Search content
Sort by

Showing 19 of 19 results by jackjjohnson
Post
Topic
Board Electrum
Re: Electrum 4.3.2 Lost Funds
by
jackjjohnson
on 02/11/2022, 18:36:35 UTC
No, I don't believe 1PguUmsPEeR6UzheDbVMH1avsew4qCjFsa is one of my addresses in that wallet.
Post
Topic
Board Electrum
Re: Electrum 4.3.2 Lost Funds
by
jackjjohnson
on 02/11/2022, 18:03:50 UTC
The wallet was stored on Pcloud, but it had a 25 character, non-dictionary password.
Post
Topic
Board Electrum
Re: Electrum 4.3.2 Lost Funds
by
jackjjohnson
on 02/11/2022, 17:02:05 UTC
Thanks for the response. I did use 'sweep' to get the paper wallet into Electrum wallet, then used from there for months.  When I said I had restored from seed, that was the Electrum wallet, that had successfully held the funds as needed for a long time.
Post
Topic
Board Electrum
Topic OP
Electrum 4.3.2 Lost Funds
by
jackjjohnson
on 02/11/2022, 16:43:12 UTC
I seem to have lost funds on my Electrum wallet. I keep most of my BTC in offline paper wallets. I import to an Electrum wallet as needed, to send to Coinbase, pay bills as needed, etc. My security practices could be considered extreme, to many people. There are 40 normal transactions on this wallet. I restored from seed, same issue.

On 2022-10-29 15:03 about $300 balance seemed to disappear from Electrum 4.3.2 wallet
The wallet's last transaction was 2022-10-09 made by myself.
The OS is latest Ubuntu Long Term Support, updated several times a week.
Never install bootleg, illegal or questionable programs/packages.
The OS install itself is on encrypted drives, with very long passwords.
Electrum is run directly from Python sources, without installing: python3 Electrum-4.3.2/run_electrum
The Electrum executable matches ThomasV's GPG signature.
Electrum's network connection is being proxied on TOR, through localhost.
Coinbase account and normal banking account is unaffected.
Phone is never used for wallet.
There is one user, and root is disabled.
Nobody else has physical access.
Every program, service and web site in use has a different username and long password, managed by KeePassXC
Lightning is not being used.
No social media is used.
No file sharing, there is no wallet malware. I can copy/paste addresses without them being changed.
I store a backup of the wallet on Pcloud's Crypto directory. Unlike most cloud storage, this has end to end encryption.
I store an external hard drive with /home data (including wallet info) off-site rotation encrypted with very long PW.
Looking at it's transaction ID of b7aee9ebf54c3f7f97ace1e63b81a5f073419e6a86ef69937711295090d6af79 I see a message, "Exact payment amounts (no change)

On https://en.bitcoin.it/wiki/Privacy#Exact_payment_amounts_.28no_change.29 I see:
Payments that send exact amounts and take no change are a likely indication that the bitcoins didn't move hands.

Does anyone have any suggestions on possibly what happened? I waited a few days before reporting in case there was some sort of wide-spead problem, but I do not hear of one.

TIA
Post
Topic
Board Speculation
Merits 3 from 2 users
Suggestions for segwit paper wallet generation
by
jackjjohnson
on 31/05/2022, 03:50:49 UTC
⭐ Merited by vapourminer (2) ,JayJuanGee (1)
Hi, I read here a lot, but do not speak much. This thread has the majority of advanced users, so I am asking here...
I have used public/private keys, generated locally offline from the code at https://bitcoinpaperwallet.com (public key starts with a 1).

I wish to move them to a segwit paper wallet (public key starts 3), I understand there are technical advantages (cheaper miner fees?). What's the best way to generate offline segwit key pairs? I found https://segwitaddress.org/ but have no experience with it.

Then, I assume I should just sweep them into a local wallet (I prefer Electrum), then send them to the new segwit public address. Suggestions or advice?
Post
Topic
Board Speculation
Re: Wall Observer BTC/USD - Bitcoin price movement tracking & discussion
by
jackjjohnson
on 24/07/2021, 06:43:55 UTC

People now we don't have one BTC but ignore how much even mbtc and ubtc would be worth also so better you stack them now.

Err, speak for yourself. You have some helpful posts here, but the 'Best Bitcoin Battle Rap' is not one of them. I am a Bitcoin and music enthusiast like you, except that I enjoy playing instruments. In public, and people throw me money. Video rap is not my source of enjoyment.
Post
Topic
Board Bitcoin Discussion
Re: My bitcoins are stolen
by
jackjjohnson
on 31/10/2017, 01:45:16 UTC
Your BTC was sent to 1NBK7YkQRM39h2Qx3KR6Cd8vUmC1ztZ37c   which had 0.19653048 BTC.You can chase it from there.

It's not a good idea to blame Electron, or Skype. If anything, blame Internet Explorer, Windows and poor internet sanitation.
Post
Topic
Board Speculation
Re: What's your opinion on the price of bitcoin?
by
jackjjohnson
on 31/10/2017, 01:16:10 UTC
My opinion is that newbie shill accounts with an sig/ad campaign, should get a job.Sell some items you own. Buy some BTC.
Post
Topic
Board Electrum
Re: Warning about portable versions
by
jackjjohnson
on 31/10/2017, 00:11:12 UTC
Assuming that it is Windows, your work may have keylogging and screencap software. My workplace does, because they deal with customers' money.

Recent versions of Tails https://tails.boum.org/ include a version of Electrum, that works over TOR, for better privacy and safety on your work laptop. You have an option to spoof the MAC address, but on a work network, that could raise red flags as well. Network access could also be tied to an Active Directory user(employee). It has numerous security features: encrypted home directories, disabling scripts, and so forth.

In that case (with Tails), just bring the work laptop home, or use it somewhere other than work. If you are serious about privacy, while using Tails/Tor don't check your real-world email, or Facebook, or Ebay, or anything that ties it to your real existence.

Tails is Linux, so you should be or become somewhat familiar with it before you commit much BTC to Electrum on it. I keep it on a USB key, so I can (mostly) boot up any laptop or PC to it, and have "my stuff". Because it's a USB key, it's easy to clone several/many of them, and keep them in multiple locations. I also scan the contents of my wallet, have copies of important docs, all in the encrypted Tails persistent home directory.
Post
Topic
Board Bitcoin Discussion
Re: Did you have your paper wallet in printed form with you?
by
jackjjohnson
on 17/12/2015, 15:26:25 UTC
I generate keys offline, they have never touched the internet/email/any web site. I create an encrypted partition on a bootable Linux USB key, with a 25 character password. My wife knows the password as well, so if I have a stroke, or die in a crash all is not lost. It would take several lifetimes to brute force the password, but it's a phrase that is easy for my wife and I to remember.

Rather than have "The One That Is Very Important", I have a dozen of them. One at my parents, one in my vehicle, one in my desk at work, one in safe deposit box, one with friends. They are all identical copies.

Inside the encrypted partition is a directory blatantly named "Bitcoin". I have public/private keys in a text file. I also have QR codes for each, generated/stored in there as well.

Because it's a bootable USB stick, when I boot to it in Linux, I am completely free from any possibility of Windows malware/keylogger/screenshot that could be present in the host PC.

Since I consider this a very secure environment, I also store other important things. I scanned the contents of my wallet. I have copies of my insurance, mortgage, paycheck stubs, eyeglasses prescription, I have exported my phone/PC contact lists, saved all my bookmarks. I have a huge zip file of important/personal family photos.

If I just did this on one USB stick, I would very probably run it through the laundry. With redundant off-site copies, I don't care if I lose one, or it gets destroyed.
Post
Topic
Board Electrum
Re: Warning about portable versions
by
jackjjohnson
on 25/08/2014, 17:27:26 UTC
I was incorrect in my description above. I have only been making images from my existing install for some time, had forgotten details until I set up another fresh one recently. Of course I did not compile from source, this is all python. I get the tarred source, and run the executable from that. As long as the MD5sum from Electrum-1.9.8.tar.gz matches the site, and you checksum the executable each time you run it, you are 100% assured you are not running a trojaned version.

I recently set up the Electrum LTC client on Tails as well. Great job, devs, thank you for your work.
Post
Topic
Board Electrum
Re: Warning about portable versions
by
jackjjohnson
on 22/08/2014, 16:11:07 UTC
Sorry for so long in replying. Tails is a relatively hardened Linux, there is not an electrum.exe on the system. I compiled the executable from source code, and store an MD5sum checksum of the executable in another location in the encrypted storage. It takes 10 seconds to run md5sum  /path/to/electrum so that I can verify it is exactly the same one every time. The Tails USB stick's main use is for bitcoin, no casual browsing, and never any personal email/social networks, etc. I am confident in my ability to use it without getting malware.

My goal was to have a portable USB OS to be as secure as I can make it, to use with Bitcoin. At the same time, I don't want to have a One, Vital, Important Stick That I Cannot Lose.  I image the stick with the dd command (from another running and secure Linux), and can make one big file that I can recreate the USB key from. I have many of them in different locations. If I do lose it, the encrypted parts use a very long password. If it's lost, I have only lost a few euros worth of USB stick, not my information.

My interest in using .onion/Electrum servers is not because I am working with any large amount of BTC at all (to the contrary!) It is just part of this ongoing experiment in making it as secure and private as I can.
Post
Topic
Board Electrum
Re: Warning about portable versions
by
jackjjohnson
on 02/07/2014, 00:12:03 UTC
I've been using 1.9.8 (not a portable version) on a Tails USB key. You can funnel it through Tor nodes, but it requires for some kind souls to keep an Electrum server up on a Tor node. Unfortunately the .onion/Electrum servers seem to be infrequent.

If you use the -1 switch, it keeps it from trying other servers.

I consider this to be very secure. You could be on the most infected computer in the world, and it can't touch this. A hardware keylogger would be the only possible way to lose your passwords, and Tails has several virtual keyboards or Keepass that will defeat that.
Post
Topic
Board Electrum
Re: [Electrum] Tor service at 4lhnnupincd3gyda.onion:50001
by
jackjjohnson
on 02/07/2014, 00:01:01 UTC
Any of these working, or any others?
Post
Topic
Board Electrum
Re: [Electrum] Tor service at 4lhnnupincd3gyda.onion:50001
by
jackjjohnson
on 12/06/2014, 20:19:23 UTC
Is 56ckl5obj37gypcu.onion down now? I can connect, but can't seem to sync.
Post
Topic
Board Electrum
Re: [Electrum] Tor service at 4lhnnupincd3gyda.onion:50001
by
jackjjohnson
on 27/05/2014, 15:30:21 UTC
56ckl5obj37gypcu.onion is working for me today, fully synched.
Post
Topic
Board Electrum
Re: [Electrum] Tor service at 4lhnnupincd3gyda.onion:50001
by
jackjjohnson
on 30/04/2014, 03:48:44 UTC
Thanks for the tip on the -1 switch. Sure enough, there it was in electrum -h.

I can't seem to operate on electrumupzx5w5f.onion  I get a synced message:

synchronizer: connected to electrumupzx5w5f.onion:50001:

But it never seems to connect. It looks like if I don't get a 'synchronizing' message in lower left corner of 1.9.8, and a swirly icon on the right, it never will connect. It can take some time synching chunks, but it needs that message before it will ever happen. the -v switch is my friend! Thanks for the suggestions.
Post
Topic
Board Electrum
Re: [Electrum] Tor service at 4lhnnupincd3gyda.onion:50001
by
jackjjohnson
on 01/04/2014, 18:21:14 UTC
Today, neither 4lhnnupincd3gyda.onion or 56ckl5obj37gypcu.onion seem to be working. 56ckl5obj37gypcu.onion was working about 18hours ago.

Edit: 56ckl5obj37gypcu.onion is working now.
Post
Topic
Board Electrum
Re: [Electrum] Tor service at 4lhnnupincd3gyda.onion:50001
by
jackjjohnson
on 31/03/2014, 03:41:49 UTC
thanks for the good info. so far, Electrum 1.9.8 works with
Linux amnesia 3.12-1-amd64 #1 SMP Debian 3.12.9-1 (2014-02-01) x86_64 GNU/Linux

56ckl5obj37gypcu.onion is pretty reliable, haven't tried many so far. the -v switch is very helpful, if it doesn't try to sync within 60 seconds, best to Ctl-C and try again.

i see that it does try to talk to others.