Sichern Sie Ihre Wallet - Bitcoin

08-31 08:44 - '[quote] Why are so many people who have no idea what OP was talking about feel the inclination to comment? No offense, but you're like the 3rd person making a complete strawman point. / The usb system doesn't hold any impo...' by /u/Thanatos_1 removed from /r/Bitcoin within 674-684min

'''
I would never use a usb as cold storage, especially not a 5$ one. You don’t buy a 5$ dollar safe to store your valuables in.
Why are so many people who have no idea what OP was talking about feel the inclination to comment? No offense, but you're like the 3rd person making a complete strawman point.
The usb system doesn't hold any important information. The Tails system is ephemeral. Every time you want to spend from your Tails/Electrum-cold-storage, you have to recreate the wallet in a fresh, pristine system.
The medium that holds the important information, the seed, is paper, your brain and/or whatever else you choose to record it on, maybe a metal plate. But not the flash drive.
'''
Context Link
Go1dfish undelete link
unreddit undelete link
Author: Thanatos_1
submitted by removalbot to removalbot [link] [comments]

⟳ 870 apps added, 78 updated at f-droid.org

Notice: this update is spurious, and the issue is being looked at.
⟳ f-droid.org from Wed, 26 Feb 2020 20:21:50 GMT updated on Sun, 01 Mar 2020 05:23:29 GMT contains 2962 apps.
Added (870)
Updated (78)
2020-03-01T05:53:18Z
submitted by BrainstormBot to FDroidUpdates [link] [comments]

My initial feedback about the Coldcard mk3

Here's my email that I just sent to Coinkite:
Hi,
I just bought the coldcard, and I'd like to give some feedback. First some positive things, then a lot of improvement suggestions. I like the anti-phishing words. It seems pretty unlikely someone would phish a hardware device anytime soon, but its a great security addition with little downside. I like the screen, it feels very spacious and can contain plenty of content. I like the taper evident bag it came in, very obvious by opening it that it was not tampered with. The instructions on device are great, and much better than including an instruction manual. Its cool that it comes with an sd card slot for more airgapped use, tho I'm comfortable just using USB. I might consider using the encrypted backup feature with and sd card at some point. The very obvious caution/genuine light - tho when I first saw it, what i thought was (wouldn't a fake coldcard still say genuine?). I like that there's a shoot me symbol, and that the case it transparent so you can see inside.
Now to the issues i had and improvements i'd like to see. So the first thing I realized is that passphrases are hard to input on the number pad. The number pad has no letters on it, so it doesn't help you input a word-based passphrase (which is best practice). I originally thought that transforming a passphrase into a string of numbers had to either be a huge pain or lose you tons of entropy. I thought that if you transformed each word of a passphrase into numbers 1 for 1 (eg "cat" would be "228"), it would require more words to have a strong passphrase. But actually, I did some analysis which found that there is nearly no difference between using an alphabetic passphrase vs using an alpha passphrase transformed into numbers in that way. So I'm happy about that, but its still hard to input letter-based passphrases.
So my request is that in the mk4:
A. please put a full alphanumeric keyboard on the coldcard. Its certainly big enough for one. Say with the size and layout of the Palm phone, like the Treo 750 series. Edit: I did some analysis and found out that a numberpad is actually pretty usable with passphrases. More details at the bottom.
B. if that is, for some reason, out of the question, then please put letters on each button so you don't need to pull out an additional reference in order to input a word-based passphrase.
Numeric-only passwords are either too short or not memorable. Typing words based passphrases on the coldcard is very unweildy. Please do something about this.
Furthermore, the coldcard recommends that users write down their PIN. This is really bad advice. Please remove it. I wrote a whole rant about it here: https://www.reddit.com/coldcard/comments/emnjwx/coldcard_advises_users_to_write_down_your_pin/ . Losing your $100 cold card is not the end of the world. Getting a few bitcoin stolen from you because someone found your pin stored next to your coldcard would be FAR worse, and in a bitcoin future, just as likely as forgetting your pin, if not more likely.
So:
C. Remove the advice to write down your pin! Advise users instead to make a calendar event to recite their pin to themselves if they don't use it often enough to remember it. Its OK if the pin (and thus the coldcard) is lost - your funds can still be recovered with the seed.
D. There should be a way to factory reset the coldcard. If the current secure chip doesn't support it, I'm sure there's one that does. If everything is cleared and reset correctly, this wouldn't add any additional security risk.
E. The pin input is super confusing! Why does a 0 show up, and then half a second later the 0 is filled with a bunch of dots? What does that indicate? Please just have asterisks show up like every single other password input in the world. The pin 2525 should look like ****. The way you have it makes it very unintuitive to even know how many numbers it thinks you've typed so far.
F. Speaking of the above. I found out through trial and error (lots of error) that I had misunderstood how many characters I had put in! Why? Because when I go to create my pin, there are two pages of instructions. I click enter to get passed page 1, then I click enter again to try to get passed page 2, but it only resets page 2. So I then press the first number of my pin, and it goes to the next page, where it then displays a 0, which I thought represented the number I had pressed. It would be EXTRA confusing if the number I had pressed was 0. But no, apparently that 0 is actually trying to represent an empty space! It certainly doesn't look like an empty space. Page 2 should not go to the input view when you press a number, instead it should only continue to the next view when you press enter - like page 1 did.
G. The input is laggy. When I was looking through my seed words by holding down the arrow buttons, if I let go immediately after it shifted down one line, it would still shift down yet another line about 400 milliseconds after I had unpressed the button. What is up with that?
H. And holding down the arrow keys repeats FAR too slowly. Its maddening watching only one line go up every 500 milliseconds. The lagging problem (G) needs to be solved first tho, because if it repeated faster, the lag would be much more noticeable.
I. Ugh, why does it ask you if you want to add dice rolls into your seed AFTER it asks you to write the whole seed down? Come on, work with me here. I already wrote those down. If the user might do something that affects the seed, don't tell people to write it down yet. Put that option to "press 4 to add dice rolls into the mix" ABOVE the seed words. Also, why can't I find that text in the firmware code? Perhaps this has already been fixed/changed?
J. I tried setting a nickname, and the input isn't great. I believe it started me with 'A' and I could go up and down in letters, suuuuuper slowly (as per complaint G). But then going to the next letter, it starts me in symbol mode, which means I have to press 1 every time I'm done with the last character. My request A would obviously readily solve this problem, and B would help a whole lot, but even without any physical interface improvements, this could be done a lot better. For starters, start the next letter in the same mode you were in previously. Resetting the mode every time you go to the next letter is bad UI.
K. Where is there a public forum for discussing these kinds of issues? No one at Coinkite seems to pay attention to coldcard, and github issues are turned off for most of your repositories. Why are github issues turned off tho? Where am I supposed to report bugs? By email? How is anyone supposed to help track down bugs? That's part of the point of open source is that people can help you track stuff down and discuss improvements.
Honestly, the UI on this needs lots of work. I expected better for a third generation device that cost me over $100. Maybe I'll send another annoying email when I use this thing more, but its late and I need to sleep.
The OP originally contained this at the top, but I discovered that entering your usual passphrases with a number pad doesn't actually lose you much entropy at all.:
I just bought the coldcard, and one thing I'm realizing is that the passphrase I want to use is going to be an enormously gigantic bitch to type into this numberpad. Any 3-4 words passphrase would take about 30 key presses.
For example, lets take the passphrase "monkeyemusloth". To type that in with just numbers would be: 6666665533999336887777555666844.
31 key presses. That's super long, error prone, and what if you want to include numbers in your passphrase? You'd have to have an additional number keypress for every letter. "1monkey2emu3sloth" would be:
166666666655533399992333668883777775555666688444
Which is 48 keypresses! And given that these numbers don't have letters on them, you either have to be an expert at it or you have to pull out something else (like my phone's number pad, which is what I'm using now).
You could simply type a single number that represents each letter. But this substantially lowers the entropy of your passphrase, meaning that in order to have a sufficiently lengthed passphrase, you need to use 5-6 words instead of 3-4 words.
submitted by fresheneesz to coldcard [link] [comments]

WIP: Blackpi - a stake device based on raspberry

Warning: This is a WiP and it's using Blackcoin Lore which is still in beta. Please be aware of that and backup your wallet.dat before you put any real values in this!
UPDATES
29.12.2017
22.06.2017
I am currently trying to set up blackoin on raspberry. Community members asked for a tutorial to compile it, so I will start with this here. Maybe in the future it would even be possible to turn it into a headless (=without screen and keyboard) image to put on an SD card and just boot up the wallet.
I used the latest Blackcoin Lore by janko33 for this process, however it should be quite the same with the "original" core wallet by rat4/johndolittle. Blackcoin Lore is not deemed as stable as it is still in beta, so it's up to you what source tree you take.
Please be also aware, that compiling on a small computer like raspi can take a while. Please also note that Lore is still in beta. The names in the archive are still "bitcoin". There is an update comming where the naming is correct and also maybe a few bugfixes.
** Tutorial: **
You first need to get raspbian. The lite image will work, it's a small version of the operating system without a graphical interface, so you will need ssh to operate it. The image is 294 MB but you will want to have a bigger card. 2GB is certainly too small, better get 16 or even 32GB - you also will need space for the blockchain!
To install it I followed this guide
https://hackernoon.com/raspberry-pi-headless-install-462ccabd75d0
Get the raspdian image file from:
https://www.raspberrypi.org/downloads/raspbian/
Also get Etcher from
https://etcher.io/
Etcher is a tool to write img files to an SD card/USB-stick.
After writing, open the card in your explorer and add a file "ssh". The file sould be empty and just be called "ssh" (not ssh.txt or something). It will tell raspi to activate ssh on boot.
Then boot up your raspi with the card and plug it into your network. Consult your router's LAN-page to find the device, it should register to your router as "raspberry" or so. Open up Putty and login to your raspi using pi as username and raspberry as password.
After login you can configure your raspi, please read the guide linked above for more details.
Note: One important thing that you should configure is your timezone! Use
sudo raspi-config 
Go to 4. Localisation Options and set the time to your timezone. If your time is way off, you would get troubles with staking, so make sure you always have the time set right!
After you got everything set up, get the build environment ready:
sudo apt-get install build-essential libtool autotools-dev automake pkg-config libssl-dev libevent-dev bsdmainutils #Installs alot and can take a while git clone -b Blackcoin-Lore https://github.com/janko33bd/bitcoin Blackcoin-Lore cd Blackcoin-Lore cd depends make -j 6 HOST=arm-linux-gnueabihf cd .. ./autogen.sh ./configure --prefix=`pwd`/depends/arm-linux-gnueabihf 
# note: ` = is a "backtick" not an apostroph. It causes the outpupt of "pwd" being inserted there
make -j 6 # -j n tells the compiler to use more cores, speeds that up a little (n = 1.5*cores installed) sudo make install 
This should compile so far. Update: Lore does not need Berkeley DB 4.8 to be installed, so just go with the DB provided by the repository works (libdb++-dev). (Thanks patcrypt)
After compile you can run the wallet with
lored 
And after it synced you have bitcoin-cli to control the wallet.
Issue: Synching blocks takes an awfully long time on raspi for some reason, even with Lore (that syncs blocks in a few hours instead of a whole day on a normal computer). If anyone knows how to speed up that process, please let us know!
This thread is a WiP. Please post all issues and errors here, I will then edit the OP to make it into a real, working tutorial.
On a note it was mentioned, that using an USB-stick here instead of a card would make sense since the cards are more prone to failure than USB-sticks. I will include setting it up on USB in a later version of this tutorial.
Some tips and tricks
Since compiling takes a longer time, it is recommented to run it in the console in a screen. Screen is a terminal tool that supports multiple windows in the same shell and, most important, detaches when your ssh connection breaks. Using screen you can simply reconnect and use screen -r to attach to your running shell again. To use screen, you need to install and then start it before you start the whole build process within a screen-shell.
sudo apt-get install screen screen #Start install/build process here #Type [ctrl-a] [d] to detach from the screen and put it in the background #After reconnect type screen -r to jump back into your running shell 
If you want to see your blocks being processed while the wallet syncs to the network, use the following command on a second shell (new Putty instance or screen window which you can open in screen with [ctrl-a] [c] (hit [ctrl-a] [n] to cycle through the windows in screen)
watch -n 5 lore-cli getinfo #This will execute the command "bitcoin-cli getinfo" every 5 seconds and thus display live update of your wallet info 
How to use that thing?
Here are a few helpful CLI commands, call them with lore-cli
help - Returns available commands help  - Returns detailed help to a  getinfo - Returns a descriptive information of your wallet, including balance getwalletinfo - Returns short information about your wallet, including balance, unconfirmed balance, immature balance, number of tx ect getaccountaddress 'raspi' - Returns an address for your wallet. If the account does not need to exist, it will be created with new address sendtoaddress   - Sends  to  sendtoaddress   substractfeefromaccount - Sends  minus tx fee to  getnewaddress  - Returns a new address for  each time you call the command.  is optional 
Further plans for this tutorial/project
Have fun!
Donations: B4nn2Y3SFC6whNGNvcQ2MvV1aQbZp3cZVF
submitted by mindphuk to blackcoin [link] [comments]

03-05 08:12 - 'What is Crypto Wallet & Why It Is The Best Way To Protect Your Cryptocurrencies' (self.Bitcoin) by /u/smartcryptosolution removed from /r/Bitcoin within 19-29min

'''


Here Are Some Basic Features To Keep In Mind And Followed Before Choosing A Wallet:

1. Good Reputation
You Need To Make Sure That The Wallet You Are Using Has Good Reviews And A Good Reputation. You Can Know The Status Of Any Wallet, Including Pros And Cons, By Viewing Features And Comments.

2. Software Solutions
It Is Usually Recommended To Avoid The Use Of Some Software Solutions That Carry Malware Under The Cover Of Wallet. Wallet With Such Software Solutions Is Always Susceptible To Attack And Infiltration. The Best Way To Choose A Safe Wallet Is To Stay With Reliable Suppliers.

3.Best Practice
In Addition To The Considerations Above, The Principle Of Best Practices Helps Protect Encrypted Wallet. We Recommend That You Keep A Backup Of Private Keys Using A Storage Device. We Also Recommend Adding An Additional Level Of Security, For Example, You Can Use Google Authentication.

Types Of Wallet
There Are Different Types Of Wallets And The Choice Depends On The User's Need And Purpose.
Cryptographic Wallet Differs In Functionality And Can Be Selected Based On Their Advantages And Disadvantages. It Is Essential To Understand The Difference Between Cold Wallets And Hot Wallets.

1. Hot Wallets
Hot Wallets Look Like Money In Your Pocket And Are Accessible Via A Web Portal Or Mobile App. It's Called As Hot Because Of Its Accessibility And Activity Which Facilitates An Environment In Which Activities Such As Trading And Other Transactions Can Be Easily Performed. But This Feature Is Also A Threat Because It Makes It More Vulnerable To Attack.

2. Cold Wallets
Cold Wallets Are Analogous To Safer And More Difficult To Access Savings Accounts. It Is Less Prone To Attacks Than Hot Wallets Because It Is Kept Offline. It Is Better For Cryptocurrency That Is Not Intended For Frequent Use, But For Long-Term Holding. Although Accessibility In Terms Of Transaction Execution Is Limited, It Also Reduces The Risk Of Losing Your Fund.

Furthermore, Different Types Of wallets Have Been Classified And Discussed In Detail Below.

1. Hardware Wallets:

2. Software Wallets:
- Desktop Wallets
This Is One Of The Safest Options For Maintaining Cryptocurrency. It Is Accessible Via The Software Installed On The Devices And The Private Key Is Stored Locally.
The Desktop Wallet Can Be Used With The System Or Another Device Connected To The Internet. They Can Also Be Used As A Cold Storage Device If They Are Used Without The Internet.

- Mobile Wallets
Mobile Wallets Are Very Convenient To Use And Include Decent Security Features. You Can Easily Download A Mobile Application And Perform Quick Transactions Using Features Like Qr Codes.

- Online Web Wallets
Online Wallets Require The Use Of An Internet Connection And Use Only Online. They Are Also Called "cloud Wallets" Because Many Third-Party Wallets Allow Their Software To Be Used In The Cloud.
Here The Main Problem Is That The Private Key Is Usually Stored On The Centralized Server

-Multiple Signature Wallets
Multiple Signature Wallets Use Multiple Keys To Operate. This Reduces The Risk Of Minimizing Attacks, As It Is Very Difficult To Access More Than One Private Key.

Another Advantage Is That When A Private Key Is Lost, The Alternative Key Can Help You Get The Backup. The Main Reasons For The Distribution Of Multiple Keys Are:

3. Paper Wallets:
If You Want to Know More About Crypto Wallet [Contact Us]1 Or Mail Us At [[email protected]]2 OR [[email protected]]3
'''
What is Crypto Wallet & Why It Is The Best Way To Protect Your Cryptocurrencies
Go1dfish undelete link
unreddit undelete link
Author: smartcryptosolution
1: www.*m*rtcryptos*lut*on*o**/crypto-*allet*dev**op*en* 2: mailto:[email protected] 3: mailto:[email protected]
Unknown links are censored to prevent spreading illicit content.
submitted by removalbot to removalbot [link] [comments]

Rate my safety

Hello folks! Just wanted to see if I was safe enough or if I need some improvements or vast improvements, also I need some clarification if anyone would like to oblige. So I've taken my time and researched as much I could about safely browsing the deep web, more so on an OpSec side of things and as that goes....
I use Tails on a USB, Browse TOR on highest security setting, electrum wallet, no ties to anything real life.
I'm aware this is probably by no means the most secure I could be, just want to know if I'm safe enough to ordebrowse more consistently. Past that I've researched some on legal parameters, but not so much though I'm continuing on that front.
Tips I'm really looking for are anything else I can do to tie loose ends and where is a great source for legal security. Steps I should take should I receive a love letter etc.
EDIT: Also out of great curiosity, what is, if there is such a thing, the safest known method/build for OpSec
I have a Coinbase account because I like the convenience of being able to buy BitCoins there, as well as I have more lasting/legal ideas with BC I intend to build up on and I feel comfortable with Coinbase. If I transfer BC from there to an electrum to another wallet is that safe practice or overdoing it? Does it even make a difference? Should I tumble them before moving them?
submitted by InfiniteO to opsec [link] [comments]

GPG instructions and public key list for verifying Bitcoin clients.

I have noticed their is a growing problem of fake bitcoin clients, and I expect the frequency and elaboratness of these fake clients to increase.
Verifying the signatures for these clients will detect if you are receiving anything other than what the signer the of the software signed. The exception to this is if the attacker acquires the signer's private key, which should be a lot more difficult than tricking users to visit the wrong site or hacking servers. This can also be addressed by using multiple signatures per client.
An important part of this process is acquiring the public keys for the sofware signers in a secure manner.
To help with this I have included a signed list of fingerprints and where to acquire the public keys to act as another source to verify the keys used to sign bitcoin clients.
I have also included instructions for verifying the fingerprint list and bitcoin clients.
To deal with the issue that posts and comments on Reddit can be easily modified I suggest other users (especially well known ones) post a signature of the fingerprint list in a comment in this thread, or at least a hash of the fingerprint list (not as secure but still better than nothing).
List of Fingerprints:
+++ Bitcoin-Qt: Signer: Gavin Andresen (CODE SIGNING KEY) [email protected] Fingerprint: 2664 6D99 CBAE C9B8 1982 EF60 29D9 EE6B 1FC7 30C1 Key ID: 1FC730C1 Key Link: bitcoin.org/gavinandresen.asc
Electrum: Signer: ThomasV [email protected] Fingerprint: 6694 D8DE 7BE8 EE56 31BE D950 2BD5 824B 7F94 70E6 Key ID: 7F9470E6 Keyserver: pool.sks-keyservers.net Signer: Animazing [email protected] Fingerprint: 9914 864D FC33 499C 6CA2 BEEA 2245 3004 6955 06FD Key ID: 695506FD Keyserver: pool.sks-keyservers.net
Multibit: Signer: Jim Burton (multibit.org developer) [email protected] Fingerprint: 299C 423C 672F 47F4 756A 6BA4 C197 2AED 79F7 C572 Key ID: 79F7C572 Keyserver: pgp.mit.edu
Armory: Signer: Alan C. Reiner (Offline Signing Key) [email protected] Fingerprint: 821F 1229 36BD D565 366A C36A 4AB1 6AEA 9883 2223 Key ID: 98832223 Keyserver: pgp.mit.edu +++
My Key:
-----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v1.4.12 (GNU/Linux) mQINBFLB9nUBEAC/klZvqQkWP/NUD0pT09PzhKh0xIQ0XM7MxqUZLa1OytF3iUCX /fNwQD5OnSFQoEg1O4bGzrrRb+PiuKCvH19dp7sFVj3q7Dhwfb6EvsX39xqzxCr6 2AQFQ3esz4nNodnQWa48t2ujihaf/vpTn6n7+jCl6a124r+U4wNGiNIEWxLLUNNb ec8S1RcjtTp6Ue/yRpThgJN9e4rj19+vJMqKCiqL03NBZWVoCEkL6iIdjwlQK8/r CpP9m5yAsc8wkelRkZvuLmjJ1GgSFrO0WteGnURMshy59LetaSRyiIDeHaPdV5rk /n3mBv8hsK/39O6H7fYWDx/ZLnZE4rMghcndexIFLhsuPx6FJNATqQ2gHT4ijb8K NlwZ0LatlXyUEMKfC1aroa3/9RkQSf0y0GKS0XrvUWGVRn/X7gk1DRhuaHWuacCf k3w0XZOA2WpWw1w/rjZSeHbKG1w4B2/kWH3K4sXsfcLltlY85zH03HUYSx+leMFc yxiHz60ZfuV2aGjYFPL8dzF6DS106lHz51j608OZkAEO8Xssincii1k/PR1h1y2P AqgrEADzgl52iBbNw+tdnxSAIy/asEyxU/VwkUFjOzSyP7ZmBxg8ss966w2Kl6WE o9R5tkVuUG8WTMTnF0FeMxO9YOqx4KhN9bhP7RjBL7BFTvRXYVVJUGabIQARAQAB tBVkY2M0ZSA8ZGNjNGVAZ214LmNvbT6JAj4EEwECACgFAlLB9nUCGwMFCQlmAYAG CwkIBwMCBhUIAgkKCwQWAgMBAh4BAheAAAoJECO6L0dAOWOhsNIQAKUN9Z4e0hM3 DbaUjYJx93JGdJArLmz+Ko10N/lGcao4lCNVA+xM73Ga1GBnPlhPFW9iD2VQocOv tY2PYNsPrHgGlzyMKAMSpZ8364wVEyCHdJVKFORUjhyuJGYfyhDt2iZuzQwxWbmQ 1gmlbiGvxRysmaSW5+M8CDhja/fI8+EOp5NbH/EvHJClul3cO72UBUXBPxRv4Eb+ j8k0Uozob70A3bD894F8bJ9wZ3XBX/9DEkAbvDyW7CxIZwUiCeYTQylH++8S91A1 wL3z35ELdOLzGqwetYY6gSZRwY/W+rewEfPfBDSRjXKOBfhraMBYV1Sdg0IUj10W 2XVAzkqmqaej0T/xTt6aNjFtiH1u18BUpYIcCAAZ6TJ7325bnqnI+0xWFdonyggL +AIX1nzhx5niw8ZkCX0/jlJAx3TXAuxX/Tfy7cVSVi33v0fiwoDb8ZIDBzg0P2uc PUpR13B3AevFpxuAuAFPWfTDOJQmZyn9YNswVOhNb9rfq5bkmaSBlMRefTtUKIjW XjrRhSULPJ73H+R1DNL1Y0vhclnkOVCFRB+VPChkO+6RitGQDTg/Z60fBHpnYiDz sysnsoojLwBGanHO5mZMprxADc9CmeRGRmfHwvx7eJvW1HqN+5JR3Ai+JDlT+IxX RNUQxUbOry4D8TwRn9nBEtumNyNQcBmUuQINBFLB9nUBEACyRFYCrOXxC8yWm92U qPPNa3YC+W17O4rHW/thKTze1/TeZAKTNaIMPCS7iSVBBRbuijG+8NsgFd6W9acC ihMD4VUdFhVPjRGM3HmqzsxudVI4kGlQl8w86pYZu8ceGB4LQcoUFbPmWgXDIszH NV7kIFO/2oCRJ7VIBllUMP97RRdIfDND7EZMWvDveZ40BZCBLfnD9f6VSs4Lgn2C ow/ko01ijnvUxA/BGPJKI7JTLJHbdL//RQwT3AacLSc/etIurY2Ef926XbYYI1gi qboCU/dYUkGG2D+BDcGdukwpksdZZSXPyNhkZQAPPViHuFFtHI3C+FNb5L+lnC0h /dfF73U1lN3jp/VX11U1tIsHJyPjs8aael2UJO7Qy3vgVRM6KOywNNjVRv79Z/rF YHkNzBwXrGKdwV16SdRWjgkzkB4JeNQME096SqrwAEj/j5fwMqHjR8dKqWKDT6s9 V2Z83go3n9kI8JWFh33OksBh/qpKghhwtGWrUsbVcEDOVmUn2ozXvARDzqnNw3DN PcQvzUtasD8hxGHo7fW4TczdtgS3b/DfU2VJo68Fmo1C4eqYX+Ixx05khFCtP7d0 POqX6jIIQqZq8NTea8/M8Xx1YGhR5RpA4vZe7bCLgD2VUXHL43Npmq2nuZ0/7AwY H0hc/y/T+SU70xn28XyWHHLkCwARAQABiQIlBBgBAgAPBQJSwfZ1AhsMBQkJZgGA AAoJECO6L0dAOWOhIcgP/ioKYiJFAsolS4ep1PenCPvQFjvZTq4xJnsubEJ/ERU8 zdgET0Rh5jcCLqRAxQbGW3lVsewR3N+S9Rt3zHApqfZBFg5XJkZxsk0u+0qGPHWA 4oC7U3E4ZwMfVzUDcfKrzD1h0JaiSW1+1qgCh9/YVCUYakR1n/9LgzPP8ekQLTeb nWE+ZQQfeTDgoTNFWZvUlEbh4zcHLvcay78PnK3uT3UbWPyltSxon/eD47s1dt03 P/8nqaXCZhhRZ9N3EbJyudLBgA3ctySSJJSKKQHYynH5qUQqKp4Wq1KY80161xvW FqKwN/Jr4tTpRVZPu8P82cxhwrWJdf1U3/M2F2aIgXbGS4fHbzsLZ+6zZ3AuT4D8 auW55GOrnoF9XzZV6IavtluILUXMjVzF13slo5PKzS8yyJRNxE22krbeEyUum4Zu dDiERxIB6B+RDMM9qvV9svGJoEXG+4ugwkA3R7a6LWApmkvH3eXpULfDN2g5eNcr 5efFMrI/myxmpsP3nUp5EZFJyp8+ZSzIMJ1jSzXH8mHajIGTG49xDyZGpbog3wd2 7aQf5D9WOuKfYZM9MU9PBF+ZgtNrAxWuYJcCOr4WEd/2IjayMWvLxNA/RVW66oVj puaaDc3m3hXg1fwUWv9ZJyMUv7NARLgig3KEMVZiVzos7ZMn9mZNrOk2fnkKpVJB =ufyu -----END PGP PUBLIC KEY BLOCK----- 
Signature for fingerprint list:
-----BEGIN PGP MESSAGE----- Version: GnuPG v1.4.12 (GNU/Linux) owGFk31QFGUcx48XIU/KU0YSZOhHToraHeze3u4tqd2+HZ6g4ks6ZBTLsXdud7eH ewtCV4mp4/hGKmlTQbyEkgoZxpg6kReML0RWaoohOWWN0mhK4WSZje0Zxw0zzfTP 7rPf5zfP7/N8nn22PRyliYyYfDQ9y0La6yNaotYW6hyi5BTkYlmUFJ9BKVMWdZyu mDFjhpYWFbtXlPQLlUztYtEpCXImZPGlogSUVCQLPkGCNGYBy8FiW9Z82/wsyOby poEzWMEPFVicHl50G+xeD1jDXTIBxXEMcJYkgaEpDhiSNgNCmlHgrHgGoCRLAsfh NCBWhgBjBoNos4VysLGZD5LhIEeUXJlQ+C+nwSs700d0N/A+u5ZzC3ZFLvGE97Bk hdfD+5aC8uBdiqiQZYYiQTuCEMdJDFizujuC5swqjQkHI0JzwJImlZBmTWBGMRoI q1pHZHD4MGEwCQU+QS4Ntiz2et0Gn8und4Uyn0ESlGEkShI9/Etqf5jJh4Zhd7NH opEkgoEZx1iwMkYjYCTJAM5QKADNcRSgKGZSnWWogkmTCTJwKzvMFkxCwf+xzStx K6LqNixurugBukRWvOrBe4Zmg9ahSCgV3N5iQZ4GL4oeHDFbHLxPGcI3lLhG8qNB YAw1qtQEagWMsKoGTTgFOE1hwCAkASjFsUCQVgIYE4GG1apJKBjGdxYbPCqHUFSi pWSPVy4PA1NuXgLGAIsEUf2GtAUOh1sdQXA+KFtdZhrwapFl6B/iHywQdD4S2Ywi VkBQlAQjTrPAmnBVMa4iM0b1gVE0AjiluifNZqN6AKhxGDmYhIL/Qg5etI2RydGa iEhNzKjI4N3TaEfrQjf0brJOs692U9vbzb2jMs51uP1Jl/6KXf7NoTEHolxXvvRf SjzbEylrjFvH1jXefbJxd9/tK8u8SVdLC9yv5N88N/v1Cyu7N1deXDPJMeVs8obj b9zvtW84sv9OWeJJ8tXyPX2/N+zqGn+ZnxCdGz++QXqzYGzthSRE7JJaflRu4/01 jqsFuat62ifvHujc8ZhupW1P59OBjoMtgz+crx08mdN/sDkwtUmfLecN2Hb8duuz Lxq6Aztjz3RsWV1d3TJBc4D86cbfuqjvn0iJemqvfk1/ToHQFZhtWrT555eZwh45 +vNj/jX7Fubnd/3adNxf+EhF7sWmMX+Q184dSvygFdFXBF6b2m1KjLvnoKanzEp0 2cWqgX7L2biU8/2xt5LudZ4g4pawCZVpv6T7q1JfaN9Q1xFxP2Z55fiPuo7tvXdd v6m3vrLt+Tk12bGzDn/rr8+puxl4vLsqrnPKmPg51xUZo+tiXKuf2XZ44DLd8t7N weL21tONnY2jKy+MSzi1/1o8sWrQPPPTd1tteW/tTct6fyO2NNWUJ6wT6mPWx9fz 31ml53QTe75a+2HbumVuvZCcC33V0/fFpM07wkRYUh9a0LxzK6mrOuqYChWT6u4M oGkJS2vmNkWdmdWcP5le4ulLbr+Ws+IysX37OyfSt4y70St8vLov9dE/k3Y1zNy4 SyrY/fWzvRMLP8mNrjh1eFvtznXt/wA= =5zDz -----END PGP MESSAGE----- 
Hashes for fingerprint list:
SHA-256: 7A6B9841 355B1127 E5639A9D 7040D81C F395D382 884376C2 31829C63 6FCF1B80
SHA-512: 04A49A60 A1645479 ED0B3CE9 AE32E156 E9768CC2 0D4EF393 814162BE BFA6FAF5 6C520769 C654467F 6B61EBD4 4A5A5C93 9DF81B7D AA468A50 2DD7FFF3 F637A49C
Verifying the fingerprint list:
Save fingerprint list, from the first plus to the last plus, to a text file called fingerprints.txt
Next save my key to a file called dcc4e.asc and my signature to a file called fingerprints.txt.asc
In terminal or command line run:
gpg --import dcc4e.asc gpg --verify fingerprints.txt.asc 
You should see:
Good signature from "dcc4e " 
GPG examples for verifying Bitcoin clients:
Verifying Bitcoin-Qt:
First download, import and check Gavin's key:
Download his key at bitcoin.org/gavinandresen.asc
In terminal or command line run:
gpg --import gavinandresen.asc gpg --fingerprint 
Check that the fingerprint for Gavin's key matches 01CD F462 7A3B 88AA E4A5 71C8 7588 242F BE38 D3A8.
Then download the wallet software and signature.
Verify the signature:
gpg --verify SHA256SUMS.asc 
You should see:
gpg: Good signature from "Gavin Andresen (CODE SIGNING KEY) " 
The signature for Bitcoin-Qt signs the hash values. So we must compute the hash of the specific downloaded software manually. This example is using the linux version.
gpg --print-md SHA256 bitcoin-0.8.6-linux.tar.gz 
Check that the output matches the associated hash value in SHA256SUMS.asc
Verifying Electrum:
First download, import and check ThomasV's key:
This key can be found at a keyserver.
gpg --keyserver pool.sks-keyservers.net --recv-keys 7F9470E6 gpg --fingerprint 
Check the fingerprint.
Download Electrum and the signature.
Verify the signature:
gpg --verify Electrum-1.9.6.zip.asc 
You should see:
gpg: Good signature from "ThomasV " 
For this example you do not need to manually compute any hash values because the signature is signing the downloaded file directly instead of signing a list of hashes.
submitted by dcc4e to Bitcoin [link] [comments]

I cant for the life of me work out how to Import my bitcoin back-ups from my USB drive! Can someone give me some insight please?

Hi all,
I recently returned from a trip abroad, and want to restore my bitcoin and litecoin back ups. Now I feel I know quite a lot more about bitcoin than the average person.. but I have never had to do this before:
I was in a hurry to secure my bitcoins before I went overseas. The details are blurry because it was months ago, but I think I was using the 'Bitcoin Wallet' app on my android phone and it was very simple and seemingly easy to use. I went to 'back up' my bitcoins and chose my usb drive (I have an adapter that allows me to plub my usb drive in to my samsung phone).
I now have a folder called "Wallet" on the usb drive, with a file inside named 'bitcoin-wallet-keys-2013-06-07' (Unknown Format). If I open it in notepad it has the following content (changed for privacy) :
U2FsdxxxX1/tHiT0z077t5rUqQtFf417DMbDEvyYOpxxxxxxUVXv8kJ7oHEwiTW+pDTWgvlUOB/o Rm5R3Jk2rnxxxxxxgLWwUqBLFHQjT4SO57F0DerUoMZQQBMUGxLr+0Xn9WTYVeCnDlSsCgwZBS3N z9kOpU3aHJvrMlJ0KqQK/Kz637+ZWTxxxx3CwDuXiqkSpoeKI3qFgCf0P7hsgfQxxxOagFlyYzjJ NMZIE/y54jieWjJxxxkMEm7M8MWfBLsXALnjWhMmOGdesbHasoZ2n0A58momvEeGuCAMKzIMNAaV 3wDxCO9nLR89m+oPXDnrLWXXxxZ9YhFF/6aNew==
Ive tried to import the file in the same app on my phone 'Bitcoin Wallet', as well as changing the extension of the file to .key to try and import it in MultiBit, as well as copy and paste the data in to blockchain.info. All to no avail.
Im really stressed that I will lose access to my keys!
Can someone please explain to me like im a 5 year old what im doing wrong, and how to get my bitcoins back correctly?
submitted by hatwearer777 to BitcoinBeginners [link] [comments]

Bitcoinspot.nl legt uit: Hoe bewaar je bitcoins op een USB-Stick? Bitcoin-Wallet: Was Anleger beachten sollten - YouTube Pendrive como Carteira Bitcoin - (bitcoins USB stick wallet) Cómo guardar Bitcoin en una memoria USB - Tutorial - YouTube HOW TO made Bitcoin On USB Stick Guide 2019

Außerdem gibt es noch reine Online-Wallets oder sogenannte Hardware-Wallets. Diese sind eine Art USB-Stick auf dem die Wallet gespeichert wird. Auf der deutschen Bitcoin-Seite gibt es eine große Auswahl an verschiedenen Wallets für die jeweiligen Systeme. Suchen Sie sich einer dieser Wallets heraus und installieren Sie diese. Today we're going to detail how to create a secure bitcoin wallet with an inexpensive USB drive. There are a few different wallets you can download for this Von daher sollten Sie andere Arten von Bitcoin Wallets verwenden. Andernfalls sollen sie Online Services sehr sorgfältig auswählen. Zusätzlich wird empfohlen, Zwei-Faktor Authentifizierung zu verwenden. Geringe Mengen für den täglichen Bedarf. Eine Bitcoin-Wallet ist wie eine Geldbörse mit Bargeld. Falls Sie nicht mehrere tausend Euro in Ihrem Geldbeutel aufbewahren, sollten Sie das auch ... Aufregung im Bitcoin-Paradies: Die Datenbank der französischen Firma Ledger wurde gehackt und rund eine Million E-Mail-Adressen gestohlen. Bei Bitcoin USB Wallets handelt es sich um herkömmliche Hardware Wallets, die die Kryptowährung Bitcoin unterstützen. Sie gelten als besonders sicher, weil der Private Key auf der Hardware Wallet abgeschottet verwaltet wird und nicht von außen erreichbar ist. Bekannte Hersteller von Bitcoin USB Wallets sind die Firma Ledger oder auch SatoshiLabs, die bereits einige Modelle herausgebracht ...

[index] [32441] [7886] [34910] [443] [21272] [33038] [23002] [13967] [40330] [4505]

Bitcoinspot.nl legt uit: Hoe bewaar je bitcoins op een USB-Stick?

Tutorial de cómo almacenar bitcoins u otras monedas en un USB o monedero de papel. Si tenéis dudas, comentad en el vídeo y responderé. WEB PARA HACER MONEDER... ATOMIC WALLET PROMO CODE: V8DVB LINKS: _____ GET A NANO LEDGER S for $59.99 UDS!! https://www.ledger.com/?r... Bitcoinspot.nl legt uit: Hoe bewaar je bitcoins op een USB-Stick? In this tutorial I will show how to set up a portable version of the bitcoin core client using window 7. This method allows you to store a full client on a u... This way, if anything happens to one of my USB wallets, I can fall back on a copy that I made, and recover the bitcoins (BTC). Even though there are copies of my wallet files, they will all be ...

#