Bitcoin Core - Desktop - Windows - Choose your wallet ...

Bitcoin - The Currency of the Internet

A community dedicated to Bitcoin, the currency of the Internet. Bitcoin is a distributed, worldwide, decentralized digital money. Bitcoins are issued and managed without any central authority whatsoever: there is no government, company, or bank in charge of Bitcoin. You might be interested in Bitcoin if you like cryptography, distributed peer-to-peer systems, or economics. A large percentage of Bitcoin enthusiasts are libertarians, though people of all political philosophies are welcome.

Cryptocurrency News & Discussion

The official source for CryptoCurrency News, Discussion & Analysis.


This is a subreddit devoted to long-term and short-term trading of Litecoins.

I Did It! I figured out how to use Bitcoin. I am downloading Bitcoin Core Wal. but have not used it yet. I have never used bitcoin. While it installs, I installed Electrum on my Mac & bought $4 of bit on CashApp & moved to My Wallet on Electrum. I lost like 11cents on $4.13. It there a cheaper way?

I Did It! I figured out how to use Bitcoin. I am downloading Bitcoin Core Wal. but have not used it yet. I have never used bitcoin. While it installs, I installed Electrum on my Mac & bought $4 of bit on CashApp & moved to My Wallet on Electrum. I lost like 11cents on $4.13. It there a cheaper way? submitted by jeremyhunt1995 to Bitcoin [link] [comments]

Hi, I have installed Qtum Core Wallet ver v0.14.3.0 32 bits. Can this wallet claim United Bitcoin fork on Jan 3,2018?

submitted by BobLiow to Qtum [link] [comments]

Bitcoin mentioned around Reddit: Hi, I have installed Qtum Core Wallet ver v0.14.3.0 32 bits. Can this wallet claim United Bitcoin fork on Jan 3,2018? /r/Qtum

Bitcoin mentioned around Reddit: Hi, I have installed Qtum Core Wallet ver v0.14.3.0 32 bits. Can this wallet claim United Bitcoin fork on Jan 3,2018? /Qtum submitted by BitcoinAllBot to BitcoinAll [link] [comments]

[uncensored-r/btc] PSA: If you are running "Bitcoin Core" as a wallet, you will not be on the correct chain when Bit...

The following post by jonald_fyookball is being replicated because some comments within the post(but not the post itself) have been openly removed.
The original post can be found(in censored form) at this link: btc/comments/73x5cg
The original post's content was as follows:
Insert whatever rhetoric about forks etc here....but the fact of the matter is that 90%+ of the miners are signaling to upgrade. If they follow through on this, and you're still running a "Bitcoin Core" node as a wallet, you will be on a different chain than a majority of the miners.
submitted by censorship_notifier to noncensored_bitcoin [link] [comments]

Lost $100 because my wallet crashed (Bit Core) /r/Bitcoin

Lost $100 because my wallet crashed (Bit Core) /Bitcoin submitted by BitcoinAllBot to BitcoinAll [link] [comments]

09-17 20:27 - '[quote] My advice to newbies who want to **tryout** the bitcoin core wallet, is to first download an up-to-date pruned blockchain / [here] / This will only take about 20 minutes.Try it out a bit (a wallet will be automatically...' by /u/sumBTC removed from /r/Bitcoin within 194-199min

To use Bitcoin Core, users need to download a copy of the entire transaction history of the digital currency, a process that can take days
My advice to newbies who want to tryout the bitcoin core wallet, is to first download an up-to-date pruned blockchain [here]1
This will only take about 20 minutes.Try it out a bit (a wallet will be automatically generated) and see if you like it, and if you do, create a pruned or non-pruned blockchain from scratch yourself. It will be much easier to wait for the wallet to synchronize if you know what you'll end up with. Also, if you don't like this particular wallet, you haven't put a heavy burden on the Bitcoin network (downloading 100 GB of blocks) for no reason.
Context Link
Go1dfish undelete link
unreddit undelete link
Author: sumBTC
submitted by removalbot to removalbot [link] [comments]

Proposal: The Sia Foundation

Vision Statement

A common sentiment is brewing online; a shared desire for the internet that might have been. After decades of corporate encroachment, you don't need to be a power user to realize that something has gone very wrong.
In the early days of the internet, the future was bright. In that future, when you sent an instant message, it traveled directly to the recipient. When you needed to pay a friend, you announced a transfer of value to their public key. When an app was missing a feature you wanted, you opened up the source code and implemented it. When you took a picture on your phone, it was immediately encrypted and backed up to storage that you controlled. In that future, people would laugh at the idea of having to authenticate themselves to some corporation before doing these things.
What did we get instead? Rather than a network of human-sized communities, we have a handful of enormous commons, each controlled by a faceless corporate entity. Hey user, want to send a message? You can, but we'll store a copy of it indefinitely, unencrypted, for our preference-learning algorithms to pore over; how else could we slap targeted ads on every piece of content you see? Want to pay a friend? You can—in our Monopoly money. Want a new feature? Submit a request to our Support Center and we'll totally maybe think about it. Want to backup a photo? You can—inside our walled garden, which only we (and the NSA, of course) can access. Just be careful what you share, because merely locking you out of your account and deleting all your data is far from the worst thing we could do.
You rationalize this: "MEGACORP would never do such a thing; it would be bad for business." But we all know, at some level, that this state of affairs, this inversion of power, is not merely "unfortunate" or "suboptimal" – No. It is degrading. Even if MEGACORP were purely benevolent, it is degrading that we must ask its permission to talk to our friends; that we must rely on it to safeguard our treasured memories; that our digital lives are completely beholden to those who seek only to extract value from us.
At the root of this issue is the centralization of data. MEGACORP can surveil you—because your emails and video chats flow through their servers. And MEGACORP can control you—because they hold your data hostage. But centralization is a solution to a technical problem: How can we make the user's data accessible from anywhere in the world, on any device? For a long time, no alternative solution to this problem was forthcoming.
Today, thanks to a confluence of established techniques and recent innovations, we have solved the accessibility problem without resorting to centralization. Hashing, encryption, and erasure encoding got us most of the way, but one barrier remained: incentives. How do you incentivize an anonymous stranger to store your data? Earlier protocols like BitTorrent worked around this limitation by relying on altruism, tit-for-tat requirements, or "points" – in other words, nothing you could pay your electric bill with. Finally, in 2009, a solution appeared: Bitcoin. Not long after, Sia was born.
Cryptography has unleashed the latent power of the internet by enabling interactions between mutually-distrustful parties. Sia harnesses this power to turn the cloud storage market into a proper marketplace, where buyers and sellers can transact directly, with no intermediaries, anywhere in the world. No more silos or walled gardens: your data is encrypted, so it can't be spied on, and it's stored on many servers, so no single entity can hold it hostage. Thanks to projects like Sia, the internet is being re-decentralized.
Sia began its life as a startup, which means it has always been subjected to two competing forces: the ideals of its founders, and the profit motive inherent to all businesses. Its founders have taken great pains to never compromise on the former, but this often threatened the company's financial viability. With the establishment of the Sia Foundation, this tension is resolved. The Foundation, freed of the obligation to generate profit, is a pure embodiment of the ideals from which Sia originally sprung.
The goals and responsibilities of the Foundation are numerous: to maintain core Sia protocols and consensus code; to support developers building on top of Sia and its protocols; to promote Sia and facilitate partnerships in other spheres and communities; to ensure that users can easily acquire and safely store siacoins; to develop network scalability solutions; to implement hardforks and lead the community through them; and much more. In a broader sense, its mission is to commoditize data storage, making it cheap, ubiquitous, and accessible to all, without compromising privacy or performance.
Sia is a perfect example of how we can achieve better living through cryptography. We now begin a new chapter in Sia's history. May our stewardship lead it into a bright future.


Today, we are proposing the creation of the Sia Foundation: a new non-profit entity that builds and supports distributed cloud storage infrastructure, with a specific focus on the Sia storage platform. What follows is an informal overview of the Sia Foundation, covering two major topics: how the Foundation will be funded, and what its funds will be used for.

Organizational Structure

The Sia Foundation will be structured as a non-profit entity incorporated in the United States, likely a 501(c)(3) organization or similar. The actions of the Foundation will be constrained by its charter, which formalizes the specific obligations and overall mission outlined in this document. The charter will be updated on an annual basis to reflect the current goals of the Sia community.
The organization will be operated by a board of directors, initially comprising Luke Champine as President and Eddie Wang as Chairman. Luke Champine will be leaving his position at Nebulous to work at the Foundation full-time, and will seek to divest his shares of Nebulous stock along with other potential conflicts of interest. Neither Luke nor Eddie personally own any siafunds or significant quantities of siacoin.


The primary source of funding for the Foundation will come from a new block subsidy. Following a hardfork, 30 KS per block will be allocated to the "Foundation Fund," continuing in perpetuity. The existing 30 KS per block miner reward is not affected. Additionally, one year's worth of block subsidies (approximately 1.57 GS) will be allocated to the Fund immediately upon activation of the hardfork.
As detailed below, the Foundation will provably burn any coins that it cannot meaningfully spend. As such, the 30 KS subsidy should be viewed as a maximum. This allows the Foundation to grow alongside Sia without requiring additional hardforks.
The Foundation will not be funded to any degree by the possession or sale of siafunds. Siafunds were originally introduced as a means of incentivizing growth, and we still believe in their effectiveness: a siafund holder wants to increase the amount of storage on Sia as much as possible. While the Foundation obviously wants Sia to succeed, its driving force should be its charter. Deriving significant revenue from siafunds would jeopardize the Foundation's impartiality and focus. Ultimately, we want the Foundation to act in the best interests of Sia, not in growing its own budget.


The Foundation inherits a great number of responsibilities from Nebulous. Each quarter, the Foundation will publish the progress it has made over the past quarter, and list the responsibilities it intends to prioritize over the coming quarter. This will be accompanied by a financial report, detailing each area of expenditure over the past quarter, and forecasting expenditures for the coming quarter. Below, we summarize some of the myriad responsibilities towards which the Foundation is expected to allocate its resources.

Maintain and enhance core Sia software

Arguably, this is the most important responsibility of the Foundation. At the heart of Sia is its consensus algorithm: regardless of other differences, all Sia software must agree upon the content and rules of the blockchain. It is therefore crucial that the algorithm be stewarded by an entity that is accountable to the community, transparent in its decision-making, and has no profit motive or other conflicts of interest.
Accordingly, Sia’s consensus functionality will no longer be directly maintained by Nebulous. Instead, the Foundation will release and maintain an implementation of a "minimal Sia full node," comprising the Sia consensus algorithm and P2P networking code. The source code will be available in a public repository, and signed binaries will be published for each release.
Other parties may use this code to provide alternative full node software. For example, Nebulous may extend the minimal full node with wallet, renter, and host functionality. The source code of any such implementation may be submitted to the Foundation for review. If the code passes review, the Foundation will provide "endorsement signatures" for the commit hash used and for binaries compiled internally by the Foundation. Specifically, these signatures assert that the Foundation believes the software contains no consensus-breaking changes or other modifications to imported Foundation code. Endorsement signatures and Foundation-compiled binaries may be displayed and distributed by the receiving party, along with an appropriate disclaimer.
A minimal full node is not terribly useful on its own; the wallet, renter, host, and other extensions are what make Sia a proper developer platform. Currently, the only implementations of these extensions are maintained by Nebulous. The Foundation will contract Nebulous to ensure that these extensions continue to receive updates and enhancements. Later on, the Foundation intends to develop its own implementations of these extensions and others. As with the minimal node software, these extensions will be open source and available in public repositories for use by any Sia node software.
With the consensus code now managed by the Foundation, the task of implementing and orchestrating hardforks becomes its responsibility as well. When the Foundation determines that a hardfork is necessary (whether through internal discussion or via community petition), a formal proposal will be drafted and submitted for public review, during which arguments for and against the proposal may be submitted to a public repository. During this time, the hardfork code will be implemented, either by Foundation employees or by external contributors working closely with the Foundation. Once the implementation is finished, final arguments will be heard. The Foundation board will then vote whether to accept or reject the proposal, and announce their decision along with appropriate justification. Assuming the proposal was accepted, the Foundation will announce the block height at which the hardfork will activate, and will subsequently release source code and signed binaries that incorporate the hardfork code.
Regardless of the Foundation's decision, it is the community that ultimately determines whether a fork is accepted or rejected – nothing can change that. Foundation node software will never automatically update, so all forks must be explicitly adopted by users. Furthermore, the Foundation will provide replay and wipeout protection for its hard forks, protecting other chains from unintended or malicious reorgs. Similarly, the Foundation will ensure that any file contracts formed prior to a fork activation will continue to be honored on both chains until they expire.
Finally, the Foundation also intends to pursue scalability solutions for the Sia blockchain. In particular, work has already begun on an implementation of Utreexo, which will greatly reduce the space requirements of fully-validating nodes (allowing a full node to be run on a smartphone) while increasing throughput and decreasing initial sync time. A hardfork implementing Utreexo will be submitted to the community as per the process detailed above.
As this is the most important responsibility of the Foundation, it will receive a significant portion of the Foundation’s budget, primarily in the form of developer salaries and contracting agreements.

Support community services

We intend to allocate 25% of the Foundation Fund towards the community. This allocation will be held and disbursed in the form of siacoins, and will pay for grants, bounties, hackathons, and other community-driven endeavours.
Any community-run service, such as a Skynet portal, explorer or web wallet, may apply to have its costs covered by the Foundation. Upon approval, the Foundation will reimburse expenses incurred by the service, subject to the exact terms agreed to. The intent of these grants is not to provide a source of income, but rather to make such services "break even" for their operators, so that members of the community can enrich the Sia ecosystem without worrying about the impact on their own finances.

Ensure easy acquisition and storage of siacoins

Most users will acquire their siacoins via an exchange. The Foundation will provide support to Sia-compatible exchanges, and pursue relevant integrations at its discretion, such as Coinbase's new Rosetta standard. The Foundation may also release DEX software that enables trading cryptocurrencies without the need for a third party. (The Foundation itself will never operate as a money transmitter.)
Increasingly, users are storing their cryptocurrency on hardware wallets. The Foundation will maintain the existing Ledger Nano S integration, and pursue further integrations at its discretion.
Of course, all hardware wallets must be paired with software running on a computer or smartphone, so the Foundation will also develop and/or maintain client-side wallet software, including both full-node wallets and "lite" wallets. Community-operated wallet services, i.e. web wallets, may be funded via grants.
Like core software maintenance, this responsibility will be funded in the form of developer salaries and contracting agreements.

Protect the ecosystem

When it comes to cryptocurrency security, patching software vulnerabilities is table stakes; there are significant legal and social threats that we must be mindful of as well. As such, the Foundation will earmark a portion of its fund to defend the community from legal action. The Foundation will also safeguard the network from 51% attacks and other threats to network security by implementing softforks and/or hardforks where necessary.
The Foundation also intends to assist in the development of a new FOSS software license, and to solicit legal memos on various Sia-related matters, such as hosting in the United States and the EU.
In a broader sense, the establishment of the Foundation makes the ecosystem more robust by transferring core development to a more neutral entity. Thanks to its funding structure, the Foundation will be immune to various forms of pressure that for-profit companies are susceptible to.

Drive adoption of Sia

Although the overriding goal of the Foundation is to make Sia the best platform it can be, all that work will be in vain if no one uses the platform. There are a number of ways the Foundation can promote Sia and get it into the hands of potential users and developers.
In-person conferences are understandably far less popular now, but the Foundation can sponsor and/or participate in virtual conferences. (In-person conferences may be held in the future, permitting circumstances.) Similarly, the Foundation will provide prizes for hackathons, which may be organized by community members, Nebulous, or the Foundation itself. Lastly, partnerships with other companies in the cryptocurrency space—or the cloud storage space—are a great way to increase awareness of Sia. To handle these responsibilities, one of the early priorities of the Foundation will be to hire a marketing director.

Fund Management

The Foundation Fund will be controlled by a multisig address. Each member of the Foundation's board will control one of the signing keys, with the signature threshold to be determined once the final composition of the board is known. (This threshold may also be increased or decreased if the number of board members changes.) Additionally, one timelocked signing key will be controlled by David Vorick. This key will act as a “dead man’s switch,” to be used in the event of an emergency that prevents Foundation board members from reaching the signature threshold. The timelock ensures that this key cannot be used unless the Foundation fails to sign a transaction for several months.
On the 1st of each month, the Foundation will use its keys to transfer all siacoins in the Fund to two new addresses. The first address will be controlled by a high-security hot wallet, and will receive approximately one month's worth of Foundation expenditures. The second address, receiving the remaining siacoins, will be a modified version of the source address: specifically, it will increase the timelock on David Vorick's signing key by one month. Any other changes to the set of signing keys, such as the arrival or departure of board members, will be incorporated into this address as well.
The Foundation Fund is allocated in SC, but many of the Foundation's expenditures must be paid in USD or other fiat currency. Accordingly, the Foundation will convert, at its discretion, a portion of its monthly withdrawals to fiat currency. We expect this conversion to be primarily facilitated by private "OTC" sales to accredited investors. The Foundation currently has no plans to speculate in cryptocurrency or other assets.
Finally, it is important that the Foundation adds value to the Sia platform well in excess of the inflation introduced by the block subsidy. For this reason, the Foundation intends to provably burn, on a quarterly basis, any coins that it cannot allocate towards any justifiable expense. In other words, coins will be burned whenever doing so provides greater value to the platform than any other use. Furthermore, the Foundation will cap its SC treasury at 5% of the total supply, and will cap its USD treasury at 4 years’ worth of predicted expenses.
Addendum: Hardfork Timeline
We would like to see this proposal finalized and accepted by the community no later than September 30th. A new version of siad, implementing the hardfork, will be released no later than October 15th. The hardfork will activate at block 293220, which is expected to occur around 12pm EST on January 1st, 2021.
Addendum: Inflation specifics
The total supply of siacoins as of January 1st, 2021 will be approximately 45.243 GS. The initial subsidy of 1.57 GS thus increases the supply by 3.47%, and the total annual inflation in 2021 will be at most 10.4% (if zero coins are burned). In 2022, total annual inflation will be at most 6.28%, and will steadily decrease in subsequent years.


We see the establishment of the Foundation as an important step in the maturation of the Sia project. It provides the ecosystem with a sustainable source of funding that can be exclusively directed towards achieving Sia's ambitious goals. Compared to other projects with far deeper pockets, Sia has always punched above its weight; once we're on equal footing, there's no telling what we'll be able to achieve.
Nevertheless, we do not propose this change lightly, and have taken pains to ensure that the Foundation will act in accordance with the ideals that this community shares. It will operate transparently, keep inflation to a minimum, and respect the user's fundamental role in decentralized systems. We hope that everyone in the community will consider this proposal carefully, and look forward to a productive discussion.
submitted by lukechampine to siacoin [link] [comments]

Bitcoin Newcomers FAQ - Please read!

Welcome to the /Bitcoin Sticky FAQ

You've probably been hearing a lot about Bitcoin recently and are wondering what's the big deal? Most of your questions should be answered by the resources below but if you have additional questions feel free to ask them in the comments.
It all started with the release of the release of Satoshi Nakamoto's whitepaper however that will probably go over the head of most readers so we recommend the following videos for a good starting point for understanding how bitcoin works and a little about its long term potential:
Some other great resources include, the Princeton crypto series and James D'Angelo's Bitcoin 101 Blackboard series.
Some excellent writing on Bitcoin's value proposition and future can be found at the Satoshi Nakamoto Institute.
Some Bitcoin statistics can be found here and here. Developer resources can be found here. Peer-reviewed research papers can be found here.
Potential upcoming protocol improvements and scaling resources here and here.
The number of times Bitcoin was declared dead by the media can be found here (LOL!)

Key properties of Bitcoin

Where can I buy bitcoins? and are helpful sites for beginners. You can buy or sell any amount of bitcoin (even just a few dollars worth) and there are several easy methods to purchase bitcoin with cash, credit card or bank transfer. Some of the more popular resources are below, also check out the bitcoinity exchange resources for a larger list of options for purchases.
Here is a listing of local ATMs. If you would like your paycheck automatically converted to bitcoin use Bitwage.
Note: Bitcoins are valued at whatever market price people are willing to pay for them in balancing act of supply vs demand. Unlike traditional markets, bitcoin markets operate 24 hours per day, 365 days per year. Preev is a useful site that that shows how much various denominations of bitcoin are worth in different currencies. Alternatively you can just Google "1 bitcoin in (your local currency)".

Securing your bitcoins

With bitcoin you can "Be your own bank" and personally secure your bitcoins OR you can use third party companies aka "Bitcoin banks" which will hold the bitcoins for you.
Note: For increased security, use Two Factor Authentication (2FA) everywhere it is offered, including email!
2FA requires a second confirmation code to access your account making it much harder for thieves to gain access. Google Authenticator and Authy are the two most popular 2FA services, download links are below. Make sure you create backups of your 2FA codes.
Google Auth Authy OTP Auth
Android Android N/A

Watch out for scams

As mentioned above, Bitcoin is decentralized, which by definition means there is no official website or Twitter handle or spokesperson or CEO. However, all money attracts thieves. This combination unfortunately results in scammers running official sounding names or pretending to be an authority on YouTube or social media. Many scammers throughout the years have claimed to be the inventor of Bitcoin. Websites like bitcoin(dot)com and the btc subreddit are active scams. Almost all altcoins (shitcoins) are marketed heavily with big promises but are really just designed to separate you from your bitcoin. So be careful: any resource, including all linked in this document, may in the future turn evil. Don't trust, verify. Also as they say in our community "Not your keys, not your coins".

Where can I spend bitcoins?

Check out spendabit or bitcoin directory for millions of merchant options. Also you can spend bitcoin anywhere visa is accepted with bitcoin debit cards such as the CashApp card. Some other useful site are listed below.
Store Product
Gyft Gift cards for hundreds of retailers including Amazon, Target, Walmart, Starbucks, Whole Foods, CVS, Lowes, Home Depot, iTunes, Best Buy, Sears, Kohls, eBay, GameStop, etc.
Spendabit, Overstock and The Bitcoin Directory Retail shopping with millions of results
ShakePay Generate one time use Visa cards in seconds
NewEgg and Dell For all your electronics needs, Coinbills, Piixpay,, Bylls,, Bitrefill, LivingRoomofSatoshi, Coinsfer, and more Bill payment
Menufy, Takeaway and Thuisbezorgd NL Takeout delivered to your door
Expedia, Cheapair, Destinia, Abitsky, SkyTours, the Travel category on Gyft and 9flats For when you need to get away
Cryptostorm, Mullvad, and PIA VPN services
Namecheap, Porkbun Domain name registration
Stampnik Discounted USPS Priority, Express, First-Class mail postage
Coinmap and AirBitz are helpful to find local businesses accepting bitcoins. A good resource for UK residents is at
There are also lots of charities which accept bitcoin donations.

Merchant Resources

There are several benefits to accepting bitcoin as a payment option if you are a merchant;
If you are interested in accepting bitcoin as a payment method, there are several options available;

Can I mine bitcoin?

Mining bitcoins can be a fun learning experience, but be aware that you will most likely operate at a loss. Newcomers are often advised to stay away from mining unless they are only interested in it as a hobby similar to folding at home. If you want to learn more about mining you can read more here. Still have mining questions? The crew at /BitcoinMining would be happy to help you out.
If you want to contribute to the bitcoin network by hosting the blockchain and propagating transactions you can run a full node using this setup guide. If you would prefer to keep it simple there are several good options. You can view the global node distribution here.

Earning bitcoins

Just like any other form of money, you can also earn bitcoins by being paid to do a job.
Site Description
WorkingForBitcoins, Bitwage, Cryptogrind, Coinality, Bitgigs, /Jobs4Bitcoins, BitforTip, Rein Project Freelancing
Lolli Earn bitcoin when you shop online!
OpenBazaar,, Bitify, /Bitmarket, 21 Market Marketplaces
/GirlsGoneBitcoin NSFW Adult services
A-ads, Advertising
You can also earn bitcoins by participating as a market maker on JoinMarket by allowing users to perform CoinJoin transactions with your bitcoins for a small fee (requires you to already have some bitcoins.

Bitcoin-Related Projects

The following is a short list of ongoing projects that might be worth taking a look at if you are interested in current development in the bitcoin space.
Project Description
Lightning Network Second layer scaling
Blockstream, Rootstock and Drivechain Sidechains
Hivemind and Augur Prediction markets
Tierion and Factom Records & Titles on the blockchain
BitMarkets, DropZone, Beaver and Open Bazaar Decentralized markets
JoinMarket and Wasabi Wallet CoinJoin implementation
Coinffeine and Bisq Decentralized bitcoin exchanges
Keybase Identity & Reputation management
Abra Global P2P money transmitter network
Bitcore Open source Bitcoin javascript library

Bitcoin Units

One Bitcoin is quite large (hundreds of £/$/€) so people often deal in smaller units. The most common subunits are listed below:
Unit Symbol Value Info
bitcoin BTC 1 bitcoin one bitcoin is equal to 100 million satoshis
millibitcoin mBTC 1,000 per bitcoin used as default unit in recent Electrum wallet releases
bit bit 1,000,000 per bitcoin colloquial "slang" term for microbitcoin (μBTC)
satoshi sat 100,000,000 per bitcoin smallest unit in bitcoin, named after the inventor
For example, assuming an arbitrary exchange rate of $10000 for one Bitcoin, a $10 meal would equal:
For more information check out the Bitcoin units wiki.
Still have questions? Feel free to ask in the comments below or stick around for our weekly Mentor Monday thread. If you decide to post a question in /Bitcoin, please use the search bar to see if it has been answered before, and remember to follow the community rules outlined on the sidebar to receive a better response. The mods are busy helping manage our community so please do not message them unless you notice problems with the functionality of the subreddit.
Note: This is a community created FAQ. If you notice anything missing from the FAQ or that requires clarification you can edit it here and it will be included in the next revision pending approval.
Welcome to the Bitcoin community and the new decentralized economy!
submitted by BitcoinFan7 to Bitcoin [link] [comments]

Reminder from previous bull markets

Usually, bull markets attract a lot of new investors - although speculators should be the right word here - and as usual, a lot of them are going to be crushed a way or another.
First, before putting a single dollar, euro or whatever in the market, you should read a lot to know exactly what you're looking for.
Are you here for the tech and/or the cypherpunk ethos ? Great, there's lot of resources out there (my links are cleaned but as always, do your due diligence) :
Now, you've read and you want to put some skin in the game. Several exchanges are acceptable, a lot of aren't, be careful and assume that none really are (know that I won't post any ref links) :
This was for centralized exchanges aka CEX. Talking about custodial, you'll need wallets to store your (bit)coins. Always try to use non-custodial wallets, which means wallets that give you your private keys. This way, if the software goes down, you can always retreive your money. Now, I won't link to all the existing wallets but will advise you to buy hardware wallets (trezor or ledger but there are others) or to create (on off-gap computers) paper wallets you're able to store safely (against all risks, not only robbery but housefire). You also could use your memory with brain wallets but, my gosh, I wouldn't trust myself. For Bitcoin (or even Litecoin), Electrum software can do a good job (but save your keys).
Now, about trading : it's been repeated and repeated but don't chase pumps and altcoins. Yep, it's probably the fastest way to make money. It's also the fastest to lose it. I won't lie : I made good money during the 2017-bullrun and I took profits but I also forgot to sell some shitcoins thinking it would keep going up, now I'm still holding these bags (although I don't really care). I know that a lot forgot to take profits. Take profits, always take profits, whatever your strategy is. Don't fall for people trying to sell you their bags, for ICOs trying to sell you a product which isn't released yet and obviously, don't fall for people asking for your private key.
Also, know that there's two endgames : accumulating bitcoin or fiat. I'm rather in the first team but whatever your strategy is, take profits. (Yes, I know, some will say accumulating ethereum or something else). It's true that a lot of ethereum holders made a lot of money during the last bullrun (ethereum helped me make money too) but I'm really biased in favor of bitcoin (and monero). So, pick your coin but again, do your due diligence.
A lot of people here or there will talk about the best tech, the fact that bitcoin is old and slow. I would need another post to go further on this point but know that a lof of air flight systems are old too but reliable. Trustless and reliable is the point here.
This is the post from someone who bought bitcoin seven or six years ago, who lost part of them, who spent part of them (but don't regret this at all), who is still learning and I hope it will help others, although it would need a book to be complete.
submitted by EmmanuelBlockchain to CryptoCurrency [link] [comments]

Help recovering from old wallet.dat for an old friend.

Hey all,
I've been in the Bitcoin space since early 2012.
I have a situation that I would love to get some assistance with, I will explain the situation momentarily. Please do not message me and ask me for the wallet.dat file it's not going to happen.
I have an old wallet.dat file from late 2012 or early 2013 from a coin I sold to a friend. Tried to recover the coins in 2018 and failed, later found out that someone had access to the computer and could have easily stole them. Would the current Bitcoin Core be able to read an old wallet.dat file, and is there any way to easily view the balance of a 2012 wallet.dat file without having to load the entire blockchain?
In the early days of Bitcoin as many of you OG's know, the only option to securely store your coins was to use the default Bitcoin wallet in a wallet.dat file. A friend of mine was really wanted to invest in Bitcoin but didn't know how, so I sold one to him because I didn't want him to get screwed. I installed Bitcoin QT on their home laptop, had him write down the password on a piece of paper and had him put a backup of the wallet.dat file onto a USB.
Fast forward to when the price went to $20k plus, he calls me up super excited and said he wanted to sell his coin because he could use the money and I encouraged it because from my prior experience I knew the momentum was unsustainable and I had sold a few coins of my own.
Anyway, I go over to his house and we huddle around his computer. He tells me that he upgraded the hard drive in his computer and gave me his old one and I went back to my house to get an external hard drive reader. I came back, booted up his old drive and remembered that we would have to let it sync up in order to get the coins out, and on his internet that wasn't going to happen anytime soon. He gave me the hard drive and I went home and left on Bitcoin QT overnight and in the morning I was shocked to see that there were no transactions on the wallet. Quick note, he had the wallet password in a file on his documents titled "Bitcoin Wallet Password.txt". smh.
I started to panic, and I realized how bad this looked on me. I called him and told him that there were no coins on there and asked if he had his USB stick and he told me he had lost it years ago. I frantically looked through all of my old wallet files to find any transaction that could link to his address, to show that his coins were still in there. After a while I realized I had sent the coins from the now defunct, and had no way to check up on the coins.
I did everything in my ability to try to recover lost data from the hard drive to no avail. I asked him if anyone else has had access to his computer, and then asked him how he replaced his hard drive because I know him well enough to know he wouldn't pull apart a laptop to replace the hard drive. He told me he took it to a shop to have it replaced a few months earlier. I suspect that I'm either trying to view the wallet incorrectly or whoever replaced his hard drive snooped on his hard drive, stole the coins and replaced the wallet.dat file and generated a new one. I have to admit, I was relieved a little bit to have an explanation to coins not being there but I could imagine he thinks I may have had something to do with it. I made a few more attempts over the years whenever I was reminded of the situation to no avail.
We kind of fell out after that and haven't spoken in a while. Recently, I saw a post on his Facebook that his wife is pregnant they are having a baby, and that's why I'm here. I would love nothing more than to be able to message him and let him know that I have 11 grand waiting for him, because I'm certain the money would mean the world to him during such a stressful time.
Any help or insights would be incredibly helpful and appreciated.
submitted by Good-Exercise to Bitcoin [link] [comments]

Bitcoin Fullnode Install Guide for Dummies ;-)

Bitcoin Fullnode Install Guide for Dummies ;-)
Feel free to stop at Level 0 or Level 1, which is fine. More advanced configs are offered to those with more tech savvy. This guide, obviously assumes a Windows 10 install, but other OSes work fine, just find a different guide. BTW, the "For Dummies" is a callback to a set of "tech" books in the 90's intended to be as easy as possible. It is in jest and not intended to insult the reader. Finally, if you dislike the formatting, a well formatted copy can be found here
There is a fairly small subset of Bitcoin users that run a full node. I think the idea of running a full node has gotten a bad rap over the years since there is so much talk about running on a Raspberry Pi, or getting zippy SSDs. Although all of this can be fun, it is often not really required at all. Here are some ways to run a full node starting with the very simple. I'll get into more complex configs, but these are all optional.

Tech Skill Level: 0 (the basics)

  1. Download Bitcoin Core
  2. Launch the downloaded installer and install the app
  3. Launch the installed "Bitcoin Core" app and let it run overnight
In many cases, thats it. If your running a new machine with a fairly good internet connection, 8 or 9 hours will be enough to complete the "Initial Block Download" (IBD). This may fill up your drive a bit, but again, on most new machines, 300 GB of space isn't that hard to come by.

Tech Skill Level: 1 (encrypted wallet)

One thing we left out in the level-0 exercise is encrypting your wallet. It's easy enough to do well, but a bit more difficult to do right. The main challenge is that humans generate really poor passwords. If you want a good password, the best way is to use something called "diceware". Basically, you just grab 4 or 5 dice and each throw of the dice represents a certain word on a special list. The throw {1,4,5,3,1} for example would be the word camping on the EFF-diceware-wordlist. So you repeat this a few times until you have a list of 8 or so words which becomes the passphrase you use to encrypt your wallet. Write it down, it is always hard to remember at first. So at level-1 your list becomes:
  1. Download Bitcoin Core
  2. Launch the downloaded installer and install the app
  3. Launch the installed "Bitcoin Core" app and let it run overnight
  4. Choose Encrypt Wallet from the Settings menu
  5. Enter your 8 word (or so) passphrase generated using the Diceware method

Wallet Encryption Dialog

Tech Skill Level: 2 (enable pruning if needed)

Though I said "300 GB of space isn't hard to come by", some times it actually is. If space is an issue, a simple way to fix it is to tell bitcoin to simple take less space. This is called "pruning" and can take that number from 300 GB down to below 5 GB. If you can't find 5 GB, then you'll have to read ahead to level-4 to add USB storage. But the good news is, enabling pruning is pretty easy, we just add another step to our working list:
  1. Download Bitcoin Core
  2. Launch the downloaded installer and install the app
  3. Launch the installed "Bitcoin Core" app and let it run overnight
  4. Do the wallet encryption steps here if you wish
  5. Choose Options from the Settings menu
  6. Choose Prune block storage to: and select the max size for the blocks to use
  7. Exit and restart the bitcoin application for the changes to take effect

Pruning Dialog
Note, even setting this to 1 GB will still leave you with about a 4.5 GB install. The blocks take up a lot of space, but the chainstate and other folders eat up at least 3.5 GB and they can't be pruned. Also, be aware, to disable pruning requires you to perform the entire IBD again. While pruned some other functions my be disabled as well, so just know that pruning does limit some functionality.

Tech Skill Level: 3 (verify the installer)

Although this is arguably something that should be done at level-0, some find the intricacies of comparing hash (thumbprint) values to be tedious and beyond the scope of a beginner. You will find these types of hash compares suggested quite often as a way to prevent running tainted programs. Programs are often tainted by bad disk or network performance, but most often, taint is malicious code inserted by viruses or malware. This is a way to guard yourself against those types of attacks.
What I cover here is a very basic comparison on the certificate, but a more thorough verification advised by mosts uses a program called Gpg4Win, and is beyond the scope of this beginners guide. But regardless, most users should strive to do this minimum level of validation.
  1. Download Bitcoin Core
  2. Launch the downloaded installer
  3. When prompted "Do you want to allow..." click Show more details
  4. In the details section select Show information about the publisher's certificate
  5. In the certificate window select the Details tab
  6. In the Details tab Subject should start with "CN = Bitcoin Core Code Signing Association"
  7. Ensure Thumbprint in Details reads ea27d3cefb3eb715ed214176a5d027e01ba1ee86
  8. If the checks pass, click OK to exit the certificate window and Yes to allow the installer to run.
  9. Launch the installed "Bitcoin Core" app and let it run overnight
  10. Do the wallet encryption steps here if you wish
  11. Do the optional pruning steps here if you wish

Certification Validation Windows
Note: The certificate used to sign the current Bitcoin installer is only valid from March 2020 to March 2021. After that point the thumbprint on the certificate will change. This is by design and intentional. If your reading this post after March 2021, then it is understood that the thumbprint has changed.

Tech Skill Level: 4 (use secondary storage)

We glossed over the "new machine with fairly good internet" part. Truth be known many people do not have fairly new machines, and find the IBD to take longer than the "over night" best wishes. For most people the slowdown is the disk access when calculating what is called chainstate. This requires fast random reads and writes to the disk. If you have an SSD disk, this will be no problem, but if you have a non-SSD "spinning" disk, random writes are always slow. Though an SSD will speed things up, they are pricey, so a nice middle ground may be a simple high-end USB key drive. You can get some with 10 to 15 MB/s random writes for $20 on Amazon. This is usually a order of magnitude faster than a "spinning" disk. And with pruning (see level-2), a small USB drive should be fine.
Once you decide on a drive, the tricky part will be to enable external storage. It requires editing a configuration file and adding a line. First, we want to create a directory on the key drive. You will need to determine the drive letter of your USB key drive. For the sake of this example, we will assume it is D:, but you must determine this yourself and correct the example. Once you know the drive letter, create a blank folder on the drive called Bitcoin. So for this example, creating Bitcoin on drive D: will create the path D:\Bitcoin. Once done, assuming that D: is your drive, here are the new steps including the edit of the configuration file:
  1. Download Bitcoin Core
  2. Launch the installer, verify it, then run it
  3. Launch the installed "Bitcoin Core" app and let it run overnight
  4. Do the wallet encryption steps here if you wish
  5. Do the optional pruning steps here if you wish
  6. Launch "Notepad" by typing "Notepad.exe" in the windows search bar then click Open
  7. Type the line datadir=D:\Bitcoin (depending on your drive letter) in the blank file
  8. Choose Save from the File menu in notepad
  9. Type %APPDATA%\Bitcoin\bitcoin.conf (note the percent signs) in the File name box
  10. Select All Files from the Save as type dropdown
  11. Click the Save button and overwrite the file if prompted
  12. Exit and restart the bitcoin application for the changes to take effect

Save As Dialog
Now that you've reached this level of technical expertise, there are many new configuration options that you can begin to modify if you wish. Most configuration data is contained in the bitcoin.conf file and learning how to maintain it is a key step for a node operator.

Tech Skill Level: 5 (all other customizations)

Here's a short list of various things you can ADD to your bitcoin.conf file. You generally just add a new line for each configuration settings.
  • addresstype=bech32
  • changetype=bech32
The addresstype / changetype allows your wallet to use the native-segwit (bech32) format. This is the most efficient and inexpensive way to spend bitcoin, and is a recommended configuration. The default uses something called p2sh-segwit which is more compatible with older wallets, but more expensive to spend.
  • minrelaytxfee=0.00000011
Changing the minrelaytxfee setting allows you to help propagate lower fee transactions. It will require more memory but TXN memory is capped at 300 MB by default anyways, so if you have enough memory, it is a good setting to choose.
  • dbcache=2048
The dbcache setting controls how many MB of memory the program will use for the chainstate database. Since this is a key bottleneck in the IBD, setting this value high (2048 MB) will greatly speed up the IBD, assuming you have the memory to spare
  • blocksdir=C:\Bitcoin
  • datadir=D:\Bitcoin
In level-4 we discussed moving the datadir to a fast external storage, but the majority of the space used for bitcoin is the blocks directory (blocksdir). Although you should always use for fastest storage for datadir, you are free to use slow storage for blocksdir. So if you only want to consume a small amount of your SSD (assumed D:) then you can keep your blocks on your slow "spinning" drive.
  • upnp=1
One of the harder challenges you may face running a node, is to get incoming connections. If you are lucky, you may find that your firewall and network HW support the uPnP protocol. If they do, this setting will allow bitcoin to configure uPnP to allow incoming connections to your node. Other methods exist to make your node reachable, but they are well beyond the scope of this guide.
submitted by brianddk to Bitcoin [link] [comments]

Technical: Taproot: Why Activate?

This is a follow-up on
Taproot! Everybody wants it!! But... you might ask yourself: sure, everybody else wants it, but why would I, sovereign Bitcoin HODLer, want it? Surely I can be better than everybody else because I swapped XXX fiat for Bitcoin unlike all those nocoiners?
And it is important for you to know the reasons why you, o sovereign Bitcoiner, would want Taproot activated. After all, your nodes (or the nodes your wallets use, which if you are SPV, you hopefully can pester to your wallet vendoimplementor about) need to be upgraded in order for Taproot activation to actually succeed instead of becoming a hot sticky mess.
First, let's consider some principles of Bitcoin.
I'm sure most of us here would agree that the above are very important principles of Bitcoin and that these are principles we would not be willing to remove. If anything, we would want those principles strengthened (especially the last one, financial privacy, which current Bitcoin is only sporadically strong with: you can get privacy, it just requires effort to do so).
So, how does Taproot affect those principles?

Taproot and Your /Coins

Most HODLers probably HODL their coins in singlesig addresses. Sadly, switching to Taproot would do very little for you (it gives a mild discount at spend time, at the cost of a mild increase in fee at receive time (paid by whoever sends to you, so if it's a self-send from a P2PKH or bech32 address, you pay for this); mostly a wash).
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash, so the Taproot output spends 12 bytes more; spending from a P2WPKH requires revealing a 32-byte public key later, which is not needed with Taproot, and Taproot signatures are about 9 bytes smaller than P2WPKH signatures, but the 32 bytes plus 9 bytes is divided by 4 because of the witness discount, so it saves about 11 bytes; mostly a wash, it increases blockweight by about 1 virtual byte, 4 weight for each Taproot-output-input, compared to P2WPKH-output-input).
However, as your HODLings grow in value, you might start wondering if multisignature k-of-n setups might be better for the security of your savings. And it is in multisignature that Taproot starts to give benefits!
Taproot switches to using Schnorr signing scheme. Schnorr makes key aggregation -- constructing a single public key from multiple public keys -- almost as trivial as adding numbers together. "Almost" because it involves some fairly advanced math instead of simple boring number adding, but hey when was the last time you added up your grocery list prices by hand huh?
With current P2SH and P2WSH multisignature schemes, if you have a 2-of-3 setup, then to spend, you need to provide two different signatures from two different public keys. With Taproot, you can create, using special moon math, a single public key that represents your 2-of-3 setup. Then you just put two of your devices together, have them communicate to each other (this can be done airgapped, in theory, by sending QR codes: the software to do this is not even being built yet, but that's because Taproot hasn't activated yet!), and they will make a single signature to authorize any spend from your 2-of-3 address. That's 73 witness bytes -- 18.25 virtual bytes -- of signatures you save!
And if you decide that your current setup with 1-of-1 P2PKH / P2WPKH addresses is just fine as-is: well, that's the whole point of a softfork: backwards-compatibility; you can receive from Taproot users just fine, and once your wallet is updated for Taproot-sending support, you can send to Taproot users just fine as well!
(P2WPKH and P2WSH -- SegWit v0 -- addresses start with bc1q; Taproot -- SegWit v1 --- addresses start with bc1p, in case you wanted to know the difference; in bech32 q is 0, p is 1)
Now how about HODLers who keep all, or some, of their coins on custodial services? Well, any custodial service worth its salt would be doing at least 2-of-3, or probably something even bigger, like 11-of-15. So your custodial service, if it switched to using Taproot internally, could save a lot more (imagine an 11-of-15 getting reduced from 11 signatures to just 1!), which --- we can only hope! --- should translate to lower fees and better customer service from your custodial service!
So I think we can say, very accurately, that the Bitcoin principle --- that YOU are in control of your money --- can only be helped by Taproot (if you are doing multisignature), and, because P2PKH and P2WPKH remain validly-usable addresses in a Taproot future, will not be harmed by Taproot. Its benefit to this principle might be small (it mostly only benefits multisignature users) but since it has no drawbacks with this (i.e. singlesig users can continue to use P2WPKH and P2PKH still) this is still a nice, tidy win!
(even singlesig users get a minor benefit, in that multisig users will now reduce their blockchain space footprint, so that fees can be kept low for everybody; so for example even if you have your single set of private keys engraved on titanium plates sealed in an airtight box stored in a safe buried in a desert protected by angry nomads riding giant sandworms because you're the frickin' Kwisatz Haderach, you still gain some benefit from Taproot)
And here's the important part: if P2PKH/P2WPKH is working perfectly fine with you and you decide to never use Taproot yourself, Taproot will not affect you detrimentally. First do no harm!

Taproot and Your Contracts

No one is an island, no one lives alone. Give and you shall receive. You know: by trading with other people, you can gain expertise in some obscure little necessity of the world (and greatly increase your productivity in that little field), and then trade the products of your expertise for necessities other people have created, all of you thereby gaining gains from trade.
So, contracts, which are basically enforceable agreements that facilitate trading with people who you do not personally know and therefore might not trust.
Let's start with a simple example. You want to buy some gewgaws from somebody. But you don't know them personally. The seller wants the money, you want their gewgaws, but because of the lack of trust (you don't know them!! what if they're scammers??) neither of you can benefit from gains from trade.
However, suppose both of you know of some entity that both of you trust. That entity can act as a trusted escrow. The entity provides you security: this enables the trade, allowing both of you to get gains from trade.
In Bitcoin-land, this can be implemented as a 2-of-3 multisignature. The three signatories in the multisgnature would be you, the gewgaw seller, and the escrow. You put the payment for the gewgaws into this 2-of-3 multisignature address.
Now, suppose it turns out neither of you are scammers (whaaaat!). You receive the gewgaws just fine and you're willing to pay up for them. Then you and the gewgaw seller just sign a transaction --- you and the gewgaw seller are 2, sufficient to trigger the 2-of-3 --- that spends from the 2-of-3 address to a singlesig the gewgaw seller wants (or whatever address the gewgaw seller wants).
But suppose some problem arises. The seller gave you gawgews instead of gewgaws. Or you decided to keep the gewgaws but not sign the transaction to release the funds to the seller. In either case, the escrow is notified, and if it can sign with you to refund the funds back to you (if the seller was a scammer) or it can sign with the seller to forward the funds to the seller (if you were a scammer).
Taproot helps with this: like mentioned above, it allows multisignature setups to produce only one signature, reducing blockchain space usage, and thus making contracts --- which require multiple people, by definition, you don't make contracts with yourself --- is made cheaper (which we hope enables more of these setups to happen for more gains from trade for everyone, also, moon and lambos).
(technology-wise, it's easier to make an n-of-n than a k-of-n, making a k-of-n would require a complex setup involving a long ritual with many communication rounds between the n participants, but an n-of-n can be done trivially with some moon math. You can, however, make what is effectively a 2-of-3 by using a three-branch SCRIPT: either 2-of-2 of you and seller, OR 2-of-2 of you and escrow, OR 2-of-2 of escrow and seller. Fortunately, Taproot adds a facility to embed a SCRIPT inside a public key, so you can have a 2-of-2 Taprooted address (between you and seller) with a SCRIPT branch that can instead be spent with 2-of-2 (you + escrow) OR 2-of-2 (seller + escrow), which implements the three-branched SCRIPT above. If neither of you are scammers (hopefully the common case) then you both sign using your keys and never have to contact the escrow, since you are just using the escrow public key without coordinating with them (because n-of-n is trivial but k-of-n requires setup with communication rounds), so in the "best case" where both of you are honest traders, you also get a privacy boost, in that the escrow never learns you have been trading on gewgaws, I mean ewww, gawgews are much better than gewgaws and therefore I now judge you for being a gewgaw enthusiast, you filthy gewgawer).

Taproot and Your Contracts, Part 2: Cryptographic Boogaloo

Now suppose you want to buy some data instead of things. For example, maybe you have some closed-source software in trial mode installed, and want to pay the developer for the full version. You want to pay for an activation code.
This can be done, today, by using an HTLC. The developer tells you the hash of the activation code. You pay to an HTLC, paying out to the developer if it reveals the preimage (the activation code), or refunding the money back to you after a pre-agreed timeout. If the developer claims the funds, it has to reveal the preimage, which is the activation code, and you can now activate your software. If the developer does not claim the funds by the timeout, you get refunded.
And you can do that, with HTLCs, today.
Of course, HTLCs do have problems:
Fortunately, with Schnorr (which is enabled by Taproot), we can now use the Scriptless Script constuction by Andrew Poelstra. This Scriptless Script allows a new construction, the PTLC or Pointlocked Timelocked Contract. Instead of hashes and preimages, just replace "hash" with "point" and "preimage" with "scalar".
Or as you might know them: "point" is really "public key" and "scalar" is really a "private key". What a PTLC does is that, given a particular public key, the pointlocked branch can be spent only if the spender reveals the private key of the given public key to you.
Another nice thing with PTLCs is that they are deniable. What appears onchain is just a single 2-of-2 signature between you and the developemanufacturer. It's like a magic trick. This signature has no special watermarks, it's a perfectly normal signature (the pledge). However, from this signature, plus some datta given to you by the developemanufacturer (known as the adaptor signature) you can derive the private key of a particular public key you both agree on (the turn). Anyone scraping the blockchain will just see signatures that look just like every other signature, and as long as nobody manages to hack you and get a copy of the adaptor signature or the private key, they cannot get the private key behind the public key (point) that the pointlocked branch needs (the prestige).
(Just to be clear, the public key you are getting the private key from, is distinct from the public key that the developemanufacturer will use for its funds. The activation key is different from the developer's onchain Bitcoin key, and it is the activation key whose private key you will be learning, not the developer's/manufacturer's onchain Bitcoin key).
Taproot lets PTLCs exist onchain because they enable Schnorr, which is a requirement of PTLCs / Scriptless Script.
(technology-wise, take note that Scriptless Script works only for the "pointlocked" branch of the contract; you need normal Script, or a pre-signed nLockTimed transaction, for the "timelocked" branch. Since Taproot can embed a script, you can have the Taproot pubkey be a 2-of-2 to implement the Scriptless Script "pointlocked" branch, then have a hidden script that lets you recover the funds with an OP_CHECKLOCKTIMEVERIFY after the timeout if the seller does not claim the funds.)

Quantum Quibbles!

Now if you were really paying attention, you might have noticed this parenthetical:
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash...)
So wait, Taproot uses raw 32-byte public keys, and not public key hashes? Isn't that more quantum-vulnerable??
Well, in theory yes. In practice, they probably are not.
It's not that hashes can be broken by quantum computes --- they're still not. Instead, you have to look at how you spend from a P2WPKH/P2PKH pay-to-public-key-hash.
When you spend from a P2PKH / P2WPKH, you have to reveal the public key. Then Bitcoin hashes it and checks if this matches with the public-key-hash, and only then actually validates the signature for that public key.
So an unconfirmed transaction, floating in the mempools of nodes globally, will show, in plain sight for everyone to see, your public key.
(public keys should be public, that's why they're called public keys, LOL)
And if quantum computers are fast enough to be of concern, then they are probably fast enough that, in the several minutes to several hours from broadcast to confirmation, they have already cracked the public key that is openly broadcast with your transaction. The owner of the quantum computer can now replace your unconfirmed transaction with one that pays the funds to itself. Even if you did not opt-in RBF, miners are still incentivized to support RBF on RBF-disabled transactions.
So the extra hash is not as significant a protection against quantum computers as you might think. Instead, the extra hash-and-compare needed is just extra validation effort.
Further, if you have ever, in the past, spent from the address, then there exists already a transaction indelibly stored on the blockchain, openly displaying the public key from which quantum computers can derive the private key. So those are still vulnerable to quantum computers.
For the most part, the cryptographers behind Taproot (and Bitcoin Core) are of the opinion that quantum computers capable of cracking Bitcoin pubkeys are unlikely to appear within a decade or two.
For now, the homomorphic and linear properties of elliptic curve cryptography provide a lot of benefits --- particularly the linearity property is what enables Scriptless Script and simple multisignature (i.e. multisignatures that are just 1 signature onchain). So it might be a good idea to take advantage of them now while we are still fairly safe against quantum computers. It seems likely that quantum-safe signature schemes are nonlinear (thus losing these advantages).


I Wanna Be The Taprooter!

So, do you want to help activate Taproot? Here's what you, mister sovereign Bitcoin HODLer, can do!

But I Hate Taproot!!

That's fine!

Discussions About Taproot Activation

submitted by almkglor to Bitcoin [link] [comments]

Technical: The Path to Taproot Activation

Taproot! Everybody wants to have it, somebody wants to make it, nobody knows how to get it!
(If you are asking why everybody wants it, see: Technical: Taproot: Why Activate?)
(Pedants: I mostly elide over lockin times)
Briefly, Taproot is that neat new thing that gets us:
So yes, let's activate taproot!

The SegWit Wars

The biggest problem with activating Taproot is PTSD from the previous softfork, SegWit. Pieter Wuille, one of the authors of the current Taproot proposal, has consistently held the position that he will not discuss activation, and will accept whatever activation process is imposed on Taproot. Other developers have expressed similar opinions.
So what happened with SegWit activation that was so traumatic? SegWit used the BIP9 activation method. Let's dive into BIP9!

BIP9 Miner-Activated Soft Fork

Basically, BIP9 has a bunch of parameters:
Now there are other parameters (name, starttime) but they are not anywhere near as important as the above two.
A number that is not a parameter, is 95%. Basically, activation of a BIP9 softfork is considered as actually succeeding if at least 95% of blocks in the last 2 weeks had the specified bit in the nVersion set. If less than 95% had this bit set before the timeout, then the upgrade fails and never goes into the network. This is not a parameter: it is a constant defined by BIP9, and developers using BIP9 activation cannot change this.
So, first some simple questions and their answers:

The Great Battles of the SegWit Wars

SegWit not only fixed transaction malleability, it also created a practical softforkable blocksize increase that also rebalanced weights so that the cost of spending a UTXO is about the same as the cost of creating UTXOs (and spending UTXOs is "better" since it limits the size of the UTXO set that every fullnode has to maintain).
So SegWit was written, the activation was decided to be BIP9, and then.... miner signalling stalled at below 75%.
Thus were the Great SegWit Wars started.

BIP9 Feature Hostage

If you are a miner with at least 5% global hashpower, you can hold a BIP9-activated softfork hostage.
You might even secretly want the softfork to actually push through. But you might want to extract concession from the users and the developers. Like removing the halvening. Or raising or even removing the block size caps (which helps larger miners more than smaller miners, making it easier to become a bigger fish that eats all the smaller fishes). Or whatever.
With BIP9, you can hold the softfork hostage. You just hold out and refuse to signal. You tell everyone you will signal, if and only if certain concessions are given to you.
This ability by miners to hold a feature hostage was enabled because of the miner-exit allowed by the timeout on BIP9. Prior to that, miners were considered little more than expendable security guards, paid for the risk they take to secure the network, but not special in the grand scheme of Bitcoin.

Covert ASICBoost

ASICBoost was a novel way of optimizing SHA256 mining, by taking advantage of the structure of the 80-byte header that is hashed in order to perform proof-of-work. The details of ASICBoost are out-of-scope here but you can read about it elsewhere
Here is a short summary of the two types of ASICBoost, relevant to the activation discussion.
Now, "overt" means "obvious", while "covert" means hidden. Overt ASICBoost is obvious because nVersion bits that are not currently in use for BIP9 activations are usually 0 by default, so setting those bits to 1 makes it obvious that you are doing something weird (namely, Overt ASICBoost). Covert ASICBoost is non-obvious because the order of transactions in a block are up to the miner anyway, so the miner rearranging the transactions in order to get lower power consumption is not going to be detected.
Unfortunately, while Overt ASICBoost was compatible with SegWit, Covert ASICBoost was not. This is because, pre-SegWit, only the block header Merkle tree committed to the transaction ordering. However, with SegWit, another Merkle tree exists, which commits to transaction ordering as well. Covert ASICBoost would require more computation to manipulate two Merkle trees, obviating the power benefits of Covert ASICBoost anyway.
Now, miners want to use ASICBoost (indeed, about 60->70% of current miners probably use the Overt ASICBoost nowadays; if you have a Bitcoin fullnode running you will see the logs with lots of "60 of last 100 blocks had unexpected versions" which is exactly what you would see with the nVersion manipulation that Overt ASICBoost does). But remember: ASICBoost was, at around the time, a novel improvement. Not all miners had ASICBoost hardware. Those who did, did not want it known that they had ASICBoost hardware, and wanted to do Covert ASICBoost!
But Covert ASICBoost is incompatible with SegWit, because SegWit actually has two Merkle trees of transaction data, and Covert ASICBoost works by fudging around with transaction ordering in a block, and recomputing two Merkle Trees is more expensive than recomputing just one (and loses the ASICBoost advantage).
Of course, those miners that wanted Covert ASICBoost did not want to openly admit that they had ASICBoost hardware, they wanted to keep their advantage secret because miners are strongly competitive in a very tight market. And doing ASICBoost Covertly was just the ticket, but they could not work post-SegWit.
Fortunately, due to the BIP9 activation process, they could hold SegWit hostage while covertly taking advantage of Covert ASICBoost!

UASF: BIP148 and BIP8

When the incompatibility between Covert ASICBoost and SegWit was realized, still, activation of SegWit stalled, and miners were still not openly claiming that ASICBoost was related to non-activation of SegWit.
Eventually, a new proposal was created: BIP148. With this rule, 3 months before the end of the SegWit timeout, nodes would reject blocks that did not signal SegWit. Thus, 3 months before SegWit timeout, BIP148 would force activation of SegWit.
This proposal was not accepted by Bitcoin Core, due to the shortening of the timeout (it effectively times out 3 months before the initial SegWit timeout). Instead, a fork of Bitcoin Core was created which added the patch to comply with BIP148. This was claimed as a User Activated Soft Fork, UASF, since users could freely download the alternate fork rather than sticking with the developers of Bitcoin Core.
Now, BIP148 effectively is just a BIP9 activation, except at its (earlier) timeout, the new rules would be activated anyway (instead of the BIP9-mandated behavior that the upgrade is cancelled at the end of the timeout).
BIP148 was actually inspired by the BIP8 proposal (the link here is a historical version; BIP8 has been updated recently, precisely in preparation for Taproot activation). BIP8 is basically BIP9, but at the end of timeout, the softfork is activated anyway rather than cancelled.
This removed the ability of miners to hold the softfork hostage. At best, they can delay the activation, but not stop it entirely by holding out as in BIP9.
Of course, this implies risk that not all miners have upgraded before activation, leading to possible losses for SPV users, as well as again re-pressuring miners to signal activation, possibly without the miners actually upgrading their software to properly impose the new softfork rules.

BIP91, SegWit2X, and The Aftermath

BIP148 inspired countermeasures, possibly from the Covert ASiCBoost miners, possibly from concerned users who wanted to offer concessions to miners. To this day, the common name for BIP148 - UASF - remains an emotionally-charged rallying cry for parts of the Bitcoin community.
One of these was SegWit2X. This was brokered in a deal between some Bitcoin personalities at a conference in New York, and thus part of the so-called "New York Agreement" or NYA, another emotionally-charged acronym.
The text of the NYA was basically:
  1. Set up a new activation threshold at 80% signalled at bit 4 (vs bit 1 for SegWit).
    • When this 80% signalling was reached, miners would require that bit 1 for SegWit be signalled to achive the 95% activation needed for SegWit.
  2. If the bit 4 signalling reached 80%, increase the block weight limit from the SegWit 4000000 to the SegWit2X 8000000, 6 months after bit 1 activation.
The first item above was coded in BIP91.
Unfortunately, if you read the BIP91, independently of NYA, you might come to the conclusion that BIP91 was only about lowering the threshold to 80%. In particular, BIP91 never mentions anything about the second point above, it never mentions that bit 4 80% threshold would also signal for a later hardfork increase in weight limit.
Because of this, even though there are claims that NYA (SegWit2X) reached 80% dominance, a close reading of BIP91 shows that the 80% dominance was only for SegWit activation, without necessarily a later 2x capacity hardfork (SegWit2X).
This ambiguity of bit 4 (NYA says it includes a 2x capacity hardfork, BIP91 says it does not) has continued to be a thorn in blocksize debates later. Economically speaking, Bitcoin futures between SegWit and SegWit2X showed strong economic dominance in favor of SegWit (SegWit2X futures were traded at a fraction in value of SegWit futures: I personally made a tidy but small amount of money betting against SegWit2X in the futures market), so suggesting that NYA achieved 80% dominance even in mining is laughable, but the NYA text that ties bit 4 to SegWit2X still exists.
Historically, BIP91 triggered which caused SegWit to activate before the BIP148 shorter timeout. BIP148 proponents continue to hold this day that it was the BIP148 shorter timeout and no-compromises-activate-on-August-1 that made miners flock to BIP91 as a face-saving tactic that actually removed the second clause of NYA. NYA supporters keep pointing to the bit 4 text in the NYA and the historical activation of BIP91 as a failed promise by Bitcoin developers.

Taproot Activation Proposals

There are two primary proposals I can see for Taproot activation:
  1. BIP8.
  2. Modern Softfork Activation.
We have discussed BIP8: roughly, it has bit and timeout, if 95% of miners signal bit it activates, at the end of timeout it activates. (EDIT: BIP8 has had recent updates: at the end of timeout it can now activate or fail. For the most part, in the below text "BIP8", means BIP8-and-activate-at-timeout, and "BIP9" means BIP8-and-fail-at-timeout)
So let's take a look at Modern Softfork Activation!

Modern Softfork Activation

This is a more complex activation method, composed of BIP9 and BIP8 as supcomponents.
  1. First have a 12-month BIP9 (fail at timeout).
  2. If the above fails to activate, have a 6-month discussion period during which users and developers and miners discuss whether to continue to step 3.
  3. Have a 24-month BIP8 (activate at timeout).
The total above is 42 months, if you are counting: 3.5 years worst-case activation.
The logic here is that if there are no problems, BIP9 will work just fine anyway. And if there are problems, the 6-month period should weed it out. Finally, miners cannot hold the feature hostage since the 24-month BIP8 period will exist anyway.

PSA: Being Resilient to Upgrades

Software is very birttle.
Anyone who has been using software for a long time has experienced something like this:
  1. You hear a new version of your favorite software has a nice new feature.
  2. Excited, you install the new version.
  3. You find that the new version has subtle incompatibilities with your current workflow.
  4. You are sad and downgrade to the older version.
  5. You find out that the new version has changed your files in incompatible ways that the old version cannot work with anymore.
  6. You tearfully reinstall the newer version and figure out how to get your lost productivity now that you have to adapt to a new workflow
If you are a technically-competent user, you might codify your workflow into a bunch of programs. And then you upgrade one of the external pieces of software you are using, and find that it has a subtle incompatibility with your current workflow which is based on a bunch of simple programs you wrote yourself. And if those simple programs are used as the basis of some important production system, you hve just screwed up because you upgraded software on an important production system.
And well, one of the issues with new softfork activation is that if not enough people (users and miners) upgrade to the newest Bitcoin software, the security of the new softfork rules are at risk.
Upgrading software of any kind is always a risk, and the more software you build on top of the software-being-upgraded, the greater you risk your tower of software collapsing while you change its foundations.
So if you have some complex Bitcoin-manipulating system with Bitcoin somewhere at the foundations, consider running two Bitcoin nodes:
  1. One is a "stable-version" Bitcoin node. Once it has synced, set it up to connect=x.x.x.x to the second node below (so that your ISP bandwidth is only spent on the second node). Use this node to run all your software: it's a stable version that you don't change for long periods of time. Enable txiindex, disable pruning, whatever your software needs.
  2. The other is an "always-up-to-date" Bitcoin Node. Keep its stoarge down with pruning (initially sync it off the "stable-version" node). You can't use blocksonly if your "stable-version" node needs to send transactions, but otherwise this "always-up-to-date" Bitcoin node can be kept as a low-resource node, so you can run both nodes in the same machine.
When a new Bitcoin version comes up, you just upgrade the "always-up-to-date" Bitcoin node. This protects you if a future softfork activates, you will only receive valid Bitcoin blocks and transactions. Since this node has nothing running on top of it, it is just a special peer of the "stable-version" node, any software incompatibilities with your system software do not exist.
Your "stable-version" Bitcoin node remains the same version until you are ready to actually upgrade this node and are prepared to rewrite most of the software you have running on top of it due to version compatibility problems.
When upgrading the "always-up-to-date", you can bring it down safely and then start it later. Your "stable-version" wil keep running, disconnected from the network, but otherwise still available for whatever queries. You do need some system to stop the "always-up-to-date" node if for any reason the "stable-version" goes down (otherwisee if the "always-up-to-date" advances its pruning window past what your "stable-version" has, the "stable-version" cannot sync afterwards), but if you are technically competent enough that you need to do this, you are technically competent enough to write such a trivial monitor program (EDIT: gmax notes you can adjust the pruning window by RPC commands to help with this as well).
This recommendation is from gmaxwell on IRC, by the way.
submitted by almkglor to Bitcoin [link] [comments]

Cannot create wallet with Trezor

Hi guys, I am stuck trying to create a wallet for my Trezor with Electrum 4.0.4 on Linux:
I get to the point of entering the password twice and then selecting the path. But after that it just says
'Please wait' and then the window hangs. The only way to do something is either kill the process or send a `SIGINT` signal.
Interestingly after sending a SIGINT the window unfreezes and asks me again for the password (also during the whole freeze the Trezor device writes that I should enter my password). After entering the password again I get an empty error window and on closing it everything closes.
I started electrum with `electrum -v` to get some logs:
$ electrum -v I | logging | Electrum version: 4.0.4 - - I | logging | Python version: 3.8.6 (default, Sep 30 2020, 04:00:38) [GCC 10.2.0]. On platform: Linux-5.8.14-arch1-1-x86_64-with-glibc2.2.5 I | logging | Logging to file: None I | logging | Log filters: verbosity '*', verbosity_shortcuts '' I/p | plugin.Plugins | registering hardware bitbox02: ('hardware', 'bitbox02', 'BitBox02') I/p | plugin.Plugins | registering hardware coldcard: ('hardware', 'coldcard', 'Coldcard Wallet') I/p | plugin.Plugins | registering hardware digitalbitbox: ('hardware', 'digitalbitbox', 'Digital Bitbox wallet') I/p | plugin.Plugins | registering hardware keepkey: ('hardware', 'keepkey', 'KeepKey wallet') I/p | plugin.Plugins | registering hardware ledger: ('hardware', 'ledger', 'Ledger wallet') I/p | plugin.Plugins | registering hardware safe_t: ('hardware', 'safe_t', 'Safe-T mini wallet') I/p | plugin.Plugins | registering hardware trezor: ('hardware', 'trezor', 'Trezor wallet') I/p | plugin.Plugins | registering wallet type ('2fa', 'trustedcoin') D | util.profiler | Plugins.__init__ 0.0044 I/n | network | blockchains [0] I | exchange_rate.FxThread | using exchange CoinGecko D | util.profiler | Daemon.__init__ 0.0023 I/n | network | starting network I | daemon.Daemon | launching GUI: qt I/n | network | setting proxy None I | daemon.Daemon | starting taskgroup. I/n | network | connecting to as new interface I/n | network | starting taskgroup. I | gui.qt.history_list | could not import electrum.plot. This feature needs matplotlib to be installed. I | gui.qt.ElectrumGui | Qt GUI starting up... Qt=5.15.1, PyQt=5.15.1 I/i | interface.[localhost:50002] | connection established. version: ['ElectrumPersonalServer 0.2.0', '1.4'] D | util.profiler | ElectrumGui.__init__ 0.1374 I/i | interface.[] | disconnecting due to: ErrorGettingSSLCertFromServer(ConnectError(gaierror(-2, 'Name or service not known'))) I/n | network | couldn't launch iface -- CancelledError() I/i | interface.[] | disconnecting due to: ErrorGettingSSLCertFromServer(ConnectError(gaierror(-2, 'Name or service not known'))) I/n | network | couldn't launch iface -- CancelledError() I/i | interface.[] | disconnecting due to: ErrorGettingSSLCertFromServer(ConnectError(gaierror(-2, 'Name or service not known'))) I/i | interface.[] | connection established. version: ['ElectrumX 1.15.0', '1.4'] I/n | network | couldn't launch iface -- CancelledError() I/i | interface.[] | set blockchain with height 653567 I/i | interface.[] | skipping header 653566 I/n | network | no height for main interface I/n | network | fee_estimates {25: 46526, 10: 48176, 5: 50745, 2: 50750} I/i | interface.[hsmiths4fyqlw5xw.onion:50002] | disconnecting due to: ErrorGettingSSLCertFromServer(ConnectError(gaierror(-2, 'Name or service not known'))) I/n | network | couldn't launch iface hsmiths4fyqlw5xw.onion:50002:s -- CancelledError() I/n | network | switching to I/i | interface.[] | connection established. version: ['ElectrumX 1.10.0', '1.4'] I/n | network | fee_histogram [[99, 100899], [71, 112316], [61, 132563], [59, 156116], [57, 175394], [54, 114050], [51, 219092], [49, 195934], [48, 565137], [47, 781451], [46, 883591], [45, 259824], [44, 450143], [43, 114488], [42, 22100], [41, 49428], [40, 106542], [38, 151315], [33, 547095], [22, 620244], [13, 648588], [9, 822409], [5, 741398], [3, 1799486], [2, 651429]] I/n | network | fee_histogram [[99, 100899], [71, 112316], [61, 132563], [59, 156116], [57, 175394], [54, 114050], [51, 219092], [49, 195934], [48, 565137], [47, 781451], [46, 883591], [45, 259824], [44, 450143], [43, 114488], [42, 22100], [41, 49428], [40, 106542], [38, 151315], [33, 547095], [22, 620244], [13, 648588], [9, 822409], [5, 741398], [3, 1799486], [2, 651429]] I/i | interface.[] | disconnecting due to: ErrorGettingSSLCertFromServer(ConnectError(gaierror(-5, 'No address associated with hostname'))) I/n | network | couldn't launch iface -- CancelledError() I/i | interface.[] | disconnecting due to: ErrorGettingSSLCertFromServer(ConnectError(OSError(101, 'Network is unreachable'))) I/n | network | couldn't launch iface -- CancelledError() I/i | interface.[] | set blockchain with height 653567 I/i | interface.[] | skipping header 653567 I/n | network | fee_estimates {25: 46526, 10: 48176, 5: 50745, 2: 50749} I/i | interface.[hsmiths5mjk6uijs.onion:50002] | disconnecting due to: ErrorGettingSSLCertFromServer(ConnectError(gaierror(-2, 'Name or service not known'))) I/n | network | couldn't launch iface hsmiths5mjk6uijs.onion:50002:s -- CancelledError() I/i | interface.[] | disconnecting due to: ErrorGettingSSLCertFromServer(ConnectError(ConnectionRefusedError(111, "Connect call failed ('', 50002)"))) I/n | network | couldn't launch iface -- CancelledError() I/i | interface.[] | disconnecting due to: ErrorGettingSSLCertFromServer(ConnectError(gaierror(-2, 'Name or service not known'))) I/n | network | couldn't launch iface -- CancelledError() I/i | interface.[] | disconnecting due to: ConnectError(ConnectionResetError(104, 'Connection reset by peer')) I/n | network | couldn't launch iface -- CancelledError() I | storage.WalletStorage | wallet path /home/bene/.electrum/wallets/default_wallet I/i | interface.[] | connection established. version: ['ElectrumX 1.15.0', '1.4'] I | storage.WalletStorage | wallet path /home/bene/.electrum/wallets/default_wallet I/i | interface.[] | set blockchain with height 653567 I/i | interface.[] | skipping header 653566 [240/1884] I/n | network | fee_estimates {25: 46526, 10: 48176, 5: 50745, 2: 50749} I/i | interface.[localhost:50002] | set blockchain with height 653567 I/i | interface.[localhost:50002] | skipping header 653567 I/n | network | fee_estimates {25: 46526, 10: 48175, 5: 50745, 2: 50749} I/p | plugin.Plugins | loaded bitbox02 I/p | plugin.Plugins | loaded coldcard I/p | plugin.Plugins | loaded digitalbitbox I/p | plugin.Plugins | loaded keepkey I/p | plugin.Plugins | loaded ledger I/p | plugin.Plugins | loaded safe_t I/p | plugin.Plugins | loaded trezor I | plugin.DeviceMgr | scanning devices... D | util.profiler | DeviceMgr.scan_devices 0.0244 W | gui.qt.installwizard.InstallWizard | error getting device infos for bitbox02: Missing libraries for bitbox02. // Make sure you install it with python3 W | gui.qt.installwizard.InstallWizard | error getting device infos for coldcard: Missing libraries for coldcard. // Make sure you install it with python3 W | gui.qt.installwizard.InstallWizard | error getting device infos for keepkey: Missing libraries for keepkey. // Make sure you install it with python3 W | gui.qt.installwizard.InstallWizard | error getting device infos for ledger: Missing libraries for ledger. // Make sure you install it with python3 W | gui.qt.installwizard.InstallWizard | error getting device infos for safe_t: Missing libraries for safe_t. // Make sure you install it with python3 I | plugins.trezor.qt.Plugin | connecting to device at webusb:001:3 I | plugins.trezor.qt.Plugin | connected to device at webusb:001:3 I | plugin.DeviceMgr | Registering My TREZOF3342BDD7C90C7F9FBA58136 I | plugin.DeviceMgr | scanning devices... D | util.profiler | DeviceMgr.scan_devices 0.0388 I/i | interface.[localhost:50002] | skipping header 653567 qt.qpa.xcb: QXcbConnection: XCB error: 3 (BadWindow), sequence: 4028, resource id: 14687032, major code: 40 (TranslateCoords), minor code: 0 I | plugin.DeviceMgr | scanning devices... D | util.profiler | DeviceMgr.scan_devices 0.0407 
This is the point where the window freezes. Then I precc `Ctrl+C` to send a SIGINT signal and then this is the rest of the logs:
I/n | network | couldn't launch iface -- TimeoutError() I/n | network | couldn't launch iface -- TimeoutError() I/n | network | couldn't launch iface -- TimeoutError() I/n | network | couldn't launch iface -- TimeoutError() I/n | network | couldn't launch iface -- TimeoutError() I/i | interface.[] | disconnecting due to: ErrorGettingSSLCertFromServer(ConnectError(gaierror(-2, 'Name or service not known'))) I/n | network | couldn't launch iface -- CancelledError() I/i | interface.[] | succeeded in getting cert I/i | interface.[] | succeeded in getting cert ^CE | gui.qt.installwizard.InstallWizard | Traceback (most recent call last): File "/uslib/python3.8/site-packages/electrum/", line 446, in on_hw_derivation xpub = self.plugin.get_xpub(device_info.device.id_, derivation, xtype, self) File "/uslib/python3.8/site-packages/electrum/plugins/", line 315, in get_xpub xpub = client.get_xpub(derivation, xtype) File "/uslib/python3.8/site-packages/electrum/", line 362, in wrapper return run_in_hwd_thread(partial(func, *args, **kwargs)) File "/uslib/python3.8/site-packages/electrum/", line 355, in run_in_hwd_thread return fut.result() File "/uslib/python3.8/concurrent/futures/", line 434, in result self._condition.wait(timeout) File "/uslib/python3.8/", line 302, in wait waiter.acquire() KeyboardInterrupt I/i | interface.[] | connection established. version: ['ElectrumX 1.14.0', '1.4'] I/i | interface.[] | connection established. version: ['ElectrumX 1.15.0', '1.4'] I/i | interface.[] | set blockchain with height 653567 I/i | interface.[] | skipping header 653567 I/n | network | fee_estimates {25: 46526, 10: 48176, 5: 50745, 2: 50749} I/i | interface.[] | set blockchain with height 653567 I/i | interface.[] | skipping header 653567 I/n | network | fee_estimates {25: 46526, 10: 48176, 5: 50745, 2: 50749} I/n | network | couldn't launch iface -- TimeoutError() I/i | interface.[] | succeeded in getting cert I/i | interface.[mxhwmwa3nt2si4ufszm24whlpkruu74jle27ys2fyjuiifbbrub6thyd.onion:50006] | disconnecting due to: ErrorGettingSSLCertFromServer(ConnectError(gaierror(-2, 'Name or service not known'))) I/n | network | couldn't launch iface mxhwmwa3nt2si4ufszm24whlpkruu74jle27ys2fyjuiifbbrub6thyd.onion:50006:s -- CancelledError() I/i | interface.[] | disconnecting due to: ErrorGettingSSLCertFromServer(ConnectError(gaierror(-5, 'No address associated with hostname'))) I/n | network | couldn't launch iface -- CancelledError() I/i | interface.[] | connection established. version: ['ElectrumX 1.15.0', '1.4'] I/i | interface.[] | set blockchain with height 653567 I/i | interface.[] | skipping header 653567 I/n | network | fee_estimates {25: 46526, 10: 48176, 5: 50745, 2: 50749} I/i | interface.[] | connection established. version: ['ElectrumX 1.15.0', '1.4'] I/i | interface.[] | set blockchain with height 653567 [169/1884] I/i | interface.[] | skipping header 653567 I/n | network | fee_estimates {25: 46526, 10: 48176, 5: 50745, 2: 50749} I | plugin.DeviceMgr | scanning devices... D | util.profiler | DeviceMgr.scan_devices 0.0394 W | gui.qt.installwizard.InstallWizard | error getting device infos for bitbox02: Missing libraries for bitbox02. // Make sure you install it with python3 W | gui.qt.installwizard.InstallWizard | error getting device infos for coldcard: Missing libraries for coldcard. // Make sure you install it with python3 W | gui.qt.installwizard.InstallWizard | error getting device infos for keepkey: Missing libraries for keepkey. // Make sure you install it with python3 W | gui.qt.installwizard.InstallWizard | error getting device infos for ledger: Missing libraries for ledger. // Make sure you install it with python3 W | gui.qt.installwizard.InstallWizard | error getting device infos for safe_t: Missing libraries for safe_t. // Make sure you install it with python3 I/i | interface.[] | skipping header 653567 E | daemon.Daemon | GUI raised exception: ReRunDialog(). shutting down. I | gui.qt.ElectrumGui | closing GUI I | daemon.Daemon | shutting down network I/n | network | stopping network I/n | network | couldn't launch iface -- CancelledError() I/n | network | couldn't launch iface -- CancelledError() I/i | interface.[localhost:50002] | disconnecting due to: CancelledError() I/i | interface.[] | disconnecting due to: CancelledError() I/i | interface.[] | disconnecting due to: CancelledError() I/i | interface.[] | disconnecting due to: CancelledError() I/i | interface.[] | disconnecting due to: CancelledError() I/i | interface.[] | disconnecting due to: CancelledError() I/i | interface.[] | disconnecting due to: CancelledError() I/i | interface.[] | disconnecting due to: CancelledError() I/n | network | taskgroup stopped. I | daemon.Daemon | stopping taskgroup I | daemon.Daemon | taskgroup stopped. I | daemon.Daemon | removing lockfile I | daemon.Daemon | stopped E | __main__ | daemon.run_gui errored Traceback (most recent call last): File "/uslib/python3.8/site-packages/electrum/gui/qt/", line 118, in func_wrapper run_next(*out) File "/uslib/python3.8/site-packages/electrum/", line 193, in on_wallet_type File "/uslib/python3.8/site-packages/electrum/", line 115, in run f(*args, **kwargs) File "/uslib/python3.8/site-packages/electrum/", line 225, in choose_keystore self.choice_dialog(title=title, message=message, choices=choices, File "/uslib/python3.8/site-packages/electrum/gui/qt/", line 106, in func_wrapper out = func(*args, **kwargs) File "/uslib/python3.8/site-packages/electrum/gui/qt/", line 594, in choice_dialog self.exec_layout(vbox, title) File "/uslib/python3.8/site-packages/electrum/gui/qt/", line 429, in exec_layout raise GoBack from None electrum.base_wizard.GoBack The above exception was the direct cause of the following exception: Traceback (most recent call last): File "/usbin/electrum", line 380, in  d.run_gui(config, plugins) File "/uslib/python3.8/site-packages/electrum/", line 566, in run_gui self.gui_object.main() File "/uslib/python3.8/site-packages/electrum/gui/qt/", line 363, in main if not self.start_new_window(path, self.config.get('url'), app_is_starting=True): File "/uslib/python3.8/site-packages/electrum/gui/qt/", line 247, in wrapper return func(self, *args, **kwargs) File "/uslib/python3.8/site-packages/electrum/gui/qt/", line 271, in start_new_window wallet = self._start_wizard_to_select_or_create_wallet(path) File "/uslib/python3.8/site-packages/electrum/gui/qt/", line 313, in _start_wizard_to_select_or_create_wallet'new') File "/uslib/python3.8/site-packages/electrum/", line 115, in run f(*args, **kwargs) File "/uslib/python3.8/site-packages/electrum/", line 153, in new self.choice_dialog(title=title, message=message, choices=choices, run_next=self.on_wallet_type) File "/uslib/python3.8/site-packages/electrum/gui/qt/", line 131, in func_wrapper raise ReRunDialog() from e electrum.base_wizard.ReRunDialog I/p | plugin.Plugins | stopped 
submitted by bIacktemplar to Electrum [link] [comments]

Monero GUI and CLI mnemonic backups appreciation time

Recently I was researching a little bit about how mnemonic backups work, and found this great explanation for Bitcoin's case, which also looks like a nightmare scenario, since long story short: Bitcoin Core doesn't support mnemonics and basically you are stuck with storing your wallet.dat binary, hoping for not losing it or it getting corrupted.
By contrast, both Monero Core wallets (GUI and CLI) support mnemonic backups and are compatible between each other (I just tested this to be sure, and was delighted to find this true, plus seeing how slicker the GUI looks now after quite some time without trying it out).
Yeah, you could use Electrum or some other wallet for mnemonic backups in Bitcoin, but it is just not the same level of security as using a Core wallet.
So I just wanted to take some time to highlight how much I appreciate this Monero feature.
What do you think? Am I hyping Monero's native mnemonic backups too much because I'm missing something? Or do you also think that this feature is underrated?
Edit: Just fixed the link format.
submitted by alive_consequence to Monero [link] [comments]

[Table] IAmA dark web expert, investigative journalist and true crime author. I’ve met dark web kingpins in far flung prisons and delved the murky depths of child predator forums. I’ve written six books and over a dozen Casefile podcast episodes. AMA (part 1/2)

Source | Guestbook
Note: Some answers were repetitive, but were not edited out.
Questions Answers
Have you ever gotten into legal trouble by exploring the dark places of the internet? Like, "sorry, officer, I was only surfing drug markets and child molester forums for my next journalism piece..." Do you worry about that? Do you have to take extra steps to protect yourself? I'm very careful not to go anywhere that it is illegal to visit. You will hear loads of stories about how easy it is to "stumble upon" child porn, but the fact is that those sites usually have names like "Preteen cuties" so you know exactly what they are, and in order to access them you have to register. So you have to make a very deliberate choice to log into them. I have no interest whatsoever in viewing any child abuse material, so I don't go into those places. When I was researching The Darkest Web, I went to the discussion forums that didn't allow any images (though they did link to sites that did), and even there I turned off images.
As for the drugs, weapons etc, there is nothing illegal about surfing them and looking around.
I do get a bit nervous every time I visit the US, especially when I was invited to a "friendly" lunch with Homeland Security once (it was reasonably friendly as it turns out, it was also terrifying)
the below is a reply to the above
Why did homeland security want to talk to you? They said it was about the murder-for-hire stuff, but some of the questions leaned toward something else
Is there anything that really concerns you about the dark web? Some of the things already discussed are beyond barbaric and that is only the stuff that has been found out about and been picked up by the media and your fantastic work. Do you think the public should expect worse and more horrific revelations from the dark web or is it just "more of the same" for lack of a better term and do you think the authorities are getting better in shutting this inhumanity down and catching the people responsible? I am definitely not against people taking back their online privacy and I actually think that buying drugs from the darknet markets is a safer and more sensible option than buying them from the dodgy dealer down the road. However the one thing that is really disturbing is that the dark web has provided a place for child predators to find each other and form communities where they support and egg each other on. Imagine a few years ago, someone who was into hurtcore could never tell anyone else and would be unlikely to ever come across another person with the same perversions. Now it is as simple as finding the relevant site on the dark web. When there are suddenly hundreds of people who all think and act in the same way, it normlalizes what they are doing.
One of the guys who got caught, Matthew Falder, was a sadist who used to crowdsource "ideas" for torturing the children and teens he was blackmailing into doing heinous things for him online. But apparently he was a "normal" intelligent popular guy
the below is a reply to the above
But how does everyone participate in those illegal sites without getting caught? You said in other comments that you tried to stay away from underaged sites because they were illegal. Can't they be tracked down, even with tor and a vpn? The thing that I don't understand is that even on the dark web people say you should stay away from illegal sites, but how are pedos not getting caught? they are getting caught, but the way they are getting caught is through painstaking detective work, looking for clues in photos, befriending them online and getting them to reveal things about themselves (what is known as social engineering). It takes a long time and many resources.
I say don't go there because (a) it is illegal and (b) you really shouldn't want to go there
Iirc you attended the trial of the person behind the horrific hurt core website that was exposed a few years back. I was wondering if there was anything in particular that happened during the trial that particularly shocked or horrified you that isn't really public knowledge or talked about? Reactions from the judge or perpetrator during the trial etc. As I remember it the guy was a fairly young loner who lived with his parents but would probably never have been expected to be behind the horrific vile things which he was found to be. Also, how did you get into investigative journalism/writing? I wrote in one of the other replies above about the little mute girl that has stayed with me. Also, at the insistence of the prosecution, the judge had to watch "Daisy's Destruction" which was a video of torture of a toddler. He put it off for two days and when he came back he was white. He didn't have the sound on, which is considered the worst part, but he still looked shell-shocked. I don't envy him.
I'll cut'n'paste re your last question: I was in London, working for one of the most conservative law firms in the world when the Global Financial Crisis hit. I liked the job but it struck me when people were losing their livelihoods that I was working for the bad guys. I'd always wanted to be a writer so when I came back to Australia I quit law and enrolled in a writing course planning to be a novelist, but I discovered I was better at journalism. I first wrote for newspapers here about Silk Road and it grew from there
the below is a reply to the above
Thanks for the reply.. that really must've been horrific for all involved from investigation to trial and for all of the victims (apart from the scum responsible of course). I guess it would be naive to assume that the end of this site did anything other than drive this depraved community even further underground. That is the part which is really scary to me but I suppose all we can do is have faith that the authorities are always close on the tail. Thank you for your work on reporting on this and raising this stuff more into the public consciousness and making people more aware of what kind of evil still lurks. It was the most disturbing two days of my life, made all the worse because they read out hours of interactions from the site where the children still had not been identified or the predators caught.
Hurt2theCore was not the last site of its kind and there are still hurtcore sites to this day on the dark web. The one hopeful thing is that there are international task forces that seem to work together really well (unlike when it comes to drugs and every law enforcement agency wants to take the lead and they all withhold info from each other). There are a lot of resources allocated to identifying predators and their victims. Sometimes this has involved some very controversial tactics, such as taking over the sites and letting them run, so that they can use social engineering techniques to identify those who are using the sites and who are actually abusing children
the below is another reply to the original answer
So daisy's destruction is real? Was it referred to by that name court? I always thought it was a myth Yes, Daisy's Destruction is real, it was referred to by name in court and the judge had to watch the 12 minutes of it that were hosted on Hurt2theCore.
The "myth" part is that it shows a murder. The toddler, Daisy, lived, though she suffered such horrific injuries she will never be able to bear children. Hopefully she was young enough that she will grow up without the memory.
However, Scully did murder at least one child, whose body was found under the floorboards of his house. it is not known whether he filmed her murder as no video evidence of it has come to light.
the below is a reply to the above
Thanks for answering. I actually watched a really good video on Hurt2theCore on youtube once, I think it was by a guy called Nexpo. It was really detailed and informative about the whole case - I forgot those details. Thanks again for replying, this AMA is really informative! I think I recall that one, it was from a few years ago.
An excellent podcast that came out recently is "Hunting Warhead", highly recommend a listen. It is a tough listen, but exceptionally well-told and respectfully handled
How do you detach yourself from your work? I'm an investigator for a law firm and I've had a lot of difficult working on wrongful death cases recently. Also, how did you first end up getting published? Any tips for people interested in that field? Thanks! I don't detach. When I was researching hurtcore, it was harrowing and affected me deeply. Writing that part of the book was a very slow process because I just couldn't be in that headspace for very long at a time. Once the book was written I didn't go back there.
I already had a reputation as a blogger and a freelance journalist when i pitched my book on Silk Road. I got an agent and it was auctioned off, with Pan MacMillan getting the rights. At the time, Silk Road was still going strong, and the book I wrote was about this new frontier of drug dealing that was changing the world. I was writing it "from the inside" as I had been an active part of the community for two years. However, right as I submitted the final manuscript to my publisher, Silk Road was busted and Ross Ulbricht arrested, so i had to quickly change the narrative to a "Rise and Fall" thing!
How many times have you approached law enforcement with information and how many times has the approach resulted in action? and... are there times where you know something nefarious is happening but history and the evidence at hand tells you it's not worth the effort? There is no point in approaching law enforcement to say "I have come across this site". If I've found it, you can guarantee law enforcement has found it as well.
The only time I've approached law enforcement was when I had information that they did not, which was when a friendly hacker provided me with a back door into the Besa Mafia murder-for-hire site. I got to see all the messages and orders etc. Of course LE knew about the site, but they did not have the details of the people who had hits taken out on them. We tried desperately to tell police in several countries that real people had paid real money to have other real people killed, but they just weren't interested. We sounded like crazy people talking about dark web hitmen, who were scams anyway and nobody was dead, so why should they be interested? They became much more engaged when one of the people WE HAD PREVIOUSLY TOLD THEM ABOUT later turned up dead
the below is a reply to the above
By law enforcement, do you mean only local or else the big agencies? I feel like I wouldn't tell my local police department because they wouldn't really know what to do. It would have to the the bigger agencies. FBI in US. NCA in UK. AFP in Australia. Nobody was very interested, although the FBI did visit at least one of the targets to let her know she was a target. She still wound up dead
What are some of the most prevalent uses of the dark web that AREN'T all shady and nefarious? We might be getting into semantics here, but people use Tor, which is the most possible darknet that is used to access the dark web, just for private browsing and ensuring that commercial interests aren't following them everywhere to bombard them with ads for some thing they looked up.
Some of the news organizations have a dark web presence so that whistleblowers can upload information safely. Even the CIA has a site on the dark web so that people can anonymously tip off matters of national security.
Other than that, there are just forums, where you don't have to worry that every single stupid thing you post will be saved in posterity forever, to be trotted out years later when you run for congress or something
After everything you've seen, does anything surprise you anymore or are you just numb to it at this point? Do you think there should be more education/exposure about the dark web than there is now or would that just be counter-productive as people would just find another place to hide? I'm curious to hear any favourite stories about the Psychonauts. I am not numb and I hope I never become numb. I really don't visit the horrible dark places very often, unless I'm researching something specific, and even then I don't look at pictures or videos. Most of the crime is pretty benign - I'm not fazed by people wanting a safer way to buy drugs.
I think there needs to be ongoing discussions about online activity and its misuse in general, but most crime still happens on the clearnet. The dark web is not nearly as large or prevalent as people fear.
For a long time, a dealer provided free LSD to anyone who wanted it for personal use (ie not sale) and to any organizations who were doing psychedelic therapy.
One psychonaut got busted and spent time in prison... only he still had bitcoin in a wallet and by the time he was released he was a millionaire. He would have just spent it on drugs otherwise :)
I know law enforcement has to delve into the predator side of the dark web. With what you've seen do you think it should be mandatory or an industry standard that law enforcement officials seek professional help? I couldn't imagine investigating that daily and not thinking less of humanity at some point. I'm pretty sure they do. I worked for Legal Aid for a while, and i know there were pretty strict rules in place for the lawyers who had to defend child abusers.
When I was at the trial for Lux, owner of Hurt2theCore, I met a cop whose job it was to watch all the videos and befriend the predators in an attempt to get them to slip up and reveal something of themselves. She said she had a little filing cabinet in her brain where she put all that stuff, and that making an arrest made it all worthwhile. She had made several arrests personally. She was a sex offender's worst nightmare :)
What’s one of your personal favorite investigations and what made it unique for you? By far the Besa Mafia murder-for-hire case. What made it unique was that, first, I was provided a back door into the Besa Mafia site by a friendly hacker, so i had information that nobody else had. But then I became "friends" for want of a better word with the owner of the site, Yura. Besa Mafia, of course, was not killing anyone, but Yura made a LOT of money scamming would-be murderers out of their money. We entered into a weird relationship over the years where i would report on his activities and he would try every trick under the sun to stop me from doing so, so that he could keep scamming people. He even offered me a job, helping him, because he had become so busy. He also provided me with names and details of people who had hits taken out on them so I could pass them on to law enforcement.
It all became horribly real when one of the people who had a hit put out of them wound up dead. It wasn't Yura of course, but the guy had paid him $13K before giving up on the site and doing it himself. The thing was WE HAD TOLD THE FBI about the hit and the $13K and they visited the victim, but then put it into the too-hard basket when she couldn't think who might have paid that much to kill her.
the below is a reply to the above
Wow. That’s actually pretty cool. Reminds me of an old saying. “Keep your friends close, but your enemies closer.” It's a seriously bizarre relationship. When I was hired as a consultant by CBS for a 48 Hours expose on dark web hitmen, he actually agreed to meet me in London. But he thought that CBS was going to advertise his site as the real deal and he got excited and sent them details of two people who had hits put out on them. CBS sent them straight to the police and very shortly after two arrests were made and it was all over the news, where they called his site a scam. Yura got so pissed about it, he never turned up to our meeting. They had even hired an Academy Award-nominated master of disguise makeup artist to disguise him!
are "red rooms" actually a prevalent thing, or just a widespread misconception or rumor? I ask in part because it's very easy to see, for instance, Mexican cartels dismembering people alive, etc, just on the clearnet. Hell, a couple days ago I saw a video posted of a cartel member cutting out a dude's heart while the guy was alive, and he ATE it. He fucking ATE it. So it seems plausible... The most popular myth of all is Red Rooms, where people – usually women – are tortured to death live on camera while those who have paid to watch type in torture commands in a chat box. Think the movie Hostel, with webcams. In this sense these have never been proven to exist. I get where you are coming from with the cartels, and the recent news item where they found those shipping containers set up with torture rooms freaked me out and made me wonder!
There is some truth to this rumour, but the execution is not like you see in the movies. Most notably, because it involves children, not adults abused on demand for paying pedophiles, but not to the point of death
the below is a reply to the above
The news about those shipping containers really made me speculate, since for every one person who gets caught doing something evil, there must be at least several more people who are very honed in their 'profession' doing the same evil deeds and worse, yet who evade being captured for decades. Anyway, based on morbid things I've seen, karma comes around eventually... I know, right? It really freaked me out, and then when I read that they already had intended victims for them but the police got to them first and put them in protected custody.. IMAGINE SEEING THOSE PICTURES AND KNOWING YOU WERE SUPPOSED TO BE IN THEM!! I would retire to a deserted island somewhere
the below is a reply to the above
Your line of work could easily result in something like C-PTSD down the road a little ways. I have a morbid curiosity, and have seen worse than those shipping containers had to offer. I'm sure you have as well. So one more question from you, if you don't mind: what are some proactive approaches to mental health you take to safeguard your sanity? A lot of wine. Cuddle my dog
Hi, there! This has been fascinating to read; thank you so much for sharing! I'm curious: why do you think so many people who don't want to engage with disgusting and illegal content like hurtcore find it so interesting to read about? Do you have any insight into your readership and the ethics associated with reading about these kind of topics? I think morbid fascination with the dark is exceedingly common - just look at how many people can't get enough about serial killers! In some ways it is probably a self-defense mechanism - the vast majority of true-crime readers are women. People like to be armed with knowledge. We also like to be spooked and scared.
As for my books, I don't really go into much gory detail, but the horror still shines through
Out of all 9-5 jobs out there, why this? What’s your motive? I got disenchanted by being a lawyer and I had wanted to be an author since childhood. The lawyering put me in a strong enough financial position that I could quit to do a uni course for a couple of years. My plan was to become a best-selling novelist, but my first chick-lit novel was nothing special. However, during the course, I found I did really well at journalism and was soon making a living as a freelance journo before I finished the course. My first major feature was on the Silk Road drugs market, which I had discovered thanks to a friend who was using it. Once I got in there I became fascinated by everything about it and started contacting the owner, users, vendors etc asking for stories (I was upfront about who I was). I began the first serious dark web blog - - and also became the go-to freelancer for Australian dark web stories. Then I pitched my first book and got a healthy advance for it.
I like working for myself, working from home and delving into things. Right now I have my dream job (though it wouldn't hurt to pay a bit more. I'm certainly not making anywhere near what I used to make lawyering, but I make enough to get by and I live pretty simply)
Did you ever do any writing on Brian Farrell and his role in Silk Road 2.0? I was Brian's cellmate for all of 2017 at Sheridan Federal Prison and heard all of his crazy stories. Was just curious as to the validity of them all. DoctorClu! I did write briefly about him in Silk Road, but it wasn't all positive. I remember being frustrated by the shitshow that was Silk Road 2.0 in the beginning, right after SR1 shut and when DPR2 took off and Defcon got all dramatic. It settled down after a bit and lasted a year, when it was revealed THEY HAD A FUCKING UNDERCOVER HOMELAND SECURITY OFFICER ON STAFF THE WHOLE TIME. But yeah, anyhow, they are probably true. I'd love to hear them :)
Was there ever something on the dark web that made you surprised ( in a good way) and smile ? So many things. Back in the day of the original Silk Road, I became obsessed with the forums, the people behind it, the intelligent discourse about the War on Drugs and philosophy. I found it amusing that drug dealers ran sales and giveaways. There were book clubs and movie clubs.
One of the most important people from that era was Dr Fernando Cauevilla, who became a member of Silk Road as "DoctorX". He was a real doctor who provided genuine, free, non-judgmental advice about drug use to the members of the site. It was quite an amazing time.
the below is a reply to the above
Did Ulbricht get taken down the way we were told in the news? What happened to all the Bitcoins? His arrest went down the way we were told in the news. How they located the server has never been disclosed (other than a fanciful explanation that NOBODY could believe). This explanation may be tested if Variety Jones runs a Fourth Amendment argument at his trial
The bitcoin in the wallet on Ross' computer was auctioned off by the Feds. He may have other bitcoin wallets stashed somewhere but nobody knows
the below is another reply to the original answer
Book/movie clubs on the silk road? Yeah, they would set reading and then everyone would come back and discuss the book, or they would have a time when everyone watched the same movie at the same time and chatted about it in real time
the below is a reply to the above
Haha that's amazing! I don't suppose you remember any of the books in question? They used to be a lot of philosophy books, especially on agorism. A Lodging of Wayfaring Men was one of the books. I remember V for Vendetta on a movie night
You don't seem to be pushing your most recent project and you're actually answering all the questions people ask, so I've got ask...are you some sort of government plant meant to destabilize reddit? This isn't how AMAs are supposed to work. You come in, you half ass a few questions, hawk whatever you're here to hawk, and then leave after 20 minutes. That's how it's done. lol I'm a genuine redditor from way back, and I love talking about the stuff I do. I did find that after I answered a question in an AskReddit thread a while back that blew up, the sales followed. But that was organic and I don't think you can force it to happen - Reddit can spot that a mile awy
What are some of the best things about the dark web? And can anyone get on it? Things you can buy that you can’t buy normally online? I really enjoy some of the forums, especially the psychonaut forums where people who like to trip on psychedelics get together and talk drugs and philosophy. There's a real "be kind to one another" vibe.
Getting on the dark web is easy, but not getting scammed when buying things takes a lot of homework. Yes, you can buy most things, but the most popular things are drugs and digital goods, i.e. things that depend on repeat custom and are easily transferable from seller to buyer
the below is a reply to the question
[deleted] You're doing the Good Work my man. I'd give you one of those awards if i knew how
What would you define the word "Safe" when it come to the internet (both www and dark web) world and are there any tips that I should follow to keep myself safe? It really depends on what YOU mean by safe. Tor, which is the darknet that provides access to the dark web will keep you safe from prying eyes and surveillance.
If you mean keep your information safe, the old-fashioned advice is to never reuse your password and to enable 2-Factor authentication wherever you can. Your information is quite likely somewhere on the dark web thanks to high-profile hacks of major organizations, but provided you don't re-use usernames and passwords, you really don't have to worry too much about it.
If you mean keeping yourself and/or any kid safe from predators, the only thing is to ensure you are educated about the approaches and methods they use.
Has Covid affected the Dark Web in any real way? Also I just read through all of the post comments, what incredible story’s. I would totally buy a book about the Silk Road or Yaru! re covid on the dark web, here's some notes I made for an interview I did recently:
* when Trump first hyped hydroxychloroquine as a potential miracle cure for COVID-19, drug dealers on the dark web seized on the claim.
* Listings quickly popped up on the most popular darknet markets
* A vendor on Whitehouse Market sells 100 Pills for $90, calling it a “Miracle Drug For Coronavirus” and suggesting buyers purchase in bulk to sell at a mark-up locally.
* Another makes the dubious claim “This drug will help people to beat Corona Virus” There are 11 listings on Empire Market currently, although more than half are from the one seller, who is a well-known and trusted vendor on the site.
* There were also people claiming to be selling infected blood or plasma of recovered COVID victims
* The infected blood stuff is just bullshit IMO Just because something is listed doesn’t mean it is genuinely for sale
* There's been some claims to be selling vaccines
* At the beginning there were also loads of listings for PPE
* some just used it as a marketing tactic - “fight off the virus with edible cannabis” or “relax with Xanax” and others as an excuse to raise their prices
* However, sales are low compared to sales of other drugs on the site, so it is difficult to say whether it’s something that will really catch on
* It didn’t take long for complaints to come in and market owners to clamp down on anything claiming to be a miracle cure or vaccine
* users were discouraging other users from profiting off the pandemic and requested markets provide health and safety information
* All the major markets forbid anything being sold as a cure for COVID. They flagged keywords and vendors would be told to take any listings down. They also put out PSAs telling people not to buy
* Monopoly: threatened to ban and.. “You are about to ingest drugs from a stranger on the internet - under no circumstances should you trust any vendor that is using COVID-19 as a marketing tool to peddle already questionable goods”
* It was a business decision. They don’t want anything that will attract attention or that might cause desperate people who wouldn’t normally use the DNMs to find their way there
* The idea behind DNMs generally is educated and responsible drug use. They really don’t want people dying - bad publicity and no repeat custom
* However the dark web is rife with scammers and people willing to prey on the desperate so there are still scams out there
* The only way I could ever see it becoming a thing is if there is a well-known potential cure/vaccine that is not being made widely available and could plausibly find its way onto the black market
Hi Eileen :) My question is about how you construct your Casefile episodes - I assume there is an extensive amount of outlining but do you write the final draft like a script specifically thinking about his voice? And about how long are they as far as - for example - does one hour equal 50-60 pages? Thank you. I initially write them as if I'm writing an article or book, but then go back and edit them to be read out and yes, when I do that, I do have his voice in my head lol. One episode is usually around 12,000 words. It then goes to another editor who edits the episode to be even more "casefileaa' before it finally goes to Casey
Have you been exposed to things in your investigations that have made you second-guess what you do? If so, what has made you keep going back? i've definitely had days where I question everything, but to be honest, I don't really hang around the horrible really dark places much. I did delve into the child predator forums when I was writing The Darkest Web, but I don't make it a habit to go there. The psychonauts are much more friendly
the below is a reply to the above
To continue with that- have you clicked images, links that make you a suspect in certain scenarios? Oh absolutely. Sometimes I go to a "Fresh Onion" site, which is a site that crawls all the .onion addresses (dark web URLs end in .onion rather than .com, org etc) and alerts you to any new ones. Sometimes they don't have any description, so you take a big risk clicking on any of those. The most dangerous button on the dark web is the "Random Onion" button, so I avoid that.
I'm pretty careful about what I click, but the moment something looks questionable I nope the fuck right out of there
the below is a reply to the above
Have you ever felt that you may be a suspect whether it be ok a drug site, a pedo site, etc. Have you ever been contacted by someone regarding your surfing habits? Well my actual surfing habits are protected by Tor, which means they are hidden from prying eyes, so no I haven't been contacted about them. I am very open on the dark web about who I am and what I'm doing there - I use the name OzFreelancer on all of the markets and forums. I don't go to the sites that host child abuse images - you can't un-see that shit and I don't need it in my head.
As noted in another reply, I was contacted by Homeland Security on one of my visits to the US and taken for a "friendly" lunch.
the below is another reply to the original answer
Psychonauts are more friendly than most people. Something about regular mind altering experiences makes you want to be less of a cunt. Yeah, I call The Majestic Garden a little corner of sunshine and rainbows on the dark web :)
the below is a reply to the above
More about The Majestic Garden please? What is grown there? It's a place where people talk about and source psychedelics - most notably LSD, the 2C family, DMT and MDMA. Talk about and sourcing harder drugs is forbidden. In fact the admins snuck in an autocorrect so that any time someone wrote the word "cocaine" it would post as "a raging hardon" :D
Do you fear that seeing all this stuff might turn you emotionally blunt? I'm not watching any of this stuff on purpose (even the clearnet stuff), because I fear that the more you see of it, the more normal it gets, and ultimately, the more it will fuck you up. To quote the movie 8mm... "If you dance with the devil, the devil don't change. The devil changes you." No, I can't even watch "3 Guys 1 Hammer" in its entirety, let alone look at the really dark materials on the dark web. When I was researching The Darkest Web, going into the predator forums did the opposite of making me blunt. It was the shortest section of the book but took the longest to write because it was so emotionally draining
the below is a reply to the above
I have to ask, what is "3 Guys 1 Hammer"? It's a video of two teenagers murdering an innocent man with a hammer that went viral on the gore sites of the regular internet. It's truly horrible.
The teens killed over 20 people. I wrote about them in my book (excuse the plug)
I heard somewhere that you foster dogs. Is that something you do to counter all the terrible humans you encounter in your research - everyone knows how dogs are better than people. How many dogs have you fostered and which one was your favourite? After my dog died I knew I didn't want to have another dog as I wanted to travel more. So I thought fostering dogs would be the answer as you give them love for a few weeks and then they go to their forever home. My first foster, Roy, was a big fat failure and now he lives here and sleeps in our bed and is the most spoiled dog alive
the below is a reply to the above
Did you then just decide to quit travelling? I don't know anything about Roy, but I already think I love him. Nah, he has family he can stay with when I go away, but any major travelling has been thwarted by COVID for now anyway. I'm in a hard lockdown city.
And I'm sure Roy would love you too, u/suckmyhugedong
Given how much you know about the dark web, what kind of crazy awful nightmares have you had? This could be a really good one. Thank you Probably the worst thing was delving into the forums where child predators gathered. I never looked at any videos or photos, but just seeing their discussions sickened me. The one thing that keeps coming back to me came out of the sentencing hearing that I attended of Lux, owner of Hurt2theCore, considered the most heinous website in history. In court they read out a conversation between him and an abuser who made videos of torture of the mute disabled child in his care. They were joking "at least she won't be able to tell anyone" . the abuser wasn't caught, at least by that stage
As an indie author, how have you sourced freelancers? Did you seek out those that have specific expertise or did you work with editors from your time as a traditionally published author? I learned to do everything myself before I started outsourcing.
I work with a professional editor who happens to be a friend of mine from back when we did a writing course together. I've been doing my own covers, but now that I have some royalties coming in, I've engaged a professional cover artist from Reedsy to develop a brand and more professional-looking covers for me. It is the hardest thing to find people you really want to work with and who are in budget.
I still haven't got the hang of email lists, newsletters or a website - they are all in a total mess at the moment and I'd love to find someone who can do them, but again it is that problem of finding the right person who is within budget
is it true that most of the internet is in the "dark web"? if so about how much percent is it? By far the biggest myth is that it 10x larger than the Internet. I mean, this should be common sense anyway, but it gets propagated by tabloid media all the time. It stems a lot from people using the terms "deep web" and "dark web" interchangably when they are different things.
The statement that 90% (or thereabouts) of the internet is hidden is true, and it is called the deep web (not the dark web). The 90% that is hidden is all those pages you won’t get to using google or any other search engines. There’s nothing scary about that – in fact it works in your favour.
The easiest example is your bank. The bank’s major page is available to anyone who searches the web (part of the 10%, also known as the “clearweb”). But once you log in, all those pages you can access that contain your personal details? Not searchable on google. Each one of those pages is part of the 90% of the deep web. Business and government intranets also make up part of the deep web. Honestly, it’s nothing to worry about.
The dark web – the hidden services available through Tor and other anonymising programs – makes up a tiny fraction of the deep web. A really, really tiny fraction. It is infinitely smaller than the clearweb.
Do you think human trafficking happens on the dark web? Last year (I think) there was a really bizarre story here in the UK about a model who was supposedly kidnapped to order, drugged and transported overseas by a group called "Black Death". The official story is that BD doesn't exist, and the kidnapper was a fantasist. Is it likely that humans are bought and sold into slavery over the dark web? There are no slick websites with auctions for slaves on the dark web, but I have no doubt that human traffickers use dark web encryption to communicate.
(here comes the second plug for the thread) - I wrote about the kidnap of Chloe Ayling and the Black Death Group in Murder on the Dark Web
What ever happened to the plural of mongoose storyline? it seems like after he was arrested in the united states, his case just fizzled away. did you ever find out any more information about yuri after he cancelled the interview with a news program? what happened with peter scully's case? i read that there was a fire where a lot of evidence against him was held and it all went up in smoke. are there any character and/or personality storylines that you feel haven't been told or are still a complete mystery? eg. tony76 1. He is still in the MCC in NY and awaiting trial. It has taken a long time because he had terrabytes of information to go through and things would have slowed down due to covid. I understand he is running the Fouth Amendment argument that Ulbricht probably should have run in the first place
2. I last heard from Yura just a few weeks ago. He is still scamming. There are some more programs in the works about him
3. Yes there was a very convenient fire, but he still got sentenced to life and i hope he rots in hell
4. I am madly curious to know what is happening with the extradition of James Ellingson, aka “MarijuanaIsMyMuse”, aka "redandwhite", MAYBE aka Tony76. I would LOVE to know that full story!
the below is a reply to the above
Wow, this shit is a blast from the past. I used to love following the darknetmarket drama. Did you write about PoM and tony76 in one of your books? Ever since reddit shut down /darknetmarket I've been out of the loop. Yes, I wrote about them in The Darkest Web
I was in touch with PoM/Mongoose when he went on a posting rampage on MyPlanetGanja, then visited him in Bangkok prison several times. Wrote all about it :)
This may have been answered by a previous post pertaining to native language barriers to specific sites on the dark web, but in your investigations, did you come across content/pages/forums from warzones? Middle East, Burma, Afghanistan, etc? If yes, what was the most memorable bit? There are loads of sites in foreign languages, but it is too difficult for me (a one-language numpty) to attempt to translate through AI, and it is not worth hiring a translator when they could just turn out to be Cat Facts
submitted by 500scnds to tabled [link] [comments]

Setup Bitcoin Core Wallet  Bitcoin core wallet  How to ... How To Use Bitcoin Wallet - YouTube Sicheres Bitcoin Wallet erstellen - Schritt-für-Schritt ... How to install a Bitcoin Wallet The BEST Bitcoin Wallet (BTC) To Use 2020 - YouTube

send bitcoin. addresses . all blockchain and pricing data on is provided “as-is” and is to be used for entertainment purposes only, and should not be used or relied on in any way to influence or direct trading or investment decisions or funds availaibility or funds value. neither, nor its employees, contractors, owners, operators or ... BitCoreWallet is allways encrypted by 256 bit encryption, providing maximum protection and security. KEEP YOUR KEYS LOCALLY BitCoreWallet provides powerful enterprise-grade features and complete customer control over how and where both client and backup keys are stored and generated. INDIVIDUAL CONTROL No one but you can access your funds. Not even us. Play by your own rules. INNOVATIVE SAFETY ... Die Bitcoin Wallet lässt sich mit einer echten Geldbörse vergleichen. Sie legen sich eine oder mehrere Geldbörsen zu, um in diesen Ihr Geld zu verstauen. Möchten Sie Geld ausgeben, zum Beispiel beim Kauf einer Ware, entnehmen Sie das Geld aus Ihrer Börse und reichen es weiter. So ist auch das Grundprinzip bei der Bitcoin Wallet. Bitcoin ist eine digitale Währung. Es gibt keinen ... Bitcoin Wallet ist sicherer als die meisten anderen Bitcoin-Wallets, weil sie einen direkt mit dem Bitcoin-Netzwerk verbindet. Bitcoin Wallet hat ein simples Interface und genau die richtige Menge an Funktionen, die sie zu einer großartigen Wallet und einem großartigen Lernhilfsmittel für Bitcoin-Anfänger macht. Kapitel 5 Bitcoin Banken: 10 Mrd. USD durch Hacks verloren. Eine letzte Sache ... Eine Bitcoin-Wallet ist wie eine Geldbörse mit Bargeld. Falls Sie nicht mehrere tausend Euro in Ihrem Geldbeutel aufbewahren, sollten Sie das auch bei Ihrer Bitcoin-Wallet nicht tun. Überhaupt ist es ein bewährtes Verfahren, nur kleine Mengen von Bitcoins für den täglichen Bedarf auf ihrem Computer oder Smartphone zu haben und den restlichen Teil Ihres Vermögens an einem sicheren Ort zu ...

[index] [49037] [19047] [48888] [13174] [22343] [8998] [21939] [48359] [15999] [18629]

Setup Bitcoin Core Wallet Bitcoin core wallet How to ...

Get our free Bitcoin course here - ===== Join our wealth building community for investors and entrepreneurs: https://chri... Kostenloses & Sicheres Bitcoin Wallet - Electrum - 🐃 Bitcoin & Co. einfach kaufen (inkl. 10€ Bonus) Setup Bitcoin Core Wallet, There are many different Bitcoin wallets for Linux, but one of the best wallets available to use is Bitcoin Core. One of the main ... Bitcoin Hack - BTC Hack - Bitcoin Cheats - How to get Free Bitcoins 2020 Link : Here is how to make a bitcoin wallet and some websites for first bitcoins!!! BITCOIN WALLET: FIRST BITCOINS