I do everything according to the instructions specified on the official website but when trying to execute a command “gpg --verify electrum-3.3.6-x86_64.AppImage.asc” gives an error message: “gpg: no valid OpenPGP data found.
gpg: the signature could not be verified.
Please remember that the signature file (.sig or .asc)
should be the first file given on the command line.”
The instructions call for downloading the latests Electrum image and signature from Electrum Bitcoin Wallet. When I checked that page is mostly blank with no images or signatures. No information on that issue has been posted the official Electrum Twitter feed.
I’ll keep you posted when I find out more on this.
Changed my exit node an the downoad links popped up
The Electrum instruction have been updated to reflect the latests version 3.3.8. However since Elecrum is constantly hammered with phishing attacks its best the Whonix lead developer check the doc submission before it does live. When that is done I’ll let you know. Please be patient.
Electrum’s site has been getting DDOS’d lately, and they’re using Cloudflare now. As a result, I have not been able to download anything from https://download.electrum.org via curl or wget in a few days. I think this situation may persist indefinitely, so this is something to keep in mind as it affects the wiki.
Using Tor Browser for the download works consistently.
Maybe there’s a way to mimic the browser with curl? I tried to use the same header that TB sends, but I didn’t trick Cloudflare. Here is what I used in that case (maybe I didn’t do it correct):
I tried to install the updated instructions. Anyway, when you try to use the gpg --verify electrum-3.3.8-x86_64.AppImage.asc command, you get the error: gpg: no valid OpenPGP data found.
gpg: the signature could not be verified.
Please remember that the signature file (.sig or .asc)
should be the first file line given on the command line.
I downloaded one good elelctrum AppImage and the next two were the same as what you have. The first signature file I downloaded was the same HTML document, ASCII text as above.
For the purpose of testing, I have installed Electrum from Debian unstable repository, in its own vm. This is recommended because if by mistake, the system is upgraded from unstable, it might live by its name, becoming truly unstable. The user should be confident with sources.list.d.
The installed Electrum version is 3.3.8
The package is installed in /usr/local/bin (/rw/usrlocal/bin in qubes), meaning that the template should not be affected.
I’ve got the electrum source package from sid (unstable). It’s outdated for sure.
/tmp/electrum-3.2.3 $ electrum/electrum
This version of Electrum is vulnerable to malicious code inserted by
attackers and is being actively exploited to try and convince users to
give their private credentials to attackers. See
https://bugs.debian.org/921688 for details. Until the version in
Debian is updated, please see https://electrum.org/download.html
Traceback (most recent call last):
File "electrum/electrum", line 58, in <module>
from electrum.gui.qt.util import MessageBoxMixin
ModuleNotFoundError: No module named 'electrum.gui'
Hello, i want install last electrum version, because
Warning: Versions of Electrum older than 3.3.3 are vulnerable to a phishing attack, where malicious servers are able to display a message asking users to download a fake version of Electrum. Do not download software updates from another source than electrum.org. In order to reach users of vulnerable versions, we have started to use the same vulnerability, and to direct them to electrum.org.
But with following this instruction Electrum Bitcoin Wallet possible install only 3.1.3 version.
If following official instruction
Hello. i see it on official electrum.org site (you can check).
the previous versions have vulnerability.
How i can install 3.2.3-1? When i make as in wiki instruction, he find only 3.1.3 version. Can you write how install 3.2.3-1?
But anyway, can i install from official site electrum?
Correct. This is a vulnerability to fishing attacks.
malicious servers are able to display a message asking users to download a fake version of Electrum.
This vulnerability can be mitigated by downloading/updating electrum using Debian’s official package manager APT. Use nothing else.
This can be done by installing electrum from Debian unstable (sid). This version still has the same vulnerability. Make sure you read all warnings before installing from Debian unstable. (Installing from Debian stable is preferred)