If my compromised machine is used to steal my bch then would not the bch block explorer be able show us exactly when my funds are stolen? And to where??? That alone would be interesting..
Obviously? That is most often not useful though.
3 imported old now empty multibitHD seed into electrum cash
4 I tried both BIP39 and BIP145 with BIP39
5 ..using both m'/44'/0'/0'/ & m'/145'/0'/0'/ (not sure which is correct)
There's your mistake. If the seed implementation isn't compatible, or you specify the wrong derivation path, you will get completely different addresses. Here is the solution that you're looking for:
Or you have to manually or otherwise extract the private keys from your MultiBit HD wallet/seed...
Automated (but technical) method requiring use of python scripts:
https://github.com/HardCorePawn/multibit_recoveryManual method:
- Create offline version of
https://iancoleman.github.io/bip39/- Put in your MultiBit HD seed
- Set Derivation Path -> BIP32
- Set Client = "MultiBit HD"
- Copy all the address/private keys (click show more until you are sure you have more than all the addresses you ever used)
- Set Client = "Custom" -> Set Derivation Path = m/0'/1
- Copy all the change addresses/private keys (click show more until you are sure you have more than all the addresses you ever used)
Once you have all your private keys:
- In Electrum -> New/Restore -> Standard Wallet -> Create a new seed
- Once wallet is created, "Wallet -> Private Keys -> Sweep"
- Paste in all the private keys you got from automated or manual method
You should now have all your coins in an Electrum HD Wallet.
as a last resort I can go back into multibitHD and modify it to dump the keys if the empty old private keys will work to open bch?
Yes, you can dump priv keys and import into Bitcoin ABC. Opening multibitHD is no longer needed, you can use a tool (as described above).