I am an idiot. Again. Questions for you, dear reader: Did you take my CLAM? Would you kindly return them?
Previously I lost 25 CLAM when they got swept from
xWAS3PbHr3FBdLsV1s8UYKuwXaJWMsTcjw.
Yesterday I lost another 25 CLAM when they got swept from
xXWEQ27z4etYknwN9ZHd8M5YtwcfBY5njR.
My only hope is that the person sweeping my coins is a "white hat" and they give them back. I also mention these embarrassing episodes so that others can learn from my stupidity.
Here is how I shot myself in the foot:
1 A long time ago when I first got into CLAM I was testing the client by importing random private keys I found on the internet into my wallet.
2 I knew that if I found a private key that had coins on it at the time of the airdrop I would get the free CLAM into my wallet.
3 I incorrectly assumed that if a private key did NOT have any coins at the time of the airdrop then the client would do nothing.
4
This is wrong. Any time you import a private key you create a key pair in your wallet. This makes sense to me now.
5 Since I imported well know private keys into my wallet this created little "time bombs" in my receive address list.
6 At some point I transferred CLAM on to these "time bomb" addresses.
7 Someone out there did the same thing I did, imported the same private keys, and they were able to sweep my coins.
Check out the private key for xXWEQ27z4etYknwN9ZHd8M5YtwcfBY5njR. It is obvious without any further research this is a very bad private key to use:
dumpprivkey xXWEQ27z4etYknwN9ZHd8M5YtwcfBY5njR
Lg7s3TveHSrHbpmAZ5Vmt9an6nim2f4gekrLRR5bJeJe81XuHc8z
Private Key Hexadecimal Format (64 characters [0-9A-F]):
00000000000000000000000000000000000000000000000000000000000068F3
Private Key Base64 (44 characters):
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAaPM=
Derp.