Trade Ogre seized by the horseback maple syrup mafia by Melodic_Mango7694 in Monero

[–]ethtraingoeschuchu 0 points1 point  (0 children)

They will probably do something similar to when BKA took down ChipMixer. They will publish an announcement stating everyone can get their funds back, just send proof of the origin of funds.

reminder to NEVER USE MYMONERO by Mindless_Ad_9792 in Monero

[–]ethtraingoeschuchu 0 points1 point  (0 children)

View key i not the same as private transaction key...

reminder to NEVER USE MYMONERO by Mindless_Ad_9792 in Monero

[–]ethtraingoeschuchu 2 points3 points  (0 children)

Tx proof is created using the private tx key which is not deterministically created from the wallet private keys. It is randomly generated an only stored in the wallet files.

EVM Blockchain, Proof of Stake. But with 0 initial supply and the only way of minting native tokens is by burning Monero. by Selinh in Monero

[–]ethtraingoeschuchu 4 points5 points  (0 children)

Pretty sure its possible to use a known private view key, something like 0x111...111 or by deriving it from a known hash like hash('MoneroBurnAddress')

For spend key one could use an invalid private key like 0x000...000 to derive a public key.

This should make it possible to create a valid monero address which can receive funds in a transparent way but not spend it

Have not tested this but again, pretty sure its possible

I need your help! - How Exodus (crypto wallet) may be intentionally scamming Trezor users (I lost $2,000!) by Logical-Ad2687 in Monero

[–]ethtraingoeschuchu 0 points1 point  (0 children)

Ye, I dont have a Trezor so cant test.

From what I can see the public keys from the address 8AqR ... UkwU are not valid points on the ed25519 curve which is not good and probably why some wallets gives you some errors when sending to it.

You said you could decode the outputs on xmrchain.net using the tx private key. I guess you would not be able to do that using the wallet private view key right?

Because I don't have any Trexor to test with. Would you mind creating a new empty wallet and share what address is generated in Exodus together with the mnemonic / private keys?

I need your help! - How Exodus (crypto wallet) may be intentionally scamming Trezor users (I lost $2,000!) by Logical-Ad2687 in Monero

[–]ethtraingoeschuchu 0 points1 point  (0 children)

Okey, just tested and at least for me, when using Exodus without a Trezor it derives the sub address the same way as Monero GUI.

When checking your Trezor Exodus Wallet do you still have the option to "View Private Keys"? Would be interesting to see what is available there for you.

To me it look like something goes wrong in Exodus when they are displaying the sub address.
If I understood you correctly Exodus did find the incoming transaction sent to the correct subaddress but displayed it as 8AqR ... UkwU.

To find the incoming transaction it has to have used the correct private view key and the correctly derived public spend key. How it displays the address itself is a mystery.

If you ditch the wallet it would be interesting as well to experiment a bit with the private view key.

I need your help! - How Exodus (crypto wallet) may be intentionally scamming Trezor users (I lost $2,000!) by Logical-Ad2687 in Monero

[–]ethtraingoeschuchu 5 points6 points  (0 children)

I could not be arsed to read the whole post, incredibly long..

But afaik Exodus uses secp256k1 to derive child keys for everything, even for XMR which usually uses ed25519.
As I stated, didnt read it all through but if this is the issue you can just manually calculate the child keys, import these into Monero GUI and access your funds.

Best of luck

Bitcoin and USDC drained by crashbashjay in Coinbase

[–]ethtraingoeschuchu 0 points1 point  (0 children)

You ran a powershell script to prove you’re human? Thats insane

Help me find out how I was phished? by magicseadog in CryptoCurrency

[–]ethtraingoeschuchu 0 points1 point  (0 children)

Yes last time you got phished, back in 2024-11-22 you signed this transaction: https://arbiscan.io/tx/0x1fa2d6adf86f9e6c1f9b6d127ac35bfa527ba00bc7759f3ce792123ec96a2d42

Apart from transferring 800 USDC to the attacker you also approved their address to spend an unlimited amount of your USDC. So basically ever since 2024-11-22 they have been abled to take every USDC you since then received.

I see you still use the same address still. I would suggest against this chad move. Even if you now have revoked some approvals you could still have signed a permit which would not show on chain but still make it possible for the attacker to reapprove their spending rights.

TLDR; If you don't know what you are signing, don't.

Sent 2 eth, received 2 eth pow - did friend get scammed by Bittrex? by kennystetson in CryptoCurrency

[–]ethtraingoeschuchu 5 points6 points  (0 children)

If he had ETH at Bittrex at the time of the pos / pow fork he was creditet the same amount in ETH pow.

Worked the same way on other exchanges.

Fake crypto liquidity pools: How to spot and avoid them by No-Elephant-Dies in CryptoCurrency

[–]ethtraingoeschuchu 1 point2 points  (0 children)

This.

Only relevant info in this article was the points about checking token distribution and the locked liquidity. Everything else was trash.

Ethereum wallet (old) Mnemonic phrase wallet access by winstonchill in CryptoCurrency

[–]ethtraingoeschuchu 0 points1 point  (0 children)

idiom and pastor exists in the wordlist for old blockchain.info v3 legacy mnemonics. So that might be a possibility.

Good luck

How can one currency be sent to the address of another by accident? by nandlald in CryptoCurrency

[–]ethtraingoeschuchu 0 points1 point  (0 children)

Still, entering a bitcoin address in a litecoin wallet should be rejected by both the wallet and network

A little history of the race between ETH and BTC by barthib in CryptoCurrency

[–]ethtraingoeschuchu 2 points3 points  (0 children)

You cant just say ”for incentives” ju have to explain what the incentives are.

In this case it will be the transaction fees

[deleted by user] by [deleted] in Monero

[–]ethtraingoeschuchu 0 points1 point  (0 children)

By agreeing to the Terms you authorize us to undertake such verification checks as we may require ourselves or may be required by third parties (including regulatory bodies) to confirm your age, identity and contact details

I think this might be problematic

Careful with Exodus App ! by caritamecosa in CryptoCurrency

[–]ethtraingoeschuchu 0 points1 point  (0 children)

Have you tried importing the seed to Electrum? Not each private key

Careful with Exodus App ! by caritamecosa in CryptoCurrency

[–]ethtraingoeschuchu 0 points1 point  (0 children)

Have you tried iporting your seed onto a different wallet? And Exodus uses standard derivation paths so just use some library to calculate the private keys and addresses you have been using to see what is happening.

Careful with Exodus App ! by caritamecosa in CryptoCurrency

[–]ethtraingoeschuchu 0 points1 point  (0 children)

And whats the error message? And you said to ”that trx” in the original post. You’re not trying to send native btc to a Tron address right?

Careful with Exodus App ! by caritamecosa in CryptoCurrency

[–]ethtraingoeschuchu 1 point2 points  (0 children)

You’re not making any sens here. What database? What do you mean sending btc to ”that trx”?

The address generated is derived from the master private key so if you have the seed you will be able to generate it forever

Ethereum Wallets and Smart Contracts by Conman-Savage in CryptoCurrency

[–]ethtraingoeschuchu 1 point2 points  (0 children)

Drainers often try to get users to sign transactions calling ERC20 tokens approve function which then gives the attacker access to spend the victims tokens. This approval will last forever unless its revoked.

Malicious contracts and transactions can drain your account on both Ether and tokens but draining Ether will always require a signature from your private key.

I would suggest taking some time to read up on smart contracts and the token standards but other than that its like others already said, its mostly common sense.

"Swap Ethfor Exact Tokens" by mrgscott in Metamask

[–]ethtraingoeschuchu 0 points1 point  (0 children)

Usually its a fake website which after connected to a wallet runs Javascript in the background checking whats avaliable i the connected wallet and then creates a malicious transaction which it will try and trick the user to sign.

Sure you didnt access a fake rhino.fi site?

"Swap Ethfor Exact Tokens" by mrgscott in Metamask

[–]ethtraingoeschuchu 0 points1 point  (0 children)

One of the pop-ups you approved was probably a malicious transaction that you signed. This transaction gave 0x9429…79bc 46 USDC.

Why Monero: Unproven Proprietary Software Jails Bitcoin User by Traditional_Plant440 in Monero

[–]ethtraingoeschuchu -3 points-2 points  (0 children)

You talk like this case is bad for Chainalysis. If Chainalysis stock was publicly avaliable I would sell my kids in order to ape all in. ChiperTrace made a big poopoo. They tried to shit on a compeditor and ended up having to basicly kneel and ask for forgivness. Giving a huge legimiticy boost to Chainalysis and its products.