hi....so how is it ensured that your priv keys are not stolen?
Well, first off, it is safest to assume that they *will* be stolen, and so to empty your address and commit to never using it again before importing your wallet into the CLAM client.
But the fact is that the CLAM client doesn't send the private keys anywhere. You import your old BTC wallet, and the CLAM client uses them to sign transactions which claim the 4.6 CLAMs from the initial distribution. Only the signature is broadcast over the network, not the private keys themselves.
The problem is that you have to trust that that is true, or spend a lot of time checking the code to make sure that it is true. And so it is easier to assume it isn't true, that the client is going to try to steal your keys, and so it's best to make sure the keys are worthless before giving them to the client.
tl;dr: the client won't steal your keys, but "better safe than sorry" so why not empty them first anyway?yeah your right, bit of a stupid question by me, you would empty addresses.
I guess that a bit of a hassle for cold storage.
Your distribution model is interesting, however does it favor people or encourage people who have lots of addresses with small amounts.
or did you chose some min amount of BTC on an address before you sent.
The thread is kinda long so hard to plow through and find this