Bitcoin Forum
August 15, 2022, 06:43:09 PM *
News: Latest Bitcoin Core release: 23.0 [Torrent]
  Home Help Search Login Register More  
  Show Posts
Pages: [1] 2 3 4 5 6 7 »
1  Other / Meta / Re: Why doesn't bitcointalk have an SPF or DKIM? on: April 28, 2021, 08:59:41 AM
It means you can more accurately trust messages as coming from bitcointalk.
Meaning, you don't need to be afraid of phishing, if SPF or DKIM comes through, you know the message is genuine.
2  Other / Meta / Why doesn't bitcointalk have an SPF or DKIM? on: April 28, 2021, 04:33:33 AM
Why doesn't bitcointalk have an SPF or DKIM?

Theres no TXT records at all for (mail is sent from

root@sebastian-desktop:/var/www# dig TXT

; <<>> DiG 9.16.1-Ubuntu <<>> TXT
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 35392
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

; EDNS: version: 0, flags:; udp: 4096
;         IN      TXT

;; AUTHORITY SECTION:        3600    IN      SOA 2036516717 10000 2400 604800 3600

;; Query time: 35 msec
;; WHEN: ons apr 28 06:35:06 CEST 2021
;; MSG SIZE  rcvd: 111


The main domain ( do have a SPF, but for it to be applied to omail, it has to be copied over to, OR have a wildcard (* IN TXT 300 "v=spf1 ip4: -all")
3  Other / Beginners & Help / Trying to understand how fee works... But its kinda weird. on: April 27, 2021, 01:06:30 PM
I made this transaction:
662f7e90b1e3d6f55c06388c07b62e15c6ab672c936372b64e8748c22d3923fb (game purchase on indiegala)

And it had a really hard time getting into a block even tough paying like 0.0004 in fee. Sites listed it like miners didn't want this transaction.

Then I did this transaction:
f3cb81d3a01f03b4e3b473fd3d264d0661d31f9081ca8ec6c544fee08b4ef853 (purchase of 100€ Steam gift card on bitrefill)

and this time, even when paying LESS in fee - 0.00032649 - it got pretty quick into a block and some sites listed it as a preferable transaction for miners.

What causes this?
It seems that 1000 satoshis / kB is the standard, but miners aren't following that what I understand, because the fee's I paid on both transactions were pretty high, and still the first block had trouble getting across.

How do miners calculate which fee to "require"?
4  Other / Meta / Re: Please ban this IP: (IP is hacking bitcointalk accounts) on: July 28, 2018, 10:35:49 AM
the .msg file is a exact Verbatim copy of the email I received from the BitCoinTalk software alerting me about the changed password.
Many antiviruses block .msg due to it can carry viruses, but this file is as safe to open as any email from

You need Outlook to open .msg
5  Other / Meta / Please ban this IP: (IP is hacking bitcointalk accounts) on: July 28, 2018, 09:53:04 AM
Apparently this IP is going around and hacking BitCoinTalk accounts by bruteforcing/hacking/guessing the password:

Have got some weird Ubex advertisment everytime I log in now...

Here is an copy of the email:
6  Bitcoin / Development & Technical Discussion / Re: txfee based on diffculty? on: December 22, 2017, 11:29:07 PM
>>Fees will always be based on an open market.
>>Txfee isn't defined by the network.

What I have understand, is that txfee is something that is defined in bitcoin-core client (1000 satoshi per kB), but clients can choose a lower or higher txfee. But it isn't defined by network.

My idea is thus to change this definition in bitcoin-core to be based on difficulty instead. (new clients may then follow)
Then miners will be forced to accept transactions using these new fee's as theres no other transactions to choose from.

>>The target of a block is very heavily dependent on luck
Yes I know.

>>What do you mean by new and old blocks?
I meant with "old block" I mean mining blocks based on tx's that are from Before a specific difficulty change, and "new block" with mining blocks based on tx's that are after a specific difficulty change.
Since the blocks Before a difficulty rise, will have higher fee's, it will be more favorable for miners to then choose to mine blocks that are based on old transactions, while if theres a difficulty drop, then it will be more favorable to mine "new" transactions (thus becoming a "new block")

I know that im using the "wrong terminology" here but its easier to explain that way.

>>Not really, though it is unreasonable. There are more factors affecting the price of Bitcoin than that.

Are you really sure? Since the txfee is basically pinned to the size of transaction, it means it won't follow the market when value of bitcoin rises (compared to fiat). That causes the market to saturate when the txfee becomes so high so its unfavorable to invest in bitcoin due to the "spread" caused by the txfee. When market is fully saturated, it causes the value to drop because nobody is buying and nobody is selling due to the txfee's.

"Value" of something (Money, goods etc) is just the definition of the relation between demand and supply. If demand is low and supply is high, the thing is worthless, if demand is high and supply is low, the value increases.

>>Fees are more than just a tool to prevent spam, blockchain space is a very scarce resource

I know that block space are a very scarce resource, but still, if the requested txfee (that the client request per default) did follow the market price, I don't Think miners would have anything against it, because they would still get as much Money (in fiat) in transaction fee's.
7  Bitcoin / Development & Technical Discussion / txfee based on diffculty? on: December 22, 2017, 08:13:10 AM
As you might know, the surge and drop of bitcoin in the latest Days, and the volatility, is mainly because the txfee. Its just not resonable to pay like 20 USD to send a bitcoin transaction just because the value is so high.

txfee is a tool mostly to prevent malicious users from inserting garbage in the blockchain, thus you could have a txfee that stays roughtly constant (in value) over time, regardless of the value of the bitcoin.

Since the value is loosely pinned to the difficulty (higher difficulty = higher value), what about a txfee that is based on the inverse of difficulty?
Basically, a required txfee that is based on the inverse of the highest difficulty observed the latest 6 blocks, and clients will use a txfee that is calculated based on the inverse of the lowest of these 6 blocks.
This will gurantee that the txfee used in a transaction is always higher than required, and that the txfee follows the value (txfee drops when value become higher).

This also gives a opportunity to mine old blocks when value are rising (as old txfee's are more valueable as they are higher), and mine new blocks when value is dropping (as these have higher txfee)
8  Other / Meta / Re: Messages delivered wrong? on: October 18, 2017, 01:38:05 PM
Here it is (have censored the content):

9  Other / Meta / Re: Messages delivered wrong? on: October 16, 2017, 09:03:14 AM
The thing is that the PM says "To: litecoinstake" on the information, not in the body of the PM. So somewhere the software has done wrong, either in displaying the correct receiver, or in delivering the message.
10  Other / Meta / Messages delivered wrong? on: October 16, 2017, 02:36:04 AM
I just got a message in my inbox, that was supposedly meant for a user called "litecoinstake", from "ssetian007".
What happened here? Why did that message end up in my inbox?
11  Bitcoin / Development & Technical Discussion / Bitcoin and the Ransomware problem? on: November 30, 2016, 02:11:00 AM
What can be done to the ransomware problem?
I think Bitcoin is the seed that grown into the ransomware problem. What can be done to protect users?

My tought was some sort of list of "dishonest" adresses, like what have been discussed with stolen money, but that would not work in this case due to the possibility to create one adress per victim, as opposed to bitcoin theft where there is a few adresses involved where the money was stolen from (the victim).

Any ideas how bitcoin could be adapted to make it "toxic" to ransomware authors, while not burning legit users?

My second tought was some "Vote To Refund" scheme, applying to any transaction, but the problem would be that people could spread false screenshots of ransomware just to get free services/products.
Go brainstorm about ideas on how to prevent ransomware on bitcoin's end.
12  Bitcoin / Development & Technical Discussion / Re: Is it possible to generate public keys using public info and other public info? on: August 23, 2015, 07:53:02 PM
On this page:

What does "modified base Point" mean? Anyone that have the exact mathematics involved?
13  Bitcoin / Development & Technical Discussion / Is it possible to generate public keys using public info and other public info? on: August 23, 2015, 07:23:31 PM
Imagine this:
I have a EC keypar Ks and Kp. (secret and public).

Now I have a system with access card for customers. I want them to be able to refill the cards. Each card contains a number, lets say "1013853254", which is denoted "n".

By publishing Kp, a customer should be able to combine Kp and n, in such a way he gains a public key Kp(1013853254).
If a customer sends Money to the associated adress of this public key Kp(1013853254), then the funds
should be spendable by combining Ks with n in such a way I gain Ks(1013853254).

How is this possible with lets say EC primitives?
14  Bitcoin / Development & Technical Discussion / Re: How will XT be good with regards to the packet frame? on: August 23, 2015, 06:12:40 PM
whoops. Did a calculation error when calculating on this.

Was there a specific reason for the 1MB limit?
15  Bitcoin / Development & Technical Discussion / How will XT be good with regards to the packet frame? on: August 23, 2015, 05:55:10 PM
I read about this XT addition, and wonder: Is it really a good idea?

A normal Ethernet frame do have a MTU of 1526, and with headers and other overhead, the resulting frame will be roughtly 1500 bytes large. Subtracting the IP header from this, which is normally 20 bytes, but lets be harsh and overdo a Little bit, and substract 30 bytes. Then we have 1470 bytes left.
Now lets add 1 MB of transactions: 446 bytes.
Also add the block header and block hashes and signatures, and you will scrape off a bit of that too.

Imagine then sandwiching this in a VPN or anything, and you understand why XT is a bad idea because a block will no longer fit into a single packet, and the packet needs to be fragmented.

Wouldn't it better to hardfork the chain to have a faster bliock distribution rate, lets say instead of 10 minutes you hash a block each minute. Then you get the same increased transaction capacity, but with still each block fitting into a single packet. I dont Think there is a risk of softfork due to a netsplit because I have never Heard about a link that takes more than 1 minute to distribute a packet.
16  Other / Meta / Re: Received email from account NOT associated with bitcointalk on: May 26, 2015, 07:11:02 AM
Could be suspicious.
It comes from:

which have a reverse of:

However, noticed that does resove to too.
This could mean that the attacker still have Control of the server (?)

Perhaps he installed a backdoor... And he want everyone to change passwords, so they Think they're safe now, but he simply capture the new passwords.
17  Other / Meta / Re: Received email from account NOT associated with bitcointalk on: May 26, 2015, 06:53:35 AM
I got it too.
Contains some invalid PGP sig... And is sent from a server that apparently does not have any Connection with bitcointalk (?)
18  Other / Meta / Is this mail from legit? on: May 26, 2015, 01:28:40 AM
Is this mail legit?
It has no DKIM signature, a invalid PGP signature and a valid SPF signature.

The host I received it from, does not seem to be asscoiated with bitcointalk either:

C:\Users\Sebastian>nslookup -type=PTR
Address:  2001:470:28:1c:1::1

Icke-auktoritärt svar:     name =

Checking the SPF:
C:\Users\Sebastian>nslookup -type=TXT
Address:  2001:470:28:1c:1::1

Icke-auktoritärt svar: text =
        "v=spf1 mx a -all"
WEEEEEEEEEEW..... Allowing all hosts in the amazon Simple Email Services seems to be a Little bit overly permissible. I don't know if they have any safeguards against fraudulent mail...

Return-Path: <>
X-Original-To: <hidden>
Delivered-To: <hidden>
Received: from server-desktop (localhost [])
   by (Postfix) with ESMTP id 12FFF4C0291
   for <hidden>; Mon, 25 May 2015 22:23:27 +0200 (CEST)
Subject: Bitcoin Forum: Password change required [Invalid signature]
X-AntiPhishing-IP: [BEGIN][][END]
Authentication-Results: unknown-host; dkim=none reason="no signature";
   dkim-adsp=none (unprotected policy); dkim-atps=neutral
Received: from ( [])
   by (Postfix) with ESMTP id F0F814C0291
   for <hidden>; Mon, 25 May 2015 22:23:25 +0200 (CEST)
Received: by (Postfix, from userid 0)
   id AE9AACF1439; Mon, 25 May 2015 20:19:46 +0000 (GMT)
Date: Mon, 25 May 2015 20:19:46 +0000
To: <hidden>
Message-ID: <>
User-Agent: Heirloom mailx 12.5 7/5/10
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
X-Djigzo-Info-PGP-Encoding: PGP/INLINE
X-Djigzo-Info-PGP-Signer-KeyID: C6555693DAB591E7
X-Djigzo-Info-PGP-Signature-Valid: False
X-Djigzo-Info-PGP-Signature-Failure: Signer's key with key ID C6555693DAB591E7
 not found.
X-SPF-Signature: pass ( is authorized to use '' in 'mfrom' identity (mechanism 'a' matched)) receiver=server-desktop; identity=mailfrom; envelope-from=""; client-ip=

You are receiving this message because your email address is associated
with an account on I regret to have to inform you that
some information about your account was obtained by an attacker who
successfully compromised the server. The following
information about your account was likely leaked:
 - Email address
 - Password hash
 - Last-used IP address and registration IP address
 - Secret question and a basic (not brute-force-resistant) hash of your
 secret answer
 - Various settings

You should immediately change your forum password and delete or change
your secret question. To do this, log into the forum, click "profile",
and then go to "account related settings".

If you used the same password on as on other sites, then
you should also immediately change your password on those other sites.
Also, if you had a secret question set, then you should assume that the
attacker now knows the answer to your secret question.

Your password was salted and hashed using sha256crypt with 7500 rounds.
This will slow down anyone trying to recover your password, but it will
not completely prevent it unless your password was extremely strong.

While nothing can ever be ruled out in these sorts of situations, I do
not believe that the attacker was able to collect any forum personal

I apologize for the inconvenience and for any trouble that this may cause.

19  Bitcoin / Development & Technical Discussion / IDEA: Using U2F tokens as secure wallets on: November 23, 2014, 09:18:31 AM
I looked at the U2F specification, and found out that its using secp256r1 EC as their inner cryptography.
I dont know if this is compatible for bitcoin, but I actually got a idea:

Since U2F tokens work in Three different ways:
1: Either storing a EC private key onboard, exporting a public key, and a key identifier.
2: Or, creating a EC private key onboard, wrapping it with a device-specific key, and exports the public key, and encrypted private key.
3: Or, using a nonce to create a EC private key onboard, using a MAC with a device-specific key, and then exporting the public key and the nonce.

After this, authentication is done by signing a challenge along with other parameters, with the EC private key.

Even if theres lots of "useless" parameters inside the signed response, I got a idea, where you carefully create a transaction such as you can extract a "challenge" out of this, send it to the U2F token, and what you get back, is a completely signed transaction that you can transmit to the blockchain.
This MIGHT include generating special adresses using "Vanitygen", (that ends in like touch=1 or such) or actually wasting small amounts of Money (that is destroyed) to send these coins to invalid adresses, but so it match the response format of a U2F token.

To register U2F keys to the bitcoin network, it could be contructed by sending the data returned by the U2F token, in a transaction to be embedded in the blockchain. This would also waste Money, but by sending a minimum transaction, it would only be a couple of cents. A U2F-bitcoin-client then only needs to download the blockchain to be able to recover the wallet.
Since U2F keys are effectively Anonymous, you would need a way to identify which wallet is "yours".

This could be done by simply you provide a public "username" string, that you use along with the U2F key to load your wallet. The wallet would simply be embedded in the blockchain.

Abuse (for example spamming U2F registrations with identical usernames as other users, which means a U2F-bitcoin client has to try them all) is prevented simply because you have to waste Money to register a U2F key. Also by making U2F registrations indistingushable from normal transactions (for example by hashing the username), it would be hard for abusers to find these transactions.

This would mean you could get secure key storage for bitcoin for just about 20$.

If anyone would want to experiment with U2F tokens and bitcoin, here is a token:

Any toughts?
20  Bitcoin / Bitcoin Discussion / Re: Bitcoin Core (Bitcoin-Qt) 0.9.1 released - update required on: April 09, 2014, 05:50:10 AM
Can really the CLIENT KEYs be compromised by this bug?

What I have understand, its a bug in the OpenSSL Implementation of Heartbeat protocol of TLS 1.2, causing OpenSSL to leak contents of RAM in the server.
This means, the attack vector would be limited to:
impersonating a server and replacing a bitcoin adress in the payment protocol, by stealing the SERVER KEYs.

Thus any client-side wallets should be safe since those private keys are never transmitted or kept by the server? (except for webshops and online services running a server-side bitcoin client relying on a vulnerable OpenSSL)

The bitcoin core protocol (port 8333) is not using any form of SSL at all what I know?

If what the Bitcoin devs say is correct (that client keys can be compromised), would also mean that any website using SSL can steal RAM contents of client computers, which would mean my site can get my visitor's bank details, and that would make the security hole way more critical than it is today.
Pages: [1] 2 3 4 5 6 7 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!