SlideShare ist ein Scribd-Unternehmen logo
1 von 26
PROTECTING
CRYPTOCURRENCY
KEYS
DIMITRIS TSAPAKIDIS, OPEN COFFEE THESSALONIKI,
NOVEMBER 2017
NATIONAL CURRENCIES
• €5000 stolen from cash card;
refunded by bank
• Capital controls in Greece
• €8.3bn haircut in Cypriot bank
deposits
• 1.3bn Indians asked to hand in
cash
• Zimbabwe currency
• Venezuela currency
• KYC/AML
+ -
CRYPTOCURRENCIES
• No capital controls
• Known currency supply (for
some coins)
• No KYC/AML within the
cryptoeconomy
• Price you pay for freedom: you
must protect your keys
+ -
AGENDA
• What to protect?
• From what threats to protect?
• How to protect?
BITCOIN KEYS
abandon ability able about
above absent absorb
abstract absurd abuse
access accident account
accuse achieve acid
acoustic acquire across act
action actor actress actual
Mnemonic Seed
Phrase
Public
Private
Bitcoin private keys
Bitcoin receive addresses
0.3BTC 0.5BTC
NOT YOUR KEYS, NOT YOUR COINS
• Custodial wallets/exchanges for trading
• Custodial wallets can be hacked
• Exchanges might not be solvent
THREATS
• Theft
• Destruction
• Take them with you to your grave
• Multiparty/Institutional ownership
• Receiving coins on your behalf: web server, teller/waiter
• Privacy
• Low-entropy keys
abandon ability able about
above absent absorb
abstract absurd abuse
access accident account
accuse achieve acid
acoustic acquire across act
action actor actress actual
Mnemonic Seed
Phrase
Public
Private
Bitcoin private keys
Bitcoin receive addresses
0.3BTC 0.5BTC
TOOLS
• Use these tools to protect your coins
• They are building blocks to mix and match like LEGOs
MEMORIZE THE SEED PHRASE
• Useful if you have to walk from Syria to Germany and you have to
swim across the Mediterranean
abandon ability able about
above absent absorb
abstract absurd abuse
access accident account
accuse achieve acid
acoustic acquire across act
action actor actress actual
Mnemonic Seed
Phrase
CRYPTOSTEEL
• Store your seed phrase
• Protects against fire
• Protects against water
• Split in two: password and
encrypted seed
abandon ability able about
above absent absorb
abstract absurd abuse
access accident account
accuse achieve acid
acoustic acquire across act
action actor actress actual
Mnemonic Seed
Phrase
GENERATE YOUR OWN SEED PHRASE
https://iancoleman.io/bip39/
abandon ability able about
above absent absorb
abstract absurd abuse
access accident account
accuse achieve acid
acoustic acquire across act
action actor actress actual
Mnemonic Seed
Phrase
KEYS NEVER EXPOSED
HARDWARE WALLETS
Key generation
Transaction signing
Ledger
Trezor
KeepKey
RISKS OF SOFTWARE WALLETS
• Insecure, general-purpose computing devices
• Seed copied off screen
• Private keys stolen after you unlock your wallet
VERIFY DESTINATION ADDRESSES
• Are you sending money to the
correct address?
• Computer clipboard can be
altered
ONE ADDRESS PER TRANSACTION
• Wallets automatically
generate new addresses
• Preserve your privacy
• Preserve everyone’s privacy
DEAD MAN’S SWITCH
• “If something happens to me”
movie line
• Does nothing as long as we
are alive
• Acts when we stop
demonstrating signs of life
• Google’s Inactive Account
Manager
• Test it!
LAST WILL AND TESTAMENT
• Gifting €5,000 vs gifting
€500,000
• So your loved ones can spend
your coins
• Read articles by Pamela
Morgan
https://medium.com/@pamela
wjd
SHAMIR’S SECRET SHARING
• Break any secret into X pieces
• At least Y pieces required to reconstruct the secret
• Y<=X
• e.g. 3 out of 5
• https://en.wikipedia.org/wiki/Shamir%27s_Secret_Sharing
MULTISIG ADDRESSES
MULTISIGNATURES
2 of 4 keys
MULTISIG USE CASES
• Authorizing payments as a group of people: 2 of 3: CEO, CFO,
Accountant
• Gift your coins to your descendants after you get hit by a bus: 2 of 4:
your phone, your hardware wallet, bank vault, a relative
• Use your coins with untrusted wallets: your phone, your computers,
bank vault
• Use your coins with an offsite wallet: your phone, authenticated
payment provider, bank vault. See https://greenaddress.it
• Payment escrow: 2 of 3: Buyer, Seller, Trusted Escrow Agent. See
https://www.openbazaar.org
MULTISIG WALLETS
• CoPay
• Electrum
COLD WALLETS
• Private keys only used on an offline computer
• Private keys can be permanently or temporarily stored
• Can sign transactions
• http://docs.electrum.org/en/latest/coldstorage.html
abandon ability able about
above absent absorb
abstract absurd abuse
access accident account
accuse achieve acid
acoustic acquire across act
action actor actress actual
Mnemonic Seed
Phrase
Public
Private
Bitcoin private keys
WATCH-ONLY WALLETS
• Wallets with public addresses only
• Can view balance
• Can generate receive addresses
• Can generate transactions but cannot sign them (cold wallet will do
the signing)
• Can broadcast signed transactions
Public
Private
Bitcoin receive addresses
0.3BTC 0.5BTC
TIERED WALLETS
• Cellphone: spending cash
• Hardware wallet: savings
• Multisig with cold wallets: long term investments
NLOCKTIME TRANSACTIONS
• Sign a transaction with nLockTime into the future e.g. next year
• Give the transaction to recipient
• Move the funds off your address if you are still alive and repeat
THANK YOU!
• WEACCEPTBITCOIN.GR
• Meetup in Thessaloniki and Athens
• Slack (online chat)
• Greek section on BitcoinTalk forum
• How to accept, spend, buy and sell Bitcoin in Greece

Weitere ähnliche Inhalte

Ähnlich wie Protecting cryptocurrency keys

Ähnlich wie Protecting cryptocurrency keys (20)

Securing Your Bitcoins - Kitten Tofu
Securing Your Bitcoins - Kitten TofuSecuring Your Bitcoins - Kitten Tofu
Securing Your Bitcoins - Kitten Tofu
 
2. cyber crime series - crypto currency theft
2. cyber crime series - crypto currency theft2. cyber crime series - crypto currency theft
2. cyber crime series - crypto currency theft
 
Introduction to Bitcoin and Crypto-currency
Introduction to Bitcoin and Crypto-currency Introduction to Bitcoin and Crypto-currency
Introduction to Bitcoin and Crypto-currency
 
Amber & SnapChat - Presentation
Amber & SnapChat - PresentationAmber & SnapChat - Presentation
Amber & SnapChat - Presentation
 
Digital Hygiene for Nomads
Digital Hygiene for NomadsDigital Hygiene for Nomads
Digital Hygiene for Nomads
 
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsA Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
 
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsA Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
 
Top Bitcoin Wallets Of 2020 To Secure Your Digital Coins
Top Bitcoin Wallets Of 2020 To Secure Your Digital CoinsTop Bitcoin Wallets Of 2020 To Secure Your Digital Coins
Top Bitcoin Wallets Of 2020 To Secure Your Digital Coins
 
Ashok misra presentation
Ashok misra presentationAshok misra presentation
Ashok misra presentation
 
FreeGeek -Cryptocurrency and Blockchain
FreeGeek -Cryptocurrency and BlockchainFreeGeek -Cryptocurrency and Blockchain
FreeGeek -Cryptocurrency and Blockchain
 
Cryptocurrency Scams | How Do You Protect Yourself?
Cryptocurrency Scams | How Do You Protect Yourself?Cryptocurrency Scams | How Do You Protect Yourself?
Cryptocurrency Scams | How Do You Protect Yourself?
 
CRYPTO CURRENCY.pptx
CRYPTO CURRENCY.pptxCRYPTO CURRENCY.pptx
CRYPTO CURRENCY.pptx
 
Presentation on Bitcoin
Presentation on BitcoinPresentation on Bitcoin
Presentation on Bitcoin
 
An Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
An Investigator’s Guide to Blockchain, Bitcoin and Wallet TransactionsAn Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
An Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
 
Virtual currency talk and emerging markets kinu
Virtual currency talk and emerging markets kinuVirtual currency talk and emerging markets kinu
Virtual currency talk and emerging markets kinu
 
Eps assignment
Eps assignmentEps assignment
Eps assignment
 
8 ways to protect yourself from credit card theft while travelling
8 ways to protect yourself from credit card theft while travelling8 ways to protect yourself from credit card theft while travelling
8 ways to protect yourself from credit card theft while travelling
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Basics of Bitcoin & Mining
Basics of Bitcoin & MiningBasics of Bitcoin & Mining
Basics of Bitcoin & Mining
 
Bitcoins & Blockchain
Bitcoins & BlockchainBitcoins & Blockchain
Bitcoins & Blockchain
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Protecting cryptocurrency keys

  • 1. PROTECTING CRYPTOCURRENCY KEYS DIMITRIS TSAPAKIDIS, OPEN COFFEE THESSALONIKI, NOVEMBER 2017
  • 2. NATIONAL CURRENCIES • €5000 stolen from cash card; refunded by bank • Capital controls in Greece • €8.3bn haircut in Cypriot bank deposits • 1.3bn Indians asked to hand in cash • Zimbabwe currency • Venezuela currency • KYC/AML + -
  • 3. CRYPTOCURRENCIES • No capital controls • Known currency supply (for some coins) • No KYC/AML within the cryptoeconomy • Price you pay for freedom: you must protect your keys + -
  • 4. AGENDA • What to protect? • From what threats to protect? • How to protect?
  • 5. BITCOIN KEYS abandon ability able about above absent absorb abstract absurd abuse access accident account accuse achieve acid acoustic acquire across act action actor actress actual Mnemonic Seed Phrase Public Private Bitcoin private keys Bitcoin receive addresses 0.3BTC 0.5BTC
  • 6. NOT YOUR KEYS, NOT YOUR COINS • Custodial wallets/exchanges for trading • Custodial wallets can be hacked • Exchanges might not be solvent
  • 7. THREATS • Theft • Destruction • Take them with you to your grave • Multiparty/Institutional ownership • Receiving coins on your behalf: web server, teller/waiter • Privacy • Low-entropy keys abandon ability able about above absent absorb abstract absurd abuse access accident account accuse achieve acid acoustic acquire across act action actor actress actual Mnemonic Seed Phrase Public Private Bitcoin private keys Bitcoin receive addresses 0.3BTC 0.5BTC
  • 8. TOOLS • Use these tools to protect your coins • They are building blocks to mix and match like LEGOs
  • 9. MEMORIZE THE SEED PHRASE • Useful if you have to walk from Syria to Germany and you have to swim across the Mediterranean abandon ability able about above absent absorb abstract absurd abuse access accident account accuse achieve acid acoustic acquire across act action actor actress actual Mnemonic Seed Phrase
  • 10. CRYPTOSTEEL • Store your seed phrase • Protects against fire • Protects against water • Split in two: password and encrypted seed abandon ability able about above absent absorb abstract absurd abuse access accident account accuse achieve acid acoustic acquire across act action actor actress actual Mnemonic Seed Phrase
  • 11. GENERATE YOUR OWN SEED PHRASE https://iancoleman.io/bip39/ abandon ability able about above absent absorb abstract absurd abuse access accident account accuse achieve acid acoustic acquire across act action actor actress actual Mnemonic Seed Phrase
  • 12. KEYS NEVER EXPOSED HARDWARE WALLETS Key generation Transaction signing Ledger Trezor KeepKey
  • 13. RISKS OF SOFTWARE WALLETS • Insecure, general-purpose computing devices • Seed copied off screen • Private keys stolen after you unlock your wallet
  • 14. VERIFY DESTINATION ADDRESSES • Are you sending money to the correct address? • Computer clipboard can be altered
  • 15. ONE ADDRESS PER TRANSACTION • Wallets automatically generate new addresses • Preserve your privacy • Preserve everyone’s privacy
  • 16. DEAD MAN’S SWITCH • “If something happens to me” movie line • Does nothing as long as we are alive • Acts when we stop demonstrating signs of life • Google’s Inactive Account Manager • Test it!
  • 17. LAST WILL AND TESTAMENT • Gifting €5,000 vs gifting €500,000 • So your loved ones can spend your coins • Read articles by Pamela Morgan https://medium.com/@pamela wjd
  • 18. SHAMIR’S SECRET SHARING • Break any secret into X pieces • At least Y pieces required to reconstruct the secret • Y<=X • e.g. 3 out of 5 • https://en.wikipedia.org/wiki/Shamir%27s_Secret_Sharing
  • 20. MULTISIG USE CASES • Authorizing payments as a group of people: 2 of 3: CEO, CFO, Accountant • Gift your coins to your descendants after you get hit by a bus: 2 of 4: your phone, your hardware wallet, bank vault, a relative • Use your coins with untrusted wallets: your phone, your computers, bank vault • Use your coins with an offsite wallet: your phone, authenticated payment provider, bank vault. See https://greenaddress.it • Payment escrow: 2 of 3: Buyer, Seller, Trusted Escrow Agent. See https://www.openbazaar.org
  • 22. COLD WALLETS • Private keys only used on an offline computer • Private keys can be permanently or temporarily stored • Can sign transactions • http://docs.electrum.org/en/latest/coldstorage.html abandon ability able about above absent absorb abstract absurd abuse access accident account accuse achieve acid acoustic acquire across act action actor actress actual Mnemonic Seed Phrase Public Private Bitcoin private keys
  • 23. WATCH-ONLY WALLETS • Wallets with public addresses only • Can view balance • Can generate receive addresses • Can generate transactions but cannot sign them (cold wallet will do the signing) • Can broadcast signed transactions Public Private Bitcoin receive addresses 0.3BTC 0.5BTC
  • 24. TIERED WALLETS • Cellphone: spending cash • Hardware wallet: savings • Multisig with cold wallets: long term investments
  • 25. NLOCKTIME TRANSACTIONS • Sign a transaction with nLockTime into the future e.g. next year • Give the transaction to recipient • Move the funds off your address if you are still alive and repeat
  • 26. THANK YOU! • WEACCEPTBITCOIN.GR • Meetup in Thessaloniki and Athens • Slack (online chat) • Greek section on BitcoinTalk forum • How to accept, spend, buy and sell Bitcoin in Greece