To understand how fraudsters get their victims' money, first remember how cryptocurrencies work and what it means when we talk about the addresses and private keys of cryptocurrency wallets.
The world-renowned Bitcoin wallet Electrum "update phishing" currency theft continues.
How to save, and attach importance to the private key, may not be too burdensome in the future. In the future, wallets that emphasize the security of private keys will not be a good wallet.
and open the web page, then your wallet may have been compromised. Particularly paranoid people may want to send all BTCs from their old Electrum wallets to the newly generated Electrum wallet.
What are the most important but easy-to-ignore security issues for the average user, and how can hackers steal private keys? 。
Use the Electrum wallet.
Qtum Electrum is a Qtum desktop light wallet modified from the well-known Bitcoin wallet Electrum. Compared to the current Qtum Core full-node wallet, Qtum Electrum takes up less disk space and takes less time to synchronize chunks, supports multi-signature and hardware wallets, supports cold wallet mode, supports the import of mnomes into mobile wallets, and uses SPV authentication to ensure security.
Electrum Wallet is one of the most popular Bitcoin wallets and has been around for several years. However, Electrum wallet users often rely on electrum servers, which presents some security and privacy trade-offs. If you use an Electrum personal server, Electrum wallet users can connect locally to their own private servers, enjoying the convenience of Electrum without any trade-offs.
How to secure access to private keys.
In this demo, Electrum developer Chris Belcher shows how to set up and use an Electrum personal server.
IRC Channel: s electrum-ltc (web chat) on Free-node
Electrum third party.
As mentioned earlier, because electrum light wallets are different from Bitcoin light wallets such as MultiBit or Breadwallet, they cannot communicate directly with bitcoin full nodes and can only communicate with electrum.
Consumers will use their private keys to decrypt encrypted keys and rebuild keys to decrypt content.
Cryptography gives us a solution to the problem through the public and private keys. Let's take a look at how these two keys work and how they contribute to cryptocurrency systems. Suppose there are two people, Alan and Tyrone. Alan wants to send some very important data, and Tyrone wants to identify that this data does come from Alan, and they can do that by using Alan's public and private keys.
Trojan.BeamWinHTTP loader, which also involves downloading previously detected Electrum DoSMiner.
This isn't the first time electrum has appeared in a fake version. In December, nearly $1 million of BTC was stolen when hackers developed a fake encrypted wallet, Electrum. 1 this year.
Qtum Electrum synchronously updates electrum-related code and releases v0.18.9.
(Malware, Attack) Electrum DDoS botnet reaches 152,000 infected hosts.
Therefore, the use of multi-signature wallets provides additional security. In the Bitcoin ecosystem, it is easy to put them in an Electrum wallet. Multi-signature wallets require confirmation of several private keys in order to sign a transaction.