Binance Square
LIVE
JF2019
@Square-Creator-6a5635015
Following
Followers
Liked
Shared
All Content
--
See original
Excellent 👍
Excellent 👍
LIVE
申屠青春
--
Recently, GPU computing power is being deployed, aiming to increase the computing power to 5-6 times that of before. More GPU computing power will help recover password clues that could not be exhaustively searched before, such as masks longer than 10 days, which were previously not calculated due to the long duration, unless all other password patterns had been tried. Now, it only takes 1-2 days to compute, making it easier to achieve results. Of course, the costs involved are also considerable.
See original
Stay tuned
Stay tuned
LIVE
申屠青春
--
The encoding and internal testing of SAFE4 have been basically completed. Currently, a well-known security company has been engaged to conduct a security audit of the code and smart contracts. Once the audit is completed and all bugs are fixed, the SAFE4 launch schedule will be announced. Please stay tuned and thank you for your patience.
See original
Please be informed
Please be informed
LIVE
申屠青春
--
Things about Public Wallets
Password recovery is like sailing a small boat on an endless ocean, casting a net in the hope of catching the only small fish in the vast sea...

1. Introduction

"My relative went away, and we found this Bitcoin wallet on his computer. Can you help us recover it?"
"My friend is a miner; he is a very reliable person. He gave me this wallet, and I spent 3.6 million to buy 20 high-end machines for recovery, but after running for half a year, I still haven't succeeded. You have experience; can you see what the problem is?"
"My friend owes me money and won't pay it back; he gave me this wallet as a settlement. Can it be recovered?"
See original
Indeed, a cryptography expert. Professional and reliable 👍
Indeed, a cryptography expert. Professional and reliable 👍
LIVE
申屠青春
--
Today we recovered an imtoken wallet for a Huawei P20. The customer forgot the password and the recovery phrase, but there were password clues. After we got the phone, we obtained the imtoken keystore data and used the password clues to run computations. Fortunately, the password clues were quite sufficient, and after 2 hours we found the correct password.
See original
Third Continuation
Third Continuation
LIVE
safewallet最安全钱包
--
Interstellar Chain Talks (III)
On the boundless stage of the crypto world, plot twists are always unexpected. Just as Satoshi Nakamoto and Shentu Qingchun were deeply discussing the future of blockchain technology, an unexpected participant joined their conversation—Donald Trump, who had returned to the presidency of the United States and was known for his controversial presence in politics and business, showing a keen interest in emerging technologies.
Trump joined the interstellar conference through an encrypted communication channel, and his appearance surprised both Satoshi Nakamoto and Shentu Qingchun. Trump said in his trademark straightforward manner: "Gentlemen, I have been following your conversation, it's very interesting. I believe blockchain technology has the potential to change the world, and I want to learn more."
See original
The mobile app wallet being closed source may bring the following potential risks: 1. **Security Vulnerabilities**: Closed-source wallet applications may not have been reviewed by third-party security experts, thus there may be undiscovered security vulnerabilities. These vulnerabilities could be exploited by hackers, leading to theft of user funds. 2. **Privacy Leakage**: Closed-source wallets may collect personal data without the user's knowledge, which could include transaction information, contact lists, device identification information, etc., posing a risk of privacy leakage. 3. **Malicious Code**: Since users cannot view and verify the code of closed-source wallets, the possibility of the wallet containing malicious code, such as backdoors or monitoring software, cannot be ruled out. 4. **Dependency Risks**: Users of closed-source wallets are entirely dependent on the updates and support provided by the developers. If the developers stop maintenance or the project is abandoned, users may find themselves in a difficult situation. 5. **Lack of Transparency**: Being closed source means users cannot know exactly how the wallet operates internally, which may lead to doubts about the wallet's security and credibility. 6. **Trust Issues**: Users need to fully trust the developers of closed-source wallets since there is no open code review to validate the wallet's security and correctness. 7. **Malicious Developer Actions**: Developers of closed-source wallets may deliberately embed malicious features in the code, such as hidden transaction fees or unauthorized fund transfers, which users cannot detect through code review. To mitigate these risks, users should consider choosing wallets that are open source and have undergone security audits. This can ensure the wallet's security and transparency. Additionally, users should pay attention to protecting personal information, regularly update the wallet application, and use strong passwords and two-factor authentication to safeguard their account security.
The mobile app wallet being closed source may bring the following potential risks:

1. **Security Vulnerabilities**: Closed-source wallet applications may not have been reviewed by third-party security experts, thus there may be undiscovered security vulnerabilities. These vulnerabilities could be exploited by hackers, leading to theft of user funds.

2. **Privacy Leakage**: Closed-source wallets may collect personal data without the user's knowledge, which could include transaction information, contact lists, device identification information, etc., posing a risk of privacy leakage.

3. **Malicious Code**: Since users cannot view and verify the code of closed-source wallets, the possibility of the wallet containing malicious code, such as backdoors or monitoring software, cannot be ruled out.

4. **Dependency Risks**: Users of closed-source wallets are entirely dependent on the updates and support provided by the developers. If the developers stop maintenance or the project is abandoned, users may find themselves in a difficult situation.

5. **Lack of Transparency**: Being closed source means users cannot know exactly how the wallet operates internally, which may lead to doubts about the wallet's security and credibility.

6. **Trust Issues**: Users need to fully trust the developers of closed-source wallets since there is no open code review to validate the wallet's security and correctness.

7. **Malicious Developer Actions**: Developers of closed-source wallets may deliberately embed malicious features in the code, such as hidden transaction fees or unauthorized fund transfers, which users cannot detect through code review.

To mitigate these risks, users should consider choosing wallets that are open source and have undergone security audits. This can ensure the wallet's security and transparency. Additionally, users should pay attention to protecting personal information, regularly update the wallet application, and use strong passwords and two-factor authentication to safeguard their account security.
See original
Sequel...
Sequel...
LIVE
safewallet最安全钱包
--
Satoshi Nakamoto and Santu Qingchun (Part II)
In the aftermath of the virtual meeting, the dialogue between Satoshi Nakamoto and Santu Qingchun came to a close, but their thoughts shone like sparks in the night sky of the crypto world. Santu Qingchun mentioned the SAFE 4.0 in the conversation, which is a bold attempt in the blockchain field aimed at solving some key issues in existing blockchain systems.
The core of SAFE 4.0 is its innovative on-chain custody function, a technology that allows users to lock assets on the blockchain, which can only be unlocked when the locked block height is reached. This feature provides users with a new way of asset management, helping to solve the liquidity pressure for project parties, community consensus, and retail investors' concerns, supporting multiple blockchains such as ETH, BSC, and Solana. Satoshi Nakamoto expressed great interest in this, believing it to be an expansion of the application of blockchain technology and a further practice of the decentralized concept.
Translate
各位加密用户.注意保存记录好,如遗失可联系申屠青春博士本人。
各位加密用户.注意保存记录好,如遗失可联系申屠青春博士本人。
LIVE
AICoin官方
--
🧐 Hardware Wallet Security | Why it is essential to set and remember your hardware password — [Password recovery, contact via private message]
🧐 Hardware Wallet Security | Why it is essential to set and remember your hardware password —

[Password recovery, contact via private message!]

Some netizens say that having a mnemonic phrase is enough, and there's no need to remember the password. This is true for general mobile hot wallets, but it doesn't apply to certain software wallets and most hardware wallets.

Because when using the BIP39 standard to generate a seed from the mnemonic phrase, these wallets require a password to generate the correct address. Without the password, you cannot obtain the correct address. Such as Ledger, Bitcoin Core Wallet, Trezor's private wallet, and SafeWallet with a password.
See original
If you want to know what happens next, please continue to follow ➕
If you want to know what happens next, please continue to follow ➕
LIVE
safewallet最安全钱包
--
Title: "Satoshi Nakamoto and Shentu Qingchun"
In the world of cryptocurrency, the names Satoshi Nakamoto and Shentu Qingchun are often discussed. Satoshi Nakamoto, the legendary father of Bitcoin, whose true identity remains a mystery; and Shentu Qingchun, a geek passionate about blockchain technology, whose story inspires countless followers.
The two met at a virtual blockchain conference. Satoshi Nakamoto, hidden behind the screen, used his iconic anonymous style, while Shentu Qingchun sat in front of his computer, his eyes revealing a thirst for knowledge and infinite imagination for the future.
See original
Dr. Shentu is reliable 👍
Dr. Shentu is reliable 👍
LIVE
申屠青春
--
A girl bought more than 1.3 million doge in September 2017, recorded the mnemonic phrase for Bitpie, but forgot the address. In November 2021, when the price of doge soared, she imported the mnemonic phrase multiple times but made mistakes, clearly indicating that the recorded mnemonic phrase was incorrect. She then entrusted a person from Zhuhai to sign a contract to retrieve the correct mnemonic phrase, but others said they had not found it, so she had to give up.

This May, she entrusted me to retrieve the doge, and I helped her find the correct mnemonic phrase, but by then, the doge had already been transferred to an exchange and sold just a few days after signing the contract in November 2021. Since she forgot the address, she had been unaware of this matter.

Therefore, recovering passwords or wallets is a cautious matter, and one must be careful about whom to trust, or else it could lead to total loss...
See original
LIVE
申屠青春
--
Successfully recovered two hardware wallets in early September. One is the old version of the Library God, which cannot be powered on and has no recovery phrase or password. Data was successfully extracted from the chip, but unfortunately, the encrypted information regarding the coin address mentioned by the user was not found, possibly due to the main file being deleted, which caused it to not power on;

The other is a Trezor Model One hardware wallet, which has no recovery phrase and the high-level password was forgotten. After extracting data from the chip and running high-level password cracking with computing power, after two months of effort, it was finally successfully recovered.
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number

Latest News

--
View More

Trending Articles

avatar
The Cryptonomist
View More
Sitemap
Cookie Preferences
Platform T&Cs