The best standalone wallet is Andreas Schildbach's Bitcoin Wallet, if you're looking for that, or else take a look at all the other bitcoin apps
|
|
|
If Firefox had been installed, and the update appearing to be legitimate, Ubuntu's 'update-notifier' application, I would have clicked it, even though it was only a language pack available for update. It's also entirely possible I already installed some malware because of this EvilGrade method. How can you determine what IP's update-notifier is providing the update from? Is it possible to force the sources.list addresses to use a host file instead of DNS? Can tzdata be removed from Ubuntu without breaking it's ability to function? If you put at least one of those questions on Rugatu you will really make some bitcoiners happy
|
|
|
Thanks check_status, is true that every day we learn something new
|
|
|
The rootkit would make that file appear to be normal; that's what they do.
If you can boot from a known-good live CD then you'll be able to mount your root partition and see how that file really looks, before the rootkit has a chance to run and start masking itself.
I'm going to have to do this for sure. All of the Linux tools I've used are coming up empty, top and the like, yet the system responds as if it is overloaded by too many processes. When I do this, strace, I found out why there is nothing in ld.so.preload : access("/etc/ld.so.preload", R_OK) = -1 ENOENT (No such file or directory) open("/etc/ld.so.cache", O_RDONLY) = 3 still looking... Edit: RKH {Warning} Is this bad? Warning: The command '/usr/sbin/adduser' has been replaced by a script: /usr/sbin/adduser: a /usr/bin/perl script text executable Warning: The command '/usr/bin/ldd' has been replaced by a script: /usr/bin/ldd: Bourne-Again shell script text executable Warning: The command '/usr/bin/lwp-request' has been replaced by a script: /usr/bin/lwp-request: a /usr/bin/perl -w script text executable Warning: The command '/bin/which' has been replaced by a script: /bin/which: POSIX shell script text executable
Checking for hidden files and directories [ Warning ] Warning: Hidden directory found: '/etc/.java' Warning: Hidden directory found: '/dev/.udev' Warning: Hidden directory found: '/dev/.initramfs' Yes, that looks really bad! Re-install your OS before it's too late.
|
|
|
Rugatu.com q&a for bitcoins, we're still giving free coins to anyone who joins In case anyone's interested, it seems to be 0.01 BTC (under 6 cents). For free, so you can try it out the first moment you join
|
|
|
You guys are ok ? There are some nice chicks there showing you how to do stuff... Still no bitcoin howto's though
|
|
|
This is so fucking lame it's beyond words. Hmm, i love it
|
|
|
Yes, why not. Study over it, ask around if you have any issues and the day you start accepting it don't step back, no matter what.
Bitcoin is for the long run, so you will not see your revenue increasing dramatically by night, but a steady low increase while people gain confidence with your business, and give you free publicity by word of mouth too.
|
|
|
Yeah, that's the one. I reset the blockchain now but the wallet ID is different. I have the wallet ID written down if that helps in some way.
It seems like something is not right indeed and one of your cleaning apps did way too much in there. As you already have rooted your phone, install root explorer and navigate your way to "/data/data/de.schildbach.wallet/files/". You should encounter some backup files that have your private keys there. Long press the first one and select "view as text" so you can view the private keys that start with a 5. You could import those keys to your existing desktop wallet or sweep them at mtgox.com or blockchain.info. If you chose the sweep option, don't send to that bitcoin address again because you could be left without your coins. Pretty sure the files in aren't what I need, it seems that they were created at least an hour after I lost my coins. How would I sweep into mtgox or blockchain I might as well see what happens. So you uninstalled the app completely? Try restoring a full app backup if you did one with TitaniumBackup. I'm afraid you really lost the coins if you uninstalled it without doing a full app backup. Sorry No, everytime I send Bitcoins I delete the app after they're sent. Today I reinstalled the app, loaded Bitcoins, then cleaned the cache, went back in and exited. I went back in to try resetting the blockchain but that didn't work. I'm pretty sure I need to recover the cache but I wouldn't mind trying the sweep thing just in case. I'm not with MtGox though, I use Intersango. If you used the blockchain reset option wait a few hours until you is completely synced. Your bitcoins should appear if they have at least one confirm in the blockchain. The android wallet doesn't store the private keys in the OS's cache only the blockchain and transaction data.
|
|
|
Yeah, that's the one. I reset the blockchain now but the wallet ID is different. I have the wallet ID written down if that helps in some way.
It seems like something is not right indeed and one of your cleaning apps did way too much in there. As you already have rooted your phone, install root explorer and navigate your way to "/data/data/de.schildbach.wallet/files/". You should encounter some backup files that have your private keys there. Long press the first one and select "view as text" so you can view the private keys that start with a 5. You could import those keys to your existing desktop wallet or sweep them at mtgox.com or blockchain.info. If you chose the sweep option, don't send to that bitcoin address again because you could be left without your coins. Pretty sure the files in aren't what I need, it seems that they were created at least an hour after I lost my coins. How would I sweep into mtgox or blockchain I might as well see what happens. So you uninstalled the app completely? Try restoring a full app backup if you did one with TitaniumBackup. I'm afraid you really lost the coins if you uninstalled it without doing a full app backup. Sorry
|
|
|
I hope you'll manage to get your coins back.
But dude, think about it. If you're storing money on your phone WITHOUT HAVING A BACKUP, what happens if you lose your phone? If it gets stolen? If it breaks down? If its harddisk crashes? If you accidentally drop it in on a rail road track right when the intercity express passes by? Shit like that happens, you know! (and not just with phones, same goes for laptops and PCs)
By all means BACKUP YOUR WALLET. And of course make sure to back it up in some encrypted format, so nobody else who might get access to your backup can steal your money.
Everything is backed up. I never use the same wallet as I very infrequently use Bitcoins and because space is at a premium anything not used on the phone is deleted and reinstalled when needed. Pretty sure I just learnt a hard lesson. Kazimir actually bitcoin has an advantage here, it can be backed up! Imagine all of that happening to your normal wallet. I still didn't figure out how to backup up my paper bills.
|
|
|
Yeah, that's the one. I reset the blockchain now but the wallet ID is different. I have the wallet ID written down if that helps in some way.
It seems like something is not right indeed and one of your cleaning apps did way too much in there. As you already have rooted your phone, install root explorer and navigate your way to "/data/data/de.schildbach.wallet/files/". You should encounter some backup files that have your private keys there. Long press the first one and select "view as text" so you can view the private keys that start with a 5. You could import those keys to your existing desktop wallet or sweep them at mtgox.com or blockchain.info. If you chose the sweep option, don't send to that bitcoin address again because you could be left without your coins.
|
|
|
Hi everyone, I searched for forum for an answer but was not in luck. Basically I put some Bitcoins in my wallet and was then going to transfer the coins (not a lot, only 6.575) but the app was really slow and laggy so I closed it down, killed all processes and used an app cleaner to clean all the app caches. My phone is full to bursting but I find after a cache sweep I get a bit more performance. Anyway, when I opened Bitcoin Wallet all my coins were gone and so was the wallet. I'm positive that the app cleaner has something to do with it and I may have made an ultimate noob mistake but is there a way to recover the wallet data and Bitcoins? For the record I am on android 2.3.7 running cyanogen mod 7 and the app is Bitcoin Wallet.
You still have your private keys in the app dir. I assume you're using the this android wallet. Hit menu key then "Preferences (advanced)". The last option on the about page should be "Reset blockchain", hit that and then "Reset blockchain and transactions" then restart the app. It should start downloading the blockchain again and scan for your bitcoins right away.
|
|
|
Rugatu wishes to tell we're very sorry for having used the osqa "bootstrap mode" in the first days of our beta launch. Some of our users got way too much reputation without deserving it and now we got allot of complaints over the issue.
If any of you plans to start-up a community like ours in the future, try not using this mode at all.
Second. UserSupport is one of our main administration accounts and it was used wrongly for voting or posting on the forum by our team members. His opinion was sometimes biased depending on who was responsible of it at any moment. We are truly sorry about it, lesson learned and it will not happen again.
Please contact us on Rugatu with any questions you may have.
Edit:
In the first week we've been attacked by various people, or a coordinated team, who started down-voting members, posting referral links and nonsense answers or we suspect even ddos'ing our servers. Some of them got suspended for abusing the service but now, after almost two weeks have passed, they continue to attack us by posting lies and defamatory statements in the community.
We could try arguing with them but it would be a complete waste of energy and time, so we invite you to use Rugatu and convince for yourself if they are telling the truth. The beta launch wasn't perfect but we managed to handle the workload and the service is working fine now.
This ball is rolling, ¡viva el BTCitcoin!
|
|
|
the joint check your PM Edit: We got threatened by the joint in PM, regarding some users having high karma. We explained it was the first days osqa bootstrap mode at fault but he doesn't seem to be pleased with the answer and is requiring us to suspend allot of our users which we can't do.
|
|
|
Thread reopened Why are you closing threads, may I ask? Various reasons, but the most important would be a very high workload for our support team. We're truly sorry if someone wanted to ask something in a thread that was previously closed. Please use our feedback system in case you have an issue that needs urgent attention. Thanks
|
|
|
Thread reopened
|
|
|
WARNING : info.procs changed during test : 366 (was 365) WARNING : info.procs changed during test : 365 (was 366) HIDDEN Processes Found: 1 sysinfo.procs = 365 ps_count = 366 I don't know if this is a false positive or if Jynx has evolved. Gradually the Linux kernel has evolved and doing quite more complex work to modify it to those ends, so currently the most effective way to install a rootkit on a Linux system is to go towards the 'userland'
This kind of rootkits there are two types , or which change the typical binary system associated information (ps and friends) and more sophisticated rootkits inject a library in the process.
Have long existed rootkits acting that way, but had remained somewhat hidden, relatively recently has released a fully functional implementation of a rootkit capable of infecting a Linux system today, his name: Jynx
This type of rootkits act injecting a shared library (. So) in all system processes. http://7256log.blogspot.com/2011/10/analisis-de-jynx-linux-rootkit.htmlJynx Kit Userland Rootkit
Authored by ErrProne Jynx Kit is a LD_PRELOAD userland rootkit. Fully undetectable from chkrootkit and rootkithunter. Includes magic packet SSL reverse back connect shell. Solid building block for further LD_PRELOAD rootkits. http://packetstormsecurity.org/files/105893/Jynx-Kit-Userland-Rootkit.htmlAccording to your first link, the text in Spanish says: En resumen, lo que hacen este tipo de rootkits es añadir una línea en el fichero /etc/ld.so.preload apuntando hacia la librería del rootkit en la que se encuentran 're-escritas' ciertas funciones asociadas a la obtención de información del sistema. Which translates to: In summary, what these kind of rootkits do is write a new line in "/etc/ld.so.preload" pointing to the rootkit's library, in which you can find rewritten certain system info functions. So in order to "unhook" it you would have to manually edit that file and remove any strange .so libs you encounter. sudo nano /etc/ld.so.preload
|
|
|
Anybody know how much this guy is sending out? Join in and you will find out Edit: We're still giving out coins to anyone who wish to join, thanks
|
|
|
|