Pages:
Author

Topic: Personal photo as private key? (Read 2393 times)

newbie
Activity: 56
Merit: 0
September 20, 2013, 09:58:26 AM
#21
Use parity on your photo or file. Or 7zip / RAR it with recovery 10% record.

It's a lot easier to just generate a random private key using bitaddress or vanitygen and just save that in a text file. Then you zip or rar it and copy it to several places like in a floppy, usb flash drive, SD card and printed on paper, stored in an envelope, locked in your safe or vault.

If you really want to use a photo, take a picture of the sky, or someone said take a picture of complete darkness (cover the lens) while setting the ISO to maximum, to get noise from the CCD or sensor. Export the RAW file or the highest quality jpeg, depending on your camera model.

Best idea itt
legendary
Activity: 3416
Merit: 1912
The Concierge of Crypto
September 20, 2013, 09:28:38 AM
#20
Use parity on your photo or file. Or 7zip / RAR it with recovery 10% record.

It's a lot easier to just generate a random private key using bitaddress or vanitygen and just save that in a text file. Then you zip or rar it and copy it to several places like in a floppy, usb flash drive, SD card and printed on paper, stored in an envelope, locked in your safe or vault.

If you really want to use a photo, take a picture of the sky, or someone said take a picture of complete darkness (cover the lens) while setting the ISO to maximum, to get noise from the CCD or sensor. Export the RAW file or the highest quality jpeg, depending on your camera model.
hero member
Activity: 765
Merit: 503
September 20, 2013, 02:41:35 AM
#19
No Problem.

1. SHA256 hash your photo --> 27d45bd2b3cc80481629522c9de1409121f75e08c3ad65bce1eb88a7a54cd705

2. bitaddress.org --> Wallet details --> enter sha256 hash  --> Private key: 5J7pyQRYWxAhYg4tC1BMVDhT15GFxcRYahz2m71DAG1UR11tit8

address: 1PQa3MbPhPezjz8SkY4TdMxAupkUX2s215

Like
kjj
legendary
Activity: 1302
Merit: 1025
September 20, 2013, 12:26:52 AM
#18
You can hash anything, a photo is just another stream of bits.  It would be like keeping your private key in an unencrypted ascii file, it's just more obscured.

It doesn't have to be unencrypted.  You could use HMAC-SHA1 on the {image file,password} pair.
cp1
hero member
Activity: 616
Merit: 500
Stop using branwallets
September 19, 2013, 10:58:46 PM
#17
You can hash anything, a photo is just another stream of bits.  It would be like keeping your private key in an unencrypted ascii file, it's just more obscured.
legendary
Activity: 1792
Merit: 1087
September 19, 2013, 10:48:12 PM
#16
Any file, like photo, music, video, could be the seed. However, you will lose the private key even with 1 bit of data loss.

Which is also true of storing any private key electronically (such as in your wallet/client) as well.

Yes. But since a private key takes only 256bit, while a photo may take several Mbits, a private key has lower chance of getting corrupted.
legendary
Activity: 3416
Merit: 4658
September 19, 2013, 05:53:23 PM
#15
Any file, like photo, music, video, could be the seed. However, you will lose the private key even with 1 bit of data loss.

Which is also true of storing any private key electronically (such as in your wallet/client) as well.
newbie
Activity: 12
Merit: 0
September 19, 2013, 05:18:48 AM
#14
No Problem.

1. SHA256 hash your photo --> 27d45bd2b3cc80481629522c9de1409121f75e08c3ad65bce1eb88a7a54cd705

2. bitaddress.org --> Wallet details --> enter sha256 hash  --> Private key: 5J7pyQRYWxAhYg4tC1BMVDhT15GFxcRYahz2m71DAG1UR11tit8

address: 1PQa3MbPhPezjz8SkY4TdMxAupkUX2s215
legendary
Activity: 1974
Merit: 1029
September 19, 2013, 04:48:40 AM
#13
Or you can do it the other way around and hide the private key inside the picture using steganography.
legendary
Activity: 1792
Merit: 1087
September 19, 2013, 01:01:43 AM
#12
Any file, like photo, music, video, could be the seed. However, you will lose the private key even with 1 bit of data loss.
legendary
Activity: 1834
Merit: 1020
September 19, 2013, 12:44:32 AM
#11
Hm...Biocryptography?

Public key + fingerprint/private key = send transaction?  All someone has to do is cut off your fingers...
hero member
Activity: 765
Merit: 503
September 19, 2013, 12:40:02 AM
#10
You'd need very advanced photo recognition, and it could only be used to verify your identity, not to generate a key from scratch, because no two photos of you would be exactly the same on a byte level.  A fingerprint scanner would be easier.


That's my point.  Wouldn't be image recognition, the software would iterate through the pixels to pull out specific values as keys.

Ill knock up some pseudo code to explain.

it could work well in conjunction with a smaller password that you memorized. the picture would add security that a smaller password alone couldnt offer and the password would prevent people from simply testing all of your pictures to see if any was a private key. and of course there are advantages to not having to remember such a long password.

Yes exactly.
hero member
Activity: 765
Merit: 503
September 19, 2013, 12:39:25 AM
#9
And the bot to download, hash, addressify and check every image on the internet launches in 3...2...

Or you could choose 2 photos.  Overlay one on the other.  every image on the net * ever image on the net = big number
legendary
Activity: 1722
Merit: 1217
September 19, 2013, 12:35:26 AM
#8
You'd need very advanced photo recognition, and it could only be used to verify your identity, not to generate a key from scratch, because no two photos of you would be exactly the same on a byte level.  A fingerprint scanner would be easier.


That's my point.  Wouldn't be image recognition, the software would iterate through the pixels to pull out specific values as keys.

Ill knock up some pseudo code to explain.

it could work well in conjunction with a smaller password that you memorized. the picture would add security that a smaller password alone couldnt offer and the password would prevent people from simply testing all of your pictures to see if any was a private key. and of course there are advantages to not having to remember such a long password.
hero member
Activity: 765
Merit: 503
September 19, 2013, 12:33:31 AM
#7
You'd need very advanced photo recognition, and it could only be used to verify your identity, not to generate a key from scratch, because no two photos of you would be exactly the same on a byte level.  A fingerprint scanner would be easier.


That's my point.  Wouldn't be image recognition, the software would iterate through the pixels to pull out specific values as keys.

Ill knock up some pseudo code to explain.
hero member
Activity: 756
Merit: 501
There is more to Bitcoin than bitcoins.
September 19, 2013, 12:19:42 AM
#6
I would not. Nobody's getting my biometrics willingly.

I mean, it could be a snap of your dog or what ever.  The idea is that no one will have that exact photo but you.   Easy to remember.
Impossible to remember in your brain. You can store it in a non-volatile memory, but then why not just keep it simple and generate a random number and use it as private key and store it in a nonvolatile memory... yes... now, that's a thought! You might even encrypt it before storing it, and remember the passphrase!
Also, what kjj said.
msc
sr. member
Activity: 282
Merit: 250
September 19, 2013, 12:18:48 AM
#5
You'd need very advanced photo recognition, and it could only be used to verify your identity, not to generate a key from scratch, because no two photos of you would be exactly the same on a byte level.  A fingerprint scanner would be easier.
kjj
legendary
Activity: 1302
Merit: 1025
September 19, 2013, 12:12:39 AM
#4
And the bot to download, hash, addressify and check every image on the internet launches in 3...2...
hero member
Activity: 765
Merit: 503
September 19, 2013, 12:03:25 AM
#3
I would not. Nobody's getting my biometrics willingly.

I mean, it could be a snap of your dog or what ever.  The idea is that no one will have that exact photo but you.   Easy to remember.
member
Activity: 112
Merit: 10
Coffee makes it all better!
September 18, 2013, 11:52:49 PM
#2
I would not. Nobody's getting my biometrics willingly.
Pages:
Jump to: