SlideShare a Scribd company logo
1 of 32
Download to read offline
PROTECTING
CRYPTOCURRENCY KEYS
DIMITRIS TSAPAKIDIS
@DIMITRIS
LINKEDIN.COM/IN/DIMITRIS
DECEMBER 2022
“THE ONLY MEANINGFUL
ADOPTION METRIC IS PEOPLE
WHO SELF CUSTODY BITCOIN”
@HODLONAUT
AGENDA
• Exchange & custodial threats
• Self-custody threats
• What to protect?
• How to protect?
NOT YOUR KEYS, NOT YOUR COINS
• Custodial wallets can be hacked
• Exchanges might not be solvent
• Bankruptcy takes years and you get cents on your Euro
• Exchanges selling you paper Bitcoin also suppress the price
• Exchanges might ask your for strict KYC and Source of Wealth
documentation
• Having exchanges hold a large % of all Bitcoin is a systemic risk
• Bitcoin is not valuable if it can be confiscated and you need to ask
permission to send it
NOT YOUR KEYS, NOT YOUR COINS
• Use 2 Factor Authentication, without SMS
• Watermark your KYC documents!
• Journey from exchange to personal custody
• Learn about sending coins to your personal (non-custodial) wallet
• Learn about sending coins between wallets
• Practice and become confident
• Buy a hardware wallet
• Don’t wait for a bank (exchange) run to start!
BITCOIN KEYS
abandon ability able about
above absent absorb
abstract absurd abuse
access accident account
accuse achieve acid
acoustic acquire across act
action actor actress actual
Mnemonic Seed
Phrase
Public
Private
Bitcoin private keys
Bitcoin receive addresses
0.3BTC 0.5BTC
THREATS
• Theft
• Destruction
• Take them with you to your grave
• Multiparty/Institutional ownership
• Receiving coins on your behalf: web server, teller/waiter
• Privacy
• Low-entropy keys
abandon ability able about
above absent absorb
abstract absurd abuse
access accident account
accuse achieve acid
acoustic acquire across act
action actor actress actual
Mnemonic Seed
Phrase
Public
Private
Bitcoin private keys
Bitcoin receive addresses
0.3BTC 0.5BTC
THREATS
• Dust
• Kidnap/robbery: https://github.com/jlopp/physical-bitcoin-attacks
TOOLS
• Use these tools to protect your coins
• They are building blocks to mix and match like LEGOs
FIRST RULE OF FIGHT CLUB
• Don’t talk about your Bitcoin
TIERED WALLETS
• Cellphone: spending cash
• Hardware wallet: savings
• Multisig with cold wallets: long term investments
MEMORIZE THE SEED PHRASE
• Useful if you have to walk from Syria to Germany and you have to
swim across the Mediterranean
abandon ability able about
above absent absorb
abstract absurd abuse
access accident account
accuse achieve acid
acoustic acquire across act
action actor actress actual
Mnemonic Seed
Phrase
CRYPTOSTEEL
• Store your seed phrase
• Protects against fire
• Protects against water
• Split in two: password and
encrypted seed
abandon ability able about
above absent absorb
abstract absurd abuse
access accident account
accuse achieve acid
acoustic acquire across act
action actor actress actual
Mnemonic Seed
Phrase
SAFETY DEPOSIT BOXES IN GREECE
• One master owner
• Multiple co-owners
• Can only access the box while the master own is alive
• When the master owner dies the box is sealed
• Opened in the presence of public notary, heirs, heir appraiser
and an appraiser sent by the tax office
GENERATE YOUR OWN SEED PHRASE
https://iancoleman.io/bip39/
abandon ability able about
above absent absorb
abstract absurd abuse
access accident account
accuse achieve acid
acoustic acquire across act
action actor actress actual
Mnemonic Seed
Phrase
KEYS NEVER EXPOSED
HARDWARE WALLETS
Key generation
Transaction signing
Devices are offline
Ledger
Trezor
Coldcard
RISKS OF SOFTWARE WALLETS
• Insecure, general-purpose computing devices
• Seed copied off screen
• Private keys stolen after you unlock your wallet
• Keyboard sniffers or learning/prediction algorithms
• Fake wallets
VERIFY DESTINATION ADDRESSES
• Are you sending money to
the correct address?
• Computer clipboard can be
altered
ONE ADDRESS PER TRANSACTION
• Wallets automatically
generate new addresses
• Preserve your privacy
• Preserve everyone’s privacy
DEAD MAN’S SWITCH
• “If something happens to
me” movie line
• Does nothing as long as we
are alive
• Acts when we stop
demonstrating signs of life
• Google’s Inactive Account
Manager
• Test it!
LAST WILL AND TESTAMENT
• Gifting €5,000 vs gifting
€500,000
• So your loved ones can
spend your coins
• Read articles by Pamela
Morgan https://medium.com/
@pamelawjd
SHAMIR’S SECRET SHARING
• Break any secret into X pieces
• At least Y pieces required to reconstruct the secret
• Y<=X
• e.g. 3 out of 5
• https://en.wikipedia.org/wiki/Shamir%27s_Secret_Sharing
MULTISIG ADDRESSES
MULTISIGNATURES
2 of 4 keys
MULTISIG USE CASES
• Authorizing payments as a group of people: 2 of 3: CEO, CFO,
Accountant
• Gift your coins to your descendants after you get hit by a bus: 2 of 4:
your phone, your hardware wallet, bank vault, a relative
• Use your coins with untrusted wallets: your phone, your computers,
bank vault. Optionally: go Seedless.
• Use your coins with an offsite wallet: your phone, authenticated
payment provider, bank vault. See https://greenaddress.it
• Payment escrow: 2 of 3: Buyer, Seller, Trusted Escrow Agent. See
https://www.openbazaar.org
MULTISIG WALLETS
• CoPay/Bitpay
• Electrum
• Casa (Seedless)
• Bluewallet
• Sparrow Wallet
• Multisig has extra backup requirements
• You need to backup a copy of everyone’s public key (xpub)
COLD WALLETS
• Private keys only used on an offline computer
• Private keys can be permanently or temporarily stored
• Can sign transactions
• http://docs.electrum.org/en/latest/coldstorage.html
abandon ability able about
above absent absorb
abstract absurd abuse
access accident account
accuse achieve acid
acoustic acquire across act
action actor actress actual
Mnemonic Seed
Phrase
Public
Private
Bitcoin private keys
WATCH-ONLY WALLETS
• Wallets with public addresses only
• Can view balance
• Can generate receive addresses
• Can generate transactions but cannot sign them (cold wallet will
do the signing)
• Can broadcast signed transactions
Public
Private
Bitcoin receive addresses
0.3BTC 0.5BTC
SEED BACKUP & RESTORE
• Restoring a seed might show no or less funds!!!
• Keep in mind derivation paths!
• You can try them all, there are only a few options
• Keep in mind the 20 address gap!
• Your family should also be aware of this
DISTRESS WALLET
• A distress wallet has some coins and looks plausible. You can give
up this wallet
• Offered by Ledger and Trezor
NLOCKTIME TRANSACTIONS
• Sign a transaction with nLockTime into the future e.g. next year
• Give the transaction to recipient
• Move the funds off your address if you are still alive and repeat
• Bitcoin Core wallet is introducing support for such non-standard
transactions
MOVE KEYS IN PARALLEL
• How to destroy your privacy:
• Bought a shiny new Trezor or Ledger and merged all your keys
into one
• Split your keys for a coin fork and merged all your keys into one
• You could clone keys one by one :) Some software to automate
the process would be great!
THANK YOU!

More Related Content

Similar to Protecting Cryptocurrency Keys 2022.pdf

Defcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetDefcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetPriyanka Aash
 
Introduction to Bitcoin and Crypto-currency
Introduction to Bitcoin and Crypto-currency Introduction to Bitcoin and Crypto-currency
Introduction to Bitcoin and Crypto-currency Justin Denton
 
Ashok misra presentation
Ashok misra presentationAshok misra presentation
Ashok misra presentationMecklerMedia
 
Cryptocurrency, a deep dive
Cryptocurrency, a deep diveCryptocurrency, a deep dive
Cryptocurrency, a deep diveOWASP Khartoum
 
How To Secure Your Cryptocurrency In 2020
How To Secure Your Cryptocurrency In 2020How To Secure Your Cryptocurrency In 2020
How To Secure Your Cryptocurrency In 2020Christian Sales
 
Flaying the Blockchain Ledger for Fun, Profit, and Hip Hop
Flaying the Blockchain Ledger for Fun, Profit, and Hip HopFlaying the Blockchain Ledger for Fun, Profit, and Hip Hop
Flaying the Blockchain Ledger for Fun, Profit, and Hip HopAndrew Morris
 
Bitcoin, Cryptocurrency, & Blockchain Presentation
Bitcoin, Cryptocurrency, & Blockchain PresentationBitcoin, Cryptocurrency, & Blockchain Presentation
Bitcoin, Cryptocurrency, & Blockchain PresentationMaxWheelock
 
Bitcoin 101 &amp; the state of the industry
Bitcoin 101 &amp; the state of the industryBitcoin 101 &amp; the state of the industry
Bitcoin 101 &amp; the state of the industryPrivKey, LLC
 
Amber & SnapChat - Presentation
Amber & SnapChat - PresentationAmber & SnapChat - Presentation
Amber & SnapChat - PresentationAleksandar Svetski
 
[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners
[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners
[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute BeginnersHessan Adnani
 
Crypto Presentation
Crypto PresentationCrypto Presentation
Crypto PresentationMaxWheelock
 
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsA Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsBeau Bullock
 
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsA Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsBeau Bullock
 
What is a blockchain?
What is a blockchain? What is a blockchain?
What is a blockchain? Wayne Lippman
 
Bitcoin 101 - Certified Bitcoin Professional Training Session
Bitcoin 101 - Certified Bitcoin Professional Training SessionBitcoin 101 - Certified Bitcoin Professional Training Session
Bitcoin 101 - Certified Bitcoin Professional Training SessionLisa Cheng
 
Blockchain and security v3
Blockchain and security v3Blockchain and security v3
Blockchain and security v3Jorge Sebastiao
 

Similar to Protecting Cryptocurrency Keys 2022.pdf (20)

Bitcoin
BitcoinBitcoin
Bitcoin
 
Defcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetDefcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internet
 
Introduction to Bitcoin and Crypto-currency
Introduction to Bitcoin and Crypto-currency Introduction to Bitcoin and Crypto-currency
Introduction to Bitcoin and Crypto-currency
 
Ashok misra presentation
Ashok misra presentationAshok misra presentation
Ashok misra presentation
 
Cryptocurrency, a deep dive
Cryptocurrency, a deep diveCryptocurrency, a deep dive
Cryptocurrency, a deep dive
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
How To Secure Your Cryptocurrency In 2020
How To Secure Your Cryptocurrency In 2020How To Secure Your Cryptocurrency In 2020
How To Secure Your Cryptocurrency In 2020
 
Flaying the Blockchain Ledger for Fun, Profit, and Hip Hop
Flaying the Blockchain Ledger for Fun, Profit, and Hip HopFlaying the Blockchain Ledger for Fun, Profit, and Hip Hop
Flaying the Blockchain Ledger for Fun, Profit, and Hip Hop
 
Crypto currency
Crypto currencyCrypto currency
Crypto currency
 
Bitcoin, Cryptocurrency, & Blockchain Presentation
Bitcoin, Cryptocurrency, & Blockchain PresentationBitcoin, Cryptocurrency, & Blockchain Presentation
Bitcoin, Cryptocurrency, & Blockchain Presentation
 
Bitcoin 101 &amp; the state of the industry
Bitcoin 101 &amp; the state of the industryBitcoin 101 &amp; the state of the industry
Bitcoin 101 &amp; the state of the industry
 
Amber & SnapChat - Presentation
Amber & SnapChat - PresentationAmber & SnapChat - Presentation
Amber & SnapChat - Presentation
 
Digital Hygiene for Nomads
Digital Hygiene for NomadsDigital Hygiene for Nomads
Digital Hygiene for Nomads
 
[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners
[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners
[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners
 
Crypto Presentation
Crypto PresentationCrypto Presentation
Crypto Presentation
 
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsA Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
 
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsA Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
 
What is a blockchain?
What is a blockchain? What is a blockchain?
What is a blockchain?
 
Bitcoin 101 - Certified Bitcoin Professional Training Session
Bitcoin 101 - Certified Bitcoin Professional Training SessionBitcoin 101 - Certified Bitcoin Professional Training Session
Bitcoin 101 - Certified Bitcoin Professional Training Session
 
Blockchain and security v3
Blockchain and security v3Blockchain and security v3
Blockchain and security v3
 

Recently uploaded

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Protecting Cryptocurrency Keys 2022.pdf

  • 2. “THE ONLY MEANINGFUL ADOPTION METRIC IS PEOPLE WHO SELF CUSTODY BITCOIN” @HODLONAUT
  • 3. AGENDA • Exchange & custodial threats • Self-custody threats • What to protect? • How to protect?
  • 4. NOT YOUR KEYS, NOT YOUR COINS • Custodial wallets can be hacked • Exchanges might not be solvent • Bankruptcy takes years and you get cents on your Euro • Exchanges selling you paper Bitcoin also suppress the price • Exchanges might ask your for strict KYC and Source of Wealth documentation • Having exchanges hold a large % of all Bitcoin is a systemic risk • Bitcoin is not valuable if it can be confiscated and you need to ask permission to send it
  • 5. NOT YOUR KEYS, NOT YOUR COINS • Use 2 Factor Authentication, without SMS • Watermark your KYC documents! • Journey from exchange to personal custody • Learn about sending coins to your personal (non-custodial) wallet • Learn about sending coins between wallets • Practice and become confident • Buy a hardware wallet • Don’t wait for a bank (exchange) run to start!
  • 6. BITCOIN KEYS abandon ability able about above absent absorb abstract absurd abuse access accident account accuse achieve acid acoustic acquire across act action actor actress actual Mnemonic Seed Phrase Public Private Bitcoin private keys Bitcoin receive addresses 0.3BTC 0.5BTC
  • 7. THREATS • Theft • Destruction • Take them with you to your grave • Multiparty/Institutional ownership • Receiving coins on your behalf: web server, teller/waiter • Privacy • Low-entropy keys abandon ability able about above absent absorb abstract absurd abuse access accident account accuse achieve acid acoustic acquire across act action actor actress actual Mnemonic Seed Phrase Public Private Bitcoin private keys Bitcoin receive addresses 0.3BTC 0.5BTC
  • 8. THREATS • Dust • Kidnap/robbery: https://github.com/jlopp/physical-bitcoin-attacks
  • 9. TOOLS • Use these tools to protect your coins • They are building blocks to mix and match like LEGOs
  • 10. FIRST RULE OF FIGHT CLUB • Don’t talk about your Bitcoin
  • 11. TIERED WALLETS • Cellphone: spending cash • Hardware wallet: savings • Multisig with cold wallets: long term investments
  • 12. MEMORIZE THE SEED PHRASE • Useful if you have to walk from Syria to Germany and you have to swim across the Mediterranean abandon ability able about above absent absorb abstract absurd abuse access accident account accuse achieve acid acoustic acquire across act action actor actress actual Mnemonic Seed Phrase
  • 13. CRYPTOSTEEL • Store your seed phrase • Protects against fire • Protects against water • Split in two: password and encrypted seed abandon ability able about above absent absorb abstract absurd abuse access accident account accuse achieve acid acoustic acquire across act action actor actress actual Mnemonic Seed Phrase
  • 14. SAFETY DEPOSIT BOXES IN GREECE • One master owner • Multiple co-owners • Can only access the box while the master own is alive • When the master owner dies the box is sealed • Opened in the presence of public notary, heirs, heir appraiser and an appraiser sent by the tax office
  • 15. GENERATE YOUR OWN SEED PHRASE https://iancoleman.io/bip39/ abandon ability able about above absent absorb abstract absurd abuse access accident account accuse achieve acid acoustic acquire across act action actor actress actual Mnemonic Seed Phrase
  • 16. KEYS NEVER EXPOSED HARDWARE WALLETS Key generation Transaction signing Devices are offline Ledger Trezor Coldcard
  • 17. RISKS OF SOFTWARE WALLETS • Insecure, general-purpose computing devices • Seed copied off screen • Private keys stolen after you unlock your wallet • Keyboard sniffers or learning/prediction algorithms • Fake wallets
  • 18. VERIFY DESTINATION ADDRESSES • Are you sending money to the correct address? • Computer clipboard can be altered
  • 19. ONE ADDRESS PER TRANSACTION • Wallets automatically generate new addresses • Preserve your privacy • Preserve everyone’s privacy
  • 20. DEAD MAN’S SWITCH • “If something happens to me” movie line • Does nothing as long as we are alive • Acts when we stop demonstrating signs of life • Google’s Inactive Account Manager • Test it!
  • 21. LAST WILL AND TESTAMENT • Gifting €5,000 vs gifting €500,000 • So your loved ones can spend your coins • Read articles by Pamela Morgan https://medium.com/ @pamelawjd
  • 22. SHAMIR’S SECRET SHARING • Break any secret into X pieces • At least Y pieces required to reconstruct the secret • Y<=X • e.g. 3 out of 5 • https://en.wikipedia.org/wiki/Shamir%27s_Secret_Sharing
  • 24. MULTISIG USE CASES • Authorizing payments as a group of people: 2 of 3: CEO, CFO, Accountant • Gift your coins to your descendants after you get hit by a bus: 2 of 4: your phone, your hardware wallet, bank vault, a relative • Use your coins with untrusted wallets: your phone, your computers, bank vault. Optionally: go Seedless. • Use your coins with an offsite wallet: your phone, authenticated payment provider, bank vault. See https://greenaddress.it • Payment escrow: 2 of 3: Buyer, Seller, Trusted Escrow Agent. See https://www.openbazaar.org
  • 25. MULTISIG WALLETS • CoPay/Bitpay • Electrum • Casa (Seedless) • Bluewallet • Sparrow Wallet • Multisig has extra backup requirements • You need to backup a copy of everyone’s public key (xpub)
  • 26. COLD WALLETS • Private keys only used on an offline computer • Private keys can be permanently or temporarily stored • Can sign transactions • http://docs.electrum.org/en/latest/coldstorage.html abandon ability able about above absent absorb abstract absurd abuse access accident account accuse achieve acid acoustic acquire across act action actor actress actual Mnemonic Seed Phrase Public Private Bitcoin private keys
  • 27. WATCH-ONLY WALLETS • Wallets with public addresses only • Can view balance • Can generate receive addresses • Can generate transactions but cannot sign them (cold wallet will do the signing) • Can broadcast signed transactions Public Private Bitcoin receive addresses 0.3BTC 0.5BTC
  • 28. SEED BACKUP & RESTORE • Restoring a seed might show no or less funds!!! • Keep in mind derivation paths! • You can try them all, there are only a few options • Keep in mind the 20 address gap! • Your family should also be aware of this
  • 29. DISTRESS WALLET • A distress wallet has some coins and looks plausible. You can give up this wallet • Offered by Ledger and Trezor
  • 30. NLOCKTIME TRANSACTIONS • Sign a transaction with nLockTime into the future e.g. next year • Give the transaction to recipient • Move the funds off your address if you are still alive and repeat • Bitcoin Core wallet is introducing support for such non-standard transactions
  • 31. MOVE KEYS IN PARALLEL • How to destroy your privacy: • Bought a shiny new Trezor or Ledger and merged all your keys into one • Split your keys for a coin fork and merged all your keys into one • You could clone keys one by one :) Some software to automate the process would be great!