Do you have any idea where you got the malware from?
|
|
|
What format is your PK? I am not sure how blockchain.info exports the private keys but maybe the format is not supported?
on blokchain.info show me Private Key Format : WIF its supported or not ? any recommendation wallet ? i try using electrum but in installation show me fatal error python35.dll Where did you download Electrum? WiF should be supported yes.
|
|
|
What format is your PK? I am not sure how blockchain.info exports the private keys but maybe the format is not supported?
|
|
|
The most easy way would be to export all private keys and import them again to the new devic(es).
This only works if all the private keys are in the same format, example WIF.
|
|
|
If it is a 24 char pass with upper, lowercase and numbers it should not take that long.... You clearly don't know BIP38 encryption, even 6 characters will be very expensive to brute-force! i have a decent idea what the passphrase may be. Can you share this? If his password is one 24 char word and he knows part of it im sure that a good python script wont take long to crack it.
|
|
|
If it is a 24 char pass with upper, lowercase and numbers it should not take that long.... Are 100% sure it is exactly 24 char? Does it have symbols like #, @,€...?
|
|
|
On February 4th, Sherlock_er initiated an escrow for a trade he was engaging in. Since that time he has not provided me with any tracking information and the buyer claims the tracking information provided was not legitimate. Sherlock_er has ignored multiple requests from me to provide legitimate tracking information, as he promised the items would ship quickly. Fast forward to 2/18 and I told Sherlock_er to provide me with the shipping details. At that point he provided only the buyer with fraudulent tracking info (per buyer). This annoyed me so I sent him a message telling him I would leave him negative trust and release the funds back to the buyer unless he responded. It is at that point he stopped logging in.
Pretty clear that I'm being setup for a claim that I released escrow to the buyer wrongfully, but it's been multiple weeks with no tracking info, no response to my requests, and I feel that the time has come to give the funds back to the buyer. I left negative trust to Sherlock_er and expect that as soon as I release escrow back to the buyer, suddenly a tracking number and scam attempt will appear. https://bitcointalk.org/index.php?action=profile;u=1590856My question is, since it has been 18 days now with no tracking information provided to me by the seller, is it acceptable to release the funds back to the buyer. If not, what actions could I take that wouldn't result in me being entrapped in a scam accusation? Note: I figure it's better to wait and make this entrapment scheme perfectly clear prior to releasing the funds back, as these scammers aren't intelligent, but are tenacious. Based on that i think you are safe releasing the funds back to the buyer(s).
|
|
|
I wonder how many of these addresses are "forgotten" or "lost" addresses with a huge amount of money, just sitting there.
|
|
|
As ar as i know you don't need the private key for a "watch only" wallet.
|
|
|
I have 3 of them and keep them in safe storage.
|
|
|
Please tell us how much you would like to exchange.
|
|
|
You forgot to tell us your rate and how much you would like to exchange
|
|
|
They are listed since yesterday
|
|
|
If i understood the blockchain wallet password and the blockchain private key are different things?
Can the "cloud minner" have access to my funds and spend them at any time even after i had changed my wallet password and after i enabled 2FA methods? Is that?
When he has your private key he can access your funds whenever he wants without a password or 2FA method. Your password and 2FA are used to login to the website, your private key is used to have control over your BTC address. I did not give my private key directly, and yes my blockchain.info wallet id and password in the first moment, and this time my wallet was really empty. After this, even with the change of the password of the blockchain.info wallet and other enabled security procedures, can anyone ("cloud miner") have stolen from me? Is that? You said: The procedure was to create a wallet in the blockchain.info and send the miner the information about my wallet, including the private key. If you give your private key to anybody they will have FULL control over your btc address and the funds in it, now and for ever, also for funds deposited AFTER you gave your private key. It does not matter that you password protect it or enable 2FA.... they have your private key so they can do anything you want with your BTC address and the funds in it... do you understand this? No, not every miner has access to your BTC address and your funds, only people who have your private key.
|
|
|
If i understood the blockchain wallet password and the blockchain private key are different things?
Can the "cloud minner" have access to my funds and spend them at any time even after i had changed my wallet password and after i enabled 2FA methods? Is that?
When he has your private key he can access your funds whenever he wants without a password or 2FA method. Your password and 2FA are used to login to the website, your private key is used to have control over your BTC address.
|
|
|
You don't understand.... if you give your private key to anybody when your wallet is empty and you fund it, even years later, they have access to your funds because they have your private key.
Control of private key = control of wallet - for ever. No password or anything needed. Thats why it's a PRIVATE key.
|
|
|
They did respond and the procedure seems pretty normal to me, for your own safety.
Why are you accusing them of a scam?
|
|
|
|