Could a hacker replace Bitcoin QT in some Linux repository and steal Bitcoins?


Duckx, I think you have a good idea.

Well for one thing -- using a linux VM is much better for security. You are essentially using your windows machine for browsing the internet / email and your linux machine for only bitcoin banking.

All it takes is someone to compromise a bitcoin related website and you could be out of your bitcoin holdings. With your wallet.dat running in a Linux VM if someone compromises your windows machine they won't be able to easily steal your wallet.dat and keylog your password, etc.

If you're not using the Linux VM for Bitcoin banking, you can have it turned off!

It's trivial to encrypt your entire linux HD.

Linux is inherently more secure out of the box than Windows, and with a few tweaks, extremely secure.

Technically though, if someone compromises your Windows machine they could gain control of your vm and get to your bitcoin assets. This type of attack though is extremely rare and would have to be personally...

0 0

To begin with, the API is probably not the place to look for detecting anomalous activity on the Bitcoin network. By consuming the API rather than running your own node(s) on the network, you will only receive pre-processed data. It's like having someone chew your food for you. It's best you run your own node.

Furthermore, hacking in general is not something that can be easily detected. What you can do is search for occurrences of a particular exploit, once you know that a vulnerability exists. For example, let's pretend you know about a vulnerability that can cause a double spend attack. You know that in order to exploit this vulnerability, an attacker would need to broadcast 2 transactions simultaneously from opposite sides of the network, each spending the same UTXOs. In order to detect this, you would need to have multiple nodes on the network that could detect the broadcast of each transaction (remember that nodes that already heard of one, won't...

0 0

The most secure operating system is no operating system. As Pieter mentioned in the comments, dedicated hardware wallets prevent private keys from leaking out of the secure hardware enclave, and therefore can't be grabbed from the Internet.

All operating systems are enormous, complex software systems with lots of ways to fail catastrophically. It is likely that all common operating systems have undiscovered security flaws. If you have to store bitcoins on a server, I would suggest Linux, since most malware targets Windows. But still, if planning on storing any amount of bitcoins large enough to worry about losing them, don't get your computer near the...

0 0

I've been reading around:

What prevents a miner's block from being accepted across the network if the hash checks out when miner forges transactions in the block?

For example, lets say I'm mining and I want to steal money from address A and put it into my address B. So I build a block with the A->B transaction along with some requested transactions. Now if I can compute a hash for the block before anyone else, and send off to peers in the network, how could they reject it? How would they know that's not a real transaction? If bitcoin clients record requests to verify, maybe this request was blocked by some NAT issue.

I can't think of a good way of fixing this and I didn't find anything about in documentation. Any insight would be appreciated....

0 0

No matter what Bitcoin software you use, you should never buy more bitcoins than you can afford to lose. Bitcoin is still an experimental system and bitcoins remain a risky investment.

Bitcoin Core puts you in charge of your wallet, which means your bitcoins are at risk unless you complete certain tasks:

By default, you need to backup Bitcoin Core after every 100 transactions. This includes both transactions you send as well as payments you request (whether or not you actually received the payment).

For example, you need to backup after sending 33 payments and requesting 67 payments (even though you only received 60 payments).

Bitcoin Core can be configured to allow you to go more transactions between backups. See the -keypool setting.

Anyone who gets access to your wallet can steal your bitcoins. The first line of defense against this is encrypting your wallet, an option from the File menu in the graphical interface.


0 0

No one can argue that bitcoin has become a phenomenon that can’t ever be overlooked; the number of mainstream businesses adopting it, as a payment method, is increasing steadily and more and more venture capitalists are chipping in into various bitcoin startups. However, as the world’s first cryptocurrency is becoming more and more popular, this comes with a serious premonitory, especially that the anonymity offered by the blockchain technology is so tempting to hackers and fraudsters.

Whenever you become a victim of identity theft leading to loss of funds off your credit card or bank account, your losses would be covered by your bank or insurance company, but what if your bitcoins were stolen? Who would cover for your losses then? Accordingly, securing your PC and bitcoin wallets is crucial to turn down most hackers who might try to steal your coins.

How Hackers Can Target Your Bitcoin Wallets and Trading Accounts:

To maximize the security of your...

0 0

Hello my name is Scott and I am a 4th year computer science student. We have been tasked to get started in an open source community, and after long while i found bitcoin-qt.

I think its best to find interesting topics and this is it for me. I am currently using a virtual machine cs50 released by jharvard that runs a Ubuntu 32 bit operating system to use Linux as it is

a good operating system with some good security features so i thought i would post install instructions from source code that I did for those who wish to program to improve the

bitcoin software and do a bit of mining as well.

The first thing i do is I have a git hub repository and i forked it from to my repo where i cloned it using "git clone "
and i add a upstream to the master branch "git remote add upstream".

After that I went to where I cloned the project and started to install the Dependencies, use...

0 0

5 Steps to Install and Set Up Bitcoin-Qt (Bitcoin Core) Faster
applicable to v 0.9.3 and before

As of Bitcoin Core version 0.10.0 and later, the block chain bootstrap torrent is *slower* than a direct download using the bitcoin P2P protocol & client. If you want the torrent for other reasons, please visit: To download the latest version of Bitcoin Core, please visit:

The biggest pain point of using Bitcoin-Qt

(Bitcoin Core) prior to v 0.10 as your wallet is it takes forever to sync to get the complete block chain.

A fully functioning node must have the Bitcoin-Qt (Bitcoin Core) client on a machine instance with the complete block chain. Note that this speed-up tip will no longer be necessary for Bitcoin Core version 0.10 (click here for Bitcoin Core version history) and above because blockchain syncing will be parallelized across multiple peers and and will be faster than...

0 0

Bitcoin is, if many industry experts are to be believed, the future of currency. Everyone from expert coders to entrepreneurs is banking on it thus making it one of the hottest topics. We already discussed a lot about


in our earlier article and we believe that it does have a potential to cause a huge disruption in the market. For our FOSS supporters out there, bitcoin means a great deal. The reason for this is that this digital currency is entirely open-source. Which means, if Bitcoin ever reaches public adoption, it will be the most popular use of open-source technology.

If you are a Linux user, managing your bitcoins and even mining them is a piece of cake. The penguinian platform offers some great tools for bitcoins enthusiasts to manage their digital currency.


CGMiner is a multi-thread multi-pool miner for bitcoins. It works from the command line and can help you mine bitcoins in a way that makes maximum usage of your resources. The...

0 0


What is the Bitcoin Stealer?

The Bitcoin stealer will steal bitcoin of people.

Download it here:


This software Monitor the clipboard for copy paste of BTC address. When someone copies a bitcoin address to send or receive funds the bot will replace the copied address by yours. check this little history to help you :).

Mr Dumb want to send some bitcoin to his friend Mr. Ass,
So Mr. Dumb ask Mr. Ass for his Bitcoin Address on messenger ok.
Mr.Ass eager to receive Bitcoin send his address.
To be able to pay Mr Ass, Mr.Dumb login to his wallet and browse to the send btc tab.
he copy Mr.Ass Address from messenger and paste it in the send btc tab address ok.
but when he paste it, the address has been change to the address of the DumbAss reading this :).
Got it how it works now?

when the app is running, everytime...

0 0

2. Getting away with it

While Bitcoin has some features that make it great for thieves, it also has some features that make it not so great. The fact that the blockchain is public means that anyone can see to which address the coins were transferred next. After the Sheep Marketplace heist, some users tracked the thief as he or she moved the stolen coins from address to address.

Find a tumbler to launder your bitcoins

This tracking technique isn’t very helpful for the time being, since the thief’s identity is still unknown. However, Bitcoin forensics is getting better and better as programmers figure out new ways to extract information from the blockchain. A thief may leave traces that are undetectable now but could be uncovered in the future, inspiring a retroactive investigation.

That’s why this step, money laundering, is so important. Laundering Bitcoin is done with “mixers,” also called “tumblers,” which randomly crisscross your bitcoins with other...

0 0