<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-GB">
		<id>https://hope.mrangel.info/index.php?action=history&amp;feed=atom&amp;title=User%3AMarciaPinkston</id>
		<title>User:MarciaPinkston - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://hope.mrangel.info/index.php?action=history&amp;feed=atom&amp;title=User%3AMarciaPinkston"/>
		<link rel="alternate" type="text/html" href="https://hope.mrangel.info/index.php?title=User:MarciaPinkston&amp;action=history"/>
		<updated>2026-05-09T13:02:10Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.30.0</generator>

	<entry>
		<id>https://hope.mrangel.info/index.php?title=User:MarciaPinkston&amp;diff=1266&amp;oldid=prev</id>
		<title>MarciaPinkston: Created page with &quot;&lt;br&gt;&lt;br&gt;&lt;br&gt;img  width: 750px;  iframe.movie  width: 750px; height: 450px; &lt;br&gt;[https://extension-start.io/qsafe-wallet-troubleshooting-guide.php Qsafe wallet setup] guide and...&quot;</title>
		<link rel="alternate" type="text/html" href="https://hope.mrangel.info/index.php?title=User:MarciaPinkston&amp;diff=1266&amp;oldid=prev"/>
				<updated>2026-05-08T04:09:13Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;img  width: 750px;  iframe.movie  width: 750px; height: 450px; &amp;lt;br&amp;gt;[https://extension-start.io/qsafe-wallet-troubleshooting-guide.php Qsafe wallet setup] guide and...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;img  width: 750px;  iframe.movie  width: 750px; height: 450px; &amp;lt;br&amp;gt;[https://extension-start.io/qsafe-wallet-troubleshooting-guide.php Qsafe wallet setup] guide and security basics&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Qsafe wallet setup guide and security basics&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Never rely on browser extensions or mobile apps alone for private key generation. A dedicated hardware module, such as a Ledger or Trezor, isolates the signing process from network-connected devices. This ensures that even if your computer is compromised by malware or keyloggers, the secret material never leaves the secure element. Always verify the transaction details on the hardware device’s screen before confirming–reading the displayed address and amount prevents substitution attacks.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Store the 24-word recovery phrase on a fireproof, waterproof steel plate, not on paper or in a digital note. Stamp the words manually rather than writing them, as ink fades and paper burns. Avoid any cloud storage, screenshot, or encrypted file that could be decrypted later. Generate this phrase while offline, using a freshly formatted USB drive to run the official software from the manufacturer’s website, never from third-party links. Check the integrity of the downloaded file against a published SHA-256 hash before execution.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Implement a multi-signature scheme with at least three distinct devices and two different geographic locations. For example, configure one signer on a hardware cold storage unit in a bank safe deposit box, a second on a mobile phone using a separate seed, and a third on a backup hardware device held by a trusted family member. Set the threshold to require two of the three signatures for any outgoing transaction. This structure protects against single-point failures like theft, loss, or device malfunction without centralizing control.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Enable passphrase protection on your hardware device to create a hidden vault. Even if an attacker obtains your 24-word seed, they cannot access funds without the additional passphrase string. Choose a passphrase longer than 20 characters, mixing uppercase, lowercase, digits, and symbols–never reuse it from any other account. Test the passphrase recovery process twice: once during initial setup and again after a month, to confirm you can reconstruct the vault from memory and the seed alone.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Qsafe Wallet Setup Guide and Security Basics&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Download the application exclusively from the verified official repository on GitHub, cross-referencing the PGP signature of the release file against the developer’s public key posted on their personal website; a mismatched hash means the binary has been tampered with.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Generate your mnemonic phrase on a device that has never been connected to the internet, such as a Raspberry Pi running a minimal Linux distribution from a live USB, then immediately verify the phrase by entering it back into the application–any discrepancy indicates a copy-paste error or a compromised input.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Store the 24-word recovery seed in two separate locations: one on A4 steel plates inside a fireproof safe, and another as a laminated sheet in a bank deposit box; do not photograph it, save it in a cloud service, or type it into any electronic device that will later go online.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Set a hardware-based passphrase longer than 15 characters using a diceware method, combine it with a FIDO2 hardware key for transaction signing, and configure the spending limit to zero for all outgoing transfers by default, raising it only per-transaction after confirming the recipient address via an encrypted voice call.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Test your recovery procedure by wiping a secondary hardware device, restoring from the steel plate backup, and sending a small test transaction of 0.0001 BTC to an exchange address you control–if the process takes longer than 12 minutes or requires any online service, rewrite your recovery instructions until they are fully air-gapped.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Downloading Qsafe Wallet from the Official Source Only&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Copy the exact URL of the repository or domain from a trusted community announcement posted on X (formerly Twitter) by the project’s verified developer account, not from a search engine result. Any other source introduces a risk of DLL injection or keylogging payloads.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Verify the SSL certificate of the download page: it must match the legally registered entity name of the software publisher, not a generic third-party host. The fingerprint of the TLS certificate should be cross-checked against the one published on the official GitHub organization page.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Do not use mirror sites, file-sharing platforms like MediaFire, or torrent aggregators. Even if they claim to offer a virus-scanned copy, they lack the cryptographic signature chain that authenticates the binary’s origin.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Compare the SHA-256 checksum of the downloaded archive against the hash value displayed on the official website’s checksum page and a separate trusted source like a verified Telegram group pin. A mismatch of even one character means the file was altered during transit or is a counterfeit.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Reject any download link that arrives via email, SMS, or direct message, even if it appears to redirect to a legitimate-looking domain. Phishing pages often use homograph attacks–characters like “0” replacing “O” or Cyrillic letters in the URL that bypass visual inspection.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Verification Step&amp;lt;br&amp;gt;Tool&amp;lt;br&amp;gt;Action if Failed&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Domain ownership check&amp;lt;br&amp;gt;WHOIS lookup&amp;lt;br&amp;gt;Abort download immediately&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Binary signature validation&amp;lt;br&amp;gt;Windows: right-click → Properties → Digital Signatures&amp;lt;br&amp;gt;Delete the file&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Checksum comparison&amp;lt;br&amp;gt;sha256sum (Linux/macOS) or Get-FileHash (PowerShell)&amp;lt;br&amp;gt;Re-download from the official portal only&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;URL spelling and TLD&amp;lt;br&amp;gt;Manual check for subdomain changes (e.g., .org vs .com, extra hyphens)&amp;lt;br&amp;gt;Block the sender and report the phishing URL&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Use a dedicated, isolated machine or a live USB environment for the first installation and verification process. If the binary executes unexpected network requests or attempts to access system directories unrelated to its function, terminate the process and discard the installer.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;After downloading, right-click the installer on Windows, select “Properties,” and confirm that the “Digital Signatures” tab lists a correct timestamp from a recognized certificate authority (CA) issued to the software vendor, not to an unknown organization. An unsigned installer or one with an invalid CA chain is definitive evidence of tampering.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Never rely on ads in search results–always type the official domain manually into the address bar. Bookmark the verified URL after the first successful download and use that bookmark for every future update to prevent domain-squatting or typosquatting variants from intercepting you.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Creating Your First Qsafe Wallet Seed Phrase Offline&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Generate your recovery phrase on a computer that has never been connected to the internet, preferably one running a live operating system from a USB stick that was physically disconnected from any network hardware before booting.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Download the official entropy generation tool from the project’s verified GitHub repository onto a USB drive using a separate, internet-connected machine. Transfer that USB to your offline computer. Do not use the same USB for any other files afterward.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Run the tool and move your mouse cursor randomly across the screen for at least 120 seconds, as the tool uses your mouse movements to collect 256 bits of cryptographic randomness. Do not stop early–fewer seconds produce weaker entropy that can be predicted.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;The tool will display 24 words from the BIP-39 English wordlist. Write each word down on acid-free, archival-grade paper using a soft pencil (e.g., 2B graphite), never a pen, as ink can fade or smudge over decades. Number each word from 1 to 24, and after writing the final word, immediately verify the sequence by speaking each word aloud while pointing to it on the paper.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Seal the paper in a fire-resistant Mylar bag inside a steel capsule like the Cryptosteel or Billfodl, then store that capsule in a safe deposit box at a bank that does not require electronic access codes. Do not photograph, scan, or type the phrase into any device–including your offline computer–after the paper copy is made.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Test the phrase by erasing the offline computer’s storage with a secure wipe utility (e.g., DBAN with three passes), reinstalling the operating system, and attempting to reconstruct your key container solely from the 24 words written on paper. If reconstruction fails, repeat the entire process from scratch with a new set of words; do not reuse any part of the defective attempt.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;How to Verify Your Qsafe Wallet Backup Before Sending Funds&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Perform a complete test restoration of your recovery phrases on a separate, offline device using a dedicated verification tool from the official repository. Use a live Linux USB session with no network connection to paste your 24-word mnemonic into the application. Ensure the derived public addresses match the ones you recorded during the initial creation process within three decimal places of your transaction history.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Manually confirm that the first five receiving addresses from your backup match those displayed in your interface. Open your primary copy, navigate to the “Receive” tab, and list the last three used addresses. Then, using your restored copy on the test device, generate the same set of addresses. A mismatch indicates a corrupted backup or incorrect phrase entry. Any discrepancy of even one character means you must discard this backup and create a new one before moving any holdings.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Verify every segment of your stored offline file by checking its SHA-256 hash against the hash recorded when you first encrypted the data. On your primary machine, run sha256sum [backup_file] in the terminal. Compare the output string character by character with the string you stored separately (e.g., on paper or in a password manager). If the hashes differ, the backup file has been altered or corrupted since creation. Do not proceed with any transfers until you regenerate a clean, verified copy.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Execute a dry-run transaction using a test network like the QSF testnet. Import your backup into a testnet-compatible instance and attempt to sign and broadcast a transfer of zero tokens to a secondary test address. Check the block explorer for the transaction ID and confirm it appears with the correct source address. This confirms your private keys, derived from the backup, can successfully authorize a movement of value without risking actual assets.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Cross-reference the master public key (xpub) from your backup against the xpub displayed in your application’s advanced settings. A mismatch here implies your entire address derivation tree is incorrect. Record both xpubs on two separate physical paper sheets, then lock one in a fire safe and the other in a bank deposit box. Only after all three checks–phrase recovery, address generation, and xpub match–pass without errors should you consider the backup valid for fund transfer.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Q&amp;amp;A:  &amp;lt;br&amp;gt;I just installed Qsafe. Do I really need to write down the 24-word seed phrase on paper, or is saving it in a password manager good enough?&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Writing it down on paper is the safer method for long-term storage. A password manager, if your computer is infected with malware that logs keystrokes or reads clipboard data, could expose your seed phrase during recovery. The paper should be stored in a fireproof safe or a safety deposit box. For extra protection, you can split the seed phrase into two parts and store them in separate locations.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;I just downloaded Qsafé and I'm looking at the &amp;quot;New Wallet&amp;quot; option. How do I actually create a wallet for the first time, and what do I need to be careful about during that process?&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;When you open Qsafé and select &amp;quot;New Wallet,&amp;quot; the app will generate a 12-word recovery phrase (seed phrase). Write these words down physically on paper and store them in a safe place, like a fireproof safe. Do not screenshot them, type them into a digital note, or store them online. The app will then ask you to confirm the phrase by selecting the words in order. After that, you set a strong password (at least 12 characters, mixing numbers, letters, and symbols) for daily access. Your wallet address will be generated automatically. The risk here is that if someone gets your seed phrase, they control your funds forever. Protect that piece of paper.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;I keep hearing about gas fees and network selection in Qsafé. How do I avoid paying too much for a simple transfer, and what happens if I choose the wrong network?&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Gas fees depend on network traffic. In Qsafé, before you send funds, it shows multiple network options (e.g., Ethereum ERC-20, BSC BEP-20, Polygon). For example, sending USDT on Ethereum might cost $5, while the same transfer on Polygon costs a few cents. You must select the network that matches the recipient’s address. If you send a token on Polygon to an Ethereum address, the funds will disappear into a mismatched contract and be unrecoverable. Qsafé displays a clear warning about this, but users still make the mistake. Always verify the recipient’s network before clicking &amp;quot;Send.&amp;quot;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Someone told me I should &amp;quot;save my private keys&amp;quot; from Qsafé, but I only see a seed phrase. Is my seed phrase the same thing? Where exactly are the private keys hidden?&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Your 12-word seed phrase is a master key that can regenerate all private keys for every cryptocurrency address in your wallet. It is the single most sensitive piece of data. Inside the app, if you go to wallet settings, you can choose &amp;quot;Export Private Key&amp;quot; for individual coins (like ETH or BTC). This gives you the direct key for that specific address, useful for importing into other non-custodial wallets. But for security, you only need the seed phrase. If you lose the seed phrase, you lose everything. There is no customer support that can recover it.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;I saw an &amp;quot;airdrop&amp;quot; claiming I need to connect my Qsafé wallet to verify. Is this safe? How do I know if a request to connect my wallet is a scam?&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Connecting your Qsafé wallet via WalletConnect or a browser extension is how you interact with decentralized apps (DApps). This is safe when done on a legitimate website like OpenSea or Uniswap. The risk appears when a fake website or social media post asks you to &amp;quot;connect wallet&amp;quot; and then requests a &amp;quot;signature&amp;quot; with a long hash. That signature might be a contract approval that drains your tokens. A legitimate dapp will never ask for your seed phrase or private key. If a site asks you to sign an arbitrary message for an &amp;quot;airdrop&amp;quot; or &amp;quot;prize,&amp;quot; it is a scam. Disconnect immediately and revoke the approval in Qsafé settings.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;I want to set up Qsafé on two different phones so I can use the same wallet. Is that possible without breaking something? And if one phone gets stolen, what do I do?&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Yes. Download Qsafé on the second phone and select &amp;quot;Import Wallet&amp;quot; instead of &amp;quot;New Wallet.&amp;quot; Enter the same 12-word seed phrase you used on the first phone. Both phones will then control the same wallet address and balance. This is safe as long as both phones are secure. If one phone is stolen, you are at immediate risk if the thief can access the app. The thief does not need your password if they can brute-force it or if you left the app open. Your only action is to move all funds to a new wallet (with a new seed phrase) from the non-stolen phone as fast as possible. After that, the stolen phone is useless because the old seed phrase no longer holds value.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>MarciaPinkston</name></author>	</entry>

	</feed>