follow us on twitter . like us on facebook . follow us on instagram . subscribe to our youtube channel . announcements on telegram channel . ask urgent question ONLY . Subscribe to our reddit . Altcoins Talks Shop Shop


This is an Ad. Advertised sites are not endorsement by our Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise Here

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - Yamane_Keto

Pages: 1 2 [3] 4 5 ... 15
31
Username: Yamane_Keto
Segwit Bitcoin address: bc1qgt35kdx373y6f7ng4dc0awctwgygc7nch9w38z

32
Crypto Wallets / Re: develop new wallet
« on: March 10, 2024, 03:50:46 AM »
it is trying in a new way and the education is always in deep of the goals.
I thought you wanted to create an electrum and not an ethereum wallet
I checked the entropy and encryption https://github.com/tokimay/Full_Access_Wallet/blob/main/src/ellipticCurve.py  the account creation mechanism and the private key is not exported to a third party and the generation method is secure. The problem is the limited options. It is now possible to create Wallet, address generation, private key extraction, but there is no support for NFTs or smart contracts.

I will try the code later.

33
Crypto Wallets / Re: develop new wallet
« on: March 09, 2024, 03:40:41 AM »
hi guys
I am trying to develop ethereum desktop wallet in python.
Creating an Electrum fork will not be an easy task, as the wallet has continuous development and updating every few months, while you will rely on one of the versions of Electrum and start developing from it, but the options for updating the code will be much slower than Electrum, which may ultimately lead to the emergence of software vulnerabilities that are difficult to discover or close.
The project will of course be free and therefore no profits will be generated from it.

If your purpose is educational, create a testnet version and you may find some people who are enthusiastic about trying what you did.

34
Crypto Wallets / Re: Are you using Hardware Wallets?
« on: March 09, 2024, 03:35:20 AM »
I bought a few wallets to try them out, but I still prefer to keep most of what I have using the airgapped system and use hardware wallets when I want to move from one place to another and want to trade.

Current hardware wallets are now offering features that were not previously available, some of them have become airgapped, and with the increased competition among them, I believe that we will witness better development in the coming years instead of the Ledger Trezor option, which has been going on for years.

35
We are living in a world that is changing rapidly, where the possibility of natural disasters such as earthquakes, hurricanes, tsunamis, fires, or human-made disasters such as arson and wars increases. What is the ideal formula for protecting your bitcoin if you believe in the principle of “not your keys, not your money” and therefore you retain access to the private key?

what is the ideal formula for this and is Metal Seed Storage sufficient in such cases?
What is the best type in this situation?


36
sorry, I'm a little confused by the sentence I quoted, how is that? Can you give a detailed description, because this is really the first time I heard, hacking without taking any action using USB and cable tools.
Honestly, I used USB and never thought that it could copy automatically without our actions from someone else's PC,
Cables such as O.MG cables, which look like a normal charger cable, but they can be used to record keyboard clicks. Then, if this USB is connected and you enter the wallet seed, password, or any sensitive data, it will be recorded and sent to the hackers.
These tools are not manufactured for the purposes of hackers, but they can be misused for that purpose. For example, a friend may ask you to connect one of these cables to your computer, and through them you may be hacked.


Usually, inside them are malicious programs that are automatically installed on the user's device, then they steal data and use the internet when connected to send information to hackers. Hackers will then use the private key to take over the user's account.

It does not necessarily contain malicious programs, and the antivirus may not give you any warnings, but because some of them have access to some permissions, they can misuse those permissions.
Limit yourself to using a charging cable that does not contain additional wires for data transfer, or remove them manually.


Pin 2 and 3, leave only the red and black wires.



I am also afraid of Flipper Zero I heard that someone could hack our wifi using Flipper Zero it's a trending tool for hackers. If they have access to our wifi they can also remotely access our devices or send some script randomly without our consent and possibly can able to retrieve data through this tool. So be careful and maybe you have a neighbor who has this kind of tool.
It comes with iButton/NFC/RFID reader/writer/emulator
It is definitely the last thing you would want to connect to your PC.
https://www.zdnet.com/article/7-hacking-tools-that-look-harmless-but-can-do-real-damage/

37
With the widespread spread of cryptocurrencies around us, we may find many who have invested directly or indirectly in cryptocurrencies, and some of us use our computer that contains some crypto wallets or even use it with hardware wallets, following advice such as using an open source operating system, not downloading random applications, buying Hardware wallets, using a strong password to encrypt the wallet file is necessary, but some of us are random when it comes to USB flash drives or random plug cables, where a friend asks you to charge his phone or send you pictures or movies, or even in university life by sending PDF files.

You think that as long as you do not open a USB flash drive file or run an antivirus or do not install these files, you are safe, but some of them are able to logs your keystrokes or even copy some files from your computer without your permission.

Many of these tools are not sold as hacking tools, but their design allows hackers to misuse them. Here are some tools that may do this:

1. O.MG cables



They look like normal charging cables, but they contain a small computer that can record all your keyboard clicks and can know your Wi-Fi password, or even your wallet password.

2. USBKill devices


USBKill devices are little dongles that look like USB flash drives, but instead of storing data, they send circuit-busting electrical charges into the devices they are plugged into.

3. USB Rubber Ducky

While the tool looks like a regular flash drive, the Rubber Ducky can be programmed to "type" commands into any device it's plugged into.

4. LAN Turtle


They may look like an Internet adapter, but they can collect a lot of data about you.


Not only these tools but there are many more, you can find them here https://www.zdnet.com/article/7-hacking-tools-that-look-harmless-but-can-do-real-damage/
Source: https://www.zdnet.com/article/7-hacking-tools-that-look-harmless-but-can-do-real-damage/

38
Cryptocurrency discussions / Re: Which do you prefer, CEXs or DEXs?
« on: March 05, 2024, 03:32:11 AM »
The term DEXs is associated either with services that do not require identity verification or those that make the user link his wallet, but although they claim that they are decentralized platforms, we hear that some of them have been hacked and this is due to the incorrect definition of the word decentralized.

These DEXs are managed by bridges. These bridges close native coins and give you tokens of equal value, and here they are the central point in these projects, where the smart contract can be hacked, the process of closing native coins or printing more tokens, which leads to not having enough tokens when you want to get your money back.

The burning and minting processes can be centralized, making the number of real DEXs limited to only P2P DEXs like Bisq or sidechains and Layer 2 solutions.

39
Username: Yamane_Keto
Segwit Bitcoin address: bc1qgt35kdx373y6f7ng4dc0awctwgygc7nch9w38z

40
This data is a reflection of the price. If the price rose to +70,000, each Bitcoin address would have made a profit against USD, and it had already done so against CAD, as the price rose above ATH.

41
Technical Discussion / Re: CoinJoin across different blockchains
« on: March 04, 2024, 02:21:42 AM »
No I meant discussions about how CoinJoin really works, vulnerabilities and mixing levels and not how to use ready-to-use software wallets/mixers which are often simple and non-technical steps.
academy.binance tries to make it simple, but their simplification sometimes leads to including inaccurate information.
I did not specify my question precisely, so I will lock this topic for now. If anyone has better sources, please include them below.

42
Technical Discussion / CoinJoin across different blockchains
« on: March 02, 2024, 03:58:29 AM »
Most mixing services have moved here. However, I did not see many topics talking about CoinJoin, and since it is a protocol used in more than one blockchain, I think we can use this topic for further discussions.

I don't know from where to start the discussion, but I think that one of the problems with CoinJoin is the complexity for average users. Until now, I have not been able to understand all the details behind it, which makes relying on third-party services that enhance privacy, which increases the possibility that your currencies will be tracked, especially by advanced blockchain analysis.

Can someone make things simpler?

43
1 - How was the hacker able to open the wallet file even though I was using a very strong password?
hackers may records the screen if you try to avoid using the keyboard to enter the password. This all depends on the access permissions that hackers can gain.

I know that there is a possibility of creating an Electreum wallet with two-factor authentication 2FA. In such a case, if I enable two-factor authentication, can a hacker access the wallet even if he manages to obtain the password?

It is better create a multi-signature wallet to avoid a single point of failure, You can have 2-of-4 Multisig Wallet, where you will need two signatures from 4 devices, or 3-of-4, all of which are solutions that will increase the complexity of the sending process, but there will not be a single point of failure.

44
Technical Discussion / Re: Checking addresses balance in bulk
« on: February 28, 2024, 02:58:49 AM »
If I understood you correctly, you are looking for a portfolio tracker. There are dozens of them, some with free features and others with paid features that perform a deeper analysis of data.
For privacy purposes and if you want to do it yourself you can download some templates from Github and customize your Excel Spreadsheet crypto tracker

45
Bitcoin Forum / Re: BTC Spot ETF: is Algo Bot Trading a big threat?
« on: February 27, 2024, 04:45:44 AM »
This may be true, but the market is available 24 hours a day, 7 days. Liquidity trends are unknown. Manipulation can and does occur, but it is very expensive and cannot guarantee that liquidity will not flow, as the market is open and an estimated percentage of Bitcoin is not known who owns it, and therefore how it will be done. By spending it.

Your concerns could be serious in the case of altcoins. Binance has a significant impact on the market, which makes it, in cooperation with OKX Kucoin, easily manipulate the prices of some altcoins or force them to make changes in the protocol or anything else.

Pages: 1 2 [3] 4 5 ... 15
ETH & ERC20 Tokens Donations: 0x2143F7146F0AadC0F9d85ea98F23273Da0e002Ab
BNB & BEP20 Tokens Donations: 0xcbDAB774B5659cB905d4db5487F9e2057b96147F
BTC Donations: bc1qjf99wr3dz9jn9fr43q28x0r50zeyxewcq8swng
BTC Tips for Moderators: 1Pz1S3d4Aiq7QE4m3MmuoUPEvKaAYbZRoG
Powered by SMFPacks Social Login Mod