Bitcoin Forum
May 10, 2024, 06:19:32 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2]  All
  Print  
Author Topic: Warning! Be careful when you copy and paste bitcoin address from Electrum wallet  (Read 389 times)
NeuroticFish
Legendary
*
Offline Offline

Activity: 3668
Merit: 6382


Looking for campaign manager? Contact icopress!


View Profile
July 16, 2019, 06:40:32 AM
 #21

What did i do or say?  Grin

It was that fix, and then that Huawei  Grin

But the same applies to a desktop computer.

In my case it's not. On the computer the kids have "users" and I am the admin. On the phone they can install and run a "game" and I may find out about the "surprise" much later.

You're right to be paranoid, but in fact most phone manufacture do same thing (legally collect user's data).

For Mi/Xiaomi, they clearly stated about it on their privacy policy page (https://www.mi.com/us/about/new-privacy/).
If you bother read "What information is collected and how can we use it?" section, they even collect your financial information.

I'm not surprised. And I believe that some do that even without telling. It's just the next step after all that happens in the browsers.
That's why my Bitcoin wallets on Android never had useful private keys.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
1715321972
Hero Member
*
Offline Offline

Posts: 1715321972

View Profile Personal Message (Offline)

Ignore
1715321972
Reply with quote  #2

1715321972
Report to moderator
1715321972
Hero Member
*
Offline Offline

Posts: 1715321972

View Profile Personal Message (Offline)

Ignore
1715321972
Reply with quote  #2

1715321972
Report to moderator
1715321972
Hero Member
*
Offline Offline

Posts: 1715321972

View Profile Personal Message (Offline)

Ignore
1715321972
Reply with quote  #2

1715321972
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
bob123
Legendary
*
Offline Offline

Activity: 1624
Merit: 2481



View Profile WWW
July 16, 2019, 07:48:45 AM
 #22

System files & folders usually also affected because almost all users click "Yes" when UAC showed when they run malicious program.
They don't even read it, because the message is vague, unlike Android which shows list of permission.

Well.. you are right.. but in this case we are really talking about very uneducated user regarding computers and 'technical stuff'.

Unfortunately UAC can almost always be bypassed if it is not explicitly set to the highest (most secure) option, which is not default.
There are numerous ways to bypass it, some are fixed, some are not.

So this makes it even more dangerous on a computer in comparison to an android  Grin



In my case it's not. On the computer the kids have "users" and I am the admin. On the phone they can install and run a "game" and I may find out about the "surprise" much later.

But this still applies, no ?

On the computer malware could steal any data/files/etc. which the user (i.e. your kid) has access too (ignoring UAC exploits).
On an (unrooted) android the malware could only steal information in its user context (own app data) plus things possible with given permission (external storage, camera, etc..)

But accessing camera, storage, etc.. is always possible under windows. You don't even have to give permission for doing that.

One of the most dangerous things you can install on your mobile is a custom keyboard, which acts as a keylogger.
And on windows.. well.. it is not really hard to implement a keylogger.
You have about 3 different types of them:
- Via polling (GetAsyncKeyState)
- Via hooking (SetWindowsHookEx)
- Registering as input device

I mean.. hell.. there are 2 inbuilt accessible windows libraries available to create a keylogger with just a few lines of code.

If you refrain from installing a custom keyboard on an android, the chances of having a keylogger is close to zero (excluding unknown exploits), simply because an installed application has no access to the keyboard / buffer / etc.


Unfortunately this does not apply to OP's problem (clipboard hijacking), since this is readable for any application on android.

So, to get on-topic again, this also wouldn't have had him protected against this kind of malware.
I mean.. you could theoretically forbid applications to access the clipboard, but this also means you can't paste in them anymore.


I am no way saying that android is secure and windows is not.. however it is much easier to have your mobile clean than a windows computer.

But shared devices create new problems per se, whether smartphone, computer, tablet, etc.

NeuroticFish
Legendary
*
Offline Offline

Activity: 3668
Merit: 6382


Looking for campaign manager? Contact icopress!


View Profile
July 16, 2019, 08:08:42 AM
 #23

But this still applies, no ?
On the computer malware could steal any data/files/etc. which the user (i.e. your kid) has access too (ignoring UAC exploits).

As simple user he has limited options for "installing" new things. He has access only to the non-system partitions and only his user keys in registry.
The malware will run only when the kid is playing. It's bad, but it cannot damage what's important.
And in my case he will also have to get over the Internet Security's "Auto-Containment"  Wink

One of the most dangerous things you can install on your mobile is a custom keyboard, which acts as a keylogger.
And on windows.. well.. it is not really hard to implement a keylogger.

I know, I've done a super-simple one in my 3rd year at Uni.  Wink
That was in MS-DOS/Win95. Now everything is much easier.

Unfortunately this does not apply to OP's problem (clipboard hijacking), since this is readable for any application on android.

So, to get on-topic again, this also wouldn't have had him protected against this kind of malware.
I mean.. you could theoretically forbid applications to access the clipboard, but this also means you can't paste in them anymore.


I am no way saying that android is secure and windows is not.. however it is much easier to have your mobile clean than a windows computer.

But shared devices create new problems per se, whether smartphone, computer, tablet, etc.

That's correct. At least for clipboard hijacking user's double check is something easy to do and should become almost a reflex.
Bitsler has this implemented at withdraw - it asks the user double check a few parts of the address for sure. But for a wallet to do this.. I don't know, it could be annoying for many users.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
Pages: « 1 [2]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!