Bitcoin Forum
December 03, 2016, 10:10:23 PM *
News: To be able to use the next phase of the beta forum software, please ensure that your email address is correct/functional.
 
   Home   Help Search Donate Login Register  
Pages: « 1 ... 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 [209] 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 »
  Print  
Author Topic: Armory - Discussion Thread  (Read 481582 times)
SimonBelmond
Full Member
***
Offline Offline

Activity: 177



View Profile
October 01, 2014, 11:21:47 AM
 #4161

Hello, I am here tonight to see if you can help with a thought I have. I want to download Armory but I have worries that it will require me to download the blockchain again. I remember the 60 hours I spent waiting to download blockchain before with the qt client I think  it is called.

My question is this:

If I download the Armory wallet and synch it, will it take more than...20 minutes?
Electrum looks good because it does not require a full download of the blockchain

Thank you

If you already have a Bitcoin core installtion, Armory will go on top of it. For me armory takes about 5 min untill the DB is built and the wallet is online once the Blockchain has finished catching up. So yes it does require a full blckchain downlad, but you can use the one you have already.
1480803023
Hero Member
*
Offline Offline

Posts: 1480803023

View Profile Personal Message (Offline)

Ignore
1480803023
Reply with quote  #2

1480803023
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
1480803023
Hero Member
*
Offline Offline

Posts: 1480803023

View Profile Personal Message (Offline)

Ignore
1480803023
Reply with quote  #2

1480803023
Report to moderator
1480803023
Hero Member
*
Offline Offline

Posts: 1480803023

View Profile Personal Message (Offline)

Ignore
1480803023
Reply with quote  #2

1480803023
Report to moderator
1480803023
Hero Member
*
Offline Offline

Posts: 1480803023

View Profile Personal Message (Offline)

Ignore
1480803023
Reply with quote  #2

1480803023
Report to moderator
justusranvier
Legendary
*
Offline Offline

Activity: 1400



View Profile WWW
October 01, 2014, 07:40:15 PM
 #4162

I managed to create a situation where Armory 0.92.1 will perform a full blockchain scan every time the program is loaded.

I run bitcoind on a different (virtual) machine than Armory.

When I use NFS to share the blockchain directory, everything works.

Since both the bitcoind VM and the Armory VM are running on the same host, I tried moving the blockchain directory to the host and sharing it with both via 9pfs. The bitcoind VM gets read-write access, and the Armory VM gets read-only access.

Armory will perform a successful scan of the blockchain.

When I close it and open it up again, I get a

"Block file is in the wrong network!  MagicBytes: 00000000" error and it starts over from the beginning.
pitiflin
Full Member
***
Offline Offline

Activity: 223


View Profile
October 01, 2014, 09:07:05 PM
 #4163

Stupid (maybe not) question.

I want to update Armory, should I update Bitcoin Core as well?
bitpop
Legendary
*
Offline Offline

Activity: 1918


https://keybase.io/bitpop


View Profile WWW
October 01, 2014, 09:20:33 PM
 #4164

Stupid (maybe not) question.

I want to update Armory, should I update Bitcoin Core as well?

You don't have to but latest core is more critical than latest armory

Reputation  |  PGP  |  DigitalOcean  |  OpenVPN 2GB Free  |  TorGuard  |  Ethereum Classic
Bitcoin: 3DSh6AnmvBpDJFUz2mnLirMLmTMcFs9nDm
Bitmessage: BM-2cXN9j8NFT2n1FxDVQ6HQq4D4MZuuaBFyb
pitiflin
Full Member
***
Offline Offline

Activity: 223


View Profile
October 01, 2014, 09:45:02 PM
 #4165

Stupid (maybe not) question.

I want to update Armory, should I update Bitcoin Core as well?

You don't have to but latest core is more critical than latest armory

Thanks Smiley
segeln
Sr. Member
****
Offline Offline

Activity: 406


View Profile
October 02, 2014, 11:02:55 AM
 #4166

when will 0.92.2 be out of testing?
I ask this question again
Hope I and cypherdoc get an answer
bitpop
Legendary
*
Offline Offline

Activity: 1918


https://keybase.io/bitpop


View Profile WWW
October 02, 2014, 11:06:21 AM
 #4167

when will 0.92.2 be out of testing?
I ask this question again
Hope I and cypherdoc get an answer

I don't think there's bugs so it doesn't really matter. Armory just likes to call everything testing.

Reputation  |  PGP  |  DigitalOcean  |  OpenVPN 2GB Free  |  TorGuard  |  Ethereum Classic
Bitcoin: 3DSh6AnmvBpDJFUz2mnLirMLmTMcFs9nDm
Bitmessage: BM-2cXN9j8NFT2n1FxDVQ6HQq4D4MZuuaBFyb
justusranvier
Legendary
*
Offline Offline

Activity: 1400



View Profile WWW
October 02, 2014, 12:14:45 PM
 #4168

http://www.wired.com/2014/10/code-published-for-unfixable-usb-attack/

https://github.com/adamcaudill/Psychson
segeln
Sr. Member
****
Offline Offline

Activity: 406


View Profile
October 02, 2014, 12:17:00 PM
 #4169

when will 0.92.2 be out of testing?
I ask this question again
Hope I and cypherdoc get an answer

I don't think there's bugs so it doesn't really matter. Armory just likes to call everything testing.
Thanks,hope you are right
segeln
Sr. Member
****
Offline Offline

Activity: 406


View Profile
October 02, 2014, 12:24:26 PM
 #4170

are only USB sticks right from the factory affected or old used ones as well?
As I understand it,USB Sitcks in use cannot get compromised
chrisrico
Hero Member
*****
Offline Offline

Activity: 496


View Profile
October 02, 2014, 01:29:04 PM
 #4171

are only USB sticks right from the factory affected or old used ones as well?
As I understand it,USB Sitcks in use cannot get compromised

Nope, the whole reason why this is such a bad exploit is that most USB devices (not just flash drives) can have their firmware reprogrammed via software.
Perlover
Full Member
***
Offline Offline

Activity: 136


View Profile
October 02, 2014, 02:17:50 PM
 #4172

I don't know somebody wrote to here or not.
But i think the Armory and other programs could have a potential vulnerability.

For example what if your computer with installed Armory (watch-only wallet mode) is infected and trojan/virus which modifies a receiving address in Armory's interface? How can i trust to my online watch-only computer that all generated addresses are my addresses? What if trojan/virus modifies installed DLLs/Shared libraries of Armory and substitute watch-only generated addresses or seed to hacker things? If i will send to money to generated address how can i sure that this address is my address for private key at offline computer? :-/

What do developers think about this?
segeln
Sr. Member
****
Offline Offline

Activity: 406


View Profile
October 02, 2014, 02:58:29 PM
 #4173

are only USB sticks right from the factory affected or old used ones as well?
As I understand it,USB Sitcks in use cannot get compromised

Nope, the whole reason why this is such a bad exploit is that most USB devices (not just flash drives) can have their firmware reprogrammed via software.
that is indeed a bad exploit.
What about antimalware/antiviruses programs like Norton,kaspersky,avira.Mc affee?
Could they detect those malicious software,when they are widespread and known ?
justusranvier
Legendary
*
Offline Offline

Activity: 1400



View Profile WWW
October 02, 2014, 03:11:35 PM
 #4174

What about antimalware/antiviruses programs like Norton,kaspersky,avira.Mc affee?
Could they detect those malicious software,when they are widespread and known ?
No.

USB firmware exploits happen outside the control of the CPU and any software that may be running on it.

For now, you should probably use CD-Rs to move unsigned transactions across the air gap discard them after each use.

There might not be any exploitable CD drive firmware vulnerabilities that can be triggered by malicious data on a disc. Maybe.
SimonBelmond
Full Member
***
Offline Offline

Activity: 177



View Profile
October 02, 2014, 03:13:49 PM
 #4175

I don't know somebody wrote to here or not.
But i think the Armory and other programs could have a potential vulnerability.

For example what if your computer with installed Armory (watch-only wallet mode) is infected and trojan/virus which modifies a receiving address in Armory's interface? How can i trust to my online watch-only computer that all generated addresses are my addresses? What if trojan/virus modifies installed DLLs/Shared libraries of Armory and substitute watch-only generated addresses or seed to hacker things? If i will send to money to generated address how can i sure that this address is my address for private key at offline computer? :-/

What do developers think about this?

I jsut double check the address before broadcasting. That's more or less all I can do. Of course you could take appart the unsigned and signed transaction before broadcasting. However, as long as I don't hear anything else I consider it safe enough...
segeln
Sr. Member
****
Offline Offline

Activity: 406


View Profile
October 02, 2014, 03:43:04 PM
 #4176

What about antimalware/antiviruses programs like Norton,kaspersky,avira.Mc affee?
Could they detect those malicious software,when they are widespread and known ?
No.

USB firmware exploits happen outside the control of the CPU and any software that may be running on it.

For now, you should probably use CD-Rs to move unsigned transactions across the air gap discard them after each use.

There might not be any exploitable CD drive firmware vulnerabilities that can be triggered by malicious data on a disc. Maybe.
thanks,justusranvier
Newar
Legendary
*
Offline Offline

Activity: 1148


https://gliph.me/hUF


View Profile
October 02, 2014, 03:59:37 PM
 #4177

What about antimalware/antiviruses programs like Norton,kaspersky,avira.Mc affee?
Could they detect those malicious software,when they are widespread and known ?
No.

USB firmware exploits happen outside the control of the CPU and any software that may be running on it.

For now, you should probably use CD-Rs to move unsigned transactions across the air gap discard them after each use.

There might not be any exploitable CD drive firmware vulnerabilities that can be triggered by malicious data on a disc. Maybe.

There's audio too, easier on the planet: https://bitcointalk.org/index.php?topic=735111.0

OTC rating | GPG keyid 1DC91318EE785FDE | Gliph: lightning bicycle tree music | Mycelium, a swift & secure Bitcoin client for Android | LocalBitcoins
cypherdoc
Legendary
*
Offline Offline

Activity: 1764



View Profile
October 02, 2014, 04:01:24 PM
 #4178

Stupid (maybe not) question.

I want to update Armory, should I update Bitcoin Core as well?

You don't have to but latest core is more critical than latest armory

so latest Bitcoin Core is compatible with ARmory 0.92.1?
bitpop
Legendary
*
Offline Offline

Activity: 1918


https://keybase.io/bitpop


View Profile WWW
October 02, 2014, 04:39:19 PM
 #4179

Stupid (maybe not) question.

I want to update Armory, should I update Bitcoin Core as well?

You don't have to but latest core is more critical than latest armory

so latest Bitcoin Core is compatible with ARmory 0.92.1?

Yeah the bitcoin rpc i dont think ever had deprecation

Reputation  |  PGP  |  DigitalOcean  |  OpenVPN 2GB Free  |  TorGuard  |  Ethereum Classic
Bitcoin: 3DSh6AnmvBpDJFUz2mnLirMLmTMcFs9nDm
Bitmessage: BM-2cXN9j8NFT2n1FxDVQ6HQq4D4MZuuaBFyb
Perlover
Full Member
***
Offline Offline

Activity: 136


View Profile
October 03, 2014, 04:10:20 PM
 #4180

I jsut double check the address before broadcasting. That's more or less all I can do. Of course you could take appart the unsigned and signed transaction before broadcasting. However, as long as I don't hear anything else I consider it safe enough...
I am about getting from Armory the address for receiving bitcoins. It's not neeeded for broadcasting...
As i think you about a sending of bitcoins...
Pages: « 1 ... 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 [209] 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 »
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!