How to make a cryptocurrency wallet on a USB drive - Quora

Why don't more people use/discuss Linux Live USB drives with bitcoin wallet installed?

I'm new to bitcoin and I have been looking into safe options for wallets. My first solution was the just use a spare phone I had, which didn't seem safe enough. My second solution was to install the bitcoin software on a usb drive and plug it in/run it directly from the drive when I needed to. This also didn't seem safe since you're plugging it into a running machine. The final solution aside from buying something like the ledger nano s was to just install a Live Linux distro with persistence and install the wallet onto there so at least I could boot from it directly and run the wallet on a fresh OS all the time.
I guess my question is, why isn't this option discussed more as of late? It seems that most of the posts I'm pulling up are 2-3 years old. Is there something I am missing as a newbie to crypto currencies?
submitted by nvrmoar to Bitcoin [link] [comments]

Why don't more people use/discuss Linux Live USB drives with bitcoin wallet installed? /r/Bitcoin

Why don't more people use/discuss Linux Live USB drives with bitcoin wallet installed? /Bitcoin submitted by BitcoinAllBot to BitcoinAll [link] [comments]

Bitcoin Fullnode Install Guide for Dummies ;-)

Bitcoin Fullnode Install Guide for Dummies ;-)
Feel free to stop at Level 0 or Level 1, which is fine. More advanced configs are offered to those with more tech savvy. This guide, obviously assumes a Windows 10 install, but other OSes work fine, just find a different guide. BTW, the "For Dummies" is a callback to a set of "tech" books in the 90's intended to be as easy as possible. It is in jest and not intended to insult the reader. Finally, if you dislike the formatting, a well formatted copy can be found here
There is a fairly small subset of Bitcoin users that run a full node. I think the idea of running a full node has gotten a bad rap over the years since there is so much talk about running on a Raspberry Pi, or getting zippy SSDs. Although all of this can be fun, it is often not really required at all. Here are some ways to run a full node starting with the very simple. I'll get into more complex configs, but these are all optional.

Tech Skill Level: 0 (the basics)

  1. Download Bitcoin Core
  2. Launch the downloaded installer and install the app
  3. Launch the installed "Bitcoin Core" app and let it run overnight
In many cases, thats it. If your running a new machine with a fairly good internet connection, 8 or 9 hours will be enough to complete the "Initial Block Download" (IBD). This may fill up your drive a bit, but again, on most new machines, 300 GB of space isn't that hard to come by.

Tech Skill Level: 1 (encrypted wallet)

One thing we left out in the level-0 exercise is encrypting your wallet. It's easy enough to do well, but a bit more difficult to do right. The main challenge is that humans generate really poor passwords. If you want a good password, the best way is to use something called "diceware". Basically, you just grab 4 or 5 dice and each throw of the dice represents a certain word on a special list. The throw {1,4,5,3,1} for example would be the word camping on the EFF-diceware-wordlist. So you repeat this a few times until you have a list of 8 or so words which becomes the passphrase you use to encrypt your wallet. Write it down, it is always hard to remember at first. So at level-1 your list becomes:
  1. Download Bitcoin Core
  2. Launch the downloaded installer and install the app
  3. Launch the installed "Bitcoin Core" app and let it run overnight
  4. Choose Encrypt Wallet from the Settings menu
  5. Enter your 8 word (or so) passphrase generated using the Diceware method

Wallet Encryption Dialog

Tech Skill Level: 2 (enable pruning if needed)

Though I said "300 GB of space isn't hard to come by", some times it actually is. If space is an issue, a simple way to fix it is to tell bitcoin to simple take less space. This is called "pruning" and can take that number from 300 GB down to below 5 GB. If you can't find 5 GB, then you'll have to read ahead to level-4 to add USB storage. But the good news is, enabling pruning is pretty easy, we just add another step to our working list:
  1. Download Bitcoin Core
  2. Launch the downloaded installer and install the app
  3. Launch the installed "Bitcoin Core" app and let it run overnight
  4. Do the wallet encryption steps here if you wish
  5. Choose Options from the Settings menu
  6. Choose Prune block storage to: and select the max size for the blocks to use
  7. Exit and restart the bitcoin application for the changes to take effect

Pruning Dialog
Note, even setting this to 1 GB will still leave you with about a 4.5 GB install. The blocks take up a lot of space, but the chainstate and other folders eat up at least 3.5 GB and they can't be pruned. Also, be aware, to disable pruning requires you to perform the entire IBD again. While pruned some other functions my be disabled as well, so just know that pruning does limit some functionality.

Tech Skill Level: 3 (verify the installer)

Although this is arguably something that should be done at level-0, some find the intricacies of comparing hash (thumbprint) values to be tedious and beyond the scope of a beginner. You will find these types of hash compares suggested quite often as a way to prevent running tainted programs. Programs are often tainted by bad disk or network performance, but most often, taint is malicious code inserted by viruses or malware. This is a way to guard yourself against those types of attacks.
What I cover here is a very basic comparison on the certificate, but a more thorough verification advised by mosts uses a program called Gpg4Win, and is beyond the scope of this beginners guide. But regardless, most users should strive to do this minimum level of validation.
  1. Download Bitcoin Core
  2. Launch the downloaded installer
  3. When prompted "Do you want to allow..." click Show more details
  4. In the details section select Show information about the publisher's certificate
  5. In the certificate window select the Details tab
  6. In the Details tab Subject should start with "CN = Bitcoin Core Code Signing Association"
  7. Ensure Thumbprint in Details reads ea27d3cefb3eb715ed214176a5d027e01ba1ee86
  8. If the checks pass, click OK to exit the certificate window and Yes to allow the installer to run.
  9. Launch the installed "Bitcoin Core" app and let it run overnight
  10. Do the wallet encryption steps here if you wish
  11. Do the optional pruning steps here if you wish

Certification Validation Windows
Note: The certificate used to sign the current Bitcoin installer is only valid from March 2020 to March 2021. After that point the thumbprint on the certificate will change. This is by design and intentional. If your reading this post after March 2021, then it is understood that the thumbprint has changed.

Tech Skill Level: 4 (use secondary storage)

We glossed over the "new machine with fairly good internet" part. Truth be known many people do not have fairly new machines, and find the IBD to take longer than the "over night" best wishes. For most people the slowdown is the disk access when calculating what is called chainstate. This requires fast random reads and writes to the disk. If you have an SSD disk, this will be no problem, but if you have a non-SSD "spinning" disk, random writes are always slow. Though an SSD will speed things up, they are pricey, so a nice middle ground may be a simple high-end USB key drive. You can get some with 10 to 15 MB/s random writes for $20 on Amazon. This is usually a order of magnitude faster than a "spinning" disk. And with pruning (see level-2), a small USB drive should be fine.
Once you decide on a drive, the tricky part will be to enable external storage. It requires editing a configuration file and adding a line. First, we want to create a directory on the key drive. You will need to determine the drive letter of your USB key drive. For the sake of this example, we will assume it is D:, but you must determine this yourself and correct the example. Once you know the drive letter, create a blank folder on the drive called Bitcoin. So for this example, creating Bitcoin on drive D: will create the path D:\Bitcoin. Once done, assuming that D: is your drive, here are the new steps including the edit of the configuration file:
  1. Download Bitcoin Core
  2. Launch the installer, verify it, then run it
  3. Launch the installed "Bitcoin Core" app and let it run overnight
  4. Do the wallet encryption steps here if you wish
  5. Do the optional pruning steps here if you wish
  6. Launch "Notepad" by typing "Notepad.exe" in the windows search bar then click Open
  7. Type the line datadir=D:\Bitcoin (depending on your drive letter) in the blank file
  8. Choose Save from the File menu in notepad
  9. Type %APPDATA%\Bitcoin\bitcoin.conf (note the percent signs) in the File name box
  10. Select All Files from the Save as type dropdown
  11. Click the Save button and overwrite the file if prompted
  12. Exit and restart the bitcoin application for the changes to take effect

Save As Dialog
Now that you've reached this level of technical expertise, there are many new configuration options that you can begin to modify if you wish. Most configuration data is contained in the bitcoin.conf file and learning how to maintain it is a key step for a node operator.

Tech Skill Level: 5 (all other customizations)

Here's a short list of various things you can ADD to your bitcoin.conf file. You generally just add a new line for each configuration settings.
  • addresstype=bech32
  • changetype=bech32
The addresstype / changetype allows your wallet to use the native-segwit (bech32) format. This is the most efficient and inexpensive way to spend bitcoin, and is a recommended configuration. The default uses something called p2sh-segwit which is more compatible with older wallets, but more expensive to spend.
  • minrelaytxfee=0.00000011
Changing the minrelaytxfee setting allows you to help propagate lower fee transactions. It will require more memory but TXN memory is capped at 300 MB by default anyways, so if you have enough memory, it is a good setting to choose.
  • dbcache=2048
The dbcache setting controls how many MB of memory the program will use for the chainstate database. Since this is a key bottleneck in the IBD, setting this value high (2048 MB) will greatly speed up the IBD, assuming you have the memory to spare
  • blocksdir=C:\Bitcoin
  • datadir=D:\Bitcoin
In level-4 we discussed moving the datadir to a fast external storage, but the majority of the space used for bitcoin is the blocks directory (blocksdir). Although you should always use for fastest storage for datadir, you are free to use slow storage for blocksdir. So if you only want to consume a small amount of your SSD (assumed D:) then you can keep your blocks on your slow "spinning" drive.
  • upnp=1
One of the harder challenges you may face running a node, is to get incoming connections. If you are lucky, you may find that your firewall and network HW support the uPnP protocol. If they do, this setting will allow bitcoin to configure uPnP to allow incoming connections to your node. Other methods exist to make your node reachable, but they are well beyond the scope of this guide.
submitted by brianddk to Bitcoin [link] [comments]

Help recovering from old wallet.dat for an old friend.


Hey all,
I've been in the Bitcoin space since early 2012.
I have a situation that I would love to get some assistance with, I will explain the situation momentarily. Please do not message me and ask me for the wallet.dat file it's not going to happen.
TL;DR
I have an old wallet.dat file from late 2012 or early 2013 from a coin I sold to a friend. Tried to recover the coins in 2018 and failed, later found out that someone had access to the computer and could have easily stole them. Would the current Bitcoin Core be able to read an old wallet.dat file, and is there any way to easily view the balance of a 2012 wallet.dat file without having to load the entire blockchain?
In the early days of Bitcoin as many of you OG's know, the only option to securely store your coins was to use the default Bitcoin wallet in a wallet.dat file. A friend of mine was really wanted to invest in Bitcoin but didn't know how, so I sold one to him because I didn't want him to get screwed. I installed Bitcoin QT on their home laptop, had him write down the password on a piece of paper and had him put a backup of the wallet.dat file onto a USB.
Fast forward to when the price went to $20k plus, he calls me up super excited and said he wanted to sell his coin because he could use the money and I encouraged it because from my prior experience I knew the momentum was unsustainable and I had sold a few coins of my own.
Anyway, I go over to his house and we huddle around his computer. He tells me that he upgraded the hard drive in his computer and gave me his old one and I went back to my house to get an external hard drive reader. I came back, booted up his old drive and remembered that we would have to let it sync up in order to get the coins out, and on his internet that wasn't going to happen anytime soon. He gave me the hard drive and I went home and left on Bitcoin QT overnight and in the morning I was shocked to see that there were no transactions on the wallet. Quick note, he had the wallet password in a file on his documents titled "Bitcoin Wallet Password.txt". smh.
I started to panic, and I realized how bad this looked on me. I called him and told him that there were no coins on there and asked if he had his USB stick and he told me he had lost it years ago. I frantically looked through all of my old wallet files to find any transaction that could link to his address, to show that his coins were still in there. After a while I realized I had sent the coins from the now defunct btc-e.com, and had no way to check up on the coins.
I did everything in my ability to try to recover lost data from the hard drive to no avail. I asked him if anyone else has had access to his computer, and then asked him how he replaced his hard drive because I know him well enough to know he wouldn't pull apart a laptop to replace the hard drive. He told me he took it to a shop to have it replaced a few months earlier. I suspect that I'm either trying to view the wallet incorrectly or whoever replaced his hard drive snooped on his hard drive, stole the coins and replaced the wallet.dat file and generated a new one. I have to admit, I was relieved a little bit to have an explanation to coins not being there but I could imagine he thinks I may have had something to do with it. I made a few more attempts over the years whenever I was reminded of the situation to no avail.
We kind of fell out after that and haven't spoken in a while. Recently, I saw a post on his Facebook that his wife is pregnant they are having a baby, and that's why I'm here. I would love nothing more than to be able to message him and let him know that I have 11 grand waiting for him, because I'm certain the money would mean the world to him during such a stressful time.
Any help or insights would be incredibly helpful and appreciated.
submitted by Good-Exercise to Bitcoin [link] [comments]

What I currently use for privacy (after almost 2 years of long investing into it)

First of all, my threat model: I'm just an average person that wants to AVOID the maximum I can to be monitored and tracked by the government and big corps, a lot of people out there REALLY hate me and I've gone through lots of harassment and other stuff, I also plan to take my activism and love for freedom more seriously and to do stuff that could potentially lead me to very high danger or even put my life on the line. That being said, my main focus is on something that is privacy-friendly but also something with decent security (no point having a lot of privacy if a script kiddie can just break into it an boom, everything is gone) anonymity is also desirable but I'm pretty aware that true 100% anonymity is simply not possible and to achieve the maximum you can of it currently you'd have to give up A LOT of stuff in which I don't think I really could. So basically, everything that I said + I don't want to give up some hobbies of mine (as playing games etc)
Here's what I use/have done so far, most of it is based on privacytools.io list and research I've done.
Mobile:
Google Pixel 3a XL running GrapheneOS
Apps: Stock apps (Vanadium, Gallery, Clock, Contacts etc) + F-DROID, NewPipe, OsmAnd+, Joplin, Tutanota, K-9 Mail, Aegis Authenticator, KeePassDX, Syncthing, Signal, Librera PRO, Vinyl, Open Camera and Wireguard.
I also use BlahDNS as my private DNS.
Other smartphone stuff/habits: I use a Supershieldz Anti Spy Tempered Glass Screen Protector on my phone and I also have a Faraday Sleeve from Silent Pocket which my phone is on most of the times (I don't have smartphone addiction and would likely advice you to break free from smartphone addiction if you have it). I NEVER use bluetooth (thank god Pixel 3a have a headphone jack so yeah, no bluetooth earphones here) and always keep my Wi-Fi off if I'm not using it.
Computer:
I have a desktop that I built (specs: Asus B450M Gaming, AMD Ryzen 3 3300X, Radeon RX 580 8GB, 16GB DDR4 2666Mhz, 3TB HDD, 480GB SSD) that is dualbooted with QubesOS and Arch Linux.
Qubes is my main OS that I use as daily driver and for my tasks, I use Arch for gaming.
I've installed linux-hardened and its headers packages on my Arch + further kernel hardening using systctl and boot parameters, AppArmor as my MAC system and bubblewrap for sandboxing programs. I also spoof my MAC address and have restricted root access, I've also protected my GRUB with password (and use encrypted boot) and have enabled Microcode updates and have NTP and IPV6 disabled.
Also on Arch, I use iptables as a firewall denying all incoming traffic, and since it's my gaming PC, I don't game on the OS, instead, I use a KVM/QEMU Windows VM for gaming (search "How I Built The "Poor-Shamed" Computer" video to see what I'm talking about) I also use full disk encryption.
Software/Providers:
E-Mails: I use ProtonMail (Plus Account paid with bitcoin) and Tutanota (free account as they don't accept crypto payment yet, come on Tutanota, I've been waiting for it for 2 years already) since I have plus account on ProtonMail it allows me to use ProtonMail Bridge and use it on Claws Mail (desktop) and K-9 Mail (mobile) as for Tutanota I use both desktop and mobile app.
Some other e-mails habits of mine: I use e-mail aliases (ProtonMail plus account provides you with 5) and each alias is used for different tasks (as one for shopping, one for banking, one for accounts etc) and none of my e-mails have my real name on it or something that could be used to identify me. I also highly avoid using stuff that require e-mail/e-mail verification for usage (e-mail is such a pain in the ass tbh) I also make use of Spamgourmet for stuff like temporary e-mail (best service I found for this doing my research, dunno if it's really the best tho, heard that AnonAddy does kinda the same stuff but dunno, recommendations are welcomed)
Browsers/Search Engine: As mentioned, I use Vanadium (Graphene's stock browser) on mobile as it is the recommended browser by Graphene and the one with the best security for Android, for desktop I use a Hardened Firefox (pretty aware of Firefox's security not being that good, but it's the best browser for PC for me as Ungoogled Chromium is still not there in A LOT of things + inherent problems of Chrome as not being able to disable WebRTC unless you use an extension etc) with ghacks-user.js and uBlock Origin (hard mode), uMatrix (globally blocking first party scripts), HTTPS Everywhere (EASE Mode), Decentraleyes (set the recommended rules for both uBlock Origin and uMatrix) and Temporary Containers as addons. I also use Tor Browser (Safest Mode) on a Whonix VM on Qubes sometimes. DuckDuckGo is my to-go search engine and I use DNS over HTTPS on Firefox (BlahDNS as my provider once again)
browsing habits: I avoid JavaScript the maximum I can, if it's really needed, I just allow the scripts temporarely on uBlock Origin/uMatrix and after I'm done I just disable it. I also generally go with old.reddit.com instead of reddit.com (as JavaScript is not required to browse the old client), nitter.net for checking twitter stuff (although I rarely have something peaking my interest on Twitter) and I use invidious.snopyta.org as youtube front-end (I do however use YouTube sometimes if a video I wanna see can't be played on invidious or if I wanna watch a livestream) and html.duckduckgo.com instead of duckduckgo.com other than avoiding JavaScript most of my browsing habits are just common sense at this point I'd say, I also use privatebin (snopyta's instance) instead of pastebin. I also have multiple firefox profiles for different tasks (personal usage, shopping, banking etc)
VPN: I use Mullvad (guess you can mention it here since it's PTIO's recommended) paid with bitcoin and honestly best service available tbh. I use Mullvad's multihop implementation on Wireguard which I manually set myself as I had the time and patience to learn how.
password manager: KeePassXC on desktop and KeePassDX on my smartphone, my password database for my desktop is stored on a USB flash driver I encrypted with VeraCrypt.
some other software on desktop: LibreOffice (as a Microsoft Office substitute), GIMP (Photshop substitute), Vim (I use it for multiple purposes, mainly coding IDE and as a text editor), VLC (media player), Bisq (bitcoin exchange), Wasabi (bitcoin wallet), OBS (screen recording), Syncthing (file sync), qBitTorrent (torrent client) and Element (federated real-time communication software). I sadly couldn't find a good open-source substitute to Sony Vegas (tested many, but none was in the same level of Vegas imo, KDENLive is okay tho) so I just use it on a VM if I need it (Windows VM solely for the purpose of video editing, not the same one I use for gaming)
Other:
router: I have an Asus RT-AC68U with OpenWRT as its firmware. I also set a VPN on it.
cryptocurrency hardware wallet: I store all of my cryptocurrency (Bitcoin and Monero) on a Ledger Nano S, about 97% of my money is on crypto so a hardware wallet is a must for me.
I have lots of USB flash drivers that I use for Live ISOs and for encrypted backups. I also have a USB Data Blocker from PortaPow that I generally use if I need to charge my cellphone in public or in a hotel while on a trip (rare occasion tbh).
I have a Logitech C920e as webcam and a Blue Yeti microphone in which I never let them plugged, I only plug them if it's necessary and after I'm done I just unplug them.
I also have a Nintendo Switch Lite as a gaming console that I most of the times just use offline, I just connect to the internet if needed for a software update and then just turn the Wi-Fi off from it.
Other Habits/Things I've done:
payments: I simply AVOID using credit card, I try to always pay on cash (I live in a third-world country so thank god most of people here still depend on cash only) physically and online I try my best to either by using cryptocurrency or using gift cards/cash by mail if crypto isn't available. I usually buy crypto on Bisq as I just don't trust any KYC exchange (and neither should you) and since there aren't many people here in my area to do face to face bitcoin trade (and I'm skeptical of face to face tbh), I use the Wasabi Wallet (desktop) to coinjoin bitcoin before buying anything as this allows a bit more of privacy, I also coinjoin on Wasabi before sending my bitcoins to my hardware wallet. I also don't have a high consumerism drive so I'm not constantly wanting to buy everything that I see (which helps a lot on this criteria)
social media/accounts: as noted, aside from Signal and Element (which I don't even use that often) I just don't REALLY use any social media (tried Mastodon for a while but I was honestly felt it kinda desert there and most of its userbase from what I've seen were some people I'd just... rather don't hang with tbh) and, althoug not something necessary is something that I really advise people to as social media is literally a poison to your mind.
I also don't own any streaming service like Netflix/Amazon Prime/Spotify etc, I basically pirate series/movies/songs and that's it.
I've also deleted ALL my old accounts from social media (like Twitter etc) and old e-mails. ALL of my important and main accounts have 2FA enabled and are protected by a strong password (I use KeePass to generate a 35 character lenght password with numbers, capital letters, special symbols etc, each account uses a unique password) I also NEVER use my real name on any account and NEVER post any pictures of myself (I rarely take pictures of stuff if anything)
iot/smart devices: aside from my smartphone, I don't have any IOT/smart device as I honestly see no need for them (and most of them are WAY too expensive on third-world countries)
files: I constatly backup all of my files (each two weeks) on encrypted flash drivers, I also use BleachBit for temporary data cleaning and data/file shredding. I also use Syncthing as a substitute to stuff like Google Drive.
Future plans:
learn to self-host and self-host an e-mail/NextCloud (and maybe even a VPN)
find something like BurneHushed but FOSS (if you know any please let me know)
So, how is it? anything that I should do that I'm probably not doing?
submitted by StunningDistrust to privacytoolsIO [link] [comments]

DV/ABUSIVE COURT There's more to this Nightmare

their father worked for the local internet company decided to spy on me admitted it openly don't have perfect evidence of that at the moment either because I lost the online accounts it was saved on or impossible to connect to any printers. He later quit internet company and work for the electric company then Microsoft . Once he spied on me long enough he felt he had evidence and dirt on me enough to raise my child support to a very unreasonable amount when I already paid 100% for the children and paid a good amount of child support every month and had them 40% of the time . I could not afford to pay it he decided to kidnap my younger one during the times that I would have always have her. My children have been going through the domestic violence an abuse their entire life. the day of the trial hearing, I had denial of service attack. where I could not get Wi-Fi nor data on mobile. that I have always paid for. Which made it so my alarm did not go off and I was late for trail. yes the guardian of alliance said the children would be super with me if I was more stable. which was because online it says I have about 10 more addresses than I actually lived at. She said the kids were not safe with him and his wife. my son 17 yrs, went in courts filed for two restraining orders & provided proof of physical abuse and he was deneyed the judge did not seem to feel as if it was abuse . One day I received a call from my children's father. I was hoping you wanted to discuss the children but all I could hear on the other end Were sounds of computers, similar to a fax machine. Shortly after that I lost all my online accounts had a brute Force attack. My last pass and keeper did not help me either because I couldn't reach them or because they chose not to help. I noticed the last time I was able to access my passwords some of my accounts were changed to my social security number. Which I would never do. So my identity any form of privacy,all my work art an memories gone. my whole digital Life. My son who is in high school lost a lot of his hard work and the Mac, I recently purchased for. I could not access our router majority of the time. while my internet company where he used to work, lied to me and said there's no such thing as a network hack and we're not willing to help. I could not use our cellular data or Wi-Fi on my electronics but majority of the family still could use the internet on some of their mobile devices. I was panicking trying to reach my customers the company that I subcontracted for but unfortunately I was redirected to spammers. I ended up using all of our financial savings to pay rent and buy more mobile devices a new computer and any type of internet security I could possibly fine in a very small town. I could not buy anything else online I had too many online fraud charges that I was continuously fighting. I could not use the vpns I always would get a sever error and my antiviruses somehow were rerouted and I would continuously be locked out. Majority of the new electronics I bought would be compromised and controlled within minutes to a day or two, thanks to the Internet of things. My family can't even reach out for help with their hack devices services with the same local internet company. They are constantly being overcharged slow connection and additional charges like voice over IP . I've purchased at least 10 phones in the last year. My cell phone companies either have no clue or ignored me or treatme as If I was a terrorist, who was just begging to get help controling my data and my children's baby photos. I've gone through over a hundred emails since I kept losing access to them even though I had the password written down. I had DNS poisoning so majority of the websites. I still am I can't even get court forms sometimes server cant find Wacourt.gov & washingtonhelp.org I can't seem to talk to a lawyer that I've been approved for multiple times through the Northwest Justice project. for my mobile phone will consistently hang up. I can't call the non emergency 911. My emails don't go through or are blocked. Many websites I visit seem to be cloned in insecure. JavaScript would not give me access to majority of the security settings in all my browsers. There is always new extensions and apps and open source license for untrustworthy certificate and cant reach the same security settings in my browsers. I cannot turn on or off like family sharing when I don't even have a family connected to that mobile device. Can't turn off USB tethering and Google pay and apple wallets has multiple transactions not by me. cannot turn them off or use them. for they are lightened out or I don't have access. Sim card & ip always changed. 5000 $ in extra international charges hit my credit report along with new numbers emails and new addresses. Cant reach for help when device have so much static and lose connection. If I try to connect my email account to a computer. It will say I need a physical key to access it. as if I set it up myself. when every computer I own now Is broke or has locked me out. I gave up but was sad for I could not keep tabs or communicate with my children. unless I borrowed a phone. They mapped out my family and contacts so if I were to borrow a phone and try to reach out for help I usually reached spam or foreign hotline or got disconnected. Then the locals were acting strange. Like sitting outside our house taking photos of us &things were stolen of property. When we were out of town. then the landlord had strange men over pretending to fix things that didn't need to be fixed installing pipes underground , laying down new soil& having some Wi-Fi farming company working in our yard 5:00 a.m. I also notice a few times the electric companies employees were messing with our power boxes, in the middle of the night . Then My photos came out extremely bright. the family videos look like we lived in a microwave oven. I know it's very strange! I do have evidence. If I would get a new router my children's father would come over take the children and their phones from them and install something on their device saying that he had to change the password on their Netflix account, so he needed to use their phone. When I would purposely break the router the electric company would show up before the internet cable company and be across the street fixing power lines. bought the children new phones and then he puts another restraining order on me and the children saying that I stole my daughters phone and won't allow her to use it. when she didn't want to use it for some reason she has on 5 gb and ends up with no data within a couple days and has to use Wi-Fi all the time. Apple finally told me they couldn't help me with iphone for it was a government issue. I thought that was hilarious for I didn't do anything wrong unless the person who was using my accounts did. I figured it would pass I mean if you're under an investigation. it would only be for a few months right ? Not two years ! well nothing happened I mean there was no reason for anything to happen. I did notice that police were driving by the house a lot. Then I thought maybe it must have been my roommate they might be after. Then why am I the one who lost everything and dealing with network abuse. My roommate was in a bad guy he did have a bit of a criminal history but nothing considered to be violent maybe just a couple drunken stupid events. Then during the process of moving my children and roommates out of the house.while drivin my car mysteriously blew up because of some electrical issue. Luckily the children were not in the car. There were no warnings & no issues with car. It took the fire department about two minutes find me but it was totaled. I could not afford to fix it or have a mechanic look at that time . Then somebody I did not no had it towed and I lost it. I was in the router that I can't get into majority of the time and saw a port forwarding to a local Bitcoin mining pool. Then it I received another server error . He continues to harass me and threaten me or he knows everything we do in our own privacy our own bedrooms where we're going who we're going with how much money says he's recording everything it seems to know everything before I can even share it with a girlfriend. He's throwing everything against me in The family Court and continues to commit perjury while I have proved him wrong multiple times but still aren't getting the protection and respect in this local small town courtroom I have currently moved to Spokane Washington to get away from it I do the traveling for the judge is now took my daughter from coming to Spokane Washington and requiring me to stay with my children at my parents home. When they are almost fully grown she is going to be 15 soon she should have a choice to bpick who she feel safe enough to live with. without him constantly tracking and destroying every electronic I have after calling my daughter then receive Non-Stop spam and scripts over SMS and once I go to my parents more and more viruses are downloaded. I've been told multiple times by a few computer companies and files that I have some sort of invisible beacon. How ? Seattle times has reported that the local electric company and crypto miners are being questioned for unauthorized usage of other families in the small town electricity for maximum power leaving us in a unsafe situation to build more cryptocurrency . Please I appreciate Any help and advice!
submitted by u-turnshe to FamilyLaw [link] [comments]

Cheapskates guide to not buying a hardware wallet and staying 100% safe

  1. Download Tails and install to USB drive
  2. verify Tails using OpenPGP
  3. unplug your eithernet cable or turn off your wifi. Run Tails and open Electrum, it comes preinstalled
  4. Create wallet. Write down or print out SEED and backup wallet to a USB drive. Keep these in a fire safe.
  5. warning the tails usb drive deletes everything, make sure you saved to a 2nd flashdrive or the special storage option they have.
  6. On a different USB drive copy the MASTER PUBLIC KEY to a .txt file.
  7. Remove flash drives. Restart computer and boot windows. Download Electrum and import the MASTER PUBLIC KEY. This creates a Watch-Only wallet that will allow you view and recieve bitcoin.
  8. If you ever want to send bitcoin, just boot into Tails and send from there.
  9. Use the $60 you saved to buy moar bitcoin

Never use this tails drive for exploring on tor or anything except sending bitcoin. keep it pure and clean.
Never plug in your flashdrive with the wallet while running windows.
submitted by atrueretard to Bitcoin [link] [comments]

Test

Test
There is a fairly small subset of Bitcoin users that run a full node. I think the idea of running a full node has gotten a bad rap over the years since there is so much talk about running on a Raspberry Pi, or getting zippy SSDs. Although all of this can be fun, it is often not really required at all. Here are some ways to run a full node starting with the very simple. I'll get into more complex configs, but these are all optional.

Tech Skill Level: 0 (the basics)

  1. Download Bitcoin Core
  2. Launch the downloaded installer and install the app
  3. Launch the installed "Bitcoin Core" app and let it run overnight
In many cases, thats it. If your running a new machine with a fairly good internet connection, 8 or 9 hours will be enough to complete the "Initial Block Download" (IBD). This may fill up your drive a bit, but again, on most new machines, 300 GB of space isn't that hard to come by.

Tech Skill Level: 1 (encrypted wallet)

One thing we left out in the level-0 exercise is encrypting your wallet. It's easy enough to do well, but a bit more difficult to do right. The main challenge is that humans generate really poor passwords. If you want a good password, the best way is to use something called "diceware". Basically, you just grab 4 or 5 dice and each throw of the dice represents a certain word on a special list. The throw {1,4,5,3,1} for example would be the word camping on the EFF-diceware-wordlist. So you repeat this a few times until you have a list of 8 or so words which becomes the passphrase you use to encrypt your wallet. Write it down, it is always hard to remember at first. So at level-1 your list becomes:
  1. Download Bitcoin Core
  2. Launch the downloaded installer and install the app
  3. Launch the installed "Bitcoin Core" app and let it run overnight
  4. Choose Encrypt Wallet from the Settings Menu
  5. Enter your 8 word (or so) passphrase generated using the Diceware method

Wallet Encryption Dialog

Tech Skill Level: 2 (enable pruning if needed)

Though I said "300 GB of space isn't hard to come by", some times it actually is. If space is an issue, a simple way to fix it is to tell bitcoin to simple take less space. This is called "pruning" and can take that number from 300 GB down to below 5 GB. If you can't find 5 GB, then you'll have to read ahead to level-3 to add USB storage. But the good news is, enabling pruning is pretty easy, we just add another step to our working list:
  1. Download Bitcoin Core
  2. Launch the downloaded installer and install the app
  3. Launch the installed "Bitcoin Core" app and let it run overnight
  4. Do the wallet encryption steps here if you wish
  5. Choose Options from the Settings Menu
  6. Choose Prune block storage to: and select the max size for the blocks to use
  7. Exit and restart the bitcoin application for the changes to take effect

Pruning Dialog
Note, even setting this to 1 GB will still leave you with about a 4.5 GB install. The blocks take up a lot of space, but the chainstate and other folders eat up at least 3.5 GB and they can't be pruned. Also, be aware, to disable pruning requires you to perform the entire IBD again. While pruned some other functions my be disabled as well, so just know that pruning does limit some functionality.

Tech Skill Level: 3 (verify the installer)

Although this is arguably something that should be done at level-0, some find the intricacies of comparing hash (thumbprint) values to be tedious and beyond the scope of a beginner. You will find these types of hash compares suggested quite often as a way to prevent running tainted programs. Programs are often tainted by bad disk or network performance, but most often, taint is malicious code inserted by viruses or malware. This is a way to guard yourself against those types of attacks. What I cover here is a very basic comparison on the certificate, but a more thorough comparison advised by mosts uses a program called Gpg4Win, and is beyond the scope of this beginners guide. But regardless, most users should strive to do this minimum level of validation.
  1. Download Bitcoin Core
  2. Launch the downloaded installer
  3. When prompted "Do you want to allow..." click Show more details
  4. In the details section select Show information about the publisher's certificate
  5. In the certificate window select the Details tab
  6. In the Details tab Subject should start with "CN = Bitcoin Core Code Signing Association"
  7. Also ensure Thumbprint reads ea27d3cefb3eb715ed214176a5d027e01ba1ee86
  8. If the checks pass, click OK to exit the certificate window and Yes to allow the installer to run.
  9. Launch the installed "Bitcoin Core" app and let it run overnight
  10. Do the wallet encryption steps here if you wish
  11. Do the optional pruning steps here if you wish

Certification Validation Windows
Note: The certificate used to sign the current Bitcoin installer is only valid from March 2020 to March 2021. After that point the thumbprint on the certificate will change. This is by design and intentional. If your reading this post after March 2021, then it is understood that the thumbprint has changed.

Tech Skill Level: 4 (use secondary storage)

We glossed over the "new machine with fairly good internet" part. Truth me known many people do not have fairly new machines, and find the IBD to take longer than the "over night" best wishes. For most people the slowdown is the disk access when calculating what is called chainstate. This requires fast random reads and writes to the disk. If you have an SSD disk, this will be no problem, but if you have a non-SSD "spinning" disk, random writes are always slow. Though an SSD will speed things up, they are pricey, so a nice middle ground may be a simple high-end USB key drive. You can get some with 10 to 15 MB/s random writes which is usually a order of magnitude faster than a "spinning" disk. And with pruning (see level-2), a small USB drive should be fine.
Once you decide on a drive, the tricky part will be to enable external storage. It requires editing a configuration file and adding a few lines. The configuration file needs to be in both the default directory, and USB key drive, but before we do that, we want to create a directory on the key drive. You will need to determine the drive letter of your USB key drive. For the sake of this example, we will assume it is D:, but you must determine this yourself and correct the example. Once you know the drive letter, create a blank folder on the drive called Bitcoin. So for this example, creating Bitcoin on drive D: will create the path D:\Bitcoin. Once done, assuming that D: is your drive, here are the steps to edit the two configuration files:
  1. Download Bitcoin Core
  2. Launch the installer, verify it, then run it
  3. Launch the installed "Bitcoin Core" app and let it run overnight
  4. Do the wallet encryption steps here if you wish
  5. Do the optional pruning steps here if you wish
  6. Launch "Notepad" by typing "Notepad.exe" in the windows search bar then click Open
  7. Type the line datadir=D:\Bitcoin (depending on your drive letter) in the blank file
  8. Choose Save from the File menu in notepad
  9. Type %APPDATA%\Bitcoin\bitcoin.conf (note the percent signs) in the File name box
  10. Select All Files from the Save as type dropdown
  11. Click the Save button and overwrite the file if prompted
  12. Exit and restart the bitcoin application for the changes to take effect

Save As Dialog
Now that you've reached this level of technical expertise, there are many new configuration options that you can begin to modify if you wish. Most configuration data is contained in the bitcoin.conf file and learning how to maintain it is a key step for a node operator.

Tech Skill Level: 5 (all other customizations)

Here's a short list of various things you can ADD to your bitcoin.conf file. You generally just add a new line for each configuration settings.
  • addresstype=bech32
  • changetype=bech32
The addresstype / changetype allows your wallet to use the native-segwit (bech32) format. This is the most efficient and inexpensive way to spend bitcoin, and is a recommended configuration. The default uses something called p2sh-segwit which is more compatible with older wallets, but more expensive to spend.
  • minrelaytxfee=0.00000011
Changing the minrelaytxfee setting allows you to help propagate lower fee transactions. It will require more memory but TXN memory is capped at 300 MB by default anyways, so if you have enough memory, it is a good setting to choose.
  • dbcache=2048
The dbcache setting controls how many MB of memory the program will use for the chainstate database. Since this is a key bottleneck in the IBD, setting this value high (2048 MB) will greatly speed up the IBD, assuming you have the memory to spare
  • blocksdir=C:\Bitcoin
  • datadir=D:\Bitcoin
In level-4 we discussed moving the datadir to a fast external storage, but the majority of the space used for bitcoin is the blocks directory (blocksdir). Although you should always use for fastest storage for datadir, you are free to use slow storage for blocksdir. So if you only want to consume a small amount of your SSD (assumed D:) then you can keep your blocks on your slow "spinning" drive.
  • upnp=1
One of the harder challenges you may face running a node, is to get incoming connections. If you are lucky, you may find that your firewall and network HW support the uPnP protocol. If they do, this setting will allow bitcoin to configure uPnP to allow incoming connections to your node.
submitted by brianddk to brianddk [link] [comments]

The Different Types of Crypto Wallets

Cryptocurrency wallet is a set of private and public keys that validates the ownership of a digital asset (e.g. Bitcoin), and allows the wallet owner to send and receive digital assets or even store them. There are several types of wallets that can store your crypto holdings, some more secure than other, some are easily accessible and some are dedicated to certain assets. There are two types of wallets, Hot wallets and Cold wallets. The hot wallets are connected to the internet which makes transfers of coins and tokens faster and on hand, yet are more susceptible to viruses and hackers. The cold wallet refers to the cryptocurrency wallets that are offline. Generally cold storage is more secure, but are limited to a selection of coins and tokens you can store.
Software Wallets
Software wallets, as the name suggests, are downloaded and installed on desktops and laptops; they reside on a desktop which can only be accessed on that device where they are installed. They do provide a good level of security but many things could happen to your device, such as viruses or a hardware issue which could deny you access to the wallet, so its recommended to export your wallet private keys and store your login and password on a USB stick or on another device. You can re-install the software on a new device and use your login/password along with the exported private keys to access your funds. One of the most popular software wallets available for free is Exodus were you can store over a 100 cryptocurrency assets.
Paper Wallets
One of the first crypto wallets 1st used in the early 2010s which contains your wallet address, private keys and a QR code representing these keys, which eases the transfer and receiving of coins or tokens. Rather than typing each letter and number of the address which could be hectic, one can just scan the QR code and request or receive the asset. Paper wallets ensure security by preventing your private keys from being exposed online upon creation as its stored physically and not on a computer or online. Theoretically it is strong but physically it is weak, it’s great to have a free wallet that never exposes your private keys online at any point. A paper wallet is not made from a strong and durable material such as metal or plastic, paper can easily tear, burn, the print can fade away from sun exposer, it can get wet and even get lost. Therefore, many have considered this option of the past and are utilizing other safer options to store their cryptos. Here you can create your own paper wallet via the wallet generator.
Mobile/App Wallet
Mobile wallets are considered to be the most popular and commonly used type of wallets; they are apps installed on mobile devices and their main advantage is the swift accessibility to funds. Accessing a bunch of features such as sending, receiving, storing, spending. The user-friendly mobile wallet app like crypto.com has multiple services built-ins, you can do all the functions mentioned above, and you also have the option to stake your cryptos and earn profit, you can buy and trade cryptos to add to your existing portfolio at low fees and even request for a loan.
Many upcoming coins and tokens have used 3rd party wallets to store their coins or even have no supported wallets at the early stage which makes them fully dependent of exchanges to store their coins or tokens. Solid crypto projects typically build their own wallets at an early stage; during or post (ICO, IEO, public and private sale) when they distribute their coins/tokens to users. iOWNX is one of the projects that built a dedicated wallet where you can store both Ethereum and iOWN Tokens with several security measures to protect your assets. You can install the wallet app on both Apple and Android for free.
Hardware Wallet
Known as a “Cold Wallet” which is a physical device and considered to be the safest wallet. Hardware wallet securely stores your private and public keys and typically looks like a USB drive and is resistant to computer viruses. Long term crypto holders prefer a cold wallet as it remains offline most of the time. The wallets are made of metal and hard plastic with an input screen to insert your pin number and in case you lose the device, you can purchase another one and insert your 24-paraphrases known as seed key which was created on your previous device, and access your funds. There are several hardware wallets available in the market; the 2 most popular ones are the Nano Ledger that sell devices from $36 to $148 and the Trezor Wallet which goes for around the same price bracket.
Exchange Wallets
Exchange wallets access blockchain through a browser interface without having to download or install any software. The advantage of the exchange wallets is the ease of accessibility to funds if you are an active trader and require direct access to your funds to be able to trade, rather than transferring coins and tokens from a different wallet which could take some time and fees that disables you to instantly trade at a certain price. The downside of storing your cryptos on an exchange wallet is that some service providers hold and manage the wallet’s private keys on your behalf. Although this may sound more convenient for inexperienced users, it is surely not the best practice. When using cryptocurrency exchanges, you should consider that they provide a high security feature and protection tools such as device management, multi-factor authentication, anti-phishing code, and withdrawal address management. It is highly recommended to store the majority of your coins and tokens in a safer wallet and keep some on the exchange for trading purposes.
There are many types of wallets to choose from to securely store your cryptocurrencies, yet there is not a perfect wallet in existence. Your personal needs and requirements will ultimately guide you to the type of wallets that fits your need. If you are looking for a quick “send and receive” in a few taps then mobile app wallets could be an option. If you are more of a “hodler” and believe in long term store value then Hardware wallets could be the wallet for you. Presuming that you are a swing or an active crypto trader which requires your funds to be available on demand, then storing it on trading platforms and exchanges is convenient, as you can trade your coin or tokens for others and vice versa, instantly without the need to transfer, send and unlocking wallets to access your funds (which requires a bit of time and gas fees).
We hope that you found this guide helpful and that you will be able to find the right crypto wallet that fits your requirement. For more information, you can check out our video “Intro to Crypto Wallets“ which covers in details all types of wallets.
submitted by Iowntoken to u/Iowntoken [link] [comments]

Anonymous wallets to use with transferring BTC that don’t require Tails?

Cryptocurrencies confuse the living hell outta me lol. I’m new to this darknet scene, and only have the TOR browser and a PGP key with the 2-factor authorization on empire. I have coinbase downloaded currently, but i’ve read that that company is pretty sketchy to work with as they require your legit ID and banking info. I’ve been reading the DNM bible for weeks and can’t get a clear answer
So, my question(s) are concerned with what anonymous wallet i can use without Tails to transfer recently purchased BTC’s around anonymously. And, could i purchase BTC from coinbase and then transfer to another wallet then to the DNM? Or is that sketchy or idk. I’m confused.. Thanks for any help in advance!
submitted by keepthating to darknet [link] [comments]

If i boot ubuntu or tails from usb onto a compromised(hacked) laptop will the hacker be able to see or affect the non windows sections?

So i have an older Windows laptop I don't use because my system got completely pwned and it has some sort of virus, he has remote access to it (luckily the battery comes out so I never leave it in it) and he also has admin status on it (I don't)
Q: if I boot Ubuntu from a USB drive will he have access to that as well? And if I install Ubuntu as dual boot can he access the Ubuntu files?
Q#2: if I make a TAILS usb and boot that way can he still see or get to any files that way?
I know who did it.he WAS a friend until I figured that shit out. Dude litteraly hacked my parents computers and was veiwing our security cameras and then messaging me talking shit about it. And then I found out who he was. And then I found him... Lol
He's able to do Sim swapping and that level shit so he's pretty good I assume at these sorts of things. I found out over about a year or 2 that I was getting monitored then peiced it all together the day he tried pulling a (empty) Bitcoin wallet off my laptop.
Thank you guys and if your interested in the whole crazy story maybe I will make a full post About that 2 year ordeal of getting phones and entire networks pwned. Lol
submitted by fatbitchtangwrangler to privacytoolsIO [link] [comments]

Aussie Wallet

I am in Australia, been watching YouTube and learning about bitcoin and doing my best to understand some of the jargon. I understand that I am best off to set up my own wallet. Can anyone suggest which are the most secure and also cheap to transact in Australia. I will be buying in $50 -$100 amounts. Not looking to sell just slowly build. It appears you can get a wallet from google play store for your phone. Is this legit? Or is it more secure to have a wallet installed on my protected laptop?
Also people suggest you back up the bitcoin key to like a usb or similar. Or have a paper copy. This does not protect it from theft though from what I understand. If my hard drive/laptop was to be stolen or die is the information/key on the external backup enough that I can access it in a new laptop?
I am middle aged. However from about 2012 I have asked my kids about helping me to buy BTC. They are not seeing the potential I do and have zero interest in helping me get some. For a while I was a bit pissed about this. But now I realise I better get on with learning to do it myself.
submitted by redcherryblue to BitcoinBeginners [link] [comments]

How to Cold Store Your Cryptocurrency for Safekeeping

According to CipherTrace (which specializes in litigation tools and services for cryptographic markets), between 2018 and 2019, the amount of theft from cryptographic wallets exceeds $2 billion. Thefts and break-ins are caused by a variety of reasons: simple incompetence in cryptographic storage, as well as by companies that provide storage services. It is not unusual for holders of crypto currency to lose access to their wallets by themselves, one of the last known cases occurred in Ireland: ,57 million dollars couldn’t be confiscated from a detained drug dealer, which were stored in bitcoins. The problem was that the wallets keys were lost.
The most secure way is a cold storage — all account data and private keys are kept offline and all transactions are manual. This storage method is great because it is fully protected from hacking and interception of data, but it is not suitable for those who make daily transfers of cryptocurrency, it is simply inconvenient.
If you compare “cold and hot” wallets, you can give a simple example: A hot wallet can be compared to a wallet that can be lost and stolen. But you can always access your funds. A cold wallet is safe, and access to it is not permanent. You can also take or put money, but it will require a special code.
In this article we will tell you about the most popular types of cold wallets and we will analyze their pros and cons.

Types of cold wallets

All cold wallets have one common thing — the data is stored offline. However, there are several types of cold wallets, which differ in the degree of protection, physical embodiment and cost of the wallet.

Desktop wallet

Desktop wallets are also known for a high level of protection, in addition to the ability to store crypto currency offline. There are so-called “light” wallets weighing less than 1 gb, and “heavy” wallets weighing more than 1 gb. Two of the desktop wallets can be distinguished:

Exodus Wallet

Multicurrency wallet. It was created in 2016 and supports more than 100 crypto currencies, since 2019 has a phone application. The wallet allows you to export private keys that are created locally, and then to upload them back. Private keys can be discounted to removable media and downloaded only when the transaction is completed. If the user decides to leave private keys on the same computer where the wallet is located, keys are securely encrypted. In order to use your wallet ,there is no need to register or to download the entire blockchain — synchronization is taking place online. In addition to wallet services Exodus Wallet provides an integrated crypto-exchange. The installation file weighs 85 mb.

Bitcoin Core

Bitcoin Core is the official Bitcoin wallet. The size of the wallet is 160 gb, but according to the developers of the company, it’s better to give it a separate winchester with the size of 500 gb. From the security viewpoint, it’s suggested to install a security code or a seed phrase, which may consist 8 words. It is also suggested to copy wallet.dat file. — private wallet key, which will allow you to restore access to your funds.

Hardware wallets

Appears like a regular flash drive with an interface (screen, control keys). This wallet can safely store information about the balance and keys, full functionality is available only when connected to a computer, but the latest models have a special button that allows you to confirm the transaction without connecting to a PC. Each time the device offers to generate a new code-password to confirm the transaction, which significantly reduces the probability of hacking. After generating the code, you need to set a mnemonic phrase (seed) — it consists of 12 or 24 words, which are not related to each other in any way. Such type of wallets has a special protection system that allows you to connect even to potentially infected PCs. The wallets themselves won’t be affected by malware.
The obvious cons of hardware wallets are the following:
  1. It is also possible to lose a device that is so small in size.
  2. A physical device can easily fail due to a variety of damages.
  3. It is not recommended to buy such wallets from “hand”, even from friends, as they can be pre-installed with malware.
As you can see, storing crypto currency with a hardware wallets is very safe and secure, however you should take care about the device. Many people who hold a large amount of crypto currency, in order to not to lose a hardware wallet, store it in a safe deposit box, depriving someone of access to it.

Popular Hardware Wallets models

Trezor One

The first hardware wallet produced in 2013 by the Czech company Satoshi Labs. The device has an OLED display with a pin code, public addresses and Seed phrases. Trezor One has won recognition from users due to its multicurrency and affordable price ($65), it is also considered one of the most secure hardware wallets.
Ledger Nano S
The wallet was released in 2016 by the French company Ledger SAS. Distinctive feature from the other wallets, is the Secure Element controller, which meets banking standards and is certified CC EAL 5+. Also, in order to work with each crypto currency you need to install a special application for this currency on the device, it is not quite convenient, however more secure. The average price of the device is $85.
KeepKey
The purse was released in 2015 in the U.S.. Distinctive feature is OLED display — 256 by 64 pixels. Due to this, you can fully see both the address of the wallet, and the seed phrase. Also, the wallet has a built-in exchange service ShapeShift — an opportunity to exchange crypto currency without entering the exchange. The average price of the device is $50.
BitBox01
Ionos Schnelly’s wallet was invented in Switzerland. In size it’s almost the most compact among all representatives of the hardware wallets. A distinctive feature is the availability of a backup — the card can be multiplied and kept in several places, by analogy with the seed-phrase. In November 2020, support for these wallets will be discontinued, but all owners will be given a 30% discount on the new model. The average price of the device is $55.
CoolWalletS
Developed in Taiwan by CoolBitX, which has long been manufacturing components for Visa and MasterCard. As well as Ledger Nano S has a security standard CC EAL 5+. This wallet works only through smartphones, connecting to them through Bluetooch. The average price of the device is $100.

Paper Wallet

In the age of technological process, plain paper has become a rather reliable method for storing cryptocurrency. With the help of special services, such as bitaddress.org, you can generate public and private keys, then writing them down on paper. You can also print keys as a QR code. To accept transactions with such a wallet, you provide the sender with a public key. To access the funds, you need to find any online wallet that supports your crypto currency. Enter your private key into your online wallet, thus integrating your funds into the system. However, you should understand that after this procedure your wallet will become “hot”.
The best of this storage method — paper wallet is free, its safety depends only from you. When storing a paper wallet to protect it from the fire, water and aging. Also, do not tell other people about where your paper wallet is hidden.
The disadvantages of this storage:
  1. If your wallet is lost, it will be impossible to restore it.
  2. Exposed to a physical damage.
  3. After sending the transaction, you will have to create a new cold wallet.

Offline transaction signature

For this storage method, you will need two PCs. The essence is that the secret keys are never in contact with the Internet, but are stored digitally. Offline transaction method is suitable for people who do not make a daily transactions and have an access to two devices. The process is below:
  1. A hot wallet is installed on a PC with the Internet. The transaction is created without entering private keys and authorization.
  2. The file with transaction is copied and transferred to the second PC without Internet, where private keys are stored.
  3. The transaction is signed offline, copied and transferred back to the PC with the Internet.
In fact, you can do it with one PC and a USB drive. The USB drive will store private keys. Also, you can create a transaction without entering private keys and authorization, after disconnecting the Internet, connect the flash drive, sign the transaction, turn on the Internet. In this case, you should take care of the antivirus system.
The disadvantages of this method:
  1. Using two PCs or a USB drive involves a lot of actions, which is time consuming.
  2. You need to back up your keys in case your PC or flash drive fails.

Multi-signature wallet

This method implies the creation of a wallet, which can be only withdrawn on condition that the transaction is verified by a predetermined number of users. The maximum number of users who can hold private keys of the wallet- is 15. It is considered as one of the most reliable ways of storage, in fact private keys are not only stored offline, but also divided between different people. Often the wallet with multisignatures is used by large crypto-companies, whose management believes that individually employees can not spend the budget. Moreover, when creating this wallet, the number of required multisignatures is minimal. For example: if one of the six keys is lost, the remaining ones will be enough for the transaction.
The disadvantages of this storage:
  1. If most of the keys are lost, access to the funds cannot be restored.
  2. You will not be able to make transactions on your own without the participation of other key holders.

Private Key Fragmentation

The private wallet key consists of 64 symbols. The key is divided into several fragments. They don’t represent anything separately, but if you put all the fragments together, you can access the funds. The key fragments are similar to multisignatures, but in this case you don’t need a multisig-wallet, and the whole process can be done manually.
The disadvantages of this method:
  1. If one fragment is lost, access to funds will be lost.
  2. The maximum level of protection can only be reached when key fragments are distributed to different places, for example: bookshelf, safe deposit box, car. If you divide the key fragments and put them in different boxes — the required level of protection will not be achieved.
When writing down key fragments on paper, protect the key from fire, water and aging.

Conclusion

Digital currencies are not physically expressed and exist only in the digital code, so cold wallets that doesn’t have an access to the Internet, protect cryptocurrencies from the most important and common problem — hacker theft. However, holders of cold wallets need to understand that the safety of a private key depends only on them. There are different ways to store private keys outside the network, but each of them makes it difficult for the user to make transactions.
Hardware wallets that have been specifically designed for this purpose are considered to be the best option for storing cryptocurrencies. With their help it is possible both to store funds off the network and to make transactions easily, without risking the safety of a private key. If you use other cold wallets, it is recommended to combine them with hot wallets. Keep the required crypto currency for daily transfers on hot wallets, and keep all other crypto on cold wallets.
Please don’t forget to follow us on Telegram and stay updated!
YOUR CRYPTO BOSS
submitted by yourcryptoboss19 to u/yourcryptoboss19 [link] [comments]

Choosing The Best Multi-Currency Wallet For Crypto in 2020

Crypto differs from fiat in terms of storage. It is saved not in some kind of virtual bank, but directly in the blockchain. The coins, information on the distribution of digital assets between users, transaction history – all this data is stored by the chain. Such data cannot be changed or erased in any way. And without a crypto wallet, you cannot manage your assets.

Let’s have a look at different types of crypto wallets.

A cryptocurrency wallet stores your “private” and “public” keys used to send and receive various crypto tokens. The interface and design of the programs help users to get all the necessary information about their digital savings.
There are two types of wallets:

How do cryptocurrency wallets work?

Cryptocurrency wallets are not designed to actually store digital assets; instead, they provide the tools necessary to interact with the blockchain network. The wallet includes a public address, which is an identifier in the form of a set of letters and numbers. This address is a kind of location on the blockchain where you can send coins. You can share your public address with another user to receive funds, but you should never show your private key to anyone.
A private key provides access to your cryptocurrencies, regardless of which wallet you use. Thus, even if your computer or smartphone was compromised, you can still access your funds from any other device, provided that you have the appropriate private key (or seed phrase).

Types of wallets

Web wallet

This type of wallet is suitable for beginners, since it does not require the purchase of devices, software installation, or downloading the blockchain. It is enough for the user to register on the site. Web wallets are simple and convenient to use, they do not take up space on the HDD and are constantly synchronized with the blockchain network, even when your computer is offline.
Cryptopay enables customers to transfer money directly between their Cryptopay wallet and SEPA (Single Euro Payments Area) bank account, store their funds safely in a multi-coin portfolio, protected by two-factor authentication to increase security.
Coinbase is a trading service that many retailers use to receive digital currencies from sales. Private keys are stored on the server, and client funds are stored on a cold wallet. You can enable two-factor authentication and install the smartphone app.

Desktop wallet

The local wallet is installed on the hard drive and loaded with the operating system. Such wallets are divided into “thick” (full-node clients) and “thin” (light-node clients). Thick ones can take up to hundreds of gigabytes of hard drive space. Thin local wallet is actually a program that makes requests to the blockchain through a trusted site.
Bitcoin Core is a Bitcoin wallet created by the Bitcoin Foundation. If you want to get a truly secure place for your digital assets, choose this thick desktop wallet.
Exodus is a universal thin crypto wallet. It supports 100+ altcoins and has a built-in exchange service. Also, Exodus can interact with the Trezor Crypto Hardware Wallet.

Mobile phone and browser wallets

Mobile wallets are available through special applications. You can use them for shopping in real stores where crypto is accepted – just like ApplePay.
Benefits of Mobile Wallets:
Disadvantages of mobile wallets:
Coinomi is a multi-currency application with two integrated exchange services (Shapeshift and Changelly). The wallet supports 100+ virtual coins, the keys are stored exclusively in the application.
Browser wallet is an extension for Chrome and Opera browsers. It is very easy to use: you just enter seed phrases and get access to the savings.
The Jaxx extension for Chrome from the team of developers of the browser wallet KryptoKit, supports not only Bitcoin, but Ethereum as well.

Hardware wallet

This is the most reliable option for saving virtual assets. They look like ordinary USB flash drives. The user inserts a USB, logs on a wallet program by entering a password and thus gets access to the funds. All operations are performed not in the system, but directly on the flash drive itself, which eliminates extraneous access to data.
Trezor wallet supports most of the top coins, it can be synchronized with the MyEtherWallet online wallet, as well as Chrome and Firefox browsers to get access to crypto funds.
Ledger Nano S is miniature, safe, and easy to use and has several levels of protection. Asset management is performed through the Ledger Manager utility.

Paper wallet

A paper wallet is a piece of paper that usually has QR codes that can be quickly scanned to get the address to a crypto account. The main advantage of services like BitAddress and Bitcoin Paper Wallet is that the keys are actually stored offline, which makes them immune to hacker attacks. The main drawback, however, is that the paper wallet can be stolen or lost.

Which wallet is the safest?

An offline crypto wallet is the most reliable one. You can install a local wallet on a PC that is not connected to the Internet and store your digital assets on it, but this is not very convenient if you need to quickly complete a transaction.

Conclusion

The choice depends on how you plan to use your tokens. Small amounts of crypto can be stored on thin local or Internet wallets, and for long-term storage of large amounts, it is better to get thick or hardware wallets. In any case, remember to strictly observe all security measures.
submitted by CoinjoyAssistant to u/CoinjoyAssistant [link] [comments]

DONT LOSE YOUR TRX LIKE I DID😩

I wish I didn't do this mistake but I did, and even though nobody will blame anyone but me...
(I know I do for the most part, but I also partly blame Google)
You see I've been using tronlink in chrome for about a year now and I made around $130 from 20 dollars worth of bitcoin I got from coinbase earn program. AND I LOVE IT!
The only thing is the mnemonic keys that I struggle with, I used to store them on a USB, this wallet was no exception, recently I lost this USB due to becoming homeless for awhile and as stupid as I am I carried the USB in my jeans during a rainy winter. (My grandmother, mom and dad all offered me a place to stay so no worries guys) still had my old PC drive at my dad's house from selling it when I was tryna make some bank so I installed it a couple days ago and got back to grinding TRX, bought some BNKR daily+ and so on..
Anyways my girl was using my computer today for finding a part time since we both lost our jobs this year...
and signed in on her Gmail which made her gmail the standard gmail for the CHROME PROFILE(Note this!! Its the little circle next to the extensions in the chrome browser)
So I googled how to change this, I thought I would backup my private key once I was done, should've done it days ago but didn't think of it until today when she was messing around in my browser (Yes I got really nervous since she isn't very computer friendly 😂)
So I stumbled on Google's support tickets and a top answer told me to just delete the chrome profile and setup a new one since history and bookmarks would come back once I signed in...
(They didn't btw, you need sync activated for that, however when you remove the profile it doesn't say that, it just says that you can log on again and it comes back)
But here's where the warning comes in: IT ALSO REMOVES ALL EXTENSIONS! and it says itself that if you dont have your key you won't be getting your wallet back.
Some steps you can take to avoid this situation:
  1. Saving your key somewhere you can access it remotely, like in an email to yourself or in a private document on the cloud.
  2. If you're on windows backup the chrome "Users" folder in the appdata directory (a quick Google search will show you how)
  3. Turn on autobackup on your PC so you can revert the users folder if necessary.
  4. Write your key on a piece of paper and store it somewhere it won't move or be damaged, like a safe or with your mom like I did (she studied to be a lawyer so she's amazing with documents)
  5. Store your trx on binance so you can login using email and recover password if you lose your wallet.
Thanks for reading guys, if you wanna make my day you can donate anything to:
TPYLfp4Xv38Ji61uS2Cg9bV8p9fj1Wb1j8
TL;DR
If you remove your chrome profile on chrome and dont have a backup of anything you will lose your wallet! Your chrome profile is the circle next to the extensions in the chrome browser. (To be extra clear: its to the left of the three dots in the top right corner where you go to settings, history and stuff like that)
Thank you all for letting me be a part of this community and I promise I have 3 backups and stored my key in like 5 places so this won't happen again. I even made a backup of this post if I would accidentally close it 😂
Much love, peace! ❤
Edit: so I found the mnemonic phrases! Turns out I had them on my second drive aswell, but all it shows is 5 empty wallets, I've only had 3 wallets and I have 3 mnemonic phrases... what. The. ⁉️⁉️
submitted by TheRasmusHansson to Tronix [link] [comments]

A simplified guide to the market process

A simplified guide to the market process

📷
here is a link to the dnm bible
edit: A user suggested that this post should include the step to install tails. The reason I didn't include it was because the dnm bible already has a very large section about tails.
I am not, in any way, discouraging people from installing tails. If this section sounds like I am against people using it then I apologize, it is not my intention. I am just giving the steps to get online in manageable pieces, rather than throwing all the content at a new user all at once.
Regardless, I agree it should be part of everyone's setup. It provides more security, and there is assistance on darknet and tails. here is the link to download tails.
Here is the documentation for tails, with a guide to installing and troubleshooting.
I will split the list into two sections, 'A' and 'B'. Section A will be for people who are just browsing, and for new users to understand how to process will work. Section B will be using tails.
you will use the tor browser to reach the market sites. It can be downloaded here.
you will need a program to encrypt your address. Kleopatra, which is part of a suite of programs called 'gpg4win' can be downloaded here
here is a guide to use kleopatra, which is the specific program that you will use to import vendor keys and encrypt your address.
To buy bitcoin anonymously, you can use paxful.com, or localbitcoins.com. Look for a vendor with a good transaction history and reasonable rates.
To store your bitcoin, since it is best to send it from the source you buy it from to a wallet you own, instead of straight to the market, use electrum wallet.
UPDATE: Im thinking that you may want to use monero. In that case start here to install a monero wallet. You will still probably have to buy bitcoin to exchange for monero. Ive seen most people say to use morphtoken to exchange btc to xmr. I've been using changelly.com, but whatever exchange that works best for you should be fine.
Section A
Your basic steps, which will be outlined more in the dnm bible I have linked to above will be:
  1. download and install tor
  2. download and install gpg4win
  3. go to dark,fail (put a period instead of a comma) for links to markets
  4. create an account for a market
  5. download and install electrum bitcoin wallet
  6. buy bitcoin from source of your choosing
  7. send bitcoin to your electrum wallet
  8. look up the product you want and get pricing
  9. send sufficient bitcoin from electrum wallet to your market account
  10. copy the vendors pgp key and import it into kleopatra
  11. encrypt your address using the vendors key
  12. paste your encrypted address into the order page and confirm
  13. wait for package
Section B
Using tails (which is highly recommended) steps would be:
  1. Install tails on your usb drive
  2. if tails does not boot, check UEFI/secure boot setting.
  3. boot into tails
  4. configure your network connection so you can access tor
  5. follow the steps above (In section A) from step 3 onward. You will not have to install anything as instructed above, because tails includes the programs you will use.
  6. You will use a program included on the tails OS other than kleopatra to encrypt/decrypt pgp messages. Here is a guide to that program.

submitted by FBI_Agent_37 to darknetred [link] [comments]

Hide and Seek

An old friend of mine emailed this to me a while back with the subject line “Hide and Seek” and I’ve been hesitant to post it for reasons that should become obvious as you read it. That said, I feel that enough time has gone by for this to be safe so I’m going to post it here. The only edits I’ve made were swapping out names and formatting, otherwise it’s all exactly as he sent it.
T, if you’re reading this then message me. I want to know if you’re alright, and if you are I know you’ll be looking for this story to show up.
This is what the email said:
Rijento,
I’m writing this story because I feel like I need an outlet. I swear to god that you better actually check your email for once in your damn life!
Please…
As for if you actually are reading this, I want you to wait as long as your (admittedly) better judgment tells you to wait and then post this story online. I know it’s a bit vain, but I want people to know my story. Hell, it might be the last one I ever tell. Double hell, it might actually even help some poor soul out.
I’m going to disappear after sending this, hopefully the good kind of disappear and not the death kind. I know nobody but you is going to believe this story but damn if typing this out didn’t make my sorry ass feel better. You were right about that man, I’m sorry for giving you shit for writing so much…
This is the attached file. “Hide and Seek”:
Before I get in to the ‘hiding’ and ‘seeking’ I have a bit of a confession that needs to be made. I work as a transporter for a deep web black market site… I hope it doesn’t change your opinion of me too much, sorry for not telling you sooner.
I’m the guy they call when they get an order for something they can’t send through the mail. Guns and live animals are two good examples. You’d be pretty hyped to know how many rich assholes just order lions and tigers from the dark web.
For obvious reasons, I can’t go in to too much detail, I don’t want to make any dangerous enemies and even after this I still don’t want to lose my job. It’s a pretty sweet gig all things considered, all I have to do is pick up from the seller and deliver to the buyer. I can even choose what jobs I want to take, lets me cling to what little principles I still have. And I DO have principles. After a few years working for the site, my two rules were: no people and no crossing borders.
Anyways, I got into a bit of a bind with the cryptocurrency crash that happened early this year. The site mostly pays in Bitcoin and, well, I decided to let my wallet sit and grow. By the time I realized what happened, my savings were destroyed. Nobody expected it to crash that hard… And it probably wouldn’t have been as much of a problem if I hadn’t also gotten used to living a life full of the finer things. I didn’t really ‘save’ all that much to begin with either. So when my savings finally ran dry and the market was still down, I decided to… Lower my standards a bit and take a riskier, higher paying job.
Organ transport.
I haven’t done it before… I hadn’t been that broke in a long time. Organ jobs pay well too, and I figured I still wasn’t strictly breaking my ‘no people’ rule if it was just their organs. So, I hopped on the site and browsed through the pitiful number of requests in my area till I found what I was looking for. A rich buyer who: had shady connections, was in need of some organs, and lacked either the time or patience to wait for them to come legally. As far as these sort of requests went, this was pretty much the norm from what I’d heard. So I accepted the job and got an email with some additional details about the order: the customer needed two kidneys (which was what I was to transport) and a liver (which they had made a separate request for).
From what other people on the site have told me, what should have happened was the job would move to the ‘seeking seller’ section and I’d be on hold till someone… ‘_acquired_’ the kidneys.
What actually happened probably should have tipped me off to use my monthly free withdraw… I got a notification two hours later that there was a seller.
Rijento, I don’t know how much you know about medicine, but if you do know anything then you’re probably squirming in your own skin about right now. For those who may or may not be reading this that are not in the know, not only do the donor and receiver have to have compatible blood types but kidneys only last about a day outside of a warm body.
Not exactly a product you can stockpile.
I got another email, about the pickup this time, and began the internal debate between the bad feeling in my gut and my empty wallet… You can probably guess which one of them won out… Anyways, I planned my route; one hour to get to the seller and four hours to get from there to the buyer. I sent the site my plan and within minutes they approve of it and set up an actual meeting point. I sighed and grabbed my things, trying to swallow my nerves the entire hour it took me to reach the meeting point.
I sat down on a bench in a city park and waited for what seemed like ages before I felt someone staring at me. It took me a solid minute to pick out who it was even though there were only a few people around. He was sitting with his back to me at a picnic table about ten yards away from me and whenever I looked away I could feel his eyes on me. When we eventually did make eye-contact he bounced excitedly in his seat and waved me over; my heart sank as he also slid a small case into my line of sight.
I forced myself to smile, walked over, sat down, and hid my annoyance. Most of the buyers on the site were practically carbon copies of each other. Probably because you could only become a buyer if another buyer knew and endorsed you. The sellers, on the other hand, were all certifiably insane.
None of the other transporters I’d chatted with had ever met with a ‘normal’ seller. Because of this, all of them quickly learned to keep conversation to a minimum and to not under any circumstances piss any of them off. I decided to follow in their example.
The man sitting in front of me looked friendly enough, overly so if anything. He was scrawny, didn’t look like he would be strong enough to… well… kill someone and harvest their insides. He had a strange smile on his face, and even now I can’t get it out of my head. The kind of overly friendly, wide toothed smile that mothers warned their children to stay away from. It somehow managed to be both inviting and creepy at the same time.
I smiled back and spoke up, “So you’re the seller then?” I asked, and the man nodded.
He nodded and responded in a sickeningly sweet voice… He sounded like a child in a toy store, his voice strained with excitement and wonder as he droned on to his parents about what toys he wanted.
“Oh I’m so glad you found me. For a minute there I thought I’d have to call ‘olly olly oxen free.’” He said with a pleased sigh, pushing the case to my side of the table. “You know… Over the years I’ve gotten quite good at playing hide and seek. So good, in fact, that I’ve never been found. Not. Even. Once. Do you want to know my secret?” the man asked, his voice still just as unsettlingly sweet as his smile.
“Sure, what’s your secret?” I asked. I really, really didn’t want to know what the hell he was talking about; but if it kept him happy then…
He clapped rapidly and bounced in place, “Oh I’m so glad that you’re a curious one. My secret is that the seekers never know that they’re playing.”
“Makes sense…” I said, opening the case momentarily to verify. Two kidneys in pristine condition, doused with preserving fluid, wrapped in plastic. and packed in ice. “If the seeker doesn’t know they’re playing then how would they know to start looking?” I said, leaving out the fact that it would just be stalking at that point before swallowing hard when I thought about where these kidneys came from.
“You’re a smart one…” he said with a smile as I sent a message confirming the pickup. All that was left was to wait for the transaction to process. “I was worried about this last one though… she came right up to me. This. Close.” he said, leaning in till our faces almost touched.
I struggled to keep my composure, and managed to keep from jumping or pushing him away. “So what did you do?” I asked as he leaned back, my suspicions about these kidneys being all but confirmed.
“Why, nothing of course…” He said, a slightly bewildered expression on his face. He looked as though I just asked him how to breathe. I glanced down at my phone to see if the transaction had been verified yet and he snapped his fingers like he remembered something. “Oh I must apologize!” he said, making me look up, “I forgot that you don’t play much… I simply held my breath, closed my eyes, and wished that she would just… go away.”
“You’re right… You are good at hide and seek...” I said, wishing to myself that he would just go away and hearing the familiar ding of a successful transaction sound on both of our phones as if to answer my prayers. I reached out my hand as a formality and he grabbed it and shook it vigorously. I forced a smile and stood, although what he said next made my blood nearly freeze.
“You’re the first person to find me in oh so long…” He trailed off as he said it, his voice slowly shifting from that of an exited child to the cold blooded maniac that he was. “Maybe my games won’t be so one sided from now on,” He said, his voice disturbingly normal. Although, even without looking back I could tell that the same sickeningly sweet smile was glued to his face. I kept walking but waved my arm as though saying goodbye.
The worst part was that I could feel him watching me as I walked back to my car… Not just at first, like if he was watching me leave, but the entire way back, and even as I got in my car. I took a moment to look around and sighed as I saw nothing. It might not sound like much to you. I don’t know, I can still hardly describe it myself, but he had this… creepy way of getting under your skin just by talking to you.
I wrote it off as me just being paranoid, the guy harvests organs from people for a living so of course everything he says is creepy. I groaned and started my car, but it wasn’t until I hit the freeway that I was finally able to shake the feeling of his gaze. It’s not like he could’ve been following me, by then I was already paranoid enough to be checking for that, making a few detours just to be sure of it.
And because of my detours, I ended up being about an hour past the scheduled drop off with the buyer… Lost my chance at a tip for sure, guy was furious and there was nothing I could tell him to calm him down. I’m pretty sure, ‘sorry I’m late, but the seller was a total psycho and I wanted to make sure he wasn’t following me,’ wouldn’t have been a very good excuse.
Whatever, I had my money and the buyer had his organs and plenty of time for whatever operation that used them. Not much to complain about on either side, well except for the fact that I already knew I wouldn’t be sleeping that night. Especially because the feeling of being watched had returned as soon as I set foot out of my car which was, again, impossible. The site never tells the sellers anything about the buyers or transporters, so there’s no way he could have known where I was headed to and no way that he could have followed me.
I hopped back in my car and started to head for home, hoping that a few tabs of melatonin would be enough for at least a few hours of sleep. And again, I could feel eyes on me as I drove and I saw his eerie smile everywhere until I hit the highway. I felt a weight lift off of my shoulders then, although I made sure to take the most winding path home that I could afford gas for (which was quite a bit after a job like that). By the time I did get home it was starting to get dark, and I had made a few loops around my apartment just to be sure I didn’t still feel his eyes on me.
Luckily, my apartment building has a public parking garage attached to it so even if I was being followed I felt safe enough that nobody would be able to find my room. But Just to be sure, I took the stairs for the first time in months.
Have any of you ever climbed seven flights of stairs out of paranoia before Rijento? Well in case you haven’t let me tell you what it’s like. Do you remember running up the stairs from the basement after turning off the lights as a kid? That feeling of unease and terror? Well it’s like that, but you aren’t a kid anymore. It’s not the dark or what imaginary monsters could be lurking in it that frightens you anymore. Instead, you’re worried about who could be hiding in the darkness, what real monster could be following you up those stairs… I’m no slouch when it comes to exercise but it still drained everything out of me hauling my body up those stairs on my hands and feet like an animal as fast as I could.
I got inside and locked the door securely behind me, panting, covered in sweat, but I sighed in relief with the fact that I hadn’t felt anyone watching me at all during my climb. I took a moment to catch my breath, slumping down by the door and chuckling to myself while shaking my head. I couldn’t believe that I’d let that freak get so deep under my skin.
Once I had caught my breath, I stood up and made my way to my couch before flopping onto it. I wanted nothing more than to go to sleep then and there, but I had to be smart with my money this time. I immediately cashed the Bitcoin out. Better to pay myself out in small increments, but I had bills to pay and I’d already learned my lesson about leaving things in Bitcoin.
Once business was taken care of, I grabbed the remote control and flicked on the TV. The familiar faces of the local news anchors greeted me and I began drifting off to sleep while listening to the happenings of our city.
It was around seven a.m. when I was woken up by the sound of the ‘breaking news’ alert coming on.
“We are just receiving reports of a ghastly murder of one [yeah, I’m not gonna put her name or age here] year old college student living on her own. Police investigators say that several of her organs were found to be missing and that they found evidence of someone living in her home without her knowledge for quite some time before the murder…”
The reporters kept talking about how much of a tragedy the situation was… But I wasn’t listening. How could I listen…
I’ve never been less happy to be right then I was at that moment. I shuddered thinking about it. My thoughts and paranoia regarding the man I’d met the other day bubbling back up to the surface. It was then that the reality of what I’d done hit me like a freight train. By accepting that contract I doomed that girl to die… All because I needed some quick cash.
I stood up and went to the kitchen and opened my liquor cabinet. Without looking, I grabbed a bottle of something with shaking hands and fumbled with the top while trying to keep my mind clear of thoughts. Once I had the cap off I took several deep swigs from the bottle, spilling quite a bit down my chin before I set it down and gasped for air.
The burn of the alcohol in my throat gave me something to focus on while it worked its magic on the rest of my body. As my mind slowly clouded I found my way to a chair and found it easier to think about what happened without panicking.
My first thought was that I needed to do something. I knew the guy’s face, I should go to the cops! It was at this moment that the… Less impulsive side of my brain kicked in. I go to the cops and all I do is give myself a one way ticket to an early grave. My employers don’t take kindly to police interactions.
I slowly resigned myself to the fact that I was going to have to live with the consequences of this job for the rest of my life… I’m a coward, I know.
Anyways, the next few days passed by slowly. I was… Not in a good place mentally and I’m sure you remember how much alcohol my cabinets were stocked with. I blacked out more than once only to wake up gasping for breath from drinking too much. It was honestly a miracle that I didn’t kill myself through alcohol poisoning.
But I… Managed to come to terms with everything. Don’t get me wrong, I still had nightmares where I was the guy hiding in that girls closet… But I wasn’t drinking my problems away anymore, although I think that was more because of the fact that I’d run out of liquor than any meaningful character development.
It was about a week later that I was able to get my first night of actual sleep. I didn’t dream about anything either so that was a plus. I know it probably sounds bad, but I was starting to feel normal again… Like I could maybe find a way to just be myself…
Either way, even after all that I still wanted to keep my job. I just added a new rule: no organs.
From there I fell back into more or less my old routine. I went to eat out almost every day though, I thought any excuse that got me cleaned up and out of my place was worth taking…
And then, I began to feel it again. That skin-crawling sensation of eyes on me from somewhere that I felt the day I met Mr. Hide&Seek. I didn’t think much of it at first, I only felt the eyes when I was surrounded by other people so of course one or two would be looking my way right? I thought I was just guilty and paranoid.
But no matter what I did, I would always feel like I was being watched whenever other people were around. So I started driving more and more and eating out less and less. Not driving anywhere in particular, just driving… I felt safe on the open road, I couldn’t feel any eyes on me… For about a week.
It started small. A shiver down my spine here and there. A sharp sensation that made my eyes snap to one car or another. Then it came more frequently, and I began to get more and more paranoid as the feeling became stronger and stronger.
I started driving less and less, and whenever I did, I kept my eyes on the cars around me. Trying desperately to find where that feeling was coming from. To find who was watching me… Trying to catch a glimpse of his face in a passing car.
I even thought I did see him a few times… Except that was just paranoia… I hope.
Eventually, I stopped driving unless I had to. I shut myself in my apartment, only going out to get groceries and always, always making sure that I didn’t feel anyone watching me before I parked. But that feeling would always find me whenever I went out.
This went on for about a month. I started to drink again, I didn’t go out to eat or drive anymore. I paid someone to deliver my groceries to the garage of my building. All I did was eat, sleep, drink, and watch movies or play games… I’d be living the dream, if I didn’t think a serial killer was stalking me.
Part of me believed that I was just being paranoid and to be honest I desperately wanted to believe that part of me… But not enough to stake my life on it. And after another week of living like a shut-in the feeling of being watched started to re-surface.
Like before it started off small. I felt a ping of eyes on me and from then on I kept the blinds securely closed. Even then, the feeling persisted for days, gradually gathering in strength. So I emptied out all of my closets and cabinets daily… Eventually I just left all of the doors open and everything on the floor so that I could look in to any hiding spot in an instant…
But that feeling still persisted.
I stopped drinking because I was terrified of being attacked. I started sleeping less and less and when I had to sleep, I slept inside of my closet and barred the doors shut from the inside. I ate and drank only when I felt hungry and always with my back to a corner of the room or locked in my closet… But I could still feel eyes on me, feel His eyes on me the same way I had back at the park.
It was about a month later when I finally discovered my haven. The one place left that I didn’t feel watched. The stairwell of my building. I found that whenever I went down and back up the stars to get my groceries – as I’d long since stopped using the elevator – that I would have a brief respite from the feeling of being watched.
I started to spend all of my waking hours there, sat on one of the stairs without a care in the world. I only left them to eat and sleep and whenever I entered the building proper I would feel eyes on me almost immediately. But having those stairs to return to made my life almost bearable. It had been a long time since I had anywhere I felt safe, and like every place before it I kept waiting form the feeling of being watched to follow me into the stairwell…
But it never did.
For another month, I fell into a somewhat bearable rhythm. I’d wake up in my closet feeling watched, I’d eat in the corner of my kitchen feeling watched, and then I’d scurry off to the stairwell where I could blessedly feel alone – Especially near the top floors where the stairs were seldom used.
But all good things must come to an end and all that, and while I never did feel watched in the stairs, I did run out of money. Apartments and cars don’t pay for themselves after all, and while I managed a few months on the blood money from my last job it was finally time to get back to work.
In the months since I last logged on to the site, things had calmed down significantly and there were now plenty of jobs that didn’t break any of my rules… So I decided to go with a route that I’d done before a couple of times. A gun run. The seller always treated me to a drink or two at his bar and was also always well armed so I felt that it would be a nice and easy job that I could feel safe doing.
After confirming the job I closed my laptop, pulled on a fresh set of clothing, and headed out the door. I wanted to get this over and done with, and thankfully the feeling of being watched was rather light that day. I do admit, however, that I lingered in the stairwell for a bit before heading out. I wanted a bit of time alone before being out in the open for the first time in months.
Anyways, I hopped in my car after about thirty minutes of blessed stairwell time and headed to the bar. After about two hours of paranoid and twisting driving I managed to make it just on time and pulled my car into the alleyway behind the bar.
The owner greeted me with a smile as I got out of my car, “T, long time no see!” he said, his smile fading as I walked up and he got a better look at me. “Holy shit man, are you feeling okay?” he asked, genuine worry in the eyes of the large man.
“No… I’m pretty far from okay…” I said with an exhausted sigh. I could still feel the faintest hint of eyes on me even now, though I know that the owner wouldn’t let me be jumped at his bar. “It’s a long story,” I offered, realizing for the first time that it might be nice to actually tell someone what happened.
“Is that so.” he said with a hint of a smile and a shake of his head. “Well, hows about we get you a drink while the boys get ready to load up your car.” He offered in return, making me smile. “There’s always plenty of time for stories at my bar.” He said proudly.
“I’d like that…” I said with another exhausted sigh, managing to keep the smile up as he put an arm around me and lead me in the back door of the bar.
“Oh, by the way, how did you hold up during the bitcoin crash? I heard it hit a couple of transporters pretty hard.” he said, making me chuckle as we made our way through the kitchen.
“Funny you should mention that,” I said, making him raise an eyebrow, “because that’s how my long story star—” I began, only to stop short when I looked at the bar.
HE was siting there, sipping on a beer without a care in the world. He noticed me out of the corner of his eye and that same sickeningly sweet smile crept onto his face as his eyes met mine.
I froze. There was no way that this was a coincidence. There was no way that he just happened to be at this bar at this time.
I was broken from my trance by the bar owner waving his hand in front of my face and saying my name, “Hello? T, you alright?”
I quickly ducked back into the kitchen and started to hyperventilate. How did he know? How could he possibly have known that I would be here? Did he follow me?
“Did who follow you?” The owner’s voice brought me back to reality once again as I realized I’d been thinking out loud. His face was concerned, bordering on scared.
“How long has that guy been at the bar?” I asked, hoping that the owner knew who I was talking about.
“If you mean tall, thin, and creepy then about an hour… What is going on T?” He asked, as I slumped against the wall.
I started crying. I broke down and burst back into the bar only to see that Mr. Hide&Seek he was already gone. “I… I need to go. I need to get home!” I said, pushing past the owner and running to my car. He called after me, trying to get me to stay and explain what the hell was happening but I wasn’t listening. For all I know, Mr. Hide&Seek could be breaking in to my apartment already.
I drove straight home and threw open the door to my apartment. It had still been locked, but I wasn’t taking any chances. I grabbed a knife from the kitchen and checked everywhere. But he wasn’t there.
Then, my phone rang and scared the living hell out of me. I checked the number and gulped when I saw that it was blocked. I considered not answering but in the end I picked up the call.
“H-Hello?” I asked tentatively.
“T… What the hell happened at the bar?” a modulated voice rang through the speaker in my ear, making me wince. It was one of the site admins for sure.
I was silent for a moment before telling the admin everything. I couldn’t see the man, but I could feel a sudden change when I mentioned seeing Mr. Hide&Seek at the bar.
“T,” the admin began, a serious edge to his voice. “I need you to log in to the site… _Now_” he said, and something in me told me to listen. I booted up my laptop and hopped on to the site. As soon as I logged in a dialog appeared that I’d never seen before.
ADMIN would like to take control of this computer. Do you consent to this?’ With two buttons. One for yes. One for no.
I clicked yes and watched as my cursor began to move on it’s own. “Thank you T. This will only take a moment…” the admin said, a practiced calm in his voice as he downloaded several files and began to do… Something on my laptop.
A minute later a dialog box popped up that said, ‘Threat detected!’ and the admin sighed and his voice sharpened as he spoke. “T… You’ve been compromised. You’ve had a nasty piece of spyware installed on your machine, for about a month by the looks of things. It’s been recording your keystrokes and giving someone remote access to your camera…” the admin explained, making me gulp as I realized that all of my information was insecure.
“B-but, there’s no way! I haven’t download anything!” I said, making the admin mutter something as a bout of typing could be heard coming through the phone.
The admin’s voice was cold and calculated when he spoke next. “No… No you didn’t…” he said, making me gulp. “This software was installed via _USB_…” the admin said, making my heart nearly stop.
Hide&Seek had been in my home! He had been here without me noticing and put that program on my laptop. Even after all of my paranoia, he still found his way into my room without me knowing.
“I’m going to delete the program,” the admin said, and a few keystrokes later, “done… What the—”
As the admin deleted the program, thousands of windows began popping up on the screen of my laptop. All of them saying the same thing…
‘olly olly oxen free’
After that, I threw my laptop in the trash and got a new one as well as a new phone, sim card and all. I was taking no chances. I got all new accounts for everything and the admin told me he revoked Mr. Hide&Seek’s membership personally.
But I’m going to disappear all the same, I have a plane ticket to somewhere and my bags are already packed.
Don’t look for me, and if you ever start to feel like you’re being watched… It’s because you are.
submitted by rijento to DrCreepensVault [link] [comments]

What Is Bitcoin Private Key: Beginner’s Guide

What Is Bitcoin Private Key: Beginner’s Guide
Most of the people in this sub probably already know what the Bitcoin private key is and how it works, but there are many newcomers who do not fully understand all the technical aspects of it. I hope you guys will find it useful.

Bitcoin Private Keys: The Basics

Let’s start with some main principles.
  • A private key is functionally similar to a password to your email account. Unlike your email address, you never share it.
  • You need your private key to be able to receive the crypto someone sends you and to have access to your funds.
  • The BTC network does not store your private keys, they are generated and stored by the wallet software. There are different types of wallets.
IMPORTANT: The private key concept does not apply exclusively to Bitcoin. Other cryptocurrencies use it too.
Now, let’s see how a private key looks and works.

Bitcoin Private Key Definition

Bitcoin private key is an alphanumeric piece of code. It includes letters and numbers, just like your public address.
However, while a public address is like your plastic card number, a private key is like your CVC. You know, those secret three digits on the back of a card?
A private address is created in a random manner when you get a cryptocurrency wallet. The possibility of creating two identical private keys is almost zero, due to the sophisticated encryption algorithm, we apply for the purpose.
In the BTC network, a private key contains 256 symbols, as we obtain it using the SHA256 encryption algorithm. This function always returns 256 symbols, no matter the input.

Bitcoin private key in various formats, including WIF.

Wallet Import Format (WIF)

Using such a long string of code is inconvenient, so a private key is often presented in WIF (Wallet Import Format). It’s a shortened version that includes only 51 characters (numbers from 0 to 9 and letters in the range of A-F) and begins with 5.
Here is a Bitcoin private key example in WIF:
5Kb8kLf9zgWQnogidDA76MzPL6TsZZY36hWXMssSzNydYXYB9KF
WIF has a few advantages over a full BTC private key version. As we have said, it’s shorter and more convenient to use. Also, it contains special pieces of code that serve to check the address for typos and correct them automatically.
WIF associates with only one private key and can be easily converted back into it, using an established algorithm.

Encrypting Private Keys

If a key looks like WIF but starts with 6, it is an encrypted version of a private key. People encrypt keys to ensure an extra layer of protection. To obtain such a string of code, we apply another algorithm. To decode (decrypt) the key we need to enter the password that we set when we were encrypting it.

How Bitcoin Private Key Works

You probably know Bitcoin as a digital payment system. To explain how it works, it would be better to compare it to a web-messenger, with massages transferring value. These ‘value messages’ are BTC transactions.
And what role a private key plays in sending these financial messages?
Let’s take a look at a real-life example.

https://preview.redd.it/fgtn8h63veu41.png?width=1261&format=png&auto=webp&s=9855f9aba70ebe7ca1f02b32c160ae78b2b42400

Using Private And Public Keys For a Transaction

Imagine you are sending 1 BTC to your friend Bill. You create a transaction and indicate yourself as the sender and Bill as the receiver of this amount. Then, you will broadcast the transaction to make the Bitcoin network aware of it.
  1. You start by choosing a private key. Using a special encryption algorithm, you derive a public key from it. You send this public key to Bill.
  2. You create a message for Bill and sign it with your digital signature. To obtain it, you pass your private key through a special encryption algorithm and attach the resulting code to the message. Every signature is unique, and you can use the same private address to produce an infinite number of them.
  3. Bill receives your message, public key, and signature and passes it through a signature algorithm. If it’s the message you sent, the algorithm returns ok.
Why we need a digital signature in the first place? There are three reasons. First, it tells the recipient that the message is from the sender he knows. Second, a digital signature makes it impossible for the sender to deny he sent the message. Third, it confirms that no one has altered the message in transit.
Unlike a traditional signature, a digital one cannot be forged. To produce it, you have to possess a secret private key.
https://preview.redd.it/k8n0vcg4veu41.png?width=624&format=png&auto=webp&s=9ab6c0bc25c0a638c4d3bfdbf86056f5462aa7d0

Why Keeping Your Private Key Secret Is Important

As we have mentioned, anyone in possession of your private key can steal your funds anytime.
If your wicked colleague Alice gets your private key (because you carelessly left your paper wallet on your desk), she can use it to create a digital signature. She can then use that signature to sign a transaction that will look like yours for the network. For instance, Alice can send all your crypto to another address. You will never be able to cancel this transaction and you are highly unlikely to know that she made it.
For this reason, you should be very careful with your private keys. Never send it to anyone using a messenger, or an email client, or a social media channel. Don’t share photographs of your private key. Never store a private key in a Google Doc file.
Please note that some desktop wallet apps store your private key in a standard directory on your hard drive. This place is a honeypot for hackers who know you are a cryptocurrency user. That’s why it’s extremely important to have up-to-date anti-virus software installed on your device.
https://preview.redd.it/bg2zd50aveu41.png?width=723&format=png&auto=webp&s=0e692f5c73c7c68ea854342b7fbeaf6aaa62f71f
Also, you may encrypt this wallet file to make it immune to malware. Many wallet apps provide this option. You will have to set a password to decrypt the private key, and the hacker will have to break this password to do it. If the password is strong, it will be a really difficult and time-consuming task.

Where To Store Private Keys: Mobile, Desktop And Hardware Wallets

As we have mentioned, the Bitcoin network does not store these keys. Instead, wallet services do it.

Mobile Wallets

Some of them allow you to keep and protect your private key, others do it automatically, applying various safety measures like 2FA or encryption. Note that nobody is responsible for it, your bitcoins will be gone if the service is hacked.

Desktop Wallets

Desktop wallets may be a good option. They provide a BTC public and private keys in the format of a file that you can download and import. You can protect this file with a strong password and safely store it on a hard drive. Don’t forget about safe storage for this drive, too. For instance, use a bank vault for this purpose.

Cold (Hardware) Wallets

Hardware wallets are the safest ones. They are small USB devices designed to store your funds and private keys offline, away from anyone who could steal them. For this very reason, hardware (or cold) wallets are impossible to hack. If you accidentally lose, damage or destroy such a device, you can recover your BTC and private keys using a backup phrase. The best-selling models of hardware wallets are Tresor and Ledger Nano S, supporting several popular coins.

https://preview.redd.it/7wlozgvcveu41.png?width=803&format=png&auto=webp&s=9c438a47a47f6bb2ba5dbd4fdfba924e8c960f47

Paper Wallets

These wallets are sheets of paper with BTC private keys and public address printed on them. Paper wallets look pretty basic and not very innovational, but it’s a safe way to store your BTC-related sensitive data. The main reason is that they are not connected to the Internet and thus are unreachable for malware attacks. This format is also immune to many mishaps that can affect electronic devices. To create a paper wallet you use a special web service like WalletGenerator.

P.S. Check out our blog if you are interested in more articles on crypto and finance
submitted by EX-SCUDO to btc [link] [comments]

What if Bitkey but for Monero

I just learned about bitkey, and boy am I impressed. Like my actual point is that I think a critical fatal flaw in the crypto economy and bitcoin network is the reliance on centralized hardware manfufactures whose proprietary closed garden systems and also of course centralized exchanges. I think it's just a matter of time before Trezor and LedgerNano become targets, or some rouge intelligence agent releases to the darknet some tool to crack them or compromise them.
BitKey is a bootable system image based on Debian containing everything you need to perform highly secure air-gapped Bitcoin transactions. You don't need to install it to a hard drive because it runs live from RAM. You just write the ISO image to a USB drive or burn it to CDROM.
I'm a die hard open source linux open system advocate, and I think that bitkey is the right step in the right direction. And my point being, anyone who's a developer could make some version of their own to be audited by the public community. Eventually we would have a handful of publically trusted builds by different developers, and this could be done for the major cryptos, or any crypto, but especially monero since it barely has hardware support.
But the design of bitkey being an iso image on a cd rom or a usb, set to maximum privacy with two computers and a third device that scans QR codes. (on a side note there are security issues with QR codes, so that is one area for improvement).
I'm trying to imagine a world where people can't get safe devices, can't get hardware wallets, and need an open source alternative to compromised desktops. Obviously something as advanced as a linux OS build spread across three devices for airgapping has a learning curve, but UI can increase over time.
We have to remember there are a lot of tyrants in this world who want the monero and btc network to fail, want the fungibility and privacy and cash like nature fail, want to backdoor everything, they want to know if you're hungry, if you need to take a shit, before you even know, Minority report shit, but sadly unironically, and increasingly so.
Windows is the devil obviously, Apple even more so. We need a world moving towards Linux, RVISC chips, raspberry pis. Even the best intentions of cypherpunk and monero are very very vulnerable without the hardware to back it up. So there really needs to be a move towards this.
submitted by samdane7777 to Monero [link] [comments]

Cannot use TAILS on MacOS. Necessary for small purchase?

UPDATE: TAILS FAILS never worked for me. I don't think it works for Catalina. I found a simpler way to do transaction though: Buy BTC from local bitcoin ATM. One I used only asks for SMS #. You can use your cell to google temp SMS numbers. Tons of sites out there, none ask for registration. Get code sent to your burner #. Then use cash to purchase BTC. Depending on market you can probably send directly to marketplace wallet. Then you're good to go. Absolutely no paper trail then, 100% anonymous. Much easier than all this tumbling / Wasabi / TAILS bullshit. I hope this helps someone. Took me 3 solid days to figure this out. Once I knew what I was doing transaction took maybe an hour start to finish to complete.
Want to buy 1/2 oz of shrooms. That's it.
I've been trying to set up purchase for 2 days and fucking non-STOP issues. This is by far the most frustrating/time-consuming/complicated things I've ever had to do - this includes helping my mom understand how to play a YouTube video over the phone or helping her install apps on the phone while on the phone.
I finally jumped through all the hoops of getting TAILS. First it wouldn't flash to the drive because of some weird Catalina issue, workaround requires you sudo into app and then flash. I did that.
Then when I tried booting in it wouldn't work because of some obscure Security settings I had to turn off.
Now I FINALLY boot up TAILS and the keyboard & mouse don't work. If I plug in a USB mouse it works, but then I get a black screen and FAILS doesn't load. I Google around and find this is a common problem and apparently no real (/quick) fix exists.
If FAILS wasn't enough of a headache, it seems there's no viable BTC vendor online. Every single one I visit asks for lengthy KYC runarounds, then wants me to wait days to verify my info -- and even if I do wait it just tells me it rejects my info because my state "isn't served".
I'm just fucking fed up at this point. Jesus H Fucking Christ, buying a gun isn't even this hard.
I have a local BTC ATM. Apparently it does ask for ID. Can I buy my BTC there, transfer to desktop Electrum, then send to my market wallet? Will I really get in trouble?
I understand my ID info is attached to the Bitcoin ledger, but who is really monitoring that? LE would have to bust my marketplace and then unencrypt my home address to bust me, right? And if package is intercepted, I'd have plausible deniability unless they went through the same process (busting entire market & getting my info).
I am 100% all for cloak and dagger shit cause I care about safety, but it just seems nigh-impossible to do this. I've been trying to do this sale for 2 straight days now. I'm not trying to move keys or sell myself so is it really worth it/necessary?
Thank you so much. Just a guy trying to have a creative escape.
submitted by Osceana to darknet [link] [comments]

Weekly news review (August 17-23)

Weekly news review (August 17-23)
Hello, Community! It's been quite a week, don't you agree? Let's dive into the news!
https://preview.redd.it/2k7n5ljuwqi31.png?width=1200&format=png&auto=webp&s=f23ed393e6fca416815a4c3c10c1a6a60756a6e7

Venezuela’s largest department store will install blockchain-enabled cash registers in its 49 retail outlets.
The megastore operator Traki announced August 22, it will integrate Singapore-based Pundi X’s point-of-sale device, XPOS, to offer a cryptocurrency payment rail for shoppers.
Already available in 30 countries, Pundi aims to sell 100,000 XPOS devices by 2021. This is part of the firm’s plan to introduce cryptocurrencies for everyday use, through an ecosystem of financial products like its XPASS crypto debit cards and Xwallet.
The XPOS payments system supports payments in a range of cryptocurrencies including BTC, ETH, Binance’s BNB stablecoin, as well as Pundi X’s own NPXS and NPXSXEM tokens.

Top cryptocurrency exchange Binance is launching an open blockchain project “Venus” focused on developing localized stablecoins worldwide.
In an announcement published on Aug. 19, the exchange argues it is well-positioned to launch such a currency ecosystem in light of its existing public chain technology, Binance Chain, wide user base and already established global compliance measures.
The exchange says it is seeking partnerships with governments, corporations, technology firms, and other cryptocurrency and blockchain projects in order to develop a new currency ecosystem that will empower both developed and developing countries.
Binance’s ambitious new venture appears to compete directly with plans from social media titan Facebook to launch a fiat-pegged stablecoin, Libra, that would power a global crypto payments network embedded into the company’s three wholly-owned apps: WhatsApp, Messenger, and Instagram.

One of the largest mobile providers in Austria is planning to accept cryptocurrency for payment at certain store locations.
A1, which services some 5.1 million mobile and 2.1 million fixed lines across Austria, is testing cryptocurrency payments at store locations across Austria. Dash, ethereum, litecoin, stellar and XRP will be available for payment, according to a report by Austrian tech news site Futurezone.
The pilot program will also host payments for Alipay and WeChat Pay by the end of August. As of now, Futurezone listed seven initial locations accepting cryptocurrency payments across Austria.
Moreover, A1 told Futurezone that the payment option is not only for local Austrians but increasingly geared toward tourists.

Ukraine’s top law-enforcement and counterintelligence agency uncovered crypto mining equipment on site at a nuclear power plant.
According to local media reports, the Security Service of Ukraine (SBU) confiscated six Radeon RX 470 GPU video cards, a motherboard, power supplies and extension cords, a USB and hard drive, and cooling units installed in the South Ukrainian Nuclear Power Plant on July 10.
All of the equipment was located in a single office, No. 104, in the administrative wing separate from the power facility, from the state-owned Energoatom enterprise.
The power plant is registered as a state secret and outside computer equipment is not authorized to enter the property.
The same day, a National Guard of Ukraine branch uncovered additional crypto mining equipment at same nuclear plant. In this search and seizure, 16 GPU video cards, 7 hard drives, 2 solid-state drives and router were uncovered.

Japanese cryptocurrency exchange Rakuten Wallet has launched trading a year after acquiring Everybody’s Bitcoin.
Confirmed in a press release on Aug. 19, Rakuten Wallet, which is a subsidiary of Japanese e-commerce giant Rakuten, said spot trading of three cryptocurrencies — Bitcoin (BTC), Ether (ETH) and Bitcoin Cash (BCH) — was now live.
In future, developers plan to release an app for iOS and Android, use of which will be mandatory for deposits and withdrawals.
The exchange joins a rapidly expanding ecosystem on the Japanese market, with multiple competitors vying for a slice of the domestic cryptocurrency trade.

We are interested in what you have to say so feel free to post in the comments section below!
submitted by rokkex to Rokkex [link] [comments]

What Is Bitcoin Private Key: Beginner’s Guide

What Is Bitcoin Private Key: Beginner’s Guide
Most of the people in this sub probably already know what the Bitcoin private key is and how it works, but there are many newcomers who do not fully understand all the technical aspects of it. I hope you guys will find this guide useful.

Bitcoin Private Keys: The Basics

Let’s start with some main principles.
  • A private key is functionally similar to a password to your email account.
  • You need your private key to be able to receive the crypto someone sends you and to have access to your funds.
  • The BTC network does not store your private keys, they are generated and stored by the wallet software. There are different types of wallets.
Also, it is important to note that the private key concept does not apply exclusively to Bitcoin. Other cryptocurrencies use it too.
Now, let’s see how a private key looks and works.

Bitcoin Private Key Definition

Bitcoin private key is an alphanumeric piece of code. It includes letters and numbers, just like your public address.
However, while a public address is like your plastic card number, a private key is like your CVC. You know, those secret three digits on the back of a card?
A private address is created in a random manner when you get a cryptocurrency wallet. The possibility of creating two identical private keys is almost zero, due to the sophisticated encryption algorithm, we apply for the purpose.
In the BTC network, a private key contains 256 symbols, as we obtain it using the SHA256 encryption algorithm. This function always returns 256 symbols, no matter the input.
Bitcoin private key in various formats, including WIF.

Wallet Import Format (WIF)

Using such a long string of code is inconvenient, so a private key is often presented in WIF (Wallet Import Format). It’s a shortened version that includes only 51 characters (numbers from 0 to 9 and letters in the range of A-F) and begins with 5.
Here is a Bitcoin private key example in WIF:
5Kb8kLf9zgWQnogidDA76MzPL6TsZZY36hWXMssSzNydYXYB9KF
WIF has a few advantages over a full BTC private key version. As we have said, it’s shorter and more convenient to use. Also, it contains special pieces of code that serve to check the address for typos and correct them automatically.
WIF associates with only one private key and can be easily converted back into it, using an established algorithm.

Encrypting Private Keys

If a key looks like WIF but starts with 6, it is an encrypted version of a private key. People encrypt keys to ensure an extra layer of protection. To obtain such a string of code, we apply another algorithm. To decode (decrypt) the key we need to enter the password that we set when we were encrypting it.

How Bitcoin Private Key Works

You probably know Bitcoin as a digital payment system. To explain how it works, it would be better to compare it to a web-messenger, with massages transferring value. These ‘value messages’ are BTC transactions.
And what role a private key plays in sending these financial messages?
Let’s take a look at a real-life example.
https://preview.redd.it/lt1gwme8seu41.png?width=1261&format=png&auto=webp&s=87137c6ad2566affef82a6513090022f7dbb931e

Using Private And Public Keys For a Transaction

Imagine you are sending 1 BTC to your friend Bill. You create a transaction and indicate yourself as the sender and Bill as the receiver of this amount. Then, you will broadcast the transaction to make the Bitcoin network aware of it.
  1. You start by choosing a private key. Using a special encryption algorithm, you derive a public key from it. You send this public key to Bill.
  2. You create a message for Bill and sign it with your digital signature. To obtain it, you pass your private key through a special encryption algorithm and attach the resulting code to the message. Every signature is unique, and you can use the same private address to produce an infinite number of them.
  3. Bill receives your message, public key, and signature and passes it through a signature algorithm. If it’s the message you sent, the algorithm returns ok.
Why we need a digital signature in the first place? There are three reasons. First, it tells the recipient that the message is from the sender he knows. Second, a digital signature makes it impossible for the sender to deny he sent the message. Third, it confirms that no one has altered the message in transit.
Unlike a traditional signature, a digital one cannot be forged. To produce it, you have to possess a secret private key.

https://preview.redd.it/8ta8ds3jseu41.png?width=624&format=png&auto=webp&s=79186fecbe58ecd8a393f644ad35e590361fbe86

Why Keeping Your Private Key Secret Is Important

As we have mentioned, anyone in possession of your private key can steal your funds anytime.
If your wicked colleague Alice gets your private key (because you carelessly left your paper wallet on your desk), she can use it to create a digital signature. She can then use that signature to sign a transaction that will look like yours for the network. For instance, Alice can send all your crypto to another address. You will never be able to cancel this transaction and you are highly unlikely to know that she made it.
For this reason, you should be very careful with your private keys. Never send it to anyone using a messenger, or an email client, or a social media channel. Don’t share photographs of your private key. Never store a private key in a Google Doc file.
Please note that some desktop wallet apps store your private key in a standard directory on your hard drive. This place is a honeypot for hackers who know you are a cryptocurrency user. That’s why it’s extremely important to have up-to-date anti-virus software installed on your device.
https://preview.redd.it/187j0ucmseu41.png?width=723&format=png&auto=webp&s=c9bccdd66ffabde2e623846c7e95930d5e62a625
Also, you may encrypt this wallet file to make it immune to malware. Many wallet apps provide this option. You will have to set a password to decrypt the private key, and the hacker will have to break this password to do it. If the password is strong, it will be a really difficult and time-consuming task.

Where To Store Private Keys: Mobile, Desktop And Hardware Wallets

As we have mentioned, the Bitcoin network does not store these keys. Instead, wallet services do it.

Mobile Wallets

Some of them allow you to keep and protect your private key, others do it automatically, applying various safety measures like 2FA or encryption. Note that nobody is responsible for it, your bitcoins will be gone if the service is hacked.

Desktop Wallets

Desktop wallets may be a good option. They provide a BTC public and private keys in the format of a file that you can download and import. You can protect this file with a strong password and safely store it on a hard drive. Don’t forget about safe storage for this drive, too. For instance, use a bank vault for this purpose.

Cold (Hardware) Wallets

Hardware wallets are the safest ones. They are small USB devices designed to store your funds and private keys offline, away from anyone who could steal them. For this very reason, hardware (or cold) wallets are impossible to hack. If you accidentally lose, damage or destroy such a device, you can recover your BTC and private keys using a backup phrase. The best-selling models of hardware wallets are Tresor and Ledger Nano S, supporting several popular coins.

https://preview.redd.it/jmpyl3yoseu41.png?width=803&format=png&auto=webp&s=ef70101a853eaaedea8d0fb5d2d1690cce16c989

Paper Wallets

These wallets are sheets of paper with BTC private keys and public address printed on them. Paper wallets look pretty basic and not very innovational, but it’s a safe way to store your BTC-related sensitive data. The main reason is that they are not connected to the Internet and thus are unreachable for malware attacks. This format is also immune to many mishaps that can affect electronic devices. To create a paper wallet you use a special web service like WalletGenerator.

P.S. Check out our blog if you are interested in more articles on crypto and finance
submitted by EX-SCUDO to Bitcoin [link] [comments]

HOW TO made Bitcoin On USB Stick Guide 2019 How to Setup a Bitcoin Wallet with Electrum - YouTube Pendrive como Carteira Bitcoin - (bitcoins USB stick wallet) HOW TO Store Bitcoin On USB Stick Guide 240p How to install Bitkey on a USB stick and Overview  The Bitcoin Swiss Army Knife.

Transcript - USB - Bitcoin Mining Setup Guide. What’s going on every one? This is Fred and today we’re going to build a Bitcoin miner. All right. So, if you’re unfamiliar with Bitcoin I do have another video that has all the 10 things that you need to know about Bitcoin. So, give that a watch, get caught up, come back and we’ll get started. So, here’s all the pieces that you need to ... The next step after downloading the wallet software is to install it directly on the USB drive’s OS offline. It’s not the best idea to use the USB thumb drive for any other online applications ... So, to do that you would just simply plug your USB drive into your computer and you would just copy the contents, right click, copy and then you would paste them into a fresh second USB drive. So, I just wanted to point that out and it’s very important to do that as well. Okay. That’s how you create a USB Bitcoin wallet and that’s fairly secure and we made it offline. So, I hope you ... Airgap wallets Cryptocurrency wallets are among the most targeted data asset in the red cyber security domain. Air gapped wallets are those wallets that are devoid of internet connection. USB drives make great airgap wallets since they can always ... For casual investors or those who want to start now, a USB drive wallet is an excellent choice to guard against Bitcoin or cryptocurrency theft. USB drive wallets have a number of benefits, primarily security based. They are compact and easy to carry. USB drives are pretty standard with most computers, so you can find compatibility with a large number of devices should you need to take your ...

[index] [7880] [3762] [36751] [9094] [8378] [14495] [6556] [22613] [26989] [13661]

HOW TO made Bitcoin On USB Stick Guide 2019

Make some extra $$ lending: Signup for DavorCoin: https://goo.gl/ppsrur OR Signup for Bitconnect: https://goo.gl/xvvhGk This is a short video on setting up, ... Esse vídeo exibe um tutorial de como transformar o seu pendrive em uma carteira bitcoin física para armazenar seus arquivos correspondente as chaves privadas... In this video I'll show you how to make a secure and encrypted USB Bitcoin Wallet. I'm going to use MultiBit to create this wallet and then store it onto a USB thumb drive for safe keeping. I'm ... COMPLETE Shopify Tutorial For Beginners 2020 - How To Create A Profitable Shopify Store From Scratch - Duration: 2:14:53. Dan Vas Recommended for you Buy a 1TB external hard drive usb 3.0 02:43 download Bitcoin Core 0.9.2.1 ... Install, Backup And Restore A Bitcoin Wallet. Or, Almost Any CryptoCoin Wallet (Windows) - Duration: 7:21 ...

#