Pages:
Author

Topic: Wall Observer BTC/USD - Bitcoin price movement tracking & discussion - page 50. (Read 26710050 times)

sr. member
Activity: 476
Merit: 299
Learning never stops!
hero member
Activity: 1120
Merit: 571
Name: Shabloot (Urdu Language)

Just discovered this dry fruit in my local fruit market and it's written in urdu language that "This fruit is for Diabetes"

Anyone has tried this Huh

legendary
Activity: 2380
Merit: 1823
1CBuddyxy4FerT3hzMmi1Jz48ESzRw1ZzZ

Explanation
Chartbuddy thanks talkimg.com
legendary
Activity: 2380
Merit: 1823
1CBuddyxy4FerT3hzMmi1Jz48ESzRw1ZzZ

Explanation
Chartbuddy thanks talkimg.com
legendary
Activity: 2520
Merit: 3038
About recent dumplets (or dumps for ants, as some dude or a football maniac could say).

There were different explanations. The first dumplet was because Powell blah blah we cut less next year blah blah we can't hold bitcoin because blah blah. The second dumplet was because TradingView glitch blah blah showing btc dominance at 0 for a short while blah blah.

To me this smells like whale play all over. I'm reminded that tomorrow we have the last monthly option expiry of the year. I don't have reliable data (and anyone who does would be welcome to post a summary here), but my guess is that calls at 100k or slightly over that might be among the most popular options to expire. Now if I were a whale writing (selling freshly made) options, I sure wouldn't like the corn to be at 100k or more. Suppressing the price with the holiday season low volume is a low hanging no brainer.

Let's see what happens after 4PM or 5PM UTC - or whenever the time of expiry tomorrow.

Just sayin'...

Notice the suspect timing...

Also, where is the bulk of the expiring puts located? If it's options related, that would be our bottom for this flash crash.
legendary
Activity: 2380
Merit: 1823
1CBuddyxy4FerT3hzMmi1Jz48ESzRw1ZzZ

Explanation
Chartbuddy thanks talkimg.com
legendary
Activity: 4354
Merit: 9201
'The right to privacy matters'
six in a row is enough buddy
legendary
Activity: 2380
Merit: 1823
1CBuddyxy4FerT3hzMmi1Jz48ESzRw1ZzZ

Explanation
Chartbuddy thanks talkimg.com
legendary
Activity: 2380
Merit: 1823
1CBuddyxy4FerT3hzMmi1Jz48ESzRw1ZzZ

Explanation
Chartbuddy thanks talkimg.com
legendary
Activity: 2380
Merit: 1823
1CBuddyxy4FerT3hzMmi1Jz48ESzRw1ZzZ

Explanation
Chartbuddy thanks talkimg.com
legendary
Activity: 2380
Merit: 1823
1CBuddyxy4FerT3hzMmi1Jz48ESzRw1ZzZ

Explanation
Chartbuddy thanks talkimg.com
legendary
Activity: 2380
Merit: 1823
1CBuddyxy4FerT3hzMmi1Jz48ESzRw1ZzZ

Explanation
Chartbuddy thanks talkimg.com
legendary
Activity: 2380
Merit: 1823
1CBuddyxy4FerT3hzMmi1Jz48ESzRw1ZzZ

Explanation
Chartbuddy thanks talkimg.com
legendary
Activity: 2380
Merit: 17063
Fully fledged Merit Cycler - Golden Feather 22-23


The dude arrived on his celebrating BTC and new years destination

Were is it … merit boost worthy for the correct location

Thank you BTC
Rio de Janeiro, Copacabana, Avenida Atlantica somewhere.
 Rainy weather confirmed and ruled out other locations.
legendary
Activity: 2590
Merit: 4839
Addicted to HoDLing!
AFA losing access to your trezor, it doesn't matter, if you lose access to any wallet move your coins immediately!

You seem to be suggesting that it does not matter if the Trezor has a secure element or not?

If you lose physical possession of your trezor, then the coins should be moved?

I always considered the standard wallet (the one without a passphrase) to be a canary in the coalmine, if it were to get jeopardized first.

The idea is that, once you realize your Trezor (or other wallet) is gone, you use your seed backup to restore it (on a new Trezor or other device) and then immediately move your Bitcoin to a completely new wallet (with a brand new seed). Even if your stolen Trezor's PIN is not too strong, it should be strong enough to withstand a few hours or days of brute-force, so by the time the thief has cracked your PIN, your (old, stolen) wallet will be empty.

Of course, if you haven't used (3) and/or (4) below, the thief will still know that you have emptied the wallet, when you emptied it, and the amount of Bitcoin moved, so be prepared for a $5 wrench attack soon after...

My advice:

1. Keep a low profile -- don't advertise your coins.
2. Always use a PIN.
3. Always use a strong passphrase.
4. Plausible Deniability (it's easier than it seems).
5. Protect your Trezor (or other wallet) as if it were cash -- never lose physical access to it.
sr. member
Activity: 504
Merit: 426
Playbet.io - Crypto Casino and Sportsbook
https://www.reuters.com/markets/currencies/russia-is-using-bitcoin-foreign-trade-finance-minister-says-2024-12-25/

Bitcoin already used for foreign trade in Russian Now and with what's stated in the post.
Putin is pushing for Bitcoin as reserve because it's not own by anyone and would affect US dominance

I believe the De dollarization team would find it attractive once Russian incorporates it
But Trump that wants US dollar to remain the greatest?  quite skeptical except he makes sure US does it first before other giants implement it.
So they can enjoy the same sham with Gold as reserve then.

2025 Super Bullish.
legendary
Activity: 2380
Merit: 1823
1CBuddyxy4FerT3hzMmi1Jz48ESzRw1ZzZ

Explanation
Chartbuddy thanks talkimg.com
hero member
Activity: 938
Merit: 1891
bitcoin retard
plications to potentially lock us out of our coins, too..
just to pile on, these are ones ive owned
used Trezor One since they came out   -  no probs (but hardware itself can be compromised if someone has physical access to it and the equipment)
use Trezor T since they came out    -  no probs
used Ledger - FUCK NO   nothing but risk here. stay away
afaik, that's not true anymore. It depends all on the lengths of your PIN
If a bad person (who knows something or knows someone who knows something), they can get you private keys (or your seed words) in a matter of 15 minutes (or something like that), so they can get anything on your non-passphrase wallet, and your pin doesn't do anything.  But they cannot get you passphrase wallets unless they are able to guess them or brute-force them.
yeah, but we talked about the attack vector of physical access to the device.. (with regard to secure elements)

A passphrase should always be used, secure element or not

I understand that the passphrase provides an extra layer of security, yet it seems that the passphrase is way more justified with a non-secure element device.  I have not heard about the seed phrase being extracted from secure element kinds of devices, whether Trezor or otherwise... yet I also don't claim to be a technical guru or to follow security vulnerabilities in details if it is not coming out in some kind of more generally release kind of way or being mentioned in one of the forum threads.



Sure, you cannot extract the seed from an SE. But the company that builds the SE can.
Why should I trust some centralized entity when there is no need for it?


With a non-SE device:

PIN protects the device.
Passphrase protects the seed.
In that order.

Of course you can use the passphrase for protecting the device while having a weak PIN.

But why weaken the security? And you also open up the possibility that someone can move your coins if he solely has the passphrase and gets hold of your device (because it's protected by a weak PIN)
hero member
Activity: 938
Merit: 1891
bitcoin retard
....At the same time, I would suggest that you are wrong in regards to your description of the vulnerability being ameliorated by having a stronger pin number, which I believe hardly does shit if someone has  physical access to the device with a non-secure element.  
....
no no JJG .... The PIN is used to encrypt the seed on your device. A strong (long) PIN cannot be cracked via brute force, so it's not possible to decrypt your seed when someone gets hold of your device.
That's why Trezor enabled PINs with 50 digit length (maybe longer), when they fixed the vulnerability of physical access a few years ago.  

Means, if your PIN is long enough (has enough entropy) nobody can get the seed out of your device.
No (un)secure element needed !

I recall that the security breach of having physical access to the Trezor was from several years ago, and I thought that the ONLY remedies was avoiding physical access to the Trezor and/or having a passphrase, as is stated in this Kraken Blog article.  The Article describes brute forcing the pin too, yet I cannot recall the pin being less vulnerable based on length and complication, even though what you say makes sense if they have to brute-force the pin, too.

Until I see something more clear, I will have to take what you are saying about the creation of a more robust pin (as the solution to the problem) with a grain of salt.


haha no need to trust me.... that the PIN protects your Trezor against physical attacks by encrypting the seed is written in the adtual article you posted yourself...  

Quote
We then crack the encrypted seed, which is protected by a 1-9 digit PIN, but is trivial to brute force.
https://blog.kraken.com/product/security/kraken-identifies-critical-flaw-in-trezor-hardware-wallets

Again, that's why Trezor upped the possible PIN length to 50 digits (166 Bits), so there is no possibility to brute force anymore.

legendary
Activity: 2380
Merit: 1823
1CBuddyxy4FerT3hzMmi1Jz48ESzRw1ZzZ

Explanation
Chartbuddy thanks talkimg.com
Pages:
Jump to: