Bitcoin Forum
May 17, 2024, 02:57:00 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 [125] 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 ... 463 »
2481  Bitcoin / Electrum / Re: Missing funds on Electrum, unauthorised transaction on: December 29, 2020, 10:30:15 AM
All of the links I used to update/download the wallet were from the Electrum website. I had no pop ups nothing!!!!! I had little blue text at the bottom of my wallet stating there is an update available which was the 4.0.9 . I cant see how Electrum cant be held responsible in anyway if someone is posing to be them and allowing for fund to be removed without any warning?

Is there literally nothing that can be done?
Was there a pop up saying that your Electrum was outdated? I assume your prior version wasn't below 3.3.4?

The likely scenario I can think of is that you clicked on one of the top few results of Electrum if you've Googled it. Your Electrum was compromised when you installed the github version which is only 4.0.5.

There is nothing to be done, unfortunately. It's a good practice to be downloading and verifying the PGP signature of the binaries because these phishing attempts are very common. They cannot be held responsible, there is nothing they can do if users were to accidentally get phished because they didn't verify the binaries.
2482  Bitcoin / Development & Technical Discussion / Re: How many of you check the code of open source software? on: December 29, 2020, 10:21:59 AM
There is another thing I would like to know. The crypto community preaches "Verify, Don't Trust!" How many of us actively check the code of the software, wallets, and everything else crypto-related that we use? Do you have the programming skills, time, and experience to inspect the codebase and deem it OK to be used? Or do you trust that others have done so and take their word for it? Do you find it odd that you are placing your trust in other individuals to have done the job for you in an industry where you are supposed to be your own bank, banker, and security department?
I personally have only read Electrum's source code fully, because it's written in Python and it's relatively less bulky than most other implementations. For that matter, I think it's a good practice to inspect what you're running on the computer. But the truth is, it's just too unrealistic. It's a time consuming process and most programs are a mix of languages and for which some are not proficient at. If you're reading the code but you don't know what's going on, the process is probably not going to be of any use and just a waste of time.

Beauty of open source lies primarily in the fact that people can have access to the source code and there are probably some that are honest and are quick to point out of any mistakes as well as transparent commits (in the case of projs on github). If you don't have the skills or the time to audit it (which can be rather time consuming for some bulky codes), then you'll be better off just validating the binaries. You'll probably not be able to identify anything wrong with the source code, it can be well obfuscated.

As for the study, isn't it geared towards softwares which integrate open source resources? Wouldn't the onus be on the corporations to be auditing their own software and/or update the modules appropriately?


I think auditing the code and compiling it yourself is good practice, if you can read it in the first place. **Given how well the Electrum phishing worked, I would think that most people wouldn't bother to even validate the binaries, let alone see the code.
2483  Other / Beginners & Help / Re: Newbie seeking for a answer on: December 29, 2020, 09:01:36 AM
Satoshi is indeed the founder, but he is not the first member on this forum. Here is him , user with UID=1 admin
Those were test accounts, which were (presumably) created by Satoshi. So technically, he's the first user because he controlled the test account at that time.
2484  Bitcoin / Electrum / Re: Electrum Portable on External Hard Drive on: December 29, 2020, 08:28:16 AM
It's not insecure per se, it's just not the best security practice. The relevant files needed for the operation will be stored in the folder which is the same as the Electrum portable exe.

The main problem arises when you're plugging your drive and running it on different computers. The rationale why portable exes are considered to be more dangerous is because users tends to run it on insecure computers that could extract the wallet files or have malwares and potentially providing an avenue for malwares to spread through your disk drive and eventually to your own computers when you plug it in.

However, if you're looking for portability, consider using a hot wallet on your phone instead. It's way more secure.


Btw using a hard disk for Electrum isn't necessary, a removable USB flash drive will be more than sufficient.
2485  Bitcoin / Development & Technical Discussion / Re: Why 24 words? on: December 29, 2020, 07:59:20 AM
I don't get that, why should all seeds have a valid checksum? We generate a random number and then we put a valid checksum, but for what reason?
Not needed. Most wallets, like Electrum, actually doesn't care about the checksum (other than the fact that it'll put a small warning) but it won't prohibit the user from continuing. It'll be good to enforce a valid checksum as it'll make missing phrases "slightly" easier to bruteforce and allow the user to identify if their phrases are entered wrongly. Of course, as mentioned, the longer seed phrases has a longer checksum length and thus bring about better error identification.
One scenario I imagine is if you split your seed into three to store as 2 of 3 factors of authentication, in case of 24 words, attacker would have to crack more words if they get their hands on one copy versus if you were using 12 words.
That isn't really 2 of 3 FA since you need the entire seed to use the keys so it'll be theoretically more like 3 of 3.

-snip-

Wow, that's pretty interesting.
2486  Bitcoin / Bitcoin Discussion / Re: My email and phone have been hacked, is my bitcoin safe? on: December 29, 2020, 06:59:10 AM
You have to determine the source of the compromise. Was it compromised solely because of the information being used for the Ledger Live leak or because of some other sources? How do you know your phone was hacked?

I would recommend for you to wipe your computer and your phone. I suspect that there is a high chance that you have a malware on the devices as opposed to your accounts being SE'ed. Ledger should generally be safe from such attacks. Seeds are never exposed outside of your devices and please don't key it into your computer either.
2487  Other / Beginners & Help / Re: Newbie seeking for a answer on: December 29, 2020, 06:27:41 AM
Yes. Sirius was the second member and was in control of the domain and hosting for an extended period of time. After that, Theymos took over as the administrator in 2012 IIRC.
2488  Bitcoin / Wallet software / Re: BTC nube, old Multibit wallet, how to access/migrate? on: December 29, 2020, 06:17:40 AM

I google'ed my problem and came across this site: https://bitcoin.stackexchange.com/questions/66913/import-multibit-multibit-key-into-electrum.

Some blokes suggest that "Multibit had generated an invalid key due to a bug in the software". That doesn't really help me as I assume I would have to install Multibit (If I could), use the "corrupt" key and transfer the money to my Electrum wallet?!
The link I used to download the installer of Multibit: https://web.archive.org/web/20150317095524/https://multibit.org/index.html

Or is there any other way to get access?

Regards, CH


Unencrypted format is in
5XXXXXXXXXXXXXXXXXXXXXX DATETIME
LXXXXXXXXXXXXXXXXXXXXXX DATETIME
KXXXXXXXXXXXXXXXXXXXXXX DATETIME

You likely have it encrypted and I thought the format was different since it's an uncompressed key and I've only dealt with compressed ones. I can't find any reliable tool to decrypt the file without installing MultiBit. You can try using BTCRecover[1] since it does support MultiBit Classic files if you know the password to the wallet file. It's definitely more complicated than using MultiBit Classic but it's a good way to try.


[1] https://github.com/3rdIteration/btcrecover/blob/master/TUTORIAL.md#running-btcrecover
2489  Other / Beginners & Help / Re: Air-gapping 2 devices vs. Trezor/Ledger? on: December 29, 2020, 04:58:26 AM
Are AES encrypted USB Flash Drives (PNY or San Disk) susceptible to hardware exploits like the Trezor?

Another problem I see with Trezor is that if an officer stops you and searches you and knows what a Trezor is then he can take it, and from what I've read it only takes 15 minutes to hardware exploit it. Good luck trying to actual go through litigation and get it back or prove anything during that route.

I feel really uneasy with my Trezor knowing that hardware exploit is possible, especially in 15 minutes. And then Ledger is closed source which makes me uneasy. Ugh. Tough decisions.
I don't find it too much of a problem. As long as you have a passphrase, the attacker would have a hard time trying to get your seed.

There are a lot more choices than those two companies, maybe you could try exploring your options. Regarding the attack, what makes you think that your devices would be more protected than your hardware wallet? Attacking Trezor requires the attacker to specifically extract the encrypted seed from the secure elements by desoldering it and using specialized tools, after that start to crack your keys. I've seen more vulnerabilities affecting mobile devices than most hardware wallet and they don't require special skills.

I feel like most attacks are often blown out of proportion and companies has been relatively quick (at least those competent ones) to respond and provide a mitigation to it.
2490  Bitcoin / Hardware wallets / Re: Sending Bigger Amounts of BTC on: December 28, 2020, 10:57:30 PM
When i send btc, i have to make sure the address is correct... triple check it many times before i click send.  Obviously everyone should be doing this.  But if you make a mistake somehow with a letter off or accidentally deleted a character like m and put n instead... yes i know you should be copying/pasting the seed and never type it.... but obviously it could somehow happen if you accidentally type in an extra letter or deleted a letter by accident and replaced it by another character... what typically happens?
Then the address will be invalid and transactions generated for it will be invalid as well. Addresses has a checksum and replacing or reducing any characters will result in it being invalid. The chances of you replacing or removing a character and still matching the checksum is actually fairly low.

I heard the odds of it being sent to another address was almost impossible... is that correct or not?  Like could you be off a character... and that btc address is actually a btc address?  Thus you woulda sent btc to someone else by accident?
Very low.
But the biggest thing here i say is if you are sending big amounts.  With how much btc price has gotten, im sure if someone here sends half a btc or one btc... they are very careful right?  Even sending ten percent of a btc is a ton of money nowadays.  Like how do ppl who have lot of btc feel when they are about to send btc?  Im trying to imagine how someone feels when say they are sending 5 btc from their wallet to another wallet etc.
If you know what you're doing, you probably don't have to fear too much. I always like to 'test' my wallet by sending a small amount and transferring around. It isn't necessary at all but helps with giving you a peace of mind.
Obviously when you deal with big amounts, besides being very careful the address is right and the amount is correct... is make sure you are sending it with the recommended sending fee right?  I can't imagine someone sending something like 5 btc... then pay like the minimum sending fee on their nano ledger s?
Use RBF so you could still replace the transaction with something with a higher fees.


I'm guessing the other thing you can do to make sure is whoever you are sending btc to... whether coinbase or exchange or someone or a site and doing a big amount... first send like a tiny test deposit first to make sure it works... before you send the whole thing the second time?  [/b]
Correct.


Which bech32, the number of errors you make would probably give you a cushioning of 4 characters at least. As the number increases, it should tend towards the probability of 1 in a billion.
2491  Other / Meta / Re: Newbie copy pasting each other's post on: December 28, 2020, 02:20:58 PM
On the next bitcointalk update, it Would be nice if the Dev team can implement an auto-filter bot mechanism that will automatically detect and delete bot posts from the forum.

I see lots on this bot actions being carried out on different threads, but the post gets deleted within some few minutes.
Certain links are autonuked by one of the bots being operated here. There are new links popping out every now and then so I imagine that it's difficult for them to nuke all.

Recently, they're obfuscated to use hyperlink or copy certain posts and insert their link in between. I've reported quite a few of them but it takes time for them to be removed.
2492  Other / Beginners & Help / Re: Air-gapping 2 devices vs. Trezor/Ledger? on: December 28, 2020, 01:43:01 PM
Now, I am by no means an expert on this so please correct me if I'm wrong, but reading this paper it seems this does not apply to most bitcoin wallets (emphasis mine):

-snip-

Bitcoin Core has been using libsecp256k1 since 0.10 in 2015. Which wallets are still using OpenSSL and not libsecp256k1?
Hopefully not, secp256k1 has a lot more benefits than that Tongue.

Thanks! Someone mentioned (I think a few weeks ago) that secp256k1 isn't that susceptible to certain sidechannel attacks but I couldn't find any literature on that. I didn't do any in depth research on the feasibility on the various other sidechannel attacks. But I suspect an attack could also be mounted on the encrypting/decrypting process of the wallet instead of the signing itself or through the RNG. Don't quote me on this, just a thought.

I've read through the firmware of ColdCard briefly and they did actually implement a few measures to reduce the signature.
2493  Bitcoin / Bitcoin Technical Support / Re: Does this accurately show how a crypto-mining software works? on: December 28, 2020, 01:04:04 PM
I think that there are some conceptual misunderstanding here, I'll try to explain the process the best I can.

Mining involves the miner with his ASICs hashing the block headers twice to produce a hash. The block is valid when it's hash meets the target as specified by the network. The components of the block headers are as follows:
- Version (not really standardized due to ASICBoost)
- Previous Block hash
- Merkle Root Hash (Depends on the Transaction set)
- Time Stamp (Variable)
- Target in nBits (Fixed)
- Nonce (Variable)
The mining pool's job is to determine the transaction set and assemble them. Firstly, the mining pool will select a set of transactions and calculate the transaction fees. The pool will then use this amount, the pool will generate their own transaction and specify an output that is their address for which the amount must be less than < 6.25BTC + TX fees, there is no lower limit. After that, the pool will send the Version, Block hash, coinbase transactions, merkle tree, target and current time. The mining software will add the extranonce within the coinbase transactions before forming the merkle root hash. The mining software will then feed the relevant information to the ASIC itself.

Now, to the main part which how the ASIC actually mines. Depending on your ASIC, it will increment the nonce by itself. The extranonce allows the ASICs to calculate more hashes at once without wasting time to calculate the entire merkle tree again. ASICs are actually so specialized that most of them are designed to only vary and hash the final 4bytes which contains the nonce.


To point out the mistakes:

1. The mining software you're using likely doesn't connect directly to the network directly. You need to have access to the previous block hash, list of transactions and the target. To do this, something must be used to process the information which is usually either your own Bitcoin Core (for a solo miner) or a mining pool.
2. The previous block hash always changes every ~10minutes so there's likely no advantage in doing so.
3. Mining software does not store the coins in the wallet. As mentioned, a coinbase transaction is included in the block. The transaction contains the newly generated coins as well as the transaction fees and you can specify the output as your wallet. It does not happen after you find a block.
4. There's no verification node. Your ASICs determines the target and compares the hashes generated. If the hashes meets the minimum target, your block is valid. Your software will send the nonce used, timestamp, etc to the server and the server will relay the valid block with the headers, transactions etc.
2494  Bitcoin / Bitcoin Discussion / Re: What do you think is a fair transaction fee for the Bitcoin transaction? on: December 28, 2020, 10:51:43 AM
Miners will still earn a revenue because even without fees, block reward still exists. Technically, we do not really need fees to transfer BTC. However, as miners obviously prefer txs with fees over free ones, it just became a constant competition over who gets their tx to be mined first. You could initiate a free tx at any time - given you are ready to wait for months, if not years (or.. forever) to actually get it mined.
Fees actually acts as a disincentive for spammers, that's why minimum relay fees was introduced. The fee market makes spam attacks more expensive and with lesser funds, the spam attack isn't competitive. I would say the reason why fee is necessarily is to reduce the shock to the system during the decrease in the halving. It creates a free market for the fees.
Surprisingly, zero fee transaction was made possible during the early years of bitcoin as well as some blocks that has been created this year 2020 and 2019 as well.

2020 Block
[1] https://blockchair.com/bitcoin/block/617750
[2] https://blockchair.com/bitcoin/block/626507

2019 Block
[3] https://blockchair.com/bitcoin/block/600590
Still possible. It just requires the participation of the miners. The transactions described likely belongs to the miner mining it.


If you're responding to the fiat shill, then take it with a grain of salt. Tax and fees are intrinsically different, with fees, you're expected to pay someone or an intermediary and given that the miners uses their POW to mine blocks and include your TXes into the blockchain, I would think that it's like Western Union, Paypal, MasterCard, Visa which all charges a fee. You wouldn't call that a tax would you?
2495  Other / Beginners & Help / Re: Air-gapping 2 devices vs. Trezor/Ledger? on: December 28, 2020, 10:20:39 AM
can you elaborate on this? what is the theoretical threat to an airgapped wallet setup?
Side channel attacks. Most of your devices are not specifically hardened to withstand side-channel attacks by reducing the potential attack vectors associated with the sidechannel, (eg. EM wave leakage, timing attacks). There has been a study conducted on this[1] but, interpret it as you want, it isn't that recent or conducted on major wallets. I wouldn't consider it to be THAT big of a threat but if we were to compare the specifics, might as well mention it.

I understand that Trezor and some of the secure chip used were vulnerable to such attacks as well. They've fixed the problem and most of them requires tearing entire device apart and the victim's participation while it's hooked up to an oscilloscope.

** I'm not sure if someone conducted similar experiments on Electrum but I'd like to see if there is one.


[1] https://eprint.iacr.org/2016/230.pdf
2496  Bitcoin / Bitcoin Discussion / Re: It is pointless if the BTC fees increases along with rise in BTC price! on: December 28, 2020, 10:00:26 AM
Emm, somewhat you are right that custodial wallet can freeze our account at any time and even thay can seize our account too. that's why we should have to use popular and trustworthy service. I didn't here coinbase seized someones account without any reason, its true that they frequently ask for KYC for making their service more secured but I got them loyal.

To get rid of these hassles you can keep very little bitcoin in these accounts. Just keep as much bitcoin as you need to pay monthly coffee bills, and other bills here so that you don't have to incur huge losses even if they freeze your account.
If you have to adopt centralised services just to use Bitcoin for your payments, then you might as well use PayPal.

Coinbase is by no means a suitable alternative to rising fees and any other services like it doesn't serve as a suitable solution in the long run. Services like that will provide you with lower fees since the transfer is done within their own database, but you're sacrificing the transparency and the privacy of the individual. There's no company that would ever provide you with free services to transfer, there must be some strings attached. If you want to focus on low fees, I rather focus the efforts on LN and similar implementations.


Coinbase is a prime example of a company that doesn't give it's user the control of their own coins. They often freeze accounts on the basis of tainted coins which are often built on unfounded allegations.
2497  Bitcoin / Bitcoin Discussion / Re: checking Ledger Nano S BTC balance on blockchain on: December 28, 2020, 09:43:26 AM
As said, Ledger uses many different addresses and thus the disparity lies primary with the fact that your funds are split between each address that you use. Ledger also sends funds into your Change addresses which are never shown as your receiving address.

You can export the master public key [1] and use it to search for the funds in the addresses generated with the corresponding seed. I wouldn't recommend doing this as the blockexplorers can know the group of addresses that are linked together, with the IP and the browser fingerprint being leaked.

Using a Ledger with an Electrum wallet should be sufficient to identify addresses that contains the funds and use it to search on the blockexplorers.

[1] https://support.ledger.com/hc/en-us/articles/360011069619-Extended-public-key
2498  Bitcoin / Wallet software / Re: BTC nube, old Multibit wallet, how to access/migrate? on: December 28, 2020, 08:35:50 AM
Sorry for this probably dumb question, is the public address and the personal key, in general, all I need to spend or receive BTs (plus a wallet of course)?
Private key, yes.
I installed Electrum and tried to use the key of "multibit.key" by entering it into "Sweep private keys/Enter private keys" believing that is needed to be able to fully use that wallet (spend and receive BTC).
However, the key code I found in the old "multibit.key" is not accepted (it is 53 characters long). Am I doing something wrong here?
Should have 51 or 52 characters, does it start with a 5, L or K?
In an attempt to install the long discontinued Multibit, I found an old installer that I attempted to use on my Win10 (64 bit) PC. It asks right away for Java, which I subsequently installed. However, after installing Java, the Multibit installer still claims no Java is installed and I am therefore unable to complete the Multibit installation.

Can someone point me in the right direction on what to do? If I can't install Multibit, what other wallets could I use accepting my key(s)?
I read somewhere that I may have to try another wallet that accepts the code/key of my old "multibit.key" and then transfer to Electrum?!?
You shouldn't. The older Multibit wallets likely won't allow you to transfer the funds.
a) The key I used to receive BTC and the key within the "Multibit.key" should be in theory all I need to access/spend my BTCs (which I mined in 2014)?
Yes. You should be able to extract is relatively easily if it's unencrypted. The format should have your addresses listed in one column and the private keys in the other, assuming multibit classic.
b) Assuming those 2 keys is all I need, what wallet do you suggest (since Multibit is discontinued) to "migrate" using these two keys?

Electrum. You only need your private keys.
2499  Bitcoin / Bitcoin Discussion / Re: What do you think is a fair transaction fee for the Bitcoin transaction? on: December 28, 2020, 07:40:23 AM
Possibly cents. It's important to note that opening or closing a channel would incur some fees for it's an onchain transaction. My funding transactions are always executed at lower fees so my recent funding transaction was about $0.1 or so for $100 of TX. The fees for transacting within the Lightning network is practically negligible.

IMO, if you really want to determine a fair fee, you have to evaluate the costs per transaction in terms of the resources used. For LNs, they are usually fairly low cost to run as compared to on-chain transactions. As such, if you're talking in the context of LN, then the fair fee to charge is probably just several cents.


On-Chain transactions are out of the question and I believe you're not talking about it in this thread.
2500  Other / Beginners & Help / Re: Air-gapping 2 devices vs. Trezor/Ledger? on: December 28, 2020, 03:42:37 AM
I find the line of reasoning very similar to how people on reddit say "don't worry the source code is open and firmware is open" [and just assume it's audited by experts].

Also just wanted to throw in there that if there was perfect time for Ledger to do an exit (or not even necessarily exit) scam it would be now given the high price of BTC and probably the lowest ever approval rating for the company. Even if 1 or 2 out of every 100 wallets lose funds it would be hard to prove fraud. They could probably get away with it. I doubt they will do something like that, but I'm just saying.
Well, then I guess you're better off with airgapped storage. It really boils down to if you trust the HW wallet manufacturer in this case, if you don't want to trust anyone else. At the same time, you have to make the same assumption about your cold storage wallet as well as the OS.

I wouldn't say that it's hard to prove. I'll be able to see the various commits to the github page if I were watching it and it makes inspecting the code before updates much easier.

Let me make sure I interpreting this correctly.

So, if I went to best buy I bought 2 HP laptops with Windows 10, I should be concerned that there may be malware in them even if they don't go online--perhaps by some of the pre-installed software?
Might have some spyware, after all they tend to include a ton of spyware. I'll wipe them and just install Linux. The popularity and the design behind Linux based OS makes the chances for persistent malware infection harder.
Also, what do you suggest to be a lightweight option. I travel a lot and if I took this route I'd like to not have to carry around 2 laptops with me all the time. This weight issue might be the only reason I stick with Trezor.

I was hoping I can just use 2 phones (remove wifi card and antenna of the offline one)?
Your use case would probably make hardware wallets more attractive.

If you'd like, you can just purchase 2 Raspberry Pis and use them as cold wallets. My personal preference would just be to put some funds in a hot wallet and bring it around. Even if I were to lose them, I wouldn't lose all my funds.
Pages: « 1 ... 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 [125] 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 ... 463 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!