🐈's avatar
🐈 6 months ago
Coinos wallet on Damus unusable. Constantly running into limits ;( Breaks the entire fun of zaps

Replies (53)

jb55's avatar
jb55 _@jb55.com 6 months ago
early accounts had a too small of a limit. we fixed it for new accounts but we don’t have a way for the original ones to change it yet
🐈's avatar
🐈 6 months ago
Give up before trying. I’ll have to teach this one to my kids 🀣 πŸ˜† courtesy of uncle fishcake
So, what do goobs like me do? I did not lose Sats but I can heed warnings. I can’t find where my keys would be in Coinos security or profile settings. Should I drain the wallet and sign out? Where can I receive zaps now (I zap out of Primal wallet), should I just connect it as my receive zaps wallet? Halp!
🐈's avatar
🐈 6 months ago
Cannot zap any meaningful amount. Mostly just want to withdraw sats.
🐈's avatar
🐈 6 months ago
How do I sign into coinos if I got an address through Damus? Will told me but I’m too retarded to make it work
Psilocyberbull's avatar
Psilocyberbull 6 months ago
Its a hash of the nsec. Coinos is compromised though, nobody should be using it anymore or at least for the time being
Psilocyberbull's avatar
Psilocyberbull 6 months ago
Somebody else may already have. I think they said only 9 accounts were affected, but who knows
Psilocyberbull's avatar
Psilocyberbull 6 months ago
Mysterious Hamster
We're still investigating what happened here. It seems a handful of accounts may have been compromised and had their autowithdrawal settings tampered with, including our own "coinos@coinos.io" account. We ran a script to search for accounts that had the attacker's "speed.app" withdrawal address in place and found about 9 that seem to have been affected. There could be more though, we will update as we have more information. I worry that this may be the same attacker who exploited a password reset vulnerability back in January which allowed them to gain access to a number of accounts. It's possible that since that time they have been sitting on the account data and working to brute force the encrypted nostr private keys that we had on file for some accounts that had imported their nostr key into Coinos. Those keys were encrypted at rest in our database but it's possible they may have been cracked. We no longer store nostr private keys for accounts and have since added support for external signing apps and browser extension login, but there was a time when we were storing encrypted nsec private keys. Having a users nsec would allow an attacker to authenticate into Coinos by signing a nostr event and change the user settings. It also means your entire nostr profile and identity may be compromised. This is only a hypothesis at this point and we need to investigate further but we may end up recommending that affected users rotate their nostr keys. View quoted note β†’
View quoted note →
username, your coinos user (that is in your profile). without the @coinos. password, do that sha256 of the string jb55 gave you with your hex nsec. getting your hex nsec if you only have the nsec encoded one though.. i use my own tools for that. signin with ext wont work for you, itll be a new account.
↑