has anyone actually tried compiling the windows wallet version of VTR with OTP_ENABLED? Is it not the same as their release? It's missing all the OTP stuff on their GitHub like askpassphrasedialog_otp.cpp etc... that's references when OTP_ENABLED is set.
LMAO.
Hmm good sir, what happened to "Fuck this thread. Im out." ? Please stay true to your word at least
I felt the obligation to do the due dilligence other people don't do of actually seeing of their real code is on Github, am I such a bad person?
has anyone actually tried compiling the windows wallet version of VTR with OTP_ENABLED? Is it not the same as their release? It's missing all the OTP stuff on their GitHub like askpassphrasedialog_otp.cpp etc... that's references when OTP_ENABLED is set.
LMAO.
So you were trying your best tickering around hoping to take vTorrent's 2FA awesomeness to your purevidz?
Im glad VTR dev keep 2FA from hopeless dev and people like you.
if you don't see the obvious problem with the danger in the wallet you're running being
closed source you're either a bag holder, a socket puppet or just an idiot
i wanted to see if the implementation is as pathetic as what i think it is which makes the point of 2FA completely pointless... see gauth requires a "secret" so the question is where is this secret being stored and how? i'm almost willing to bet that the gauth secret is simply stored encrypted by using your original passphrase, and then the decryption key for the wallet is probably something simple like the original passphrase concatenated with the gauth secret.
As long as there's some way to get the secret from the original passphrase/machine it sorta makes 2FA pointless. In other words, willing to bet that 2fa/otp is bypassable and useless but hey, it's the closed source life?
If i've over looked something then feel free to point me to the implementation on Github cause as far as I can see the files are missing.
dukeneptun, you are an idiot who try to fud on VTR's 2FA for being unsecured without any kind of proof, and VTR is completely open source since anyone could freely build a wallet just without 2FA.
If you really think VTR's 2FA is that pointless and its implementation is really as pathetic as you think it is then you should have no problem cracking my 2FA secured wallet but I'm willing to bet that you wont be able to do shit spending your entire life trying.
If you are willing to proof that you are not an idiot, left us an email, then I will send you my wallet.dat with password for you to crack.
VTR is completely open source since anyone could freely build a wallet just without 2FA.
this is literally the definition of NOT being completely open source... LOL
If you are willing to proof that you are not an idiot, left us an email, then I will send you my wallet.dat with password for you to crack.
read instead of strawmanning my clear concerns for lack of transparency in what a user running the wallet is using on their computer...
i wanted to see if the implementation is as pathetic as what i think it is which makes the point of 2FA completely pointless... see gauth requires a "secret" so the question is where is this secret being stored and how? i'm almost willing to bet that the gauth secret is simply stored encrypted by using your original passphrase, and then the decryption key for the wallet is probably something simple like the original passphrase concatenated with the gauth secret.
even if you sent me your wallet.dat, without having access to your entire computer and not knowing how the encrypted passphrase is stored since its
closed source i'd obviously not be able to obtain the gauth secret.
could someone figure out how it is stored without having the source? sure.... but who'd waste time reverse engineering something like that? Lol...