Bitcoin Forum
May 03, 2024, 06:23:57 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 [96] 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 ... 317 »
1901  Other / Beginners & Help / Re: All of my bitcoin questions gathered. I need some help here... on: April 20, 2020, 04:35:25 PM
Yes, but it's not fully decentralized, since there are prepared nodes written in bitcoin core. Right?

No.
There is a list for your node to initially find other nodes.

You could also just enter your own IP address to connect to. This doesn't change anything regarding the decentralization.



Let me get this straight. Node is a list of IPs that have installed bitcoin core too?

No.
Look at my previous answer, i explained what a node is two times already.
1902  Bitcoin / Development & Technical Discussion / Re: could a malware intercept and change BIP21 too? on: April 20, 2020, 08:58:20 AM
Once your computer is compromised, anything can be done which is not explicitly protected by cryptography.

While there is a lot of clipboard malware around, potentially this could have been more sophisticated malware compromising the whole system instead of just looking for the clipboard. So much more damage could have been done.

Once an attacker has made it onto your computer, basically everything is possible. Obviously there still is the challenge to get root / administrator privileges to actually be able to do everything.
The moment he achieved root/administrator privileges, he can change and modify any software you are using.

In this case, the answer to your question is yes. A malware could intercept and change everything. But generally speaking:
1) If he has full access to your computer, he might as well just extract your private keys / seed
2) This is easier sad than done.

Most malware you find is created by some script kiddie, who doesn't even know how to circumvent security measurements properly (e.g. AV evasion).
That's the reason they focus on easy to implement things like changing the clipboard (done with a few lines of code and doesn't require more than user privileges on the target system).


Long story short:
Yes this is possible. Just as encrypting a whole system or gaining access to a webcam is possible.
But you are more likely to encounter "dumb" malware (e.g. clipboard changing malware).
As long as you are not using the security nightmare OS (Win 7), you are relatively fine anyway.
1903  Other / Beginners & Help / Re: Generate address and make it Hash. on: April 20, 2020, 08:01:07 AM
Has anyone tried the google drive link to ensure it is a valid link?

I did.

Given the fact that the whole information is nonsense, i was a bit suspicious about the uploaded zip file.
So i downloaded, unzipped and checked the .exe for malicious activity.

While some things might be slightly suspicious (like accessing memory of other processes) it seems like there is no obvious evidence for it being malware.


But as HCP has mentioned, the program isn't doing anything relevant. So there is literally not a single reason to download and use this.  
1904  Other / Beginners & Help / Re: All of my bitcoin questions gathered. I need some help here... on: April 19, 2020, 04:52:05 PM
A list of DNS names from nodes in the source? What source? The bitcoin software's source code?

Yes.


What is initial bootstrap exactly?

The process i have mentioned above. It roughly follows these steps (simplified):
- Resolve DNS names in the hardcoded list to IP addresses
- Query those IP addresses (nodes)
- Get more IP addresses from nodes
- Connect to these nodes
- Save IP's of active nodes into a list so you don't have to follow these steps again the next time you start core. The next time you directly connect to the IP's in the list.
1905  Other / Beginners & Help / Re: All of my bitcoin questions gathered. I need some help here... on: April 19, 2020, 04:42:29 PM
So yeah, that binary is a BIG, BIG number. Are we trying to find a binary that is below the target?

Yes.

But how does random really work? I mean when I download and install the bitcoin core what exactly will my computer search? How will it search other computers that have downloaded the blockchain? This is what I'm not understanding.

There is a list containing DNS names from nodes in the source for the initial bootstrap.
Once the node is connected to the network it will receive message from the nodes containing ip addresses of other nodes. All of these IP's will be saved into a list to connect to then the next time you start up core (without needing to use the hardcoded DNS list).
1906  Other / Meta / Re: Should there be a way to preserve posts referenced in flags? on: April 19, 2020, 04:15:29 PM
Hmm what about using archived link as the post reference in flag?

That's what i tried.
But the reference post has to be a link pointing towards a topic created on bitcointalk.org.



Flag created by bob123 is not valid...

The link i used pointed towards a specific post in given thread.
However, somehow this simply gut cut off when creating the flag. So the real reference post is now the reference post of the red trust, which states the reason for the flag.

Weird behavior. Nothing i can do about now.
If i would have known that links to specific pages/posts get cut off, i would have created a separate thread.

That's my mistake, and i admit it.

But nonetheless, the flag itself is valid.
A user who offers a wallet recovery service while being an alt of an account which got negative trust for engaging in spreading risky/malicious links/files while also having an active flag seems pretty solid enough for a warning flag.


For clarification:
The reference link for the flag i entered was https://bitcointalk.org/index.php?topic=2544574.msg54255920#msg54255920.
This got cut off to https://bitcointalk.org/index.php?topic=2544574
1907  Other / Beginners & Help / Re: All of my bitcoin questions gathered. I need some help here... on: April 19, 2020, 03:57:51 PM
Why every 2016 blocks? Does it have to do with maths?

That's just a fixed number.
2016 blocks have been chosen because it seemed to be a good number

2016 blocks with 10 minutes per block means 2 weeks. So there is an adjustment every 2 weeks (roughly).



SHA256 of the string "a" is: ca978112ca1bbdcafac231b39a23dc4da786eff8147c4e72b9807785afee48bb

^That output is not a number. You're saying that hash is just a number that is the subject of a compression function. Yes, target seems to be a number since you say "they want the hash to fall below the target". But... Why do you say that hash is a number?  Undecided

In computer systems, everything is a number. It all depends on the representation of binary data.
Just think about it like that: The hash is being translated into a bit string and then interpreted as a number.



Quote
If yyour node connects to another, then that node will also send your IP address to other nodes if you allow incoming connections and once you're fully synced, you'll get connections from other nodes.
So having bitcoin core open means that I'm having a port open too? I thought that IPs are something hidden in the bitcoin world. I thought everything is anonymous.

1) Other nodes can receive block files from you only if you allow incoming connections in the settings AND have the corresponding port open.
2) IP's are NEVER hidden when you communicate via the internet. IP's are needed to communicate. This is NOT sensitive information. You are most likely sitting behind a NAT of your ISP anyways. Whenever you relay blocks (automatically) or send a transaction, your IP is visible. This can not be prevented.
You can hide your IP by communicating via the TOR network tho.



Okay so let's assume that I've downloaded the blockchain and I'm connected to the network. So, will I just share my blockchain file to others? Doesn't this mean that my internet will go slower?

Same answer as above applies here:
Other nodes can receive block files from you only if you allow incoming connections in the settings AND have the corresponding port open.

If you decide to do so, yes your internet connection will be slightly more occupied.
1908  Other / Beginners & Help / Re: All of my bitcoin questions gathered. I need some help here... on: April 19, 2020, 03:15:36 PM
Quote
From others (full) nodes.

Now I'm feeling a bit redicule... But the word node... I cannot translate it on my language.
So I cannot understand your quoted message at all. Are nodes verified blockchain files?  Huh Undecided

Nodes are computer who have the whole blockchain stored and are connected to the bitcoin network.
If you download bitcoin core, keep the whole blockchain synced with a connection to the network, you are a full (because you have the whole blockchain stored) node.

So you are downloading all the blocks from other computer storing the whole blockchain who are connected to the bitcoin network and allow incoming connections.
1909  Bitcoin / Bitcoin Technical Support / Re: Is it dangerous to load other people's wallet files in the Bitcoin client? on: April 19, 2020, 03:07:47 PM
Since walletrecovery seemed quite sketchy to me, i did 5 minutes of research.

It turned out that he is an alt of percenter who has negative trust ratings and a valid flag open against him.

Check this post for more information.


I advise anyone to not deal with this user in any way.
1910  Economy / Reputation / Re: Known Alts of any-one - A User Generated List Mk III (2020 Q2) on: April 19, 2020, 03:00:45 PM
2 Accounts connected:

walletrecovery and percenter

Both were using the same bitcoin address (3QjnBKZAdUK3MVfekycu2FhCpT3hvmYa5X) in their profile:

This address has been removed from percenter's profile at some point after 13.02.2020.

percenter has a valid flag and 2 negative trust ratings: https://bitcointalk.org/index.php?action=trust;u=2466240
Therefore this post will serve as a basis for a flag against walletrecovery.

Flag: https://bitcointalk.org/index.php?action=trust;flag=1677
1911  Bitcoin / Bitcoin Technical Support / Re: Is it dangerous to load other people's wallet files in the Bitcoin client? on: April 19, 2020, 02:43:08 PM
Now the conversation is not about this and not about philosophy or about accidents when driving a car or crossing a street at a pedestrian crossing or elsewhere.

Oh, i forgot. Obviously the conversation is about bricks falling from the sky:

If you apply your logic, then a brick has never fallen on your head, but this does not mean that this is impossible,
therefore you now always look at the sky every day!



You give an example files with the extension JPG and PDF
Why are you doing this?

Because of your (retarded) statement:

Wallet file is not an executable file type and in principle it cannot infect a computer and steal bitcoins

This statement is simply wrong.
Instead of telling you, that you obviously don't have any clue at all, i tried to be sarcastic since almost everyone knows that JPG and PDF files can get your computer compromised.

I apologize for assuming you would be able to do the mental task, understanding that wallet.dat files can do the same - yourself.

So, i'll repeat it for you:
Non-executable files, can get your computer compromised if they are being parsed or otherwise worked with.
1912  Other / Beginners & Help / Re: All of my bitcoin questions gathered. I need some help here... on: April 19, 2020, 02:37:55 PM
About question 3, you're writing:
Quote
They're trying to get a hash of the block to fall below a certain amount

Miners are trying to get a hash (Okay until here) to fall below a certain amount? Certain amount of what? Target? Difficulty? I'm so confused...

The hash has to be below the target (which is directly related to the difficulty).
Both mean the same thing but are represented in a different way.

The highest possible target corresponds to the lowest difficulty and vice versa.



Quote
this was originally done by chainging the nonce in the coinbase (which is an up to 20 byte number that is stroable in any transaction before it's signed)
Didn't get that...

Miners build their block. Then afterwards they generate the hash.
If the hash does not meet the requirements (being below the target), they change the nonce which will result in a completely different hash.
They continue to do so until all possible nonce's have been used. Then they either change different fields in the header or chose to include other transactions and start again.



I have another question by the way. When we download and install the bitcoin core, it downloads the blockchain right? Where exactly does it download it from since there is no bitcoin authority/database?

From others (full) nodes.
1913  Local / Anfänger und Hilfe / Re: Gesendete BTC zurückholen on: April 19, 2020, 02:11:17 PM
Hey, nun bekam ich eine email: man brauchen meine wallet Adresse zum zurückbuchen
Obwohl das eigentlich unnötig ist denn deine Adresse ist ihnen von der ersten Transaktion schon bekannt.

Ne. Oft wird ne Adresse nur für eine Transaktion verwendet und danach nie wieder. Warum sollte ich einen sk für ewig abspeichern?

Es ist in der Tat unnötig. Wenn ich BTC erhalte und diese zurücksenden möchte, kann ich sie einfach an die Adresse, von der sie gekommen sind, zurücksenden.
Da muss man nicht erst nach einer neuen Adresse fragen.

Ich weiß zwar nicht worauf du dich mit "sk" beziehst, aber sensitive Informationen (also master seeds und private keys) sollten generell nie gelöscht werden.



Keine Ahnung, wie ich auf die "böse" Adresse gekommen bin...

Diese Frage solltest du aber schon versuchen zu klären.
Hast du die einfach von einer falschen Seite kopiert? Oder hast du vielleicht die richtige kopiert aber sie hat sich in deinem Zwischenspeicher geändert? Letzteres würde auf eine Kompromittierung deines Rechners hindeuten.
1914  Other / Beginners & Help / Re: Generate address and make it Hash. on: April 19, 2020, 01:13:56 PM
What is Hash/Hashing?
Hash is used to encrypting the password, emails, address or other information must be hidden or secured.

Hashing has nothing to do with encrypting.
That's not what hashing is for.


How the receiver and the sender get the key to unhash?
If both parties make some transaction they the sender already sent the key to the receiver so they can get the information easily.

You can not unhash. The idea behind a hash function is, that it is a one-way-function.
In a transaction, the sender does not send any key to the receiver.


What are the benefits of hashing?
Hashing is good to avoid from the hackers because the only one can open the code is the receiver and the hacker takes time to decode the hash.

Hashing itself does not protect anything from 'hackers'.
Further, you don't decode hashes.




Good job. That was a A+ quality shitpost.
All mentioned information is wrong. No merits for you, sir.
1915  Bitcoin / Bitcoin Technical Support / Re: How can someone move my btc that is a local wallet? on: April 19, 2020, 01:00:32 PM
After spending a few hours last night. I think I know what happened. <sigh>...  It was a hack.  Through my NAS I believe.  Anyway... Its done deal.

Is this just a guess or do you have any evidence ?

Compromising a NAS does not necessarily mean your computer gets compromised. You either had to actively execute malware stored on the NAS or there were further vulnerabilities (maybe due to an unpatched system?)

What kind of NAS do have (vendor / model) ?


You definitely have to completely wipe your computer and NAS. Backup important files and format any disk.

And if he has access to your private keys (wallet file + your entered password), he also has access to any other password you have entered on this computer since you got compromised.
Make sure to change all affected passwords.
1916  Bitcoin / Bitcoin Technical Support / Re: Is it dangerous to load other people's wallet files in the Bitcoin client? on: April 19, 2020, 12:08:19 PM
If you apply your logic, then a brick has never fallen on your head, but this does not mean that this is impossible,
therefore you now always look at the sky every day!


This is absurd, why write about it.

Just because you didn't have a car accident yet, it doesn't mean that it is impossible,
therefore you always drive carefully!

You are absurd.


This is absurd, why write about it.

You asked, we answered.


There are principles of working the bitcoin client’s program, and if there’s not a single person who knows the principles "how it's works",
then no one will answer my question the way I need.

If "the way you need" is someone stating "this is impossible", then you will either never find this answer or someone who doesn't know what he is talking about will give you that "answer".
Look it up, how it works. You can find the source code on github.


Wallet file is not an executable file type and in principle it cannot infect a computer and steal bitcoins, why doesn’t anyone write about it?

No one writes that, because it is not true.
PDF files are no executable files, therefore they can't infect your system! (warning: sarcasm)
Image files are no executable files, therefore they can't infect your system! (warning: sarcasm)


Are there no file system specialists here?

What a given software does with a given filetype has nothing to do with the file system.

I wonder how you even dare to call yourself "walletrecovery" with little to no technical knowledge at all.
1917  Bitcoin / Bitcoin Technical Support / Re: Is it dangerous to load other people's wallet files in the Bitcoin client? on: April 18, 2020, 05:09:34 PM
Well, if we don’t download wallet.dat to the Bitcoin client, but just upload the data using pywallet.py, can it be that even if we passively read from the file, our computer could be infected?

I don't really understand what you are trying to say, but.. if you are not executing the file, you are fine.

What OS are you using?
If you are using linux, as long as you don't execute the file or load it into an application which parses the content, you are fine.
For windows, thats a little bit more tricky. But a general rule is that if you don't actively do stuff with it, you are fine.

Whether or not you are vulnerable using a python script depends on what the script is doing. And in this case the attacker would have to actually target you and the script instead of bitcoin core.


The easiest method is to use a virtual machine. Set it up once, load the file into it, do whatever you want with it, reset the virtual machine. As easy as that.
1918  Bitcoin / Hardware wallets / Re: Ledger Live 2.1.0, 2.2.0, 2.2.3 Installers and Uninstallers flagged as Malware on: April 18, 2020, 03:13:36 PM
Is there open source code for their disaster buggy Ledger Live software, or should I think about that also?

Yes, it is open source: https://github.com/LedgerHQ/ledger-live-desktop


How many more shitcoins are they going to add?

Probably as much as people want them to.
People want worthless shitcoins to be added, and they follow. Especially since developer create their application on their own and it only needs a security review from ledger.


Step out and hear the cries of new people who are using Ledger wallet.

Excuse me?
I only hear people crying who got their web wallet created by someone else and now lost x $.

I'd rather hear people crying because of some stupid bugs in a software you don't even need to use on a daily basis, than scams going on.
1919  Bitcoin / Bitcoin Technical Support / Re: Is it dangerous to load other people's wallet files in the Bitcoin client? on: April 18, 2020, 03:00:47 PM
Yes, for experiments with client files, we need another computer. Now it’s clear, thanks!

Please not that using another computer doesn't completely solves this problem in case of such a vulnerability in the application.

If (and this is a very big if) it is possible to run code injected through a bitcoin core wallet file, it could compromise your second computer.
The possibility of private keys being stolen from wallets being recovered afterwards on that computer does exist, but is very unlikely.

However, if someone can compromise your computer he might also compromise your whole network.


If you really deal with lots of wallet files in a professional manner, use virtual machines or at least sandbox the application (core).
1920  Bitcoin / Hardware wallets / Re: Ledger Live 2.1.0, 2.2.0, 2.2.3 Installers and Uninstallers flagged as Malware on: April 18, 2020, 02:51:36 PM
I know, and I don't expect to see any perfect hardware wallet.
But Ledger is NOT open source, and this false positive is not the only issue they have.
Think about that.

Ledger decided to create a hardware wallet resistant against physical attacks by using hardware / firmware which is under NDA and can't be open sourced.
They are using a secure element.

The non secure MCU is completely open source (comparable to trezor) but not resilient against physical attacks (comparable to trezor). Thats what the (closed source) secure chip is for.

Think about that.
Pages: « 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 [96] 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 ... 317 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!