Pages:
Author

Topic: Quick theft (Read 1070 times)

full member
Activity: 297
Merit: 133
September 04, 2022, 07:56:41 PM
#64
I suspect that consensus for brain wallet's BTC theft can be achieved by highest fee. Still thinking about that though.
legendary
Activity: 2422
Merit: 1083
Leading Crypto Sports Betting & Casino Platform
September 04, 2022, 04:56:06 PM
#63
So someone has written program that quickly sends incoming BTC and is strictly connected to the network, right?
I think the answer is yes, and also, this kind of theft is not unique to Bitcoin alone, I actually think this started with Ethereum.

I remember when my first Ethereum wallet was hacked, what the op explain is what happened, as soon as transaction is getting confirmed, it is immediately sent out to another address, this is not something human being can do, human being can never be that fast.
A program written the Hackers is responsible for transactions.
copper member
Activity: 1666
Merit: 1901
Amazon Prime Member #7
September 04, 2022, 04:29:33 PM
#62
Quote
Someone engaging in what I describe would choose the brainwallets that are known to the person engaging in this behavior. This will include brainwallets both used and unused.

Who and how would choose that person?
I am saying that people are already engaging in this practice, and are taking the money for themselves, not giving it to the miners. These are people who have the resources, and technical knowledge to finance this type of operation. I don't think the altruism proposed by NotaTether is realistic.
legendary
Activity: 3500
Merit: 6320
Crypto Swap Exchange
September 04, 2022, 07:33:35 AM
#61
A programmer at a mining pool could be be doing this too.

Makes you wonder if you could take the addresses of all the known brainwallets / known compromised addresses find out which pools are mining the transactions and see if there is any commonality.

Doubt there would be anything to find, and it would be just about impossible to figure anything out if the programmer is using any form of opsec but it is an interesting thought.

-Dave
full member
Activity: 297
Merit: 133
September 04, 2022, 07:19:30 AM
#60
It would be better (from a big O notation standpoint) to have a *set* of all addresses associated with "known" brainwallets, and a hashtable whose key --> value pairs are address --> private keys. Another option would be to use a bloom filter when checking all addresses of outputs from all broadcast (or confirmed) transactions.

Who would be the one to choose which brainwallets are "known" or not? Is 2o8397tyh23047cj309487ycjm29 enough known or not?

It basically depends on whether their bots have scraped this site and others for brainwallet phrases or not. Most ommissions here are accidential, because no pirate looking for treasure would willingly overlook a map (to make a pun for this scenario).


Do I clearly understand that you want to ask each scraper for their brain wallet's list and then "block" these?
legendary
Activity: 1568
Merit: 6660
bitcoincleanup.com / bitmixlist.org
September 04, 2022, 06:56:24 AM
#59
It would be better (from a big O notation standpoint) to have a *set* of all addresses associated with "known" brainwallets, and a hashtable whose key --> value pairs are address --> private keys. Another option would be to use a bloom filter when checking all addresses of outputs from all broadcast (or confirmed) transactions.

Who would be the one to choose which brainwallets are "known" or not? Is 2o8397tyh23047cj309487ycjm29 enough known or not?

It basically depends on whether their bots have scraped this site and others for brainwallet phrases or not. Most ommissions here are accidential, because no pirate looking for treasure would willingly overlook a map (to make a pun for this scenario).
full member
Activity: 297
Merit: 133
September 04, 2022, 06:19:28 AM
#58
Quote
Someone engaging in what I describe would choose the brainwallets that are known to the person engaging in this behavior. This will include brainwallets both used and unused.

Who and how would choose that person?
copper member
Activity: 1666
Merit: 1901
Amazon Prime Member #7
September 04, 2022, 04:26:59 AM
#57
It would be better (from a big O notation standpoint) to have a *set* of all addresses associated with "known" brainwallets, and a hashtable whose key --> value pairs are address --> private keys. Another option would be to use a bloom filter when checking all addresses of outputs from all broadcast (or confirmed) transactions.

Who would be the one to choose which brainwallets are "known" or not? Is 2o8397tyh23047cj309487ycjm29 enough known or not?
Someone engaging in what I describe would choose the brainwallets that are known to the person engaging in this behavior. This will include brainwallets both used and unused.
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
September 04, 2022, 04:25:43 AM
#56
Who would be the one to choose which brainwallets are "known" or not?
Whoever created the "burn it in fees"-service, obviously Smiley
legendary
Activity: 1512
Merit: 7340
Farewell, Leo
September 04, 2022, 04:16:23 AM
#55
Is 2o8397tyh23047cj309487ycjm29 enough known or not?
This seems a very invalid address.
full member
Activity: 297
Merit: 133
September 04, 2022, 04:10:02 AM
#54
It would be better (from a big O notation standpoint) to have a *set* of all addresses associated with "known" brainwallets, and a hashtable whose key --> value pairs are address --> private keys. Another option would be to use a bloom filter when checking all addresses of outputs from all broadcast (or confirmed) transactions.

Who would be the one to choose which brainwallets are "known" or not? Is 2o8397tyh23047cj309487ycjm29 enough known or not?
copper member
Activity: 1666
Merit: 1901
Amazon Prime Member #7
September 04, 2022, 04:04:47 AM
#53
One of these days, somebody should make a database. With a few hundred gigabytes of memory. It should have all of the common brainwallet private keys and legacy addresses inside it.

Then, you make a "lite" version of Bitcoin Core with only methods for address check balance and make [RBF] transaction. So that Core loads faster.

Now, run a loop, checking each and every address for a balance, then you create a transaction that burns the ENTIRE balance in fees. Attackers won't be able to bump this transaction with their own, because nearly the entire balance has already been allocated to miners anyway.

Bitcoin - even the stolen coins contribute to the network security. (Denial-of-service for theives.)

It would be better (from a big O notation standpoint) to have a *set* of all addresses associated with "known" brainwallets, and a hashtable whose key --> value pairs are address --> private keys. Another option would be to use a bloom filter when checking all addresses of outputs from all broadcast (or confirmed) transactions.

The biggest problem with your proposal is that what you propose (along with my suggested improvements) costs money. I suspect that many have already implemented something similar to what you propose (or perhaps, more likely, something similar to my improvements), and are quickly broadcasting transactions to addresses they control.
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
September 04, 2022, 03:50:51 AM
#52
This sounds terrible, and no; I'm not a black hat actually. Introducing third parties who get involved within the payer and the destination is just terrible, not from an ethical neither from a technical side. It's bad from a pro-individual and ideological perspective. Having third parties protect the users, besides censorship vulnerable, defeats the purpose of making humans more responsible for their actions. Protecting dumb people from doing dumb decisions doesn't stick with self-custody and censorship resistance.
You make many good points Smiley I don't expect it to happen, I just said it would get interesting Wink

My opinion: miners shouldn't get involved in deciding which transaction gets confirmed on anything else than economic grounds.
legendary
Activity: 1512
Merit: 7340
Farewell, Leo
September 04, 2022, 03:19:05 AM
#51
It would get interesting if a white hat organisation gets support from mining pools to protect dumb users from sending their funds to known compromised addresses.
This sounds terrible, and no; I'm not a black hat actually. Introducing third parties who get involved within the payer and the destination is just terrible, not from an ethical neither from a technical side. It's bad from a pro-individual and ideological perspective. Having third parties protect the users, besides censorship vulnerable, defeats the purpose of making humans more responsible for their actions. Protecting dumb people from doing dumb decisions doesn't stick with self-custody and censorship resistance.

Don't catch them fish. Educate them fishing.
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
September 04, 2022, 03:04:55 AM
#50
What about _replacing_ the transaction?
Highly unlikely to be successful.
It would get interesting if a white hat organisation gets support from mining pools to protect dumb users from sending their funds to known compromised addresses. They could give their own transaction priority and return the funds.
legendary
Activity: 2268
Merit: 18748
September 03, 2022, 03:37:43 PM
#49
What about _replacing_ the transaction?
Highly unlikely to be successful. Any even semi-competent attacker will not flag their stealing transaction to be opted in to RBF, since any other attacker could immediately replace it and steal it from them. Since their transaction will not be opted in to RBF, then any replacement transaction, even with a higher fee rate, will be rejected by the vast majority of nodes and therefore highly unlikely to be mined.

That is, until Core version 24.0 is released and we move to full RBF. Then it will start to depend on how many nodes choose to enable full RBF and how many continue to work with opt-in RBF.
full member
Activity: 297
Merit: 133
September 03, 2022, 02:43:19 PM
#48
That's the solution to "steal" BTC incoming to your wallet.

If you happen to be faster than the existing bots, which I doubt. My node and wallets usually never see only the funding transaction of a known private key's derived address(es) but commonly almost immediately the "stealing" transaction by the existing stealer bots.

What about _replacing_ the transaction?
hero member
Activity: 714
Merit: 1010
Crypto Swap Exchange
September 03, 2022, 01:25:49 PM
#47
That's the solution to "steal" BTC incoming to your wallet.

If you happen to be faster than the existing bots, which I doubt. My node and wallets usually never see only the funding transaction of a known private key's derived address(es) but commonly almost immediately the "stealing" transaction by the existing stealer bots.
full member
Activity: 297
Merit: 133
September 01, 2022, 06:18:01 PM
#46
Bitcoin-cli -getinfo does not give unconfirmed amount for any wallet.
Walletnotify does not give amount which has moved to/from wallet.

And because of the above, there is no automatic way using Bitcoin Core to steal the funds (using these two options above).

EDIT:

There is a way!

If you do:
walletnotify=script %s

Then in %s is transaction id. You can then ask for this transaction's amount:

bitcoin-cli -rpcwallet=your_wallet gettransaction $1

Then you can extract the amount by jq and awk.
With given amount you can immediately send the amount to your address with bitcoin-cli.

That's the solution to "steal" BTC incoming to your wallet.
jr. member
Activity: 51
Merit: 20
August 22, 2022, 12:57:25 PM
#45
I have 13.33 GiB of such. Plain text. Nothing found. Ppl switched to random wallets.
Was the address in the OP in your list already? If so: did someone else beat you to it, or did you only find it later?
It was an empty string. So guessing already in the list.
Pages:
Jump to: