 PM
By "isolated" I mean that the new channels enabled by the "plugin" system would be isolated.  Any extensions would requiring signing, and virtually no code within Armory would be any different with or without the extension (there would simply be one extra loop that checks the directory for python files and signatures, and then adds a new tab for each one).  Everything to do with it could be disabled by simply deleting the extensions directory or giving it root permissions that prevent reading or writing (then that loop would skipped and Armory would run identically to a version that doesn't have this).

Apple does the same thing with code signing pretty sure that has been broken since day one.

Would such a plugin directory be located in an only-root-writable location by default, e.g. /usr/lib/armory/plugins or \Program Files (x86)\Armory\plugins? If so, I don't see how it could compromise security unless root was already compromised (in which case all bets are off anyways), correct?

You could still allow a per-user preference to enable/disable individual plugins, but require root/Admin to initially install them.
798  Bitcoin / Bitcoin Technical Support / Re: Recovering my encryption password from the QT on: June 07, 2014, 02:15:49 PM
basically you are after a script to try every dictionary word, if i am understanding correctly ?
i might be able to help.

Every dictionary word? That's not the impression I got from OP's post, s/he said s/he "probably misspelled" their password and that s/he made a "reasonable dictionary" which I took to mean a bunch of likely misspellings.

If he really wanted every dictionary word, that sounds more like a wallet thief than a misspelled password to me (just to be clear, that's not the impression I have).

Regardless, that thread mentioned above has a lot of good info. I'll go ahead and plug my own recovery tool which can help, although I'm clearly biased... a summary is here if you're interested, as is a link to the tutorial: https://github.com/gurnec/btcrecover
799  Bitcoin / Bitcoin Technical Support / Re: Encrypted wallet.dat, lost password, any solutions? on: May 07, 2014, 12:54:59 AM
is there any script to do random password ? or any .bat file that can try every letter,number,symbol for 8 char password ?

No... there are just too many, sorry...

Even if we leave out all non-US-ASCII letters, there are about 95 characters to choose from. That comes out to 6.6 quadrillion password permutations. Let's say you bought 4 of these (assuming it's a real product, I frankly have no idea...) for about $25,000 (USD) total, hired a software engineer to write custom software to use them for password searching instead of mining (maybe another 25-50k ??), paid for electricity and cooling (another 15k or so), then it would probably take less than 6 months to try all of them. Or you could use your home PC with mostly off-the-shelf software and be done in perhaps just 200,000 years, take your pick....  Sad

edited to add: sorry if I came off as snarky... I should have tried actually being helpful instead, like DannyHamilton has graciously done.
800  Bitcoin / Bitcoin Technical Support / Re: [noob help] Dump wallet info with pywallet.py on: May 01, 2014, 12:32:03 AM
Hi there!

Please can someone explain me how to do this in noob mode? Pictures would help!  Grin

I downloaded python 2.7 and pywallet.py, but I can't manage to run it and dump the info on a txt file!

I lost the password of my 2btc wallet and want to try with a recovery service!

Thanks so much in advance

Not trying to be mean, but if you're doing this for a commercial service, shouldn't they be helping you out? If you want to try to recover it yourself, which might be hard, this thread might be more useful...
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 [40] 41 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!