Show Posts
|
Pages: [1] 2 »
|
The second one - openssl enc -d -aes-256-cbc -a -in bitcoin-wallet-keys-YYYY-MM-DD -out bitcoin-wallet-keys-YYYY-MM-DD-decrypted . Using the Gitbash terminal on Windows, this command just returns nothing. No error, but nothing happens it just sits on the next line and there is no output file created in the directory. Am I doing something wrong here?
I am not overly familiar with "git bash", but I don't think you can use "general" Linux commands with it... it seems to be a "git" specific terminal emulator, ie. it's really only designed for working with "git" and not with general unix/linux shell commands. You'd either need to setup something like Cygwin and use openssl with that, refer: https://www.ssl.com/how-to/install-openssl-on-windows-with-cygwin/or Install/Setup the Windows Subsystem for Linux (WSL) and install a linux distro like Ubuntu, refer: https://ubuntu.com/wslAlso, I downloaded the oldest Bitcoin Wallet APK that I could find from the app github ( version v3.11). I installed it on the Bluestacks Android Emulator and then created an encrypted "wallet-keys" export file... after mucking around in Ubuntu (in WSL) trying to decrypt this export with "openssl", I found a stackexchange comment that indicated that "old versions of OpenSSL" used a different hash function when generating the encrypt/decrypt key from the user entered passphrase... essentially, they moved from MD5 to SHA-256 by default: Why do I get errors when trying to decrypt 1.0.2 data with 1.1.0?
A message digest is used to create the encrypt/decrypt key from a human-entered passphrase. In OpenSSL 1.1.0 we changed from MD5 to SHA-256. We did this as part of an overall change to move away from the now-insecure and broken MD5 algorithm. If you have old files, use the "-md md5" flag to decrypt them.
(NOTE: I suspect this is also why newer versions of the app cannot read older backup files!) So, by adding the "-md md5" flag to the command, the decrypt (of "old" files) works: openssl enc -d -aes-256-cbc -a -in bitcoin-wallet-keys-YYYY-MM-DD -out bitcoin-wallet-keys-YYYY-MM-DD-decrypted -md md5
For reference, here is my "test" data... Contents of my bitcoin-wallet-keys file: U2FsdGVkX19z6mv24j7b4xi3wJz77mt7uYVNdyh4OwBTuQ0dESxIAW58AfW+4Ik9asXc3SV1X3lM 6R1uHe/ulIjYv5Bkylv4ZtWPYnM5Jl6TMRWX1Q+7cCFBt3BKMdVLNCV8OcGofEs23XhWLT/j/YoH C+0PfcS21mNjF0u42PVa9BJYBx4JfHSvwx0R3GjubszONRp+XRZZoJnU0Re7BzT+OELp8VLJfobO HQ1sfwg=
Can be downloaded here: https://keybase.pub/hcp/bitcoin-wallet-keys-2020-11-17commandline: openssl enc -d -aes-256-cbc -a -in bitcoin-wallet-keys-2020-11-17 -out bitcoin-wallet-keys-2020-11-17-decrypted -md md5
Contents of the generated "out" file # KEEP YOUR PRIVATE KEYS SAFE! Anyone who can read this can spend your Bitcoins. L4oyNUNUhDPx5Vd3eShN8Q3fc7MeMxcGQA4WseU8Ys6Ebs7y8FKx 2020-11-17T05:08:03Z
Installed Ubuntu on a VirtualBox and followed your instructions down to the letter. It worked. Thank you so much HCP - you went above and beyond here. Legend. Really appreciated.
|
|
|
I believe that is likely to be the same encryption method, just it's private keys instead of the "protobuf" formatted wallet file. Have you tried using a more recent version of the wallet application (ie. Bitcoin Wallet for Android) and importing the "bitcoin-wallet-keys-YYYY-MM-DD" file? If that doesn't work, you might be able to decrypt the file using the openssl command with your bitcoin-wallet-keys-YYYY-MM-DD file: openssl enc -d -aes-256-cbc -a -in bitcoin-wallet-keys-YYYY-MM-DD -out bitcoin-wallet-keys-YYYY-MM-DD-decrypted
Assuming that works without error, if you open the "decrypted" file in a text editor... do you see the keys listed? Thank you for the reply HCP. I have tried installing the latest version of the schildbatch wallet as you suggested, and attempted to import the keys using the restore wallet function but unfortunately it just returns the error "Wallet could not be restored - unreadable wallet". The second one - openssl enc -d -aes-256-cbc -a -in bitcoin-wallet-keys-YYYY-MM-DD -out bitcoin-wallet-keys-YYYY-MM-DD-decrypted . Using the Gitbash terminal on Windows, this command just returns nothing. No error, but nothing happens it just sits on the next line and there is no output file created in the directory. Am I doing something wrong here?
|
|
|
I've some BTC stuck on this wallet, it's earlier version that is being discussed though - version 2.46.
There is no option to backup the wallet, but there is an option to backup the keys.
I have done that, exported the file and have it on the computer. None of the described methods are working though, they are all falling down at the decryption of the wallet stage (presumably because I do not have a back-up of the wallet but a backup of the keys only).
My file is formatted bitcoin-wallet-keys-YYYY-MM-DD. When opened in a notepad file is just 5 lines of mumbo jumbo. Electrum does not recognise it as anything, so I presume it's encrypted.
Any ideas?!
|
|
|
I've some BTC stuck on this wallet, it's earlier version that is being discussed though - version 2.46.
There is no option to backup the wallet, but there is an option to backup the keys.
I have done that, exported the file and have it on the computer. None of the described methods are working though, they are all falling down at the decryption of the wallet stage (presumably because I do not have a back-up of the wallet but a backup of the keys only).
My file is formatted bitcoin-wallet-keys-YYYY-MM-DD. When opened in a notepad file is just 5 lines of mumbo jumbo. Electrum does not recognise it as anything, so I presume it's encrypted.
Any ideas?!
|
|
|
Does it not seem strange that this is #2 by marketcap, with it's cool 27 dollars daily volume.
|
|
|
I think here we can report: https://www.cloudflare.com/abuse because they use this service. This guy(s) I can get who is owner, but I need time to check. No problem whetever is now, we can get data of this shit person. Whatever: this website and guy has been gone... But I will find this person who stolen our money! Keep your fuckin hair on. He said on twitter it'll be back online today or tomorrow, give him a chance.
|
|
|
I got in, all sorted! It was human error, mistake on my part - thanks for all replies.
|
|
|
Unfortunately I don't know any of the public addresses and cannot get to them without the password
|
|
|
I put some BTC on an old bitcoin core wallet which was on an external USB drive back in 2015. I then encrypted and locked it with a password. I now want to retrieve the coins but when I attached the drive to my current laptop, I am seeing zero balance and no transaction history. I spent about a week downloading the entire blockchain again, now up to date but it is still showing zero.
However, the password I noted is not working and the wallet is locked. Should the bitcoin core wallet show the balance when the wallet is locked, or do I need to put in the password first? I thought the password was only required to send. I really want to see the balance, so that if there is something there (I really thought there was, and if it's empty why would I have locked it in the first place).
I can't export the private key without the passphrase. I also tried the dumpwallet keys.txt command in the console but unfortunately I get met with:
Error: Please enter the wallet passphrase with walletpassphrase first. (code -13)
I'm assuming that as the wallet.dat has been moved to a new client, it wont show me anything at all until I unlock the wallet.
Before I start launching into btcrecovery to try and crack my own password, is there any way I can see my balance or any public keys from the wallet.dat ? I would rather not go through it all and then find the balance really is zero.
thanks for any help
|
|
|
I was selling my veri in stages, until I saw that Lighthouse Report. Now I will hodl.
It makes no sense that someone puts in the effort of 38 pages of report, registers a domain, pays for twitter promo just to slate something.. i mean its bizarre. There is obviously something good with veri that is either worrying it's competitors, or making someone go to extreme lengths to knock the price down to get in.
Either way im now hodling definitely.
|
|
|
Re: Second round - No one in this block https://neotracker.io/block/height/1445025 got any tokens. People who sent on the hour at 9:00 are in this block. Following block (which was later) got tokens. Fucking joke, those in first on the hour didnt get them.
|
|
|
Bizarre that there is still no communication whatsoever from Airfox about the token sale having started yesterday instead of the 5th as they announced.
|
|
|
SMS received this morning saying that the Air Token sale is open and almost sold out, then inviting me to continue etc
Is this a scam, it's 3 days early.
If so, how do they have my phone number?
|
|
|
Looking to buy, .5eth offered
|
|
|
Price just got destroyed, what happened, was it artificial then and just due to no one being able to withdraw?
|
|
|
Mine are just sitting on coin exchange and always have been. So i dont have to do anything right?
|
|
|
Still for sale Last buyer accused me of being a scammer when I offered to use an escrow service if he/she preferred. This was pretty weird to me because I picked one at random from the list here - https://www.reddit.com/r/BitMarket/wiki/escrow . I guess there is something of a scamming culture here and people are extra wary so just in regard to payment can I clear up, I don't care how payment is made - ideally I'd just take the payment and transfer the services like I do every other (non-btc) site but if any prospective buyer wants to use an escrow service that's fine too, and any escrow of your choosing is fine as long as it's trustworthy and can be verified. I'd rather not mess around with trades though. The more straightforward, the better. Thanks for all interest so far. Open to (sensible) offers.
|
|
|
|