When an Electrum wallet queries a third-party Electrum server, the server can link two transactions together and know which address is a zero address.
Since this method cannot be used to generate exclusion certificates for any blocks mined to date, full chain exclusion certificates cannot be generated.
At this time, the SPV-based Electrum wallet became the new favorite of Bitcoin players. Especially for small partners who are new to Bitcoin, editors recommend using electrum wallets.
Electrum wallets have been hacked in recent days and nearly 250 bitcoins have been stolen, according to blockchain security team Devi Security Labs. This attack, confirmed by Electrum, involves creating a fake version of the wallet to trick users into providing password information. Electrum responded on Twitter that "this is an ongoing phishing attack on Electrum users and advised users to download wallet apps from the official website." Mars Finance reminds users not to install electrum wallets from unknown sources.
Bitcoin wallet Electrum suffered a phishing attack, at least 1,450 BTC stolen
Electron Cash is only a version of Electrum, so if you're used to Electrum, you won't have any problems.
Vulnerabilities were found in Electrum and Electrum-LTC. It has been fixed in Electrum-LTC 18.104.22.168. If you are running an earlier version, update your software.
EchoLink was selected as a Carnegie Mellon University partner for the Capstone project.
Whether you choose to use mixers or not, there are additional steps you should take to mask your transactions and outsemod those forensics firms. One of the easiest but most effective ways to create a new Bitcoin wallet using services such as Electrum. Send your tokens to this address, then use the Tor browser to connect to the web, create a new wallet, and then send the tokens to a new address. For added privacy, you can repeat this step, send tokens between multiple wallets, and change the time delay between transaction amounts and each send. This process may seem difficult and not practical in everyday use, but in some cases it is a valuable exercise when you want to maintain a distance between the token source and the token destination.