electrum the transaction was rejected by network rules missing input, electrum transaction input

On December 27, Reddit user u/normal_rc reported that Electrum's wallet had been hacked and that nearly 250 bitcoins (243.6 BTCs, nearly $1 million) had been maliciously stolen, coinelegraph reported. Electrum then confirmed that the attack included creating a fake version of the wallet to trick users into providing password information. Electrum responded on Twitter that "this is a persistent phishing attack on Electrum users" and warned users not to download Electrum from any source other than the official website.

Transaction input

Transaction input

By default, electrum wallets are randomly connected to a set of Electrum servers. From a privacy perspective, this is not a good thing because it discloses your wallet address and balance to unknown third parties. And unfortunately, many public Electrum servers are run by individuals or groups of blockchain analytics companies or worse. Therefore, if you are using an Electrum wallet, it is generally recommended that you run your own Electrum server and then connect the wallet to that server.

Similar to the mid-ticket transaction, the refund transaction uses the second-choice one-and-one-more-sign output of the ticket-buying transaction as input, and there is no additional pledge reward as input because the ticket is not awarded.

Corresponding to the coinbase (coinbase) transaction for the BTC block, Peercoin's PoS block also contains a similar cointake (coin interest) transaction, whose input consists of the core (Kernel) input and the equity (Stake) input. The node can use its own UTXO as the core input and pass through.

Electrum is free software used by many cryptocurrencies websites, including merchants and exchanges, to store bitcoins. Anyone can run an Electrum server, and the software supports hardware wallets such as Trezor, Ledger, and Keepkey. Enhanced features include multi-signal and the ability to sign transactions using cold storage devices that are not connected to the network.

The 3 node verifies that the unlock script for the transaction is correct, thereby verifying that the input to the transaction was unlocked by the legitimate private key.

Of course, there are wallets that are not designed according to BIP rules, such as Electrum, which was the first wallet to use mnic patterns, and the first determinative wallet, which was introduced in 2011, and later The micound rule BIP-39, which became a recognized industry standard with its widespread use. Electrum is similar to BIP-39's monemone rules, but BIP-39 uses a fixed set of 2048 thesavers, and Electrum uses a different thesaver, but is compatible with BIP-39's monemone thesaver, and the reverse is not compatible.

Fake: github/electrum-wallet/electrum/releases.

I have 5 plus unconfirmed deals and have been waiting for three days. This is ridiculous. And I've set a 140% dynamic transaction fee for electrum.

Quorum, the primary node, enables users to send and receive instant irreversible transactions. Once Quorum is formed, the input to the transaction is locked to the corresponding specific trade, wherea the current time for the whole network trade is about 4 seconds. If a locked consensus is reached on the primary node network, all transactions and blocks that conflict with it will be rejected forever unless they match the ID of the transaction that was locked at the time.

The appeal was rejected.

The appeal was rejected.

Electrum hackers pre-empted a large number of "normal" electrum servers on the P2P network.

The tokenId (String) is the token identifier. Rejected indicates whether this internal transaction failed and was rejected. If rejected is 'true', you do not need to handle the current internal transaction because some errors have occurred. Otherwise, the value "false" indicates a successful transaction.

electrum the transaction was rejected by network rules missing input

electrum the transaction was rejected by network rules missing input

According to Bleeping Computer, the BTC wallet app Electrom accused a phishing product called Electrum Pro of stealing a user's seed key on May 9 on GitHub and registering a domain name called electrum without Electrum's permission. The Electrum team noted that there was a piece of code indicating that the counterfeit product might have taken the user's seed key and uploaded it to the electrum. Affected users should transfer funds from BTC URLs managed by Eletrum Pro.

Therefore, the use of multi-signature wallets provides additional security. In the Bitcoin ecosystem, it is easy to put them in an Electrum wallet. Multi-signature wallets require confirmation of several private keys in order to sign a transaction.

According to slow fog zone news, Electrum fake upgrade tips of the phishing attack has stolen at least 200 BTC, this attack by upgrading Electrum alone can not be avoided, the need for the entire ecological service to make corresponding changes (because Electrum this client is not a full node, and then on the transaction broadcast and the corresponding service side of the message communication, attackers can also deploy malicious server). Slow fog zones remind users that phishing attacks like Electrum require long-term vigilance. The slow fog zone has previously issued an alert for selectrum phishing updates, and hackers who attacked Electrum wallets used Electrum's software to unusually construct malicious software update prompts to induce users to update and download malware usage.

This update prompt is not an official act of Electrum, but a phishing attack by an attacker that exploits a message flaw on the Electrum client and the ElectrumX server, which requires the attacker to deploy the malicious ElectrumX server in advance, and the malicious server is localized by the user's Electrum client (because the Electrum client is a light wallet and the user needs the ElectrumX server to broadcast the transaction). At the time of the madness, malicious ElectrumX servers accounted for as many as 71% of the total, and according to incomplete statistics, hundreds of bitcoins have been stolen in this phishing attack over the past year or so.

The attacker set up a large number of malicious servers. Once a user's Electrum wallet is connected to these servers, they see what appears to be an official message when they send a Bitcoin transaction, telling them to upgrade the Electrum wallet, which actually contains a fraudulent URL.

If you want to verify that a new trade is valid, first of all, you need to check whether the trading input of this new transaction is in the void list, if the transaction input is already in the void list, it proves that the transaction input has lapsed, and if it is not in the void list, it is proved that the transaction input is valid, the transaction will be recognized by the miners, and then the miners will put the transaction input into the void list.

Electrum is a popular software wallet that works by connecting to a dedicated server. These servers receive a hash of the Bitcoin address in the wallet and reply with transaction information. Electrum Wallet is fast and has few resources, but by default, it connects to these servers and can easily monitor users. In addition to Electrum, some other software uses public Electrum servers. By 2019, it is a faster and better alternative to BIP37.