vapourminer
Legendary
Offline
Activity: 4732
Merit: 4739
what is this "brake pedal" you speak of?
|
 |
February 27, 2019, 01:56:07 PM |
|
* who is far more stupider? *  ooooh pick me! pick me! oh, wait..
|
|
|
|
Gyrsur
Legendary
Offline
Activity: 2856
Merit: 1520
Bitcoin Legal Tender Countries: 2 of 206
|
 |
February 27, 2019, 02:15:44 PM |
|
Hell, that is one hell of a stupid move. Why would they send private keys unencrypted anywhere? there are already some people complaining about lost funds. I don't question that this google spell check is a stupid move, but I don't understand how this should leak the private key? the google spell check is (hopefully) a https requests, which is encrypted. and google will not leak the keys for sure. so what did leak the keys? he claims that someone at Google extracted and used the passphrase after HTTPS decryption and not in between as I understand it. RecapTo recap the events for further investigation: - My first passphrase attempt was sent to googleapis.com through Coinomi wallet was on 14th February 2019
- Google’s employee or whoever has control over the data that are sent to googleapis.com processed the data that had my passphrase and that was between 14th and 19th February 2019
- My crypto assets were stolen on 19th February 2019 starting around 3:30 am UTC and the transactions continued for 15 minutes. At the end 90% of the assets were gone and remaining assets were only left because these assets were supported by Exodus wallet but NOT Coinomi wallet (what a coincidence you say!)
Please note that I took all the security precaution to keep my passphrase and wallet safe. I have a separate isolated virtual machine for it with Anti-Virus/Anti-Malware and firewall installed. I also had other wallets on the same virtual machine for years. Nothing was stolen except for the wallet which I recently used my passphrase in, which is Coinomi wallet!
|
|
|
|
vroom
Legendary
Offline
Activity: 1357
Merit: 2375
a Cray can run an endless loop in under 4 hours
|
 |
February 27, 2019, 02:20:20 PM Merited by vapourminer (1) |
|
Hell, that is one hell of a stupid move. Why would they send private keys unencrypted anywhere? there are already some people complaining about lost funds. I don't question that this google spell check is a stupid move, but I don't understand how this should leak the private key? the google spell check is (hopefully) a https requests, which is encrypted. and google will not leak the keys for sure. so what did leak the keys? he claims that someone at Google extract and used the passphrase after HTTPS decryption and not in between as I understand it. RecapTo recap the events for further investigation: - My first passphrase attempt was sent to googleapis.com through Coinomi wallet was on 14th February 2019
- Google’s employee or whoever has control over the data that are sent to googleapis.com processed the data that had my passphrase and that was between 14th and 19th February 2019
- My crypto assets were stolen on 19th February 2019 starting around 3:30 am UTC and the transactions continued for 15 minutes. At the end 90% of the assets were gone and remaining assets were only left because these assets were supported by Exodus wallet but NOT Coinomi wallet (what a coincidence you say!)
Please note that I took all the security precaution to keep my passphrase and wallet safe. I have a separate isolated virtual machine for it with Anti-Virus/Anti-Malware and firewall installed. I also had other wallets on the same virtual machine for years. Nothing was stolen except for the wallet which I recently used my passphrase in, which is Coinomi wallet! That would be a very bad publicity for google if this is true. It's also possible that the anti-virus/anti-malware software is the cause of this leak. they "open" encrypted https requests and look inside to search for possible threats.
|
|
|
|
El duderino_
Legendary
Offline
Activity: 2898
Merit: 14292
“They have no clue”
|
 |
February 27, 2019, 02:23:54 PM |
|
Good afternoon WO. After a day break I am back. I see bitcoin still floating on $3,700 to $3,900. What have I missed?
Arrie’s bday ..... Mic’s breakfast Over all not to much exciting Happy late bday Arrie Enjoy the breakfast mic. I am trying to catch up with the back logs. I enjoy hanging around WO and gambling boards LOL Who doesn’t like the WO thread 
|
|
|
|
El duderino_
Legendary
Offline
Activity: 2898
Merit: 14292
“They have no clue”
|
 |
February 27, 2019, 02:25:45 PM |
|
BNP-paribas to cut 1000 of jobs Banks and banksters 
|
|
|
|
Gyrsur
Legendary
Offline
Activity: 2856
Merit: 1520
Bitcoin Legal Tender Countries: 2 of 206
|
This would be a very bad publicity for google if this is true. It's also possible that the anti-virus/anti-malware software is the cause of this leak. they "open" encrypted https requests and look inside to search for threats.
this is absolutely right! Bitdefender is such a piece of s**t! also be aware of that in some companies the employees are observed with HTTPS proxies. you have in your Browser a intermediate certificate installed and your employer is aware of all your HTTPS traffic. EVERYTHING which you think of it's hidden.
|
|
|
|
BitcoinGirl.Club
Legendary
Offline
Activity: 3150
Merit: 2815
The voice of the community w/o a gang
|
 |
February 27, 2019, 02:42:44 PM |
|
Who doesn’t like the WO thread  r0ach? Actually it's a shitstorm. Many electrum/update hacks though. Also a red flag for me.
Cold storage wallet/paper only - no hot wallets for my savings.
I feel safe with 2/2 multiSig wallet. I use two device for each key. One device I use for daily works and another one which has the 2nd key is only for that wallet. I do not go online from that unless I need to broadcast a transaction.
|
|
|
|
xhomerx10
Legendary
Offline
Activity: 4242
Merit: 9825
|
 |
February 27, 2019, 02:45:45 PM |
|
Free willy?
Hungover today, bleargh
I have some medicine for you buddy  Last call used to be 12:30am where I lived... I am familiar with this concept.
|
|
|
|
BitcoinGirl.Club
Legendary
Offline
Activity: 3150
Merit: 2815
The voice of the community w/o a gang
|
 |
February 27, 2019, 02:50:52 PM Last edit: May 15, 2023, 01:19:10 PM by BitcoinGirl.Club |
|
"Research: Following Crypto Whales, Bitcoin Retail Investors Began To Accumulate" HODLers have also continued to keep their cryptocurrency tight, indicating that such investors see long-term success in Bitcoin’s future. They likely see a light at the end of the tunnel, if you will. A purported 97% of addresses holding either five or ten BTC, which hold 2% of all Bitcoin in circulation, have purportedly yet to issue outgoing transactions. https://www.newsbtc.com/2019/02/27/following-crypto-whales-bitcoin-retail-investors-accumulate/
|
|
|
|
vapourminer
Legendary
Offline
Activity: 4732
Merit: 4739
what is this "brake pedal" you speak of?
|
 |
February 27, 2019, 03:11:07 PM Merited by JayJuanGee (1) |
|
he claims that someone at Google extract and used the passphrase after HTTPS decryption and not in between as I understand it. RecapTo recap the events for further investigation: - My first passphrase attempt was sent to googleapis.com through Coinomi wallet was on 14th February 2019
- Google’s employee or whoever has control over the data that are sent to googleapis.com processed the data that had my passphrase and that was between 14th and 19th February 2019
- My crypto assets were stolen on 19th February 2019 starting around 3:30 am UTC and the transactions continued for 15 minutes. At the end 90% of the assets were gone and remaining assets were only left because these assets were supported by Exodus wallet but NOT Coinomi wallet (what a coincidence you say!)
Please note that I took all the security precaution to keep my passphrase and wallet safe. I have a separate isolated virtual machine for it with Anti-Virus/Anti-Malware and firewall installed. I also had other wallets on the same virtual machine for years. Nothing was stolen except for the wallet which I recently used my passphrase in, which is Coinomi wallet! [...] It's also possible that the anti-virus/anti-malware software is the cause of this leak. they "open" encrypted https requests and look inside to search for possible threats.1st thing i do with any antivirus/antimalware i install is uncheck all things like "submit samples" and such. there are usually several places and types of things AV can and wants send by default. that way it minimizes the chance a private key or anything else sensitive will be sent to the AV servers.
|
|
|
|
|
BitcoinGirl.Club
Legendary
Offline
Activity: 3150
Merit: 2815
The voice of the community w/o a gang
|
 |
February 27, 2019, 03:19:30 PM |
|
That would be a very bad publicity for google if this is true. It's also possible that the anti-virus/anti-malware software is the cause of this leak. they "open" encrypted https requests and look inside to search for possible threats.
If this is really possible then keeping sensitive information like seeds/private keys in the computer is very risky. Also this will be an extreme fraud attempt for the anti-virus company.
|
|
|
|
BitcoinGirl.Club
Legendary
Offline
Activity: 3150
Merit: 2815
The voice of the community w/o a gang
|
 |
February 27, 2019, 03:22:10 PM Merited by BobLawblaw (1) |
|
When moon?
Just a little bit more patience. The moon-rise has begun, it's just off to a very slow start. I am waiting for $5k to cross then you will see how fast these doubters will start buying bitcoins
|
|
|
|
kenzawak
|
Bitcoin Whales Have Been Acquiring Large Amounts of Cryptocurrency in Past Two Months https://www.cryptoglobe.com/latest/2019/02/bitcoin-whales-have-been-acquiring-large-amounts-of-cryptocurrency-in-past-2-months/"According to the “top 100 rich list” for cryptocurrency, compiled by Bitcoin.com, there are certain “whale wallets” that have been steadily increasing their crypto holdings - with every drop the digital asset market has experienced since December 2017. When crypto prices plummeted on February 24th, a number of whales reportedly bought large amounts of bitcoin (BTC) and bitcoin cash (BCH). ... Between December 17th, 2018 and February 25th, 2019, the four largest wallets associated with the exchanges (mentioned above) had increased their holdings by 2,879 BTC, an amount valued at approximately $10.8 million. In comparison, the remaining top 100 largest crypto addresses accumulated 151,505 BTC, which is currently valued at over $577 million according to CryptoCompare data."
|
|
|
|
d_eddie
Legendary
Offline
Activity: 2898
Merit: 4435
|
 |
February 27, 2019, 03:39:11 PM |
|
Small profits with these ups and downs. I'm flat at the moment, but I just bought a little more not to let my stash sleep too long 
|
|
|
|
Biodom
Legendary
Offline
Activity: 4158
Merit: 5092
|
 |
February 27, 2019, 03:55:49 PM |
|
Our glorious overlords apparently have not filled their bags enough yet so feel the need to push the price back downwards. I believe this trend will continue for a month or so until right before Consensus. Where miraculously bitcoin and shitcoin alike will again start to gravitate upwards towards new yearly highs.
All dramatics aside(or maybe this should read to fully embrace the drama), I think the basic problem is still the battle of forks between btc and bch and btcsv. Every time one trys to pump their coins there is an almost immediate dump to drive prices back down and vice versa.
Its really getting quite old dont you think? It is really quite striking to watch this technological wonder grow yet not have a shred of confidence in its price due to the actions of a few. Same as it ever was. #dyor
Nah. We are supposed to track sideways until October 2019. No manipulation required.  With all due respect, why are we supposed to repeat prior flat mo for mo? Every bull and bear in btc so far was different, albeit they "rhymed" in decline %. For example 2013 double pop (from $12 to $250, then sharp decline into $45, then $1160 peak) was not repeated in 2018-2019. It is reasonable to suggest that flat may last longer, but i see no "need" for it to last until October.
|
|
|
|
DaRude
Legendary
Offline
Activity: 2995
Merit: 1963
In order to dump coins one must have coins
|
 |
February 27, 2019, 03:56:55 PM |
|
Hell, that is one hell of a stupid move. Why would they send private keys unencrypted anywhere? there are already some people complaining about lost funds. I don't question that this google spell check is a stupid move, but I don't understand how this should leak the private key? the google spell check is (hopefully) a https requests, which is encrypted. and google will not leak the keys for sure. so what did leak the keys? he claims that someone at Google extract and used the passphrase after HTTPS decryption and not in between as I understand it. RecapTo recap the events for further investigation: - My first passphrase attempt was sent to googleapis.com through Coinomi wallet was on 14th February 2019
- Google’s employee or whoever has control over the data that are sent to googleapis.com processed the data that had my passphrase and that was between 14th and 19th February 2019
- My crypto assets were stolen on 19th February 2019 starting around 3:30 am UTC and the transactions continued for 15 minutes. At the end 90% of the assets were gone and remaining assets were only left because these assets were supported by Exodus wallet but NOT Coinomi wallet (what a coincidence you say!)
Please note that I took all the security precaution to keep my passphrase and wallet safe. I have a separate isolated virtual machine for it with Anti-Virus/Anti-Malware and firewall installed. I also had other wallets on the same virtual machine for years. Nothing was stolen except for the wallet which I recently used my passphrase in, which is Coinomi wallet! That would be a very bad publicity for google if this is true. It's also possible that the anti-virus/anti-malware software is the cause of this leak. they "open" encrypted https requests and look inside to search for possible threats. Since when is google a bank? Since when it's a good idea to store your private keys in a cloud? How is this a bad publicity for google and not the incompetent wallet?
|
|
|
|
vroom
Legendary
Offline
Activity: 1357
Merit: 2375
a Cray can run an endless loop in under 4 hours
|
 |
February 27, 2019, 04:01:48 PM |
|
Hell, that is one hell of a stupid move. Why would they send private keys unencrypted anywhere? there are already some people complaining about lost funds. I don't question that this google spell check is a stupid move, but I don't understand how this should leak the private key? the google spell check is (hopefully) a https requests, which is encrypted. and google will not leak the keys for sure. so what did leak the keys? he claims that someone at Google extract and used the passphrase after HTTPS decryption and not in between as I understand it. RecapTo recap the events for further investigation: - My first passphrase attempt was sent to googleapis.com through Coinomi wallet was on 14th February 2019
- Google’s employee or whoever has control over the data that are sent to googleapis.com processed the data that had my passphrase and that was between 14th and 19th February 2019
- My crypto assets were stolen on 19th February 2019 starting around 3:30 am UTC and the transactions continued for 15 minutes. At the end 90% of the assets were gone and remaining assets were only left because these assets were supported by Exodus wallet but NOT Coinomi wallet (what a coincidence you say!)
Please note that I took all the security precaution to keep my passphrase and wallet safe. I have a separate isolated virtual machine for it with Anti-Virus/Anti-Malware and firewall installed. I also had other wallets on the same virtual machine for years. Nothing was stolen except for the wallet which I recently used my passphrase in, which is Coinomi wallet! That would be a very bad publicity for google if this is true. It's also possible that the anti-virus/anti-malware software is the cause of this leak. they "open" encrypted https requests and look inside to search for possible threats. Since when is google a bank? Since when it's a good idea to store your private keys in a cloud? How is this a bad publicity for google and not the incompetent wallet? google employees have access to critical data in logfiles and databases. if they use this data and steal bitcoin from people who use google services, how is this not a bad publicity? that means they would also read your mails and make fun about your strange google searches
|
|
|
|
mindrust
Legendary
Offline
Activity: 3654
Merit: 2635
|
 |
February 27, 2019, 04:44:06 PM |
|
That would be a very bad publicity for google if this is true. It's also possible that the anti-virus/anti-malware software is the cause of this leak. they "open" encrypted https requests and look inside to search for possible threats.
If this is really possible then keeping sensitive information like seeds/private keys in the computer is very risky. Also this will be an extreme fraud attempt for the anti-virus company. I don't use any antivirus program for years and I've never got infected by a virus yet and I do use torrent. If you know what you are doing it is really hard to get a virus. ublock/adblock does most of the job for me anyway.
|
|
|
|
Gyrsur
Legendary
Offline
Activity: 2856
Merit: 1520
Bitcoin Legal Tender Countries: 2 of 206
|
 |
February 27, 2019, 04:53:35 PM |
|
there is a response from Coinomi: However, unlike what was reported: - The seed phrase wasn’t being transmitted in plain text, instead it was being encapsulated inside a HTTPS request with Google being the sole recipient
- The seed phrase wasn’t being transmitted at all unless the user chose to explicitly restore their Desktop wallets
- The spell-check requests that were sent over to Google API were not processed, cached or stored and the requests themselves returned an error (code: 400) as they were flagged as “Bad Request”¹ and weren’t processed further by Google²
But where is the money?
|
|
|
|
|