Bitcoin Forum
May 27, 2024, 06:17:57 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: [1]
1  Economy / Exchanges / Re: Bitpay Generating Invalid BTC Address (URL addy) Any Ideas? on: June 05, 2018, 03:00:04 AM
As of 6/4, id field shows up as blank in the URL in TOR Web browser, so there is no way to employ the workaround of going to the alternative noscript page, because no id is given.
2  Bitcoin / Electrum / Re: Why does blockchain.info flag Electrum replace-by-fee as double spend? on: November 23, 2017, 01:45:35 PM
Looks like the double spend warning went away after a while.  I guess it just took time for the first transaction to get totally cleared from all the mempools.
3  Bitcoin / Electrum / Why does blockchain.info flag Electrum replace-by-fee as double spend? on: November 23, 2017, 12:27:03 PM
I thought the whole point of replace-by-fee was so that it wouldn't be classified as a double spend.
4  Bitcoin / Bitcoin Technical Support / Re: All about "stuck" transactions and what you can do to fix them on: November 22, 2017, 10:38:05 PM
It used to be that if you included 1 Sat / Byte there was a pretty good chance of eventually getting confirmed, if you didn't mind waiting several days.  But now, after segwit, what is the minimum fee to stick around in the pool long enough to eventually get confirmed?  Is it 1 Sat / Byte or 1 Sat / Weight Unit?  Should we all be talking fees in terms of weight units nowadays?  How is the mempool minimum transaction fee coded in a post-segwit world?
5  Bitcoin / Electrum / Are native segwit wallets ready for prime-time? on: November 22, 2017, 02:36:18 PM
What's the collective opinion here?  Is the segwit wallet implementation "bullet-proof" and completely trustworthy for meaningful amounts of bitcoin?  Has it passed the same kind of code review process as the older wallet implementation?

(I'm aware the bech32 address format may still conceivably change, I'm just talking about the safety/reliability of the wallet, for example, being confident that the generated public and private keys always match, and you won't run into a situation where you receive money to a certain address and can't ever spend it because of some bug).

6  Bitcoin / Electrum / Re: Does revealing one private key spoil the seed? on: November 22, 2017, 01:52:50 PM
I see now why it would be recommended to move your coins to a new wallet.  However, the instructions on the electrum site only said to move to a completely new wallet if you planned to enter the seed into something untrustworthy like Electron Cash wallet.

Even if you move all your bitcoins to a new wallet, if you access your bitcoin cash first, then your bitcoin gold is exposed and vulnerable the instant you reveal the private keys in order to sweep the bitcoin cash into a bitcoin cash wallet, and vice versa.  There's really no way to do everything simultaneously -- something will always be at risk.

I see your point that it is only a vulnerability if the master public key is also revealed, but Electrum doesn't encrypt its watching wallets, so if you ever run a watching wallet on an internet-connected computer, there is a risk that the master public key could have been compromised at some point in time.  I don't think you have to actually display the public master key on your screen for it to be vulnerable to malware.
7  Bitcoin / Electrum / Re: Does revealing one private key spoil the seed? on: November 22, 2017, 01:21:05 PM
Oh wow.  That really is disturbing.  I wish that Electrum had issued some kind of warning when I chose to display a private key.

The problem is that since Electrum is incompatible with bitcoin cash and bitcoin gold, there's really no way to access those coins without moving the individual private keys into another wallet.  I thought that would be safe to do provided the associated address was empty of bitcoin and would never be used again.  Very scary to hear that when combined with the public master key, that's enough to compromise other addresses generated from the same seed.
8  Bitcoin / Electrum / Re: Does revealing one private key spoil the seed? on: November 21, 2017, 11:11:41 AM
I would be interested to know the theory behind this.  If the only attack is that you could try a bunch of random seeds and try to find one that generates a given private key, that's not any more viable than trying a bunch of random seeds and finding one that generates a given address.  So what is the mechanism by which you can reverse engineer a seed from one or more private keys?
9  Bitcoin / Electrum / Does revealing one private key spoil the seed? on: November 21, 2017, 09:08:03 AM
I think the answer to this is "no", but would appreciate confirmation.  Thanks.  I want to make sure the other addresses in my wallet are still secure, even after revealing the private key to one of the addresses.
10  Bitcoin / Electrum / Re: Anyone knows when Segwit will be implemented on Electrum? on: September 15, 2017, 07:01:34 AM
It appears that there will be two variants of segwit supported in Electrum: P2SH-segwit and native segwit.  Which is recommended?
11  Bitcoin / Electrum / Is it safe to reuse a mnemonic seed in a multisig wallet? on: August 28, 2017, 12:29:05 AM
Is it safe to use the same mnemonic seed that you use for your solo wallet as the seed for one part of a multisig wallet?  Is it safe to use the same mnemonic seed as a part of two different multisig wallets?
12  Bitcoin / Electrum / Re: Electrum online/offline isolation in Tails on: June 07, 2017, 02:17:19 PM
Right, I understand that in principle I could run tails on a computer that "never touches the Internet" and create/send transactions from a regular online computer, but:

1. I'm not sure that's necessary, since tails wipes everything between boots.
2. I'd rather send transaction from an online tails than a regular online computer, since tails is less likely to have a virus.
3. If I'm going to use tails for both the offline and online actions anyway, maybe I could use it on the same computer, which would be simpler.
4. I'm not sure it's really advisable for tails to "never touch the Internet" because you are supposed to update tails regularly, which requires connecting tails to the Internet (although I could do that with storage disengaged).
13  Bitcoin / Electrum / Electrum online/offline isolation in Tails on: June 07, 2017, 01:38:19 PM
What kind of isolation is desirable when using Electrum in Tails for both online sending and offline signing?

For example, can I safely:
1. Have both a watching-only and standard wallet in persistent encrypted storage.
2. Start tails with persistent storage and internet connection active.
3. Open watching-only wallet and create unsigned transaction (save to storage).
4. Reboot tails with persistent storage active and internet connection inactive.
5. Open standard wallet, enter passphrase and sign transaction (save to storage).
6. Reboot tails with persistent storage and internet connection active.
7. Open watching-only wallet and send signed transaction.

In this scenario, the password is never entered into the computer while it is online.  Is that good enough, since Tails wipes the computer's memory between boots?

Another scenario:
1. Have standard wallet in persistent encrypted storage, watching-only wallet on 2nd unencrypted thumbdrive.
2. Start tails with persistent storage inactive and internet connection active.
3. Open watching-only wallet and create unsigned transaction (save to 2nd thumbdrive).
4. Reboot tails with persistent storage active and internet connection inactive.
5. Open standard wallet, enter passphrase and sign transaction (save to 2nd thumbdrive).
6. Reboot tails with persistent storage inactive and internet connection active.
7. Open watching-only wallet and send signed transaction.

In this scenario, the persistent storage is never enabled while the computer is online so the computer can't even "see" the electrum wallet while it is online.  Is that good enough?


Pages: [1]
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!