Post
Topic
Board Development & Technical Discussion
Re: Bitcoin Core wallet crpyt by truecrypt and los pass
by
Cricktor
on 21/01/2024, 22:11:00 UTC
Address 1L8SqDEvaA3WnDinobai21ZbnyC79XuJGn has a current balance of 2.11752132 BTC and last outgoing transactions where UTXOs of this address were spent were in
2021-03-03: tx bdc3bc54a358301552c03eecb5c6994bc13066284f795211a2db6497f5692cd7
2021-01-09: tx d27a036c3d1acd27f7b57b3c3bc0e85cff1b03714e1b8b03274f161badac38c4

So in the first months of 2021 the owner of UTXOs of this address apparently had access to this address' private key and the other involved inputs in above transactions.


Quote from: adam tomas
Yes, the file is mine. If it was not mine, how could I know the general wallet address?

I'm not convinced because a Bitcoin Core wallet uses a lot of keys and public addresses, not just a single one. And naming a public address with a suitable balance isn't hard at all.

Your passphrase hints for the Truecrypt container are rather insufficient. My question would be: why didn't you document such an important secret?

As n0nce points out, having the hashes isn't quite enough. An attack to crack the Truecrypt container passphrase would also need details how Truecrypt processes the passphrase to get to hash digests. Well, likely hashcat or similar tools know how to deal with cracking Truecrypt containers.

And then if someone manages to crack the Truecrypt passphrase: what about the contained wallet.dat file. Is this protected by a passphrase, too? Is the Bitcoin Core wallet.dat passphrase known?