Bitcoin Forum
May 08, 2024, 09:55:23 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 [62] 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 ... 837 »
1221  Bitcoin / Wallet software / Re: info about Ian Colman mnemonic on: July 01, 2023, 06:45:11 PM
if each word was picked randomly.
Again, the words aren't picked. Entropy is used to generate a random number, and that random number is encoded as a seed phrase.

If the random number is generated in a cryptographically secure way, then yes, the probability is the same. The point I am making is that I don't believe the Javascript function crypto.getRandomValues within a browser environment (as is the case with Ian Coleman) will generate truly cryptographically secure numbers.
1222  Bitcoin / Wallet software / Re: info about Ian Colman mnemonic on: July 01, 2023, 04:02:38 PM
The entropy doesn't change the chance of guessing one seed phrase compare to another.
Yes, it absolutely does. If I have 256 bits of random entropy sourced from /dev/urandom, and you have 256 bits of entropy sourced from your browser fingerprint, then your seed phrase is exponentially weaker than mine and exponentially more likely to be broken.

Are there 24 words combination from words listed in BIP 39 protocol easier to guess than other?
Yes. It all depends on the entropy used to generate those words in the first place.

As there are 2048 words, total number of combination is 2048x2047x2046x...x2025x2024.
There is nothing preventing repeat words, and the last words contains a checksum, so as above there are 2256 combinations, not what you have written.
1223  Bitcoin / Wallet software / Re: info about Ian Colman mnemonic on: July 01, 2023, 03:05:39 PM
First, I could myself generate a seed phrase without anything. I just pick 24 words from the list given in the BIP 39 protocol.
So if Ian colman give me a list of 24 words randomly in the same list what can be wrong? It is just picking word at random.
Picking random words yourself from the word list is widely recognized as highly insecure and one of the worst possible ways to generate a seed phrase. This is also absolutely not what Ian Coleman's software is doing. What Ian Coleman is actually doing is generating a pseudo-random number via crypto.getRandomValues and then encoding that in to a seed phrase. Your browser is simply not a very good source of entropy for this process. Compare this to Bitcoin Core, for example:

Most good wallets will be based on entropy directly from the OS and the computer's hardware. Bitcoin Core, as an example, draws entropy from /dev/urandom (which is from the OS, or the equivalent on non-Linux systems), RDSEED/RDRAND (which is from the processor), and a whole host of data from the computer itself, such as current resource usage, timestamps, kernel parameters, network data, version data, etc. All of this is then combined through a variety of techniques such as XORs and hashes, so if one source of entropy is weak or compromised then your final result should still be secure.

It is fine to not fully understand the process behind seed phrase generation or the risks which need to be considered and mitigated against. Most people don't. But you should at least try to realize this and stick to the tried, tested, and recommended methods instead.

If you are dead set on using a webpage to generate your seed phrase then ultimately, we can't stop you. But you are taking on unnecessary risk by doing so, especially when there are much safer alternatives available.
1224  Bitcoin / Development & Technical Discussion / Re: reused or (similar) r values from completely different private keys on: July 01, 2023, 01:50:56 PM
Or its only possible when the same private key has done 2 different transaction but used the same r values?
It is only possible when the same private key has reused the same r value.

The equation you are interested in is as follows (all equations mod n):

s = (z + x*r)/k

Where z is the message hash (usually a hash of part of the transaction data) and x is your private key.

Let's say you have two transactions using the same private key and the same k value. You now have following two equations:

s1 = (z1 + x*r)/k
s2 = (z2 + x*r)/k

This can be reformatted as:

k = (z1 - z2)/(s1 - s2)

Given that you know both s values and both z values from the transactions themselves, you can calculate k. Once you know k, you can go back to the initial equation and calculate x, the private key.

If, on the other hand, the private keys (x) are different, then you have the following transactions:

s1 = (z1 + x1*r)/k
s2 = (z2 + x2*r)/k

Reformat that, and you end up with the following:

k = ((z1 - z2) + r(x1 - x2))/(s1 - s2)

Given that you have two unknowns in this equation (x1 and x2), you cannot calculate k.
1225  Bitcoin / Wallet software / Re: info about Ian Colman mnemonic on: July 01, 2023, 11:13:28 AM
So what is the issue?
The issue is it uses Javascript.

Did you read the post hosseinimr93 linked to above? The bottom line is using Javascript is insecure and does not guarantee your safety. If you are going to all the hassle of using a live OS to set up genuine cold storage, then why would you want to use insecure code to generate your seed phrase?

Also what would you recommend to generate BTC private Keys for cold storage? I don't trust hardware wallet.
Use good quality, reputable, open source wallet software such as Core, Electrum, or Sparrow. Review the code yourself if you have the ability to do so. Verify all downloads (this includes your downloads of Tails).

About Electrum : Do you know if I can use it in tail OS and if it can be used like Ian Coleman to generate keys and mnemonic phrase only.
Yes. Tails comes with Electrum already installed, so this is very easy to do.
1226  Bitcoin / Wallet software / Re: Petition to remove Wasabi from recommendations of bitcoin.org on: July 01, 2023, 11:00:20 AM
What else should happen? Banish Wasabi from the community?
The Wasabi team are obviously free to continue to create and promote their anti-privacy, pro-surveillance, and pro-censorship wallet. And we are similarly free to call them out for being anti-privacy, pro-surveillance, and pro-censorship. That includes amending recommendations such as that on bitcoin.org which were written before Wasabi started funding blockchain analysis.

Isn't that enough?
Relying on a third party to sync your wallet and your wallet actively paying blockchain analysis firms to spy on you are entirely different issues. If bitcoin.org can warn about the former, then they should also warn about the latter.

It's a centralized service. It's either accept the trade-offs themselves and comply, or the government puts a big FBI/DOJ badge in their site and nopara73 leaves his house in handcuffs.
As I said above: "Then shut down your service. Selling out your users and directly funding entities which actively undermine bitcoin and attack everything it stands for just so you can continue to make profit for yourself is disgusting."
1227  Bitcoin / Electrum / Re: Fun & learning with Electrum EPS, Electrum wallet & Bitcoin Core QT in Win 11 on: July 01, 2023, 07:53:06 AM
When I'm using my Electrum Wallet, EPS & Bitcoin Core is my privacy less secure if I didn't use vpn or tor for broadcasts ?
Yes. An attacker could potentially link your transactions to your IP address. See here for more info: https://en.bitcoin.it/wiki/Privacy#Tor_and_tor_broadcasting

To avoid this, you can either run your node via Tor, or you can choose to run your node via clearnet but broadcast your transactions via Tor. For this second option, you need to do two things:

1 - Add walletbroadcast=0 to your bitcoin.conf file. This will stop your node from broadcasting your own transactions.
2 - In your EPS config.ini file, navigate to where it says broadcast_method = tor-or-own-node and change it to broadcast_method = tor.

Any transactions you make via Electrum via EPS will now be broadcast to random nodes over Tor only.
1228  Bitcoin / Bitcoin Technical Support / Re: I lost my bitcoin on: July 01, 2023, 07:40:58 AM
Electrum in 2017 did not generate 16 word seed phrases. The seed phrase would have been 12 words long if Electrum generated it itself, or 12/15/18/21/24 words long if you imported it from somewhere else.

Regardless, if you don't have it then it is useless to you. Your only other option will be to bruteforce your password, but this will only be possible if either you can remember some information about the password or you used a very short and weak password.
1229  Bitcoin / Wallet software / Re: Petition to remove Wasabi from recommendations of bitcoin.org on: July 01, 2023, 07:33:06 AM
Isn't BitcoinTalk being "a Karen" about the Wasabi issue?
If we took that line of thinking with every issue then CSW would currently reign supreme and bitcoin would have died a long time ago. Bullshit needs to be called out as bullshit whenever and wherever it comes from. A wallet directly funding blockchain analysis while styling themselves as the ultimate privacy solution is a prime example of such bullshit.

It's probably better for the admin of Bitcoin.org to make a footnote saying that Wasabi is blocking UTXOs from "nefarious sources according to chain analytics companies".
We don't know the criteria involved in the blacklists Wasabi implements, because they won't tell us. (They may not even know themselves, and just do what their blockchain analysis buddies Coinfirm tell them to.) Who gets to decide what is classified as a "nefarious source"? Certainly not us. Lots of people think bitcoin itself is nefarious. What about porn sites? Gambling/casinos/sportsbooks? What about peer to peer loans? What about non KYCed coins? What about peer to peer transactions not involving a centralized third party which can automatically track and report everything to your government? All of these things are classed as "nefarious" by various governments.

I really hope I don't need to point out on bitcointalk of all places why implementing government blacklists is antithetical to the very purpose of bitcoin.

Plus Cobra currently has his own problems right now because he was ordered to appear in court and reveal his real identity. I don't know all of the details, but it's a case involving Craig Wright and the "infringement" of his rights for posting the white paper in Bitcoin.org.
That case is long finished. Cobra refused to dox himself and so the whitepaper is no longer available via bitcoin.org if you are in the UK.
1230  Bitcoin / Wallet software / Re: Petition to remove Wasabi from recommendations of bitcoin.org on: June 30, 2023, 06:48:18 PM
Which begs the question, Shouldn't this include the Trezor wallets that are under the Hardware wallet category, since they also decided to collaborate with Wasabi over the coinjoin feature?
Yes. They should also have the same privacy warning applied regarding cooperating with blockchain analysis and surveilling all their users.

The quick changing tides with the creators and owners of some of these projects makes me so hesitant to buy/use some of their products. Today, you buy it, and it's a very excellent product, within two weeks, they decide to go complete opposite of their initial vision, and you regret having bought the device in the first place.
This is part of the reason I now almost exclusively use self built airgapped, encrypted, cold storage. No third parties to suddenly start cooperating with blockchain analysis or extract my seed phrase via a so called recovery feature.
1231  Bitcoin / Hardware wallets / Re: Square is considering making a hardware wallet for Bitcoin on: June 30, 2023, 09:23:20 AM
Would love any feedback.
I think your article is spot on. I've raised pretty much all of the exact same points you have at various times over the last few years in this thread:

If it does not have a screen, it’s not a hardware wallet. It’s just a 2FA device.
The hardware wallet will not have a screen, meaning it cannot generate or display a seed phrase, cannot show transaction details for double checking, and cannot show a receiving address for verification. That's not a hardware wallet; that's a 2FA device.


They argue illogically that since a display does not protect you from every possible attack, it's not needed at all!
Just because something doesn't protect against all attack vectors doesn't mean it is pointless.


The Bitkey server is effectively at the center of every transaction. Because Bitkey hardware lacks a trusted display, the server instead needs to verify transaction details in an attempt to ensure the mobile app is not compromised. The server effectively covers for the lackluster hardware.
Basically, every time you want to send or receive coins, your hardware wallet has to sign the sending or receiving address and then transmit that signed message to Block's servers, where they will verify the address has not been tampered with, and then send that address back to the relevant party to be used. The obvious flaws are that Block can spy on literally everything you do and that you have absolutely zero security from a bad actor in Block sending a malicious address. The less obvious flaws are that you now can't make transactions or even generate a new receiving address if Block's servers are down, and it opens a new attack vector for man-in-the-middle attacks if you rely on Block's servers telling you what addresses to use.



I think there are other fairly concerning aspects to this device you didn't touch on, such as their social recovery, which is just as easily fooled or attacked as Ledger's KYC based recovery service. The part of your article that I hadn't considered is the privacy implications for anyone else. As you point out, if I want to send money to a Bitkey user then I have to visit the Bitkey website in order to obtain their address, giving Bitkey the capability to link my transaction to my device identifiers, browser fingerprint, and IP address. That's utterly horrendous.

Guess I won't be transacting with anyone who uses this wallet, just as I don't transact with any merchant who uses BitPay.
1232  Bitcoin / Wallet software / Re: Petition to remove Wasabi from recommendations of bitcoin.org on: June 30, 2023, 08:53:50 AM
I'm just wondering what kind of new nonsense will appear tomorrow or the day after, because there are more and more people we can't trust, even though they keep trying to convince us that there's nothing controversial about it.
The latest stupidity I heard was CeDeFi - centralized decentralized finance. Roll Eyes Apparently the term was first used by CZ in 2020 in relation to Binance Smart Chain. So, in other words, 100% centralized trash.

Just like CZ pretends his centralized bullshit is decentralized, Wasabi pretend that their pro-surveillance bullshit is private.

I think it's because the developers are well known, have families and may fear any legal repercussions from continuing to provide services that might seem like a gray area to governments.
Then shut down your service. Selling out your users and directly funding entities which actively undermine bitcoin and attack everything it stands for just so you can continue to make profit for yourself is disgusting.
1233  Economy / Service Discussion / Re: Crypto lender Celsius mulls possible restructuring amid financial woes on: June 30, 2023, 08:45:28 AM
The skeptical is now thinking that the people who founded and created these failed Cefi lending services are really working for the government to make the cryptospace appear that it is full of scamming hustlers.
I think it is exponentially more likely that they are just greedy scammers. More intelligent than you average "Enter your seed phrase on this website" phishing email type scammers, but greedy scammers all the same.

We saw it endlessly during the ICO craze. Any scammer with the ability to launch a useless ICO did just that, made a few million from the gullible, and then exit scammed and disappeared. It's a bit harder to do the same with a centralized exchange, but the gains are far greater. People like Mashinsky or SBF are exactly the type of people you can see launching their own ICO back in 2017 and promising that it is the next bitcoin killer or some other such bullshit.
1234  Bitcoin / Wallet software / Re: Sparrow vs Electrum for desktop on: June 30, 2023, 08:34:18 AM
I know it use BIP 157/158 under the hood through getblockfilter RPC, but how good is the performance to retrieve relevant TX?
I've only ever paired Sparrow with a node running on the same device, but in this set up anything I've done on Sparrow has been pretty much instant. The only downside is of course if you import a wallet with historical transactions in to Sparrow then you have to rescan, just as if you imported a wallet with historical transactions in to Core. This is obviously not the case if you were running a full Electrum server, but of course Sparrow can connect to those too.
1235  Economy / Service Announcements / Re: [ANN] Whirlwind.money | ⚡No Fee⚡ | Ultimate Privacy | Anonymity Mining 12% APR🔥 on: June 29, 2023, 05:42:34 PM
Signature: IFLCjMrIJCAbORRE2rbhd3eQ16J2LUCJT3NpDfhFFeogAHpQvQd+2beiXQbqF+0hfnelQJZI+0WwQ7Znbqxt8Q4=

Message: Today is June 29, 2023.  I, user stormbounty on Bitcointalk,  send 0.008 Bitcoin from the signing address to WWM's address bc1qzfmfzgtwyaqk6l0tedrx8kpe09xmxvs9l4j5ya Please help.

Address: bc1q7vr2ge5392zp3rwn6q60skp98dlce7au8qaztv
Verified.

The address above (bc1q7vr2ge5392zp3rwn6q60skp98dlce7au8qaztv) spends its output in this transaction: https://mempool.space/tx/1d686510d1cf9d0f2445fac24b15d8e679f17b0a3291d87c7fc41dc95e4f168b

This transaction is a Tx0 from either Samourai or Sparrow, enrolling the coins in to Whirlpool coinjoin's 0.001 BTC pool. He creates seven such outputs ready to be coinjoined, one change output, and one output paying the coinjoin fee of 5,000 sats. The OP_RETURN output is part of the Whirlpool protocol to allow the coordinator to know which outputs to enroll in a coinjoin.

For some reason, before any of these outputs are actually coinjoined, he instead consolidates them all in a single transaction depositing 0.007 BTC to Whirlwind (bc1qkf6knnzvnu2h47g8wa7h4hx7k3vm8tcqyc27xy), with one additional change output.

I can also verify the signature two posts above from the intermediate address bc1qzfmfzgtwyaqk6l0tedrx8kpe09xmxvs9l4j5ya.
1236  Other / Beginners & Help / Re: The Importance of Identifying Different Type of Bitcoin Address on: June 29, 2023, 04:01:32 PM
I can understand that upgradation to Taproot address will make the transaction to get confirmed easier but how can we say it faster?
The quote you shared says nothing about transactions being confirmed faster. It says transactions can be verified faster. This is the process by which each nodes checks each transaction and each block is valid, which is different to the process of transactions being mined in to a block. By making verification faster and easier, it reduces the strain and resource requirements on existing nodes and makes it easier for anyone to run a node with less powerful hardware.

Although in the case of multi-sig, Taproot transactions are much smaller since they only contain a single pubkey and a single signature instead of multiple of each, as discussed above, so you could argue they will confirm faster given the same absolute fee.
1237  Bitcoin / Bitcoin Technical Support / Re: Multisig derivation paths and xpubs on: June 29, 2023, 01:07:25 PM
I think the fatal flaw in my understanding was that I thought the xpubs were generated solely by the hardware devices and were independent of the derivation path, and that the derivation path specified the receive and change keys from the child xpubs of the devices.
So the derivation path is used both in the generation of the xprvs/xpubs, and also in the generation of individual addresses from those xprvs/xpubs. Allow me to explain.

Take the following familiar derivation path: m/84'/0'/0'.

m stands for your master private key, which is generated from your seed phrase. Technically speaking, this is the only key which should ever be called your master private key, but a lot of people and software also use the term master private key to refer to your account extended private key (which I'll come to in a second).

The next three numbers are, in order, your purpose, coin type, and account. 84 is the number assigned to P2WPKH segwit addresses. 0 is the coin type for mainnet bitcoin. The next 0 simply means the first account. As I explained previously, that derivation path tells your wallet software to generate the extended key at the 85th hardened index,* use that to generate the extended key at the 1st hardened index, and then use that to generate the extended key at the 1st hardened index. The extended key you end up with after doing all that is your account extended private key. Account because it is at the account level, extended because you have an extra part which allows you to continue to derive at further levels. But as I said above, lots of places incorrectly refer to this key as your master private key. When you extract an xprv from a wallet, it is almost always this key that you are extracting - your account extended private key.

Now, to get actual addresses from that key, we need to derive through a further two levels. The derivation path of the very first address in your wallet will look like this: m/84'/0'/0'/0/0. The first extra zero is change (0 for not being a change address, 1 if it is a change address), and then the second extra zero is in the index of the individual address itself.

m/84'/0'/0'/0/0 - 1st non-change address
m/84'/0'/0'/0/1 - 2nd non-change address
m/84'/0'/0'/1/0 - 1st change address
m/84'/0'/0'/1/3 - 4th change address
And so on.

Note that multi-sig sometimes add in an additional field called the script type, so instead of something like m/84'/0'/0' you would have m/48'/0'/0'/2'. (48 is the purpose number for such multi-sig paths, and 2 is the script type for P2WSH.)

So, in the case of HD wallets, you can import keys in two ways. The first is that you can either import a seed phrase, and tell the wallet the exact derivation path you used to get the account extended private key. So for example I could give you the following seed phrase:
Code:
tray expect pact quantum junior chronic nation topple boy today maid syrup
And tell you I used the derivation path m/84'/0'/0', meaning you can calculate the following xprv:
Code:
xprv9zScb44VdRkzpdV8djUnNzD69QWRCA3iMvMm29UaouknnXxH3KRrnpN9QAyzEbqgMSVUVUavpkiaWuBhTBpefXXX5kg4tUvSQpd2dDHKFFX
The wallet then knows to start there and add on the extra /0/0 derivations to reach individual addresses.

The second option is I can just give the wallet the xprv directly, and not tell it about the seed phrase or the derivation path I used to get to the given xprv. The wallet will take the xprv and add on the extra /0/0 as above, without knowing the derivation path used to reach that xprv.

Now let's say, for example, I'm setting up a 2-of-3 multi-sig. In this particular multi-sig, I'm using one seed phrase on my computer, and two hardware wallets. Let's say the seed phrase on my computer is using the derivation path m/48'/0'/0'/2'. Great. So my software knows to use this deviation path to calculate the first xprv from the seed phrase it has, and the corresponding xpub. Now my two hardware wallets come along. For the sake of argument, the first uses m/84'/0'/0', and the second uses uses m/0'. What a nightmare! Each hardware wallets generates an xprv at the given derivation path, calculates the corresponding xpub for the xprv, and then feeds the xpub to the wallet software on my computer. Now, my wallet software has three xpubs, but it may or may not have any idea the derivation paths used to reach the two xpubs from the hardware wallets. But actually, it doesn't need to know. All it needs to do is calculate a child key at /0/0 for each one and combine them in to a multi-sig address.

So it can do seed phrase + m/48'/0'/0'/2'/0/0 to generate the first key itself, and then it can do hardware-wallet-xpubs/0/0 to generate the second and third keys. One it has all three keys at /0/0, it combines them to create an address. It does the same thing at /0/1 and combines the three keys to generate the second address, and so on.



*Hardened indices, indicated by the ' symbol, are actually the number you see plus 231, but the reasons behind that are not relevant for this.
1238  Bitcoin / Electrum / Re: Electrum multisig for long-term cold storage on: June 29, 2023, 08:54:24 AM
An airgapped computer with full disk encryption still has its weak spots: the bootsector and bootloader are not encrypted, an attacker with physical access could inject some password stealing malware there. Probably an easier attack vector than passing barriers of an airgapped hardware wallet or hardware wallet in general.
There are plenty of mitigations against this, such as UEFI secure boot. And even without these, an attacker would need to know exactly what they are looking for and would need access to your device undetected on multiple occasions, which should be easily prevented. If someone is willing to break in to your house more than once to do this, then they are probably also willing to just hit you with a $5 wrench.

Also, there have been many physical attacks demonstrated against a variety of hardware wallets, which only require access to the device once and while still technical probably require less expertise than compromising the bootloader on a fully encrypted device. One such example: https://blog.ledger.com/Unfixable-Key-Extraction-Attack-on-Trezor/

Anyway, I wouldn't bother about this too much. If you have to fear something like this, you're likely screwed already.
Exactly.

Would be even more specialized and targeted attack by this route, but who knows what three letter agencies have access to. Don't want to stirr a soup whose ingredients I don't know, though.
Who knows what three letter agencies are putting in the chips being supplied to hardware wallet manufacturers?
1239  Bitcoin / Wallet software / Re: Sparrow vs Electrum for desktop on: June 29, 2023, 08:40:56 AM
That's not a bad thing for new users (or experienced users 99% of the time,) but there might be a situation where a user wants more control.  In my opinion control vs. ease of use is a worthy exchange, despite the extra time, skill, and resources required.
I don't disagree, and as I've said above there are still advanced features Sparrow doesn't offer that I use Electrum for (such as importing individual keys/addresses). But if you want to use Sparrow while connecting to a public server (as is the default in Electrum), again it is only three clicks (File -> Preferences -> Public Server). If you are a newbie looking to use a wallet privately, then Sparrow beats Electrum in terms of ease of use for not having to set up a server and just connecting directly to Core. I also can't think of any features that newbies would be interested in that Electrum has and Sparrow does not.

1240  Other / Beginners & Help / Re: The Importance of Identifying Different Type of Bitcoin Address on: June 29, 2023, 08:29:51 AM
But anyone can help me to understand this better
Quote
The Taproot upgrade batches multiple signatures and transactions together, making it easier and faster to verify transactions on Bitcoin's network.
You might be interested in reading BIPS 340, 341, and 342, which all deal with Taproot and which explain this in greater detail.

At a very basic level, Taproot moves away from the usual ECDSA signatures which are used in other address types and instead uses Schnorr signatures. One of the advantages of Schnorr signatures is that you can combine multiple public keys into a single public key, and multiple signatures in to a single signature which remains valid for all the individual component signatures. This is known as key aggregation. So if you are using a 3-of-5 multi-sig (for example), instead of having to provide five public keys and three signatures which every other node has to verify, with Taproot you can provide a single public key and a single signature and every other node only has to verify this one signature.

There is another feature known as batch validation. Instead of each node having to individually verify the signature of every transaction in a block, with Schnorr signatures you can combine all the signatures in to one, even if you don't know the private keys. This allows each node to perform a single verification, rather than having to individually verify each and every transaction.
Pages: « 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 [62] 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 ... 837 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!