How do you spend balance in electrum in one transaction when bitcoin spread over multiple addresses?
As the title says, how do you spend the whole balance in electrum when the balance is spread over multiple addresses? For example, I want to make a purchase that costs 1 BTC. I have 0.3 BTC in one address in electrum, 0.6 BTC in another address in electrum, and 0.1 BTC in change on electrum. Do I have to make my purchase in three transactions, or can I consolidate those three addresses, so I only have to do one transaction. Does that make sense? Thanks for any help. I come humbly as a bitcoin noob :)
Can I use one public address from a hardware wallet and use it over and over again?
Let’s say I bought a trezor and I set up the wallet and extracted a public address from it and printed out the QR code. I then locked up the trezor and never wanted to take it out again. I then started buying BTC on my cash app and withdrawing it by scanning my printed QR code..is this something I can do? Is something I should do? Is it common practice? Thanks
Hello. I use the Wasabi app with the Coldcard MK3 cold wallet connection. Left Bitcoin for storage in the wallet. Recently I wanted to make a Deposit to my wallet, but I discovered that there is a missing amount of Bitcoin on my balance. There is also a transfer to an address unknown to me. I did not make this transfer and did not confirm it. I want to find out how I lost my Bitcoin Or what vulnerability I have. When creating a wallet and installing the app, I followed all the security instructions, as well as used virus protection tools on my computer and used genuine original software.
Hello. I use the Electrum app with the Coldcard MK3 cold wallet connection. Left Bitcoin for storage in the wallet. Recently I wanted to make a Deposit to my wallet, but I discovered that there is a missing amount of Bitcoin on my balance. There is also a transfer to an address unknown to me. I did not make this transfer and did not confirm it. I want to find out how I lost my Bitcoin Or what vulnerability I have. When creating a wallet and installing the app, I followed all the security instructions, as well as used virus protection tools on my computer and used genuine original software.
In 2018 I stored some BTC into my ledger wallet. I used a google app called ledger manager. Today I went to go check on it. I had to download ledger manager live. So I did that and updated my ledger nano s wallet. It said that I have 0BTC in my account. I had to check my other coin which is XRP and it showed that there was some XRP in my account. Was my BTC stolen? I have had it hidden for years so I don’t know what is going on. I have all my secret phrase words but I am afraid of trying a “reset wallet using recovery phrase” because I am afraid that if I do have the bitcoin still hidden somewhere in my wallet I would delete it by “reset with recovery phrase”. I tried looking up my address on block explorer. Either I’m looking at the wrong wallet address or I am clueless to what I am doing as block explorer showed me that my address (at least the one I think I have) has a 0 balance and has never had transactions before. I did make sure that I had my btc in my ledger before hiding it away for about 2 years. My heart has sunk very low with this experience I would really appreciate any help I can get. Much love to all Thank you
1400 Bitcoins stolen after a user installed an old Electrum wallet and then updated to a malicious version.
this is not me, im just sharing news....
I had 1,400 BTC in a wallet that I had not accessed since 2017. I foolishly installed the old version of the electrum wallet. My coins propagated. I attempted to transfer about 1 BTC however was unable to proceed. A pop-up displayed stating I was required to update my security prior to being able to transfer funds. I installed the update which immediately triggered the transfer of my entire balance to a scammers address.
Edit: Currently writing a new version of this, dont know when it will be done. Edit: Since first post I have updated a few sections with additional information. I recommend reading it all even if it is very long, I might have placed some relevant info in different sections while thinking about what else needed to be added, plenty of steps remains mostly the same except when I comment directly on it. It is not necessary to do 100% security all the time, unless you absolutely need it, combining some high and some lower security ideas for a balance of security and convenience is useful. I will base this mostly on Windows, Linux users probably know this, and I have no idea how apple machines work (tho many things in here are still relevant for other operating systems, as they are just general tips) Disclaimer: There are certainly other steps that can make you more anonymous or safer, however I think for most people this will surfice. Any software I recommend should be independently verified for security, and examples of software are not to be taken as endorsements. I simply use examples and give recommendations when I believe it necessary, or helpful. I will not really differentiate between anonymity and security, they are often the same thing. As such the word security can mean either more anonymous, less vulnerable, or both. -------- Everyday Simple Info Sec:
Password for the device is an obvious one (8+ characters minimum, best if over +12), if there is sensitive information on any of the drives, either encrypt the entire drive or just the sensitive files, and make encrypted backups on a different memory storage device (There many programs to encrypt files and drives I'm sure a search will figure it out)
-There could be a hidden administrator user on your PC, make sure to change its password
Always use the device on a non admin account
a VPN that doesn't log (use with kill switch on, should be enough for everyday stuff, more safe stuff in the high security section) (VPNs that claim they don't log sometimes do, it's bad, but I would like to point out that not using a VPN will always expose your traffic to your ISP and also remove additional encryption. Even if the VPN tracks, there is no downside because your ISP would track anyways, and VPNs can be more anonymous, and also add extra encryption)
disable location tracking (preferably make all your privacy setting to release minimal info, get rid or cortana, change privacy settings in all of your accounts as well, there's no reason why you should allow Facebook to give you target ads. Use the setting they give you.
TOR, Firefox or similar browser, stay the fuck away from Google Chrome.
your preferred search engine should be duckduckgo (other privacy focused search engines exist as well)
use an adblocker that also prevents the adding of tacking cookies
Use pgp with all your friends or messaging services that implemented end to end encryption (Implemented services can still be bypassed, but are way more convenient so for everyday use they should suffice, some examples should be Telegraph, Signal, WhatsApp etc) (more info on pgp in high security section)
(Snapchat msgs, reddit dms, discord msgs, are just a few examples of msgs that are never encrypted) -Any info even send in encrypted msgs (and obviously non encrypted) should still be kept with possible deniability, don't say "I'm gonna do MDMA", say "I'm going out with molly."
use software (like ccleaner) that purges cookies and other data after every use, before shutting down your device
use a virus scanner daily (I like spy bot Search and destroy, many other options also exist)
never use the same password/passphrase twice (I will address what passphrase are below) (Better yet use randomized passwords that are stored in a master key chain, make them as long as possible (tho it is okay to go with the minimum of 12 never go below 7, I recommend 15+ depending on how often you have to manually enter the password instead of copying/pasting it) Don't generate too long keys for things you need to access regularly without copy/paste, except your master key ring)
its ideal to never use the same email or username as well, especially username, email is obviously tricky and also very annoying, but it would be best to always change the email.
-DO NOT STORE ANY PASSWORDS ON GOOGLE, IF GOOGLE LOGIN IS AUTHENTICATED IT WILL AUTFILL ALL PASSWORDS IT HAS SAVED (same with other similar services) (This means if you are logged in to chrome and someone has access to your machine, they can auto fill passwords without entering a single password) -use a rememberable passphrase, especially for your master key ring aka password manager A long sentence that is memorable makes an okay password (decent example,: "I met my wife at Little Ceasers for the first time on 07/09/20" better even if it's just something you know, if its impersonal, and if you can add special characters or numbers that you won't forget) (A better example for a passphrase is: "There is 0nly 0ne letter that d0esn’t appear in any U.S. state nameQ")
for your main password manager(key ring), I highly recommend Keepass 2, make backups of the file save to separate devices and drives (Flash drives, phone, PC, laptop, etc, if you loose that file, you lose all of your passwords) (Other good password managers exist as well, I don't recommend online password managers as you lose the control over passwords)
-Purge your internet activity frequently, there's a reason why I only have one post, and a few comments appearing in my account, but thousands of kama. Exposing information needlessly is not good. -Never post private information publicly, and if you do, do it vaguely as possible. (Example: Not "I'm 15", say "I'm a teenager") Do not post any vital information ever, no birthdays, mother's maiden name, age, or anything you have ever seen in a security question. Never post your current activities while they are ongoing. You going on a vacation? Don't announce it to the world, taking picture there? Post them when you are home.
Any account that is supposed to remain anonymous and as secure as possible should only be used on secured devices. A unsecured device can link you to the account.
always shutdown your machine when leaving it (To prevent access, and to prevent a possible attack vector)
2 factor factor authentication is not great anymore. Unless you can do it over a anonymous source. A cell phone is usually directly connected to you, so it is not a anonymous device. There might still be secure/anonymous 2 factor authentication methods that won't expose you, for example over a secure email. (If there is 2FA that doesn't need a device that removes anonymity and is secure, use it.) (Please don't misunderstand, 2FA is great, however it can remove the anonymity that you worked hard to establish)
-Rethink how you do security questions. Many answers to security questions can be found in your internet history. One could use the first word of the security question as an answer, or a different sceme that will mean you always remember it. (Security question need to go, the amount of personal info an average person puts on the internet makes it easy to attack anything using security question) -------_ High level crimimal information security: The motto here is, "All the Security, All the Time" As one fuck up can end with you leaving a lick of traceability, and you could be fucked. Pre Note: All of your software should always be up to date. Also even perfect info sec does not guarantee you are completely safe, a new zero day (exploit) can still fuck you, but good info security makes you significantly safer, by eliminating as many attacks as possible. -Get a new device (or make a already owned device seem like you never owned it, do this only if you know how to, there's a lot of stuff that goes into that, like changing your mac adress etc) buy with cash, and your face covered, preferably far away from where you live. (Do I need to specify to not bring your phone or anything else that tracks your location to anywhere you want to go anonymously?) (Be aware that even hardware can have vulnerabilities, many cpus have known vulnerabilities, I can't list them all, do some research before buying)
Do not EVER use a high security device at any lower level of security. There are unique identifiers to your device, exposing them once can expose you for everything you do.
-If you know how to use Tails (A linux distro designed for Info sec) use that, preferably on a USB. (Or learn how to use tails, its better, but complicated) Otherwise a clean copy of windows (make sure its not in any way associated with you) can do the job too, tho not as well. (Using a VM might give extra security, since VMs usually erase all data and RAM they were using on shutdown) -Get a non tracking VPN, Enable the kill switch (a setting that disables all traffic that doesn't go through the VPN) (change your firewall settings to only allow the traffic from the VPN, windows guide (Change settings so only traffic from the tor application is send) Edit: (Due to complaints: do not use vpn over tor, use tor over vpn. tor over vpn has no notable downside, if the VPN logs it makes no difference, your ISP will always log anyways, and vpns remove other attack vectors and also provide backup security should tor fail. Again even if the VPN tracks you only change the people doing the tracking, but now you are further removed making it more anonymous and also with less vulnerabilities) -rember privacy settings, cookie cleaner, and antivirus, password (There could be a hidden administrator user on your PC, make sure to change its password) -Always use the device on a non admin account
-Ideally use this device only on networks that are not connected with you. Such as public networks (try to never use the same public networks twice, move around) (a home network should be fine now, as it should never be exposed, but more security is always better) (Its just a conveniences vs security trade) -Never use accounts that have been exposed to lower security on higher security machines -your browser is now TOR (or your preferred security focused browser, if you dont plan on using onion ) Make sure you get the standalone version of tor not the addon build (the standalone is safer, because there are less settings and options to tweak) -Change your tor settings, to safest mode, enable a bridge (to my knowledge there's no difference in security between the build in bridges in tor), enable automatic updates, set duckduckgo onion as your primary browser. Set dark.fail onion page as your home page. (Or your preferred privacy search engine and onion directory)
set up a new pgp (can't use the same one you use for regular use, again less safer accounts are never used on safer devices) Cleopatra is my choice, its simple to use. Make sure you back up the private key multiple times, on safe devices. (Dont let the private key fall into anyone's hands) Give it a generic name like "HighSecurityPGP" do not give the pgp key pair a name that could identify you. (No initials etc) (Some pgp key pair programs want an associated email for a key pair, you can create a safe email, or which I recoend you can use a different program (like Cleopatra) (Feds & LEOs are known to copy private keys if they have your machine, so you will need to set up a new key pair if they ever take a device with a private key copy)
a high security machine that facilitates criminal activity can not use many programs. Many programs collect your devices mac adress, which is a unique identifier, amongst other things. It's should be used only for the activity you want to do.
-------_ How to use dark net markets (DNMs) If you finished your High Security setup, we can dive right in. Otherwise go do that. This is where all that is essential. Quick info on Tor, and onion sites. There is no search engine. It's all based of directories and addresses you are given by others. Tor will likely not be very quick, it has to pass through multiple networks to get to the destination. DNMs sometimes exit scam, an exit scam is when a market shuts down completely and takes all the money, this is a risk when using DNMs, it's not too common but happens maybe 0-4 times a year. The admins of thoese servers need to get out at some point, before they get jailed, so they exit the game, and scam everyone out of their money. -A very useful onion directory is dark.fail it has a lot of links, for all kinds of stuff. News, email, DNMs, Psychonautwiki (harm reduction website), forums etc. (Other directories also exist) -Pick a market, preferably one that handles secure connection server side instead of requiring you to establish the secure connection. Then create an account. Your account once created should include an entry box in your profile for a pgp key, post your PUBLIC key in there. (Verify the link is not a scam, most markets should provide a pgp signature) -Next is currency setup. All major cryptocurrency exchangers can be used, I can recommend coin base but there could be better ones out there. Unless you find a small non U.S., exchange, they will always ask for your identity. So unless you can find a trustworthy exchange that doesn't ID, you will need to give it to them. (Side note, all major crypto exchangers report to the IRS, if the IRS asks you if you bought cryptocurrency and you bought while having IDed yourself SAY YES, DO NOT COMMIT TAX FRAUD WHEN THEY KNOW YOU DID)
I recommend using Monero, it's hard to track, so it makes your job a lot easier. (If you use bitcoin you should run it through a scrambler, because BTC is tracable to anyone who knows what they are doing)
-Transfer (monero you can send directly, btc you should scramble) to your wallet. There are two options a cold wallet (physical) or a software wallet. Software wallets usually dont cost anything so I recommend them, even if often less safe. Electrum is easy to use, and pretty safe. You can also do your own research and find a wallet that fits your needs.
decide where you want to ship it. You can send to your home, to a PO box, to a PO box that you opened with a fake ID (I don't recommend), an abandoned house, general mail (sending to a post office instead of a street adress) pickup up with fake ID, use a remailing service. These are some options, sending it to your own home, isn't ideal, but its pretty much the only easy way.
-now you are ready to buy, only buy using escrow (it means the money is held by the market as a middle man until the product is delivered, they will also handle any issues like wrong quantity, cuts, etc), judge the reviews for a product, and if available look at the history of the vendor, until you find a product from a vendor you trust. (I recommend to buy within your country as much as possible, so it doesn't go through customs, it's very rare that something is found, but it can happen) -now you get to buy, depending on market, you either have cryptocurrency stored in their wallets (not recommend, you will lose it in an exit scam) or you can send it every order. When you send your delivery adress (or the one you want it to go to) encrypt the adress using the sellers public key. Make sure the adress is correct. -wait for the product, make sure to extend the escrow until the product arrives, if you can't extend it anymore dispute the order, and a moderator will step in -test the product, use it, and leave a review. PLEASE LEAVE A REVIEW, DNMs only work because of reviews. Edit: Didn't imagine I would write over 15000 words. Oh well, it was fun. Hope it helps, if you have any questions feel free to ask. No idea how long this will stay up, I might purge it in 7 days, or never.
You've probably been hearing a lot about Bitcoin recently and are wondering what's the big deal? Most of your questions should be answered by the resources below but if you have additional questions feel free to ask them in the comments. It all started with the release of the release of Satoshi Nakamoto's whitepaper however that will probably go over the head of most readers so we recommend the following videos for a good starting point for understanding how bitcoin works and a little about its long term potential:
Limited Supply - There will only ever be 21,000,000 bitcoins created and they are issued in a predictable fashion, you can view the inflation schedule here. Once they are all issued Bitcoin will be truly deflationary. The halving countdown can be found here.
Open source - Bitcoin code is fully auditable. You can read the source code yourself here.
Accountable - The public ledger is transparent, all transactions are seen by everyone.
Decentralized - Bitcoin is globally distributed across thousands of nodes with no single point of failure and as such can't be shut down similar to how Bittorrent works. You can even run a node on a Raspberry Pi.
Censorship resistant - No one can prevent you from interacting with the bitcoin network and no one can censor, alter or block transactions that they disagree with, see Operation Chokepoint.
Push system - There are no chargebacks in bitcoin because only the person who owns the address where the bitcoins reside has the authority to move them.
Low fee scaling - On chain transaction fees depend on network demand and how much priority you wish to assign to the transaction. Most wallets calculate on chain fees automatically but you can view current fees here and mempool activity here. On chain fees may rise occasionally due to network demand, however instant micropayments that do not require confirmations are happening via the Lightning Network, a second layer scaling solution currently rolling out on the Bitcoin mainnet.
Borderless - No country can stop it from going in/out, even in areas currently unserved by traditional banking as the ledger is globally distributed.
Portable - Bitcoins are digital so they are easier to move than cash or gold. They can even be transported by simply memorizing a string of words for wallet recovery (while cool this method is generally not recommended due to potential for insecure key generation by inexperienced users. Hardware wallets are the preferred method for new users due to ease of use and additional security).
Bitcoin.org and BuyBitcoinWorldwide.com are helpful sites for beginners. You can buy or sell any amount of bitcoin (even just a few dollars worth) and there are several easy methods to purchase bitcoin with cash, credit card or bank transfer. Some of the more popular resources are below, also check out the bitcoinity exchange resources for a larger list of options for purchases.
Here is a listing of local ATMs. If you would like your paycheck automatically converted to bitcoin use Bitwage. Note: Bitcoins are valued at whatever market price people are willing to pay for them in balancing act of supply vs demand. Unlike traditional markets, bitcoin markets operate 24 hours per day, 365 days per year. Preev is a useful site that that shows how much various denominations of bitcoin are worth in different currencies. Alternatively you can just Google "1 bitcoin in (your local currency)".
Securing your bitcoins
With bitcoin you can "Be your own bank" and personally secure your bitcoins OR you can use third party companies aka "Bitcoin banks" which will hold the bitcoins for you.
If you prefer to "Be your own bank" and have direct control over your coins without having to use a trusted third party, then you will need to create your own wallet and keep it secure. If you want easy and secure storage without having to learn computer security best practices, then a hardware wallet such as the Trezor, Ledger or ColdCard is recommended. Alternatively there are many software wallet options to choose from here depending on your use case.
If you prefer to let third party "Bitcoin banks" manage your coins, try Gemini but be aware you may not be in control of your private keys in which case you would have to ask permission to access your funds and be exposed to third party risk.
Note: For increased security, use Two Factor Authentication (2FA) everywhere it is offered, including email! 2FA requires a second confirmation code to access your account making it much harder for thieves to gain access. Google Authenticator and Authy are the two most popular 2FA services, download links are below. Make sure you create backups of your 2FA codes.
As mentioned above, Bitcoin is decentralized, which by definition means there is no official website or Twitter handle or spokesperson or CEO. However, all money attracts thieves. This combination unfortunately results in scammers running official sounding names or pretending to be an authority on YouTube or social media. Many scammers throughout the years have claimed to be the inventor of Bitcoin. Websites like bitcoin(dot)com and the btc subreddit are active scams. Almost all altcoins (shitcoins) are marketed heavily with big promises but are really just designed to separate you from your bitcoin. So be careful: any resource, including all linked in this document, may in the future turn evil. Don't trust, verify. Also as they say in our community "Not your keys, not your coins".
Where can I spend bitcoins?
Check out spendabit or bitcoin directory for millions of merchant options. Also you can spend bitcoin anywhere visa is accepted with bitcoin debit cards such as the CashApp card. Some other useful site are listed below.
Mining bitcoins can be a fun learning experience, but be aware that you will most likely operate at a loss. Newcomers are often advised to stay away from mining unless they are only interested in it as a hobby similar to folding at home. If you want to learn more about mining you can read more here. Still have mining questions? The crew at /BitcoinMining would be happy to help you out. If you want to contribute to the bitcoin network by hosting the blockchain and propagating transactions you can run a full node using this setup guide. If you would prefer to keep it simple there are several good options. You can view the global node distribution here.
Just like any other form of money, you can also earn bitcoins by being paid to do a job.
You can also earn bitcoins by participating as a market maker on JoinMarket by allowing users to perform CoinJoin transactions with your bitcoins for a small fee (requires you to already have some bitcoins.
The following is a short list of ongoing projects that might be worth taking a look at if you are interested in current development in the bitcoin space.
One Bitcoin is quite large (hundreds of £/$/€) so people often deal in smaller units. The most common subunits are listed below:
one bitcoin is equal to 100 million satoshis
1,000 per bitcoin
used as default unit in recent Electrum wallet releases
1,000,000 per bitcoin
colloquial "slang" term for microbitcoin (μBTC)
100,000,000 per bitcoin
smallest unit in bitcoin, named after the inventor
For example, assuming an arbitrary exchange rate of $10000 for one Bitcoin, a $10 meal would equal:
For more information check out the Bitcoin units wiki. Still have questions? Feel free to ask in the comments below or stick around for our weekly Mentor Monday thread. If you decide to post a question in /Bitcoin, please use the search bar to see if it has been answered before, and remember to follow the community rules outlined on the sidebar to receive a better response. The mods are busy helping manage our community so please do not message them unless you notice problems with the functionality of the subreddit. Note: This is a community created FAQ. If you notice anything missing from the FAQ or that requires clarification you can edit it here and it will be included in the next revision pending approval. Welcome to the Bitcoin community and the new decentralized economy!
Storing your coins safely while not risking loss of keys
This was originally an answer to a question that was asked here, but OP deleted their post. This might help some newbies (especially the multisig edit at the end), so I want to make sure it's still accessible here. The original question was whether the Electrum wallet stores a Trezor's private key when using a passphrase. OP noticed that their Trezor wouldn't connect to their Electrum wallet when entering a different passphrase than they used when creating the wallet. Thus, OP (likely) assumed that the wallet stored the private key, as it somehow knew that a different private key was now used. Here is my original answer (with some modifications): IMPORTANT: I'm assuming here that you connected your Trezor by choosing the "hardware wallet" option in Electrum, rather than giving Electrum your 12/24 seed words. TL;DR: No, your coins are safe :) I'm assuming by passphrase) you mean the 25th (or 13th) word. When you have this feature enabled, a private key gets generated every time you enter a passphrase. When you enter the same passphrase you used to create the wallet, the wallet with your funds shows up. Whenever you enter something different, a different private key is generated on your Trezor. This allows you to have multiple different wallets, for example by choosing the passphrases "First Wallet", "Second Wallet", "Third Wallet", or a secret wallet with a secret passphrase. So whenever you enter a new passphrase when connecting your Trezor to Electrum, the Trezor will send a new public key to Electrum. Electrum will then derive addresses from this public key and check those for balances. It won't find any, as you used a new passphrase. EDIT: I just realized that you said your wallet doesn't connect to Electrum when you use a different passphrase. This is simply because Electrum doesn't receive the correct public key from the Trezor and therefore Electrum thinks it's a different wallet (which it is). When you enter the passphrase you used during creation of your wallet, the Trezor will send your actual public key to Electrum, which will then find addresses with balances, which it will show to you. EDIT (to clarify): Connecting your Trezor after creating the wallet is only necessary to send funds or verify addresses, as the public key is already stored in the wallet.dat. The only thing Electrum actually stores is the public key, which can only be used to look at your Bitcoin, not to move them. You might want to keep this public key a secret as well though, since it links all your funds to you. This is what Electrum stores in the wallet.dat file, which you can just encrypt by choosing a password for it. Well done using a passphrase by the way! Should someone get their hands on your Trezor, a sophisticated attacker can get the secret key off the device in 15 minutes. Using a passphrase makes this attack almost useless, as the both secret key AND the passphrase are needed to move your funds, and the passphrase is not stored on the device. A passphrase also allows you to hide funds from potential robbers that force you to unlock your wallet. You can do this by activating the passphrase feature and sending your funds to a wallet with a secret passphrase (do NOT lose this, as losing your passphrase renders your funds inaccessible). Afterwards, you can safely deactivate the passphrase feature, so the device doesn't even ask for one should you get robbed. Simply reactivate it when you need to access your funds. EDIT: Should you be worried that you might forget your passphrase, you should look into multisig wallets. Depending on how you set this up, you can make it more secure against theft and less likely for you to lose access to your funds. Say for example you get four wallets: two hardware wallets, a well-protected (airgapped) laptop with Electrum, and a secure mobile wallet that allows for multisig (like Fully Noded). You can then create a 2-of-4 multisig wallet that requires you to sign transactions with any two of these four wallets. The increase in security comes from the fact that an attacker now needs full access to two of your devices (or their stored private keys) at once. At the same time, the fact that you yourself now also need access to only half of your devices means that in the event of a total loss of one (or even two) of them, you can still move your funds to a new wallet. As long as you do regular checks (e.g. first day of each month), ensuring that you still have access to all your devices' stored private keys, you can always catch a loss of keys and fix this without losing funds (by creating a new multisig wallet and sending the funds there). This allows you to use a passphrase on your wallets without storing it anywhere physically or digitally. This would usually be very risky, as forgetting the passphrase would lead to a loss of funds, but this risk is now close to eliminated. (The following part was not in the original answer) Some IMPORTANT general secruity tips:
Consider including trusted friends and/or family members as co-signers for a multisig wallet. This ensures that it's not even possible for you alone to hand over funds to an attacker. Depending on your level of trust, you might want to make sure that your co-signers can't collaborate to steal your funds (if you include 3 people, create at least a 4-of-n multisig). You could also deliberately make it possible for all or even just some of your co-signers to move your funds (3 co-signers, 3(or less)-of-n multisig) to make sure your funds aren't lost should pass away unexpectedly.
Consider running your own full node and Electrum server (also check the alternatives), which you connect your Electrum wallet to. This ensures that you don't send your public key to anyone else. If someone knows your public key, they know how much BTC you own, making you a potential target.
Always encrypt your wallet.dat (or whatever you called your wallet file), even if it's a watch-only wallet. This protects your public key (see 1. for why you want that).
Create watch-only wallets: Use an airgapped) device to create a wallet with Electrum (make sure to back up the seed phrase) and export the public key. Then create a new watch-only wallet on another device (like your everyday laptop) with that public key to be able to check your funds. To create the initial wallet, you can also use any other hard- or software wallet that allows you to export the master public key.
Hide, or (when using a hardware wallet with a passphrase) even delete your watch-only wallets. Hiding your funds makes you less of a target. When using a hardware wallet, recreating the watch-only wallet is fast and simple, so you don't need to store it if you don't want to check your funds every day. Note that this approach doesn't help much when you don't use a passphrase, as an attacker will obviously check the passphrase-less wallet no matter what.
Keep some funds on your hardware wallet(s). If an attackers sees funds on the wallet(s), they might not force you to enter a passphrase or ask if you have any multisig wallets (lying under pressure is hard).
Hide all your wallets in different places. If someone sees that you have multiple wallets lying around, they might realize you have a multisig wallet.
Don't risk a robber getting (for example) two keys to your 2-of-4 multisig wallet and then racing them to move your funds with the other two keys when they leave. They're gonna come back and be pissed. If it comes to this, you need protection until the robber is caught. STAY SAFE!
The easiest way to solve a problem is to never have it. Don't make yourself a target. If nobody even suspects that you have a multisig (or any wallet at all), they're probably not gonna look for it.
Please correct any mistakes you find and I will edit my post. I will also gladly add more tips to the list. I will of course credit anyone who helps. Tip for devs who want something cool and important to work on: Make the creation and usage of multisig wallets as noob-friendly as possible. If someone expresses worries about losing access to their funds by forgetting the seed phrase, wallet pin, etc. (someone in my family actually brought this up to me), multisig wallets are the perfect solution as they add redundancy.
My understanding is that this transaction is from one of my electrum wallets to another. I could not send using my wallet on muy ubuntu usb stick because of an update issue. I meant to transfer my balance from the ubuntu wallet to a Windows electrum wallet. I am not having any luck. I have tried every password to log in to my Windows electrum wallet and can not. How can I retrieve my bitcoin? Is there a way to tell from the recipient address if it's an electrum wallet? https://blockstream.info/tx/51dd2b92fc511e8f0dcc1e07ce83442033339f0d555f7d62564e47ee0ccdde80
Bitcoin is a decentralized system, any user of which could control the movement of their own funds. You can use the currency to make transactions, pay for purchases, receive transfers, and exchange it for cash. For transactions, a special address is used, encrypted with a 16-character key. The buyer decodes the code to transfer bitcoins to the specified address.
Mining is a process that ensures the security of the BTC system, which adds new blocks to the blockchain in chronological order (new transactions). Blocks are added when the codes are decrypted, the transaction is completed, and bitcoins are transferred or exchanged. The main cryptocurrency is generated by miners using software that solves cryptographic problems. The reward for a new block is agreed by all network participants, but usually amounts to 12.5 bitcoins. Part of the user fees for transactions also goes to reward the miners. Cryptographic tasks become more complex every year to prevent inflation (mining complexity).
Features of the transaction
Anonymity. The address that Bitcoin is sent to consists of 30 characters. You can track the flow of transactions, but the address is not always associated with a real person.
Security. The balance of bitcoins is fixed in a cryptographic system with a public key. Only the owner of a private key can send cryptocurrency to other addresses.
Unable to cancel. It is no longer possible to cancel the transaction after the transaction has been completed.
Deregulation. Everyone can use cryptocurrency.
Coverage and speed. Information about the transaction is transmitted incredibly quickly, and confirmation is received within a few minutes. No one knows the buyer’s physical location.
Where to buy Bitcoin?
There are Deposit systems that use crypto-exchanges. So, to buy Bitcoin, you will first need to top up your balance, buy the digital currency itself, and then withdraw it to your Bitcoin wallet, paying a Commission for withdrawing coins. The cheapest method of buying is buying on the stock exchange. The exchange rate is as close as possible to the market rate.
The current exchange rate of the coin is calculated based on the average price on the largest currency exchanges. For example, you can track the exchange rate on our Bitniex exchange. The Bitcoin exchange rate is constantly changing, during the day it can change by 10% in one direction or another.
The choice of crypto-currency wallet
A cryptocurrency wallet is a place where digital currency will be stored. The most secure method of storage is using paper or electronic wallets.
TOP secure cryptocurrency wallets
These wallets are one of the most secure crypto wallets in the world:
Syscoin Platform’s Great Reddit Scaling Bake-off Proposal
https://preview.redd.it/rqt2dldyg8e51.jpg?width=1044&format=pjpg&auto=webp&s=777ae9d4fbbb54c3540682b72700fc4ba3de0a44 We are excited to participate and present Syscoin Platform's ideal characteristics and capabilities towards a well-rounded Reddit Community Points solution! Our scaling solution for Reddit Community Points involves 2-way peg interoperability with Ethereum. This will provide a scalable token layer built specifically for speed and high volumes of simple value transfers at a very low cost, while providing sovereign ownership and onchain finality. Token transfers scale by taking advantage of a globally sorting mempool that provides for probabilistically secure assumptions of “as good as settled”. The opportunity here for token receivers is to have an app-layer interactivity on the speed/security tradeoff (99.9999% assurance within 10 seconds). We call this Z-DAG, and it achieves high-throughput across a mesh network topology presently composed of about 2,000 geographically dispersed full-nodes. Similar to Bitcoin, however, these nodes are incentivized to run full-nodes for the benefit of network security, through a bonded validator scheme. These nodes do not participate in the consensus of transactions or block validation any differently than other nodes and therefore do not degrade the security model of Bitcoin’s validate first then trust, across every node. Each token transfer settles on-chain. The protocol follows Bitcoin core policies so it has adequate code coverage and protocol hardening to be qualified as production quality software. It shares a significant portion of Bitcoin’s own hashpower through merged-mining. This platform as a whole can serve token microtransactions, larger settlements, and store-of-value in an ideal fashion, providing probabilistic scalability whilst remaining decentralized according to Bitcoin design. It is accessible to ERC-20 via a permissionless and trust-minimized bridge that works in both directions. The bridge and token platform are currently available on the Syscoin mainnet. This has been gaining recent attention for use by loyalty point programs and stablecoins such as Binance USD.
Syscoin Foundation identified a few paths for Reddit to leverage this infrastructure, each with trade-offs. The first provides the most cost-savings and scaling benefits at some sacrifice of token autonomy. The second offers more preservation of autonomy with a more narrow scope of cost savings than the first option, but savings even so. The third introduces more complexity than the previous two yet provides the most overall benefits. We consider the third as most viable as it enables Reddit to benefit even while retaining existing smart contract functionality. We will focus on the third option, and include the first two for good measure.
Distribution, burns and user-to-user transfers of Reddit Points are entirely carried out on the Syscoin network. This full-on approach to utilizing the Syscoin network provides the most scalability and transaction cost benefits of these scenarios. The tradeoff here is distribution and subscription handling likely migrating away from smart contracts into the application layer.
The Reddit Community Points ecosystem can continue to use existing smart contracts as they are used today on the Ethereum mainchain. Users migrate a portion of their tokens to Syscoin, the scaling network, to gain much lower fees, scalability, and a proven base layer, without sacrificing sovereign ownership. They would use Syscoin for user-to-user transfers. Tips redeemable in ten seconds or less, a high-throughput relay network, and onchain settlement at a block target of 60 seconds.
Integration between Matic Network and Syscoin Platform - similar to Syscoin’s current integration with Ethereum - will provide Reddit Community Points with EVM scalability (including the Memberships ERC777 operator) on the Matic side, and performant simple value transfers, robust decentralized security, and sovereign store-of-value on the Syscoin side. It’s “the best of both worlds”. The trade-off is more complex interoperability.
Syscoin + Matic Integration
Matic and Blockchain Foundry Inc, the public company formed by the founders of Syscoin, recently entered a partnership for joint research and business development initiatives. This is ideal for all parties as Matic Network and Syscoin Platform provide complementary utility. Syscoin offers characteristics for sovereign ownership and security based on Bitcoin’s time-tested model, and shares a significant portion of Bitcoin’s own hashpower. Syscoin’s focus is on secure and scalable simple value transfers, trust-minimized interoperability, and opt-in regulatory compliance for tokenized assets rather than scalability for smart contract execution. On the other hand, Matic Network can provide scalable EVM for smart contract execution. Reddit Community Points can benefit from both. Syscoin + Matic integration is actively being explored by both teams, as it is helpful to Reddit, Ethereum, and the industry as a whole.
Total cost for these 100k transactions: $0.63 USD See the live fee comparison for savings estimation between transactions on Ethereum and Syscoin. Below is a snapshot at time of writing: ETH price: $318.55 ETH gas price: 55.00 Gwei ($0.37) Syscoin price: $0.11 Snapshot of live fee comparison chart Z-DAG provides a more efficient fee-market. A typical Z-DAG transaction costs 0.0000582 SYS. Tokens can be safely redeemed/re-spent within seconds or allowed to settle on-chain beforehand. The costs should remain about this low for microtransactions. Syscoin will achieve further reduction of fees and even greater scalability with offchain payment channels for assets, with Z-DAG as a resilience fallback. New payment channel technology is one of the topics under research by the Syscoin development team with our academic partners at TU Delft. In line with the calculation in the Lightning Networks white paper, payment channels using assets with Syscoin Core will bring theoretical capacity for each person on Earth (7.8 billion) to have five on-chain transactions per year, per person, without requiring anyone to enter a fee market (aka “wait for a block”). This exceeds the minimum LN expectation of two transactions per person, per year; one to exist on-chain and one to settle aggregated value.
Tools to simplify using Syscoin Bridge as a service with dapps and wallets will be released some time after implementation of Syscoin Core 4.2. These will be based upon the same processes which are automated in the current live Sysethereum Dapp that is functioning with the Syscoin mainnet.
The Syscoin Ethereum Bridge is secured by Agent nodes participating in a decentralized and incentivized model that involves roles of Superblock challengers and submitters. This model is open to participation. The benefits here are trust-minimization, permissionless-ness, and potentially less legal/regulatory red-tape than interop mechanisms that involve liquidity providers and/or trading mechanisms. The trade-off is that due to the decentralized nature there are cross-chain settlement times of one hour to cross from Ethereum to Syscoin, and three hours to cross from Syscoin to Ethereum. We are exploring ways to reduce this time while maintaining decentralization via zkp. Even so, an “instant bridge” experience could be provided by means of a third-party liquidity mechanism. That option exists but is not required for bridge functionality today. Typically bridges are used with batch value, not with high frequencies of smaller values, and generally it is advantageous to keep some value on both chains for maximum availability of utility. Even so, the cross-chain settlement time is good to mention here.
Ethereum -> Syscoin: Matic or Ethereum transaction fee for bridge contract interaction, negligible Syscoin transaction fee for minting tokens Syscoin -> Ethereum: Negligible Syscoin transaction fee for burning tokens, 0.01% transaction fee paid to Bridge Agent in the form of the ERC-20, Matic or Ethereum transaction fee for contract interaction.
Zero-Confirmation Directed Acyclic Graph is an instant settlement protocol that is used as a complementary system to proof-of-work (PoW) in the confirmation of Syscoin service transactions. In essence, a Z-DAG is simply a directed acyclic graph (DAG) where validating nodes verify the sequential ordering of transactions that are received in their memory pools. Z-DAG is used by the validating nodes across the network to ensure that there is absolute consensus on the ordering of transactions and no balances are overflowed (no double-spends).
Unique fee-market that is more efficient for microtransaction redemption and settlement
Uses decentralized means to enable tokens with value transfer scalability that is comparable or exceeds that of credit card networks
Provides high throughput and secure fulfillment even if blocks are full
Probabilistic and interactive
99.9999% security assurance within 10 seconds
Can serve payment channels as a resilience fallback that is faster and lower-cost than falling-back directly to a blockchain
Each Z-DAG transaction also settles onchain through Syscoin Core at 60-second block target using SHA-256 Proof of Work consensus
Z-DAG enables the ideal speed/security tradeoff to be determined per use-case in the application layer. It minimizes the sacrifice required to accept and redeem fast transfers/payments while providing more-than-ample security for microtransactions. This is supported on the premise that a Reddit user receiving points does need security yet generally doesn’t want nor need to wait for the same level of security as a nation-state settling an international trade debt. In any case, each Z-DAG transaction settles onchain at a block target of 60 seconds.
Syscoin 3.0 White Paper (4.0 white paper is pending. For improved scalability and less blockchain bloat, some features of v3 no longer exist in current v4: Specifically Marketplace Offers, Aliases, Escrow, Certificates, Pruning, Encrypted Messaging)
16MB block bandwidth per minute assuming segwit witness carrying transactions, and transactions ~200 bytes on average
SHA256 merge mined with Bitcoin
UTXO asset layer, with base Syscoin layer sharing identical security policies as Bitcoin Core
Z-DAG on asset layer, bridge to Ethereum on asset layer
On-chain scaling with prospect of enabling enterprise grade reliable trustless payment processing with on/offchain hybrid solution
Focus only on Simple Value Transfers. MVP of blockchain consensus footprint is balances and ownership of them. Everything else can reduce data availability in exchange for scale (Ethereum 2.0 model). We leave that to other designs, we focus on transfers.
Future integrations of MAST/Taproot to get more complex value transfers without trading off trustlessness or decentralization.
Zero-knowledge Proofs are a cryptographic new frontier. We are dabbling here to generalize the concept of bridging and also verify the state of a chain efficiently. We also apply it in our Digital Identity projects at Blockchain Foundry (a publicly traded company which develops Syscoin softwares for clients). We are also looking to integrate privacy preserving payment channels for off-chain payments through zkSNARK hub & spoke design which does not suffer from the HTLC attack vectors evident on LN. Much of the issues plaguing Lightning Network can be resolved using a zkSNARK design whilst also providing the ability to do a multi-asset payment channel system. Currently we found a showstopper attack (American Call Option) on LN if we were to use multiple-assets. This would not exist in a system such as this.
Web3 and mobile wallets are under active development by Blockchain Foundry Inc as WebAssembly applications and expected for release not long after mainnet deployment of Syscoin Core 4.2. Both of these will be multi-coin wallets that support Syscoin, SPTs, Ethereum, and ERC-20 tokens. The Web3 wallet will provide functionality similar to Metamask. Syscoin Platform and tokens are already integrated with Blockbook. Custom hardware wallet support currently exists via ElectrumSys. First-class HW wallet integration through apps such as Ledger Live will exist after 4.2. Current supported wallets Syscoin Spark Desktop Syscoin-Qt
Before holding anybitcoin, you need somewhere to store it. Just like in the physical world, you store your bitcoin in a wallet. Similar to a bank account number, your wallet comes with a wallet address that shows up in a ledger search and is shared with others so you can make transactions. This address, which is a shorter, more usable version of your public key, consists of between 26 and 35 random alphanumeric characters, something like 1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa. Keep in mind that every letter and number in that address is important. Before sending any bitcoin to your wallet, double-check the entire address, character by character. Also tied to your wallet address is one or more private keys, which as the name suggests should not be shared with anyone. Keys are used to verify you own the aforementioned public key, and to sign off on transactions. Some wallets create a secure seed phrase, a set of words that will allow you to unlock your wallet if you lose your keys. Print this phrase out and keep it in a safe place. The unfortunate truth is your bitcoin wallet is akin to your physical wallet. If you lose the private keys to your wallet, you’re most likely going to lose the currency in it forever. Your wallet generates a master file where your public and private keys are stored. This file should be backed up in case the original file is lost or damaged. Otherwise, you risk losing access to your funds. You can store your private keys on your computer, mobile device, on a physical storage gadget or even on a piece of paper. It’s crucial that you keep your private keys safe by generating backups both online and offline. Remember: Your wallet does not reside on any single device. The wallet itself resides on the Bitcoin blockchain, just as your banking app doesn’t truly “hold” the cash in your checking account. While wallet apps work well and are relatively safe, the safest option is a hardware wallet you keep offline, in a secure place. The most popular hardware wallets use special layers of security to ensure your keys are not stolen and your bitcoin is safe. But, once again, if you lose the hardware wallet your bitcoins are gone unless you have kept reliable backups of the keys. The least-secure option is an online wallet, i.e. storing your bitcoin in an exchange. This is because the keys are held by a third party. For many, the online exchange wallets are the easiest to set up and use, presenting an all-too-familiar choice: convenience versus safety. Many serious bitcoin investors use a hybrid approach: They hold a core, long-term amount of bitcoin offline in so-called “cold storage,” while keeping a spending balance in a mobile account. Depending on your bitcoin strategy and willingness to get technical, here are the different types of bitcoin wallets available. Bitcoin.org has a helper that will show you which wallet to choose. Cloud wallets exist online and the keys are usually stored in a distant server run by a third party. Cloud-based wallets tend to have a more user-friendly interface but you will be trusting a third party with your private keys, which makes your funds more susceptible to theft. Some examples of this wallet type are Coinbase, Blockchain and Lumi Wallet. Most cryptocurrencies, including bitcoin, have their own native wallets. Some offer additional security features such as offline storage (Coinbase and Xapo). With your private keys stored on a server, you have to trust the host’s security measures and also trust the host won’t disappear with your money or close down and deny you access. Software wallets can be installed directly on your computer, giving you private control of your keys. Most have relatively easy configuration and are free. The disadvantage is you are in charge of securing your keys. Software wallets also require greater security precautions. If your computer is hacked or stolen, the thief can get a copy of your wallet and your bitcoin. While you can download the original software Bitcoin Core protocol (which stores a ledger of all transactions since 2009 and takes up a lot of space), most wallets in use today are “light” wallets, or SPV (Simplified Payment Verification) wallets, which do not download the entire ledger but sync to it. Electrum is a well-known SPV desktop bitcoin wallet that also offers “cold storage” (a totally offline option for additional security). Exodus can track multiple assets with a sophisticated user interface. Some (such as Jaxx Liberty) can hold a wide range of digital assets, and some (such as Copay) offer the possibility of shared accounts. Before downloading any app, please confirm you are downloading a legitimate copy of a real wallet. Some shady programmers create clones of various crypto websites and offer downloads for free, leading to the possibility of a hack. Mobile wallets are available as apps for your smartphone, especially useful if you want to pay for something in bitcoin in a shop or if you want to buy, sell or send while on the move. All of the online wallets and most of the desktop ones mentioned above have mobile versions, while others – such as Abra, Edge and Bread – were created with mobile in mind. Remember, many online wallets will store your keys on the phone itself, leading to the possibility of losing your bitcoin if you lose your phone. Always keep a backup of your keys on a different device and print out your seed phrase. Hardware wallets are small devices that connect to the web only to enact bitcoin transactions. They are more secure because they are generally offline and therefore not hackable. They can be stolen or lost, however, along with the bitcoins that belong to the stored private keys, so it’s recommended that you backup your keys. Some large investors keep their hardware wallets in secure locations such as bank vaults. Trezor, Keepkey and Ledger are notable examples. Paper wallets are perhaps the simplest of all the wallets. Paper wallets are pieces of paper that contain the private and public keys of a bitcoin address. Ideal for the long-term storage of bitcoin (away from fire and water, of course) or for the giving of bitcoin as a gift, these wallets are more secure in that they’re not connected to a network. They are, however, easier to lose. With services such as WalletGenerator, you can easily create a new address and print the wallet on your printer. When you’re ready to top up your paper wallet you simply send some bitcoin to that address and then store it safely. Whatever option you go for, be sure to back up everything and only tell your nearest and dearest where your backups are stored.
08-31 08:38 - '[quote] No. Tails forgets all data upon reboot. You have to have a paper/metal/brain-backup of the seed. / You import the master-PUBLIC-key into an online system, for example Electrum running on your Android phone or table...' by /u/Thanatos_1 removed from /r/Bitcoin within 667-677min
does the “cold device” in these cold storage mechanisms essentially just hold your private key and your latest known balance?
No. Tails forgets all data upon reboot. You have to have a papemetal/brain-backup of the seed. You import the master-PUBLIC-key into an online system, for example Electrum running on your Android phone or tablet. That system knows your balance, because it is online and can derive all addresses from the master-public-key. But it can't sign any transaction, because it doesn't have the seed. If you want to spend, you create an unsigned transaction on the online-installation, transfer it to the offline system, check it, sign it, double check it, transfer the signed transaction to the online system and then broadcast it from there. Sounds more complicated than it is. Works really good with QR-codes. Here are some old videos explaining the process. The software has changed slightly in the meantime, but the process should be made clear form watching that. The first video is now actually redundant, because Tails exists and you don't have to create your own Linux live system that has Electrum. [link]1 [link]2 [link]3 ''' Context Link Go1dfish undelete link unreddit undelete link Author: Thanatos_1 1: w*w.y*utu*e.***/watch*v=*9K3Co*QpzM 2: www**ou*u**.*om/watch*v*WK4JmfMCD*g 3: www.yo***be.com/*a*ch?v=*BVyF**6Z*c Unknown links are censored to prevent spreading illicit content.
Recovering 1 BTC from BITCOIN.COM iOS Wallet after latest update!
Hello everyone, I'm currently helping a friend recover 1 BTC from his iOS phone. I've tried several things but have until now not been able to recover the funds. He never backed up the app. Importing the 'current' bitcoin core seed into electrum using popular derivation paths like m/44'/0'/0' does not work. This is the public address: https://www.blockchain.com/btc/address/16pzMmk2WnEM85M7Hi5BucGSvsyqV1DmaM This balance was available until he updated the app. I suspect/hope that the phone still has a copy of what Bitcoin.com refers to in much of their support language as a "Legacy Wallet'. One procedure they recommend is to tap the bitcoin.com logo on the About page 7 times to recover the legacy wallet. I can see a message "no legacy wallet found" when I try this on my Android. But he does not see any change or message when doing this one his iPhone. Any suggestions? Does anyone know where on the phone this legacy wallet might be stored? Thanks in advance...
Anybody can create such address and anybody can view the balance of any existing Bitcoin address even if it is not their own. It is because of the open network and all information on the blockchain can be openly seen by everyone. Nobody can spend coins from watch only address except for one that own private keys. So always be cautious on to which address you send money. If you are sending ... How to find my bitcoin address? New to electrum and i'm trying to figure out where my address is located. I've seen multiple sources say it should be in the Receive tab but this is what my receive tab looks like . Did i do something wrong lol. 7 comments. share. save. hide. report. 100% Upvoted. Log in or sign up to leave a comment log in sign up. Sort by. best. level 1. 5 points · 2 months ... I've been a big fan of Electrum as a wallet for a while now. Traditionally, when I wanted to do bitcoin scripting I would use either trezorlib, pycoin, or bitcoinlib.But recently I was digging a bit deeper into the Electrum source and found it to be one of the simpler python libraries to use to craft bitcoin transactions. To receive bitcoin all you need to do is share one of the addresses in your wallet with the person who wants to pay you. With the receive tab Electrum tries to create a workflow for receiving bitcoin that incorporates adding a label to your address, an expected amount and saving all this in the wallet as a receive request. This website is hosted by Electrum Technologies GmbH Electrum Technologies was founded by Thomas Voegtlin in 2013. Its mission is to develop, package and distribute Electrum software, and to provide services to Bitcoin users and businesses. Address Electrum Technologies GmbH Paul-Lincke-Ufer 8d 10999 Berlin - Germany
Bitcoin address with private key 2018 Bitcoin Private Key With Address And Random Balance Database Full 7 Million Addresses Folder -1-2-3 Price 0.07 https://goo.gl/1bPJyw Bitcoin Private Key List ... bitcoin private key database with balance 2018 bitcoin address destroyer key bitcoin private key database with balance 2019 bad key bitcoin bitcoin key example bitcoin key events bitcoin ... How to sweep private keys - Using the Electrum Bitcoin wallet - Duration: 2 ... Auto Fast scanner Balance Bitcoin Address & Private Key - Duration: 10:55. Auto Bitcoin Goo 34,647 views. 10:55 ... Auto Fast scanner Balance Bitcoin Address & Private Key - Duration: 10:55. Auto Bitcoin Goo 35,815 views. 10:55 . Private Keys from the Samurai Bitcoin Wallet for Android - Duration: 10:36 ... The CryptoDad shows you how to download and install the genuine Electrum Bitcoin wallet. Check description below for table of content links! I talk about how...