All About Lightning Electrum
Chain News, lightweight Bitcoin Wallet Electrum announced that the next version will support Lightning network payment, implemented using Python, Electrum as a Lightning network node, wallet users do not need to run lightning network nodes to make payments, electrum lightning network nodes have been merged into the Electrum master branch.
Recent scam extortion incidents have been frequent: a school district system in California has been downed by encrypted ransomware; a scam based on Google's advertising system; an OMG phishing website airdrop scam that resulted in the theft of a user's private key; and bitcoin wallet Electrum "update phishing" currency theft continues.
Electrum is a world-renowned Bitcoin light wallet with a long history of multi-signature support and a very broad user base, many of which like to use Electrum as a cold wallet or multi-signature wallet for Bitcoin or even USDT (Omni). Based on this usage scenario, Electrum is used less frequently on the user's computer. The current version of Electrum is 3.3.8, and previous versions of 3.3.4 are known to have a message flaw that allows an attacker to send update prompts through a malicious ElectrumX server. This update prompt is very confusing for the user, and if you follow the prompt to download the so-called new version of Electrum, you may be tricked. According to user feedback, because of this attack, stolen bitcoins are in the four digits or more. This captured currency theft attack is not stealing the private key (electrum's private key is generally stored with two-factor encryption), but replaces the transfer destination address when the user initiates the transfer. In this slow fog remind users, transfer, need to pay special attention to whether the destination address is replaced, which is a very popular recent way to steal money. It is also recommended that users use hardware wallets such as Ledger, and if you pair it with Electrum, although the private key does not have any security issues, you should also be alert to the replacement of the destination address.
Here's a quick look at how to install and use Google Authenticator (for example, an Apple device)
There's a guy who has an address to steal money from some of the private keys we can access. We found 735 private keys, and he happened to take money from the 12 private keys we could get. Statistically, he's unlikely to happen to guess those private keys, so he's probably doing the same thing... Basically, as soon as the money goes into people's wallets, he starts stealing it.
We know that in a general password system, the private key is randomly generated, and the public key is generated by the private key. In identity-based encryption, the user's private key is required to be generated if the user's public key (mailbox, etc.) is determined. To address this seemingly impossible requirement, identity-based encryption introduces a trusted third party, or institution called a key generation center, that owns a master key of the system that derives the private key corresponding to the public key (mailbox, etc.) based on the master key and the user's public key (mailbox, etc.) and distributes the private key to the user.
You can download electrum Bitcoin Wallet on the official website "electrum.org". Electrum is also available to users of Ledger Nano S, KeepKey, and TREZOR hardware wallets.
Create a new wallet: The first time you enter your wallet, enter your password and click Create to randomly generate your own private wallet, or click Restore from seed to import your existing wallet by entering mnomes.