Pages:
Author

Topic: Keeping your butts safe (Read 4161 times)

legendary
Activity: 3416
Merit: 1912
The Concierge of Crypto
October 16, 2014, 10:56:56 PM
#72
Yeah, just store your backups on a cubesat. Or the moon. Or under the sea. I dunno. They are all really far fetched.
legendary
Activity: 1036
Merit: 1000
Thug for life!
October 16, 2014, 10:48:31 PM
#71
- Fire/flood/theft risk (unless mitigated with some kind of backup)
- Keylogger risk (true for pretty much everything except trezor style device)
- Coins perhaps inaccessible if you travel
- Potential data corruption (again unless mitigated through solid backups, which is more opportunity for fuck ups)

Thank you for your reply, but those are all covered.

Fire = encrypted backups
Keylogger = after initial set up disconnected, no further software is installed. no hardware is allowed near it. It's a clean machine, bare OS, all other services off, all other ports blocked.
Travel = that's a given, I would need to be on that particular machine. Backups will take time to set up, but can be done (same as for destruction).
Data corruption = same backups.
In order to properly protect yourself from data corruption you need to have multiple backups on multiple types of backups. For example if you have 3 backups of your private key on 3 USB drives all made by the same manufacturer then there is a highly elevated chance that all three will fail if one fails. Also, the same is true with the program that you use to encrypt your backup file. 

Correct! Also, best to have them in more than one physical location. To protect against earthquakes, volcanic eruptions, and tsunamis. No real protection against giant asteroids though, since that will wipe us all out.
LOL. I think it would be theoretically possible to protect against this by storing your private keys in locations that are underground and have several years worth of food, water and electricity and medical supplies. I would think that protecting against asteroids would have a negative NPV as would protecting against volcanios - at least in most of the world
legendary
Activity: 3416
Merit: 1912
The Concierge of Crypto
October 16, 2014, 10:37:31 PM
#70
I chose 10km because I rarely leave the city. I concluded that if I am likely to survive any city-destroying event: so should my Bitcoin. If the city is totally wiped off the map, I probably won't be looking for my private keys.

Me and another forum member were thinking of offering a service to hold some of your paper wallets, for a fee. I'm at least 10,000 km away from you.

If your city got wiped off the map, but you survive, you may want to have access to your bitcoins.
legendary
Activity: 1008
Merit: 1001
Let the chips fall where they may.
October 16, 2014, 10:29:32 PM
#69
Where do you guys store your paper wallets?  If I had a safe that weighed like 500 lbs I'd use that, but not many people have that.

I guess most people just find a hiding spot in their house and hope it doesn't burn down?

This came up once before in this thread, but nobody responded directly.

If you are worried about your house burning down, you obviously do not have off-site, verified backups.

I currently have my Bitcoin stored in two locations at least 10km apart. I must confess, it was scary to open the sealed envelope only to learn that some of my private keys were only stored in one location (ie: not verified).

I hope to upgrade to 3 locations at least 10km from each other, each with m-of-n keys, such that 2 keys are needed to recover funds. If you opt for a safe-deposit box 10km from your home, you may get extra scrutiny for using a branch that is not near your home or place of work.

I chose 10km because I rarely leave the city. I concluded that if I am likely to survive any city-destroying event: so should my Bitcoin. If the city is totally wiped off the map, I probably won't be looking for my private keys.

With the precautions outlined above, I think there is no problem with paper wallets. Some people suggest encrypting your backups, but then you will need to back up the decryption key somewhere. As the number of locations go up, the higher the chance of compromise. That is why m-of-n keys with some kind of tamper detection would be ideal.

legendary
Activity: 1164
Merit: 1000
Einsteinium Foundation Board Member and Treasurer
October 16, 2014, 09:00:55 PM
#68
I have two offline wallets that split my BTC between the two. If something happens to one, I don't lose them all.

I have my public addresses as 'watch only' so I can monitor the balances.

I have my private keys stamped into metal that won't melt if the house burned down.

AND I have paper copies in another location, split up so you need both parts to complete the key.

I'm HODLing long term, so I wanted to be safe.

This is one of the best option you can have to keep your BTCs safe
hero member
Activity: 674
Merit: 500
October 16, 2014, 08:48:31 PM
#67
Where do you guys store your paper wallets?  If I had a safe that weighed like 500 lbs I'd use that, but not many people have that.

I guess most people just find a hiding spot in their house and hope it doesn't burn down?
legendary
Activity: 3416
Merit: 1912
The Concierge of Crypto
October 16, 2014, 08:48:15 PM
#66
- Fire/flood/theft risk (unless mitigated with some kind of backup)
- Keylogger risk (true for pretty much everything except trezor style device)
- Coins perhaps inaccessible if you travel
- Potential data corruption (again unless mitigated through solid backups, which is more opportunity for fuck ups)

Thank you for your reply, but those are all covered.

Fire = encrypted backups
Keylogger = after initial set up disconnected, no further software is installed. no hardware is allowed near it. It's a clean machine, bare OS, all other services off, all other ports blocked.
Travel = that's a given, I would need to be on that particular machine. Backups will take time to set up, but can be done (same as for destruction).
Data corruption = same backups.
In order to properly protect yourself from data corruption you need to have multiple backups on multiple types of backups. For example if you have 3 backups of your private key on 3 USB drives all made by the same manufacturer then there is a highly elevated chance that all three will fail if one fails. Also, the same is true with the program that you use to encrypt your backup file. 

Correct! Also, best to have them in more than one physical location. To protect against earthquakes, volcanic eruptions, and tsunamis. No real protection against giant asteroids though, since that will wipe us all out.
legendary
Activity: 1036
Merit: 1000
Thug for life!
October 16, 2014, 05:30:42 PM
#65
- Fire/flood/theft risk (unless mitigated with some kind of backup)
- Keylogger risk (true for pretty much everything except trezor style device)
- Coins perhaps inaccessible if you travel
- Potential data corruption (again unless mitigated through solid backups, which is more opportunity for fuck ups)

Thank you for your reply, but those are all covered.

Fire = encrypted backups
Keylogger = after initial set up disconnected, no further software is installed. no hardware is allowed near it. It's a clean machine, bare OS, all other services off, all other ports blocked.
Travel = that's a given, I would need to be on that particular machine. Backups will take time to set up, but can be done (same as for destruction).
Data corruption = same backups.
In order to properly protect yourself from data corruption you need to have multiple backups on multiple types of backups. For example if you have 3 backups of your private key on 3 USB drives all made by the same manufacturer then there is a highly elevated chance that all three will fail if one fails. Also, the same is true with the program that you use to encrypt your backup file. 
newbie
Activity: 2
Merit: 0
October 16, 2014, 08:59:10 AM
#64
You can try bither bitcoin wallet.It is easy to use and very  safety.
legendary
Activity: 997
Merit: 1002
Gamdom.com
October 16, 2014, 08:44:38 AM
#63
Wiating for multisig support on bitcoincore gui

Yeah I'm surprised this hasn't been implemented into core's gui yet, been meaning to try out Armory's multi-sig wallet just haven't got round to it.

hero member
Activity: 784
Merit: 500
October 16, 2014, 08:22:53 AM
#62
Absolutely.

Store in cold wallets the amount of bitcoins you are not planning to use in the coming weeks and at a high % (>90-95%) if you have a considerable amount.
hero member
Activity: 686
Merit: 500
October 15, 2014, 11:51:29 PM
#61
You could post your private key on bitcointalk. Nobody would believe you! :p



Disclaimer:
JUST KIDDING DON'T DO THAT!!!
legendary
Activity: 3416
Merit: 1912
The Concierge of Crypto
October 15, 2014, 11:32:26 PM
#60
It's essentially an "online" wallet that almost no hacker can get to (because it's behind two NATs).

You are essentially a bitcoin leacher. Don't be a sissy, open up port 8333.  Grin
(j/k do whatever makes you feel safer)

I have a few full nodes open up. Those don't have any coins in them. Smiley

Make sure initial key generation is done on clean machine as well or external random source. 
There's always the attack that could happen even on offline machines if the key generation
is from a known set.

Of course. Make it run for a day. Then create a brand new wallet. Or generate the wallet from another offline computer. I think there's the paperwal, and for mass production there is vanitygen and bitaddress.
legendary
Activity: 1078
Merit: 1002
Bitcoin is new, makes sense to hodl.
October 15, 2014, 11:29:16 PM
#59
Wiating for multisig support on bitcoincore gui
newbie
Activity: 28
Merit: 0
October 15, 2014, 10:12:03 PM
#58
Yes it is very very risky to keep them without a cold storage. I mean there are all sorts of people out there looking for just one chance to steal your Bitcoins !
legendary
Activity: 1302
Merit: 1008
Core dev leaves me neg feedback #abuse #political
October 15, 2014, 10:03:51 PM
#57
- Fire/flood/theft risk (unless mitigated with some kind of backup)
- Keylogger risk (true for pretty much everything except trezor style device)
- Coins perhaps inaccessible if you travel
- Potential data corruption (again unless mitigated through solid backups, which is more opportunity for fuck ups)

Thank you for your reply, but those are all covered.

Fire = encrypted backups
Keylogger = after initial set up disconnected, no further software is installed. no hardware is allowed near it. It's a clean machine, bare OS, all other services off, all other ports blocked.
Travel = that's a given, I would need to be on that particular machine. Backups will take time to set up, but can be done (same as for destruction).
Data corruption = same backups.

Make sure initial key generation is done on clean machine as well or external random source. 
There's always the attack that could happen even on offline machines if the key generation
is from a known set.

sr. member
Activity: 252
Merit: 250
October 15, 2014, 09:59:53 PM
#56
It's essentially an "online" wallet that almost no hacker can get to (because it's behind two NATs).

You are essentially a bitcoin leacher. Don't be a sissy, open up port 8333.  Grin
(j/k do whatever makes you feel safer)
legendary
Activity: 3416
Merit: 1912
The Concierge of Crypto
October 15, 2014, 09:58:44 PM
#55
- Fire/flood/theft risk (unless mitigated with some kind of backup)
- Keylogger risk (true for pretty much everything except trezor style device)
- Coins perhaps inaccessible if you travel
- Potential data corruption (again unless mitigated through solid backups, which is more opportunity for fuck ups)

Thank you for your reply, but those are all covered.

Fire = encrypted backups
Keylogger = after initial set up disconnected, no further software is installed. no hardware is allowed near it. It's a clean machine, bare OS, all other services off, all other ports blocked.
Travel = that's a given, I would need to be on that particular machine. Backups will take time to set up, but can be done (same as for destruction).
Data corruption = same backups.
legendary
Activity: 1302
Merit: 1008
Core dev leaves me neg feedback #abuse #political
October 15, 2014, 09:38:00 PM
#54
I didn't see this question asked.

Would it be safe to store all your coins on a Trezor hardware wallet long term?

Ive heard good things generally about Trezor, but
any hardware can fail or could be destroyed in
a fire, flood, etc...so you should have a back up.

Plus there is the possibility it could be stolen.

You need to consider all those things.
full member
Activity: 173
Merit: 105
October 15, 2014, 09:15:21 PM
#53
Serious question:

How about a fair amount of bitcoins, on Bitcoin Core, on a computer that:

1. is behind 2 routers, uPNP turned off (internet > router1 > router2 > computer)
2. is not port forwarded, therefore does not accept incoming connections (so connections are always at 8 out)
3. good password
4. is not used for anything else, only Bitcoin Core (was fresh installed OS, regardless of OS)

For added info, the routers are a service provided branded ZyXel router and a Cisco E1000 router, in that order. (Does it really matter ...)

It's essentially an "online" wallet that almost no hacker can get to (because it's behind two NATs).

Physical security is a different topic, but I've got that covered on my end.


Then I have another computer that is air-gapped for cold storage.

- Fire/flood/theft risk (unless mitigated with some kind of backup)
- Keylogger risk (true for pretty much everything except trezor style device)
- Coins perhaps inaccessible if you travel
- Potential data corruption (again unless mitigated through solid backups, which is more opportunity for fuck ups)
Pages:
Jump to: