Bitcoin Forum
August 15, 2018, 03:39:37 AM *
News: Latest stable version of Bitcoin Core: 0.16.2  [Torrent].
 
   Home   Help Search Donate Login Register  
Pages: [1]
  Print  
Author Topic: How to use the 'Revealer' plugin in Electrum 3.1?  (Read 77 times)
xdrpx
Hero Member
*****
Offline Offline

Activity: 616
Merit: 582


View Profile
March 07, 2018, 05:24:17 PM
 #1

Hi All,

It's the first time I came accross the 'Revealer' plugin and I couldn't find a documentation about it and how exactly does it allow me to create an "Analog multi-factor backup" of my seed. Is anyone aware on how this functionality works and what it does to help store my seed as I can't seem to understand what an analog multi-factor backup means.





And on visiting https://revealer.info (with and without the https) it doesn't seem to load the page. Maybe their page is down at the moment?

Also when I click on "Calibrate" and then click on "Print Calibration pdf" it leads me to an Electrum error - (Could someone try this out and let me know if they face the same issue?)



Thank you for your time.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
HCP
Hero Member
*****
Offline Offline

Activity: 686
Merit: 902

<insert witty quote here>


View Profile
March 08, 2018, 05:53:05 AM
 #2

Where did you get your download for Electrum 3.1 from?

I do not have this plugin in my Electrum 3.1 install... and I can't find reference to it in the Electrum source code... the only results of my Google searching for "revealer" return results about a keylogger! Shocked Shocked

I suggest you check your browser history and make sure you downloaded your version of 3.1 from the official site (https://electrum.org/#download) and that you have also checked the digital signature of the downloaded installer using GPG!

xdrpx
Hero Member
*****
Offline Offline

Activity: 616
Merit: 582


View Profile
March 08, 2018, 02:16:22 PM
Merited by pooya87 (1), TryNinja (1)
 #3

Hi HCP,

Thanks for your response. I managed to do the background checks like you've asked and all the background checks turned out fine.

The browser history turns out good:

It shows I visited https://download.electrum.org/3.1.0/Electrum-3.1.0.tar.gz and also downloaded the .asc file similarly.

GPG verification output came out good:

Code:
gpg --verify Electrum-3.1.0.tar.gz.asc Electrum-3.1.0.tar.gz
gpg: Signature made Monday 05 March 2018 09:20:02 PM IST
gpg:                using RSA key 2BD5824B7F9470E6
gpg: Good signature from "Thomas Voegtlin (https://electrum.org) <thomasv@electrum.org>" [ultimate]
gpg:                 aka "ThomasV <thomasv1@gmx.de>" [ultimate]
gpg:                 aka "Thomas Voegtlin <thomasv1@gmx.de>" [ultimate]

So, finally I went into Electrum's IRC chatroom and Thomas and others have helped me out. They've confirmed that it was a future functionality that Thomas was working on and he had forgotten to remove it. I can also confirm that on the Windows standalone installer, the plugin doesn't exists. So I guess it exists in the Linux source file that I downloaded from the downloads page. I'm glad it's no malware.

Here's the IRC discussion:



Thanks for helping out! Smiley
HCP
Hero Member
*****
Offline Offline

Activity: 686
Merit: 902

<insert witty quote here>


View Profile
March 09, 2018, 01:48:06 AM
 #4

Thanks for the update... Good to know there was nothing nefarious at play! Smiley

Pages: [1]
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!