Repository
https://github.com/holgern/beem
beem is a python library and command line tool for HIVE. The current version is 0.24.15.
There is also a discord channel for beem: https://discord.gg/4HM592V
The newest beem version can be installed by:
pip install -U beem
Check that you are using hive nodes. The following command
beempy updatenodes --hive
updates the nodelist and uses only hive nodes. After setting hive as default_chain, beempy updatenodes
can be used.
The list of nodes can be checked with
beempy config
and
beempy currentnode
shows the currently connected node.
Changelog for 0.24.15
- Add diff_match_patch dependency again, as the difflib implementation does not work
Changelog for 0.24.14
- Add option add_tor to config storage, which allows it to use beempy in tails
- Switch from pyyaml to ruamel.yaml
- Remove Events requirements, beem.notify and beemapi.websocket, as it is not well tested and there are no websocket api nodes available on hive
- Remove unnecessary requirements (pylibscrypt and future)
- add new node (fin.hive.3speak.co) and change change rpc.esteem.app to rpc.ecency.com
- Replace diff_match_patch by difflib and add unit tests
- Increase timeout and retry count in beempy
- Remove obsolete replace_hive_by_steem parameter
- skip_account_check added to account.transfer and account.transfer_to_vesting
Reduce dependencies
The pylibscrypt
, future
and diff_match_patch
dependency has been removed and pyyaml
was replaced by ruamel.yaml
.
skip_account_check
can speed up transfer
and transfer_to_vesting
When setting skip_account_check=True
the receiver account name is not checked for validity. This reduced the number of API-calls when broadcasting a lot of transfers.
The use_tor
config can be set to True for using beem in Tails
Tails is a secure portable operating system that can be started from any PC with USB.
Changing the account keys of a Hive account can only be done with the owner key. Thus, this key needs to be protected from leaking. Broadcasting the account_update operation from Tails could increase security and protect the owner key.
It is possible to activate tor by:
beempy set use_tor true
so that beempy can be used in Tails.
You need to set an administrator password on startup and install the following packages in the root terminal:
apt install build-essential libssl-dev python3-appdirs python3-click-plugins python3-dev python3-future python3-pip python3-pretty-yaml python3-prettytable python3-pycryptodome python3-pytest-runner python3-ruamel.yaml python3-scrypt python3-setuptools python3-websocket
and download the following tar.xz files with the Tor-Browser:
This is necessary as a pip install
do now work in Tails.
You need to unpack them with tar xvzf file.tar.gz
and do a
python setup.py install --user
inside the unpacked directory using a terminal.
This has to be done at first with click-shell, diff_match_pach and then with beem.
The beempy command can be started with
~/.local/bin/beempy
After doing
~/.local/bin/beempy set use_tor true
everything should be working.
I will prepare a more detailed instruction for how to use beempy in Tails.
If you like what I do, consider casting a vote for me as witness on Hivesigner or on PeakD
Upvoted to thank you @holger80 for supporting the CO2Fund by, e.g., supporting posts, banner presentation, SP/HP delegation, dustsweeper gifts, helpful tools, etc.
$tangent
Congratulations, @theguruasia You Successfully Trended The Post Shared By @holger80.
You Utilized 2/3 Daily Summon Bot Calls.
TAN Current Market Price : 0.300 HIVE
Are you earning tan?
Congratulations @holger80, You Earned 4.204 TAN & Curators Made 4.204 TAN.
Join CORE / VAULT Token Discord Channel or Join UPMELINK Web Site
TAN Current Market Price : 0.310 HIVE
Are many people using tails?
In september 2020, Tails has been started more than 906 004 times (30 200 boots a day on average). source
Kind of disturbing an operating system that is designed to be super secure is spying on it's use.
They just count how often a security report is fetched and an update check is performed. Both are done once when tails is booting. So I would not call this spying (both calls are made through tor, so IP leaking).