Bitcoin Forum
December 16, 2017, 11:10:09 PM *
News: Latest stable version of Bitcoin Core: 0.15.1  [Torrent].
 
   Home   Help Search Donate Login Register  
Pages: « 1 ... 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432 [1433] 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476 1477 1478 1479 1480 1481 1482 1483 ... 1869 »
  Print  
Author Topic: [XMR] Monero - A secure, private, untraceable cryptocurrency  (Read 4206664 times)
nioc
Legendary
*
Offline Offline

Activity: 1498

out of the blue and into the black


View Profile
January 03, 2016, 11:11:28 AM
 #28641

2016-Jan-02 20:05:06.652046 [RPC1]ERROR C:/msys64/DISTRIBUTION-BUILD/src/crypton
ote_core/miner.cpp:239 Starting miner but it's already started

Isn't this clear?

Your daemon is already mining. The wallet has commands to start and stop mining but once you start, as long as the daemon is still running it will continue to mine even after the wallet exits.



No it wasn't clear to me because that message was immediately followed by:

2016-Jan-02 20:05:06.652046 [RPC1]Failed, mining not started
as well as a similar message from simplewallet.

Also I always stop_mining before exiting but after checking things out it seems this time I didn't and just exited.  I had no idea you needed simple wallet to start and stop mining but not to continue to mine once started.


Signed, resident idiot

If you don't know where you're going any road will get you there
1513465809
Hero Member
*
Offline Offline

Posts: 1513465809

View Profile Personal Message (Offline)

Ignore
1513465809
Reply with quote  #2

1513465809
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
1513465809
Hero Member
*
Offline Offline

Posts: 1513465809

View Profile Personal Message (Offline)

Ignore
1513465809
Reply with quote  #2

1513465809
Report to moderator
1513465809
Hero Member
*
Offline Offline

Posts: 1513465809

View Profile Personal Message (Offline)

Ignore
1513465809
Reply with quote  #2

1513465809
Report to moderator
1513465809
Hero Member
*
Offline Offline

Posts: 1513465809

View Profile Personal Message (Offline)

Ignore
1513465809
Reply with quote  #2

1513465809
Report to moderator
medusa13
Hero Member
*****
Offline Offline

Activity: 709

hello world


View Profile
January 03, 2016, 11:56:46 AM
 #28642

thank you fluffy, deleting the .bin helped. balances are in sync again now

XMR Monero
dEBRUYNE
Legendary
*
Offline Offline

Activity: 1246


View Profile
January 03, 2016, 12:37:38 PM
 #28643

I have just re-synced from scratch the blockchain by new 0.9 release Win64 binaries. All things seem to be SUCCESS. Below I leave some number facts:

Total time to re-sync from scratch = 2h 25m
Maximum memory usage visible in standard Windows 7 task manager during re-sync = 60Mb
Overall Monero database files under c:\ProgramData\bitmonero = 7.6Gb

Simplewallet.exe have requested to import my wallet from old format - done instantly.

Note, 'refresh' command must be typed in simplewallet console to see up-to-date balance!

!!! MONERO DEVS CONGRATULATIONS !!!

I agree, the DEVS KICK ASS.

I have also just synced the blockchain from scratch using ver0.9 binaries released for Win64. All seems to be a SUCCESS for me as well.

Total time to re-sync from scratch = ~50mins




Very fast! Unfortunately, it does not work happen as such in my PC (Windows 7 64bit). It took me 2 hour sync-ing 128k block (out of ~900k block)

Probably because you have an HDD, syncing is way faster with an SSD than an HDD.

Privacy matters, use Monero - A true untraceable cryptocurrency
Why Monero matters? http://weuse.cash/2016/03/05/bitcoiners-hedge-your-position/
BitcoinForumator
Legendary
*
Offline Offline

Activity: 1120


View Profile
January 03, 2016, 01:38:09 PM
 #28644

Can we simply import wallets and .keys from the old Monero client into Hydrogen Helix?
Febo
Legendary
*
Offline Offline

Activity: 1260



View Profile
January 03, 2016, 03:09:54 PM
 #28645

Can we simply import wallets and .keys from the old Monero client into Hydrogen Helix?

yes i copy/pasted them in Hydrogen Helix folder and when open with simple wallet just type refresh command and that is it.

.BitDice.               ▄▄███▄▄
           ▄▄██▀▀ ▄ ▀▀██▄▄
      ▄▄█ ▀▀  ▄▄█████▄▄  ▀▀ █▄▄
  ▄▄██▀▀     ▀▀ █████ ▀▀     ▀▀██▄▄
██▀▀ ▄▄██▀      ▀███▀      ▀██▄▄ ▀▀██
██  ████▄▄       ███       ▄▄████  ██
██  █▀▀████▄▄  ▄█████▄  ▄▄████▀▀█  ██
██  ▀     ▀▀▀███████████▀▀▀     ▀  ██
             ███████████
██  ▄     ▄▄▄███████████▄▄▄     ▄  ██
██  █▄▄████▀▀  ▀█████▀  ▀▀████▄▄█  ██
██  ████▀▀       ███       ▀▀████  ██
██▄▄ ▀▀██▄      ▄███▄      ▄██▀▀ ▄▄██
  ▀▀██▄▄     ▄▄ █████ ▄▄     ▄▄██▀▀
      ▀▀█ ▄▄  ▀▀█████▀▀  ▄▄ █▀▀
           ▀▀██▄▄ ▀ ▄▄██▀▀
               ▀▀███▀▀
        ▄▄███████▄▄
     ▄███████████████▄
    ████▀▀       ▀▀████
   ████▀           ▀████
   ████             ████
   ████ ▄▄▄▄▄▄▄▄▄▄▄ ████
▄█████████████████████████▄
██████████▀▀▀▀▀▀▀██████████
████                   ████
████                   ████
████                   ████
████                   ████
████                   ████
████▄                 ▄████
████████▄▄▄     ▄▄▄████████
  ▀▀▀█████████████████▀▀▀
        ▀▀▀█████▀▀▀
▄▄████████████████████████████████▄▄
██████████████████████████████████████
█████                            █████
█████                            █████
█████                            █████
█████                            █████
█████                     ▄▄▄▄▄▄▄▄▄▄
█████                   ▄█▀▀▀▀▀▀▀▀▀▀█▄
█████                   ██          ██
█████                   ██          ██
█████                   ██          ██
██████████████████▀▀███ ██          ██
 ████████████████▄  ▄██ ██          ██
   ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ ██          ██
             ██████████ ██          ██
           ▄███████████ ██████▀▀██████
          █████████████  ▀████▄▄████▀
[/]
generalt
Legendary
*
Offline Offline

Activity: 922


View Profile
January 03, 2016, 04:11:17 PM
 #28646

Can we simply import wallets and .keys from the old Monero client into Hydrogen Helix?

yes i copy/pasted them in Hydrogen Helix folder and when open with simple wallet just type refresh command and that is it.

Thank you.

BTC: 1GENERALrtBAjEv2Ps5cmEW1FADnXh1bCZ
saddambitcoin
Legendary
*
Offline Offline

Activity: 1612



View Profile
January 03, 2016, 04:16:30 PM
 #28647

xpost from Cryptonic's thread: Now you can bind a Monero address to a physical XMR coin! Very cool.

Dear friends! Happy new year!

From now on Cryptonic physical Monero coins are little more than just collectibles.

Moneromooo has kindly added an optional user supplied entropy to his offline wallet generator. So now it's possible to use it with cryptonic coin IDs (and a password for more security) to create a cold storage associated with it.

https://github.com/moneromooo-monero/monero-wallet-generator/

https://moneroaddress.org/

There is a field Custom entropy. Just fill in your coin IDs and a password, for example:

Code:
1Fe58dA D7auQk6 your_password

...and click Generate wallet!


aiwe
Hero Member
*****
Online Online

Activity: 770


Karbowanec.com


View Profile WWW
January 03, 2016, 04:54:22 PM
 #28648

Once I lost (luckily small amount of) Bitcoin from address generated by some paperwallet site using 'brain wallet' shit option - custom phrase entered. So, in seconds after change from transaction went to that address it was withdrawn bo some clever bastard owner of 1LdUHTEVxWJhrhKfy4H3VuYDnTHQVjsdBn.

Therefore my question: is it safe to use custom entropy?

I'm afraid, human brain is not good at providing uncrackable one.




Upd.: Shit it was not small, - I could bought ONE monero for those satoshies. And they were stolen..

█████▄▄██████████▄▄█████
███▄████████████████▄███
████████████████████████
██████████████████████
█████████████████████
████████████████████████
████████████████████████
█████████████████████
████████████████████████
██████████████████████
██▀██████████████████▀██
████▀▀████████████▀▀████
    Ҝ
Ҝ
Ҝ
    Ҝ
Ҝ
Ҝ
  · Anonymity by CryptoNote
· Zero premine & instamine
· Low transaction fee
MoneroMooo
Legendary
*
Offline Offline

Activity: 1010


Nousplatform ICO ❱ November 20th, 2017


View Profile
January 03, 2016, 05:17:57 PM
 #28649

Therefore my question: is it safe to use custom entropy?

That's a bit like getting in a plane cockpit in flight, and wondering: is it safe to disable the autopilot ?

For some, it will be. For most... it will be down to this:

I'm afraid, human brain is not good at providing uncrackable one.

Nousplatform██  ██  █
██  ██  █
██  ██  █
██  ██  █
██  ██  █
██  ██  █
██  ██  █
██  ██  █
██  ██  █
██  ██  █
██  ██  █
██  ██  █
██  ██  █
██  ██  █
██  ██  █
██  ██  █
██  ██  █
██  ██  █
██  ██  █
██  ██  █
██  ██  █
██  ██  █
██  ██  █
██  ██  █
██  ██  █
██  ██  █
|██  ██  █
██  ██  █
██  ██  █
██  ██  █
██  ██  █
██  ██  █
██  ██  █
██  ██  █
██  ██  █
██  ██  █
██  ██  █
██  ██  █
██  ██  █
dEBRUYNE
Legendary
*
Offline Offline

Activity: 1246


View Profile
January 03, 2016, 05:18:09 PM
 #28650

Once I lost (luckily small amount of) Bintoin from address generated by some paperwallet site using 'brain wallet' shit option - custom phrase entered. So, in seconds after change from transaction went to that address it was withdrawn bo some clever bastard owner of 1LdUHTEVxWJhrhKfy4H3VuYDnTHQVjsdBn.

Therefore my question: is it safe to use custom entropy?

I'm afraid, human brain is not good at providing uncrackable one.




Upd.: Shit it was not small, - I could bought ONE monero for those satoshies. And they were stolen..

Generally not, just use the normal one. Custom entropies are risky and should only be used if you know what you are doing.

Privacy matters, use Monero - A true untraceable cryptocurrency
Why Monero matters? http://weuse.cash/2016/03/05/bitcoiners-hedge-your-position/
medusa13
Hero Member
*****
Offline Offline

Activity: 709

hello world


View Profile
January 03, 2016, 10:31:17 PM
 #28651

hi guys, still haveing some troubles with 0.9.

after deleting .bin, the balance shown in simplewallet is now correct.

but if i try to send funds, i get :

Code:
2016-Jan-03 23:26:54.722493 [RPC1]transaction with hash aab282164e86b322823fe99e9595fecce2505d0e322ad4dacfcaa24331f36bbd not found in db
2016-Jan-03 23:26:54.722493 [RPC1]Transaction with id= <aab282164e86b322823fe99e9595fecce2505d0e322ad4dacfcaa24331f36bbd> used already spent key images
2016-Jan-03 23:26:54.722493 [RPC1]Transaction verification failed: <aab282164e86b322823fe99e9595fecce2505d0e322ad4dacfcaa24331f36bbd>

dont know what it is..is a trx of mine stuck in mempool?


XMR Monero
oblox
Legendary
*
Offline Offline

Activity: 882


View Profile
January 03, 2016, 11:13:11 PM
 #28652

hi guys, still haveing some troubles with 0.9.

after deleting .bin, the balance shown in simplewallet is now correct.

but if i try to send funds, i get :

Code:
2016-Jan-03 23:26:54.722493 [RPC1]transaction with hash aab282164e86b322823fe99e9595fecce2505d0e322ad4dacfcaa24331f36bbd not found in db
2016-Jan-03 23:26:54.722493 [RPC1]Transaction with id= <aab282164e86b322823fe99e9595fecce2505d0e322ad4dacfcaa24331f36bbd> used already spent key images
2016-Jan-03 23:26:54.722493 [RPC1]Transaction verification failed: <aab282164e86b322823fe99e9595fecce2505d0e322ad4dacfcaa24331f36bbd>

dont know what it is..is a trx of mine stuck in mempool?



Doesn't appear to be in a block yet:

http://moneroblocks.eu/search/aab282164e86b322823fe99e9595fecce2505d0e322ad4dacfcaa24331f36bbd
smooth
Legendary
*
Offline Offline

Activity: 1624



View Profile
January 03, 2016, 11:40:12 PM
 #28653

Once I lost (luckily small amount of) Bitcoin from address generated by some paperwallet site using 'brain wallet' shit option - custom phrase entered. So, in seconds after change from transaction went to that address it was withdrawn bo some clever bastard owner of 1LdUHTEVxWJhrhKfy4H3VuYDnTHQVjsdBn.

Therefore my question: is it safe to use custom entropy?

Given the stated use case above it should be safe, assuming you trust the manufacturer of the coin and the coin itself has been kept secure from disclosure of the coin ID.

A "strong" password helps a bit but most of the security comes from the coin ID itself.

Although....I'd suggest using slow hash for key stretching as the simplewallet password does. That all but precludes any useful brute forcing of passwords. I thought that was in the standard for physical coin keys, but maybe not.



binaryFate
Legendary
*
Offline Offline

Activity: 1330


Still wild and free


View Profile
January 03, 2016, 11:46:44 PM
 #28654

A "strong" password helps a bit but most of the security comes from the coin ID itself.

If you want to be reasonably paranoid, you must assume that between production and shipping, the coin ID is compromised.
I'd personally make sure the entropy of my password is fine by itself.


Monero's privacy and therefore fungibility are MUCH stronger than Bitcoin's. 
This makes Monero a better candidate to deserve the term "digital cash".
smooth
Legendary
*
Offline Offline

Activity: 1624



View Profile
January 03, 2016, 11:48:44 PM
 #28655

A "strong" password helps a bit but most of the security comes from the coin ID itself.

If you want to be reasonably paranoid, you must assume that between production and shipping, the coin ID is compromised.
I'd personally make sure the entropy of my password is fine by itself.

If you're going to do that, you might as well just use a paper wallet (which I personally recommend). There is no way you will ever have a strong password that doesn't need to be written down. Brain wallets don't work.
Wolf0
Legendary
*
Offline Offline

Activity: 1764


Miner Developer


View Profile
January 04, 2016, 12:06:20 AM
 #28656

A "strong" password helps a bit but most of the security comes from the coin ID itself.

If you want to be reasonably paranoid, you must assume that between production and shipping, the coin ID is compromised.
I'd personally make sure the entropy of my password is fine by itself.

If you're going to do that, you might as well just use a paper wallet (which I personally recommend). There is no way you will ever have a strong password that doesn't need to be written down. Brain wallets don't work.


False - it's possible, most people just don't do it.

Code:
Donations: BTC: 1WoLFdwcfNEg64fTYsX1P25KUzzSjtEZC -- XMR: 45SLUTzk7UXYHmzJ7bFN6FPfzTusdUVAZjPRgmEDw7G3SeimWM2kCdnDQXwDBYGUWaBtZNgjYtEYA22aMQT4t8KfU3vHLHG
binaryFate
Legendary
*
Offline Offline

Activity: 1330


Still wild and free


View Profile
January 04, 2016, 12:15:49 AM
 #28657

A "strong" password helps a bit but most of the security comes from the coin ID itself.

If you want to be reasonably paranoid, you must assume that between production and shipping, the coin ID is compromised.
I'd personally make sure the entropy of my password is fine by itself.

If you're going to do that, you might as well just use a paper wallet (which I personally recommend). There is no way you will ever have a strong password that doesn't need to be written down. Brain wallets don't work.


Plain brain wallets don't, and I agree to discourage anyone to use them.

However you can produce secure brain wallets with for instance a mechanism involving a large number of different hashing functions.
Simple example, assuming my brain wallet is 12MD516SHAparmiggianoIsMySalt. (This is easy to remember if you read that word by word).
I would probably still remember, even after some years, that I have to find the secret key by applying 12 times MD5, 16 times SHA256, to that very password itself.
Code:
p="12RIPEMD16SHAparmiggianoIsMySalt" ; for i in `seq 1 12`; do for j in `seq 1 16`; do p=`echo $p | md5sum` ; done; p=`echo $p | sha256sum`; done ; echo "sk = $p" | cut -d ' ' -f 1-3
Ok, maybe I won't remember that I have to use nested loops, but since I created the scheme to start with, I wouldn't give up and keep fiddling around, testing few stuff and would eventually find my secret key with coins on it.

Not that I encourage anyone to use this, this is simply an example showing that brainwallets can include more entropy than the sole characters they contain. They can include additional entropy due to a particular semantic you attach to them. The idea is to use a semantic that is obvious to you once you read (ie, remember) the word, but hard enough that nobody can enumerate over it easily. Ideally you create your very own semantic for a handfull of critical brain wallets (or for those you create in 2015, or...), and don't disclose your logic to anyone.

Monero's privacy and therefore fungibility are MUCH stronger than Bitcoin's. 
This makes Monero a better candidate to deserve the term "digital cash".
Johnny Mnemonic
Hero Member
*****
Offline Offline

Activity: 744



View Profile
January 04, 2016, 12:17:28 AM
 #28658

A "strong" password helps a bit but most of the security comes from the coin ID itself.

If you want to be reasonably paranoid, you must assume that between production and shipping, the coin ID is compromised.
I'd personally make sure the entropy of my password is fine by itself.

If you're going to do that, you might as well just use a paper wallet (which I personally recommend). There is no way you will ever have a strong password that doesn't need to be written down. Brain wallets don't work.


False - it's possible, most people just don't do it.

And the ones who do occasionally forget their passwords, because they go so long without needing to recall it. It's possible but hardly practical.
smooth
Legendary
*
Offline Offline

Activity: 1624



View Profile
January 04, 2016, 12:29:45 AM
 #28659

However you can produce secure brain wallets with for instance a mechanism involving a large number of different hashing functions.

I doubt it. If enough people start doing that, password brute forcers will do it too, the same way they use combinations of words, phrases, common transformations, etc. All you are doing with these sorts of combinations is adding a relatively small number of entropy bits for the various ways that hash functions can be combined.

Key stretching does work but that relies on the hash function being slow, which is somewhat fragile long term.

Wolf0
Legendary
*
Offline Offline

Activity: 1764


Miner Developer


View Profile
January 04, 2016, 12:31:02 AM
 #28660

However you can produce secure brain wallets with for instance a mechanism involving a large number of different hashing functions.

I doubt it. If enough people start doing that, password brute forcers will do it too, the same way they use combinations of words, phrases, common transformations, etc. All you are doing with these sorts of combinations are adding a relatively small number of entropy bits for the various ways that hash functions can be combined.

Key stretching does work but that relies on the hash function being slow, which is somewhat fragile long term.



You simply need a good memory. I can remember 25 - 30 completely random ASCII chars if I practice it for a bit. A good enough KDF ensures key derivation is slow - it's perfectly fine; just don't be an idiot.

Code:
Donations: BTC: 1WoLFdwcfNEg64fTYsX1P25KUzzSjtEZC -- XMR: 45SLUTzk7UXYHmzJ7bFN6FPfzTusdUVAZjPRgmEDw7G3SeimWM2kCdnDQXwDBYGUWaBtZNgjYtEYA22aMQT4t8KfU3vHLHG
Pages: « 1 ... 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432 [1433] 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476 1477 1478 1479 1480 1481 1482 1483 ... 1869 »
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!