Avatar
Bitcoin Signal
3e6f0732e667fc52a88a294bf200ff9cec40867aefdb4ba5bbe317896ffc8b35
Bitcoin News and Promotion

Why is it that often when I use a webclient for Nostr I have trouble

making posts or liking? I am using Mullvad but I wouldn't think that

would matter. I'm also using Firefox and Linux. #asknostr

Even making this post the send button wouldn't work. I had to refresh Coracle.

nostr:nprofile1qyghwumn8ghj7mn0wd68ytnhd9hx2tcpzamhxue69uhhyetvv9ujuurjd9kkzmpwdejhgtcpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhszrnhwden5te0dehhxtnvdakz7qghwaehxw309aex2mrp0yhxummnw3ezucnpdejz7qgewaehxw309aex2mrp0yh8xmn0wf6zuum0vd5kzmp0qqsw3u8v7rz83txuy8nc0eth6rsqh4z935fs3t6ugwc7364gpzy5pscyda538 Can you add NIP-46 login for bitcoinmints.com? That is the NIP nsec.app uses right?

Replying to Avatar waxwing

Just read the "Dark Skippy" attack ( darkskippy.com ) from Lloyd Fournier and Robin Linux (h/t Alex Waltz). Nice write up! I've always thought it should be simpler than grinding, though (but the grinding in that attack is very practical). I feel like a variant of what they call 'predetermined nonce attack' on that page could work. If I make a *big* assumption - that the attacker has access to the victim's wallet's xpub - then I think you can extract the master secret from only 1 signature or 2 signatures, without any grinding or pollard rho. With 2 signatures the full master secret of the wallet; with 1, only the xpriv for the (BIP32) account (so compromises only 1 account; but many wallets just use one account anyway!).

Let's see if there's any error in these steps:

1. Attacker uses RNG to generate sequence of 32 byte randoms (b1, b2  ..)

2. First signature that the client requests is generated using b1 as nonce. hence attacker can obviously extract the secret key x1 = (s1 - b1) / e1.

3. We have to assume knowledge of xpub. Given xpub and one private key (x1) from the account branch, then due to unhardened derivation, we can already derive the xpriv for the account (though not for the level above; so this is equivalent to master secret, only for single-account wallets, not for multiple account).

But if we have access to 2 signatures we can exfiltrate anything, including the full master secret:

4. Second signature that the client requests, on (currently unknown) private key x2, is generated using nonce = (b2 + master secret), which is still indistinguishable from random because b2 is. Here we need the xpriv as per above to regenerate (poss. by trial and error, but that's trivial) the correct x2 given the above xpriv derivation. Then attacker extracts master secret = s2 - b2 -ex2.

(Am I wrong somewhere there? Wouldn't be too surprised. But either way, exfiltration via these channels *one way or another* seems like it's very hard to prevent. (I know there *are* anti-exfil measures in existence, so please don't take this as me dismissing them - I haven't even really studied them!).To generate bitcoin signatures on serious amount, use the software that's as easy as possible to vet and has the least layers between your eyes and it .. is my extremely unconventional advice on this topic).

He did say in his video he expects the attack to improve. Be very careful about signing from untrusted devices!

Nostr Wallet Connect is badass! I can use cashu.me with my mint and zap using my own funds! #cashu #bitcoin #nwc

Aqua is getting good for payments with some of the new updates. Aqua uses the second layer lightning network and Liquid sidechain on bitcoin. By using both it makes it easier to use both the lightning network for payments, but also store bitcoin easily on Liquid temporarily before deciding to move a lot of bitcoin to a more secure and permanent location. https://www.nobsbitcoin.com/aqua-wallet-v0-2-0/

An address starting with a '3' probably is some kind of multisig. I wonder why they didn't use bech32.

🤣 funny.

I troll them back saying crypto is boring. Im interested in finding a girlfriend and having a family. What is so exciting about money anyway?!

I keep asking them more about themselves and if they want me. I don't tell them anything about myself at all!

I think GraphineOS strips metadata from pictures when taking the pictue.

For vanilla Android Im not sure. Sometimes I have used another app like Signal to send and image to myself. I think apps like Signal will remove meta data when they are compresses. I sure hope they do!

Yeah. The lightning channels can be configured to take a fee on each deposit and withdraw. That's an honest way.

One could also rugpull after running a mint for awhile by turning off their mint and taking all the SATs in the lightning channels. So, be careful which mints you trust!

Where is a place on Nostr to comment on something Eric said?

Holding bitcoin could be seen as a service or businesss. Holding and hopefully selling, lending or using as colateral for a profit.

I don't follow why holding bitcoin is high time preference. Compared to what?

#bitcoin

Don't forget about Cheapair.com. They have been accepting bitcoin for a long time and even have their own BTCpay Server to accept bitcoin.

Where is the secret stored? I don't understand how oauth is being used.

I have never heard of Tangem or Safepal. If you can get the seed of those wallets you can import in into Electrum or Sparrow to do the CPFP. Im not sure if Blue Wallet does CPFP.

nostr:npub1mutnyacc9uc4t5mmxvpprwsauj5p2qxq95v4a9j0jxl8wnkfvuyque23vg I have pending transactions which I'm worried are going to cause a force closure.

What can I do about that?

The first pending transaction is expired if I try to pay from Zeus. The other three I paid from Zeus but they still say pending on Mutiny.