Pages:
Author

Topic: Crypto Security - Additional Protection For Your Seed/Private Keys. (Read 527 times)

legendary
Activity: 2534
Merit: 6080
Self-proclaimed Genius
I'm pretty sure it can.
Passphrases are great, and everyone should be using one, but they don't encrypt your seed - they are used as a salt for PBKDF2. -snip-
Yeah, it makes sense, you cannot reverse PBKDF2 so it isn't encryption.
But every Wiki/Article link about BIP39's passphrase labels it as "encryption" simply because it uses a "passphrase", those need some correction.

For the security, it's not that safe as I mentioned earlier: "the seed will be safe for a while" (the seed, not mnemonic).
legendary
Activity: 2268
Merit: 18711
I'm pretty sure it can.
Passphrases are great, and everyone should be using one, but they don't encrypt your seed - they are used as a salt for PBKDF2. Your seed is still very much stored in plain text. If you wanted to encrypt your seed phrase and store it on some metal device, then you will need a custom/homemade device. You will need a larger character set than just 26 capital letters, and far more of them, than these commercial products can accommodate.

As far as I can see, opinions are divided between those who suggest encrypted files saved online or on some medium, and those who still stick with multiple backups on paper/metal plates.
I use paper back ups, hardware wallets, and encrypted files, but I would advise against storing anything online. Even if it is encrypted, are you 100% confident in the encryption software you used? Are you 100% sure you left no traces of the unencrypted file on your internet enabled device? Are you 100% sure your encryption key is 100% secure and will never be broken? Why take an unnecessary risk? Just store it on a USB drive or airgapped device.
legendary
Activity: 3234
Merit: 5637
Blackjack.fun-Free Raffle-Join&Win $50🎲
I agree that the use of an additional word in the seed phrase is a good solution to increase security damage, but I would recommend having multiple backups available anywhere in the world and anytime.

What is recommended today may become necessary in the future, because if we want security, we have to invest a lot more than $50 in a hardware wallet and 24 words on a regular sheet of paper. As far as I can see, opinions are divided between those who suggest encrypted files saved online or on some medium, and those who still stick with multiple backups on paper/metal plates.

I agree that in case we use backups on paper/metal or any other more durable material, we need to use extra word (passphrase) as extra security in case someone if find our backup. Of course, in this case one should be intelligent and separate the seed words from passphrase, and take into account that weak passphrase is not good move since it is subject to brute force attack.



The whole point of this topic is to start acting more responsibly towards what we are protecting.
legendary
Activity: 2310
Merit: 2073
Most metal seed phrase storage devices cannot encrypt the seed phrase, which in my opinion is a very important factor. If you store your encrypted seed phrases in more than one cloud storage device it will be much more secure. -snip-
I'm pretty sure it can.
The user can always use the standard BIP39 encryption which will only add an additional word to the existing seed (but not to be included to the backup).
Info: BIP-0039

Even if the backup is compromised, the seed will be safe for a while since the mnemonic will derive a different set of keys if there's no passphrase or the correct passphrase wasn't included in the import.

I agree that the use of an additional word in the seed phrase is a good solution to increase security damage, but I would recommend having multiple backups available anywhere in the world and anytime.
legendary
Activity: 2534
Merit: 6080
Self-proclaimed Genius
Most metal seed phrase storage devices cannot encrypt the seed phrase, which in my opinion is a very important factor. If you store your encrypted seed phrases in more than one cloud storage device it will be much more secure. -snip-
I'm pretty sure it can.
The user can always use the standard BIP39 encryption which will only add an additional word to the existing seed (but not to be included to the backup).
Info: BIP-0039

Even if the backup is compromised, the seed will be safe for a while since the mnemonic will derive a different set of keys if there's no passphrase or the correct passphrase wasn't included in the import.
legendary
Activity: 2310
Merit: 2073
Most metal seed phrase storage devices cannot encrypt the seed phrase, which in my opinion is a very important factor. If you store your encrypted seed phrases in more than one cloud storage device it will be much more secure. You can use PGP encryption (https://bitcointalksearch.org/topic/eng-tutorial-pgp-signature-encryptdecrypt-message-fingerprint-4059348) and use complex passwords for cloud storage. Even if an attacker can get your encrypted seedphrase, it is almost impossible for them to decrypt it.
hero member
Activity: 2632
Merit: 833
You can also check this testing conducted on Billfodl and see the results.



https://twitter.com/JimJones1913/status/1161065474869694464
legendary
Activity: 1652
Merit: 1483
I think these kind of metal devices are generally overkill. You should never have your seed backed up in only one location, as no storage medium is 100% guaranteed to survive anything that could happen to it and also be able to be found amongst the wreckage, be it fire, flood, earthquakes, whatever.

exactly. as with most things, it's crucial not to have a single point of failure. storing everything in your house is asking for trouble. a single disaster or burglary could ruin everything.

the obvious solution is to have backups in multiple physical locations. it could be as simple as encrypted .dat files on thumb drives. you could leave one at your parent's house, at the office, in a safe deposit box, etc etc. periodically replace them to prevent data corruption and you should be all set.

this is a low cost but highly resilient model IMO, better than these expensive metal bricks. Roll Eyes
legendary
Activity: 2044
Merit: 1018
Not your keys, not your coins!
~
Decentralizing funds and seed backups are best thing to do. It will help to prevent the worst case when you store all your money in one seed and hacker get access to one of your backup and steal all of your funds.

Decentralization is a backbone of bitcoin as well as the crypto currency world. It can also be applied for fund storage and seed backups.

Keeping small funds in handy-wallet for daily usages while decentralizing main funds into different seeds (keep their backups safely too).
legendary
Activity: 2268
Merit: 18711
note that using it is fine with this iteration because it is not meant to be used for encryption but for "plausible deniability".
Well, that's also true. Just leaving a small amount of coins under your seed unprotected by a passphrase is enough to give you plausible deniability. Leaving a small amount under a decoy passphrase is even better. Even if you only have coins under your real passphrase, you could use the excuse that you were backing up the phrase before sending any coins to it. Someone finding the seed but not knowing what the real passphrase is, or even if one exists, is unlikely to spend a significant amount of time trying to brute force it, and as you say, it gives you plausible deniability for a $5 wrench attack.

On the other hand, if somebody finds your encrypted seed, then I suppose it depends on whether or not they know that what they have found is a seed, and not just some other encrypted data which would be worthless to them. If they did know it was a seed, then it is much more likely they would assume it is holding a significant amount of funds and put more effort in to attempting to crack it.

Perhaps someone might want to go down both routes, and encrypt their seed in addition to using a passphrase, but that now means you have to back up three things (seed, encryption key, passphrase), in multiple, separate, secure locations. I'd be running out of places I can trust are secure at that point, short of renting out multiple safety deposit boxes.
legendary
Activity: 3472
Merit: 10611
that is NOT encryption.
I'd argue that a passphrase is a better option, since it takes longer to brute force passphrases and check for funds than it does to simply brute force encryption keys.

well i have to benchmark it to see which one is faster but logically PBKDF2 with iterations below 10mil aren't even supposed to be used for anything that is security critical (BIP-39 uses 2048) and this KDF is not known to be strong at all. there are much better alternatives to use such as scrypt. https://tools.ietf.org/html/rfc8018#section-4.2
note that using it is fine with this iteration because it is not meant to be used for encryption but for "plausible deniability".
legendary
Activity: 2268
Merit: 18711
-snip-
Tools like this are great, and Ian Coleman has a similar one up at his site here: https://iancoleman.io/shamir39/. It is very important to be aware, though, that there is no set standard for how this kind of secret sharing should be implemented. Whichever software, program, site, GitHub, etc., that you use to split your secret must be exactly the same one you later use to combine your shards and recover your seed. With that in mind, you need to think about what you would do if that GitHub repository went offline, or if the program on your computer became corrupted or lost.

If you are using a method like this to split your secret, then you must also back up the code you used to do it.
legendary
Activity: 2646
Merit: 3911
You can get better results by dividing wallet seed and encoded them in safer ways, for example using the Shamir Secret Chess scheme.
You can divide words into a specific number of splinters and then distribute them to trusted people as M of N will need to pool to renew the seed (try using https://github.com/oed/seedsplit "Run it offline.")

Read more --> https://bitcointalksearch.org/topic/ann-passguardiancom-client-side-threshold-secret-sharing-142875


I remember that there was a way to encryption in the form of a regular image so that you can place them safely in any public place and need a password for the recovery or part of them.
legendary
Activity: 2338
Merit: 10802
There are lies, damned lies and statistics. MTwain
Out of those examples listed in the OP, I’d be less inclined towards the cryptosteel design. I mean it looks cool and sleek, but the fact that there are many tiny pieces makes we feel that something can go wrong if you mount the stopper wrongly at the end of the rod. Additionaly, reading the mnemonic there seems uncomfortable (not much wiggle room) in case you need to retrieve it without actually going through taking the characters off the rod (which seems like an accident prone moment).

Besides the actual method of protection and concealment, there lies the key factor of placement. If we go full paranoid, these devices will not help us if the device itself is stolen, our house get (heavily) flooded, hit by a tornado, or it gets accidently thrown away during spring cleaning. Placement (and perhaps redundancy) are elements to add to de security equation.
legendary
Activity: 2268
Merit: 18711
I think these kind of metal devices are generally overkill. You should never have your seed backed up in only one location, as no storage medium is 100% guaranteed to survive anything that could happen to it and also be able to be found amongst the wreckage, be it fire, flood, earthquakes, whatever. Sure, a steel plate may survive a flood or a tornado where paper wouldn't, but that's not going to be much use to you if it has been carried several miles away and you can't find it. Your seed should be backed up in a minimum of two completely separate and distant locations, and the chance of both locations simultaneously being faced with disaster is very small (provided your two locations aren't your house and your garage, or something equally silly). Paper is completely adequate provided you have more than one backup.

that is NOT encryption.
Yeah, a passphrase is clearly not encryption, but they essentially achieve the same thing - a long, random string of characters that is needed in addition to the seed (or encrypted seed) to access the coins behind it. I'd argue that a passphrase is a better option, since it takes longer to brute force passphrases and check for funds than it does to simply brute force encryption keys. Either way, your passphrase or encryption key also needs backed up, and obviously needs stored separately to your seed phrase back ups.
legendary
Activity: 2366
Merit: 2054
Be careful several of them don't resist at all to fire or to shock...  Undecided
Some of the steel storage have a problem when crushing test, I read up all of the metal testings by Loop, the rail-based design will make data loss easily
After encryption, and backup steps, the next step will be having good storage locations (some backups are stored at some locations - all need to be safe ones).
laminated paper and keep it to safe deposit box are good one
legendary
Activity: 3234
Merit: 5637
Blackjack.fun-Free Raffle-Join&Win $50🎲
Saint-loup, thanks for the warning, even though these are very extreme conditions, we can still see which materials show up best when it comes to resistance to fire, water, crush. Although most users will not experience such challenges in real life, there is no need to save on investing in security, of course for those who feel they need something like this.

I think for anyone who owns at least 1 BTC, saving backups is something to seriously consider, as otherwise we could have a lot of disappointments in a decade if price of BTC rise only x10 from today. I see many such cases back in 2017, lost seeds, seeds with mixed words, paper wallets with faded characters, wallets on corrupted hard drives (no backups at all).
legendary
Activity: 3472
Merit: 10611
That's a good point, but what could you do against that?
You don't think a passphrase is enough?
a strong password is enough but the problem i was talking about is backing up that password. for example imagine your password is this: 4@Gx19y{75#Hq (13 characters long), how are you going to remember this? you will have to store it somewhere on a piece of paper which means now you have 2 "objects" you have to store.

Quote
Mastering Bitcoin states that's a pretty strong protection
that is NOT encryption.
encryption means if your mnemonic is this:
Code:
legal winner thank year wave sausage worth useful legal winner thank year wave sausage worth useful legal will
the encryted result  which is what you get after actually encrypting it using an actual encryption method (using the password above and AES-256 CBC mode with no padding) would look like this:
Code:
{"iv":"ea2024f935f49c1cc203a313fc8c22f0","mode":"CBC","padding":"NoPadding","keySize":256,"cipher":"aes","salt":"183e68e95f2ab428",
"ciphertext":"VTJGc2RHVmtYMSt5UUhqb1ZhenNPZGFyMVF6bXhGSGpySmNheURsMWQ3N3d4SGRGdTBkWVhPU2pQVkQ3QXhTUwoxeVowbWVCS0drUWlnbzM2SFFScDlFWHZ2L1puN2tOWFV4eEJ2K0FZQ0lpQ2R2anJDWkhhNzl0NmNnbk5hdCtBCkcxM08rMjZZaC9LbEU1RjhhcndQSjNoOHFSRS81Qno5ZDdmaXBxWHY=","time":2,"status":"success"}
legendary
Activity: 2604
Merit: 2353
another security point that is usually overlooked when creating a backup is "encryption".

the private key or mnemonic needs to be encrypted before it is written on whatever medium you choose (paper, metal,...) because if anybody could ever take a look at that backup they can easily write it down and then later on use it to steal all the funds that are stored in those keys. a simply encryption prevents that although it introduces a new issue: "how to remember/store the password used to encrypt it"!
That's a good point, but what could you do against that?
You don't think a passphrase is enough?
Mastering Bitcoin states that's a pretty strong protection
Quote
The key-stretching function, with its 2048 rounds of hashing, is a very effective protection against brute-force attacks against the mnemonic or the passphrase.
It makes it extremely costly (in computation) to try more than a few thousand passphrase and mnemonic combinations, while the number of possible derived seeds is vast (2512).
https://github.com/bitcoinbook/bitcoinbook/blob/develop/ch05.asciidoc#from-mnemonic-to-seed

People who didn't set up a passphrase could eventually make a simple shift ciphering in the BIP39 wordlist with a passphrase (eg "The..."  shifts the first word of the seed by 20 places in the bip39 wordlist -because T is the 20th letter of alphabet-, h shifts the second word by 8 places, e by 5 places the third word, etc)
legendary
Activity: 2170
Merit: 1789
If its people who own less than 1 BTC in total, they won't be investing in this as the price doesn't make any sense and if it's for people who own more than 10 BTC then there are far better ways to store than these cheap metal tiles...

Some people buy for luxury, some because they want to do it and have a lot of money to burn. You never know.

The fact that they sell it and didn't go bankrupt until now could be proof that there are people that buy those things.
Pages:
Jump to: