SmartCash - The Business Focused & Community Driven Cryptocurrency
SmartCash is an easy to use, fast, and secure cryptocurrency that can support everyday use such as business payments and daily transactions. SmartCash has a unique decentralized governance system and innovative technologies such as SmartCard and the Point of Sale App. SmartCash is pushing the limits of blockchain technology with tools that support entrepreneurship and innovation.
I Did It! I figured out how to use Bitcoin. I am downloading Bitcoin Core Wal. but have not used it yet. I have never used bitcoin. While it installs, I installed Electrum on my Mac & bought $4 of bit on CashApp & moved to My Wallet on Electrum. I lost like 11cents on $4.13. It there a cheaper way?
Hi guys, I posted this over at BitcoinBeginners but it hasn’t received a lot of useful input. I’ve read the FAQ there and searched around the web for answers, but could really use your help. I have a dedicated 2011 MacBook Pro running High Sierra that I’d like to use in support of Bitcoin. So far, I have installed and verified GPG Suite and Bitcoin Core following instructions from bitcoin.orf. It is now synced, and I hope to add block explorer, a lightning node, and an electrum server. Once complete, I’d like to create some tutorials and guides to help others who have old Macs, since there is already a lot of good info for Windows and Linux. I found this guide on Medium talking about Power Node Launcher, but it’s doesn’t have the same emphasis on security as the other tools I’ve setup. Before taking next steps, I’d like input from the community on the order of steps and trusted sources for installing the aforementioned programs. If there is anything else I can do with my computer and bandwidth to help Bitcoin, please let me know. Specifically, if I am able to setup a lightning node, would it help if I stored some bitcoin on it to support transactions? Should I setup a slow simple mining program or run an older ASIC miner that is not part of a pool just to help diversify the network? Should I setup a satellite connection as Andreas suggested in one of his older videos? Thanks for your input.
(ultra noob questions) Same coins on different wallets
Ultra noob questions: I have some different coins on exodus, i read everywhere that electrum is a safer wallet for bitcoins. My questions are: if I create a new wallet on electrum using the seed from exodus, i will have the btc on both wallets? i will loose the other coins or i will have btc on two wallets and the other coins only on exodus? how can i transfer my btc from exodus to electrum without paying a fee?
Edit: Since first post I have updated a few sections with additional information. I recommend reading it all even if it is very long, I might have placed some relevant info in different sections while thinking about what else needed to be added, plenty of steps remains mostly the same except when I comment directly on it. It is not necessary to do 100% security all the time, unless you absolutely need it, combining some high and some lower security ideas for a balance of security and convenience is useful. I will base this mostly on Windows, Linux users probably know this, and I have no idea how apple machines work (tho many things in here are still relevant for other operating systems, as they are just general tips) Disclaimer: There are certainly other steps that can make you more anonymous or safer, however I think for most people this will surfice. Any software I recommend should be independently verified for security, and examples of software are not to be taken as endorsements. I simply use examples and give recommendations when I believe it necessary, or helpful. I will not really differentiate between anonymity and security, they are often the same thing. As such the word security can mean either more anonymous, less vulnerable, or both. -------- Everyday Simple Info Sec:
Password for the device is an obvious one (8+ characters minimum, best if over +12), if there is sensitive information on any of the drives, either encrypt the entire drive or just the sensitive files, and make encrypted backups on a different memory storage device (There many programs to encrypt files and drives I'm sure a search will figure it out)
-There could be a hidden administrator user on your PC, make sure to change its password
Always use the device on a non admin account
a VPN that doesn't log (use with kill switch on, should be enough for everyday stuff, more safe stuff in the high security section) (VPNs that claim they don't log sometimes do, it's bad, but I would like to point out that not using a VPN will always expose your traffic to your ISP and also remove additional encryption. Even if the VPN tracks, there is no downside because your ISP would track anyways, and VPNs can be more anonymous, and also add extra encryption)
disable location tracking (preferably make all your privacy setting to release minimal info, get rid or cortana, change privacy settings in all of your accounts as well, there's no reason why you should allow Facebook to give you target ads. Use the setting they give you.
TOR, Firefox or similar browser, stay the fuck away from Google Chrome.
your preferred search engine should be duckduckgo (other privacy focused search engines exist as well)
use an adblocker that also prevents the adding of tacking cookies
Use pgp with all your friends or messaging services that implemented end to end encryption (Implemented services can still be bypassed, but are way more convenient so for everyday use they should suffice, some examples should be Telegraph, Signal, WhatsApp etc) (more info on pgp in high security section)
(Snapchat msgs, reddit dms, discord msgs, are just a few examples of msgs that are never encrypted) -Any info even send in encrypted msgs (and obviously non encrypted) should still be kept with possible deniability, don't say "I'm gonna do MDMA", say "I'm going out with molly."
use software (like ccleaner) that purges cookies and other data after every use, before shutting down your device
use a virus scanner daily (I like spy bot Search and destroy, many other options also exist)
never use the same password/passphrase twice (I will address what passphrase are below) (Better yet use randomized passwords that are stored in a master key chain, make them as long as possible (tho it is okay to go with the minimum of 12 never go below 7, I recommend 15+ depending on how often you have to manually enter the password instead of copying/pasting it) Don't generate too long keys for things you need to access regularly without copy/paste, except your master key ring)
its ideal to never use the same email or username as well, especially username, email is obviously tricky and also very annoying, but it would be best to always change the email.
-DO NOT STORE ANY PASSWORDS ON GOOGLE, IF GOOGLE LOGIN IS AUTHENTICATED IT WILL AUTFILL ALL PASSWORDS IT HAS SAVED (same with other similar services) (This means if you are logged in to chrome and someone has access to your machine, they can auto fill passwords without entering a single password) -use a rememberable passphrase, especially for your master key ring aka password manager A long sentence that is memorable makes an okay password (decent example,: "I met my wife at Little Ceasers for the first time on 07/09/20" better even if it's just something you know, if its impersonal, and if you can add special characters or numbers that you won't forget) (A better example for a passphrase is: "There is 0nly 0ne letter that d0esn’t appear in any U.S. state nameQ")
for your main password manager(key ring), I highly recommend Keepass 2, make backups of the file save to separate devices and drives (Flash drives, phone, PC, laptop, etc, if you loose that file, you lose all of your passwords) (Other good password managers exist as well, I don't recommend online password managers as you lose the control over passwords)
-Purge your internet activity frequently, there's a reason why I only have one post, and a few comments appearing in my account, but thousands of kama. Exposing information needlessly is not good. -Never post private information publicly, and if you do, do it vaguely as possible. (Example: Not "I'm 15", say "I'm a teenager") Do not post any vital information ever, no birthdays, mother's maiden name, age, or anything you have ever seen in a security question. Never post your current activities while they are ongoing. You going on a vacation? Don't announce it to the world, taking picture there? Post them when you are home.
Any account that is supposed to remain anonymous and as secure as possible should only be used on secured devices. A unsecured device can link you to the account.
always shutdown your machine when leaving it (To prevent access, and to prevent a possible attack vector)
2 factor factor authentication is not great anymore. Unless you can do it over a anonymous source. A cell phone is usually directly connected to you, so it is not a anonymous device. There might still be secure/anonymous 2 factor authentication methods that won't expose you, for example over a secure email. (If there is 2FA that doesn't need a device that removes anonymity and is secure, use it.) (Please don't misunderstand, 2FA is great, however it can remove the anonymity that you worked hard to establish)
-Rethink how you do security questions. Many answers to security questions can be found in your internet history. One could use the first word of the security question as an answer, or a different sceme that will mean you always remember it. (Security question need to go, the amount of personal info an average person puts on the internet makes it easy to attack anything using security question) -------_ High level crimimal information security: The motto here is, "All the Security, All the Time" As one fuck up can end with you leaving a lick of traceability, and you could be fucked. Pre Note: All of your software should always be up to date. Also even perfect info sec does not guarantee you are completely safe, a new zero day (exploit) can still fuck you, but good info security makes you significantly safer, by eliminating as many attacks as possible. -Get a new device (or make a already owned device seem like you never owned it, do this only if you know how to, there's a lot of stuff that goes into that, like changing your mac adress etc) buy with cash, and your face covered, preferably far away from where you live. (Do I need to specify to not bring your phone or anything else that tracks your location to anywhere you want to go anonymously?) (Be aware that even hardware can have vulnerabilities, many cpus have known vulnerabilities, I can't list them all, do some research before buying)
Do not EVER use a high security device at any lower level of security. There are unique identifiers to your device, exposing them once can expose you for everything you do.
-If you know how to use Tails (A linux distro designed for Info sec) use that, preferably on a USB. (Or learn how to use tails, its better, but complicated) Otherwise a clean copy of windows (make sure its not in any way associated with you) can do the job too, tho not as well. (Using a VM might give extra security, since VMs usually erase all data and RAM they were using on shutdown) -Get a non tracking VPN, Enable the kill switch (a setting that disables all traffic that doesn't go through the VPN) (change your firewall settings to only allow the traffic from the VPN, windows guide (Change settings so only traffic from the tor application is send) Edit: (Due to complaints: do not use vpn over tor, use tor over vpn. tor over vpn has no notable downside, if the VPN logs it makes no difference, your ISP will always log anyways, and vpns remove other attack vectors and also provide backup security should tor fail. Again even if the VPN tracks you only change the people doing the tracking, but now you are further removed making it more anonymous and also with less vulnerabilities) -rember privacy settings, cookie cleaner, and antivirus, password (There could be a hidden administrator user on your PC, make sure to change its password) -Always use the device on a non admin account
-Ideally use this device only on networks that are not connected with you. Such as public networks (try to never use the same public networks twice, move around) (a home network should be fine now, as it should never be exposed, but more security is always better) (Its just a conveniences vs security trade) -Never use accounts that have been exposed to lower security on higher security machines -your browser is now TOR (or your preferred security focused browser, if you dont plan on using onion ) Make sure you get the standalone version of tor not the addon build (the standalone is safer, because there are less settings and options to tweak) -Change your tor settings, to safest mode, enable a bridge (to my knowledge there's no difference in security between the build in bridges in tor), enable automatic updates, set duckduckgo onion as your primary browser. Set dark.fail onion page as your home page. (Or your preferred privacy search engine and onion directory)
set up a new pgp (can't use the same one you use for regular use, again less safer accounts are never used on safer devices) Cleopatra is my choice, its simple to use. Make sure you back up the private key multiple times, on safe devices. (Dont let the private key fall into anyone's hands) Give it a generic name like "HighSecurityPGP" do not give the pgp key pair a name that could identify you. (No initials etc) (Some pgp key pair programs want an associated email for a key pair, you can create a safe email, or which I recoend you can use a different program (like Cleopatra) (Feds & LEOs are known to copy private keys if they have your machine, so you will need to set up a new key pair if they ever take a device with a private key copy)
a high security machine that facilitates criminal activity can not use many programs. Many programs collect your devices mac adress, which is a unique identifier, amongst other things. It's should be used only for the activity you want to do.
-------_ How to use dark net markets (DNMs) If you finished your High Security setup, we can dive right in. Otherwise go do that. This is where all that is essential. Quick info on Tor, and onion sites. There is no search engine. It's all based of directories and addresses you are given by others. Tor will likely not be very quick, it has to pass through multiple networks to get to the destination. DNMs sometimes exit scam, an exit scam is when a market shuts down completely and takes all the money, this is a risk when using DNMs, it's not too common but happens maybe 0-4 times a year. The admins of thoese servers need to get out at some point, before they get jailed, so they exit the game, and scam everyone out of their money. -A very useful onion directory is dark.fail it has a lot of links, for all kinds of stuff. News, email, DNMs, Psychonautwiki (harm reduction website), forums etc. (Other directories also exist) -Pick a market, preferably one that handles secure connection server side instead of requiring you to establish the secure connection. Then create an account. Your account once created should include an entry box in your profile for a pgp key, post your PUBLIC key in there. (Verify the link is not a scam, most markets should provide a pgp signature) -Next is currency setup. All major cryptocurrency exchangers can be used, I can recommend coin base but there could be better ones out there. Unless you find a small non U.S., exchange, they will always ask for your identity. So unless you can find a trustworthy exchange that doesn't ID, you will need to give it to them. (Side note, all major crypto exchangers report to the IRS, if the IRS asks you if you bought cryptocurrency and you bought while having IDed yourself SAY YES, DO NOT COMMIT TAX FRAUD WHEN THEY KNOW YOU DID)
I recommend using Monero, it's hard to track, so it makes your job a lot easier. (If you use bitcoin you should run it through a scrambler, because BTC is tracable to anyone who knows what they are doing)
-Transfer (monero you can send directly, btc you should scramble) to your wallet. There are two options a cold wallet (physical) or a software wallet. Software wallets usually dont cost anything so I recommend them, even if often less safe. Electrum is easy to use, and pretty safe. You can also do your own research and find a wallet that fits your needs.
decide where you want to ship it. You can send to your home, to a PO box, to a PO box that you opened with a fake ID (I don't recommend), an abandoned house, general mail (sending to a post office instead of a street adress) pickup up with fake ID, use a remailing service. These are some options, sending it to your own home, isn't ideal, but its pretty much the only easy way.
-now you are ready to buy, only buy using escrow (it means the money is held by the market as a middle man until the product is delivered, they will also handle any issues like wrong quantity, cuts, etc), judge the reviews for a product, and if available look at the history of the vendor, until you find a product from a vendor you trust. (I recommend to buy within your country as much as possible, so it doesn't go through customs, it's very rare that something is found, but it can happen) -now you get to buy, depending on market, you either have cryptocurrency stored in their wallets (not recommend, you will lose it in an exit scam) or you can send it every order. When you send your delivery adress (or the one you want it to go to) encrypt the adress using the sellers public key. Make sure the adress is correct. -wait for the product, make sure to extend the escrow until the product arrives, if you can't extend it anymore dispute the order, and a moderator will step in -test the product, use it, and leave a review. PLEASE LEAVE A REVIEW, DNMs only work because of reviews. Edit: Didn't imagine I would write over 15000 words. Oh well, it was fun. Hope it helps, if you have any questions feel free to ask. No idea how long this will stay up, I might purge it in 7 days, or never.
For the past year tobtoht and I have been working on the foundations of a new Monero desktop GUI called Feather for Mac OS and Linux platforms (Windows tentative) using Qt5, libwallet, QtWidgets. The goal of this new wallet is to provide a practical, robust and easy-to-use Monero wallet for every day use. It aims to be beginner friendly, but should also cater to the needs of experienced Monero users with the addition of advanced features like coin control and multisig. Feather's user interface is inspired by Bitcoin's Electrum wallet, but adapted to fit Monero. Feather is not a fork of Electrum, all of the UI code was written from scratch in C++ / QtWidgets. Development began in the summer of 2019. We estimate to release a beta version in November or December.
Our primary motivation is to create a wallet that we ourselves would want to use and recommend to friends. There aren't many options when it comes to non-custodial Monero desktop wallets. The CLI is an excellent tool for power-users, but is simply not an option for users that are not familiar with with the terminal. The GUI has a slick user interface, but is demanding on system resources due the use of Qt Quick. Instead we've taken inspiration from Bitcoin's Electrum and started working on the most basic looking Monero desktop wallet one can imagine. We've gotten rid of a lot of functionality, but also added new functionality. Just focussing on the basics results in a clean, robust, and beginner proof wallet.
In an effort to mitigate unintentional off-chain linking, we have made it harder to reuse addresses by automatically hiding used subaddresses. We find that the primary address leads uninformed users to believe that it is somehow functionally incompatible with subaddresses, or that funds sent to subaddresses can not be spent together. To encourage the use of subaddresses the primary address is hidden by default, and only used for change and coinbase outputs. Our wallet supports advanced coin control features like freeze/thaw and sweeping a single output. In the future we may add manual transaction input selection. There is no need to manually setup Tor to protect your traffic, Feather comes bundled with Tor. By default all traffic is routed through Tor with the exception of traffic between wallet and daemon. Wallet synchronization over Tor takes substantially longer than over clearnet, but you can optionally enable to connect to remote nodes over Tor. If your machine already has a Tor daemon running Feather can use the system daemon when instructed. Just like in the official GUI, Feather essentially has 2 modes of connecting to the Monero network. You either host your node somewhere (localhost/LAN/internet) or we'll provide you one from a list of trusted, stable, community hosted remote nodes (like Cake Wallet). If Feather detects that it's running on Tails or Whonix it will automatically connect to a random .onion remote node.
Feather is built with Qt Widgets, providing native looks and performance. In a recent test™ a wallet with 10k+ transactions only consumed 200 MB ram (before optimizations). In comparison, the official GUI uses 400 MB before a wallet is opened. GPU power is plenty nowadays so this hardly a problem, however, we are serious about providing an user interface that feels snappy to use. The application itself starts within 1-2 seconds on most machines (Bitcoin's Electrum is more like 4-5 seconds due to their usage of PyQt).
We have implemented Tevador's 14 word seed scheme with embedded restore height. The same function is used to derive the private view key from the private spendkey, therefore it is possible to convert the 14 word seed into a standard 25 word seed in case you want to restore the wallet using the official wallet software. Feather connects to a websocket server over Tor to obtain miscellaneous data such as: price information, a list CCS proposals, posts on /Monero, the most recent blockheight, a list of community hosted nodes and the latest version of Feather. The websocket server itself is open-source and self-hostable. By default Feather will connect to a server hosted by the project maintainers. The websocket connection can be disabled completely, but some functionality will be disabled/broken. Our target audience are users who want to use Monero without too many issues and we've designed the wallet as such, with lots of convenience features, while routing it all over Tor in the background. The native look of the application should feel familair to users as it behaves like any other program that runs on their computer. Added benefit for future contributors/developers is that it's very fast to implement/test UI components by borrowing from QtWidget's vast library. This in contrast with the Monero GUI, which uses custom QML components - a tricky and time consuming rendereframework more suited for large teams to create electron-like applications.
Feather is able to show detailed transaction and output information including key images, unlock times and ring members.
Support for 2/2 and 2/3 multisig is in the works.
Feather will be distributed as a portable executable.
Feather will ship on Linux and Mac OS - and also Windows once we get static cross compiles to work (rip)
Feather has built-in support for XMR to BTC conversion via XMR.to (no commercial affiliation)
We can easily support additional interfaces other than QtWidgets (like QML for a mobile app, curses, etc) as business logic is stricly seperated from the presentation layer.
Work started early summer 2019. We still have some features to finish, prepare CI/CD, etc. As such we expect an alpha or beta release in December 2020. For this we would like the community's approval to allow the milestones defined in GUI CCS to be used for the remainder of this project, paid in full - we can use the support. Consequently all code will be licensed under the Monero Project and features/changes to libwallet or wallet2 will be committed to upstream (Monero GUI/core). Future development and releases will be maintained by dsc__ and tobtoht.
Idle in #feather on irc.oftc.net if you want to help beta testing in a month or so. You will need Linux, as this is our primary platform for developing the application. Please let us know what you think in the comments. We're open to suggestions/feature requests/brainfarts.
Hello everybody, im trying to set up my bitcoin wallet on my Mac but as soon as I open the installer nothing happens beside Electrum using 100% of my CPU. Someone here experienced the same thing or knows how to fix it ?
I have electrum built into tails and I access it on a different ip and MAC address each time. If I created an address on my electrum wallet would there be any way to trace bitcoin transactions to my real ip/identity? -I will create “standard wallet”
I have one of the latest top specs Mac Mini that I use as a server in my home. I also have a mid range Qnap with 80tb at hand. I am thinking about running my own node as I have the bandwidth and specs, however on a mac. 1 - does Bitcoin core for mac run well? I saw it quite old as a release. 2 - would running a Bitcoin core on a mac but store the data on a fast NAS be ok in principle? 3 - would I make my system more vulnerable to external attacks? I have a SSL certificate on my NAS but as I have work data on it I really do not want that compromises. 4- I Have BTC and looking to HODL and I currently store offline on a trezor and safety stored in my safe. In the future can I get my trezor to speak with my node? 5 - once the node is running if I want to buy more BTC must I buy them on a exchange? I use kraken. Any help would be great.
There are many wallet applications across various mobile and desktop operating systems, here are some recommendations
• Blue wallet – A custodial or non-custodial wallet (depending on configuration) with On-chain and Lightning payment capability. Users also have the ability to purchase Bitcoin directly on the wallet through P2P exchange HodlHodl. (Google Play/App Store/Mac) • Wallet Of Satoshi – A custodial wallet that supports Lightning payments. (Available Google Play/App Store) • Breez Wallet – An open-source non-custodial wallet with easy Lightning network channel set-up. (Google Play/App Store) • Electrum Wallet – An open-source non-custodial wallet on Desktop and mobile with easy Lightning network channel set-up. (Google Play/Linux/PC/MacOS/Python) Source
How to Send Bitcoin from Coinbase to Electrum. Sending Bitcoin from Coinbase to Electrum is simple and should only take a few minutes. 1. Get a receive address on Electrum. As laid out in the section above, generate an address in the ‘Receive’ tab of your electrum wallet. Copy the address. 2. Go to Coinbase Our Electrum bitcoin wallet review covers everything on security, privacy, price, bitcoin wallet review, how to create! ... Linux, and Mac. It is a lightweight meaning it does not download the blockchain. A no-frills wallet that is designed to be easy to use while also maintaining high-level security. 2. Expand the downloaded .dmg. For OSX on a Mac, find the downloaded .dmg file (e.g. a file named "electrum-3.0.3.dmg"), double click on the .dmg file to expand it into a Electrum executable file, drag the expanded Electrum software into 'Application' folder on your Mac and the installation is completed. Electrum Electrum fokuserer på hastighed og simplicitet med lav ressourcebrug. Den gør brug af fjerne servere, som håndterer de mest komplicerede dele af Bitcoin-systemet, og den tillader dig at genskabe din tegnebog udfra en hemmelig sætning. Electrum is an easy to use Bitcoin client. It protects you from losing coins in a backup mistake or computer failure, because your wallet can be recovered from . ... Electrum for Mac.
How to Setup a Bitcoin Wallet with Electrum 2020 [Electrum ...
Electrum Bitcoin Wallet Tutorial - Multiple Output Transactions Clearly Explained In this tutorial I will explain how to send multiple Bitcoin transactions u... In this video, I set up the Vertcoin VTC Electrum wallet on a Mac. In my experience, this wallet works well for a Mac on OS X. I was unsuccessful when trying to set up the Vertcoin-Qt wallet. Electrum Wallet site https://bit.ly/34cRd6r Click to download Electrum wallet last version https://bit.ly/34cRd6r About Electrum Electrum was created by Th... The second entry into my 'Using Crypto' series! LINKS: 1) https://www.torproject.org/download/ (Safety first!) 2) https://electrum.org/#home (Official Electr... This video shows how to install the ZClassic Electrum Wallet on a Mac. Note: At the time of the recording of this video, the Snapshot Time was not yet announced. The snapshot for both BTC and ZCL ...