05-13-2021, 06:00 PM
Hi everyone,
after half a day researching this issue, I'm still having trouble figuring out if there have been any advancements in the past couple of years.
Personally I did some ethereum mining in 2016, found out that I couldn't make any transactions with my mining account in 2017, even went as far as sending my private key to a wallet recovery service (desperate, I know), and basically nothing has changed other than the price.
Unfortunately I didn't remember *exactly* what I was doing in 2016.
All I know:
- I was running Ethereum Wallet 0.5.1 on Ubuntu (according to the files that I still have)
- I still have the supposed password in my password manager, and the timestamps of the account as well as the password match.
- I didn't copy the password as far as I remember, but entered it by hand. But that was 2016, and memory can be tricky.
- The mining account was not my main one in that software. The main one works though.
- The password in my password manager does only use alphanumeric characters.
I read through issue 3513, and as far as I can see the activity has fizzled out over time, and if I see correctly, mist has been gone since 2019. There's still no consensus on whether the bug even exists because it has never been properly reproduced. Other bugs have been found, but nothing that could be definitely connected to the issue.
Question 1 - Is there some active community of people working on this, or is this thread now it? I'm a bit surprised - everyone with this problem surely would donate 20% of their lost ETH to someone who could find the bug and a way to recover the passwords and by now that would probably turn that person into an instant millionaire. Although it's a bit like solo mining - you're not guaranteed that your search will result in finding the solution. In any case, has everyone just given up by now or are we still talking?
Question 2 - I'm new to hashcat. I have an RTX 2080, but I'm trying to figure out the risk/reward on brute-forcing this. How likely do you think there's some typo that the wallet recovery people missed? Did anyone actually recover their password with hashcat and find out it was garbled in a way that was unlikely to stem from typing it wrong?
after half a day researching this issue, I'm still having trouble figuring out if there have been any advancements in the past couple of years.
Personally I did some ethereum mining in 2016, found out that I couldn't make any transactions with my mining account in 2017, even went as far as sending my private key to a wallet recovery service (desperate, I know), and basically nothing has changed other than the price.
Unfortunately I didn't remember *exactly* what I was doing in 2016.
All I know:
- I was running Ethereum Wallet 0.5.1 on Ubuntu (according to the files that I still have)
- I still have the supposed password in my password manager, and the timestamps of the account as well as the password match.
- I didn't copy the password as far as I remember, but entered it by hand. But that was 2016, and memory can be tricky.
- The mining account was not my main one in that software. The main one works though.
- The password in my password manager does only use alphanumeric characters.
I read through issue 3513, and as far as I can see the activity has fizzled out over time, and if I see correctly, mist has been gone since 2019. There's still no consensus on whether the bug even exists because it has never been properly reproduced. Other bugs have been found, but nothing that could be definitely connected to the issue.
Question 1 - Is there some active community of people working on this, or is this thread now it? I'm a bit surprised - everyone with this problem surely would donate 20% of their lost ETH to someone who could find the bug and a way to recover the passwords and by now that would probably turn that person into an instant millionaire. Although it's a bit like solo mining - you're not guaranteed that your search will result in finding the solution. In any case, has everyone just given up by now or are we still talking?
Question 2 - I'm new to hashcat. I have an RTX 2080, but I'm trying to figure out the risk/reward on brute-forcing this. How likely do you think there's some typo that the wallet recovery people missed? Did anyone actually recover their password with hashcat and find out it was garbled in a way that was unlikely to stem from typing it wrong?