Jump to content

tev

Member
  • Content Count

    167
  • Joined

  • Last visited

  1. It's looking for them on your computer, but it should be looking for them on the internet somewhere. Perhaps you should have entered something with an "https" in it, like go get https://bitbucket.org/dchapes/ripple/wallet-recover (I may not have typed the above exactly right - you'll have to check the earleir comments in this thread for the exact address.) As a side effect, you have verified that the folders /usr/lib/go-1.6/src and /home/me/go/src are special to your instance of go. I guess the former is derived from the built-in value of the GOROOT variable and the latter is derived from your value for the GOPATH variable. When you figure out the correct syntax, it's probably going to download stuff from bitbucket.org/dchapes and dump it in one or other of those two folders (probably the second one).
  2. Some background information, for you to read while you're waiting for a Go expert to show up: Your PATH environment variable is a list of folders where your computer (actually, your shell) looks for executable program files. This variable serves the useful purpose of cutting down on the amount of typing you have to do when you run a program (e.g. you can get a folder-listing just by entering ls, which is less tedious to type than /bin/ls). When you entered echo $PATH, you caused the value of the PATH variable to be 'echoed' to your screen. The dollar-sign told your computer that you were asking for the value of PATH rather than just the word "PATH". It told you that you've got a fairly typical PATH, with a couple of extra directories (/home/me/go/bin and /home/me/gotest/bin) appended on to the end. The PATH environment variable has been in use for decades, and is used on just about all computers, regardless of whether or not they have go installed on them. When you entered which go, you verified that you have a copy of the go program, and that it lives in the /usr/bin/ folder. Apparently, go makes use of two extra environment variables, GOPATH and GOROOT; and you showed (by entering echo $GOPATH) than you've got the value of GOPATH set to /home/me/gotest. However, when you ran the program go, it complained about GOPATH and GOROOT both being set to the same value. The go program wants those two variables to have different values; but this is where my knowledge runs out. You can find out if GOROOT already has some value by echoing it to the screen (echo $GOROOT).
  3. tev

    Ellipal Cold Wallet

    Doesn't really matter. I've mostly used @ripplerm's wallet (i.e. a copy of this web site on a non-networked computer), but I'm sure other software (toastwallet perhaps?) can be used offline too. (Apparently, people get confusde by ripplerm's wallet being denominated in drops, where 1 XRP = 1 million drops.) Whichever wallet-software you use, the workflow is something like this: Draw up your transaction in an internet-connected copy of the wallet-software. You'll need your address, but don't even think about entering your secret. At this stage, you want the internet connection because the wallet-software wants to be able to see the XRP ledger in order to draw up the transaction properly. Transfer your unsigned transaction to your disconnected computer. A USB stick is the obvious way to do this, but see comments below about QR codes. Use your other copy of the same wallet-software, on your disconnected computer, to sign the transaction. You do need your secret here, but you're disconnected from the internet, so thieves can't intercept it (but look behind you for CCTV cameras and people with binoculars!) Take the signed transaction back to your internet-connected computer. Load the signed transaction into the internet-connected copy of your wallet-software and broadcast it. A transaction is a fairly small file, even after you've added your cryptographic signature. So, if you're worried about malware hardwired into USB sticks, you could convert it into a QR code and use the web cams on your computers. I haven't used the QR code technique myself, since my cold computer is in fact the same machine as my hot computer (except, booted off a USB stick), but the concept is trivial. The whole process makes sense as long as you remember than XRPs are not stored in wallets; they're stored on the XRP distributed ledger. Wallet software does two things: (i) it interacts with the XRP ledger, and (ii) it writes cryptographic signatures. It uses the internet for (i), but not for (ii).
  4. tev

    Ellipal Cold Wallet

    Hardware wallets will be useful if/when it becomes possible to use crypto-assets for low-value in-person transactions (coffee shops, bars, farmers markets). But for anything more than a few day's expenses, they will always be inferior to air-gapped software wallets. You need esoteric knowledge to audit the security of a hardware wallet, but you can audit your own air-gap with nothing more than common sense (especially if you use QR codes rather than potentially malicious USB sticks when you're moving data across your air-gap).
  5. On 5th of May last year you wrote in this thread, On the basis of that, it sounds like you know your secret, which would mean you have full control over your funds. I'm therefore puzzled that this thread is still going, thought I admit I've not read all the way through. Did minimalistic wallet (or any other utility that you tried) derive your address from your secret, or did you enter both address and secret yourself? If you're still experimenting with unfamiliar software, do remember to disconnect from the internet while you're figuring out how it works. I can see from your post a few hours ago that you're making some incorrect inferences about the Unix/Linux/Mac command line (not a bad thing; we can all learn by trial & error!). For instance, when you typed cd /usr/bin/go, you were [unintentionally] trying to change directory into a directory that doesn't exist, since go is almost certainly a program file, not a directory (it's located, along with many other program-files, in the directory /usr/bin/). Moreover, if you're trying to run a program that lives in /usr/bin/, you really shouldn't need to cd anywhere. I'm explaining this mostly as an endorsement of what eiprol has already advised above, but I still think you need to review your own observations from 2018/05/05.
  6. tev

    XRP Voted as The Best Crypto to Buy Under $1

    That's a very surreal poll. If someone is going to buy crypto-assets why would they want to cap their total spend spend at 99¢? And regardless of whether or not they have compelling reasons to spend less than $1, why would they limit themselves to looking only at XLM, Cardano, IOTA & XRP?
  7. It's very well documented in many sources, such as this one. You generated a new address inside your web browser without any data going over the internet. Consequently, bithomp have no influence over your new address. You then used your other wallet to broadcast a transaction to the XRP ledger that activated the new wallet with no involvement from bithomp.
  8. Your XRPs are not "in" your paper wallet. Your XRPs are stored on the XRP ledger, which is replicated on many computers around the world. Your paper wallet is a paper record of your private key (often presented as a 29-character secret starting with "s"). It probably has your public address printed on it too. When you move XRPs out of your public address, you use the secret to sign the transaction — that's how the XRP ledger 'knows' you really mean it.
  9. tev

    XRP, UK users and Uphold

    XRP-EUR has more liquidity than XRP-GBP. Moving EUR around via SEPA is cheap, and some GBP bank accounts allow incoming SEPA payments. The XRP-->EUR-->GBP route is therefore worth keeping an eye on.
  10. If the Rippex authors knew their users' secrets (≈ private signing keys), it would be like Bic maintaining a database of their customers' pen-and-ink signatures. Someone who forges your pen-and-ink signature is probably not a stationery manufacturer.
  11. You start with a formal greeting and proceed to describe what happened. Officer, someone has stolen my magic internet money... Sounds like a sure way to get listed on the police database as a suspected drug dealer. EDIT: I'm not saying don't try. But when you go to the police station, take postal addresses and 'phone numbers for the two exchanges. And paper copies of the transactions, with the destination tags marked in highlighter pen. And documentary evidence that XRP is used by reputable business. Most police officers will refuse to accept electronic evidence, but if you ask nicely, some of them will scan paper documents. Don't confuse them with anything suggesting that Ripple (the company) is responsible for XRP. If you belong to an ethnic minority, make sure (before you go to the police) that your lawyer has the means to prove that you obtained the XRPs legally.
  12. Is his new wallet-software on the same computer as the wallet-software that he was using before the theft? And is it connected to the internet? If the answer to these two questions is Yes, then you should assume that the private key to rL1R3kedKh94RQs1VmGdeUNBbqSAHH6GtP has already been stolen by the same mechanism that was used to steal the private key to rDgrKAmfs5b3MusVk3aqRj8t6LyK6XnUHv. I hope Kraken and Binance can identify the thief, but for the sake of staying positive, the best thing to do is to view his misfortune as an expensive lesson in the importance of isolating private keys from the internet.
  13. tev

    Wallet Poll

    If @Hodor's survey is intended to find out which transaction-signing tools are popular, then 'paper wallets' are out of scope since they're purely private key storage media. A sheet of acid-free paper is indeed a durable place to store your private keys, but you can't sign transactions with it. The simplest possible 'paper wallet' is the 29 characters of your secret, written out (carefully!) by hand - you don't need anything else to reconstuct your public address.
  14. If you can make one heap of all your winnings...
×