Pages:
Author

Topic: SEED storage on digital media. - page 2. (Read 773 times)

legendary
Activity: 3668
Merit: 6382
Looking for campaign manager? Contact icopress!
May 05, 2024, 02:00:29 PM
#9
In practice, I maintain three cloned Tails flash drives and three hardware keys, each serving as a backup for the others.

I welcome any constructive criticism regarding potential points of failure or unknown vulnerabilities in my system.

It's an interesting setup and I kinda like it. And 3 copies sounds good.

Still... flash drives can get corrupted a bit too easy for my liking. I mean I had to reformat or throw away at least 10 USB disks in the last 20 years... and we're talking about very long time here, right?
This is the issue with electronic devices. They can get broken easier than more physical stuff.


I will add that age or an accident or stroke can make you forget the passwords/PINs you've used there.


These are the weak spots I've seen.
hero member
Activity: 714
Merit: 1298
May 05, 2024, 03:26:27 AM
#8
For those who have the courage  to try my method I  share a trick on how to unite in friendship Kleopatra and hardware pgp keys that hold the same secret but have different ID.

The problem is that each HW pgp key has its own unique ID and by  keeping the last used ID in the cache  Kleopatra refuses to work with other clones of HW key.

The work around is the following.

  • 1.  Before importing public pgp HW key into Kleopatra remove default keys which come with Tails distribution ( they are developers keys and    become not necessary for your purpose)
  • 2.  Insert any HW key from your cloned set
  • 3.  Import relevant public key
  • 4.  When  being asked about certification choose Cancel
  • 5.  Right click imported public key and select Change Trust
  • 6.  Choose "It's my certificate"
  • 7.  Proceed with your tasks involving inserted HW key: decryption, encryption, signing, verifying what ever you want.
  • 8.  After completing your tasks remove you HW pgp key.
  • 9.  Right click public key and select Remove
  • 10.Close Kleopatra
  • 11 .Next time when you open Tails you will have the   pure untouched Kleopatra that doesn't remember HW keys ID. So you can proceed with any key from your cloned set referring to 2 - 10 in this list.
hero member
Activity: 1120
Merit: 540
Duelbits - Play for Free | Win for Real
May 04, 2024, 05:43:43 AM
#7
I completely support your idea!  Seed storage on digital media is a crucial topic, we definitely need more threads like this on the forum.
Recently, i made a thread suggesting creating/importing seeds in wallets like Electrum or Sparrow, as they allow you to export encrypted digital backups.

Security tips for making encrypted backups of your seedphrase.
legendary
Activity: 1624
Merit: 2594
Top Crypto Casino
May 03, 2024, 03:36:25 AM
#6
Tread is solely  for the discussion of best methods to store SEED on digital media.

I completely support your idea!  Seed storage on digital media is a crucial topic, we definitely need more threads like this on the forum.
hero member
Activity: 714
Merit: 1298
May 03, 2024, 02:07:22 AM
#5
It is never recommended to store your seed phrases in any form of digital media, not even using PGP encryption.

Mantra.

Never recommended by whom, by you? Smiley

 Then, don't use it.

You also is going to type the seed in the digital media, you will never know if there is a keylogger installed in your device.

Wise people use for this airgaped Tails which doesn't contain any malware including  keylogers , wooden headed folk utilize devices  and OS that have keyloggers.
Regarding,  IronKey Vault, all typing must be done on airgaped machine, it goes without saying, beside IronKey Vault has the build-in virtual keyboard.
Do you have any experience of working with Tails and/or airgapped machine?

For any form of digital storage, you always have chance to leak your private key.


Empty words in fact that tell nothing. Tell better how they can leak from my system.

It's always better and recommended to store you seed in digital form and it needs to be a fireproof solution.

Yeah, yeah , and better on the other planet, let's say on Mars for instance.
 
In fact digital form of storage should be a companion for primitive one, which in my case is a binary code hold on  titan washers .




Further on, any referring to primitive forms of SEED storage in this thread will be considered as offtopic. Tread is solely  for the discussion of best methods to store SEED on digital media.

I have shared my SEED protected by described way to close relatives (geographically distant by hundreds miles)  and don't afraid that they or any other folk can get my phrase. They have only flash drives with Tails but all  set of HW pgp  clones  is in my hand.

SEED phrases stored by primitive way can not be shared with other people without revealing them.
legendary
Activity: 2800
Merit: 2736
Farewell LEO: o_e_l_e_o
May 02, 2024, 09:06:16 PM
#4
For not tech savvy people, like you, who wanna use digital media for storing sensitive info like SEED phrases, passwords, etc   I would advocate off-the-shelf products like those produced by Kingston.
It is never recommended to store your seed phrases in any form of digital media, not even using PGP encryption. You never know, you may lost the secret key file and if you lose then you lose the pass phrase. You also is going to type the seed in the digital media, you will never know if there is a keylogger installed in your device. For any form of digital storage, you always have chance to leak your private key.

It's always better and recommended to store you seed in digital form and it needs to be a fireproof solution.
hero member
Activity: 714
Merit: 1298
May 02, 2024, 09:57:16 AM
#3
I saw this notification on the bitcointalk supernotifier and it caught my attention because I have done a DIY Seed Storage on a soda can Inspired by Pmalek's Guide. I would have really loved to try this but I am not a tech savvy person. The only software I recognize there in the write up is Kleopatra which I used one time when I learning to sign a message courtesy of bitcoingirl.

For not tech savvy people, like you, who wanna use digital media for storing sensitive info like SEED phrases, passwords, etc   I would advocate off-the-shelf products like those produced by Kingston.

I have their flash drive from IronKey Vault Privacy 50 Series and must confess that having AES 256 encryption as well as protections from both bad USB and brute force  it may be considered  as a good digital media stuff for storage  SEED phrases . The only drawback I see is that it is not friendly with Linux and works solely on either Windows or Mac OS machines.

My approach is a bit complicated as in fact it has three layers of protection which might  be looked as overkill.

sr. member
Activity: 560
Merit: 265
April 30, 2024, 11:24:30 AM
#2
I saw this notification on the bitcointalk supernotifier and it caught my attention because I have done a DIY Seed Storage on a soda can Inspired by Pmalek's Guide. I would have really loved to try this but I am not a tech savvy person. The only software I recognize there in the write up is Kleopatra which I used one time when I learning to sign a message courtesy of bitcoingirl.
hero member
Activity: 714
Merit: 1298
April 30, 2024, 03:37:25 AM
#1
With this contribution I'd like to share my latest "innovation": a method I've implemented  for storing my SEED phrases on digital media.

For this purpose, I use the bootable flash drive holding  Tails OS with  all communications drivers locked. Persistent volume of this OS is  secured with a compound password i.e part of this password is  stored in a hardware security key and enters unlocking field via its OTP interface , while other part is entered manually at unlocking volume. HW security key is aimed also for storage  my private ed25519 PGP key.

The persistent volume keeps   KeePassXC database, locked with a composite password that includes a segment stored in HW key. This password differs from that one safeguarding the Tails persistent volume.

The KeyPassXC database houses encrypted GPG messages corresponding to my SEED phrases. These messages are encrypted using my PGP hardware key (smart card in terms of Kleopatra), which is protected by a PIN code. Notably, only two incorrect PIN attempts are permitted; a third incorrect attempt will result in the blocking of access to the PGP key.

For anyone interested , I  provide ppg code for setting up hardware keys.

Code:
gpg --allow-secret-key-import --import

gpg --expert --edit-key

gpg> toggle

gpg> keytocard

( select Yes and then 1)

gpg> key 1

gpg>  keytocard

(select Yes and then 2)

gpg> key 1

gpg> key 2

gpg> keytocard


(select Yes and then 3)

gpg> quit

Select  No ( otherwise security key would be wiped out from system and thus, could not be used for setting HW key duplicate ).



The corresponding public key is imported into Kleopatra key manager with database situated within the persistent Tails volume.

Quote from: satscraper


Consequently, by utilizing Kleopatra and a hardware key, one can decrypt/encrypt SEED phrases  and securely add  encrypted messages  to KeePassXC database.

In practice, I maintain three cloned Tails flash drives and three hardware keys, each serving as a backup for the others.

I welcome any constructive criticism regarding potential points of failure or unknown vulnerabilities in my system.



Picture shows my Tails flash drive (in the form of debit card, metal frame)  and pgp HW key

Quote from: satscraper
Pages:
Jump to: