How to Cold Store Your Cryptocurrency for Safekeeping
According to CipherTrace (which specializes in litigation tools and services for cryptographic markets), between 2018 and 2019, the amount of theft from cryptographic wallets exceeds $2 billion. Thefts and break-ins are caused by a variety of reasons: simple incompetence in cryptographic storage, as well as by companies that provide storage services. It is not unusual for holders of crypto currency to lose access to their wallets by themselves, one of the last known cases occurred in Ireland: ,57 million dollars couldn’t be confiscated from a detained drug dealer, which were stored in bitcoins. The problem was that the wallets keys were lost. The most secure way is a cold storage — all account data and private keys are kept offline and all transactions are manual. This storage method is great because it is fully protected from hacking and interception of data, but it is not suitable for those who make daily transfers of cryptocurrency, it is simply inconvenient. If you compare “cold and hot” wallets, you can give a simple example: A hot wallet can be compared to a wallet that can be lost and stolen. But you can always access your funds. A cold wallet is safe, and access to it is not permanent. You can also take or put money, but it will require a special code. In this article we will tell you about the most popular types of cold wallets and we will analyze their pros and cons.
Types of cold wallets
All cold wallets have one common thing — the data is stored offline. However, there are several types of cold wallets, which differ in the degree of protection, physical embodiment and cost of the wallet.
Desktop wallets are also known for a high level of protection, in addition to the ability to store crypto currency offline. There are so-called “light” wallets weighing less than 1 gb, and “heavy” wallets weighing more than 1 gb. Two of the desktop wallets can be distinguished:
Multicurrency wallet. It was created in 2016 and supports more than 100 crypto currencies, since 2019 has a phone application. The wallet allows you to export private keys that are created locally, and then to upload them back. Private keys can be discounted to removable media and downloaded only when the transaction is completed. If the user decides to leave private keys on the same computer where the wallet is located, keys are securely encrypted. In order to use your wallet ,there is no need to register or to download the entire blockchain — synchronization is taking place online. In addition to wallet services Exodus Wallet provides an integrated crypto-exchange. The installation file weighs 85 mb.
Bitcoin Core is the official Bitcoin wallet. The size of the wallet is 160 gb, but according to the developers of the company, it’s better to give it a separate winchester with the size of 500 gb. From the security viewpoint, it’s suggested to install a security code or a seed phrase, which may consist 8 words. It is also suggested to copy wallet.dat file. — private wallet key, which will allow you to restore access to your funds.
Appears like a regular flash drive with an interface (screen, control keys). This wallet can safely store information about the balance and keys, full functionality is available only when connected to a computer, but the latest models have a special button that allows you to confirm the transaction without connecting to a PC. Each time the device offers to generate a new code-password to confirm the transaction, which significantly reduces the probability of hacking. After generating the code, you need to set a mnemonic phrase (seed) — it consists of 12 or 24 words, which are not related to each other in any way. Such type of wallets has a special protection system that allows you to connect even to potentially infected PCs. The wallets themselves won’t be affected by malware. The obvious cons of hardware wallets are the following:
It is also possible to lose a device that is so small in size.
A physical device can easily fail due to a variety of damages.
It is not recommended to buy such wallets from “hand”, even from friends, as they can be pre-installed with malware.
As you can see, storing crypto currency with a hardware wallets is very safe and secure, however you should take care about the device. Many people who hold a large amount of crypto currency, in order to not to lose a hardware wallet, store it in a safe deposit box, depriving someone of access to it.
Popular Hardware Wallets models
The first hardware wallet produced in 2013 by the Czech company Satoshi Labs. The device has an OLED display with a pin code, public addresses and Seed phrases. Trezor One has won recognition from users due to its multicurrency and affordable price ($65), it is also considered one of the most secure hardware wallets. Ledger Nano S The wallet was released in 2016 by the French company Ledger SAS. Distinctive feature from the other wallets, is the Secure Element controller, which meets banking standards and is certified CC EAL 5+. Also, in order to work with each crypto currency you need to install a special application for this currency on the device, it is not quite convenient, however more secure. The average price of the device is $85. KeepKey The purse was released in 2015 in the U.S.. Distinctive feature is OLED display — 256 by 64 pixels. Due to this, you can fully see both the address of the wallet, and the seed phrase. Also, the wallet has a built-in exchange service ShapeShift — an opportunity to exchange crypto currency without entering the exchange. The average price of the device is $50. BitBox01 Ionos Schnelly’s wallet was invented in Switzerland. In size it’s almost the most compact among all representatives of the hardware wallets. A distinctive feature is the availability of a backup — the card can be multiplied and kept in several places, by analogy with the seed-phrase. In November 2020, support for these wallets will be discontinued, but all owners will be given a 30% discount on the new model. The average price of the device is $55. CoolWalletS Developed in Taiwan by CoolBitX, which has long been manufacturing components for Visa and MasterCard. As well as Ledger Nano S has a security standard CC EAL 5+. This wallet works only through smartphones, connecting to them through Bluetooch. The average price of the device is $100.
In the age of technological process, plain paper has become a rather reliable method for storing cryptocurrency. With the help of special services, such as bitaddress.org, you can generate public and private keys, then writing them down on paper. You can also print keys as a QR code. To accept transactions with such a wallet, you provide the sender with a public key. To access the funds, you need to find any online wallet that supports your crypto currency. Enter your private key into your online wallet, thus integrating your funds into the system. However, you should understand that after this procedure your wallet will become “hot”. The best of this storage method — paper wallet is free, its safety depends only from you. When storing a paper wallet to protect it from the fire, water and aging. Also, do not tell other people about where your paper wallet is hidden. The disadvantages of this storage:
If your wallet is lost, it will be impossible to restore it.
Exposed to a physical damage.
After sending the transaction, you will have to create a new cold wallet.
Offline transaction signature
For this storage method, you will need two PCs. The essence is that the secret keys are never in contact with the Internet, but are stored digitally. Offline transaction method is suitable for people who do not make a daily transactions and have an access to two devices. The process is below:
A hot wallet is installed on a PC with the Internet. The transaction is created without entering private keys and authorization.
The file with transaction is copied and transferred to the second PC without Internet, where private keys are stored.
The transaction is signed offline, copied and transferred back to the PC with the Internet.
In fact, you can do it with one PC and a USB drive. The USB drive will store private keys. Also, you can create a transaction without entering private keys and authorization, after disconnecting the Internet, connect the flash drive, sign the transaction, turn on the Internet. In this case, you should take care of the antivirus system. The disadvantages of this method:
Using two PCs or a USB drive involves a lot of actions, which is time consuming.
You need to back up your keys in case your PC or flash drive fails.
This method implies the creation of a wallet, which can be only withdrawn on condition that the transaction is verified by a predetermined number of users. The maximum number of users who can hold private keys of the wallet- is 15. It is considered as one of the most reliable ways of storage, in fact private keys are not only stored offline, but also divided between different people. Often the wallet with multisignatures is used by large crypto-companies, whose management believes that individually employees can not spend the budget. Moreover, when creating this wallet, the number of required multisignatures is minimal. For example: if one of the six keys is lost, the remaining ones will be enough for the transaction. The disadvantages of this storage:
If most of the keys are lost, access to the funds cannot be restored.
You will not be able to make transactions on your own without the participation of other key holders.
Private Key Fragmentation
The private wallet key consists of 64 symbols. The key is divided into several fragments. They don’t represent anything separately, but if you put all the fragments together, you can access the funds. The key fragments are similar to multisignatures, but in this case you don’t need a multisig-wallet, and the whole process can be done manually. The disadvantages of this method:
If one fragment is lost, access to funds will be lost.
The maximum level of protection can only be reached when key fragments are distributed to different places, for example: bookshelf, safe deposit box, car. If you divide the key fragments and put them in different boxes — the required level of protection will not be achieved.
When writing down key fragments on paper, protect the key from fire, water and aging.
Digital currencies are not physically expressed and exist only in the digital code, so cold wallets that doesn’t have an access to the Internet, protect cryptocurrencies from the most important and common problem — hacker theft. However, holders of cold wallets need to understand that the safety of a private key depends only on them. There are different ways to store private keys outside the network, but each of them makes it difficult for the user to make transactions. Hardware wallets that have been specifically designed for this purpose are considered to be the best option for storing cryptocurrencies. With their help it is possible both to store funds off the network and to make transactions easily, without risking the safety of a private key. If you use other cold wallets, it is recommended to combine them with hot wallets. Keep the required crypto currency for daily transfers on hot wallets, and keep all other crypto on cold wallets. Please don’t forget to follow us on Telegram and stay updated! YOUR CRYPTO BOSS
The date was June 10, 2018. The sun was shining, the grass was growing, and the birds were singing. At least, that’s what I assumed. Being a video game and tech obsessed teenager, I was indoors, my eyes glued to my computer monitor like a starving lion spying on a plump gazelle. I was watching the E3 (Electronic Entertainment Expo) 2018 broadcast on twitch.com, a popular streaming website. Video game developers use E3 as an annual opportunity to showcase any upcoming video game projects to the public. So far, the turnout had been disappointing. Much to my disappointment, multiple game developers failed to unveil anything of actual sustenance for an entire two hours. A graphical update here, a bug fix there. Issues that should have been fixed at every game’s initial launch, not a few months after release. Feeling hopeless, I averted my eyes from my computer monitor to check Reddit (a social media app/website) if there were any forum posts that I had yet to see. But then, I heard it. The sound of music composer Mick Gordon’s take on the original “DooM” theme, the awesome combination of metal and electronic music. I looked up at my screen and gasped. Bethesda Softworks and id software had just announced “DOOM: Eternal”, the fifth addition in the “DooM” video game series. “DOOM: Eternal” creative director Hugo Martin promised that the game would feel more powerful than it’s 2016 predecessor, there would be twice as many enemy types, and the doom community would finally get to see “hell on earth”. (Martin) As a fan of “DOOM (2016)”, I was ecstatic. The original “DooM” popularized the “First Person Shooter (FPS)” genre, and I wished I wouldn’t have to wait to experience the most recent entry in the series. “DOOM(1993)” was a graphical landmark when it originally released, yet nowadays it looks extremely dated, especially compared to “DOOM: Eternal”. What advancements in computer technology perpetuated this graphical change? Computers became faster, digital storage increased, and computer peripherals were able to display higher resolution and refresh rates. “DooM” 1993 graphics example: 📷(Doom | Doom Wiki) “DOOM: Eternal” graphics example: 📷 (Bailey) In their video “Evolution Of DOOM”, the video game YouTube Channel “gameranx” says that on December 10, 1993, a file titled “DOOM1_0.zip” was uploaded on the File Transfer Protocol (FTP) server of the University of Wisconsin. This file, two megabytes in size, contained the video game “DooM” created by the game development group “id Software”. (Evolution of DOOM) While not the first game in the “First Person Shooter” (FPS) genre, “DooM” popularized the genre, to the point of any other FPS game being referred to as a “Doom Clone” until the late 1990s. (Doom clones | Doom Wiki) The graphics of the original “DooM” is definitely a major downgrade compared to today’s graphical standards, but keep in mind that the minimum system requirements of “DooM”, according to the article “Doom System Requirements” on gamesystemrequirements.com, was eight megabytes of ram, an Intel Pentium or AMD (Advanced Micro Devices) Athlon 486 processor cycling at sixty-six megahertz or more, and an operating system that was Windows 95 or above. (Doom System Requirements) In case you don’t speak the language of technology (although I hope you learn a thing or two at the end of this essay), the speed and storage capacity is laughable compared to the specifications of today. By 1993, the microprocessor, or CPU (Central Processing Unit) had been active for the past twenty-two years after replacing the integrated circuit in 1971, thanks to the creators of the microprocessor, Robert Noyce and Gordon Moore who were also the founder of CPU manufacturer “Intel”. Gordon Moore also created “Moore’s law”, which states “The number of transistors incorporated in a chip will approximately double every 24 months”. (Moore) Sadly, according to writer and computer builder Steve Blank in his article “The End of More - The Death of Moore’s Law”, this law would end at around 2005, thanks to the basic laws of physics. (Blank) 1993 also marked an important landmark for Intel, who just released the first “Pentium” processor which was capable of a base clock of 60 MHz (megahertz). The term “base clock” refers to the default speed of a CPU. This speed can be adjusted via the user’s specifications, and “MHz” refers to one million cycles per second. A cycle is essentially one or more problems that the computer solves. The more cycles the CPU is running at, the more problems get solved. Intel would continue upgrading their “Pentium” lineup until January 4, 2000 when they would release the “Celeron” processor, with a base clock of 533 MHz. Soon after, on June 19, 2000, rival CPU company AMD would release their “Duron” processor which had a base clock of 600 MHz, with a maximum clock of 1.8 GHz (Gigahertz). One GHz is equal to 1,000 MHz. Intel and AMD had established themselves as the two major CPU companies in the 1970s in Silicon Valley. Both companies had been bitter rivals since then, trading figurative blows in the form of competitive releases, discounts, and “one upmanship” to this day. Moving on to April 21, 2005 when AMD released the first dual-core CPU, the “Athlon 64 X2 3800+”. The notable feature of this CPU, besides a 2.0 GHz base clock and a 3.8 maximum clock, was that it was the first CPU to have two cores. A CPU core is a CPU’s processor. The more cores a CPU has, the more tasks it can perform per cycle, thus maximizing it’s efficiency. Intel wouldn’t respond until January 9, 2006, when they released their dual-core processor, the “Core 2 Duo Processor E6320”, with a base clock of 1.86 GHz. (Computer Processor History) According to tech entrepreneur Linus Sebastian in his YouTube videos “10 Years of Gaming PCs: 2009 - 2014 (Part 1)” and “10 Years of Gaming PCs: 2015 - 2019 (Part 2)”, AMD would have the upper hand over Intel until 2011, when Intel released the “Sandy Bridge” CPU microarchitecture, which was faster and around the same price as AMD’s current competing products. (Sebastian) The article “What is Microarchitecture?” on the website Computer Hope defines microarchitecture as “a hardware implementation of an ISA (instruction set architecture). An ISA is a structure of commands and operations used by software to communicate with hardware. A microarchitecture is the hardware circuitry that implements one particular ISA”. (What is Microarchitecture?) Microarchitecture is also referred to as what generation a CPU belongs to. Intel would continue to dominate the high-end CPU market until 2019, when AMD would “dethrone” Intel with their third generation “Ryzen” CPU lineup. The most notable of which being the “Ryzen 3950x”, which had a total of sixteen cores, thirty-two threads, a base clock of 3.5 GHz, and a maximum clock of 4.7 GHz. (Sebastian) The term “thread” refers to splitting one core into virtual cores, via a process known as “simultaneous multithreading”. Simultaneous multithreading allows one core to perform two tasks at once. What CPU your computer has is extremely influential for how fast your computer can run, but for video games and other types of graphics, there is a special type of processor that is designed specifically for the task of “rendering” (displaying) and generating graphics. This processor unit is known as the graphics processing unit, or “GPU”. The term “GPU” wasn’t used until around 1999, when video cards started to evolve beyond the literal generation of two-dimensional graphics and into the generation of three-dimensional graphics. According to user “Olena” in their article “A Brief History of GPU”, The first GPU was the “GeForce 256”, created by GPU company “Nvidia'' in 1999. Nvidia promoted the GeForce 256 as “A single-chip processor with integrated transform, lighting, triangle setup/clipping, and rendering engines that is capable of processing a minimum of 10 million polygons per second”. (Olena) Unlike the evolution of CPUs, the history of GPUs is more one sided, with AMD playing a game of “catchup” ever since Nvidia overtook AMD in the high-end GPU market in 2013. (Sebastian) Fun fact, GPUs aren’t used only for gaming! In 2010, Nvidia collaborated with Audi to power the dashboards and increase the entertainment and navigation systems in Audi’s cars! (Olena) Much to my (and many other tech enthusiasts), GPUs would increase dramatically in price thanks to the “bitcoin mania” around 2017. This was, according to senior editor Tom Warren in his article “Bitcoin Mania is Hurting PC Gamers By Pushing Up GPU Prices'' on theverge.com, around an 80% increase in price for the same GPU due to stock shortages. (Warren) Just for context, Nvidia’s “flagship” gpu in 2017 was the 1080ti, the finest card of the “pascal” microarchitecture. Fun fact, I have this card. The 1080ti launched for $699, with the specifications of a base clock of 1,481 MHz, a maximum clock of 1,582 MHz, and 11 gigabytes of GDDR5X Vram (Memory that is exclusive to the GPU) according to the box it came in. Compare this to Nvidia’s most recent flagship GPU, the 2080ti of Nvidia’s followup “Turing” microarchitecture, another card I have. This GPU launched in 2019 for $1,199. The 2080ti’s specifications, according to the box it came in included a base clock of 1,350 MHz, a maximum clock of 1,545 MHz, and 11 gigabytes of GDDR6 Vram. A major reason why “DooM” was so popular and genius was how id software developer John Carmack managed to “fake” the three-dimensional graphics without taking up too much processing power, hard drive space, or “RAM” (Random access memory), a specific type of digital storage. According to the article “RAM (Random Access Memory) Definition” on the website TechTerms, Ram is also known as “volatile” memory, because it is much faster than normal storage (which at the time took the form of hard-drive space), and unlike normal storage, only holds data when the computer is turned on. A commonly used analogy is that Ram is the computer’s short-term memory, storing temporary files to be used by programs, while hard-drive storage is the computer’s long term memory. (RAM (Random Access Memory) Definition) As I stated earlier, in 1993, “DooM” required 8 megabytes of ram to run. For some context, as of 2020, “DOOM: Eternal” requires a minimum of 8 gigabytes of DDR4 (more on this later) ram to run, with most gaming machines possessing 16 gigabytes of DDR4 ram. According to tech journalist Scott Thornton in his article “What is DDR (Double Data Rate) Memory and SDRAM Memory”, in 1993, the popular format of ram was “SDRAM”. “SDRAM” stands for “Synchronous Dynamic Random Access Memory”. SDRAM differs from its predecessor, “DRAM” (Dynamic Random Access Memory) by being synchronized with the clock speed of the CPU. DRAM was asynchronous (not synchronized by any external influence), which “posted a problem in organizing data as it comes in so it can be queued for the process it’s associated with”. SDRAM was able to transfer data one time per clock cycle, and it’s replacement in the early 2000s, “DDR SDRAM” (Dual Data Rate Synchronous Dynamic Random Access Memory) was able to transfer data two times per clock cycle. This evolution of ram would continue to this day. In 2003, DDR2 SDRAM was released, able to transfer four pieces of data per clock cycle. In 2007, DDR3 SDRAM was able to transfer eight pieces of data per clock cycle. In 2014, DDR4 SDRAM still was able to transfer eight pieces of data per cycle, but the clock speed had increased by 600 MHz, and the overall power consumption had been reduced from 3.3 volts for the original SDRAM to 1.2 volts for DDR4. (Thornton)The digital size of each “ram stick” (a physical stick of ram that you would insert into your computer) had also increased, from around two megabytes per stick, to up to 128 gigabytes per stick (although this particular option will cost you around $1,000 per stick depending on the manufacturer) in 2020, although the average stick size is 8 gigabytes. For the average computer nowadays, you can insert up to four ram sticks, although for more high-end systems, you can insert up to sixteen or even thirty-two! Rewind back to 1993, where the original “DooM” took up two megabytes of storage, not to be confused with ram. According to tech enthusiast Rex Farrance in their article “Timeline: 50 Years of Hard Drives”, the average computer at this time had around two gigabytes of storage. Storage took the form of magnetic-optical discs, a combination of the previous magnetic discs and optical discs. (Farrance) This format of storage is still in use today, although mainly for large amounts of rarely used data, while data that is commonly used by programs (including the operating system) is put on solid-state drives, or SSDs. According to tech journalist Keith Foote in their article “A Brief History of Data Storage”, SSDs differed from the HDD by being much faster and smaller, storing data on a flash memory chip, not unlike a USB thumb drive. While SSDs had been used as far back as 1950, they wouldn’t find their way into the average gaming machine until the early 2010s. (Foote) A way to think about SSDs is common knowledge. It doesn’t contain every piece of information you know, it just contains what you use on a daily basis. For example, my computer has around 750 gigabytes of storage in SSDs, and around two terabytes of internal HDD storage. On my SSDs, I have my operating system, my favorite programs and games, and any files that I use frequently. On my HDD, I have everything else that I don’t use on a regular basis. “DOOM: Eternal” would release on March 20, 2020, four months after it’s original release date on November 22, 2019. And let me tell you, I was excited. The second my clock turned from 11:59 P.M. to 12:00 A.M., I repeatedly clicked my refresh button, desperately waiting to see the words “Coming March 20” transform into the ever so beautiful and elegant phrase: “Download Now”. At this point in time, I had a monitor that was capable of displaying roughly two-million pixels spread out over it’s 27 inch display panel, at a rate of 240 times a second. Speaking of monitors and displays, according to the article “The Evolution of the Monitor” on the website PCR, at the time of the original “DooM” release, the average monitor was either a CRT (cathode ray tube) monitor, or the newer (and more expensive) LCD (liquid crystal display) monitor. The CRT monitor was first unveiled in 1897 by the German physicist Karl Ferdinand Braun. CRT monitors functioned by colored cathode ray tubes generating an image on a phosphorescent screen. These monitors would have an average resolution of 800 by 600 pixels and a refresh rate of around 30 frames per second. CRT monitors would eventually be replaced by LCD monitors in the late 2000s. LCD monitors functioned by using two pieces of polarized glass with liquid crystal between them. A backlight would shine through the first piece of polarized glass (also known as substrate). Electrical currents would then cause the liquid crystals to adjust how much light passes through to the second substrate, which creates the images that are displayed. (The Evolution of the Monitor) The average resolution would increase to 1920x1080 pixels and the refresh rate would increase to 60 frames a second around 2010. Nowadays, there are high end monitors that are capable of displaying up to 7,680 by 4,320 pixels, and also monitors that are capable of displaying up to 360 frames per second, assuming you have around $1,000 lying around. At long last, it had finished. My 40.02 gigabyte download of “DOOM: Eternal” had finally completed, and oh boy, I was ready to experience this. I ran over to my computer, my beautiful creation sporting 32 gigs of DDR4 ram, an AMD Ryzen 7 “3800x” with a base clock of 3.8 GHz, an Nvidia 2080ti, 750 gigabytes of SSD storage and two terabytes of HDD storage. Finally, after two years of waiting for this, I grabbed my mouse, and moved my cursor over that gorgeous button titled “Launch DOOM: Eternal”. Thanks to multiple advancements in the speed of CPUs, the size of ram and storage, and display resolution and refresh rate, “DooM” had evolved from an archaic, pixelated video game in 1993 into the beautiful, realistic and smooth video game it is today. And personally, I can’t wait to see what the future has in store for us.
Dear Groestlers, it goes without saying that 2020 has been a difficult time for millions of people worldwide. The groestlcoin team would like to take this opportunity to wish everyone our best to everyone coping with the direct and indirect effects of COVID-19. Let it bring out the best in us all and show that collectively, we can conquer anything. The centralised banks and our national governments are facing unprecedented times with interest rates worldwide dropping to record lows in places. Rest assured that this can only strengthen the fundamentals of all decentralised cryptocurrencies and the vision that was seeded with Satoshi's Bitcoin whitepaper over 10 years ago. Despite everything that has been thrown at us this year, the show must go on and the team will still progress and advance to continue the momentum that we have developed over the past 6 years. In addition to this, we'd like to remind you all that this is Groestlcoin's 6th Birthday release! In terms of price there have been some crazy highs and lows over the years (with highs of around $2.60 and lows of $0.000077!), but in terms of value– Groestlcoin just keeps getting more valuable! In these uncertain times, one thing remains clear – Groestlcoin will keep going and keep innovating regardless. On with what has been worked on and completed over the past few months.
UPDATED - Groestlcoin Core 2.18.2
This is a major release of Groestlcoin Core with many protocol level improvements and code optimizations, featuring the technical equivalent of Bitcoin v0.18.2 but with Groestlcoin-specific patches. On a general level, most of what is new is a new 'Groestlcoin-wallet' tool which is now distributed alongside Groestlcoin Core's other executables. NOTE: The 'Account' API has been removed from this version which was typically used in some tip bots. Please ensure you check the release notes from 2.17.2 for details on replacing this functionality.
Builds are now done through Gitian
Calls to getblocktemplate will fail if the segwit rule is not specified. Calling getblocktemplate without segwit specified is almost certainly a misconfiguration since doing so results in lower rewards for the miner. Failed calls will produce an error message describing how to enable the segwit rule.
A warning is printed if an unrecognized section name is used in the configuration file. Recognized sections are [test], [main], and [regtest].
Four new options are available for configuring the maximum number of messages that ZMQ will queue in memory (the "high water mark") before dropping additional messages. The default value is 1,000, the same as was used for previous releases.
The rpcallowip option can no longer be used to automatically listen on all network interfaces. Instead, the rpcbind parameter must be used to specify the IP addresses to listen on. Listening for RPC commands over a public network connection is insecure and should be disabled, so a warning is now printed if a user selects such a configuration. If you need to expose RPC in order to use a tool like Docker, ensure you only bind RPC to your localhost, e.g. docker run [...] -p 127.0.0.1:1441:1441 (this is an extra :1441 over the normal Docker port specification).
The rpcpassword option now causes a startup error if the password set in the configuration file contains a hash character (#), as it's ambiguous whether the hash character is meant for the password or as a comment.
The whitelistforcerelay option is used to relay transactions from whitelisted peers even when not accepted to the mempool. This option now defaults to being off, so that changes in policy and disconnect/ban behavior will not cause a node that is whitelisting another to be dropped by peers.
A new short about the JSON-RPC interface describes cases where the results of anRPC might contain inconsistencies between data sourced from differentsubsystems, such as wallet state and mempool state.
A new document introduces Groestlcoin Core's BIP174 interface, which is used to allow multiple programs to collaboratively work to create, sign, and broadcast new transactions. This is useful for offline (cold storage) wallets, multisig wallets, coinjoin implementations, and many other cases where two or more programs need to interact to generate a complete transaction.
The output script descriptor (https://github.com/groestlcoin/groestlcoin/blob/mastedoc/descriptors.md) documentation has been updated with information about new features in this still-developing language for describing the output scripts that a wallet or other program wants to receive notifications for, such as which addresses it wants to know received payments. The language is currently used in multiple new and updated RPCs described in these release notes and is expected to be adapted to other RPCs and to the underlying wallet structure.
A new --disable-bip70 option may be passed to ./configure to prevent Groestlcoin-Qt from being built with support for the BIP70 payment protocol or from linking libssl. As the payment protocol has exposed Groestlcoin Core to libssl vulnerabilities in the past, builders who don't need BIP70 support are encouraged to use this option to reduce their exposure to future vulnerabilities.
The minimum required version of Qt (when building the GUI) has been increased from 5.2 to 5.5.1 (the depends system provides 5.9.7)
getnodeaddresses returns peer addresses known to this node. It may be used to find nodes to connect to without using a DNS seeder.
listwalletdir returns a list of wallets in the wallet directory (either the default wallet directory or the directory configured bythe -walletdir parameter).
getrpcinfo returns runtime details of the RPC server. Currently, it returns an array of the currently active commands and how long they've been running.
deriveaddresses returns one or more addresses corresponding to an output descriptor.
getdescriptorinfo accepts a descriptor and returns information aboutit, including its computed checksum.
joinpsbts merges multiple distinct PSBTs into a single PSBT. The multiple PSBTs must have different inputs. The resulting PSBT will contain every input and output from all the PSBTs. Any signatures provided in any of the PSBTs will be dropped.
analyzepsbt examines a PSBT and provides information about what the PSBT contains and the next steps that need to be taken in order to complete the transaction. For each input of a PSBT, analyze psbt provides information about what information is missing for that input, including whether a UTXO needs to be provided, what pubkeys still need to be provided, which scripts need to be provided, and what signatures are still needed. Every input will also list which role is needed to complete that input, and analyzepsbt will also list the next role in general needed to complete the PSBT. analyzepsbt will also provide the estimated fee rate and estimated virtual size of the completed transaction if it has enough information to do so.
utxoupdatepsbt searches the set of Unspent Transaction Outputs (UTXOs) to find the outputs being spent by the partial transaction. PSBTs need to have the UTXOs being spent to be provided because the signing algorithm requires information from the UTXO being spent. For segwit inputs, only the UTXO itself is necessary. For non-segwit outputs, the entire previous transaction is needed so that signers can be sure that they are signing the correct thing. Unfortunately, because the UTXO set only contains UTXOs and not full transactions, utxoupdatepsbt will only add the UTXO for segwit inputs.
getpeerinfo now returns an additional minfeefilter field set to the peer's BIP133 fee filter. You can use this to detect that you have peers that are willing to accept transactions below the default minimum relay fee.
The mempool RPCs, such as getrawmempool with verbose=true, now return an additional "bip125-replaceable" value indicating whether thetransaction (or its unconfirmed ancestors) opts-in to asking nodes and miners to replace it with a higher-feerate transaction spending any of the same inputs.
settxfee previously silently ignored attempts to set the fee below the allowed minimums. It now prints a warning. The special value of"0" may still be used to request the minimum value.
getaddressinfo now provides an ischange field indicating whether the wallet used the address in a change output.
importmulti has been updated to support P2WSH, P2WPKH, P2SH-P2WPKH, and P2SH-P2WSH. Requests for P2WSH and P2SH-P2WSH accept an additional witnessscript parameter.
importmulti now returns an additional warnings field for each request with an array of strings explaining when fields are being ignored or are inconsistent, if there are any.
getaddressinfo now returns an additional solvable Boolean field when Groestlcoin Core knows enough about the address's scriptPubKey, optional redeemScript, and optional witnessScript for the wallet to be able to generate an unsigned input spending funds sent to that address.
The getaddressinfo, listunspent, and scantxoutset RPCs now return an additional desc field that contains an output descriptor containing all key paths and signing information for the address (except for the private key). The desc field is only returned for getaddressinfo and listunspent when the address is solvable.
importprivkey will preserve previously-set labels for addresses or public keys corresponding to the private key being imported. For example, if you imported a watch-only address with the label "coldwallet" in earlier releases of Groestlcoin Core, subsequently importing the private key would default to resetting the address's label to the default empty-string label (""). In this release, the previous label of "cold wallet" will be retained. If you optionally specify any label besides the default when calling importprivkey, the new label will be applied to the address.
getmininginfo now omits currentblockweight and currentblocktx when a block was never assembled via RPC on this node.
The getrawtransaction RPC & REST endpoints no longer check the unspent UTXO set for a transaction. The remaining behaviors are as follows:
If a blockhash is provided, check the corresponding block.
If no blockhash is provided, check the mempool.
If no blockhash is provided but txindex is enabled, also check txindex.
unloadwallet is now synchronous, meaning it will not return until the wallet is fully unloaded.
importmulti now supports importing of addresses from descriptors. A desc parameter can be provided instead of the "scriptPubKey" in are quest, as well as an optional range for ranged descriptors to specify the start and end of the range to import. Descriptors with key origin information imported through importmulti will have their key origin information stored in the wallet for use with creating PSBTs.
listunspent has been modified so that it also returns witnessScript, the witness script in the case of a P2WSH orP2SH-P2WSH output.
createwallet now has an optional blank argument that can be used to create a blank wallet. Blank wallets do not have any keys or HDseed. They cannot be opened in software older than 2.18.2. Once a blank wallet has a HD seed set (by using sethdseed) or private keys, scripts, addresses, and other watch only things have been imported, the wallet is no longer blank and can be opened in 2.17.2. Encrypting a blank wallet will also set a HD seed for it.
signrawtransaction is removed after being deprecated and hidden behind a special configuration option in version 2.17.2.
The 'account' API is removed after being deprecated in v2.17.2 The 'label' API was introduced in v2.17.2 as a replacement for accounts. See the release notes from v2.17.2 for a full description of the changes from the 'account' API to the 'label' API.
addwitnessaddress is removed after being deprecated in version 2.16.0.
generate is deprecated and will be fully removed in a subsequent major version. This RPC is only used for testing, but its implementation reached across multiple subsystems (wallet and mining), so it is being deprecated to simplify the wallet-node interface. Projects that are using generate for testing purposes should transition to using the generatetoaddress RPC, which does not require or use the wallet component. Calling generatetoaddress with an address returned by the getnewaddress RPC gives the same functionality as the old generate RPC. To continue using generate in this version, restart groestlcoind with the -deprecatedrpc=generate configuration option.
Be reminded that parts of the validateaddress command have been deprecated and moved to getaddressinfo. The following deprecated fields have moved to getaddressinfo: ismine, iswatchonly,script, hex, pubkeys, sigsrequired, pubkey, embedded,iscompressed, label, timestamp, hdkeypath, hdmasterkeyid.
The addresses field has been removed from the validateaddressand getaddressinfo RPC methods. This field was confusing since it referred to public keys using their P2PKH address. Clients should use the embedded.address field for P2SH or P2WSH wrapped addresses, and pubkeys for inspecting multisig participants.
A new /rest/blockhashbyheight/ endpoint is added for fetching the hash of the block in the current best blockchain based on its height (how many blocks it is after the Genesis Block).
A new Window menu is added alongside the existing File, Settings, and Help menus. Several items from the other menus that opened new windows have been moved to this new Window menu.
In the Send tab, the checkbox for "pay only the required fee" has been removed. Instead, the user can simply decrease the value in the Custom Fee rate field all the way down to the node's configured minimumrelay fee.
In the Overview tab, the watch-only balance will be the only balance shown if the wallet was created using the createwallet RPC and thedisable_private_keys parameter was set to true.
The launch-on-startup option is no longer available on macOS if compiled with macosx min version greater than 10.11 (useCXXFLAGS="-mmacosx-version-min=10.11" CFLAGS="-mmacosx-version-min=10.11" for setting the deployment sdkversion)
A new groestlcoin-wallet tool is now distributed alongside Groestlcoin Core's other executables. Without needing to use any RPCs, this tool can currently create a new wallet file or display some basic information about an existing wallet, such as whether the wallet is encrypted, whether it uses an HD seed, how many transactions it contains, and how many address book entries it has.
Since version 2.16.0, Groestlcoin Core's built-in wallet has defaulted to generating P2SH-wrapped segwit addresses when users want to receive payments. These addresses are backwards compatible with all widely used software. Starting with Groestlcoin Core 2.20.1 (expected about a year after 2.18.2), Groestlcoin Core will default to native segwitaddresses (bech32) that provide additional fee savings and other benefits. Currently, many wallets and services already support sending to bech32 addresses, and if the Groestlcoin Core project sees enough additional adoption, it will instead default to bech32 receiving addresses in Groestlcoin Core 2.19.1. P2SH-wrapped segwit addresses will continue to be provided if the user requests them in the GUI or by RPC, and anyone who doesn't want the update will be able to configure their default address type. (Similarly, pioneering users who want to change their default now may set the addresstype=bech32 configuration option in any Groestlcoin Core release from 2.16.0 up.)
BIP 61 reject messages are now deprecated. Reject messages have no use case on the P2P network and are only logged for debugging by most network nodes. Furthermore, they increase bandwidth and can be harmful for privacy and security. It has been possible to disable BIP 61 messages since v2.17.2 with the -enablebip61=0 option. BIP 61 messages will be disabled by default in a future version, before being removed entirely.
The submitblock RPC previously returned the reason a rejected block was invalid the first time it processed that block but returned a generic "duplicate" rejection message on subsequent occasions it processed the same block. It now always returns the fundamental reason for rejecting an invalid block and only returns "duplicate" for valid blocks it has already accepted.
A new submitheader RPC allows submitting block headers independently from their block. This is likely only useful for testing.
The signrawtransactionwithkey and signrawtransactionwithwallet RPCs have been modified so that they also optionally accept a witnessScript, the witness script in the case of a P2WSH orP2SH-P2WSH output. This is compatible with the change to listunspent.
For the walletprocesspsbt and walletcreatefundedpsbt RPCs, if thebip32derivs parameter is set to true but the key metadata for a public key has not been updated yet, then that key will have a derivation path as if it were just an independent key (i.e. no derivation path and its master fingerprint is itself).
The -usehd configuration option was removed in version 2.16.0 From that version onwards, all new wallets created are hierarchical deterministic wallets. This release makes specifying -usehd an invalid configuration option.
This release allows peers that your node automatically disconnected for misbehaviour (e.g. sending invalid data) to reconnect to your node if you have unused incoming connection slots. If your slots fill up, a misbehaving node will be disconnected to make room for nodes without a history of problems (unless the misbehaving node helps your node in some other way, such as by connecting to a part of the Internet from which you don't have many other peers). Previously, Groestlcoin Core banned the IP addresses of misbehaving peers for a period (default of 1 day); this was easily circumvented by attackers with multiple IP addresses. If you manually ban a peer, such as by using the setban RPC, all connections from that peer will still be rejected.
The key metadata will need to be upgraded the first time that the HDseed is available. For unencrypted wallets this will occur on wallet loading. For encrypted wallets this will occur the first time the wallet is unlocked.
Newly encrypted wallets will no longer require restarting the software. Instead such wallets will be completely unloaded and reloaded to achieve the same effect.
A sub-project of Bitcoin Core now provides Hardware Wallet Interaction (HWI) scripts that allow command-line users to use several popular hardware key management devices with Groestlcoin Core. See their project page for details.
This release changes the Random Number Generator (RNG) used from OpenSSL to Groestlcoin Core's own implementation, although entropy gathered by Groestlcoin Core is fed out to OpenSSL and then read back in when the program needs strong randomness. This moves Groestlcoin Core a little closer to no longer needing to depend on OpenSSL, a dependency that has caused security issues in the past. The new implementation gathers entropy from multiple sources, including from hardware supporting the rdseed CPU instruction.
On macOS, Groestlcoin Core now opts out of application CPU throttling ("app nap") during initial blockchain download, when catching up from over 100 blocks behind the current chain tip, or when reindexing chain data. This helps prevent these operations from taking an excessively long time because the operating system is attempting to conserve power.
How to Upgrade?
Windows If you are running an older version, shut it down. Wait until it has completely shut down (which might take a few minutes for older versions), then run the installer. OSX If you are running an older version, shut it down. Wait until it has completely shut down (which might take a few minutes for older versions), run the dmg and drag Groestlcoin Core to Applications. Ubuntu http://groestlcoin.org/forum/index.php?topic=441.0
ALL NEW - Groestlcoin Moonshine iOS/Android Wallet
Built with React Native, Moonshine utilizes Electrum-GRS's JSON-RPC methods to interact with the Groestlcoin network. GRS Moonshine's intended use is as a hot wallet. Meaning, your keys are only as safe as the device you install this wallet on. As with any hot wallet, please ensure that you keep only a small, responsible amount of Groestlcoin on it at any given time.
Groestlcoin Mainnet & Testnet supported
Multiple wallet support
Electrum - Support for both random and custom peers
Biometric + Pin authentication
Custom fee selection
Import mnemonic phrases via manual entry or scanning
BIP39 Passphrase functionality
Support for Segwit-compatible & legacy addresses in settings
Support individual private key sweeping
UTXO blacklisting - Accessible via the Transaction Detail view, this allows users to blacklist any utxo that they do not wish to include in their list of available utxo's when sending transactions. Blacklisting a utxo excludes its amount from the wallet's total balance.
Ability to Sign & Verify Messages
Support BitID for password-free authentication
Coin Control - This can be accessed from the Send Transaction view and basically allows users to select from a list of available UTXO's to include in their transaction.
HODL GRS connects directly to the Groestlcoin network using SPV mode and doesn't rely on servers that can be hacked or disabled. HODL GRS utilizes AES hardware encryption, app sandboxing, and the latest security features to protect users from malware, browser security holes, and even physical theft. Private keys are stored only in the secure enclave of the user's phone, inaccessible to anyone other than the user. Simplicity and ease-of-use is the core design principle of HODL GRS. A simple recovery phrase (which we call a Backup Recovery Key) is all that is needed to restore the user's wallet if they ever lose or replace their device. HODL GRS is deterministic, which means the user's balance and transaction history can be recovered just from the backup recovery key.
Simplified payment verification for fast mobile performance
Groestlcoin Seed Savior is a tool for recovering BIP39 seed phrases. This tool is meant to help users with recovering a slightly incorrect Groestlcoin mnemonic phrase (AKA backup or seed). You can enter an existing BIP39 mnemonic and get derived addresses in various formats. To find out if one of the suggested addresses is the right one, you can click on the suggested address to check the address' transaction history on a block explorer.
If a word is wrong, the tool will try to suggest the closest option.
If a word is missing or unknown, please type "?" instead and the tool will find all relevant options.
NOTE: NVidia GPU or any CPU only. AMD graphics cards will not work with this address generator. VanitySearch is a command-line Segwit-capable vanity Groestlcoin address generator. Add unique flair when you tell people to send Groestlcoin. Alternatively, VanitySearch can be used to generate random addresses offline. If you're tired of the random, cryptic addresses generated by regular groestlcoin clients, then VanitySearch is the right choice for you to create a more personalized address. VanitySearch is a groestlcoin address prefix finder. If you want to generate safe private keys, use the -s option to enter your passphrase which will be used for generating a base key as for BIP38 standard (VanitySearch.exe -s "My PassPhrase" FXPref). You can also use VanitySearch.exe -ps "My PassPhrase" which will add a crypto secure seed to your passphrase. VanitySearch may not compute a good grid size for your GPU, so try different values using -g option in order to get the best performances. If you want to use GPUs and CPUs together, you may have best performances by keeping one CPU core for handling GPU(s)/CPU exchanges (use -t option to set the number of CPU threads).
Fixed size arithmetic
Fast Modular Inversion (Delayed Right Shift 62 bits)
SecpK1 Fast modular multiplication (2 steps folding 512bits to 256bits using 64 bits digits)
Use some properties of elliptic curve to generate more keys
SSE Secure Hash Algorithm SHA256 and RIPEMD160 (CPU)
Groestlcoin EasyVanity 2020 is a windows app built from the ground-up and makes it easier than ever before to create your very own bespoke bech32 address(es) when whilst not connected to the internet. If you're tired of the random, cryptic bech32 addresses generated by regular Groestlcoin clients, then Groestlcoin EasyVanity2020 is the right choice for you to create a more personalised bech32 address. This 2020 version uses the new VanitySearch to generate not only legacy addresses (F prefix) but also Bech32 addresses (grs1 prefix).
Ability to continue finding keys after first one is found
Includes warning on start-up if connected to the internet
Ability to output keys to a text file (And shows button to open that directory)
Show and hide the private key with a simple toggle switch
Show full output of commands
Ability to choose between Processor (CPU) and Graphics Card (GPU) ( NVidia ONLY! )
Features both a Light and Dark Material Design-Style Themes
Free software - MIT. Anyone can audit the code.
Written in C# - The code is short, and easy to review.
Groestlcoin WPF is an alternative full node client with optional lightweight 'thin-client' mode based on WPF. Windows Presentation Foundation (WPF) is one of Microsoft's latest approaches to a GUI framework, used with the .NET framework. Its main advantages over the original Groestlcoin client include support for exporting blockchain.dat and including a lite wallet mode. This wallet was previously deprecated but has been brought back to life with modern standards.
Works via TOR or SOCKS5 proxy
Can use bootstrap.dat format as blockchain database
Import/Export blockchain to/from bootstrap.dat
Import wallet.dat from Groestlcoin-qt wallet
Export wallet to wallet.dat
Use both groestlcoin-wpf and groestlcoin-qt with the same addresses in parallel. When you send money from one program, the transaction will automatically be visible on the other wallet.
Rescan blockchain with a simple mouse click
Works as a full node and listens to port 1331 (listening port can be changed)
Fast Block verifying, parallel processing on multi-core CPUs
Mine Groestlcoins with your CPU by a simple mouse click
All private keys are kept encrypted on your local machine (or on a USB stick)
Lite - Has a lightweight "thin client" mode which does not require a new user to download the entire Groestlcoin chain and store it
Free and decentralised - Open Source under GNU license
Fixed Import/Export to wallet.dat
Rescan wallet option
Change wallet password option
Address type and Change type options through *.conf file
Import from bootstrap.dat - It is a flat, binary file containing Groestlcoin blockchain data, from the genesis block through a recent height. All versions automatically validate and import the file "grs.bootstrap.dat" in the GRS directory. Grs.bootstrap.dat is compatible with Qt wallet. GroestlCoin-Qt can load from it.
In Full mode file %APPDATA%\Groestlcoin-WPF\GRS\GRS.bootstrap.dat is full blockchain in standard bootstrap.dat format and can be used with other clients.
Groestlcoin Electrum Personal Server aims to make using Electrum Groestlcoin wallet more secure and more private. It makes it easy to connect your Electrum-GRS wallet to your own full node. It is an implementation of the Electrum-grs server protocol which fulfils the specific need of using the Electrum-grs wallet backed by a full node, but without the heavyweight server backend, for a single user. It allows the user to benefit from all Groestlcoin Core's resource-saving features like pruning, blocks only and disabled txindex. All Electrum-GRS's feature-richness like hardware wallet integration, multi-signature wallets, offline signing, seed recovery phrases, coin control and so on can still be used, but connected only to the user's own full node. Full node wallets are important in Groestlcoin because they are a big part of what makes the system be trust-less. No longer do people have to trust a financial institution like a bank or PayPal, they can run software on their own computers. If Groestlcoin is digital gold, then a full node wallet is your own personal goldsmith who checks for you that received payments are genuine. Full node wallets are also important for privacy. Using Electrum-GRS under default configuration requires it to send (hashes of) all your Groestlcoin addresses to some server. That server can then easily spy on your transactions. Full node wallets like Groestlcoin Electrum Personal Server would download the entire blockchain and scan it for the user's own addresses, and therefore don't reveal to anyone else which Groestlcoin addresses they are interested in. Groestlcoin Electrum Personal Server can also broadcast transactions through Tor which improves privacy by resisting traffic analysis for broadcasted transactions which can link the IP address of the user to the transaction. If enabled this would happen transparently whenever the user simply clicks "Send" on a transaction in Electrum-grs wallet. Note: Currently Groestlcoin Electrum Personal Server can only accept one connection at a time.
Use your own node
Uses less CPU and RAM than ElectrumX
Used intermittently rather than needing to be always-on
Doesn't require an index of every Groestlcoin address ever used like on ElectrumX
UPDATED – Android Wallet 7.38.1 - Main Net + Test Net
The app allows you to send and receive Groestlcoin on your device using QR codes and URI links. When using this app, please back up your wallet and email them to yourself! This will save your wallet in a password protected file. Then your coins can be retrieved even if you lose your phone.
Add confidence messages, helping users to understand the confidence state of their payments.
Handle edge case when restoring via an external app.
Count devices with a memory class of 128 MB as low ram.
Introduce dark mode on Android 10 devices.
Reduce memory usage of PIN-protected wallets.
Tapping on the app's version will reveal a checksum of the APK that was installed.
Fix issue with confirmation of transactions that empty your wallet.
Groestlcoin Sentinel is a great solution for anyone who wants the convenience and utility of a hot wallet for receiving payments directly into their cold storage (or hardware wallets). Sentinel accepts XPUB's, YPUB'S, ZPUB's and individual Groestlcoin address. Once added you will be able to view balances, view transactions, and (in the case of XPUB's, YPUB's and ZPUB's) deterministically generate addresses for that wallet. Groestlcoin Sentinel is a fork of Groestlcoin Samourai Wallet with all spending and transaction building code removed.
Q&A for Bitcoin crypto-currency enthusiasts. Stack Exchange network consists of 176 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.. Visit Stack Exchange Bitcoin Core initial synchronization will take time and download a lot of data. You should make sure that you have enough bandwidth and storage for the full block chain size (~ 250GB). If you have a good Internet connection, you can help strengthen the network by keeping your PC running with Bitcoin Core and port 8333 open. Lecture 5: Synchronization Process, Pruning ... those other little opcodes, which it adds a few bytes, and then your amount, which is--so all amounts in Bitcoin are encoded as 8-byte, signed 64-bit integers. So you can have pretty high precision. And that's also overkill, since all the bitcoins ever mined, put together--if you added them all up, it's nowhere near 64 bits to the 64. It's like 2 ... Alternativ können auch USB-Miner oder spezielle Mining-Server (wie der Antminer) benutzt werden. Falls das Bitcoin Mining professionell und 24 Stunden am Tag durchgeführt werden soll, kann die Anschaffung des Mini-Computer Raspberry Pi für USB-Mining sinnvoll sein, um so Energiekosten zu sparen. Wir empfehlen das Bitcoin-Zuhause Mining jedoch nicht, da aufgrund der Stromkosten und der hohen ... er! Let your computer work for you Bitcoin Miner 1.64.0 - Critical fix for license failures caused by Windows Update KB4550945 ; Get Bitcoin Miner - Microsoft Store en-Z . er (GUI(Windows & MacOS X)) Bitcoin Core initial synchronization will take time and download a lot of data. Bitcoin Core is a community-driven free software project, released ...
How to sync Bitcoin wallet on multiple devices - BlockChain
bitcoin usd bitcoin utveckling bitcoin usb miner bitcoin utopia bitcoin usd chart bitcoin uttagsautomat bitcoin url bitcoin users bitcoin uri bitcoin ubuntu. Category People & Blogs; Show more ... Link to stable 64 bit version of BFGMiner: ... Bitcoin Mining on Old Hardware; The Intel Celeron Coppermine CPU 900MHz - Duration: 14:28. AA Computers and Technology 74,177 views. 14:28. How To ... [HOW TO]- Store Bitcoin On USB Stick - Guide - Duration: 14:01. MrJayBusch 205,872 views. 14:01. Install, Backup And Restore A Bitcoin Wallet. I Bought a $3 2TB USB Drive and Got More Than Just Malware - Duration: 11 ... How to sync Reddcoin wallet faster - Issues/ problems - Duration: 7:17. GadgetHero 3,749 views. 7:17. How to Recover ... Guide how to set up Bitcoin wallet on multiple devices. Multiple devices sync with one Bitcoin wallet. Bitcoin wallet - BlockChain Device: HP - PC and Android - Sony Xperia Tablet S Music: The ...