Pages:
Author

Topic: [ANN] ChipMixer.com - Bitcoin mixer / Bitcoin tumbler - mixing reinvented - page 63. (Read 92822 times)

legendary
Activity: 3472
Merit: 1722
Clearnet site takes a while to load for me, but eventually it does load. Onion site takes less time to load.
hero member
Activity: 910
Merit: 523
Everything ok on chipmixer.com? I got 502 Bad Gateway
or "this site can't be reached,  chipmixer.com took too long to respond"
member
Activity: 138
Merit: 20
early day i got an mail from the chipmixer team

they solved my problem

thnx for the quick response

best regards
legendary
Activity: 2856
Merit: 1520
Bitcoin Legal Tender Countries: 2 of 206
There is no fix yet  https://trac.torproject.org/projects/tor/ticket/29607

Tor project have plan what should be fixed, idea how to do that and vague idea how exactly to do that. Issue is 7 months old - it will not be ready this year.


Access via Tor is working again. Thank you!
legendary
Activity: 2758
Merit: 6830
So, Electrum shows this message as invalid. But some other tools show it as valid. This was my answer to OP after he sent me the signed message so I could test it.

Quote
Hey man,

I did some testing here and apparently Electrum is showing the message as invalid. My bet is that this is happening due to the empty line at the bottom of the message (see there is a line between the address and the --- SIGNATURE ---) which it ignores or doesn't verify properly.

However, I tested in another tools and it was verified.

For example:
https://tools.qz.sg/ - shows as valid (with the empty space at the bottom): - REMOVED SCREENSHOT DUE TO OP'S LETTER -
https://reinproject.org/bitcoin-signature-tool/ - shows as valid (also with the empty space at the bottom): - REMOVED SCREENSHOT DUE TO OP'S LETTER -

(both websites were the top links when I googled "bitcoin verify signature message online").

Meanwhile, others I couldn't make it appear valid. (e.g: https://btc.coin.space/messages/verify).

I remember seeing something like this before. Is this because Electrum trims the last empty line (at the end of the message)?
member
Activity: 138
Merit: 20
@TryNinja

u got an pm

best regards
legendary
Activity: 2758
Merit: 6830
@TryNinja

everything doubleproofed

it says that the signature is wrong

best regards
Did you put the empty line at the end?

Would you mind sharing it with me?
member
Activity: 138
Merit: 20
@TryNinja

everything doubleproofed

it says that the signature is wrong


best regards
legendary
Activity: 2758
Merit: 6830
could someoone explain to me how i can verify the receipt from chipmixer?

my receipt:

--- MESSAGE ---
This is a receipt / confirmation that you have received following
private keys from ChipMixer:
### CHIP SIZE: xxxxx BTC
Address: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx; Private key: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx


This message is signed with ChipMixer's Bitcoin address:
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

--- SIGNATURE ---
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
--- END ---

In which way i have to insert these infos in electrum that im able to verify the receipt ?

best regards
Tools -> Sign/verify a message.

A window will popup.

Put the whole message (marked as green) in the "Message" field.
Put the whole signature (marked as red) in the "Signature" field.
Put the address indicated in the message (bolded, and which is indicated by "This message is signed with ChipMixer's Bitcoin address") in the "Address" field.

Now click "Verify" and it will show up as valid or invalid. Make sure you don't miss any space or character.
member
Activity: 138
Merit: 20
could someone explain to me how i can verify the receipt from chipmixer?

my receipt:

Code:
--- MESSAGE ---
This is a receipt / confirmation that you have received following
private keys from ChipMixer:
### CHIP SIZE: xxxxx BTC
Address: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx; Private key: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx


This message is signed with ChipMixer's Bitcoin address:
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

--- SIGNATURE ---
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
--- END ---

In which way i have to insert these infos in electrum that im able to verify the receipt ?

best regards
member
Activity: 138
Merit: 20
@chipmixer:

Noted in the fossbyte article:

Quote
Besides this, there will be a new option for .onion site operators, using which they can enable defenses for their sites. Whenever it is enabled, Tor users will be able to access those sites under attack, but it will take a longer time to establish the connection.

Noted in the Ticket related to the Tor Issue:

https://www.hackerfactor.com/blog/index.php?/archives/777-Stopping-Tor-Attacks.html

But i think ure have it discovered already

best regards

member
Activity: 141
Merit: 62
There is no fix yet  https://trac.torproject.org/projects/tor/ticket/29607
Tor project have plan what should be fixed, idea how to do that and vague idea how exactly to do that. Issue is 7 months old - it will not be ready this year.

Analysis on Tor Ticket#29607:
===================
I think tor dev team need to realize that going after establish_intro() and place proof of work(PoW) burden on client and have guard enforce it with Enble_PoW_Defenese set by your service node isn't going to help.  From what I've seen a resourceful attacker (like government and banking sector with access to big data) can outperform standard user by order of magnitude >  2^10 or better; so the issue here isn't about how to make establish circuit more expensive but it had to do with tor routing layer enhancement to permit propagation to scrub / packet at the guard node(s).  Which is not going to be easy (similar to how BGP flow-spec works) because this feature can cause Tor network can potentially be unstable if implemented incorrectly (alot of testing, IMHO).

as of Sat Sep 28 04:20:21 UTC 2019, both

http://chipmixerwzxtzbw.onion
https://chipmixer.com

are up and I've completed about 15 successful sessions in less then 2 minutes.
sr. member
Activity: 456
Merit: 956
https://bitcointalk.org/index.php?topic=1935098
There is no fix yet  https://trac.torproject.org/projects/tor/ticket/29607

Tor project have plan what should be fixed, idea how to do that and vague idea how exactly to do that. Issue is 7 months old - it will not be ready this year.
copper member
Activity: 2856
Merit: 3071
https://bit.ly/387FXHi lightning theory
Quote
(did you do it recently)?



about 10 min before i have posted here

Update: i ve sent an email to chipmixer



Ah yeah they should be able to recover it then as long as you've sent either the deposit address or session token... You're fairly active on this thread so you probably already know it make take some time for then to respond so make sure your session doesn't expire before they do.
member
Activity: 138
Merit: 20
Quote
(did you do it recently)?



about 10 min before i have posted here

Update: i ve sent an email to chipmixer

thnx for guidance

best regards

copper member
Activity: 2856
Merit: 3071
https://bit.ly/387FXHi lightning theory
I've got an problem

i have forgot to note down the last 3 digits from my voucher code  ( yes i know incredibly stupid )

any chance to recover ?

best regards

Send them an email they might be able to help you. If you have the session token or the deposit address they will be more likely to work out its yours better (did you do it recently)?
member
Activity: 138
Merit: 20
I've got an problem

i have forgot to note down the last 3 digits from my voucher code  ( yes i know incredibly stupid )

any chance to recover ?

best regards
legendary
Activity: 2856
Merit: 1520
Bitcoin Legal Tender Countries: 2 of 206
EDIT: his response via PM:

better you try to learn the differences of the OSI layers next time.  Grin
Ty for the well thought comment, troll. Wink
Hey man, it's called "personal message" for a reason. Angry

On a side note, I actually have an exam tomorrow about Cisco's CCNA chapter 09 and the transport layer. So that's funny for you to say. lol Cheesy

ok, then this quick escalation is maybe usefull:

encryption (SSL) and addressing (IP) are using different layers. if a service is reachable via ordinary IP (and not Tor) collection of metadata is possible even if the data exchange is encrypted itself.

https://www.geeksforgeeks.org/tcp-ip-model/

EDIT: but could be CM is too lazy to update their Tor implementation because there was a DDOS fix not long time ago. but if I want to mix my coins I will ever connect via Tor to this service.
legendary
Activity: 2758
Merit: 6830
EDIT: his response via PM:

better you try to learn the differences of the OSI layers next time.  Grin
Ty for the well thought comment, troll. Wink
Hey man, it's called "personal message" for a reason. Angry

On a side note, I actually have an exam tomorrow about Cisco's CCNA chapter 09 and the transport layer. So that's funny for you to say. lol Cheesy
legendary
Activity: 2856
Merit: 1520
Bitcoin Legal Tender Countries: 2 of 206
tor side still down. honeypot?
Feel free to check the website SSL certificate.

better you try to learn the differences of the OSI layers next time.  Grin

EDIT: his response via PM:

better you try to learn the differences of the OSI layers next time.  Grin
Ty for the well thought comment, troll. Wink
Pages:
Jump to: