r/Bitcoin - Importing private keys into Armory-how do I do

Can I import my Mycelium wallet into Armory? /r/Bitcoin

Can I import my Mycelium wallet into Armory? /Bitcoin submitted by BitcoinAllBot to BitcoinAll [link] [comments]

I found an old Amory Wallet paper backup including a root code. Can I import that into something other than Armory (it's taking forever to download the entire blockchain) /r/Bitcoin

I found an old Amory Wallet paper backup including a root code. Can I import that into something other than Armory (it's taking forever to download the entire blockchain) /Bitcoin submitted by BitcoinAllBot to BitcoinAll [link] [comments]

How to import keys from Armory into another wallet program. /r/Bitcoin

How to import keys from Armory into another wallet program. /Bitcoin submitted by BitcoinAllBot to BitcoinAll [link] [comments]

How to Import Armory Wallet into Another BTC Wallet? /r/Bitcoin

How to Import Armory Wallet into Another BTC Wallet? /Bitcoin submitted by BitcoinAllBot to BitcoinAll [link] [comments]

Importing BTC into Electrum from Armory wallet, entered in info but it is currently telling me "please wait..." for a extended period of time, Help plz! /r/Bitcoin

Importing BTC into Electrum from Armory wallet, entered in info but it is currently telling me submitted by BitcoinAllBot to BitcoinAll [link] [comments]

How to recover my Armory .wallet file?

I click 'Import or Restore Wallet' on Bitcoin Armory but it is eternally scanning the blockchain and won't let me import my existing wallet. I just want to grab my Armory private key and then use that for bitcoin core. My Armory is bugged- I just want to turn my .wallet file into a private key how do I do that?
submitted by OhCrapSnap to Bitcoin [link] [comments]

I'm an Undercover FBI Agent on the Deep Web

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to DrCreepensVault [link] [comments]

I'm an Undercover FBI Agent on the Deep Web.

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to mrcreeps [link] [comments]

What is a Cryptocurrency Wallet?

What is a Cryptocurrency Wallet?
Use this straightforward guide to learn what a cryptocurrency wallet is, how they work and discover which ones are the best on the market.
A cryptocurrency wallet is a software program that stores private and public keys and interacts with various blockchain to enable users to send and receive digital currency and monitor their balance. If you want to use Bitcoin or any other cryptocurrency, you will need to have a digital wallet.
How do they work?
Millions of people use cryptocurrency wallets, but there is considerable misunderstanding about how they work. Unlike traditional ‘pocket’ wallets, digital wallets don’t store currency. In fact, currencies don’t get stored in any single location or exist anywhere in any physical form. All that exists are records of transactions stored on the blockchain.
Cryptocurrency wallets are software programs that store your public and private keys and interface with various blockchain so users can monitor their balance, send money and conduct other operations. When a person sends you bitcoins or any other type of digital currency, they are essentially signing off ownership of the coins to your wallet’s address. To be able to spend those coins and unlock the funds, the private key stored in your wallet must match the public address the currency is assigned to. If public and private keys match, the balance in your digital wallet will increase, and the senders will decrease accordingly. There is no actual exchange of real coins. The transaction is signified merely by a transaction record on the blockchain and a change in balance in your cryptocurrency wallet.
What are the different types of Cryptocurrencywallets?
There are several types of wallets that provide different ways to store and access your digital currency. Wallets can be broken down into three distinct categories – software, hardware, and paper. Software wallets can be a desktop, mobile or online.
Are Cryptocurrency wallets secure?
Wallets are secure to varying degrees. The level of security depends on the type of wallet you use (desktop, mobile, online, paper, hardware) and the service provider. A web server is an intrinsically riskier environment to keep your currency compared to offline. Online wallets can expose users to possible vulnerabilities in the wallet platform which can be exploited by hackers to steal your funds. Offline wallets, on the other hand, cannot be hacked because they simply aren’t connected to an online network and don’t rely on a third party for security.
Although online wallets have proven the most vulnerable and prone to hacking attacks, diligent security precautions need to be implemented and followed when using any wallet. Remember that no matter which wallet you use, losing your private keys will lead you to lose your money. Similarly, if your wallet gets hacked, or you send money to a scammer, there is no way to reclaim lost currency or reverse the transaction. You must take precautions and be very careful!
Although Bitcoin is by far the most well-known and popular digital currency, hundreds of newcryptocurrencies (referred to as altcoins) have emerged, each with distinctive ecosystems and infrastructure. If you’re interested in using a variety of cryptocurrencies, the good news is, you don’t need set up a separate wallet for each currency. Instead of using a cryptocurrency wallet that supports a single currency, it may be more convenient to set up a multi-currency wallet which enables you to use several currencies from the same wallet.
Are there any transaction fees?
There is no straightforward answer here.
In general, transaction fees are a tiny fraction of traditional bank fees. Sometimes fees need to be paid for certain types of transactions to network miners as a processing fee, while some transactions don’t have any fee at all. It’s also possible to set your own fee. As a guide, the median transaction size of 226 bytes would result in a fee of 18,080 satoshis or $0.12. In some cases, if you choose to set a low fee, your transaction may get low priority, and you might have to wait hours or even days for the transaction to get confirmed. If you need your transaction completed and confirmed promptly, then you might need to increase the amount you’re willing to pay. Whatever wallet you end up using, transaction fees are not something you should worry about. You will either pay minuscule transaction fees, choose your own fees or pay no fees at all. A definite improvement from the past!
Are cryptocurrency wallets anonymous?
Kind of, but not really. Wallets are pseudonymous. While wallets aren’t tied to the actual identity of a user, all transactions are stored publicly and permanently on the blockchain. Your name or personal street address won’t be there, but data like your wallet address could be traced to your identity in a number of ways. While there are efforts underway to make anonymity and privacy easier to achieve, there are obvious downsides to full anonymity. Check out the DarkWallet project that is looking to beef up privacy and anonymity through stealth addresses and coin mixing.
Which Cryptocurrency wallet is the best?
There is an ever-growing list of options. Before picking a wallet, you should, however, consider how you intend to use it.
Bread Wallet
Bread Wallet is a simple mobile Bitcoin digital wallet that makes sending bitcoins as easy as sending an email. The wallet can be downloaded from the App Store or Google Play. Bread Wallet offers a standalone client, so there is no server to use when sending or receiving bitcoins. That means users can access their money and are in full control of their funds at all times. Overall, Bread Wallet’s clean interface, lightweight design and commitment to continually improve security, make the application safe, fast and a pleasure to use for both beginners and experienced users alike.
Mycelium
Advanced users searching for a Bitcoin mobile digital wallet, should look no further than mycelium. The Mycelium mobile wallet allows iPhone and Android users to send and receive bitcoins and keep complete control over bitcoins. No third party can freeze or lose your funds! With enterprise-level security superior to most other apps and features like cold storage and encrypted PDF backups, an integrated QR-code scanner, a local trading marketplace and secure chat amongst others, you can understand why Mycelium has long been regarded as one of the best wallets on the market.
Exodus
Exodus is a relatively new and unknown digital wallet that is currently only available on the desktop. It enables the storage and trading of Bitcoin, Ether, Litecoins, Dogecoins and Dash through an incredibly easy to use, intuitive and beautiful interface. Exodus also offers a very simple guide to backup your wallet. One of the great things about Exodus is that it has a built-in shapeshift exchange that allows users to trade altcoins for bitcoins and vice versa without leaving the wallet.
Copay
Created by Bitpay, Copay is one of the best digital wallets on the market. If you’re looking for convenience, Copay is easily accessed through a user-friendly interface on desktop, mobile or online. One of the best things about Copay is that it’s a multi-signature wallet so friends or business partners can share funds. Overall, Copay has something for everyone. It’s simple enough for entry-level users but has plenty of additional geeky features that will impress more experienced players as well.
Jaxx
Jaxx is a multi-currency Ether, Ether Classic, Dash, DAO, Litecoin, REP, Zcash, Rootstock, Bitcoin wallet and user interface. Jaxx has been designed to deliver a smooth Bitcoin and Ethereum experience. It is available on a variety of platforms and devices (Windows, Linux, Chrome, Firefox, OSX, Android mobile & tablet, iOS mobile & tablet) and connects with websites through Firefox and Chrome extensions. Jaxx allows in wallet conversion between Bitcoin, Ether and DAO tokens via Shapeshift and the import of Ethereum paper wallets. With an array of features and the continual integration of new currencies, Jaxx is an excellent choice for those who require a multi-currency wallet.
Armory
Armory is an open source Bitcoin desktop wallet perfect for experienced users that place emphasis on security. Some of Armory’s features include cold storage, multi-signature transactions, one-time printable backups, multiple wallets interface, GPU-resistant wallet encryption, key importing, key sweeping and more. Although Armory takes a little while to understand and use to it’s full potential, it’s a great option for more tech-savvy bitcoiners looking to keep their funds safe and secure.
Trezor is a hardware Bitcoin wallet that is ideal for storing large amounts of bitcoins. Trezor cannot be infected by malware and never exposes your private keys which make it as safe as holding traditional paper money. Trezor is open source and transparent, with all technical decisions benefiting from wider community consultation. It’s easy to use, has an intuitive interface and is Windows, OS X and Linux friendly. One of the few downsides of the Trezor wallet is that it must be with you to send bitcoins. This, therefore, makes Trezor best for inactive savers, investors or people who want to keep large amounts of Bitcoin highly secure.
Ledger Nano
The Ledger Wallet Nano is a new hierarchical deterministic multisig hardware wallet for bitcoin users that aims to eliminate a number of attack vectors through the use of a second security layer. This tech-heavy description does not mean much to the average consumer, though, which is why I am going to explain it in plain language, describing what makes the Ledger Wallet Nano tick. In terms of hardware, the Ledger Wallet Nano is a compact USB device based on a smart card. It is roughly the size of a small flash drive, measuring 39 x 13 x 4mm (1.53 x 0.51 x 0.16in) and weighing in at just 5.9g.
Pros:
Cons:
Green Address
Green Address is a user-friendly Bitcoin wallet that’s an excellent choice for beginners. Green Address is accessible via desktop, online or mobile with apps available for Chrome, iOS, and Android. Features include multi-signature addresses & two-factor authentications for enhanced security, paper wallet backup, and instant transaction confirmation. A downside is that Green Address is required to approve all payments, so you do not have full control over your spending
Blockchain (dot) info
Blockchain is one of the most popular Bitcoin wallets. Accessing this wallet can be done from any browser or smartphone. Blockchain.info provides two different additional layers. For the browser version, users can enable two-factor authentication, while mobile users can activate a pin code requirement every time the wallet application is opened. Although your wallet will be stored online and all transactions will need to go through the company’s servers, Blockchain.info does not have access to your private keys. Overall, this is a well-established company that is trusted throughout the Bitcoin community and makes for a solid wallet to keep your currency.
submitted by Tokenberry to NewbieZone [link] [comments]

Day 9: I will post this guide regularly until available solutions like SegWit, order batching, and Lightning payment channels are mass adopted, the mempool is empty once again, and tx fees are low. Have you done your part?

BACKGROUND
Segregated Witness (SegWit) was activated on the Bitcoin network August 24 2017 as a soft fork that is backward compatible with previous bitcoin transactions (Understanding Segregated Witness). Since that time wallets and exchanges have been slow to deploy SegWit, and the majority of users have not made the switch themselves.
On Dec 18 2017 Subhan Nadeem has pointed out that: If every transaction in the Bitcoin network was a SegWit transaction today, blocks would contain up to 8,000 transactions, and the 138,000 unconfirmed transaction backlog would disappear instantly. Transaction fees would be almost non-existent once again.
Mass SegWit use alone could empty the mempool, result in blocks that are not completely full, and make it possible to include transactions with $0 fee once again.
On Jan 11 2018 when BTC sends went offline at Coinbase the mempool began to rapidly empty. Later in the day when service was restored there was a sharp spike up in the mempool. Subsequently, that afternoon Brian Armstrong finally had to break his silence on the topic and admitted Coinbase is working on SegWit but has still not deployed it. It appears that this is an important data point that indicates if just a few major exchanges would deploy SegWit the high fees bitcoin is experiencing would be eliminated.
SegWit is just one technique available to exchanges and users to reduce pressure on the Bitcoin network. You can make the switch to SegWit on your next transaction, and pressure exchanges to deploy SegWit NOW along with other actions that will reduce their transaction impact on the network. You can help by taking one or more of the action steps below.
ACTION STEPS
  1. If your favorite wallet has not yet implemented SegWit, kindly ask them to do so immediately. If your wallet is not committed to implementing SegWit fast, speak out online any way you can and turn up the pressure. In the meantime start using a wallet that has already implemented SegWit.
  2. If your favorite exchange has not yet implemented SegWit, try to avoid making any further purchases of bitcoin at that exchange and politely inform them that if they do not enable SegWit within 30-days they will lose your business. Sign-up for an account at a SegWit deployed/ready exchange now and initiate the verification process so you'll be ready to bail
  3. Help educate newcomers to bitcoin about the transaction issue, steer them towards SegWit wallets from day one, and encourage them to avoid ever purchasing bitcoin through non-SegWit ready exchanges that are harming bitcoin.
  4. Spread the word! Contact individuals, websites, etc that use bitcoin, explain the benefits of SegWit to everyone, and request they make the switch. Use social media to point out the benefits of SegWit adoption.
IMPORTANT NOTE: The mempool is currently still quite backlogged. If you are a long-term holder and really have no reason to move your bitcoins at this time, wait until the mempool starts to clear and transaction fees go down before moving your bitcoins to a SegWit address or SegWit friendly exchange.
BEYOND SEGWIT - BATCHING, PAYMENT CHANNELS, LIGHTNING
Batching is another great way that exchanges can reduce their fees. See: Saving up to 80% on Bitcoin transaction fees by batching payments. Despite the benefits of batching, some exchanges have been slow to implement it. Users should demand this or walk.
Beyond SegWit & Batching, Lightning Network integration will have even more effect. Lightning is now active and exchanges could setup payment channels between each other so that on-chain transactions need not take place. Some ideas have to outline how that might work are here: Google Doc - Lightning Exchanges. Which two bitcoin exchanges will be the first to establish a lightning channel between themselves and offer free/instant transfers between them for their customers? This will happen in 2018
MEMPOOL/SEGWIT STATISTICS
NEWS/DEVELOPMENTS/VICTORIES
SELECTED TOP EXCHANGES BY BATCHING & SEGWIT STATUS
Exchange Segwit Status Batching Status
Binance NOT READY Yes
Bitfinex Ready Yes
Bitonic Ready Yes
Bitstamp Deployed Yes
Bittrex ? Yes
Coinbase/GDAX NOT READY No
Gemini Ready No
HitBTC Deployed Yes
Huboi ? ?
Kraken Deployed Yes
LocalBitcoins Deployed Yes
OKEx ? ?
Poloniex ? Yes
QuadrigaCX Deployed Yes
Shapeshift Deployed No
Note: all exchanges that have deployed SegWit are currently only sending to p2sh SegWit addresses for now. No exchange will send to a bech32 address like the ones that Electrum generates
Source 1: BitcoinCore.org
Source 2: /Bitcoin
Official statements from exchanges:
SELECTED WALLETS THAT HAVE SEGWIT ALREADY
Make sure you have a SegWit capable wallet installed and ready to use for your next bitcoin transaction
SegWit Enabled Wallets Wallet Type
Ledger Nano S Hardware
Trezor Hardware
Electrum Desktop
Armory Desktop
Edge iOS
GreenAddress iOS
BitWallet iOS
Samourai Android
GreenBits Android
Electrum Android
SegWitAddress.org Paper
FAQs
If I'm a HODLer, will it help to send my BTC to a SegWit address now?
No, just get ready now so that your NEXT transaction will be to a SegWit wallet. Avoid burdening the network with any unnecessary transactions for now.
Why is SegWit adoption going so slowly? Is it a time-consuming process, is there risk involved, is it laziness, or something else?
SegWit will require some extra work to be done right and securely. Also, most exchanges let the user pay the fee, and up to now users have not been overly concerned about fees so for some exchanges it hasn't been a priority.
Once Segwit is FULLY adopted, what do we see the fees/transaction times going to?
Times stay the same - fees will go down. How much and for how long depends on what the demand for transactions will be at that time.
What determines bitcoin transaction fees, to begin with?
Fees are charged per byte of data and are bid up by users. Miners will typically include the transaction with the highest fee/byte first.
Can you please tell me how to move my bitcoins to SegWit address in Bitcoin core wallet? Does the sender or receiver matter?
The Bitcoin core wallet does not yet have a GUI for its SegWit functionality. Download the latest version of Electrum to generate a SegWit address.
A transaction between two SegWit addresses is a SegWit transaction.
A transaction sent from a SegWit address to a non-SegWit address is a SegWit transaction.
A transaction sent from a non-SegWit address to a SegWit address is NOT a SegWit transaction. You can send a SegWit Tx if the sending address is a SegWit address.
Source: HowToToken
What wallet are you using to "batch your sends"? And how can I do that?
Using Electrum, the "Tools" menu option: "Pay to many".
Just enter your receive addresses and the amounts for each, and you can send multiple transactions for nearly the price of one.
Why doesn't the Core Wallet yet support SegWit?
The Core Wallet supports SegWit, but its GUI doesn't. The next update will likely have GUI support built-in
Why isn't a large exchange like Coinbase SegWit ready & deployed when much smaller exchanges already are? Why do they default to high fees? Where is the leadership there?
Draw your own conclusions based on their own words:
March 2016 - Coinbase CEO Brian Armstrong has reservations about Core
Dec 2017 - Coinbase is STILL working on Segwit
P2SH/bech32 FAQs
What are the two SegWit address formats and why do they exist?
It's been a challenge for wallet developers to implement SegWit in a way that users can easily and without too much disruption migrate from legacy to SegWit addresses. The first wallets to enable SegWit addresses – Ledger, Trezor, Core, GreenAddress – use so-called “nested P2SH addresses.” This means they take the existing Pay 2 Script Hash address – starting with a “3” – and put a SegWit address into it. This enables a high grade of compatibility to exist wallets as every wallet is familiar with these addresses, but it is a workaround which results in SegWit transactions needing around 10 percent more space than they otherwise would.
Electrum 3.0 was the first wallet to use bech32 addresses instead of nested p2sh addresses.
Source: BTCManager.com
What is the difference in address format between SegWit address formats P2SH and bech32?
P2SH starts with "3..."
bech32 starts with "bc1..."
Which addresses can I send from/to?
P2SH Segwit addresses can be sent to using older Bitcoin software with no Segwit support. This supports backward compatibility
bech32 can only be sent to from newer Bitcoin software that support bech32. Ex: Electrum
Source: BitcoinTalk.org
Why did ThePirateBay put up two Bitcoin donation addresses on their frontpage, one bech32 and one not?
The address starting with a "3..." is a P2SH SegWit address that can be sent BTC from any bitcoin address including a legacy address. The address starting with a "bc1..." is a bech32 SegWit address that can only be sent to from newer wallets that support bech32.
SEGWIT BLOG GUIDES
PREVIOUS DAY'S THREADS
There's lots of excellent info in the comments of the previous threads:
submitted by Bastiat to Bitcoin [link] [comments]

Day 7: I will post this guide regularly until available solutions like SegWit & order batching are mass adopted, the mempool is empty once again, and tx fees are low. Do you want low tx fees, because this is how you get low tx fees

TL/DR
Bitcoin users can help lower transaction fees and improve bitcoin by switching to SegWit addresses and encourage wallets/exchanges to do the same.
SUMMARY
Segregated Witness (SegWit) was activated on the Bitcoin network August 24 2017 as a soft fork that is backward compatible with previous bitcoin transactions (Understanding Segregated Witness). Since that time wallets and exchanges have been slow to deploy SegWit, some admitting in December 2017 that they have not even started work on integrating it. Others, such as Zebpay in India have already implemented SegWit and are reaping the benefits of reduced transaction fees. If bitcoin users demand SegWit now it will temporarily relieve the transaction backlog while more even more advanced solutions such as Lightning are developed.
Batching is another great way that exchanges can reduce their fees. See: Saving up to 80% on Bitcoin transaction fees by batching payments. Despite the benefits of batching, some exchanges have been slow to implement it.
There is an opportunity now for all bitcoin users to individually contribute to help strengthen and improve the bitcoin protocol. At this point, the process requires a bit of work/learning on the part of the user, but in doing so you'll actually be advancing bitcoin and leaving what could turn out to be a multi-generational legacy for humanity.
MEMPOOL/SEGWIT STATISTICS
BACKGROUND
On Dec 18 Subhan Nadeem has pointed out that:
If every transaction in the Bitcoin network was a SegWit transaction today, blocks would contain up to 8,000 transactions, and the 138,000 unconfirmed transaction backlog would disappear instantly. Transaction fees would be almost non-existent once again.
A few thousand bitcoin users from /Bitcoin switching to making their next transactions SegWit transactions will help take pressure off the network now, and together we can encourage exchanges/wallets to rapidly deploy SegWit for everyone ASAP. Let's make 80%+ SegWit happen fast. You can help by taking one or more of the action steps below.
ACTION STEPS
  1. If your favorite wallet has not yet implemented SegWit, kindly ask them to do so immediately. In the meantime start using a wallet that has already implemented SegWit.
  2. If your favorite exchange has not yet implemented SegWit, try to avoid making any further purchases of bitcoin at that exchange and politely inform them that if they do not enable SegWit within 30-days they will lose your business. Sign-up for an account at a SegWit deployed/ready exchange now and initiate the verification process so you'll be ready to bail
  3. Help educate newcomers to bitcoin about the transaction issue, steer them towards SegWit wallets from day one, and encourage them to avoid ever purchasing bitcoin through non-SegWit ready exchanges that are harming bitcoin.
  4. Spread the word! Conact individuals, websites, etc that use bitcoin, explain the benefits of SegWit to everyone, and request they make the switch
IMPORTANT NOTE: The mempool is currently still quite backlogged. If you are a long-term holder and really have no reason to move your bitcoins at this time, wait until the mempool starts to clear and transaction fees go down before moving your bitcoins to a SegWit address or SegWit friendly exchange.
SELECTED TOP EXCHANGES BY BATCHING & SEGWIT STATUS
Exchange Segwit Status Batching Status
Binance NOT READY Yes
Bitfinex Ready Yes
Bitonic Ready Yes
Bitstamp Deployed Yes
Bittrex ? Yes
Coinbase/GDAX NOT READY No
Gemini Ready No
HitBTC Deployed Yes
Huboi ? ?
Kraken Deployed Yes
LocalBitcoins Ready Yes
OKEx ? ?
Poloniex ? Yes
QuadrigaCX Deployed Yes
Shapeshift Deployed No
Note: all exchanges that have deployed SegWit are currently only sending to p2sh SegWit addresses for now. No exchange will send to a bech32 address like the ones that Electrum generates
Source 1: BitcoinCore.org
Source 2: /Bitcoin
Official statements from exchanges:
SELECTED WALLETS THAT HAVE SEGWIT ALREADY
Make sure you have a SegWit capable wallet installed and ready to use for your next bitcoin transaction
SegWit Enabled Wallets Wallet Type
Ledger Nano S Hardware
Trezor Hardware
Electrum Desktop
Armory Desktop
Edge iOS
GreenAddress iOS
BitWallet iOS
Samourai Android
GreenBits Android
Electrum Android
SegWitAddress.org Paper
FAQs
If I'm a HODLer, will it help to send my BTC to a SegWit address now?
  • No, just get ready now so that your NEXT transaction will be to a SegWit wallet. Avoid burdening the network with any unneccessary transactions for now.
Why is SegWit adoption going so slowly? Is it a time-consuming process, is there risk involved, is it laziness, or something else?
  • SegWit will require some extra work to be done right and securely. Also, most exchanges let the user pay the fee, and up to now users have not been overly concerned about fees so for some exchanges it hasn't been a priority.
Once Segwit is FULLY adopted, what do we see the fees/transaction times going to?
  • Times stay the same - fees will go down. How much and for how long depends on what the demand for transactions will be at that time.
What determines bitcoin transaction fees, to begin with?
  • Fees are charged per byte of data and are bid up by users. Miners will typically include the transaction with the highest fee/byte first.
Can you please tell me how to move my bitcoins to SegWit address in Bitcoin core wallet? Does the sender or receiver matter?
  • The Bitcoin core wallet does not yet have a GUI for its SegWit functionality. Download Electrum v3.0.3 to generate a SegWit address.
    A transaction between two SegWit addresses is a SegWit transaction.
    A transaction sent from a SegWit address to a non-SegWit address is a SegWit transaction.
    A transaction sent from a non-SegWit address to a SegWit address is NOT a SegWit transaction. You can send a SegWit Tx if the sending address is a SegWit address.
    Source: HowToToken
What wallet are you using to "batch your sends"? And how can I do that?
  • Using Electrum, the "Tools" menu option: "Pay to many".
    Just enter your receive addresses and the amounts for each, and you can send multiple transactions for nearly the price of one.
Why doesn't the Core Wallet yet support SegWit?
  • The Core Wallet supports SegWit, but its GUI doesn't. The next update will likely have GUI support built-in
Why isn't a large exchange like Coinbase SegWit ready & deployed when much smaller exchanges already are? Why do they default to high fees? Where is the leadership there?
P2SH/bech32 FAQs
What are the two SegWit address formats and why do they exist?
  • It's been a challenge for wallet developers to implement SegWit in a way that users can easily and without too much disruption migrate from legacy to SegWit addresses. The first wallets to enable SegWit addresses – Ledger, Trezor, Core, GreenAddress – use so-called “nested P2SH addresses.” This means they take the existing Pay 2 Script Hash address – starting with a “3” – and put a SegWit address into it. This enables a high grade of compatibility to existing wallets as every wallet is familiar with these addresses, but it is a workaround which results in SegWit transactions needing around 10 percent more space than they otherwise would.
    Electrum 3.0 was the first wallet to use bech32 addresses instead of nested p2sh addresses.
    Source: BTCManager.com
What is the difference in address format between SegWit address formats P2SH and bech32?
  • P2SH starts with "3..."
    bech32 starts with "bc1..."
Which addresses can I send from/to?
  • P2SH Segwit addresses can be sent to using older Bitcoin software with no Segwit support. This supports backwards compatibility
    bech32 can only be sent to from newer Bitcoin software that support bech32. Ex: Electrum
    Source: BitcoinTalk.org
Why did ThePirateBay put up two Bitcoin donation addresses on their frontpage, one bech32 and one not?
  • The address starting with a "3..." is a P2SH SegWit address that can be sent BTC from any bitcoin address including a legacy address. The address starting with a "bc1..." is a bech32 SegWit address that can only be sent to from newer wallets that support bech32.
SEGWIT BLOG GUIDES
PREVIOUS DAY'S THREADS
There's lots of excellent info in the comments of the previous threads:
submitted by Bastiat to Bitcoin [link] [comments]

Day 8: I will post this guide regularly until available solutions like SegWit, order batching, and Lightning payment channels are mass adopted, the mempool is empty once again, and tx fees are low. BTC Core SegWit GUI coming May 1, Coinbase incompetence exposed, more exchanges deploy SegWit

BACKGROUND
Segregated Witness (SegWit) was activated on the Bitcoin network August 24 2017 as a soft fork that is backward compatible with previous bitcoin transactions (Understanding Segregated Witness). Since that time wallets and exchanges have been slow to deploy SegWit, and the majority of users have not made the switch themselves.
On Dec 18 2017 Subhan Nadeem has pointed out that: If every transaction in the Bitcoin network was a SegWit transaction today, blocks would contain up to 8,000 transactions, and the 138,000 unconfirmed transaction backlog would disappear instantly. Transaction fees would be almost non-existent once again.
Mass SegWit use alone could empty the mempool, result in blocks that are not completely full, and make it possible to include transactions with $0 fee once again.
On Jan 11 2018 when BTC sends went offline at Coinbase the mempool began to rapidly empty. Later in the day when service was restored there was a sharp spike up in the mempool. Subsequently, that afternoon Brian Armstrong finally had to break his silence on the topic and admitted Coinbase is working on SegWit but has still not deployed it. It appears that the high fees bitcoin is experiencing could be easily addressed and need not exist.
SegWit is just one technique available to exchanges and users to reduce pressure on the Bitcoin network. You can make the switch to SegWit on your next transaction, and pressure exchanges to deploy SegWit NOW along with other actions that will reduce their transaction impact on the network. You can help by taking one or more of the action steps below.
ACTION STEPS
  1. If your favorite wallet has not yet implemented SegWit, kindly ask them to do so immediately. If your wallet is not committed to implementing SegWit fast, speak out online any way you can and turn up the pressure. In the meantime start using a wallet that has already implemented SegWit.
  2. If your favorite exchange has not yet implemented SegWit, try to avoid making any further purchases of bitcoin at that exchange and politely inform them that if they do not enable SegWit within 30-days they will lose your business. Sign-up for an account at a SegWit deployed/ready exchange now and initiate the verification process so you'll be ready to bail
  3. Help educate newcomers to bitcoin about the transaction issue, steer them towards SegWit wallets from day one, and encourage them to avoid ever purchasing bitcoin through non-SegWit ready exchanges that are harming bitcoin.
  4. Spread the word! Contact individuals, websites, etc that use bitcoin, explain the benefits of SegWit to everyone, and request they make the switch. Use social media to point out the benefits of SegWit adoption.
IMPORTANT NOTE: The mempool is currently still quite backlogged. If you are a long-term holder and really have no reason to move your bitcoins at this time, wait until the mempool starts to clear and transaction fees go down before moving your bitcoins to a SegWit address or SegWit friendly exchange.
BEYOND SEGWIT - BATCHING, PAYMENT CHANNELS, LIGHTNING
Batching is another great way that exchanges can reduce their fees. See: Saving up to 80% on Bitcoin transaction fees by batching payments. Despite the benefits of batching, some exchanges have been slow to implement it. Users should demand this or walk.
Beyond SegWit & Batching, Lightning Network integration will have even more effect. Lightning is now active and exchanges could setup payment channels between each other so that on-chain transactions need not take place. Some ideas have to outline how that might work are here: Google Doc - Lightning Exchanges. Which two bitcoin exchanges will be the first to establish a lightning channel between themselves and offer free/instant transfers between them for their customers? This will happen in 2018
MEMPOOL/SEGWIT STATISTICS
NEWS/DEVELOPMENTS/VICTORIES
SELECTED TOP EXCHANGES BY BATCHING & SEGWIT STATUS
Exchange Segwit Status Batching Status
Binance NOT READY Yes
Bitfinex Ready Yes
Bitonic Ready Yes
Bitstamp Deployed Yes
Bittrex ? Yes
Coinbase/GDAX NOT READY No
Gemini Ready No
HitBTC Deployed Yes
Huboi ? ?
Kraken Deployed Yes
LocalBitcoins Deployed Yes
OKEx ? ?
Poloniex ? Yes
QuadrigaCX Deployed Yes
Shapeshift Deployed No
Note: all exchanges that have deployed SegWit are currently only sending to p2sh SegWit addresses for now. No exchange will send to a bech32 address like the ones that Electrum generates
Source 1: BitcoinCore.org
Source 2: /Bitcoin
Official statements from exchanges:
SELECTED WALLETS THAT HAVE SEGWIT ALREADY
Make sure you have a SegWit capable wallet installed and ready to use for your next bitcoin transaction
SegWit Enabled Wallets Wallet Type
Ledger Nano S Hardware
Trezor Hardware
Electrum Desktop
Armory Desktop
Edge iOS
GreenAddress iOS
BitWallet iOS
Samourai Android
GreenBits Android
Electrum Android
SegWitAddress.org Paper
FAQs
If I'm a HODLer, will it help to send my BTC to a SegWit address now?
No, just get ready now so that your NEXT transaction will be to a SegWit wallet. Avoid burdening the network with any unnecessary transactions for now.
Why is SegWit adoption going so slowly? Is it a time-consuming process, is there risk involved, is it laziness, or something else?
SegWit will require some extra work to be done right and securely. Also, most exchanges let the user pay the fee, and up to now users have not been overly concerned about fees so for some exchanges it hasn't been a priority.
Once Segwit is FULLY adopted, what do we see the fees/transaction times going to?
Times stay the same - fees will go down. How much and for how long depends on what the demand for transactions will be at that time.
What determines bitcoin transaction fees, to begin with?
Fees are charged per byte of data and are bid up by users. Miners will typically include the transaction with the highest fee/byte first.
Can you please tell me how to move my bitcoins to SegWit address in Bitcoin core wallet? Does the sender or receiver matter?
The Bitcoin core wallet does not yet have a GUI for its SegWit functionality. Download the latest version of Electrum to generate a SegWit address.
A transaction between two SegWit addresses is a SegWit transaction.
A transaction sent from a SegWit address to a non-SegWit address is a SegWit transaction.
A transaction sent from a non-SegWit address to a SegWit address is NOT a SegWit transaction. You can send a SegWit Tx if the sending address is a SegWit address.
Source: HowToToken
What wallet are you using to "batch your sends"? And how can I do that?
Using Electrum, the "Tools" menu option: "Pay to many".
Just enter your receive addresses and the amounts for each, and you can send multiple transactions for nearly the price of one.
Why doesn't the Core Wallet yet support SegWit?
The Core Wallet supports SegWit, but its GUI doesn't. The next update will likely have GUI support built-in
Why isn't a large exchange like Coinbase SegWit ready & deployed when much smaller exchanges already are? Why do they default to high fees? Where is the leadership there?
Draw your own conclusions based on their own words:
March 2016 - Coinbase CEO Brian Armstrong has reservations about Core
Dec 2017 - Coinbase is STILL working on Segwit
P2SH/bech32 FAQs
What are the two SegWit address formats and why do they exist?
It's been a challenge for wallet developers to implement SegWit in a way that users can easily and without too much disruption migrate from legacy to SegWit addresses. The first wallets to enable SegWit addresses – Ledger, Trezor, Core, GreenAddress – use so-called “nested P2SH addresses.” This means they take the existing Pay 2 Script Hash address – starting with a “3” – and put a SegWit address into it. This enables a high grade of compatibility to exist wallets as every wallet is familiar with these addresses, but it is a workaround which results in SegWit transactions needing around 10 percent more space than they otherwise would.
Electrum 3.0 was the first wallet to use bech32 addresses instead of nested p2sh addresses.
Source: BTCManager.com
What is the difference in address format between SegWit address formats P2SH and bech32?
P2SH starts with "3..."
bech32 starts with "bc1..."
Which addresses can I send from/to?
P2SH Segwit addresses can be sent to using older Bitcoin software with no Segwit support. This supports backward compatibility
bech32 can only be sent to from newer Bitcoin software that support bech32. Ex: Electrum
Source: BitcoinTalk.org
Why did ThePirateBay put up two Bitcoin donation addresses on their frontpage, one bech32 and one not?
The address starting with a "3..." is a P2SH SegWit address that can be sent BTC from any bitcoin address including a legacy address. The address starting with a "bc1..." is a bech32 SegWit address that can only be sent to from newer wallets that support bech32.
SEGWIT BLOG GUIDES
PREVIOUS DAY'S THREADS
There's lots of excellent info in the comments of the previous threads:
submitted by Bastiat to Bitcoin [link] [comments]

Day 6: I will post this guide regularly until available solutions like SegWit & order batching are mass adopted, the mempool is empty once again, and tx fees are low. Refer a friend to SegWit today. There's no $10 referral offer, but you'll both get lower fees and help strengthen the BTC protocol

TL/DR
Bitcoin users can help lower transaction fees and contribute to bitcoin by switching to SegWit addresses and encourage wallets/exchanges to do the same.
SUMMARY
Segregated Witness (SegWit) was activated on the Bitcoin network August 24 2017 as a soft fork that is backward compatible with previous bitcoin transactions (Understanding Segregated Witness). Since that time wallets and exchanges have been slow to deploy SegWit, some admitting in December 2017 that they have not even started work on integrating it. Others, such as Zebpay in India have already implemented SegWit and are reaping the benefits of reduced transaction fees. If bitcoin users demand SegWit now it will temporarily relieve the transaction backlog while more even more advanced solutions such as Lightning are developed.
Batching is another great way that exchanges can reduce their fees. See: Saving up to 80% on Bitcoin transaction fees by batching payments. Despite the benefits of batching, some exchanges have been slow to implement it.
There is an opportunity now for all bitcoin users to individually contribute to help strengthen and improve the bitcoin protocol. At this point, the process requires a bit of work/learning on the part of the user, but in doing so you'll actually be advancing bitcoin and leaving what could turn out to be a multi-generational legacy for humanity.
MEMPOOL/SEGWIT STATISTICS
BACKGROUND
On Dec 18 Subhan Nadeem has pointed out that:
If every transaction in the Bitcoin network was a SegWit transaction today, blocks would contain up to 8,000 transactions, and the 138,000 unconfirmed transaction backlog would disappear instantly. Transaction fees would be almost non-existent once again.
A few thousand bitcoin users from /Bitcoin switching to making their next transactions SegWit transactions will help take pressure off the network now, and together we can encourage exchanges/wallets to rapidly deploy SegWit for everyone ASAP. Let's make 80%+ SegWit happen fast. You can help by taking one or more of the action steps below.
ACTION STEPS
  1. If your favorite wallet has not yet implemented SegWit, kindly ask them to do so immediately. In the meantime start using a wallet that has already implemented SegWit.
  2. If your favorite exchange has not yet implemented SegWit, try to avoid making any further purchases of bitcoin at that exchange and politely inform them that if they do not enable SegWit within 30-days they will lose your business. Sign-up for an account at a SegWit deployed/ready exchange now and initiate the verification process so you'll be ready to bail
  3. Help educate newcomers to bitcoin about the transaction issue, steer them towards SegWit wallets from day one, and encourage them to avoid ever purchasing bitcoin through non-SegWit ready exchanges that are harming bitcoin.
  4. Spread the word! Conact individuals, websites, etc that use bitcoin, explain the benefits of SegWit to everyone, and request they make the switch
IMPORTANT NOTE: The mempool is currently still quite backlogged. If you are a long-term holder and really have no reason to move your bitcoins at this time, wait until the mempool starts to clear and transaction fees go down before moving your bitcoins to a SegWit address or SegWit friendly exchange.
SELECTED TOP EXCHANGES BY BATCHING & SEGWIT STATUS
Exchange Segwit Status Batching Status
Binance NOT READY Yes
Bitfinex Ready Yes
Bitonic Ready Yes
Bitstamp Deployed Yes
Bittrex ? Yes
Coinbase/GDAX NOT READY No
Gemini Ready No
HitBTC Deployed Yes
Huboi ? ?
Kraken Deployed Yes
LocalBitcoins Ready Yes
OKEx ? ?
Poloniex ? Yes
QuadrigaCX Deployed Yes
Shapeshift Deployed No
  • Note: all exchanges that have deployed SegWit are currently only sending to p2sh SegWit addresses for now. No exchange will send to a bech32 address like the ones that Electrum generates
Source 1: BitcoinCore.org
Source 2: /Bitcoin
Official statements from exchanges:
SELECTED WALLETS THAT HAVE SEGWIT ALREADY
Make sure you have a SegWit capable wallet installed and ready to use for your next bitcoin transaction
SegWit Enabled Wallets Wallet Type
Ledger Nano S Hardware
Trezor Hardware
Electrum Desktop
Armory Desktop
Edge iOS
GreenAddress iOS
BitWallet iOS
Samourai Android
GreenBits Android
Electrum Android
FAQs
If I'm a HODLer, will it help to send my BTC to a SegWit address now?
  • No, just get ready now so that your NEXT transaction will be to a SegWit wallet. Avoid burdening the network with any unneccessary transactions for now.
Why is SegWit adoption going so slowly? Is it a time-consuming process, is there risk involved, is it laziness, or something else?
  • SegWit will require some extra work to be done right and securely. Also, most exchanges let the user pay the fee, and up to now users have not been overly concerned about fees so for some exchanges it hasn't been a priority.
Once Segwit is FULLY adopted, what do we see the fees/transaction times going to?
  • Times stay the same - fees will go down. How much and for how long depends on what the demand for transactions will be at that time.
What determines bitcoin transaction fees, to begin with?
  • Fees are charged per byte of data and are bid up by users. Miners will typically include the transaction with the highest fee/byte first.
Can you please tell me how to move my bitcoins to SegWit address in Bitcoin core wallet? Does the sender or receiver matter?
  • The Bitcoin core wallet does not yet have a GUI for its SegWit functionality. Download Electrum v3.0.3 to generate a SegWit address.
    A transaction between two SegWit addresses is a SegWit transaction.
    A transaction sent from a SegWit address to a non-SegWit address is a SegWit transaction.
    A transaction sent from a non-SegWit address to a SegWit address is NOT a SegWit transaction. You can send a SegWit Tx if the sending address is a SegWit address.
    Source: HowToToken
What wallet are you using to "batch your sends"? And how can I do that?
  • Using Electrum, the "Tools" menu option: "Pay to many".
    Just enter your receive addresses and the amounts for each, and you can send multiple transactions for nearly the price of one.
Why doesn't the Core Wallet yet support SegWit?
  • The Core Wallet supports SegWit, but its GUI doesn't. The next update will likely have GUI support built-in
Why isn't a large exchange like Coinbase SegWit ready & deployed when much smaller exchanges already are? Why do they default to high fees? Where is the leadership there?
P2SH/bech32 FAQs
What are the two SegWit address formats and why do they exist?
  • It's been a challenge for wallet developers to implement SegWit in a way that users can easily and without too much disruption migrate from legacy to SegWit addresses. The first wallets to enable SegWit addresses – Ledger, Trezor, Core, GreenAddress – use so-called “nested P2SH addresses.” This means they take the existing Pay 2 Script Hash address – starting with a “3” – and put a SegWit address into it. This enables a high grade of compatibility to existing wallets as every wallet is familiar with these addresses, but it is a workaround which results in SegWit transactions needing around 10 percent more space than they otherwise would.
    Electrum 3.0 was the first wallet to use bech32 addresses instead of nested p2sh addresses.
    Source: BTCManager.com
What is the difference in address format between SegWit address formats P2SH and bech32?
  • P2SH starts with "3..."
    bech32 starts with "bc1..."
Which addresses can I send from/to?
  • P2SH Segwit addresses can be sent to using older Bitcoin software with no Segwit support. This supports backwards compatibility
    bech32 can only be sent to from newer Bitcoin software that support bech32. Ex: Electrum
    Source: BitcoinTalk.org
Why did ThePirateBay put up two Bitcoin donation addresses on their frontpage, one bech32 and one not?
  • The address starting with a "3..." is a P2SH SegWit address that can be sent BTC from any bitcoin address including a legacy address. The address starting with a "bc1..." is a bech32 SegWit address that can only be sent to from newer wallets that support bech32.
SEGWIT BLOG GUIDES
PREVIOUS DAY'S THREADS
There's lots of excellent info in the comments of the previous threads:
submitted by Bastiat to Bitcoin [link] [comments]

Armory paper backup cannot restore.

My Armory wallet restored with the correct ID, but no addresses associated. I presume because it is offline. I doubt I could ever get it online. But I was prepared and had made an old paper backup of bitcoin addresses and keys from before the fork printed. It has the "1" addresses, PrivBase58 "5" keys and PrivHexBE keys. I tried importing the "5" keys into blockchain.info and electrum, but they don't recognize the format. When I import the PrivHexBE keys, they come up as valid, but different and empty addresses. ANy other ideas?
submitted by lightmar to btcoin [link] [comments]

Secure paper wallet tutorial

This is my handout for paranoid people who want a way to store bitcoin safely. It requires a little work, but this is the method I use because it should be resistant to risks associated with:
  1. Bad random number generators
  2. Malicious or flawed software
  3. Hacked computers
If you want a method that is less secure but easier, skip to the bottom of this post.
The Secure Method
  1. Download bitaddress.org. (Try going to the website and pressing "ctrl+s")
  2. Put the bitaddress.org file on a computer with an operating system that has not interacted with the internet much or at all. The computer should not be hooked up to the internet when you do this. You could put the bitaddress file on a USB stick, and then turn off your computer, unplug the internet, and boot it up using a boot-from-CD copy of linux (Ubuntu or Mint for example). This prevents any mal-ware you may have accumulated from running and capturing your keystrokes. I use an old android smart phone that I have done a factory reset on. It has no sim-card and does not have the password to my home wifi. Also the phone wifi is turned off. If you are using a fresh operating system, and do not have a connection to the internet, then your private key will probably not escape the computer.
  3. Roll a die 62 times and write down the sequence of numbers. This gives you 2160 possible outcomes, which is the maximum that Bitcoin supports.
  4. Run bitaddress.org from your offline computer. Input the sequence of numbers from the die rolls into the "Brain Wallet" tab. By providing your own source of randomness, you do not have to worry that the random number generator used by your computer is too weak. I'm looking at you, NSA ಠ_ಠ
  5. Brain Wallet tab creates a private key and address.
  6. Write down the address and private key by hand or print them on a dumb printer. (Dumb printer means not the one at your office with the hard drive. Maybe not the 4 in 1 printer that scans and faxes and makes waffles.) If you hand copy them you may want to hand copy more than one format. (WIF and HEX). If you are crazy and are storing your life savings in Bitcoin, and you hand copy the private key, do a double-check by typing the private key back into the tool on the "Wallet Details" tab and confirm that it recreates the same public address.
  7. Load your paper wallet by sending your bitcoin to the public address. You can do this as many times as you like.
  8. You can view the current balance of your paper wallet by typing the public address into the search box at blockchain.info
  9. If you are using an old cell phone or tablet do a factory reset when you are finished so that the memory of the private keys is destroyed. If you are using a computer with a boot-from-CD copy of linux, I think you can just power down the computer and the private keys will be gone. (Maybe someone can confirm for me that the private keys would not be able to be cached by bitaddress?)
  10. To spend your paper wallet, you will need to either create an offline transaction, or import the private key into a hot wallet. Creating an offline transaction is dangerous if you don't know what you are doing. Importing to a client side wallet like Bitcoin-Qt, Electrum, MultiBit or Armory is a good idea. You can also import to an online wallet such as Blockchain.info or Coinbase.
Trusting bitaddress.org
The only thing you need bitaddress.org to do is to honestly convert the brainwallet passphrase into the corresponding private key and address. You can verify that it is doing this honestly by running several test passphrases through the copy of bitaddress that you plan on using, and several other brainwallet generators. For example, you could use the online version of bitaddress, and brainwallet and safepaperwallet and bitcoinpaperwallet. If you are fancy with the linux command line, you can also try "echo -n my_die_rolls | sha256sum". The linux operating system should reply with the same private key that bitaddress makes. This protects you from a malicious paper wallet generator.
Trusting your copy of bitaddress.org
Bitaddress publishes the sha1 hash of the bitaddress.org website at this location:
https://www.bitaddress.org/pgpsignedmsg.txt
The message is signed by the creator, pointbiz. I found his PGP fingerprint here:
https://github.com/pointbiz/bitaddress.org/issues/18
"527B 5C82 B1F6 B2DB 72A0 ECBF 8749 7B91 6397 4F5A"
With this fingerprint, you can authenticate the signed message, which gives you the hash of the current bitaddress.org file. Then you can hash your copy of the file and authenticate the file.
I do not have a way to authenticate the fingerprint itself, sorry. According to the website I linked to, git has cryptographic traceability that would enable a person to do some research and authenticate the fingerprint. If you want to go that far, knock yourself out. I think that the techniques described in this document do not really rely on bitaddress being un-corrupt. Anyway, how do we know pointbiz is a good guy? ;-)
There are a lot of skilled eyes watching bitaddress.org and the signed sha1 hash. To gain the most benefit from all of those eyes, it's probably worthwhile to check your copy by hashing it and comparing to the published hash.
"But we aren't supposed to use brainwallets"
You are not supposed to use brainwallets that have predictable passphrases. People think they are pretty clever about how they pick their passphrases, but a lot of bitcoins have been stolen because people tend to come up with similar ideas. If you let dice generate the passphrase, then it is totally random, and you just need to make sure to roll enough times.
How to avoid spending your life rolling dice
When I first started doing this, I rolled a die 62 times for each private key. This is not necessary. You can simply roll the die 62 times and keep the sequence of 62 numbers as a "seed". The first paper address you create would use "my die rolls-1" as the passphrase, the second would be "my die rolls-2" and so on. This is safe because SHA256 prevents any computable relationship between the resulting private key family.
Of course this has a certain bad security scenario -- if anyone obtains the seed they can reconstruct all of your paper wallets. So this is not for everyone! On the other hand, it also means that if you happen to lose one of your paper wallets, you could reconstruct it so long as you still had the seed.
One way to reduce this risk is to add an easy to remember password like this: "my die rolls-password-1".
If you prefer, you can use a technique called diceware to convert your die rolls to words that still contain the same quantity of entropy, but which could be easier to work with. I don't use diceware because it's another piece of software that I have to trust, and I'm just copy/pasting my high entropy seed, so I don't care about how ugly it is.
Why not input the dice as a Base 6 private key on the Wallet Details tab?
Two reasons. First of all, this option requires that you roll the die 99 times, but you do not get meaningful additional protection by rolling more than 62 times. Why roll more times if you don't have to? Second, I use the "high entropy seed" method to generate multiple private keys from the same die rolls. Using the Base 6 option would require rolling 99 times for every private key.
I'm a big nerd with exotic dice. How many times to roll?
Put this formula in Excel to get the number of times to roll: "=160*LOG(2,f)" where f = number of faces on the die. For example, you would roll a d16 40 times. By the way, somewhat unbelievably casino dice are more fair than ordinary dice
The "Change address" problem:
You should understand change addresses because some people have accidentally lost money by not understanding it.
Imagine your paper wallet is a 10 dollar bill. You use it to buy a candy bar. To do this you give the cashier the entire 10 dollar bill. They keep 1 dollar and give you 9 dollars back as change.
With Bitcoin, you have to explicitly say that you want 9 dollars back, and you have to provide an address where it should go to. If you just hand over the 10 dollar bill, and don't say you want 9 dollars back, then the miner who processes the transaction gives 1 dollar to the store and keeps the remainder themselves.
Wallet software like Bitcoin-Qt handles this automatically for you. They automatically make "change addresses" and they automatically construct transactions that make the change go to the change address.
There are three ways I know of that the change problem can bite you:
  1. You generate a raw transaction by hand, and screw up. If you are generating a transaction "by hand" with a raw transaction editor, you need to be extra careful that your outputs add up to the same number as your inputs. Otherwise, the very lucky miner who puts your transaction in a block will keep the difference.
  2. You import a paper wallet into a wallet software and spend part of it, and then think that the change is in the paper wallet. The change is not in the paper wallet. It is in a change address that the wallet software generated. That means that if you lose your wallet.dat file you will lose all the change. The paper wallet is empty.
  3. You import a paper wallet into a wallet software and spend part of it, and then think that the change is in the change address that the wallet software generated. If the transaction did not need to consume all of the "outputs" used to fund the paper wallet, then there could be some unspent outputs still located at the address of the paper wallet. If you destroyed the paper wallet, and destroyed the copy of the private key imported to the wallet software, then you could not access this money. (E.g. if you restored the software wallet from its seed, thinking all of the money was moved to the wallet-generated change addresses.)
For more on this, see here
The hot paper wallet problem
Your bitcoin in your paper wallet are secure, so long as the piece of paper is secure, until you go to spend it. When you spend it, you put the private key onto a computer that is connected to the internet. At this point you must regard your paper wallet address as hot because the computer you used may have been compromised. It now provides much less protection against theft of your coins. If you need the level of protection that a cold paper wallet provides, you need to create a new one and send your coins to it.
Destroying your paper wallet address
Do not destroy the only copy of a private key without verifying that there is no money at that address. Your client may have sent change to your paper wallet address without you realizing it. Your client may have not consumed all of the unspent outputs available at the paper wallet address. You can go to blockchain.info and type the public address into the search window to see the current balance. I don't bother destroying my used/empty paper wallet addresses. I just file them away.
Encrypting your private key
BIP 0038 describes a standardized way to encrypt your paper wallet private key. A normal paper wallet is vulnerable because if anyone sees the private key they can take the coins. The BIP38 protocol is even resistant to brute force attacks because it uses a memory intensive encryption algorithm called scrypt. If you want to encrypt your wallets using BIP38, I recommend that you use bitcoinpaperwallet because they will let you type in your own private key and will encrypt it for you. As with bitaddress, for high security you should only use a local copy of this website on a computer that will never get connected to the internet.
Splitting your private key
Another option for protecting the private key is to convert it into multiple fragments that must be brought together. This method allows you to store pieces of your key with separate people in separate locations. It can be set up so that you can reconstitute the private key when you have any 2 out of the 3 fragments. This technique is called Shamir's Secret Sharing. I have not tried this technique, but you may find it valuable. You could try using this website http://passguardian.com/ which will help you split up a key. As before, you should do this on an offline computer. Keep in mind if you use this service that you are trusting it to work properly. It would be good to find other independently created tools that could be used to validate the operation of passguardian. Personally, I would be nervous destroying the only copy of a private key and relying entirely on the fragments generated by the website.
Looks like Bitaddress has an implementation of Shamir's Secret Sharing now under the "Split Wallet" tab. However it would appear that you cannot provide your own key for this, so you would have to trust bitaddress.
Durable Media
Pay attention to the media you use to record your paper wallet. Some kinds of ink fade, some kinds of paper disintegrate. Moisture and heat are your enemies.
In addition to keeping copies of my paper wallet addresses I did the following:
  1. Order a set of numeric metal stamps. ($10)
  2. Buy a square galvanized steel outlet cover from the hardware store ($1)
  3. Buy a sledgehammer from the hardware store
  4. Write the die rolls on the steel plate using a sharpie
  5. Use the hammer to stamp the metal. Do all the 1's, then all the 2's etc. Please use eye protection, as metal stamp may emit sparks or fly unexpectedly across the garage. :-)
  6. Use nail polish remover to erase the sharpie
Electrum
If you trust electrum you might try running it on an offline computer, and having it generate a series of private keys from a seed. I don't have experience with this software, but it sounds like there are some slick possibilities there that could save you time if you are working with a lot of addresses.
Message to the downvoters
I would appreciate it if you would comment, so that I can learn from your opinion. Thanks!
The Easy Method
This method is probably suitable for small quantities of bitcoin. I would not trust it for life-altering sums of money.
  1. Download the bitaddress.org website to your hard drive.
  2. Close your browser
  3. Disconnect from the internet
  4. Open the bitaddress.org website from your hard drive.
  5. Print a paper wallet on your printer
  6. Close your browser
submitted by moral_agent to BitcoinWallet [link] [comments]

Greg Maxwell /u/nullc (CTO of Blockstream) has sent me two private messages in response to my other post today (where I said "Chinese miners can only win big by following the market - not by following Core/Blockstream."). In response to his private messages, I am publicly posting my reply, here:

Note:
Greg Maxell nullc sent me 2 short private messages criticizing me today. For whatever reason, he seems to prefer messaging me privately these days, rather than responding publicly on these forums.
Without asking him for permission to publish his private messages, I do think it should be fine for me to respond to them publicly here - only quoting 3 phrases from them, namely: "340GB", "paid off", and "integrity" LOL.
There was nothing particularly new or revealing in his messages - just more of the same stuff we've all heard before. I have no idea why he prefers responding to me privately these days.
Everything below is written by me - I haven't tried to upload his 2 PMs to me, since he didn't give permission (and I didn't ask). The only stuff below from his 2 PMs is the 3 phrases already mentioned: "340GB", "paid off", and "integrity". The rest of this long wall of text is just my "open letter to Greg."
TL;DR: The code that maximally uses the available hardware and infrastructure will win - and there is nothing Core/Blockstream can do to stop that. Also, things like the Berlin Wall or the Soviet Union lasted for a lot longer than people expected - but, conversely, the also got swept away a lot faster than anyone expected. The "vote" for bigger blocks is an ongoing referendum - and Classic is running on 20-25% of the network (and can and will jump up to the needed 75% very fast, when investors demand it due to the inevitable "congestion crisis") - which must be a massive worry for Greg/Adam/Austin and their backers from the Bilderberg Group. The debate will inevitably be decided in favor of bigger blocks - simply because the market demands it, and the hardware / infrastructure supports it.
Hello Greg Maxwell nullc (CTO of Blockstream) -
Thank you for your private messages in response to my post.
I respect (most of) your work on Bitcoin, but I think you were wrong on several major points in your messages, and in your overall economic approach to Bitcoin - as I explain in greater detail below:
Correcting some inappropriate terminology you used
As everybody knows, Classic or Unlimited or Adaptive (all of which I did mention specifically in my post) do not support "340GB" blocks (which I did not mention in my post).
It is therefore a straw-man for you to claim that big-block supporters want "340GB" blocks. Craig Wright may want that - but nobody else supports his crazy posturing and ridiculous ideas.
You should know that what actual users / investors (and Satoshi) actually do want, is to let the market and the infrastructure decide on the size of actual blocks - which could be around 2 MB, or 4 MB, etc. - gradually growing in accordance with market needs and infrastructure capabilities (free from any arbitrary, artificial central planning and obstructionism on the part of Core/Blockstream, and its investors - many of whom have a vested interest in maintaining the current debt-backed fiat system).
You yourself (nullc) once said somewhere that bigger blocks would probably be fine - ie, they would not pose a decentralization risk. (I can't find the link now - maybe I'll have time to look for it later.) I found the link:
https://np.reddit.com/btc/comments/43mond/even_a_year_ago_i_said_i_though_we_could_probably/
I am also surprised that you now seem to be among those making unfounded insinuations that posters such as myself must somehow be "paid off" - as if intelligent observers and participants could not decide on their own, based on the empirical evidence, that bigger blocks are needed, when the network is obviously becoming congested and additional infrastructure is obviously available.
Random posters on Reddit might say and believe such conspiratorial nonsense - but I had always thought that you, given your intellectual abilities, would have been able to determine that people like me are able to arrive at supporting bigger blocks quite entirely on our own, based on two simple empirical facts, ie:
  • the infrastructure supports bigger blocks now;
  • the market needs bigger blocks now.
In the present case, I will simply assume that you might be having a bad day, for you to erroneously and groundlessly insinuate that I must be "paid off" in order to support bigger blocks.
Using Occam's Razor
The much simpler explanation is that bigger-block supporters believe will get "paid off" from bigger gains for their investment in Bitcoin.
Rational investors and users understand that bigger blocks are necessary, based on the apparent correlation (not necessarily causation!) between volume and price (as mentioned in my other post, and backed up with graphs).
And rational network capacity planners (a group which you should be in - but for some mysterious reason, you're not) also understand that bigger blocks are necessary, and quite feasible (and do not pose any undue "centralization risk".)
As I have been on the record for months publicly stating, I understand that bigger blocks are necessary based on the following two objective, rational reasons:
  • because I've seen the graphs; and
  • because I've seen the empirical research in the field (from guys like Gavin and Toomim) showing that the network infrastructure (primarily bandwidth and latency - but also RAM and CPU) would also support bigger blocks now (I believe they showed that 3-4MB blocks would definitely work fine on the network now - possibly even 8 MB - without causing undue centralization).
Bigger-block supporters are being objective; smaller-block supporters are not
I am surprised that you no longer talk about this debate in those kind of objective terms:
  • bandwidth, latency (including Great Firewall of China), RAM, CPU;
  • centralization risk
Those are really the only considerations which we should be discussing in this debate - because those are the only rational considerations which might justify the argument for keeping 1 MB.
And yet you, and Adam Back adam3us, and your company Blockstream (financed by the Bilderberg Group, which has significant overlap with central banks and the legacy, debt-based, violence-backed fiat money system that has been running and slowing destroying our world) never make such objective, technical arguments anymore.
And when you make unfounded conspiratorial, insulting insinuations saying people who disagree with you on the facts must somehow be "paid off", then you are now talking like some "nobody" on Reddit - making wild baseless accusations that people must be "paid off" to support bigger blocks, something I had always thought was "beneath" you.
Instead, Occams's Razor suggests that people who support bigger blocks are merely doing so out of:
  • simple, rational investment policy; and
  • simple, rational capacity planning.
At this point, the burden is on guys like you (nullc) to explain why you support a so-called scaling "roadmap" which is not aligned with:
  • simple, rational investment policy; and
  • simple, rational capacity planning
The burden is also on guys like you to show that you do not have a conflict of interest, due to Blockstream's highly-publicized connections (via insurance giant AXA - whose CED is also the Chairman of the Bilderberg Group; and companies such as the "Big 4" accounting firm PwC) to the global cartel of debt-based central banks with their infinite money-printing.
In a nutshell, the argument of big-block supporters is simple:
If the hardware / network infrastructure supports bigger blocks (and it does), and if the market demands it (and it does), then we certainly should use bigger blocks - now.
You have never provided a counter-argument to this simple, rational proposition - for the past few years.
If you have actual numbers or evidence or facts or even legitimate concerns (regarding "centralization risk" - presumably your only argument) then you should show such evidence.
But you never have. So we can only assume either incompetence or malfeasance on your part.
As I have also publicly and privately stated to you many times, with the utmost of sincerity: We do of course appreciate the wealth of stellar coding skills which you bring to Bitcoin's cryptographic and networking aspects.
But we do not appreciate the obstructionism and centralization which you also bring to Bitcoin's economic and scaling aspects.
Bitcoin is bigger than you.
The simple reality is this: If you can't / won't let Bitcoin grow naturally, then the market is going to eventually route around you, and billions (eventually trillions) of investor capital and user payments will naturally flow elsewhere.
So: You can either be the guy who wrote the software to provide simple and safe Bitcoin scaling (while maintaining "reasonable" decentralization) - or the guy who didn't.
The choice is yours.
The market, and history, don't really care about:
  • which "side" you (nullc) might be on, or
  • whether you yourself might have been "paid off" (or under a non-disclosure agreement written perhaps by some investors associated the Bilderberg Group and the legacy debt-based fiat money system which they support), or
  • whether or not you might be clueless about economics.
Crypto and/or Bitcoin will move on - with or without you and your obstructionism.
Bigger-block supporters, including myself, are impartial
By the way, my two recent posts this past week on the Craig Wright extravaganza...
...should have given you some indication that I am being impartial and objective, and I do have "integrity" (and I am not "paid off" by anybody, as you so insultingly insinuated).
In other words, much like the market and investors, I don't care who provides bigger blocks - whether it would be Core/Blockstream, or Bitcoin Classic, or (the perhaps confusingly-named) "Bitcoin Unlimited" (which isn't necessarily about some kind of "unlimited" blocksize, but rather simply about liberating users and miners from being "limited" by controls imposed by any centralized group of developers, such as Core/Blockstream and the Bilderbergers who fund you).
So, it should be clear by now I don't care one way or the other about Gavin personally - or about you, or about any other coders.
I care about code, and arguments - regardless of who is providing such things - eg:
  • When Gavin didn't demand crypto proof from Craig, and you said you would have: I publicly criticized Gavin - and I supported you.
  • When you continue to impose needless obstactles to bigger blocks, then I continue to criticize you.
In other words, as we all know, it's not about the people.
It's about the code - and what the market wants, and what the infrastructure will bear.
You of all people should know that that's how these things should be decided.
Fortunately, we can take what we need, and throw away the rest.
Your crypto/networking expertise is appreciated; your dictating of economic parameters is not.
As I have also repeatedly stated in the past, I pretty much support everything coming from you, nullc:
  • your crypto and networking and game-theoretical expertise,
  • your extremely important work on Confidential Transactions / homomorphic encryption.
  • your desire to keep Bitcoin decentralized.
And I (and the network, and the market/investors) will always thank you profusely and quite sincerely for these massive contributions which you make.
But open-source code is (fortunately) à la carte. It's mix-and-match. We can use your crypto and networking code (which is great) - and we can reject your cripple-code (artificially small 1 MB blocks), throwing it where it belongs: in the garbage heap of history.
So I hope you see that I am being rational and objective about what I support (the code) - and that I am also always neutral and impartial regarding who may (or may not) provide it.
And by the way: Bitcoin is actually not as complicated as certain people make it out to be.
This is another point which might be lost on certain people, including:
And that point is this:
The crypto code behind Bitcoin actually is very simple.
And the networking code behind Bitcoin is actually also fairly simple as well.
Right now you may be feeling rather important and special, because you're part of the first wave of development of cryptocurrencies.
But if the cryptocurrency which you're coding (Core/Blockstream's version of Bitcoin, as funded by the Bilderberg Group) fails to deliver what investors want, then investors will dump you so fast your head will spin.
Investors care about money, not code.
So bigger blocks will eventually, inevitably come - simply because the market demand is there, and the infrastructure capacity is there.
It might be nice if bigger blocks would come from Core/Blockstream.
But who knows - it might actually be nicer (in terms of anti-fragility and decentralization of development) if bigger blocks were to come from someone other than Core/Blockstream.
So I'm really not begging you - I'm warning you, for your own benefit (your reputation and place in history), that:
Either way, we are going to get bigger blocks.
Simply because the market wants them, and the hardware / infrastructre can provide them.
And there is nothing you can do to stop us.
So the market will inevitably adopt bigger blocks either with or without you guys - given that the crypto and networking tech behind Bitcoin is not all that complex, and it's open-source, and there is massive pent-up investor demand for cryptocurrency - to the tune of multiple billions (or eventually trillions) of dollars.
It ain't over till the fat lady sings.
Regarding the "success" which certain small-block supports are (prematurely) gloating about, during this time when a hard-fork has not happened yet: they should bear in mind that the market has only begun to speak.
And the first thing it did when it spoke was to dump about 20-25% of Core/Blockstream nodes in a matter of weeks. (And the next thing it did was Gemini added Ethereum trading.)
So a sizable percentage of nodes are already using Classic. Despite desperate, irrelevant attempts of certain posters on these forums to "spin" the current situation as a "win" for Core - it is actually a major "fail" for Core.
Because if Core/Blocksteam were not "blocking" Bitcoin's natural, organic growth with that crappy little line of temporary anti-spam kludge-code which you and your minions have refused to delete despite Satoshi explicitly telling you to back in 2010 ("MAX_BLOCKSIZE = 1000000"), then there would be something close to 0% nodes running Classic - not 25% (and many more addable at the drop of a hat).
This vote is ongoing.
This "voting" is not like a normal vote in a national election, which is over in one day.
Unfortunately for Core/Blockstream, the "voting" for Classic and against Core is actually two-year-long referendum.
It is still ongoing, and it can rapidly swing in favor of Classic at any time between now and Classic's install-by date (around January 1, 2018 I believe) - at any point when the market decides that it needs and wants bigger blocks (ie, due to a congestion crisis).
You know this, Adam Back knows this, Austin Hill knows this, and some of your brainwashed supporters on censored forums probably know this too.
This is probably the main reason why you're all so freaked out and feel the need to even respond to us unwashed bigger-block supporters, instead of simply ignoring us.
This is probably the main reason why Adam Back feels the need to keep flying around the world, holding meetings with miners, making PowerPoint presentations in English and Chinese, and possibly also making secret deals behind the scenes.
This is also why Theymos feels the need to censor.
And this is perhaps also why your brainwashed supporters from censored forums feel the need to constantly make their juvenile, content-free, drive-by comments (and perhaps also why you evidently feel the need to privately message me your own comments now).
Because, once again, for the umpteenth time in years, you've seen that we are not going away.
Every day you get another worrisome, painful reminder from us that Classic is still running on 25% of "your" network.
And everyday get another worrisome, painful reminder that Classic could easily jump to 75% in a matter of days - as soon as investors see their $7 billion wealth starting to evaporate when the network goes into a congestion crisis due to your obstructionism and insistence on artificially small 1 MB blocks.
If your code were good enough to stand on its own, then all of Core's globetrotting and campaigning and censorship would be necessary.
But you know, and everyone else knows, that your cripple-code does not include simple and safe scaling - and the competing code (Classic, Unlimited) does.
So your code cannot stand on its own - and that's why you and your supporters feel that it's necessary to keep up the censorship and and the lies and the snark. It's shameful that a smart coder like you would be involved with such tactics.
Oppressive regimes always last longer than everyone expects - but they also also collapse faster than anyone expects.
We already have interesting historical precedents showing how grassroots resistance to centralized oppression and obstructionism tends to work out in the end. The phenomenon is two-fold:
  • The oppression usually drags on much longer than anyone expects; and
  • The liberation usually happens quite abruptly - much faster than anyone expects.
The Berlin Wall stayed up much longer than everyone expected - but it also came tumbling down much faster than everyone expected.
Examples of opporessive regimes that held on surprisingly long, and collapsed surpisingly fast, are rather common - eg, the collapse of the Berlin Wall, or the collapse of the Soviet Union.
(Both examples are actually quite germane to the case of Blockstream/Core/Theymos - as those despotic regimes were also held together by the fragile chewing gum and paper clips of denialism and censorship, and the brainwashed but ultimately complacent and fragile yes-men that inevitably arise in such an environment.)
The Berlin Wall did indeed seem like it would never come down. But the grassroots resistance against it was always there, in the wings, chipping away at the oppression, trying to break free.
And then when it did come down, it happened in a matter of days - much faster than anyone had expected.
That's generally how these things tend to go:
  • oppression and obstructionism drag on forever, and the people oppressing freedom and progress erroneously believe that Core/Blockstream is "winning" (in this case: Blockstream/Core and you and Adam and Austin - and the clueless yes-men on censored forums like r\bitcoin who mindlessly support you, and the obedient Chinese miners who, thus far, have apparently been to polite to oppose you) ;
  • then one fine day, the market (or society) mysteriously and abruptly decides one day that "enough is enough" - and the tsunami comes in and washes the oppressors away in the blink of an eye.
So all these non-entities with their drive-by comments on these threads and their premature gloating and triumphalism are irrelevant in the long term.
The only thing that really matters is investors and users - who are continually applying grassroots pressure on the network, demanding increased capacity to keep the transactions flowing (and the price rising).
And then one day: the Berlin Wall comes tumbling down - or in the case of Bitcoin: a bunch of mining pools have to switch to Classic, and they will do switch so fast it will make your head spin.
Because there will be an emergency congestion crisis where the network is causing the price to crash and threatening to destroy $7 billion in investor wealth.
So it is understandable that your supports might sometimes prematurely gloat, or you might feel the need to try to comment publicly or privately, or Adam might feel the need to jet around the world.
Because a large chunk of people have rejected your code.
And because many more can and will - and they'll do in the blink of an eye.
Classic is still out there, "waiting in the wings", ready to be installed, whenever the investors tell the miners that it is needed.
Fortunately for big-block supporters, in this "election", the polls don't stay open for just one day, like in national elections.
The voting for Classic is on-going - it runs for two years. It is happening now, and it will continue to happen until around January 1, 2018 (which is when Classic-as-an-option has been set to officially "expire").
To make a weird comparison with American presidential politics: It's kinda like if either Hillary or Trump were already in office - but meanwhile there was also an ongoing election (where people could change their votes as often as they want), and the day when people got fed up with the incompetent incumbent, they can throw them out (and install someone like Bernie instead) in the blink of an eye.
So while the inertia does favor the incumbent (because people are lazy: it takes them a while to become informed, or fed up, or panicked), this kind of long-running, basically never-ending election favors the insurgent (because once the incumbent visibly screws up, the insurgent gets adopted - permanently).
Everyone knows that Satoshi explicitly defined Bitcoin to be a voting system, in and of itself. Not only does the network vote on which valid block to append next to the chain - the network also votes on the very definition of what a "valid block" is.
Go ahead and re-read the anonymous PDF that was recently posted on the subject of how you are dangerously centralizing Bitcoin by trying to prevent any votes from taking place:
https://np.reddit.com/btc/comments/4hxlquhoh_a_warning_regarding_the_onset_of_centralised/
The insurgent (Classic, Unlimited) is right (they maximally use available bandwidth) - while the incumbent (Core) is wrong (it needlessly throws bandwidth out the window, choking the network, suppressing volume, and hurting the price).
And you, and Adam, and Austin Hill - and your funders from the Bilderberg Group - must be freaking out that there is no way you can get rid of Classic (due to the open-source nature of cryptocurrency and Bitcoin).
Cripple-code will always be rejected by the network.
Classic is already running on about 20%-25% of nodes, and there is nothing you can do to stop it - except commenting on these threads, or having guys like Adam flying around the world doing PowerPoints, etc.
Everything you do is irrelevant when compared against billions of dollars in current wealth (and possibly trillions more down the road) which needs and wants and will get bigger blocks.
You guys no longer even make technical arguments against bigger blocks - because there are none: Classic's codebase is 99% the same as Core, except with bigger blocks.
So when we do finally get bigger blocks, we will get them very, very fast: because it only takes a few hours to upgrade the software to keep all the good crypto and networking code that Core/Blockstream wrote - while tossing that single line of 1 MB "max blocksize" cripple-code from Core/Blockstream into the dustbin of history - just like people did with the Berlin Wall.
submitted by ydtm to btc [link] [comments]

How to redeem bitcoin from a physical coin by Casascius - English Receiving Bitcoin - Armory Guide Bitcoin Armory Walk Through Bitcoin Armory Troubleshooting Offline Node Setting up cold storage in Armory on Ubuntu 14.04

See the next section for more info. If you don't have a verified copy of Armory yet, you should follow these instructions to verify the first Armory installer you download via GPG. Armory is used by some of the most heavily-invested, and most paranoid Bitcoin enthusiasts and cloud miners for maximum privacy and security. If you are in this Import Armory Wallet Into Bitcoin Core. I ask because I'm an Armory developer. Armory is the most secure and full featured solution available for ..Have your Bitcoins always with you, in your pocket! For Blockchaininfo's newer wallets based on a recovery phrase . Setup, Import, Restore and Delete.Download Armory – Best Bitcoin Wallet Armory If you wish to import other wallets into the Armory, simply click “Wallets” tab at the top of the dashboard page and then “Import or Restore Wallet”. In the next window, you will have several choices available for you to either import new wallet or to restore using printed recovery page you created earlier. My intention was to import or sweep the generated wallet into Armory (or possibly Bitcoin Core). [Warning: Newbie alert!] The first thing I realized was the public and private keys that the ATM generated for me were in WIF format, and Armory seems to only want hex keys. So I discovered pycoin and used ku.py to convert WIF to a hex secret exponent. NOTE. On 3 FEB 2016, Armory project transitioned from etotheipi to goatpig as the lead maintainer.Consequently, for latest news and release please see btcarmory.com or the Bitcoin Talk discussion thread. BEST BITCOIN WALLET. Armory is the most secure and full featured solution available for users and institutions to generate and store Bitcoin private keys.

[index] [5607] [19905] [27841] [1586] [16225] [15833] [24959] [4973] [13366] [2191]

How to redeem bitcoin from a physical coin by Casascius - English

- How to transfer bitcoin TO an offline wallet. - And how to transfer bitcoin FROM an offline wallet. Prerequisites: - PC with an internet connection, running Ubuntu and Armory (see my other ... Sweeping Importing - Duration: ... Armory 15,392 views. 5:13. How to Download and Verify the Armory Bitcoin Wallet - Duration: 22:31 ... Alan Reiner from Bitcoin Armory discussing mulit-sig ... Watch me walk you through getting your Armory and Bitcoin Core working in sync again. ... Sweeping Importing - Duration: 5:13. Armory 15,432 ... DIY Hardware Wallet for Bitcoin - Duration: 1:35. How to Import & Use Paper Wallets for Beginners - Duration: ... How to make an offline bitcoin wallet using Armory - Duration: 14:55. TheMetaTainment 38,164 views. 14:55. Language: ... Andreas Antonopoulos on Bitcoin Wallet Encryption - Duration: ... How to make an offline bitcoin wallet using Armory - Duration: ... Sweeping Importing - Duration: 5:13.

Flag Counter