Are there any privacy benefits in using a separate wallet in Bitcoin Core to “separate” myself from my service?

I currently run Bitcoin Core with the following wallets loaded in:

  1. hot.dat. Contains the smallest possible sum of Bitcoin. Unencrypted and used by myself for various personal Bitcoin purchases, and I intend to have it double as the wallet for my Bitcoin-based website. (Unless you tell me a good reason not to.)
  2. lukewarm.dat. Contains more than the “hot” wallet, but still not much compared to cold.dat. Encrypted with a long passphrase, but which is located on the same computer in a text document. I recon that it will stop at least automated malware which simply checks for wallet.dats and merely “sends them home”. It of course won’t stop somebody from manually finding the text document on my machine and figuring out that it’s the passphrase to use.
  3. cold.dat. Contains the vast majority of my satoshis. Encrypted with a long passphrase (partially stored on the same computer) with a bunch of additional parts with “hints” to myself rather than explicitly spelled out. This passphrase has never been entered to unlock the wallet outside of the dedicated Linux computer where it was created. (Not this machine.)

I’m aware that many would not consider my cold.dat to be a “cold wallet”, but I thought the naming scheme fit well enough. The reason I don’t use a truly “cold” wallet (where it’s not stored on a “live” computer even encrypted) has to do with me fearing losing the file or having a fire or getting it seized more than I fear somebody first hacking into my machine and then somehow figuring out my complicated passphrase scheme. I consider that so unlikely that it is far more likely that I would lose access to it in other ways.

Now I wonder if I should be having a separate “service.dat” wallet dedicated to my new service, or if I can just generate new receive addresses for my existing hot.dat and use those. Is there any privacy benefit in me doing that? Or would I just be wasting yet another transaction fee to send over some satoshis from my hot.dat to my potential “service.dat”?

What if somebody who I do private business with knows who I am (because I have to give them my home address) and when I’ve paid them using hot.dat, those “inputs”/”outputs” are reused for my service, and suddenly they can associate me, the individual, with my service? And would that change at all if I used a separate “service.dat” wallet for the service? Won’t it be the same “track” either way?

PS: No, it’s not something illegal or immoral. I’m simply trying to avoid any association between myself and the service, plus I’m also curious about this on an academic level.

java – Designing around potentially multiple RESTful API calls to a downstream service

To set up the problem, let’s imagine we have a downstream service that we need to call for some information. We set up an API endpoint and call another method which will hold our business logic and make the HTTP request. Based off of certain parameters that were sent to this method, we may potentially have to make several calls to the same endpoint, depending on what it returns. The method is currently setup like so:

public HttpEntity<String> getInfo(//parameters) {
    //setup HTTP headers etc.
    HttpEntity response = here);

    //based off of on the parameters given to this method, we will know whether or not we need to make additional calls
    //if we DO need to make additional calls, we will also need to inspect the response for information
    //this is difficult, because as you see below, this method doesn't start to procces the response until after error checking
    //do all error checking ie. checking for no data and other HTTP errors
    OurDataClass dataClass = objectmapper.writeValueasString(response.getBody());

Given the current structure of this method, I don’t know how to work it into something that’s more extendable and maintainable. My first instinct was to just encapsulate the restTemplate and take care of additional calls there, but given the fact that I need to inspect the request contents of each call, something that is not done until the end of the current method, it would seem like we’re doing a lot of double work. On the other hand, working the solution into the method without any encapsulation would make it even more difficult to maintain down the road (it’s already a bit of a mess with error checking).

[] Service Socks5 Cheap |

( Service Socks5 Cheap
Payment Instantly Perfectmoney, Bitcoin, Wmtransfer, BTC-E ( Please click Buy Socks )
Check Socks Online

Our proxy service offers you a solution to Internet anonymity problem:Best Quality SOCKS5 PROXIES!

Service Price


For example, Daily 60: It is allowed to get maximium 60 socks for a day.
If you don’t use, you will lose 60 socks in a day ( no incremental socks). An account will be expired after 30 days



For example, Credit 60: You will have unlimited day. After you get enough 60 socks, your account will expired.



For example, Socks List 30: You can get unlimited socks5 per day. Numbers of socks5 will get at Socks List and it will be auto change socks everytime. An account will be expired after 30 days


Payment Instantly Perfectmoney, Bitcoin, Wmtransfer

WMZ : Z994476647137
PM: U15580999
BTC: 14Wmsja5BVH6srbW7YtQRLni8xH97b7iwx

Skype: Shopsocks5
ICQ: 727362912


How Do You Use Social Media As A Tool For Customer Service?

How do you use social media as a tool for customer service?

microservices – Thought process required to design domain aggregate in micro service architecture?

I am using DDD pattern in login micro service used in employee management software. Here Organization/Company is an Entity and User is one more entity.

What are my aggregates in this case, if i think with project in mind which is login i will have only one aggregate(user aggregate) but if i think as business in my mind i will get two aggregates(Organization,User).

I might be wrong too with above aggregates. My basic question is what is the thought process when designing a aggregate in micro service? is it with respect to project or business as whole?

workflow – What permissions are required to invoke a custom WCF web service deployed to the ISAPI folder (exposed through /_vti_bin/)?

Related / follow up to this question.

Because a site’s email settings (SMTP server, “from” address, etc.) are not available through any client-side APIs, I created a mini WCF web service that is deployed to the ISAPI folder. It takes a site’s URL as a query parameter, and uses that to open SPSite and SPWeb objects in server side code, retrieve the email settings, and then return that in a simple JSON payload.

It works perfectly fine when I test it from Postman.

But the main reason I need it is because I need to use the HttpSend web request action inside a VisualStudio declarative custom action (.xaml file) in order to get those settings and send them on into a custom code activity run by Workflow Manager. (I’ve gotten CSOM code to run inside the custom code activity, but again, I can’t get those settings from any client APIs.)

I’m used to the general rule that a workflow will run with the permissions of the person who initiated it, but when I test my workflow and it gets to that step, I’m getting a 401 UNAUTHORIZED. And not only that – as one of the first lines in my web service method, I log to ULS that the web service was invoked. I can see those log entries from the times that I invoke the web service from Postman, but I don’t see them for when I tried it with the workflow. Which means to me that it’s not even choking on the part where I SPSite site = new SPSite(siteURL). It’s not even getting that far because the initial log entry isn’t there.

So… what permissions do I need to set up to enable a workflow to invoke a custom WCF web service at <site>/_vti_bin/path/to/service.svc?

I’m no expert at WCF, so I haven’t set up anything that I can see around authentication/authorization there. Do I need to do something explicit there? (Why would I, if it works for me from Postman as it is currently set up?)

Do I need to set up workflows to run with elevated permissions using the whole app permission model? If so, what would the minimum permission level need to be just to get the WCF service to run? I’d rather not give workflows full control on the site, and I have no problem using SPSecuity.RunWithElevatedPrivileges inside the web service to retrieve the values I need, as long as I can get it invoked in the first place.

How can i get guest posting for cleaning service website? [closed]

Hello Everyone i manage website which specializing in cleaning services question is how can i get backlinks for that niche especially a guest posting

When transferring funds, the service gives this error, what should I do?

When transferring funds, the service gives this error, what should I do?

This wallet is currently frozen.

BitGo will not sign any transactions on this wallet until October 11th 2060, 7:00:00 PM.

How susceptible are JWTs to being used for denial of service?

Consider an API that requires a JWT for authorisation. For each JWT presented, it has to validate the signature, including base64 decoding, hashing and asymmetric encryption, which is stated noted as being more computationally expensive than symmetric encryption.

Consider if an attacker creates thousands of unique JWTs. The claims in the JWT are different, but as far as the API knows, could well be valid (e.g. the subject looks like it could be valid), but the signature is random and will not validate.

The API end point needs to validate each JWT individually before being able to discard it. If the process is computationally expensive enough, it might run out of resources, denying service to legitimate users.

I recognised that standard DoS mitigations can help – IP blocking, geolocation blocking. However if the attack is cheap enough, then a relatively small botnet, rotating through IP addresses, sending a relatively small amount of traffic could be hard to mitigate with existing DoS-prevention.

I looked for benchmarks for JWT validations. The best I could find is here, which indicates figures in the order of 300,000 to 130,000 nanoseconds per operation. This equates to between 3,000 and 7,000 validations (operations) per second. Even if out by a factor of 10, sending 100,000 requests per second doesn’t seem too much of a task for botnets. This could be quite cheap to rent.

Question: Is this a valid concern? Do JWTs or other signature-based authorisations mean DoS is easier to execute and harder to mitigate?

email – Webmail service with multi user access

I am searching for a solution for our business mail accounts.

In specific we have a few mail (imap) addresses which I want to make usable for our staff. The problem is that I want to create user accounts for every staff member and then assign mail accounts to them.

So in the end for example user 1,2,3 has access to mail address A. But user 3 also has access to mail address B.

It could be self hosted but I would prefer a SaaS solution, free or paid.

Thank you