Bitcoin Forum
January 20, 2021, 11:37:55 AM *
News: Latest Bitcoin Core release: 0.21.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 [217] 218 219 220 221 222 223 224 225 226 227 228 229 230 231 »
  Print  
Author Topic: Armory - Discussion Thread  (Read 521358 times)
goatpig
Moderator
Legendary
*
Offline Offline

Activity: 2758
Merit: 1180

Armory Developer


View Profile
December 22, 2014, 04:04:52 PM
 #4321



Create a ticket and attach your log files:

https://support.bitcoinarmory.com/home

I created the ticket https://support.bitcoinarmory.com/home, but a confirmation letter does not come at gmail.com ...

I found in the folder of ARMORY several logs. Which of the logs I need to send?

One guy (goatpig Hero Member) says to the next thread https://bitcointalk.org/index.php?topic=902412.msg9915688#msg9915688 that my ARMORY is offline because I am from Russia. I think that guy is delirious.

Same weird guy asking for your logs -_-". And I'm only delirious on certain days of the week.

Need both armorylog.txt and armorycpplog.txt

Not sure about the confirmation email, we changed ticket engine a short time ago, and I'm not familiar with the new one yet.

I can tell from your screenshots that Armory is not online. It's in an inconsistent state (STATE != COUNTRY), or situation if you prefer, or status, or condition. Anyways, it's not online. Add your logs to the ticket and wait for instructions on that end.

At least someone got a laugh out of this.

1611142675
Hero Member
*
Offline Offline

Posts: 1611142675

View Profile Personal Message (Offline)

Ignore
1611142675
Reply with quote  #2

1611142675
Report to moderator
1611142675
Hero Member
*
Offline Offline

Posts: 1611142675

View Profile Personal Message (Offline)

Ignore
1611142675
Reply with quote  #2

1611142675
Report to moderator
1611142675
Hero Member
*
Offline Offline

Posts: 1611142675

View Profile Personal Message (Offline)

Ignore
1611142675
Reply with quote  #2

1611142675
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
1611142675
Hero Member
*
Offline Offline

Posts: 1611142675

View Profile Personal Message (Offline)

Ignore
1611142675
Reply with quote  #2

1611142675
Report to moderator
1611142675
Hero Member
*
Offline Offline

Posts: 1611142675

View Profile Personal Message (Offline)

Ignore
1611142675
Reply with quote  #2

1611142675
Report to moderator
1611142675
Hero Member
*
Offline Offline

Posts: 1611142675

View Profile Personal Message (Offline)

Ignore
1611142675
Reply with quote  #2

1611142675
Report to moderator
aks174
Newbie
*
Offline Offline

Activity: 42
Merit: 0


View Profile
December 22, 2014, 04:08:19 PM
 #4322



Create a ticket and attach your log files:

https://support.bitcoinarmory.com/home

I created the ticket https://support.bitcoinarmory.com/home, but a confirmation letter does not come at gmail.com ...

I found in the folder of ARMORY several logs. Which of the logs I need to send?

One guy (goatpig Hero Member) says to the next thread https://bitcointalk.org/index.php?topic=902412.msg9915688#msg9915688 that my ARMORY is offline because I am from Russia. I think that guy is delirious.

Same weird guy asking for your logs -_-". And I'm only delirious on certain days of the week.

Need both armorylog.txt and armorycpplog.txt

Not sure about the confirmation email, we changed ticket engine a short time ago, and I'm not familiar with the new one yet.

I can tell from your screenshots that Armory is not online. It's in an inconsistent state (STATE != COUNTRY), or situation if you prefer, or status, or condition. Anyways, it's not online. Add your logs to the ticket and wait for instructions on that end.

At least someone got a laugh out of this.

Thank you very much. I will send both files and armorylog.txt armorycpplog.txt
bitpop
Legendary
*
Offline Offline

Activity: 2716
Merit: 1058



View Profile WWW
December 22, 2014, 04:10:50 PM
 #4323

We were messing with his data files earlier, he probably just needs to rebuild

His Bitcoin could also be corrupt

aks174
Newbie
*
Offline Offline

Activity: 42
Merit: 0


View Profile
December 22, 2014, 04:23:00 PM
 #4324

We were messing with his data files earlier, he probably just needs to rebuild

His Bitcoin could also be corrupt

Most likely you're right! volume data again tripled
http://ia116.mycdn.me/image?t=3&bid=666104991112&id=666104991112&plc=WEB&tkn=VoH3CTyteNNRhQxcTIHUppeFLVA
etotheipi
Legendary
*
Offline Offline

Activity: 1428
Merit: 1046


Core Armory Developer


View Profile WWW
January 10, 2015, 12:05:12 AM
 #4325

Armory 0.93 is now in testing!   For details:  https://bitcointalk.org/index.php?topic=919202


Worry not, everyone on the Armory team is alive and well, despite the lack of updates over the last few months.  We've been working diligently on both 0.93 as well as some not-yet-public things that you'll hear about soon!  In the meantime, please help test 0.93 testing version and claim some bounties!   https://bitcointalk.org/index.php?topic=919202

I'll just reiterate two important points from that thread:

  • (1) This uses a new DB engine which is not compatible with the 0.92.3 databases.  If you are short on disk space, I recommend waiting to upgrade, and/or manually deleting the 0.92 databases after you've confirmed 0.93 works for you.  Before the final release we will determine an appropriate way to automatically delete the old DBs, or at least ask the user.
  • (2) You should not upgrade to Core 0.10 without this version!.  In other words, this new version of Armory is required if you plan to use the new version of Bitcoin Core (headers-first).  Luckily, they will probably both be officially released about the same time (end of Jan 2015).
 

Founder and CEO of Armory Technologies, Inc.
Armory Bitcoin Wallet: Bringing cold storage to the average user!
Only use Armory software signed by the Armory Offline Signing Key (0x98832223)

Please donate to the Armory project by clicking here!    (or donate directly via 1QBDLYTDFHHZAABYSKGKPWKLSXZWCCJQBX -- yes, it's a real address!)
solex
Legendary
*
Offline Offline

Activity: 1078
Merit: 1000


100 satoshis -> ISO code


View Profile
January 10, 2015, 12:17:16 AM
 #4326

    • (2) You should not upgrade to Core 0.10 without this version!.  In other words, this new version of Armory is required if you plan to use the new version of Bitcoin Core (headers-first).  Luckily, they will probably both be officially released about the same time (end of Jan 2015).
     

    Aha. Valuable information. Great work as usual!

    cypherdoc
    Legendary
    *
    Offline Offline

    Activity: 1764
    Merit: 1002



    View Profile
    January 13, 2015, 09:51:26 PM
     #4327

    what's this Bitcoin Core 0.9.4 update notification i'm getting from Ubuntu?  it's from Launchpad Bitcoin PPA.  what do we do with it?
    Carlton Banks
    Legendary
    *
    Offline Offline

    Activity: 2968
    Merit: 2425



    View Profile
    January 13, 2015, 09:55:46 PM
     #4328

    what's this Bitcoin Core 0.9.4 update notification i'm getting from Ubuntu?  it's from Launchpad Bitcoin PPA.  what do we do with it?

    If 0.9 still works for you, you don't need 0.9.4. It's an(other) OpenSSL libraries clanger

    Vires in numeris
    btchris
    Hero Member
    *****
    Offline Offline

    Activity: 672
    Merit: 501

    a.k.a. gurnec on GitHub


    View Profile WWW
    January 13, 2015, 10:18:26 PM
     #4329

    what's this Bitcoin Core 0.9.4 update notification i'm getting from Ubuntu?  it's from Launchpad Bitcoin PPA.  what do we do with it?
    If 0.9 still works for you, you don't need 0.9.4. It's an(other) OpenSSL libraries clanger

    To elaborate a bit, if you follow the advice next to the "News" alert at the top of every bitcointalk.org page, you don't need 0.9.4. It's a minor update whose main reason for existence is to work around the OpenSSL change mentioned in the News alert (plus a few other pretty minor bug fixes).
    mmortal03
    Legendary
    *
    Offline Offline

    Activity: 1755
    Merit: 1005


    View Profile
    February 17, 2015, 12:12:22 AM
     #4330

    • (2) You should not upgrade to Core 0.10 without this version!.  In other words, this new version of Armory is required if you plan to use the new version of Bitcoin Core (headers-first).  Luckily, they will probably both be officially released about the same time (end of Jan 2015).

    Aha. Valuable information. Great work as usual!

    What's the ETA, given that Core 0.10 has been released?
    bitpop
    Legendary
    *
    Offline Offline

    Activity: 2716
    Merit: 1058



    View Profile WWW
    February 17, 2015, 12:32:06 AM
     #4331

    • (2) You should not upgrade to Core 0.10 without this version!.  In other words, this new version of Armory is required if you plan to use the new version of Bitcoin Core (headers-first).  Luckily, they will probably both be officially released about the same time (end of Jan 2015).

    Aha. Valuable information. Great work as usual!

    What's the ETA, given that Core 0.10 has been released?

    Works fine now, basically rc

    cypherdoc
    Legendary
    *
    Offline Offline

    Activity: 1764
    Merit: 1002



    View Profile
    February 17, 2015, 01:45:56 AM
     #4332

    Fanny problems:

    http://arstechnica.com/security/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/3/
    etotheipi
    Legendary
    *
    Offline Offline

    Activity: 1428
    Merit: 1046


    Core Armory Developer


    View Profile WWW
    February 17, 2015, 03:13:56 AM
     #4333


    Wow, epic.  Thanks for that link, I hadn't seen that yet. 

    Indeed Fanny is quite a piece of malware.  To save anyone else reading the effort of finding the section:

    Quote
    Fanny: A computer worm that exploited what in 2008 were two zero-day vulnerabilities in Windows to self-replicate each time an infected USB stick was inserted into a targeted computer. The main purpose of Fanny was to conduct reconnaissance on sensitive air-gapped networks. After infecting a computer not connected to the Internet, Fanny collected network information and saved it to a hidden area of the USB drive. If the stick was later plugged in to an Internet-computer, it would upload the data to attacker servers and download any attacker commands. If the stick was later plugged into the air-gapped machine, the downloaded commands would be executed. This process would continue each time the stick was switched between air-gapped and Internet-connected machines.

    Luckily (?!?) all this malware seems to be specifically targeted at Windows.  In fact, there's no mention of any other OSes, and many of the descriptions of the malware are extremely Windows-specific:

    Quote
    GrayFish is the crowning achievement of the Equation Group. The malware platform is so complex that Kaspersky researchers still understand only a fraction of its capabilities and inner workings. Key to the sophistication of GrayFish is its bootkit, which allows it to take extraordinarily granular control of the machines it infects.

    "This allows it to control the launching of Windows at each stage," Kaspersky's written report explained. "In fact, after infection, the computer is not run by itself anymore: it is GrayFish that runs it step by step, making the necessary changes on the fly."

    That's not to say it couldn't be done on Linux or Mac ... but simply those weren't the target platforms.  And this is literally the most advanced malware on the planet, so we can hope that there's a high barrier to entry to replicate this on the other OS (as I write this, I realize there's no guarantee that they haven't already...)


    Founder and CEO of Armory Technologies, Inc.
    Armory Bitcoin Wallet: Bringing cold storage to the average user!
    Only use Armory software signed by the Armory Offline Signing Key (0x98832223)

    Please donate to the Armory project by clicking here!    (or donate directly via 1QBDLYTDFHHZAABYSKGKPWKLSXZWCCJQBX -- yes, it's a real address!)
    mmortal03
    Legendary
    *
    Offline Offline

    Activity: 1755
    Merit: 1005


    View Profile
    February 17, 2015, 03:42:53 AM
     #4334


    Wow, epic.  Thanks for that link, I hadn't seen that yet. 

    Indeed Fanny is quite a piece of malware.  To save anyone else reading the effort of finding the section:

    Quote
    Fanny: A computer worm that exploited what in 2008 were two zero-day vulnerabilities in Windows to self-replicate each time an infected USB stick was inserted into a targeted computer. The main purpose of Fanny was to conduct reconnaissance on sensitive air-gapped networks. After infecting a computer not connected to the Internet, Fanny collected network information and saved it to a hidden area of the USB drive. If the stick was later plugged in to an Internet-computer, it would upload the data to attacker servers and download any attacker commands. If the stick was later plugged into the air-gapped machine, the downloaded commands would be executed. This process would continue each time the stick was switched between air-gapped and Internet-connected machines.

    Luckily (?!?) all this malware seems to be specifically targeted at Windows.  In fact, there's no mention of any other OSes, and many of the descriptions of the malware are extremely Windows-specific:

    Quote
    GrayFish is the crowning achievement of the Equation Group. The malware platform is so complex that Kaspersky researchers still understand only a fraction of its capabilities and inner workings. Key to the sophistication of GrayFish is its bootkit, which allows it to take extraordinarily granular control of the machines it infects.

    "This allows it to control the launching of Windows at each stage," Kaspersky's written report explained. "In fact, after infection, the computer is not run by itself anymore: it is GrayFish that runs it step by step, making the necessary changes on the fly."

    That's not to say it couldn't be done on Linux or Mac ... but simply those weren't the target platforms.  And this is literally the most advanced malware on the planet, so we can hope that there's a high barrier to entry to replicate this on the other OS (as I write this, I realize there's no guarantee that they haven't already...)



    It was mentioned in there or some other article that they believe a Mac OS version of some of this malware is also out there.
    marcus_of_augustus
    Legendary
    *
    Offline Offline

    Activity: 3430
    Merit: 1575



    View Profile
    February 17, 2015, 05:28:23 AM
     #4335

    most hdd are first loaded with windows at the factory so if the firmware is infected anytime before linux is installed then it will still be in the firmware, unless special efforts are made to reflash the hdd firmware before installing linux.

    Newar
    Legendary
    *
    Offline Offline

    Activity: 1358
    Merit: 1000


    https://gliph.me/hUF


    View Profile
    February 17, 2015, 07:08:35 AM
     #4336

    The infographic shows only FAT16 and 32 are affected?

    OTC rating | GPG keyid 1DC91318EE785FDE | Gliph: lightning bicycle tree music | Mycelium, a swift & secure Bitcoin client for Android | LocalBitcoins
    justusranvier
    Legendary
    *
    Offline Offline

    Activity: 1400
    Merit: 1006



    View Profile
    February 17, 2015, 07:17:11 AM
     #4337

    I see a potential market for actual (not soft) hardware again.
    picobit
    Hero Member
    *****
    Offline Offline

    Activity: 547
    Merit: 500


    Decor in numeris


    View Profile
    February 17, 2015, 08:01:43 AM
     #4338

    That's not to say it couldn't be done on Linux or Mac ... but simply those weren't the target platforms.  And this is literally the most advanced malware on the planet, so we can hope that there's a high barrier to entry to replicate this on the other OS (as I write this, I realize there's no guarantee that they haven't already...)

    The only "good" thing there is to say about this in connection with Armory is that these guys are professionals with huge budgets.  They are not going to expose themselves by stealing our meagre bitcoin stashes.  That gives us a short respite, at least until this malware leaks into the hands of the common criminals.  Who will probably mainly go after the home banking password. Smiley
    Newar
    Legendary
    *
    Offline Offline

    Activity: 1358
    Merit: 1000


    https://gliph.me/hUF


    View Profile
    February 17, 2015, 04:03:25 PM
     #4339

    Maybe time to chuck in this again:

    Tx signing via minimodem
    https://bitcointalk.org/index.php?topic=735111.0

    Can of course be used with any sort of data you need to send / receive from the air-gapped system.

    OTC rating | GPG keyid 1DC91318EE785FDE | Gliph: lightning bicycle tree music | Mycelium, a swift & secure Bitcoin client for Android | LocalBitcoins
    goatpig
    Moderator
    Legendary
    *
    Offline Offline

    Activity: 2758
    Merit: 1180

    Armory Developer


    View Profile
    February 17, 2015, 04:24:17 PM
     #4340

    Maybe time to chuck in this again:

    Tx signing via minimodem
    https://bitcointalk.org/index.php?topic=735111.0

    Can of course be used with any sort of data you need to send / receive from the air-gapped system.

    We have someone looking at it. No ETAs, but we are working the code.

    Pages: « 1 ... 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 [217] 218 219 220 221 222 223 224 225 226 227 228 229 230 231 »
      Print  
     
    Jump to:  

    Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!