Search content
Sort by

Showing 20 of 253 results by Sanglotslongs2
Post
Topic
Board Development & Technical Discussion
Merits 11 from 4 users
Topic OP
Bitcoin fun facts
by
Sanglotslongs2
on 29/09/2021, 18:56:06 UTC
⭐ Merited by DdmrDdmr (6) ,n0nce (3) ,Hydrogen (1) ,Cyrus (1)
Hello, if you have fun facts about Bitcoin that can be see with a Bitcoin explorer, please share it ! Here fun facts I know with source :



Largest transaction in bitcoin : 500,000.00 BTC sent in 2011 !
https://www.blockchain.com/btc/tx/29a3efd3ef04f9153d47a990bd7b048a4b2d213daaa5fb8ed670fb85f13bdbcf



XCP burn address ! I think it's the first time dev made an altcoin and asked investor to BURN their BTC ! Proof-of-burn was born.
https://www.blockchain.com/btc/address/1CounterpartyXXXXXXXXXXXXXXXUWLpVr



Block 478558 was the last block Bitcoin and BitcoinCash had in common, so block #478559 are different :
https://blockchair.com/bitcoin-cash/block/478559
https://blockchair.com/bitcoin/block/478559



Just after BTC big fork, a miner wrote "FUCK BITCOIN CASH" on a block :
https://blockchair.com/bitcoin-cash/block/478617



The infamous Mark Karpeles made a bugged php script and sent 2 609 BTC to broken address. As you can see below, one of these address start with "s-" but regular bitcoin address start with "1","3" or "bc1" :
https://blockchair.com/bitcoin/address/s-272edf45031dd498e7b3ae89e11ff21b
(more info here)



Someone wrote the bitcoin whitepaper in this bitcoin transaction. As you can see, address are unusual, start with "m-" !
https://blockchair.com/bitcoin/transaction/54e48e5f5c656b26c3bca14a8c95aa583d07ebe84dde3b7dd4a78f4e4186e713



You can write message inside bitcoin blockchain. And someone wrote the hash of a famous virus. So if you were a bitcoin node back then, for a time, all antivirus was detecting your blockchain as a virus and deleted all your files ! Making you downloading again. I don't know more details, just citing out of my memory !



First bitcoin transaction (excepte for coinbase that are block reward) at block #170 :
https://blockchair.com/bitcoin/transaction/f4184fc596403b9d638783cf57adfe4c75c605f6356fbc91338530e9831e9e16



Bitcoin address with the lowest hash 160 possible and 280 BTC burned to it (more info) :
https://www.blockchain.com/btc/address/1111111111111111111114oLvT2

Post
Topic
Board Development & Technical Discussion
Re: Extracting Privat Key from PEM File
by
Sanglotslongs2
on 15/01/2021, 22:32:20 UTC

-----BEGIN PRIVATE KEY-----
MIH1MIGuBgcqhkjOPQIBMIGiAgEBMCwGByqGSM49AQECIQD/////////////////
///////////////////+///8LzAGBAEABAEHBEEEeb5mfvncu6xVoGKVzocLBwKb
/NstzijZWfKBWxb4F5hIOtp3JqPEZV2k+/wOEQio/Re0SKaFVBmcR9CP+xDUuAIh
AP////////////////////66rtzmr0igO7/SXozQNkFBAgEBA0IABJJ6TBhmiWm4
Y1ACBVJVn0oyG9Ay5IzEZq8cPyrs1PERl963YQh5UrGOT0NodynfHswkz8bUpaJW
FsowR/l9wXc=
-----END PRIVATE KEY-----



From the old topic it's a PUBLIC key not a PRIVATE key. Why did you change it?
Post
Topic
Board Development & Technical Discussion
Re: Is this how a single Bitcoin data looks like?
by
Sanglotslongs2
on 09/01/2021, 19:08:52 UTC
Fantastic website for technical explanations :

https://learnmeabitcoin.com/technical/
Post
Topic
Board Development & Technical Discussion
Re: Sending old blocks as compressed by default
by
Sanglotslongs2
on 26/12/2020, 23:18:15 UTC
I think the "full node" philosophy is to have all data uncompressed to be fully available. I don't know how it works specifically but maybe they need to check every inputs/outputs to broadcast transaction ?

Some altcoin are doing pruning or "light nodes" but I don't think it's very good for decentralisation.

And compressed data = less cold storage space, but more processor work when you want to access old data. So less data for more computing, and data are cheap...
Post
Topic
Board Development & Technical Discussion
Re: Offline signing your paper wallet using air gapped phone via Electrum
by
Sanglotslongs2
on 26/12/2020, 21:01:15 UTC
Nice setup ! As phones are cheaper and cheaper, they are a lot of useless phone, this give them a second life !
But be carefull with the antenna, must be removed to be sure.

Also, QR code transfert are really good, because there is few information, so you will be 100% sure it's legit way to communicate between devices. If you use USB on a computer there is a lot more "memory" available so a virus can possibily steal your coins... QR code tfw Smiley
Post
Topic
Board Development & Technical Discussion
Re: PBKDF2 iterations questions (seed to private key)
by
Sanglotslongs2
on 22/12/2020, 18:21:56 UTC
5) if you are following the BIP39 (that is to have the option to extend the mnemonic with a passphrase) you can't use simple SHA256 and have to use a KDF or even an HMAC function.
but i think the important thing is still to have a strong random initial entropy that creates the mnemonic.



This "passphrase" is (I guess) "custom word" in electrum and "BIP39 Passphrase (optional)" in https://iancoleman.io/bip39/ ?


Just before generating address with derivation pass with https://iancoleman.io/bip39/ :
Quote
Encrypt private keys using BIP38 and this password: [___________] Enabling BIP38 means each key will take several minutes to generate.


This is an equivalent for PBKDF2 iterations ?
Post
Topic
Board Development & Technical Discussion
Merits 2 from 1 user
Topic OP
PBKDF2 iterations questions (seed to private key)
by
Sanglotslongs2
on 22/12/2020, 17:45:31 UTC
⭐ Merited by NotATether (2)
Hello,

When we have a valid entropy from mnemonic seed, we need to transform it to a valid seed.
To do it we use PBKDF2 - Password Based Key Derivation Function 2.

https://learnmeabitcoin.com/technical/mnemonic
 
Quote
PBKDF2 Settings:

Password: Mnemonic Sentence
Salt: "mnemonic"+(optional passphrase)
Iterations: 2048
Algorithm: HMAC-SHA512
Size: 64 bytes

1) If I do more iterations, I will have another valid seed ?

2) For example, if I decide to do 2048+1 PBKDF2 iterations, an attack against "standart wallet with 2048 iterations" will not be effective event if attacker have my mnemonic seed ?

3) If I want an off-standard seed, I can do like 2048x16 = 32k iterations, my wallet will be longer to set up but it's juste few minutes more, I will gain more resilience against brute force attack event if my mnemonic seed is leaked ?

4) I read severals iterations advice, 1024, 2048 or 4096, those advices change with time as computer become more and more powerful. So I can have several differents private key/address results if I use differents software version etc. ?

5) There is 2048^12 mnemonic possibility, is it enough to not care for PBKDF2 validity and just SHA-256 my mnemonic phrase to have a valid seed ? (discusion here : https://security.stackexchange.com/questions/16354/...)
Post
Topic
Board Development & Technical Discussion
Re: BIP39 how software found the checksum?
by
Sanglotslongs2
on 21/12/2020, 00:54:47 UTC
Thank you for your answers ! It's OK for me now.
Post
Topic
Board Development & Technical Discussion
Re: BIP39 Calculate checksum
by
Sanglotslongs2
on 17/12/2020, 00:31:15 UTC

You already have 11 words: possible wage deliver gossip first party hair antique salute fuel survey miracle, the 12th word is a combination of 1000110 and  a 4 bit checksum. [...]



This 1000110 is what I'm looking for.

How to calculate from 11 random words? or 12 random words ?


What I'm understanding, is that the 12th word can't be predicted from the 11 first words. I need to choose a random 12th words, cumpute something, getting the checksum and chose the words that validate my seed ?
Post
Topic
Board Development & Technical Discussion
Re: BIP39 how software found the checksum?
by
Sanglotslongs2
on 16/12/2020, 23:36:53 UTC

Convert it to a buffer or something, calculate the length (16), multiply by 8, we get 128.


Can you detail this step please? Thank you for your time.
Post
Topic
Board Development & Technical Discussion
Merits 9 from 5 users
Topic OP
BIP39 Calculate checksum
by
Sanglotslongs2
on 16/12/2020, 22:34:31 UTC
⭐ Merited by LoyceV (4) ,o_e_l_e_o (2) ,Heisenberg_Hunter (1) ,ETFbitcoin (1) ,vapourminer (1)
Hello,

I want to calculete checksum for a BIP 39 seed by hand. All my 11 first word are generated by Dice, but for the last word I need to do a checksum (no worry just a fake seed)


I have this 11 words :

Word          n°List       N°list in binary
possible      1348      10101000100
wage         1969      11110110001
deliver         464         00111010000
gossip         807         01100100111
first         699         01010111011
party         1284      10100000100
hair         834         01101000010
antique         79         00001001111
salute         1526      10111110110
fuel         751         01011101111
survey         1749      11011010101
miracle         1131         10001101011   <==== I Need to find Him


Here the entropy for my 11 words :
1010100010011110110001001110100000110010011101010111011101000001000110100001000 001001111101111101100101110111111011010101
Here the correct 12words entropy :
1010100010011110110001001110100000110010011101010111011101000001000110100001000 0010011111011111011001011101111110110101011000110
Checksum that I must found:
1011



So my final seed must be :
1010100010011110110001001110100000110010011101010111011101000001000110100001000 00100111110111110110010111011111101101010110001101011

So the last 11bits "10001101011" are in decimal "1131" corresponding here to "miracle"

If understand this https://learnmeabitcoin.com/technical/mnemonic page :
"This checksum is created by hashing the entropy through SHA256, which gives us a unique fingerprint for our entropy. We then take 1 bit of that hash for every 32 bits of entropy, and add it to the end of our entropy."


So I have my 11 words entropy :
1010100010011110110001001110100000110010011101010111011101000001000110100001000 001001111101111101100101110111111011010101
I hash it to SHA-256 with hex result :
4C3FA7A784B345C6BA9ECA9FCFEEAF36E9BE00D0A2406B88DB61F609137B8F68
Convert it to binary :
1001100001111111010011110100111100001001011001101000101110001101011101010011110 1100101010011111110011111110111010101111001101101110100110111110000000001101000 0101000100100000001101011100010001101101101100001111101100000100100010011011110 111000111101101000

Where do I find "10001101011" ?

Is it possible to predict the checksum with my 11 words ? Or do I need to bruteforce ?

Post
Topic
Board Development & Technical Discussion
Re: Privacy with sending BTC from differents addresses but same wallet
by
Sanglotslongs2
on 07/12/2020, 19:49:03 UTC
Is there a way to detect that this 2 different transactions was in fact, from the same wallet ?
If you make a single transaction including the bitcoin from both addresses, then that is a fairly strong indication that both addresses are part of the same wallet.

If you make two separate transactions, one from each address, then the answer is more complicated. If both transactions are to the same deposit address, and that address can easily be identified as belonging to an exchange, then that is a fairly strong indication that the same person controls both addresses, although not necessarily they are part of the same wallet. Even if the exchange allows you to generate a new deposit address for your two transactions, then obviously they will still know that you own both addresses, and may or may not share that information with other parties.

Further, you need to be careful about future use. You should obviously never use those two addresses again. If you leave change over from either of the transactions, then you have to be careful not to link that change to the other address as well in any future transactions.

All of this is based on blockchain evidence only, but there are other things you need to consider too. Since you said you are running Electrum, you will connect to a node to update your balances and broadcast transactions. That node will see requests for the balance of those two addresses and your two transactions being broadcast all from the same IP, and so could be relatively certain they are part of the same wallet.

Yes. The solution is to generate multiple addresses on the exchange.
And for IP I need a VPN and I'm think I'm good for it ! It will be enough caution for me Smiley
Post
Topic
Board Development & Technical Discussion
Re: Privacy with sending BTC from differents addresses but same wallet
by
Sanglotslongs2
on 07/12/2020, 16:22:50 UTC
Thanks for your answer ! Your link is very usefull to understand how a seed works.
Post
Topic
Board Development & Technical Discussion
Merits 4 from 3 users
Topic OP
Privacy
by
Sanglotslongs2
on 07/12/2020, 15:39:42 UTC
⭐ Merited by o_e_l_e_o (2) ,ETFbitcoin (1) ,Heisenberg_Hunter (1)
Hello,

I have some questions about privacy and public keys.

Wallet_2 is generated with electrum software (new seed).

I have 0.01BTC in address "mzx" derivated from wallet_2.
I have also 0.01BTC in another address "mp8" derivated from wallet_2.


Wallet_2 have 0.02BTC in 2 differents addresses "mzx" and "mp8".


If I send all my BTC from wallet_2 to an exchange, using 2 independants transactions like this (feature in electrum wallet I can spend fund AND fees from only selected addresses) :

0.01 BTCfrom "mzx" to EXCHANGE "mu12".
0.01BTC from "mp8" to EXCHANGE "mu12".


Here a blockchain TESTNET link to illustrate the final transaction :
https://www.blockchain.com/fr/btc-testnet/address/mu12smFUGRdfUNpCCrS1eg6i4ifJyE76JT


Is there a way to detect that this 2 different transactions was in fact, from the same wallet ? I'm concern about privacy but I want to be sure. I know that electrum generate a determinisc master-key and I just want to know if it's effective in this case to protect my privacy. Also I can use multiple exchange addresses.
Post
Topic
Board Development & Technical Discussion
Re: Entropy, how to calculate it from series of outcome
by
Sanglotslongs2
on 25/10/2018, 17:38:24 UTC
I want to generate my own private key with dice and/or other very entropic phenomenon.
Bitcoin blockchain itself is a great source of entropy. Last digit of each block is itself random. There is a dedicated thread discussing this phenomenon - https://bitcointalk.org/index.php?topic=1493510.0

Yes but since it's public and a lot of people know bitcoin is it secure to use it ? Some hacker can "datamining" the hash of each blocks to steal cryptos. The same way they did datamining on brain wallet, a lot of people wich passphrase was a poem get hacked because the passphrase was hashed to a private key so hacker can attack all brain wallet in the same time (it's different from a bruteforce because bruteforce is agains a sample of encrypted data).
Post
Topic
Board Development & Technical Discussion
Re: Entropy, how to calculate it from series of outcome
by
Sanglotslongs2
on 24/10/2018, 19:57:26 UTC
Thanks for your replies.

I wish to generate with dice my private key because I don't know if there is a risk to to not have a good random number if I run the prog on CPU. Is there documentation where they compare CPU random number ? If AMD / Intel / Broadcom have their specs. Because it's not only a software problem, I guess that true random number are also hardware dependant.
Post
Topic
Board Development & Technical Discussion
Re: Entropy, how to calculate it from series of outcome
by
Sanglotslongs2
on 21/10/2018, 17:04:11 UTC
Dice rolls are never random.

If you knew all necessary information (exact surface conditions, air resistance, rotating speed, ..) you could predict each roll with your dice. That's far away from being 'truly random'.
I know but all this variables can be good enough to generate a private key.



No need to waste your time. The human brain is less than '1/10 random' as an PRNG.

Do you have a source for this ? I would like to read more about it  Cool

If you want to create the private key yourself (without any wallet), i'd suggest to boot up a live linux, let it run a few minutes, open and close random programs, and then use /dev/urandom to generate a private key:

Code:
openssl ecparam -genkey -name secp256k1 -rand /dev/urandom


I know that "randomness" is calculated from a lot of variables (memory usage in your message) is this process open ? Can we know what the variables are ? I know that INTEL'S CPU do it in a black box but it must be open process too. Thanks.
Post
Topic
Board Development & Technical Discussion
Merits 2 from 1 user
Entropy, how to calculate it from series of outcome
by
Sanglotslongs2
on 21/10/2018, 07:21:24 UTC
⭐ Merited by dbshck (2)
Hello,

I want to generate my own private key with dice and/or other very entropic phenomenon. But how can I calculate if my data have a good entropy ? I mean if I throw dice in a certain way too much time maybe my outcome will not be trully random, maybe my dice is not a very good dice and have imperfection etc.

So can I just throw it 300+ and if I don't have 0.166666% each result (1,2,3,4,5,6) it's not good ?

Also I want to write my own series of dice result just to compare how deficient is my brain when I try to generate true randomness.

Thanks
Post
Topic
Board Hors-sujet
Comedy gold
by
Sanglotslongs2
on 27/03/2018, 20:40:38 UTC

Je crois que le co-admin a répondu à sa question  Grin Grin Grin
Post
Topic
Board Discussions générales et utilisation du Bitcoin
Re: Le Bitcoin restera-t-il la principale cryptomonnaie ?
by
Sanglotslongs2
on 27/03/2018, 20:31:23 UTC
L'inertie d'adoption est très importante. Je l'ai déjà mentionné sur ce forum, mais regardez la tronche de nos claviers... Ils ont été designé pour nous ralentir quand on écrit. Pourtant il y a plein de clavier qui sont optimisé pour les langues avec par exemple les lettres les plus fréquentes sur la même ligne etc. Et pourant on utilise majoritairement AZERTY qui est une variante bricolé de QWERTY. Donc même si BTC n'est pas parfait il se peut qu'il garde sa première place encore longtemps. Même si son concurrent le plus sérieux reste ETH, on a vu que son réseau a aussi des problèmes de saturations.