Bitcoin Forum
May 06, 2024, 06:48:55 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 8 9 [10] 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 ... 201 »
181  Economy / Games and rounds / Re: Fun, fair and transparent BTC giveaway ! ROUND #4 on: May 30, 2023, 08:15:36 AM
Username : HeRetiK
BTC addy : bc1qwvnm4g4jfjg5nr0pzu9mxdyu865f24nc0dckhv

Good luck everyone!
182  Bitcoin / Hardware wallets / Re: Ledger Recovery - Send your (encrypted) recovery phrase to 3rd parties entities on: May 25, 2023, 04:54:42 PM
Contrary to what Ledger is trying to sell, trusting a single company to "do the right thing" is not even remotely the same as having thousands of developers and hackers -- independent and contracted alike -- making sure that there's nothing fishy going on. It simply isn't.
I agree with you to some extent. However, I want to mention all those Dapps, decentralized liquidity providers, DEXs for ETH tokens and the likes that have been hacked or exit scammed numerous times in the past. Their open-source nature didn't prevent it. Nobody noticed the vulnerabilities until the money was gone. "Security experts" provided them with their seals of guarantee which proved to be useless after hackers found ways to breech the platforms. Just because there is a way to inspect a code doesn't mean those doing it put that much effort into it.

Good point!

To clarify, I'm under no delusion that open source means 100% security -- see Heartbleed affecting OpenSSL for example. I'm just saying that the level of trust required and security provided by open sourcing your code is on a wholly different level.

Dapps and DEXs are actually a great example of the limits of using the many eyes principles of open source for additional security and trustlessness: (1) The developer communities are much smaller because they are splintered across a variety of projects, (2) the incentives for using an exploit yourself rather than doing a responsible disclosure are much higher (i.e. while you could monetize a 0-day you find on a hardware wallet or cryptographic library by selling them, exploiting a smart contract nets a much higher pay day without an intermediary) and (3) those projects unfortunately often come with both a leadership and community that tend to downplay and sometimes silence valid concerns as FUD (IIRC SOL was the posterboy for that).
183  Bitcoin / Hardware wallets / Re: Ledger Recovery - Send your (encrypted) recovery phrase to 3rd parties entities on: May 24, 2023, 01:27:19 PM
Honestly I find it downright malicious that Ledger's defensive message control boils down to lying about the current state of the hardware wallet ecosystem (ie. claiming that consumers always have to trust hardware wallet manufacturers while that's decidedly not the case).
Putting aside the open-source vs closed-source war, I think the trust lies in the fact that the developers and security experts did their job properly to not mess up the code or introduce vulnerabilities that someone can exploit. That's what most people have to trust because most of us don't know how safe a code is whether we can view it publicly or not.

Trezor's open-source code means very little to me because I can't go through it and I don't understand what it does. I still have to trust Trezor and everyone that has verified the code that it's bulletproof and can't be abused. That's the trust part.    

Yes and no. Ledger is deliberately setting up a false equivalence of trust.

Yes, there's always a certain degree of trust required: If you can verify the code, you still need to trust the compiler. If you can verify the compiler, you still need to trust your CPU. If you can verify the CPU, you still need to trust the laws of physics.

But.

Contrary to what Ledger is trying to sell, trusting a single company to "do the right thing" is not even remotely the same as having thousands of developers and hackers -- independent and contracted alike -- making sure that there's nothing fishy going on. It simply isn't.
184  Bitcoin / Hardware wallets / Re: Ledger Recovery - Send your (encrypted) recovery phrase to 3rd parties entities on: May 23, 2023, 06:28:47 PM
To be honest, here 'open source' is thrown around wildly (blog posts and whitepapers are no 'source' of anything).. Grin

They are taking credit for their '+150 applications' being open source, meanwhile are not writing those themselves, right? The individual coins' developers make them, don't they?

The SDK pretty much has to be open-source if they want altcoin developers to make the accompanying Ledger app for them (for free?); so nothing to take much credit for there, either.

A whitepaper cannot be 'open / closed source' since (1) it's not a source of anything (neither software, nor hardware), (2) you don't write a whitepaper if you don't intend to publish it.

All these blogposts, little tools and whatever they want to provide are just fillers for the big void on the infographic: the firmware remains closed.
As long as that doesn't change, their ability to include backdoors doesn't change. No matter how many blogposts they publish, whether they open-source some dashboard or individual apps. We need the firmware source code; anything else is pointless.

Well said. Lots of fluff, nothing that actually changes anything. Just a continuation of bullshittery, and not a good one at that.

I mean let's look at that step for step.

Already Open Source -- Yeah, I guess congratulations for using an open source cryptography library like any sane person would? Mentioning 150+ third party applications is just obvious padding. To be fair, not all SDKs are open source, but it's a really low bar and pretty much standard unless you are aiming for a very small niche and don't care about fostering a community of developers.

In the Coming Days -- A whitepaper and a few blog posts. *slow clap* Admittedly I am curious about the whitepaper though.

In the Coming Weeks -- Providing "tools to implement your own shard backup provider" is the first (and only) thing that sounds remotely like a step in the right direction (ignoring the core of the problem that is the devices' capability to send the seed over the internet, but that ship has sailed). "Open sourcing of the dashboard which is a specific part of the OS containing Recover implementation" is practically useless and just a thinly veiled diversion. But hey, maybe they get to out source the development of a dark theme for the dashboard to the community. Win-Win.

In the Coming Months -- "Modularize even more the OS in order to keep as little as possible the part that must be trusted." That's the sort of sentence that you dictate your intern to quickly jot down as a talking point, only for them to just use it word for word in the official communication without a second thought. Either way, that part of the roadmap is the most interesting to translate:

"In the Coming Months" => "We don't plan to actually do this, but if you keep pestering us we'll eventually have to throw you guys a bone in a year or two."

"Modularize even more the OS in order to keep as little as possible the part that must be trusted." => "Refactor the code in a way that keeps the nasty bits out of sight."
185  Bitcoin / Hardware wallets / Re: Ledger Recovery - Send your (encrypted) recovery phrase to 3rd parties entities on: May 23, 2023, 01:26:18 PM
I think it's okay if Hardware Wallet firmware remains closed source, at some point I even agree with that approach because on another hand, even if certain company has an open-source firmware, how can you be sure that they are actually using the open-source code? Is it possible to verify in case of hardware wallets? Maybe I lack technical knowledge here.
Yes, you can and should.
A good hardware wallet manufacturer will actually advise and instruct its customers how to download the firmware, verify its integrity and flash it. It should also make sure to have reproducible builds; this means being able to easily check that the firmware download matches the code.
It should also be easily possible to compile it yourself, alternatively.

Honestly I find it downright malicious that Ledger's defensive message control boils down to lying about the current state of the hardware wallet ecosystem (ie. claiming that consumers always have to trust hardware wallet manufacturers while that's decidedly not the case). They are trying to normalize bad practices in terms of both security and privacy, making them the very antithesis of what one should expect from a hardware wallet company.
186  Bitcoin / Hardware wallets / Re: Ledger Recovery - Send your (encrypted) recovery phrase to 3rd parties entities on: May 23, 2023, 11:58:27 AM
Their firmware is completely closed source but as the CEO of Ledger said in that podcast, over time, they'll open more source of their code until they reach a level similar to Raspberry Pi.

"Opening more source" "over time" can mean anything and is something I'll believe when I see it. And even if they start opening more of their source code -- as long as parts of their code stays closed source there will always be insecurity.

Case in point, Ledger's software is already mostly open source, except for the firmware. And that's where the bodies were buried. So even if part of it gets open sourced, as long as some parts stay hidden, they will always have room for burying bodies. "Welcome to my basement officers, feel free to look around, just don't open the freezer, that one's off-limit."

I think it's okay if Hardware Wallet firmware remains closed source, at some point I even agree with that approach because on another hand, even if certain company has an open-source firmware, how can you be sure that they are actually using the open-source code? Is it possible to verify in case of hardware wallets? Maybe I lack technical knowledge here.

With Trezor you can download the source code and compile it yourself. Heck, if you feel especially nifty you can just go ahead and make your own Trezor clone [1]. Can't get much more trustless than that.

[1] https://www.instructables.com/Making-My-Own-Trezor-Crypto-Hardware-Wallet/
187  Bitcoin / Hardware wallets / Re: Ledger Recovery - Send your (encrypted) recovery phrase to 3rd parties entities on: May 20, 2023, 09:08:21 AM

[...]

I'm not quite sure I can agree with this conclusion. Having the firmware and applications reside on the same chip as the seed does by itself not necessarily mean that the firmware or applications can access it. You can still have an architecture where part of the flash storage is accessible (ie. for firmware updates and installing apps) and some isn't (ie. for securely storing the seed). Additionally it should also be possible to have some parts of memory be accessible by the firmware, but not by applications.

So it's highly speculative whether the other applications can in theory access the whole seed phrase as well.

However, given what we now know and the closed source nature of the code... it's also highly speculative whether the apps can't.

(but we do know that at least the firmware can access the seed phrase, if only due to them admitting to it)
The function to explicitly export the seed phrase from the monero ledger application has been around for a long time. This means that there are no fundamental restrictions for any ledger application to be able to read the seed phrase.

Looking at the script, I see nothing about it extracting and accessing the seed phrase.

For reference, these are the functions being used when converting the seed phrase directly on the hardware wallet (referred to as "Online" in the Readme):

Code:
def send_dict_chunk(dongle, p2, chunk,start,cnt):
    header = pack('>4B', 0x00, 0x28, 0x01, p2)
    data = pack('>BII', 0,start,cnt) + chunk
    apdu = header+pack('>B',len(data))+data
    print('.', end='')
    dongle.exchange(apdu)
    print('.', end='')

def get_online_seed(lang):
    if lang['english_language_name'] not in ("English", "Esperanto", "French", "Italian", "Lobjan", "Portuguese"):
        error("%s not supported online"%lang['english_language_name'])

    print("Open device...")
    dongle = getDongle(False)
 
    print("Erase old key words...")
    dongle.exchange(pack('>6B', 0x00, 0x28, 0x02, 0x00, 0x01, 0x00))

    print("Load dictionnary", end='')
    start = 0
    cnt = 0
    chunk = b''
    for w in lang['words']:
        w = w.encode('ascii')
        if 1+8+len(chunk)+1+len(w) > 254:

            send_dict_chunk(dongle, 0, chunk, start, cnt)
            start += cnt
            cnt = 0;
            chunk = b''       
        chunk += pack('>b', len(w))+w
        cnt += 1;
    send_dict_chunk(dongle,lang['prefix_length'], chunk, start, cnt)
    print()
    print("Done.")
    print("Your key words are avalaible on your device under 'Settings/Show 25 words' menu.")
    print("You can delete it at the end of keyword list.")

All these functions do, is load the Monero-specific word list onto the hardware wallet. And while I don't understand the contents of the APDU (if anyone has a reference at hand that'd be greatly appreciated, as I didn't find any and it has sparked my intrigue), I can see that there's only write operations taking place with no data being fetched from the dongle (ie. nowhere in the code the return value of dongle.exchange is being used, though in this case it's probably just result and error codes).

Keep in mind that displaying the seed phrase on the hardware wallet's display doesn't imply that the wallet application is able to access it. It can tell the dongle to display the seed phrase without having access to it itself. To some extend this even applies to the firmware, but that depends on the architecture of the device and as we've seen for Ledger that's not the case anyway (the firmware not having access to the seed phrase, that is).

Please note that I'm not saying that this proves that applications can't access the seed phrase. I'm just saying that this particular example does not access the seed phrase.


Regardless of that, I agree with your conclusion:

It is reasonable in my opinion to consider any activated ledger hardware wallet already compromised (and any security model based on a "black box" is inherently weak), in order to avoid unnecessary frustration.
188  Bitcoin / Hardware wallets / Re: Ledger Recovery - Send your (encrypted) recovery phrase to 3rd parties entities on: May 19, 2023, 07:46:28 PM
There are concerns that the recovery feature in the latest firmware has a backdoor. If there is a backdoor, it's already a problem, what if Ledger instead adds this feature to all of its hardware wallet products.
Within the sea of comments in the Reddit post shared by NotATether, both the co-founders (/u/murzika[1] and /u/btchip[2]) say that the reason this feature won't reach Nano S is due to memory limits:
Quote from: /u/murzika
I don't have the details, but I think it's related to the SE chip not enough memory to store the new firmware (this will require a confirmation as I'm not sure).
Quote from: /u/btchip
The firmware is the OS, so you need to be using one (same thing on your computer). We just won't port the Recover functionality to the SE because there isn't enough space to put it there.

That's good, as there apparently really is a technical limitation that prevents the Nano S to be affected by this update.

That's bad, as this confirms that the only thing preventing someone from writing barebones seed extracting firmware is security by obscurity (ie. fact that parts of the code are closed source).


Quote from: u/murzika
If you are a Recover user and have your shard into safeguarded by third parties, then yes, a government could subpoeana them and get access to your funds.

Using Recover gives you an easy recovery option and mitigates backup loss, but your assets could get frozen by the government (in theory, I'm not a lawyer and I didn't see any legal opinon on the subject).

2 sats say that they only admit that now, so that once this case inevitably happens they can say "hey we've always said this could happen, look at how honest and trustworthy we are!"


It seems like the MCU does nothing but connect the screen/buttons to the secure elements, and the applications are actually installed ON the secure element itself where the firmware resids.

This means the claim that " you will have to physically press a button to sign a transaction" which they have always promoted is also a lie.

It's also mentioned on their website

Quote
In order to accomplish this, we attached an additional STM32 microcontroller (the MCU) to the Secure Element (the SE) which acts as a “dumb router” between the Secure Element and the peripherals. The microcontroller doesn’t perform any application logic and it doesn’t store any of the cryptographic secrets used by BOLOS, it simply manages the peripherals and notifies the Secure Element whenever new data is ready to be received. BOLOS applications are executed entirely on the Secure Element. In this section, we’ll take a look at the hardware architecture to better embrace the hardware related constraints before analyzing their software implications.

So this means, funds were always "movable" without having to physically initiate an order from buttons that control only the MCU, so not only the firmware had access to the private keys, even the various applications including all of those shitcoins applications that were available to download from Ledger had access to your funds, so for all we know, you could install a shitcoin application on the secure element, which could have access to your BTC private keys or the whole seed phrase.

I'm not quite sure I can agree with this conclusion. Having the firmware and applications reside on the same chip as the seed does by itself not necessarily mean that the firmware or applications can access it. You can still have an architecture where part of the flash storage is accessible (ie. for firmware updates and installing apps) and some isn't (ie. for securely storing the seed). Additionally it should also be possible to have some parts of memory be accessible by the firmware, but not by applications.

So it's highly speculative whether the other applications can in theory access the whole seed phrase as well.

However, given what we now know and the closed source nature of the code... it's also highly speculative whether the apps can't.

(but we do know that at least the firmware can access the seed phrase, if only due to them admitting to it)
189  Bitcoin / Hardware wallets / Re: Ledger Recovery - Send your (encrypted) recovery phrase to 3rd parties entities on: May 19, 2023, 12:18:23 PM
Even the co-founder and former CEO of ledger says this is a disaster (but but *everything will be fine, as long as you trust Ledger   Roll Eyes)

https://www.reddit.com/r/CryptoCurrency/comments/13ldgcl/my_personal_view_on_the_pr_disaster_from_a_ledger/

Thing is, he's not wrong. We should have never trusted Ledger to begin with. We, as a community, have failed, to properly communicate the technical implications of some elements of the code being closed source to those that are less tech savvy. We accepted a compromise out of convenience and now look at where it got us.

Also I have to cringe at how in his eyes (and apparently many other folks too) the "here are the facts" thread he's linked is making things better. Their main arguments being (1) you didn't seem to mind when you weren't aware of the problem and (2) other hardware wallets have problems too. Fuck me. And to top it all off, the gall to try to spin this as a communication problem rather than a technical one. Fuck.
190  Bitcoin / Hardware wallets / Re: Ledger Recovery - Send your (encrypted) recovery phrase to 3rd parties entities on: May 18, 2023, 12:13:28 PM
From my understanding of Trezor's architecture the private key never leaves the chip -- the firmware is only able to send messages in and getting signed messages out.
Which is exactly what Ledger said about their secure element. At the end of the day, the hardware, software, and all the architecture is designed and built by a single entity, and if they wanted to extract your private keys, they could. If Trezor's microcontroller was actually impervious to such attacks, then why are they trying to build their own secure element?

Ledger is partially closed source, so there's always been a black box surrounding their "secure element". Accordingly security researchers were somewhat limited in their research.

Trezor on the other hand is completely open source, from top to bottom, from hardware to software. Accordingly security researches have been able to take it apart completely. Theoretically you can even build one yourself! And while they did find vulnerabilities that enabled the extraction of private keys with physical access, none of these where as simple as just adding custom firmware to the device. Which is something that for Trezor hardware would be fairly trivial, given the open nature of the device. Heck, there's even a guide by Trezor themselves on how to flash your device with custom firmware within their GUI: https://trezor.io/learn/a/downgrade-firmware-trezor-model-one

If extracting the seed from a Trezor were as simple as a malicious firmware update I'm fairly certain we'd know at that point. Otherwise researchers wouldn't have to rely on side channel attacks [1] or forcing RAM dumps by physically glitching the hardware [2][3]. [2] also briefly touches on why the seed itself can't be accessed by custom firmware at around the 38:45 mark.
(afaik [2] is still a threat, but [1] has been fixed before public disclosure and [3] seems to have been mitigated by increasing PIN length [4])

[1] https://jochen-hoenicke.de/crypto/trezor-power-analysis/
[2] https://av.tib.eu/media/39203
[3] https://cointelegraph.com/news/trezor-wallets-can-be-hacked-kraken-reveals
[4] https://www.reddit.com/r/Bitcoin/comments/sdx4r6/psa_trezor_doesnt_have_the_oftmentioned_seed/

TL;DR: Trezor we can verify, Ledger we have to trust. And what a misplacement of trust that has been.
191  Bitcoin / Hardware wallets / Re: Ledger Recovery - Send your (encrypted) recovery phrase to 3rd parties entities on: May 18, 2023, 09:10:52 AM
[...]

The way that Ledger is partially closed source always left a sour taste in my mouth but I had given them the benefit of the doubt by virtue of being one of the oldest hardware wallet vendors around.

Alas, thank you Ledger for reminding me that giving someone the benefit of the doubt is never a good idea in the crypto space.


Right. But approve what?
Does the person have to repeat the passphrase in order to be registered in this "recovery program"? Or is it just a mere question, which person answers "yes"?

Does it in fact matter for those ones who will never approve that shit?

Or you are bothering of those pinks who are going to fall for the bait?

Repeating the passphrase, while stupid, would at least have implied that the seed isn't extracted from the "secure element".

However the Tweets referenced by RickDeckard point towards the firmware being able to extract the seed directly. In that case "requiring" the user to press "yes" doesn't matter. It's just security theater. There's nothing stopping the firmware from extracting and sending the seed without user interaction.


It's probably worth pointing out that this is also the case for Trezor devices, which everyone on Reddit seems to be keen to move to. If Trezor implement malicious software, then the same thing will happen. The only hardware wallet I would even think about touching right now is a Passport - permanently airgapped and completely open source - but as I said before, airgapped, encrypted, cold storage on an old laptop or similar is far preferable.

Source? From my understanding of Trezor's architecture the private key never leaves the chip -- the firmware is only able to send messages in and getting signed messages out. Which is also why all key extraction attacks (that I'm aware of) have to rely on side channel and glitching attacks rather than simply flashing the Trezor with malicious firmware (which anyone could, since unlike Ledger, everything single component of Trezor is open source).
192  Bitcoin / Hardware wallets / Re: Ledger Recovery - Send your (encrypted) recovery phrase to 3rd parties entities on: May 17, 2023, 04:11:03 PM
We are also discussing the Ledger issue in the German board and found a tweet claiming that the Nano Ledger S may not be affected because the device is too old for the the current Ledger Recover firmware update?

Regardless of the fact that you should still look for another hardware wallet company, can anyone with a more technical background comment on whether this information is correct?
I'm not a technical fan, but is this thought true?
If the Nano S can "dodge" the 2.2.1 update. then it may be able to dodge another update later, then it will eventually be devices with outdated systems that are increasingly vulnerable while at any later higher update it won't exclude all the new features of 2.2.1.

It's anyone's guess since part of their code is closed source, but it might very well be that this backdoor can't be integrated into the Nano Ledger S for whatever reason -- why else would they want to miss out on that sweet sweet subscription money? On the other hand they might also just want to entice people to upgrade to their latest hardware wallets, because obviously everyone (and their moms, as we have learned) wants this feature.

Either way, at that point the 2.2.1 update is the vulnerability. If you can live without the GUI features even outdated hardware wallets can stay secure for a very long time (with few exceptions that involve physical access).
193  Bitcoin / Hardware wallets / Re: Ledger Recovery - Send your (encrypted) recovery phrase to 3rd parties entities on: May 17, 2023, 10:21:07 AM
Allegedly, and the fact that they have made it very clear everywhere, the Nano S model will be the only one that will not have that back door.
But how now are we to know? Doubts were left in the air, there is not much way to remedy it.

On the other hand it's unlikely that the backdoor has been there before because otherwise the hackers would have stolen the wallet seeds alongside the customer data way back when  Cool

You don't need to open source the firmware if you just open source the costumer data! *taps forehead*


What happened with Trezor? I remember a seed extraction hack from a couple years back, but that one still required physical access which makes it not even nearly as bad as what Ledger is doing.
That, and their partnership with Wasabi and blockchain analysis firms, resulting in government sanctioned surveillance and censorship.

Interesting, I wasn't aware of the censorship controversy around Wasabi. Thanks for bringing this to my attention.

(Still, in my book not even remotely as bad as what Ledger is doing for 2 reasons: (1) I primarily expect security from a hardware wallet, with privacy being a nice-to-have, but I don't mind falling back on other options for that, (2) using transactions with questionable privacy is still optional while having a backdoor is not. But I'll leave it at that, for fear of straying off-topic. I definitely see your point regarding SatoshiLabs' company policy though.)

194  Bitcoin / Hardware wallets / Re: Ledger Recovery - Send your (encrypted) recovery phrase to 3rd parties entities on: May 17, 2023, 09:53:53 AM
This is so wrong on so many levels and I just can't wrap my head around it. I just hope the market will punish Ledger accordingly, but I don't have much faith.

All the more important to keep calling this for what it is: A backdoor. Not an option. A backdoor. Your only option is to pay for the privilege of accessing the backdoor as well.


Remember when Trezor and Ledger were the two best hardware wallets out there, and every thread had people (me included!) recommending either/both of them. How the mighty have fallen! Both are complete and utter trash now, completely ruined by awful decisions such as this one. Seriously, do the management teams behind both wallets understand nothing about bitcoin?

What happened with Trezor? I remember a seed extraction hack from a couple years back, but that one still required physical access which makes it not even nearly as bad as what Ledger is doing.


Ledger have just admitted that their entire design is deeply flawed.

Reminds me a bit of that scene in The Big Short:

"I don't get it. Why are they confessing?"
"They're not confessing. They're bragging."


what i also wonder is what happens to the Legder sticks that don't go through this update - can they continue to be used without problems?

Probably. But you can't ever be sure that this backdoor hasn't been there all along, as pointed out by others upthread.
195  Local / Deutsch (German) / Re: Besuch von der Kripo: Geldwäschevorwurf Fidor+bitcoin.de | Update: und nochmal!! on: May 05, 2023, 05:23:08 PM
Vielleicht will man damit einfach keinen Aufwand mehr betreiben wenn der Laden eh dicht macht, oder es läuft alles schon nach abweichenden internen Kriterien der Muttergesellschaft, keine Ahnung.

Kann auch sein. Wenn z.B. deren Compliance Abteilung mittlerweile zurecht gestutzt wurde, ist es einfacher Konten zu sperren als den ganzen Dokumentationsaufwand zu betreiben der mittlerweile gefordert wird. Fragwürdig ist nur wieso sie dir das Konto gesperrt, und nicht einfach gekündigt haben. Um compliant zu bleiben hätte Letzteres eigentlich auch reichen müssen.

(außer natürlich die Fidor kann nicht alle Konten so schnell kündigen wie sie gerne möchte, weil sie das Kapital noch braucht... ein Schelm, der Böses denkt)


Jedenfalls weiß man da gleich wieder wieso man Bitcoiner ist (u.a.).

Catch-22 des Bitcoiner Daseins: Je mehr man als Bitcoiner mit Banken zu tun hat, desto mehr erinnern die Banken einen daran wieso man zum Bitcoiner geworden ist.
196  Local / Deutsch (German) / Re: Besuch von der Kripo: Geldwäschevorwurf Fidor+bitcoin.de | Update: und nochmal!! on: May 04, 2023, 10:48:43 PM
Wer jetzt noch Geld bei der Fidor Bank hat, sollte das möglichst schnell transferieren. Wenn es Fidor nicht mehr gibt, kann die BaFin nicht viel retten.

Ganz so ist es auch nicht, dafür gibt's ja die Einlagensicherung. (wobei sich wer mehr als 100k bei einer Bank hat auch unabhängig von Fidor Gedanken über Risikomanagement machen sollte)

Und wenn die Fidor das Konto nicht nur sperrt, sondern auch schließt (z.B. weil sie den Laden endgültig dicht machen), dann kommt das Geld auf ein Treuhandkonto*. Das Geld aus dem Treuhandkonto dann rauszubekommen ist allerdings wieder ein eigener Kreuzweg, insofern macht es auf alle Fälle Sinn die Sache eher früher als später zu klären.

*Angaben ohne Gewähr, sind nur Infos die ich als Laie mal zu ähnlichen Fällen rausgefunden habe
197  Local / Deutsch (German) / Re: Besuch von der Kripo: Geldwäschevorwurf Fidor+bitcoin.de | Update: und nochmal!! on: May 04, 2023, 10:03:47 PM
Weis jemand was genaueres zur Nachweispflicht? Soweit ich weis bezieht sich das doch vor allem auf Nachweise gegenüber der Bank bei Bareinzahlungen etc., aber falls man tatsächlich ein Ermittlungsverfahren an den Hals bekommt dann liegt die Beweislast doch bei den Ermittlungsbehörden?

Die Nachweispflicht bzw. Auskunft über Mittelherkunft kann sämtliche Einzahlungen betreffen die irgendwie "auffällig" sind. Das kann einem selbst bei privat an privat passieren, zumindest wenn es sich um größere Summen handelt. Allerdings fragen Banken sowas in der Regel an bevor sie das Konto sperren, um abzuwägen ob sie das Konto überhaupt sperren müssen bzw. das Geschäftsverhältnis auflösen sollten. Dementsprechend klingt das was dir da passiert ist in der Tat sehr komisch. Vielleicht versucht Fidor einen richtig harten Cut von Crypto zu machen oder es laufen gerade irgendwelche Ermittlungen die alle Kraken/Fidor Kunden unter Generalverdacht stellen.

Viel Erfolg auf alle Fälle!
198  Local / Trading und Spekulation / Re: Bitcoin vs. Alts 2023 on: April 30, 2023, 09:04:58 AM
Danke für die Auswertung 1miau! Ziemlich krass wie Kaspa derzeit unser Portfolio trägt, bin sehr gespannt wie sich der Coin im weiteren Verlauf des Jahres entwickelt.
199  Economy / Games and rounds / Re: Bitcasino.io 🖤 Bitcoin Predictor (April) is back with a twist! on: April 23, 2023, 10:42:45 AM
EUR 24545,-

Username: heretik2
200  Bitcoin / Development & Technical Discussion / Re: replacement for pow on: April 21, 2023, 06:37:54 AM
I'm saying that a cryptocurrency doesn't need to be permissionless to be decentralized. we can build a web of trust concept.

Permissionlessness is exactly the point though. Decentralization is only a means to an end.

Simply put, Bitcoin is not permissionless so that it can be decentralized. Bitcoin is decentralized because that's the only way for it to be permissionless.

Decentralization is the easy part, it's permissionlessness that's the tricky one.
Pages: « 1 2 3 4 5 6 7 8 9 [10] 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 ... 201 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!