Thanks again, Cypherdoc. Both for the donation and the kind words. It's great to know that my work can be so inspirational to others!
eto please provide the actual probability of inserting malware into the usb key!
I wish I knew the answer to this question. However, I have been thinking about how one could avoid USB keys altogether, as they seem to be the weakest link in this process. Since there is no executable that needs to be run to use offline wallets, any method of transferring ASCII from one computer to another is sufficient (QR codes + Webcams, IR tx/rx streams, etc). The narrower the channel, the better, it's just that USB keys are very convenient.
The offline wallets would be 100.00% perfect security (besides physical security) if I just find another device that can help me move 1-3 kB of text back and forth without the autorun risk. The problem is, something like printing/scanning QR codes could be more trouble than it's worth. But if you have ludicrous amounts of BTC, it could be worth anything! (I think the best solution right now for the super-ultra-paranoid is to just setup a webcam on both systems, and I can add functionality to have all the data displayed/read as QR codes)
let me make one recommendation that might help in marketing Armory. add vanitygen.
You are now the 183rd person to suggest this. So maybe I will do it. I was resisting because I didn't want to have to try to support someone else's program on the wide variety of platforms out there. At the very least, I can add it only for Windows and Ubuntu, which should be fairly uniform. Alternatively, I might just make a PyQt wrapper for it, now that I'm fairly experienced with PyQt...
just imagine; 1GoldmanSachs923kmdi39lJtIOL976fRFVHdliwl08d
I don't know if you tried the calculation... but getting 12 specific letters after the '1' is pretty difficult. In fact if you were searching for '1GoldmanSachs...', it would take you an average of
1,850,000 years with oclvanitygen on one 5870. No big deal, I have 3 of them!
i went over the seminar a 2nd time, this time in OpenOffice with the Slideshow turned on.
i didn't realize you had transitions built into each slide and it made a huge difference in illustrating what is going on.
I guess you missed slide 4 which says "Press F5 Now!"
As you can tell, I put a lot of time into the slide transitions, and creating a "visual language" for the encryption concepts. You should be able to examine every small detail of each of those complicated slides, and everything matches up. In fact, let me know if it doesn't! I'll either fix it, or explain why it actually does