Author

Topic: Send from Core address to Electrum (Read 247 times)

sr. member
Activity: 382
Merit: 256
November 02, 2017, 11:05:36 AM
#3
This is a viable plan. This way is definetly secured as long your computer is not compromised and you don't fall for any faked/compromised wallet software.
To pretend a replay attack you would have to send your BTC (currently sitting in your electrum wallet) to a new (3rd) wallet.
At this point your BTC's are safe. The only transaction which could be replayed at this time would be the TX to your (new) wallet on the BTG chain.
And this wouln't harm you at all. So your coins are safe in this scenario.

Thanks bob123, appreciate your help.  For the 3rd wallet, I will send to exchange after the B2X fork and buy some alts.
legendary
Activity: 1624
Merit: 2481
November 02, 2017, 10:00:40 AM
#2
This is a viable plan. This way is definetly secured as long your computer is not compromised and you don't fall for any faked/compromised wallet software.
To pretend a replay attack you would have to send your BTC (currently sitting in your electrum wallet) to a new (3rd) wallet.
At this point your BTC's are safe. The only transaction which could be replayed at this time would be the TX to your (new) wallet on the BTG chain.
And this wouln't harm you at all. So your coins are safe in this scenario.
sr. member
Activity: 382
Merit: 256
November 02, 2017, 04:32:10 AM
#1
Hi, I recently had BTC in my core wallet and was snapshotted for Bitcoin Gold fork.  I don't want to use the same address for the snapshot of B2X due to potentially losing my coins.

What I was planning to do was install Electrum, then send my BTC to a receiving address in the Electrum wallet.  The Electrum wallet address will then be snapshotted for the B2X fork.

Is this the way other users are managing the forks, and is this a good and secure way to do this?

Then I could use the private keys from core to claim by BTC gold, then use the private keys from Electrum to claim B2X.  What to do with the BTC to prevent replay?

Jump to: