So I backed up my bitcoin core wallet into my flash drive with out letting the block chain complete and I am try to open it up and core keeps opening a new wallet not the previous.
So I sent all of my bitcoin to my bitcoin core wallet and my computer (Mac) didn't have enough disk space and I didn't know it was taking up all of my space at the time so I backed up my wallet without the entire block chain just the data to my flash drive so from there I wiped my computer with a program and basically erased everything but still had the bitcoin core wallet data on my flash drive so I plugged in the flash drive and purchased a 4tb memory holder so I redownloaded bitcoin core and it wasn't the same wallet it was a completely different wallet so I clicked to open the wallet that has the data from the previous wallet on that USB drive and it keep opening this new wallet that isn't it and it hasn't been modified since I had saved it before I wiped the computer. I'll pay anyone 100 usd worth of bitcoin to help me solve this problem.
[uncensored-r/Bitcoin] I have an old wallet.dat file on a flash drive from bitcoin core. What wallet can i download to p...
The following post by SCAND1UM is being replicated because some comments within the post(but not the post itself) have been silently removed. The original post can be found(in censored form) at this link: np.reddit.com/ Bitcoin/comments/7ih3q0 The original post's content was as follows:
so I back up my bitcoin core wallet on a flash drive from my Mac because it was messing up so I wiped the Mac clean tried to open up my bitcoin core clicked had to re download core and it's not the same address its a completely new wallet any ideas on what could have happened I have /r/Bitcoin
Bitcoin mentioned around Reddit: Theoretically, if I inherited 2000ish bitcoins how would I go about turning that into real money. I don't know how they work. All I know is now I have a bitcoin wallet thing on a flash drive and I don /r/AskReddit
I don't have any bitcoin at the moment, but I'm interested in buying some. My buddy has bitcoin on robinhood and he said I can buy some too. I watched some YouTube video about buying a wallet so I went online at blockchain website and opened me a wallet. I also made an account on coinbase. My buddy said bitcoin is anonymous so the government can't find out if you own any. Now the questions are (my buddy couldn't answer them)
If I buy bitcoin on coinbase website, how is it anonymous? I literally had to provide my SSN and verify my identity. Doesn't that mean coinbase know it belongs to me? And if the government wanted to know if I have any bitcoin they can just ask coinbase?
If transfer my bitcoin to a hardware wallet (my buddy told me about ledger website where I can buy me a flash drive wallet thing) won't there be traces of where the bitcoin came from and the person identity? Like if I transfer my bitcoin from coinbase to my hardware wallet there will be traces of the transfer right? Like banks? Or is this part anonymous? I know coinbase or the government isn't that dumb. If I transfer my bitcoin to a hardware wallet they know it was transfer from coinbase to a different wallet that presumably belongs to me..?
Where can I buy bitcoin without providing my identity?
Is it worth buying the ledger flash drive s?
Why is bitcoin tied to country currency? What will happen to bitcoin value if the country currency is worthless?
Edit: Currently writing a new version of this, dont know when it will be done. Edit: Since first post I have updated a few sections with additional information. I recommend reading it all even if it is very long, I might have placed some relevant info in different sections while thinking about what else needed to be added, plenty of steps remains mostly the same except when I comment directly on it. It is not necessary to do 100% security all the time, unless you absolutely need it, combining some high and some lower security ideas for a balance of security and convenience is useful. I will base this mostly on Windows, Linux users probably know this, and I have no idea how apple machines work (tho many things in here are still relevant for other operating systems, as they are just general tips) Disclaimer: There are certainly other steps that can make you more anonymous or safer, however I think for most people this will surfice. Any software I recommend should be independently verified for security, and examples of software are not to be taken as endorsements. I simply use examples and give recommendations when I believe it necessary, or helpful. I will not really differentiate between anonymity and security, they are often the same thing. As such the word security can mean either more anonymous, less vulnerable, or both. -------- Everyday Simple Info Sec:
Password for the device is an obvious one (8+ characters minimum, best if over +12), if there is sensitive information on any of the drives, either encrypt the entire drive or just the sensitive files, and make encrypted backups on a different memory storage device (There many programs to encrypt files and drives I'm sure a search will figure it out)
-There could be a hidden administrator user on your PC, make sure to change its password
Always use the device on a non admin account
a VPN that doesn't log (use with kill switch on, should be enough for everyday stuff, more safe stuff in the high security section) (VPNs that claim they don't log sometimes do, it's bad, but I would like to point out that not using a VPN will always expose your traffic to your ISP and also remove additional encryption. Even if the VPN tracks, there is no downside because your ISP would track anyways, and VPNs can be more anonymous, and also add extra encryption)
disable location tracking (preferably make all your privacy setting to release minimal info, get rid or cortana, change privacy settings in all of your accounts as well, there's no reason why you should allow Facebook to give you target ads. Use the setting they give you.
TOR, Firefox or similar browser, stay the fuck away from Google Chrome.
your preferred search engine should be duckduckgo (other privacy focused search engines exist as well)
use an adblocker that also prevents the adding of tacking cookies
Use pgp with all your friends or messaging services that implemented end to end encryption (Implemented services can still be bypassed, but are way more convenient so for everyday use they should suffice, some examples should be Telegraph, Signal, WhatsApp etc) (more info on pgp in high security section)
(Snapchat msgs, reddit dms, discord msgs, are just a few examples of msgs that are never encrypted) -Any info even send in encrypted msgs (and obviously non encrypted) should still be kept with possible deniability, don't say "I'm gonna do MDMA", say "I'm going out with molly."
use software (like ccleaner) that purges cookies and other data after every use, before shutting down your device
use a virus scanner daily (I like spy bot Search and destroy, many other options also exist)
never use the same password/passphrase twice (I will address what passphrase are below) (Better yet use randomized passwords that are stored in a master key chain, make them as long as possible (tho it is okay to go with the minimum of 12 never go below 7, I recommend 15+ depending on how often you have to manually enter the password instead of copying/pasting it) Don't generate too long keys for things you need to access regularly without copy/paste, except your master key ring)
its ideal to never use the same email or username as well, especially username, email is obviously tricky and also very annoying, but it would be best to always change the email.
-DO NOT STORE ANY PASSWORDS ON GOOGLE, IF GOOGLE LOGIN IS AUTHENTICATED IT WILL AUTFILL ALL PASSWORDS IT HAS SAVED (same with other similar services) (This means if you are logged in to chrome and someone has access to your machine, they can auto fill passwords without entering a single password) -use a rememberable passphrase, especially for your master key ring aka password manager A long sentence that is memorable makes an okay password (decent example,: "I met my wife at Little Ceasers for the first time on 07/09/20" better even if it's just something you know, if its impersonal, and if you can add special characters or numbers that you won't forget) (A better example for a passphrase is: "There is 0nly 0ne letter that d0esn’t appear in any U.S. state nameQ")
for your main password manager(key ring), I highly recommend Keepass 2, make backups of the file save to separate devices and drives (Flash drives, phone, PC, laptop, etc, if you loose that file, you lose all of your passwords) (Other good password managers exist as well, I don't recommend online password managers as you lose the control over passwords)
-Purge your internet activity frequently, there's a reason why I only have one post, and a few comments appearing in my account, but thousands of kama. Exposing information needlessly is not good. -Never post private information publicly, and if you do, do it vaguely as possible. (Example: Not "I'm 15", say "I'm a teenager") Do not post any vital information ever, no birthdays, mother's maiden name, age, or anything you have ever seen in a security question. Never post your current activities while they are ongoing. You going on a vacation? Don't announce it to the world, taking picture there? Post them when you are home.
Any account that is supposed to remain anonymous and as secure as possible should only be used on secured devices. A unsecured device can link you to the account.
always shutdown your machine when leaving it (To prevent access, and to prevent a possible attack vector)
2 factor factor authentication is not great anymore. Unless you can do it over a anonymous source. A cell phone is usually directly connected to you, so it is not a anonymous device. There might still be secure/anonymous 2 factor authentication methods that won't expose you, for example over a secure email. (If there is 2FA that doesn't need a device that removes anonymity and is secure, use it.) (Please don't misunderstand, 2FA is great, however it can remove the anonymity that you worked hard to establish)
-Rethink how you do security questions. Many answers to security questions can be found in your internet history. One could use the first word of the security question as an answer, or a different sceme that will mean you always remember it. (Security question need to go, the amount of personal info an average person puts on the internet makes it easy to attack anything using security question) -------_ High level crimimal information security: The motto here is, "All the Security, All the Time" As one fuck up can end with you leaving a lick of traceability, and you could be fucked. Pre Note: All of your software should always be up to date. Also even perfect info sec does not guarantee you are completely safe, a new zero day (exploit) can still fuck you, but good info security makes you significantly safer, by eliminating as many attacks as possible. -Get a new device (or make a already owned device seem like you never owned it, do this only if you know how to, there's a lot of stuff that goes into that, like changing your mac adress etc) buy with cash, and your face covered, preferably far away from where you live. (Do I need to specify to not bring your phone or anything else that tracks your location to anywhere you want to go anonymously?) (Be aware that even hardware can have vulnerabilities, many cpus have known vulnerabilities, I can't list them all, do some research before buying)
Do not EVER use a high security device at any lower level of security. There are unique identifiers to your device, exposing them once can expose you for everything you do.
-If you know how to use Tails (A linux distro designed for Info sec) use that, preferably on a USB. (Or learn how to use tails, its better, but complicated) Otherwise a clean copy of windows (make sure its not in any way associated with you) can do the job too, tho not as well. (Using a VM might give extra security, since VMs usually erase all data and RAM they were using on shutdown) -Get a non tracking VPN, Enable the kill switch (a setting that disables all traffic that doesn't go through the VPN) (change your firewall settings to only allow the traffic from the VPN, windows guide (Change settings so only traffic from the tor application is send) Edit: (Due to complaints: do not use vpn over tor, use tor over vpn. tor over vpn has no notable downside, if the VPN logs it makes no difference, your ISP will always log anyways, and vpns remove other attack vectors and also provide backup security should tor fail. Again even if the VPN tracks you only change the people doing the tracking, but now you are further removed making it more anonymous and also with less vulnerabilities) -rember privacy settings, cookie cleaner, and antivirus, password (There could be a hidden administrator user on your PC, make sure to change its password) -Always use the device on a non admin account
-Ideally use this device only on networks that are not connected with you. Such as public networks (try to never use the same public networks twice, move around) (a home network should be fine now, as it should never be exposed, but more security is always better) (Its just a conveniences vs security trade) -Never use accounts that have been exposed to lower security on higher security machines -your browser is now TOR (or your preferred security focused browser, if you dont plan on using onion ) Make sure you get the standalone version of tor not the addon build (the standalone is safer, because there are less settings and options to tweak) -Change your tor settings, to safest mode, enable a bridge (to my knowledge there's no difference in security between the build in bridges in tor), enable automatic updates, set duckduckgo onion as your primary browser. Set dark.fail onion page as your home page. (Or your preferred privacy search engine and onion directory)
set up a new pgp (can't use the same one you use for regular use, again less safer accounts are never used on safer devices) Cleopatra is my choice, its simple to use. Make sure you back up the private key multiple times, on safe devices. (Dont let the private key fall into anyone's hands) Give it a generic name like "HighSecurityPGP" do not give the pgp key pair a name that could identify you. (No initials etc) (Some pgp key pair programs want an associated email for a key pair, you can create a safe email, or which I recoend you can use a different program (like Cleopatra) (Feds & LEOs are known to copy private keys if they have your machine, so you will need to set up a new key pair if they ever take a device with a private key copy)
a high security machine that facilitates criminal activity can not use many programs. Many programs collect your devices mac adress, which is a unique identifier, amongst other things. It's should be used only for the activity you want to do.
-------_ How to use dark net markets (DNMs) If you finished your High Security setup, we can dive right in. Otherwise go do that. This is where all that is essential. Quick info on Tor, and onion sites. There is no search engine. It's all based of directories and addresses you are given by others. Tor will likely not be very quick, it has to pass through multiple networks to get to the destination. DNMs sometimes exit scam, an exit scam is when a market shuts down completely and takes all the money, this is a risk when using DNMs, it's not too common but happens maybe 0-4 times a year. The admins of thoese servers need to get out at some point, before they get jailed, so they exit the game, and scam everyone out of their money. -A very useful onion directory is dark.fail it has a lot of links, for all kinds of stuff. News, email, DNMs, Psychonautwiki (harm reduction website), forums etc. (Other directories also exist) -Pick a market, preferably one that handles secure connection server side instead of requiring you to establish the secure connection. Then create an account. Your account once created should include an entry box in your profile for a pgp key, post your PUBLIC key in there. (Verify the link is not a scam, most markets should provide a pgp signature) -Next is currency setup. All major cryptocurrency exchangers can be used, I can recommend coin base but there could be better ones out there. Unless you find a small non U.S., exchange, they will always ask for your identity. So unless you can find a trustworthy exchange that doesn't ID, you will need to give it to them. (Side note, all major crypto exchangers report to the IRS, if the IRS asks you if you bought cryptocurrency and you bought while having IDed yourself SAY YES, DO NOT COMMIT TAX FRAUD WHEN THEY KNOW YOU DID)
I recommend using Monero, it's hard to track, so it makes your job a lot easier. (If you use bitcoin you should run it through a scrambler, because BTC is tracable to anyone who knows what they are doing)
-Transfer (monero you can send directly, btc you should scramble) to your wallet. There are two options a cold wallet (physical) or a software wallet. Software wallets usually dont cost anything so I recommend them, even if often less safe. Electrum is easy to use, and pretty safe. You can also do your own research and find a wallet that fits your needs.
decide where you want to ship it. You can send to your home, to a PO box, to a PO box that you opened with a fake ID (I don't recommend), an abandoned house, general mail (sending to a post office instead of a street adress) pickup up with fake ID, use a remailing service. These are some options, sending it to your own home, isn't ideal, but its pretty much the only easy way.
-now you are ready to buy, only buy using escrow (it means the money is held by the market as a middle man until the product is delivered, they will also handle any issues like wrong quantity, cuts, etc), judge the reviews for a product, and if available look at the history of the vendor, until you find a product from a vendor you trust. (I recommend to buy within your country as much as possible, so it doesn't go through customs, it's very rare that something is found, but it can happen) -now you get to buy, depending on market, you either have cryptocurrency stored in their wallets (not recommend, you will lose it in an exit scam) or you can send it every order. When you send your delivery adress (or the one you want it to go to) encrypt the adress using the sellers public key. Make sure the adress is correct. -wait for the product, make sure to extend the escrow until the product arrives, if you can't extend it anymore dispute the order, and a moderator will step in -test the product, use it, and leave a review. PLEASE LEAVE A REVIEW, DNMs only work because of reviews. Edit: Didn't imagine I would write over 15000 words. Oh well, it was fun. Hope it helps, if you have any questions feel free to ask. No idea how long this will stay up, I might purge it in 7 days, or never.
What I currently use for privacy (after almost 2 years of long investing into it)
https://preview.redd.it/nmajb5k9t4p51.jpg?width=897&format=pjpg&auto=webp&s=fddbf2b60270672dbefb7a74c65b468ee764489a Currently, Bitcoin investors usually store their Bitcoin holdings in cold or hot wallets. Cold wallets are usually hardware flash drives such as Ledger or Trezor wallets. which are not accessible from the Internet. Hot wallets, such as Electrum, are software wallets that are connected to Internet. Those investors who use “Buy and Hold” passive investment approach need to ensure a high level of security of their Bitcoin holdings. However, while holding Bitcoin in a crypto wallet provides certain level of security, it does not help investors to generate a passive income on their Bitcoin holdings. https://preview.redd.it/r5314ylet4p51.jpg?width=999&format=pjpg&auto=webp&s=652a49546c78c8f202f0a97c7501cbd7272f1971 Alternatively, you can deposit your Bitcoin to a secure Bitcoin interest account and receive up to 6% annually. We partner with BlockFi that offers high-yield Bitcoin savings accounts to customers from all over the world. BlockFi holds its Bitcoin and other digital asset reserves with Gemini. Gemini is a New York trust company regulated by the New York State Department of Financial Services. It is registered as a Qualified Custodian under New York Banking Law and has excellent reputation in the crypto space. Gemini stores digital assets using the most secure and compliant custody solution on the market. You can learn more about Bitcoin and its custodyhere. Legal Disclosure:The information contained in this article is the property ofDigital Finance LLCandcannot be republished without our prior permission. Digital Financeis a Washington, DC, financial company that specializes exclusively in the Bitcoin market. We provide easy and compliant exposure to digital assets and help our customers from all over the world toinstantly buy Bitcoinandearn up to 6% annuallyon their Bitcoin holdings.
Most bitcoin wallet software out there is a hot wallet. The bitcoins are easy to spend but are maximally vulnerable to malware or hackers. Hot wallets may be appropriate for small amounts and day-to-day spending. A user might have a spending account hot wallet for day-to-day convenient spending with the majority of their funds on a savings account which is stored with much more security (cold ... However, you can do your best to protect your currency by spending a small amount of time protecting your Bitcoin credentials with a USB flash drive wallet. Other Hardware devices. There are several other hardware device wallets out on the market. The Trezor and the Nano Ledger devices are the most popular, but that popularity comes with a steep price. These gadgets, which perform the same ... Copy wallet.dat (found in hidden folder .bitcoin in your home directory) to USB drive. Save bitcoin address to a text file and copy it to USB drive. Shut down system and turn off computer. Before switching your computer on again, remove all power sources for about 1 minute. Physically remove battery from laptop. Backup encrypted wallet.dat file in several places: Send it to your 5 best friends ... Open the Electrum folder on the flash drive and find an .exe file. Create a shortcut and bring it to the desktop. Launch Electrum on the flash drive, locate it in wallet.dat, and enter a password. Here comes a purse! It is a comfortable and reliable place for storage. What is more, it is not necessary to use namely a USB flash drive. In the ... Learn how to store bitcoins on a USB stick. Storing bitcoins on a USB stick is not as straight forward as storing regular data. Bitcoin private keys are secret codes and storing them on a regular USB stick leaves them at risk of theft if someone were to physically discover the USB. Luckily, entrepreneurs have created unique solutions that allow Bitcoin users to store coins on USB sticks or ...
Guys in this video I have demonstrated how you can create a 256bit AES encrypted USB flash drive to store your offline wallets inside the encrypted USB on a airgapped computer . Please follow me ... Protect your crypto assets with the most popular hardware wallet in the market the Ledger Nano - S https://bit.ly/2xg4H06 Sign up for a Coinspot account http... How To Make A Bitcoin Wallet Offline - Cold Storage Safe, Secure, Fast AND EASY! - Duration: 7:59. MunkeySpaz 4,744 views. 7:59. How To Keep Your Cryptocurrency Safe - Duration: 6:21. ... i do not participate in paid reviews or promotions. if you have been approached by someone on telegram claiming to be a part of the crypto tips team, they ar... How to Create a Bitcoin Cold Storage Wallet Using Electrum ... Rex Kneisley 7,559 views. 35:15. Best Cryptocurrency offline wallets inside 256bit AES encrypted USB flash drive - Duration: 28 :24 ...