## How can i trace a transaction where my bitcoin has been withdrawn from my paper wallet?

My bitcoin has been stolen from my paper wallet, can I track where its gone and is it possible to do so with my paper wallet?

## ra.rings and algebras – Are the trace relations among matrices generated by cyclic permutations?

Let $$X_1,dots,X_n$$ be non commutative variables such that $$operatorname{tr} f(X_1,dots,X_n) = 0$$ whenever the $$X_i$$ are specialized to square matrices in $$M_r(k)$$ for any $$r geq 1$$. Does this imply that $$f$$ is in the ideal generated by cyclic permutations: $$g_1dots g_k – g_2dots g_k g_1$$ for any polynomials $$g_i$$ in the $$X_i$$ and $$k geq 2$$?

(And if I have missed any obvious relations, is the statement true up to adding in those relations to the ideal?)

## postfix – How to Trace Who was Using my Mail Relay on Spamming?

I have a Postfix mail relay server running as Exchange smarthost as well as hosting another mail locally.

Last week I observed an attack on this server, someone is using it to send massive emails to different destinations.

I can’t find out where it is connected from and the “from” address is also masked.

Below is the mail logs:

``````Apr 16 06:29:10 mail.xxx.com postfix/qmgr(25497): EC5A91D727: from=<>, size=3096, nrcpt=1 (queue active)
Apr 16 06:29:10 mail.xxx.com postfix/bounce(12183): B37D31D6FA: sender non-delivery notification: EC5A91D727
Apr 16 06:29:10 mail.xxx.com postfix/qmgr(25497): B37D31D6FA: removed
Apr 16 06:29:11 mail.xxx.com postfix/smtp(12164): 1A9B71D801: to=<xxx@inver**.com>, relay=inver**.com(164.138.x.x):25, delay=50, delays=39/0/6.7/5, dsn=2.0.0, status=sent (250 OK id=1lX6jh-000875-TC)
Apr 16 06:29:11 mail.xxx.com postfix/qmgr(25497): 1A9B71D801: removed
Apr 16 06:29:11 mail.xxx.com postfix/smtp(11990): 3BEAB1D9C3: to=<xxx@tms**.pl>, relay=tms**.pl(194.181.x.x):25, delay=49, delays=37/0/6.7/5.4, dsn=2.0.0, status=sent (250 OK id=1lX6ji-000469-QT)
Apr 16 06:29:11 mail.xxx.com postfix/qmgr(25497): 3BEAB1D9C3: removed
Apr 16 06:29:12 mail.xxx.com postfix/smtp(12954): 418621D80D: to=<xxx@medi**.com.cn>, relay=mxw**.com(198.x.x.x):25, delay=51, delays=38/0/8.5/4.5, dsn=5.0.0, status=bounced (host mxw.mxhichina.com(198.11.189.243) said: 551 virus infected mail rejected (in reply to end of DATA command))
Apr 16 06:29:12 mail.xxx.com postfix/cleanup(7936): 6711A1D7B7: message-id=<20210415182912.6711A1D7B7@mail.xxx.com>
Apr 16 06:29:12 mail.xxx.com postfix/bounce(12184): 418621D80D: sender non-delivery notification: 6711A1D7B7
Apr 16 06:29:12 mail.xxx.com postfix/qmgr(25497): 418621D80D: removed
Apr 16 06:29:12 mail.xxx.com postfix/qmgr(25497): 6711A1D7B7: from=<>, size=2554, nrcpt=1 (queue active)
Apr 16 06:29:12 mail.xxx.com postfix/smtp(11499): 65E4C1D95F: to=<xxx@an**.com>, relay=aspmx.l.google.com(172.217.x.x):25, delay=51, delays=38/0/6.3/6.7, dsn=5.7.0, status=bounced (host aspmx.l.google.com(172.217.194.27) said: 552-5.7.0 This message was blocked because its content presents a potential 552-5.7.0 security issue. Please visit 552-5.7.0  https://support.google.com/mail/?p=BlockedMessage to review our 552 5.7.0 message content and attachment content guidelines. z63si3810735ybh.300 - gsmtp (in reply to end of DATA command))
Apr 16 06:29:12 mail.xxx.com postfix/cleanup(10468): 705F91D801: message-id=<20210415182912.705F91D801@mail.xxx.com>
Apr 16 06:29:12 mail.xxx.com postfix/smtp(11996): F05911DBCA: to=<xxx@maq**.ae>, relay=maq**.protection.outlook.com(104.47.x.x):25, delay=36, delays=27/0/3.1/6, dsn=2.6.0, status=sent (250 2.6.0 <20210415112836.BE31E4C0C57EAA1B@alshirak.com> (InternalId=93338229282509, Hostname=DB8PR10MB2745.EURPRD10.PROD.OUTLOOK.COM) 933811 bytes in 3.322, 274.451 KB/sec Queued mail for delivery)
Apr 16 06:29:12 mail.xxx.com postfix/qmgr(25497): F05911DBCA: removed
Apr 16 06:29:12 mail.xxx.com postfix/bounce(12183): 65E4C1D95F: sender non-delivery notification: 705F91D801
Apr 16 06:29:12 mail.xxx.com postfix/qmgr(25497): 65E4C1D95F: removed
``````

How to check where is the attack source? Is there a way to limit only a specific range of domains that can be used for mail relay?

I’m not a Postfix professional, so any suggestions/advises would be appreciated.

## Lost my bitcoin four years ago, trying to trace the wallet

four years ago I purchased 0.43 Bitcoin from localbitcoin.com.
I received the Bitcoin and sent it through a bitmixer to one of my wallets.
I checked all wallets and nothing was ever received.
I have the address I sent it too and the txid number.
Can anyone help locate my money? I will pay if this is possible.

## applications – tool for generating instruction trace for Android apps

I want to get the instruction trace for an Android apps.(i.e I want to get the address of the isntruction which are getting executed for an app) without modifying the apk.

Things which android provides it requires the app to be debuggable, but I wanted to target the apps which are there over the Google play store.

I have tried pintool (but it has discontinued the support) and the version which I have used, I am getting the syntax error when I attach a pin with the apk.

I have also tried valgrind but it is giving segmentation fault when I executed a very basic Hello world app by passing the equivalent *.odex file as an input to it.

Can someone suggest a working tool which helps in getting instruction trace for the Android apps?

Thanks a lot for helping it in my research journey.

## networking – Methodology to trace multiple types of the networks

Can we monitor information that is transmitted by mail, the press, the Internet, and social contacts? Although we like to assume that all information travels across the net, a lot of information follows a wide range of routes, including hallways, paper exchanges and telephone talks as well as packets around the internet. We can track communications on the Net (although encrypted) and trace social networking relationships (unencrypted). If we were to track information through several networks, perhaps taking measures which we could not follow immediately it would be a success for network science and maybe even for forecasting.

Naturally, this issue is of profound practical importance to the military as it explains how militants transmit information. The task is to identify a single way of representing different network measures that can inform a map from each network.

According to the above problem, please mention (and explain in detail) at least 5 steps, that how can you carry out such methodology to trace multiple types of the networks.

## How to trace mobile with IMEI number?

How to trace mobile with IMEI number?

.

## linear algebra – Coordinate-Free Definition of Trace, revisited.

I have some questions about a coordinate free definition of the trace of linear operators. This questions has been asked before in this forum (see (1,2)), but I haven’t found the answers of my interest to be clear enough, so I will ask some further questions about the answer which I will enumerate them as Q.i), Q.ii), … while I ask them.

Let me begin fixing the notation. Let $$V$$ be a vector space, $$V^*$$ its dual, $$Votimes V^*$$ their tensor product and $$End(V)$$ the vector space of linear endomorphisms in $$V$$ (i.e. linear operators from $$V$$ to $$V$$).

As far as I understood, the answer begins stating that the mapping $$votimes w^*to (u to w^*(u)v)$$ for all $$v,uin V$$ and $$w^*in V^*$$ is a linear isomorphism. My first question is about this mapping. Q.i) What happens to those elements of $$Votimes V^*$$ that are not factorizable, i.e. that are of the form $$sum_i v_iotimes w_i^*$$?

Later in the answer, a scalar $$w^*(v)$$ is associated to each element of the form $$votimes w^* in Votimes V^*$$. As far as I understood, is this scalar what is identified with the trace. Q.ii) What happens when we consider non-factorizable tensor products like $$sum_i v_iotimes w_i^*$$? Q.iii) In this case, does the scalar takes the form $$sum_i w^i(v_i)$$? Q.iv) Given, that the representation $$sum_i v_iotimes w_i^*$$ is not unique, why $$sum_i w^i(v_i)$$ remains invariant?

(1) Coordinate-Free Definition of Trace.

(2) Coordinate-free proof of \$operatorname{Tr}(AB)=operatorname{Tr}(BA)\$?

## es posible desarrollar una pagina web que sirva para que se trace una ruta entre dos puntos en movimiento?

[mi profesor dice que no se puede, que no es posible hacerlo en web sino que tiene obligatoria mente que hacerse con android estudio y yo quisiera que fuera web como si fuera un app uber? ]

## linear algebra – Lower eigenvectors of nonnegative matrices with zero trace

Let $$A$$ be an $$Ntimes N$$ nonnegative matrix with all diagonal entries equal to zero and such that there is $$n_0$$ such that all entries of $$A^{n_0}$$ are strictly positive. Let $$lambda_1,ldots, lambda_N$$ be its eigenvalues ordered in the decreasing order with respect to their real parts, and $$v_1,ldots, v_N$$ be the corresponding (left) eigenvectors. Perron and Frobenius tell us that $$lambda_1$$ is a strictly positive real number and therefore (since the sum of eigenvalues must be zero) there must also be eigenvalues with strictly negative real part; let $$lambda_{k_0},ldots, lambda_N$$ be those.

Questions:

(1) is it true that the “smallest” (with respect to the real part of the corresponding eigenvalue) eigenvector $$v_N$$ can be chosen in such a way that all of its entries are nonzero?

(2) if the above doesn’t hold, is it at least true that for any $$jin {1,ldots,N}$$ we can find $$mgeq k_0$$ such that $$v_m$$ has nonzero $$j$$th component (that is, the set of eigenvectors corresponding to eigenvalues with negative real part cannot have a common all-zero entry index)?