Pages:
Author

Topic: Can someone confirm my security is OK? (Read 2005 times)

cp1
hero member
Activity: 616
Merit: 500
Stop using branwallets
June 08, 2013, 08:02:09 AM
#27
Armory is deterministic, so you're good.
donator
Activity: 3136
Merit: 1167
June 08, 2013, 07:56:50 AM
#26
Just one last question about my paper backup (noob) - do I need to create a new backup after transactions, or is the initial backup good for life?

It's in theory good for life - but you need to make sure when you make a transaction from a paper wallet address that the change is returned back to the paper wallet - if you're not careful it will  be returned to an address you were not expecting.

This is very much easier to manage if you use blockchain.info wallet for the TX rather than the BTC client one, not sure how easy Armoury wallet makes this as haven't tried yet.
hero member
Activity: 955
Merit: 1002
June 08, 2013, 03:56:35 AM
#25
Just one last question about my paper backup (noob) - do I need to create a new backup after transactions, or is the initial backup good for life?

It's in theory good for life - but you need to make sure when you make a transaction from a paper wallet address that the change is returned back to the paper wallet - if you're not careful it will  be returned to an address you were not expecting.
newbie
Activity: 30
Merit: 0
June 08, 2013, 03:34:21 AM
#24
Just one last question about my paper backup (noob) - do I need to create a new backup after transactions, or is the initial backup good for life?
member
Activity: 112
Merit: 10
June 08, 2013, 01:44:24 AM
#23
use brainwallet
cp1
hero member
Activity: 616
Merit: 500
Stop using branwallets
June 07, 2013, 10:47:24 PM
#22
I have recently installed Armory on my everyday PC, plus on another machine not connected to the outside world. I've created my wallet on the offline machine and a watching-only copy which I have imported into Armory on the onliner machine.
I have a paper backup of the wallet printed (immediately after installation) which I will keep safe in multiple locations.
I've transferred a quantity of BTC into the watching-only wallet.
Anything else I need to do?

As long as that offline machine was a clean install you're good.
hero member
Activity: 490
Merit: 500
June 07, 2013, 10:38:59 PM
#21
...disables autorun to protect from a USB transfer virus, and encrypts the offline computer with a strong password to guard against physical use he is perfectly safe (provided his paper backups remain so) because the private keys to spend coins are not accessible to the outside world, period. It doesn't matter if the online computer ever gets infected. No coins can move without being signed by the encrypted offline computer.

These are really the key points for securing the offline computer, particularly disabling autorun from USB drive.  Just running Linux rather than Windows on the offline computer will help, but disabling autorun should take you 90% of the rest of the way there.  Encrypting the computer?  Sure, if you're paranoid enough, go for it.
legendary
Activity: 1050
Merit: 1002
June 07, 2013, 11:43:14 AM
#20
... and also the most common attack vector - conning the user into installing the trojan/similar themselves ...

Exactly. That or lulling them into a false sense of security. That's why I say installing more software isn't the route for security. It's sort of like the mess we have now with the Fed. The only thing the Fed can do is print more money, which doesn't solve the problem because the problem is larger and within the system itself. You need to correct the system.

I actually thought of starting a company that sells guaranteed virus-free computers. It basically stores files in a compartmentalized way then clean re-installs the OS with a click or on schedule. With computer security becoming more important as technology integrates more into people's lives, and now directly deals with money I think it may be essential.

I'm satisfied I've done enough - it's not like I have a huge hoard!

Yes, but others reading and seeking advice may. Thanks for asking.
newbie
Activity: 30
Merit: 0
June 07, 2013, 09:59:41 AM
#19
Thanks for all your suggestions.
The offline machine is a clean install of LinuxMint so no viruses.
I'll be careful with the hard copies as recommended.
I'm satisfied I've done enough - it's not like I have a huge hoard!
Thanks again.
sr. member
Activity: 302
Merit: 250
June 07, 2013, 04:07:27 AM
#18
ha, are you serious on both points?

What are you talking about?

I don't think he knows what he is talking about. Surely no-one would advocate running MalwareBytes, ccleaner, malware bytes pro, microsoft security essentials, avast internet security and sandboxie all at the same time, as a means of "staying secure".

Surely anyone who knew what they were talking about would know that this does absolutely nothing to protect you from zero day exploits, and also the most common attack vector - conning the user into installing the trojan/similar themselves (i.e. donwloading something unknown from the internet and running it).

OP has already taken excellent precautions; if his install of Armory on his offline computer was to a freshly installed OS (I used Ubuntu 10.14) then he should be alright.

Disabling autorun is a good idea in any case though, another precaution I took, was to enter the BIOS of my (offline) netbook and then to disable wifi and bluetooth, to remove some more potential vectors.

I did not print my armory keys when generated, but saved to pdf and immediately encrypted the doc using Truecrypt (using a long, randomly generated password), and that is now sitting in an online backup service (which happens to be 2 factor auth protected too).

My offline armory wallet (on a ubuntu netbook) is password protected. My netbook is fully encrypted itself. Passwords were randomly generated for all.

I agree with acoindr when he says, that OPs online computer can get whatever sh*t on he cares to allow on there, as long as the offline computer is secure, then the coins will be safe (and the infection is then not passed onto the offline device).

Browser extensions can help with online computer safety, such as noscript, adblock, flashblock and if using chrome (which you shoudl do I think), then go here: chrome://settings/content and set plugins to "click to play" rather than "play automatically". This will prevent things from being autorun on various webpages.

Also, never run anything you download from the internet unless you know what it is. This may sound obvious, but is more helpful than you might think - I am not trying to patronise anyone...  Cheesy

Stay safe OP.

Also, if anyone has any additional pointers I should beware of, not to hijack this thread, but I would always be open to hear them  Grin
legendary
Activity: 1050
Merit: 1002
June 06, 2013, 02:03:10 PM
#17
ha, are you serious on both points?

What are you talking about?
hero member
Activity: 686
Merit: 504
always the student, never the master.
June 06, 2013, 01:57:29 PM
#16
only wannabes wipe their drives and reinstall unnecessarily.

I guess you mean people that wannabe safe.

much easier, faster, and better for your harddrive to clean the mbr, quarantine viruses, remove spyware and rootkits, fix the registry and delete temp files.

That depends on the situation. Computers are cheap, especially one which is only going to run offline for dedicated purposes needing minimal hardware specs.


and if you have problems deleting registry entries its almost a sure sign of  a virus. thats where FileAssasin comes in handy. it deletes the fiile securely, and if the file refuses, it gives you the option to delete it on reboot before it can load into memory. What you suggest is the sloppy and inneficient way of fixing a problem. and in this day and age one single antivirus isn't gona protect you from every virus spyware trojan adware driveby or infected gif out there. throughout my time repairing computers, i've noticed that many people don't even realize that sometimes you have to remove exceptions from your firewall when you uninstall some software, especially unsigned software such as the many variations of QT. my method may be considered overkill, and if it is, that is simply UNJUST. In my book, its more unnecessary to uninstall the entire os to get rid of a single virus. that's just me though.

My method is a no brainer basically guaranteed secure way to not lose bitcoins. That's all I care about. Whatever you want to say about the online computer is not my interest. Tell him to run whatever you like. It doesn't matter, because like I said the offline computer (spending bitcoins) is secure regardless.

ha, are you serious on both points?
legendary
Activity: 1050
Merit: 1002
June 06, 2013, 01:34:28 PM
#15
only wannabes wipe their drives and reinstall unnecessarily.

I guess you mean people that wannabe safe.

much easier, faster, and better for your harddrive to clean the mbr, quarantine viruses, remove spyware and rootkits, fix the registry and delete temp files.

That depends on the situation. Computers are cheap, especially one which is only going to run offline for dedicated purposes needing minimal hardware specs.


and if you have problems deleting registry entries its almost a sure sign of  a virus. thats where FileAssasin comes in handy. it deletes the fiile securely, and if the file refuses, it gives you the option to delete it on reboot before it can load into memory. What you suggest is the sloppy and inneficient way of fixing a problem. and in this day and age one single antivirus isn't gona protect you from every virus spyware trojan adware driveby or infected gif out there. throughout my time repairing computers, i've noticed that many people don't even realize that sometimes you have to remove exceptions from your firewall when you uninstall some software, especially unsigned software such as the many variations of QT. my method may be considered overkill, and if it is, that is simply UNJUST. In my book, its more unnecessary to uninstall the entire os to get rid of a single virus. that's just me though.

My method is a no brainer basically guaranteed secure way to not lose bitcoins. That's all I care about. Whatever you want to say about the online computer is not my interest. Tell him to run whatever you like. It doesn't matter, because like I said the offline computer (spending bitcoins) is secure regardless.
hero member
Activity: 686
Merit: 504
always the student, never the master.
June 06, 2013, 01:21:48 PM
#14
Maybe keep money spread across 2-3 wallets?
this, a million times.

also, go for a password atleast 32 charachters long. the more special charachters the better.  in fact, my second password is 106 charachters in lenght, and i have it memorized by heart.
legendary
Activity: 2674
Merit: 3000
Terminated.
June 06, 2013, 01:18:18 PM
#13
Don't go for too much software, and don't be so paranoid. Maybe keep money spread across 2-3 wallets?
hero member
Activity: 686
Merit: 504
always the student, never the master.
June 06, 2013, 01:17:59 PM
#12
TO OP. you need to do the following things in sequence


Download MBAR(MalwareBytes Anti RootKit Utility)
then whip on over to
Gibson research company and use the shields up utility to scan your ports for visibility to hackers.

https://www.grc.com/x/ne.dll?bh0bkyd2

If you are afraid of this because of the dll file extension, search google about this company. They are the leading firewall research and development company in the world. Anyway, when you get there use the utility(which is quite ugly and a bit confusing) to scan all of your common service ports. green means they are in stealth and not visible. red means they are visible and open. blue means they aren't visible but your computer sent a response when the request was received, making the port vulnerable to various hack attempts. if all of your ports are in stealth mode then it is next to impossible for a hacker to find your computer unless they know your ip address.

After you have done all this research what ever coin clients you use's rpc port and default port and scan all of these manually.

Additonally, i would recommend downloading ccleaner from piriform, malware bytes pro, microsoft security essentials, avast internet security and sandboxie. i run all of these programs simultaneously with no problem and haven't had an infection in months, despite several attempts, including one by a forum member who coaxed me into a skype chat.


This is unnecessary. In general, you should never depend on more software to secure your system.

As long as the OP had no viruses on the offline computer before setting things up (do a clean OS install), disables autorun to protect from a USB transfer virus, and encrypts the offline computer with a strong password to guard against physical use he is perfectly safe (provided his paper backups remain so) because the private keys to spend coins are not accessible to the outside world, period. It doesn't matter if the online computer ever gets infected. No coins can move without being signed by the encrypted offline computer.

only wannabes wipe their drives and reinstall unnecessarily. much easier, faster, and better for your harddrive to clean the mbr, quarantine viruses, remove spyware and rootkits, fix the registry and delete temp files. and if you have problems deleting registry entries its almost a sure sign of  a virus. thats where FileAssasin comes in handy. it deletes the fiile securely, and if the file refuses, it gives you the option to delete it on reboot before it can load into memory. What you suggest is the sloppy and inneficient way of fixing a problem. and in this day and age one single antivirus isn't gona protect you from every virus spyware trojan adware driveby or infected gif out there. throughout my time repairing computers, i've noticed that many people don't even realize that sometimes you have to remove exceptions from your firewall when you uninstall some software, especially unsigned software such as the many variations of QT. my method may be considered overkill, and if it is, that is simply UNJUST. In my book, its more unnecessary to uninstall the entire os to get rid of a single virus. that's just me though.
legendary
Activity: 1050
Merit: 1002
June 06, 2013, 01:07:31 PM
#11
TO OP. you need to do the following things in sequence


Download MBAR(MalwareBytes Anti RootKit Utility)
then whip on over to
Gibson research company and use the shields up utility to scan your ports for visibility to hackers.

https://www.grc.com/x/ne.dll?bh0bkyd2

If you are afraid of this because of the dll file extension, search google about this company. They are the leading firewall research and development company in the world. Anyway, when you get there use the utility(which is quite ugly and a bit confusing) to scan all of your common service ports. green means they are in stealth and not visible. red means they are visible and open. blue means they aren't visible but your computer sent a response when the request was received, making the port vulnerable to various hack attempts. if all of your ports are in stealth mode then it is next to impossible for a hacker to find your computer unless they know your ip address.

After you have done all this research what ever coin clients you use's rpc port and default port and scan all of these manually.

Additonally, i would recommend downloading ccleaner from piriform, malware bytes pro, microsoft security essentials, avast internet security and sandboxie. i run all of these programs simultaneously with no problem and haven't had an infection in months, despite several attempts, including one by a forum member who coaxed me into a skype chat.


This is unnecessary. In general, you should never depend on more software to secure your system.

As long as the OP had no viruses on the offline computer before setting things up (do a clean OS install), disables autorun to protect from a USB transfer virus, and encrypts the offline computer with a strong password to guard against physical use he is perfectly safe (provided his paper backups remain so) because the private keys to spend coins are not accessible to the outside world, period. It doesn't matter if the online computer ever gets infected. No coins can move without being signed by the encrypted offline computer.
hero member
Activity: 686
Merit: 504
always the student, never the master.
June 06, 2013, 12:56:59 PM
#10
TO OP. you need to do the following things in sequence


Download MBAR(MalwareBytes Anti RootKit Utility)
then whip on over to
Gibson research company and use the shields up utility to scan your ports for visibility to hackers.

https://www.grc.com/x/ne.dll?bh0bkyd2

If you are afraid of this because of the dll file extension, search google about this company. They are the leading firewall research and development company in the world. Anyway, when you get there use the utility(which is quite ugly and a bit confusing) to scan all of your common service ports. green means they are in stealth and not visible. red means they are visible and open. blue means they aren't visible but your computer sent a response when the request was received, making the port vulnerable to various hack attempts. if all of your ports are in stealth mode then it is next to impossible for a hacker to find your computer unless they know your ip address.

After you have done all this research what ever coin clients you use's rpc port and default port and scan all of these manually.

Additonally, i would recommend downloading ccleaner from piriform, malware bytes pro, microsoft security essentials, avast internet security and sandboxie. i run all of these programs simultaneously with no problem and haven't had an infection in months, despite several attempts, including one by a forum member who coaxed me into a skype chat.
legendary
Activity: 1050
Merit: 1002
June 06, 2013, 12:48:13 PM
#9
I have recently installed Armory on my everyday PC, plus on another machine not connected to the outside world. I've created my wallet on the offline machine and a watching-only copy which I have imported into Armory on the onliner machine.
I have a paper backup of the wallet printed (immediately after installation) which I will keep safe in multiple locations.
I've transferred a quantity of BTC into the watching-only wallet.
Anything else I need to do?

That security is pretty good and you have a very low chance of losing coins that way. However, there are a couple weak points to be aware of. The first is your printed private keys. Remember, private keys unlock the bitcoins so if someone learns your private keys they can steal your coins regardless of your computer setup. Keep those maybe in a safe/safety deposit box, and guard against cameras/binoculars through windows etc.

Next, the one flaw I see in the Armory setup is shuttling data back and forth by USB which subjects even an offline computer to autorun viruses. Be sure to disable autorun.

Also, remember you must guard against someone using your offline computer. To guard against that be sure to encrypt the wallet with a strong password and protect the password. Then even if your offline computer is stolen your coins are safe.

Last, you may want to check this thread started by someone thinking of starting a Bitcoin Bank. In particular I agree this quote is the most secure and efficient method for storing coins:

1. Dedicated offline Ubuntu Live on USB drive.
2. Create a bunch of private keys offline and put them in a truecrypt container.
3. Backup the truecrypt container on multiple locations (both local and online).

This pretty much reduces the risk of theft or losing the money to ZERO percent.

For extra paranoia, e.g. in case of kidnapping your family and demanding the private keys as ransom:

4. Use a time-lock, i.e. a remotely controlled server that sends the passphrase for the truecrypt container only X days after you request it. Obviously this implies the inconvenience of not *instantly* being able to access your money, but that's the whole idea.

I don't think it gets any more secure than this.
hero member
Activity: 531
Merit: 505
June 06, 2013, 11:41:39 AM
#8
...

Anything else I need to do?

I would not use paper wallet with unencrypted private keys. You never know who will look at these papers, who may copy them, etc.
Pages:
Jump to: