It could be quite important to have that harddrive with the OS examined, as it might have information about what you used it for back in 2010, which websites were visited, which software was installed etc..
Windows keeps track of all this, and it's possible to dig into this stuff.
If the harddrive with the Operating System has been formatted since you used it in 2010, there is a risk some of the missing information has been overwritten by other data, but still there would be a chance some important parts of the puzzle could emerge.
I would suggest you stop using any of the harddrives, and get some help in securing these into digital images for a proper examination.
As stated in one of my earlier posts, i've been working with stuff like this for many years, and willing to help in whatever capacity fits you.
I get that trust is a big issue here.
Feel free to reach out in private messages (if you can)
Never played the formatting game. Once it goes on a drive it stays on a drive & I leave it. Never really needed to format anything other than a small drive that was attached to a pen. Did it just for fun. Had the option other Fat32 or NTFC from memory. Again no idea what I was doing just picked one hit format thought wow that was fun & never used the format function again for anything.
I get what your saying about the external harddrive & understand next level stuff would be required to recover the data. If I ever were to find it I'll wrap it in cotton wool before I do move it but I dont think it matters. It's pretty fair to say nothing has going to have changed since computer dude touched it. It's just been moved from place to place heaps of times same as this Seagate. I managed to find that pulled that apart, bought the sata universal jack, plugged it in & it booted straight away. That thing hadn't been touched in 10+ years just didn't have the files I thought it had. I knew straight away it wasnt identical to the orginal external harddrive cause there was no porn file in the first list of files so had to rethink what happened. 😂
I tried to PM you today. Got error saying can't message newbie.
Strange, I have the option to accept messages from newbies enabled in my settings.
Yo John,
It's probably about time to fess up. There is a very good chance I did use Keypass for the private keys. Master key is the dead giveaway. It's been on my radar along with encrypted keys from the get go just didn't know where it fit in.
My memory squishes everything I've ever done together when it comes to encryption. I was sure PGP keys were used same as what you would use for encrypted messages but I was getting them confused with private keys.
Was talking to a mate (computer programmer) about it the other day & he was adament PGP keys in there format were never used then imported into a program to create a wallet. I tried arguing with him & was meant to go away from the conversation then prove him wrong. Turns out he's right I'm wrong & what you have suggested is a piece of the puzzle I'm missing
I'm not exactly sure what I should & shouldn't be sharing on a forum that can be seen by the entire world. Just trying to play it pretty safe right now. I do appreciate your help so far & I've always found that honesty is best policy in life & it doesn't feel right not to confess before I move forward. Just been playing a bit "dumb" on the thread so people don't take too much notice of it unless they really know what they are talking about. I knew most of what people would say already ie. Mnemonics on blockchain.info, Github & wallet.dat blah blah blah.
I haven't figured out where the 8 words fit in to Keypass yet nor have i tried Googling it either. Been waiting for my mate to reply to yestersdays messages with the new information but he takes forever.
Been talking on Signal not SMS & he keeps notifications off. No doubt hes sick of getting message bombed by me for 2 weeks straight. Using his account as a record of what we both come up with as we go.
Plan on getting a new computer for anything that has to happen off-line that's never connected to a network. My understanding is thats an air gapped computer.
Ive read horror stories of people losing coins to malicious code written into programs on Github. If I'm going to keep going down this road I want to do it right & double then triple check everything I do before I do it.
Right now I'm assuming the next step is definitely the new computer along with downloading older version of Keypass to see what the story was at the time.
Open to suggestions. Appreciate your help & you will not be forgotten if I do manage to pull this miracle off.
Kind Regards,
UJ
There's my message to John for everyone to see. I see no issue posting this after some thought. As of now two people on this forum have been emailed pics of the Seagate drive I keep banging on about. Seagate 1TB not 2TB Barracuda. Released Q1 2011. I bought the coins before drive was ever released so there your concrete evidence it happened in 2010 folks.
I know this forum has the knowledge & talent to figure this out. Ive seen alsorts of crazy stuff being done on here. Just need the right people to take me seriously. Here's an example of what I'm talking about...
https://bitcointalksearch.org/topic/how-is-a-private-key-generated-from-the-seed-phrase-5249764Plan on going to the cryptology department at MIT next. I'm not fooling around I'm just plain lost & being overly cautious. It's only been two weeks since starting this wallet rebuild quest started. The external drive stuff has to be secondary till Xmas. Even then I might not find anything & it's just waiting two months.
Basic best practice in data recovery is to avoid touching the original storage media/drive as much as possible. You make one or more forensic master copies (bit-by-bit, every sector of source device needs to be copied). Faulty media is a challenge, there are some tools to deal with problematical source media. A common Linux tool would be ddrescue that tries to read as much as possible from a faulty media in a clever way, reading first all the good parts and then approaching the bad spots. Beware that stressing an already faulty drive could finally break it.
From master copies you make work copies and do any recovery steps on such disposable work copies. The idea is to be able to always create a fresh work copy of the original source media. If you screw up, doesn't matter, you can always restart with a new fresh work copy.
Tried copying the 1TB old Seagate drive today to the new 5TB drive myself. Didn't work so went to the local computer & asked if the guy there was prepared to try. He was fine with it...also gettting another new 2TB drive today so he's working with a brand new drive that has never been touched & the 1TB old Seagate.
Asked about Linux & Ubuntu. He just me down & said don't over complicate the process. Wants me to wait till he's done a scan with whatever program he uses first before going any further.