SlideShare una empresa de Scribd logo
1 de 30
Descargar para leer sin conexión
PROTECTING
CRYPTOCURRENCY KEYS
DIMITRIS TSAPAKIDIS
@DIMITRIS
LINKEDIN.COM/IN/DIMITRIS
DECEMBER 2022
“THE ONLY MEANINGFUL
ADOPTION METRIC IS PEOPLE
WHO SELF CUSTODY BITCOIN”
@HODLONAUT
AGENDA
• Exchange & custodial threats
• Self-custody threats
• What to protect?
• How to protect?
NOT YOUR KEYS, NOT YOUR COINS
• Custodial wallets can be hacked
• Exchanges might not be solvent
• Bankruptcy takes years and you get cents on your Euro
• Exchanges selling you paper Bitcoin also suppress the price
• Exchanges might ask your for strict KYC and Source of Wealth
documentation
• Having exchanges hold a large % of all Bitcoin is a systemic risk
• Bitcoin is not valuable if it can be confiscated and you need to ask
permission to send it
NOT YOUR KEYS, NOT YOUR COINS
• Use 2 Factor Authentication, without SMS
• Journey from exchange to personal custody
• Learn about sending coins to your personal (non-custodial) wallet
• Learn about sending coins between wallets
• Practice and become confident
• Buy a hardware wallet
• Don’t wait for a bank (exchange) run to start!
BITCOIN KEYS
abandon ability able about
above absent absorb
abstract absurd abuse
access accident account
accuse achieve acid
acoustic acquire across act
action actor actress actual
Mnemonic Seed
Phrase
Public
Private
Bitcoin private keys
Bitcoin receive addresses
0.3BTC 0.5BTC
THREATS
• Theft
• Destruction
• Take them with you to your grave
• Multiparty/Institutional ownership
• Receiving coins on your behalf: web server, teller/waiter
• Privacy
• Low-entropy keys
abandon ability able about
above absent absorb
abstract absurd abuse
access accident account
accuse achieve acid
acoustic acquire across act
action actor actress actual
Mnemonic Seed
Phrase
Public
Private
Bitcoin private keys
Bitcoin receive addresses
0.3BTC 0.5BTC
THREATS
• Dust
• Kidnap/robbery: https://github.com/jlopp/physical-bitcoin-attacks
TOOLS
• Use these tools to protect your coins
• They are building blocks to mix and match like LEGOs
MEMORIZE THE SEED PHRASE
• Useful if you have to walk from Syria to Germany and you have to
swim across the Mediterranean
abandon ability able about
above absent absorb
abstract absurd abuse
access accident account
accuse achieve acid
acoustic acquire across act
action actor actress actual
Mnemonic Seed
Phrase
CRYPTOSTEEL
• Store your seed phrase
• Protects against fire
• Protects against water
• Split in two: password and
encrypted seed
abandon ability able about
above absent absorb
abstract absurd abuse
access accident account
accuse achieve acid
acoustic acquire across act
action actor actress actual
Mnemonic Seed
Phrase
GENERATE YOUR OWN SEED PHRASE
https://iancoleman.io/bip39/
abandon ability able about
above absent absorb
abstract absurd abuse
access accident account
accuse achieve acid
acoustic acquire across act
action actor actress actual
Mnemonic Seed
Phrase
KEYS NEVER EXPOSED
HARDWARE WALLETS
Key generation
Transaction signing
Ledger
Trezor
KeepKey
RISKS OF SOFTWARE WALLETS
• Insecure, general-purpose computing devices
• Seed copied off screen
• Private keys stolen after you unlock your wallet
• Keyboard sniffers or learning/prediction algorithms
VERIFY DESTINATION ADDRESSES
• Are you sending money to
the correct address?
• Computer clipboard can be
altered
ONE ADDRESS PER TRANSACTION
• Wallets automatically
generate new addresses
• Preserve your privacy
• Preserve everyone’s privacy
MOVE KEYS IN PARALLEL
• How to destroy your privacy:
• Bought a shiny new Trezor or Ledger and merged all your keys
into one
• Split your keys for a coin fork and merged all your keys into one
• You could clone keys one by one :) Some software to automate
the process would be great!
DEAD MAN’S SWITCH
• “If something happens to
me” movie line
• Does nothing as long as we
are alive
• Acts when we stop
demonstrating signs of life
• Google’s Inactive Account
Manager
• Test it!
LAST WILL AND TESTAMENT
• Gifting €5,000 vs gifting
€500,000
• So your loved ones can
spend your coins
• Read articles by Pamela
Morgan https://medium.com/
@pamelawjd
SHAMIR’S SECRET SHARING
• Break any secret into X pieces
• At least Y pieces required to reconstruct the secret
• Y<=X
• e.g. 3 out of 5
• https://en.wikipedia.org/wiki/Shamir%27s_Secret_Sharing
MULTISIG ADDRESSES
MULTISIGNATURES
2 of 4 keys
MULTISIG USE CASES
• Authorizing payments as a group of people: 2 of 3: CEO, CFO,
Accountant
• Gift your coins to your descendants after you get hit by a bus: 2 of 4:
your phone, your hardware wallet, bank vault, a relative
• Use your coins with untrusted wallets: your phone, your computers,
bank vault. Optionally: go Seedless.
• Use your coins with an offsite wallet: your phone, authenticated
payment provider, bank vault. See https://greenaddress.it
• Payment escrow: 2 of 3: Buyer, Seller, Trusted Escrow Agent. See
https://www.openbazaar.org
MULTISIG WALLETS
• CoPay/Bitpay
• Electrum
• Casa (Seedless)
• Bluewallet
• Sparrow Wallet
• Multisig has extra backup requirements
• You need to backup a copy of everyone’s public key (xpub)
COLD WALLETS
• Private keys only used on an offline computer
• Private keys can be permanently or temporarily stored
• Can sign transactions
• http://docs.electrum.org/en/latest/coldstorage.html
abandon ability able about
above absent absorb
abstract absurd abuse
access accident account
accuse achieve acid
acoustic acquire across act
action actor actress actual
Mnemonic Seed
Phrase
Public
Private
Bitcoin private keys
WATCH-ONLY WALLETS
• Wallets with public addresses only
• Can view balance
• Can generate receive addresses
• Can generate transactions but cannot sign them (cold wallet will
do the signing)
• Can broadcast signed transactions
Public
Private
Bitcoin receive addresses
0.3BTC 0.5BTC
TIERED WALLETS
• Cellphone: spending cash
• Hardware wallet: savings
• Multisig with cold wallets: long term investments
SEED BACKUP & RESTORE
• Restoring a seed might show no or less funds!!!
• Keep in mind derivation paths!
• You can try them all, there are only a few options
• Keep in mind the 20 address gap!
• Your family should also be aware of this
DISTRESS WALLET
• A distress wallet has some coins and looks plausible. You can give
up this wallet
• Offered by Ledger and Trezor
NLOCKTIME TRANSACTIONS
• Sign a transaction with nLockTime into the future e.g. next year
• Give the transaction to recipient
• Move the funds off your address if you are still alive and repeat
• Bitcoin Core wallet is introducing support for such non-standard
transactions
THANK YOU!

Más contenido relacionado

Similar a Protecting Bitcoin and cryptocurrency Keys

Michael bowen | High risk specialist |Card not present transaction expert
Michael bowen | High risk specialist |Card not present transaction expert Michael bowen | High risk specialist |Card not present transaction expert
Michael bowen | High risk specialist |Card not present transaction expert JayWigdore
 
Defcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetDefcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetPriyanka Aash
 
FreeGeek -Cryptocurrency and Blockchain
FreeGeek -Cryptocurrency and BlockchainFreeGeek -Cryptocurrency and Blockchain
FreeGeek -Cryptocurrency and BlockchainJoshua Johnston
 
Amber & SnapChat - Presentation
Amber & SnapChat - PresentationAmber & SnapChat - Presentation
Amber & SnapChat - PresentationAleksandar Svetski
 
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsA Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsBeau Bullock
 
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsA Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsBeau Bullock
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulAndrew Schwabe
 
Cybercriminals focus on Cryptocurrency
Cybercriminals focus on CryptocurrencyCybercriminals focus on Cryptocurrency
Cybercriminals focus on CryptocurrencyAhmad El Tawil
 
How To Secure Your Cryptocurrency In 2020
How To Secure Your Cryptocurrency In 2020How To Secure Your Cryptocurrency In 2020
How To Secure Your Cryptocurrency In 2020Christian Sales
 
Breaking vaults: Stealing Lastpass protected secrets
Breaking vaults: Stealing Lastpass protected secretsBreaking vaults: Stealing Lastpass protected secrets
Breaking vaults: Stealing Lastpass protected secretsMartin Vigo
 
Blockchain and security v3
Blockchain and security v3Blockchain and security v3
Blockchain and security v3Jorge Sebastiao
 
Ashok misra presentation
Ashok misra presentationAshok misra presentation
Ashok misra presentationMecklerMedia
 
Flaying the Blockchain Ledger for Fun, Profit, and Hip Hop
Flaying the Blockchain Ledger for Fun, Profit, and Hip HopFlaying the Blockchain Ledger for Fun, Profit, and Hip Hop
Flaying the Blockchain Ledger for Fun, Profit, and Hip HopAndrew Morris
 
An Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
An Investigator’s Guide to Blockchain, Bitcoin and Wallet TransactionsAn Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
An Investigator’s Guide to Blockchain, Bitcoin and Wallet TransactionsCase IQ
 
[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners
[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners
[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute BeginnersHessan Adnani
 
11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Homezaimorkai
 
Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)David Herrington
 

Similar a Protecting Bitcoin and cryptocurrency Keys (20)

Michael bowen | High risk specialist |Card not present transaction expert
Michael bowen | High risk specialist |Card not present transaction expert Michael bowen | High risk specialist |Card not present transaction expert
Michael bowen | High risk specialist |Card not present transaction expert
 
Defcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetDefcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internet
 
FreeGeek -Cryptocurrency and Blockchain
FreeGeek -Cryptocurrency and BlockchainFreeGeek -Cryptocurrency and Blockchain
FreeGeek -Cryptocurrency and Blockchain
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Digital Hygiene for Nomads
Digital Hygiene for NomadsDigital Hygiene for Nomads
Digital Hygiene for Nomads
 
Amber & SnapChat - Presentation
Amber & SnapChat - PresentationAmber & SnapChat - Presentation
Amber & SnapChat - Presentation
 
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsA Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
 
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsA Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech Mogul
 
Cybercriminals focus on Cryptocurrency
Cybercriminals focus on CryptocurrencyCybercriminals focus on Cryptocurrency
Cybercriminals focus on Cryptocurrency
 
How To Secure Your Cryptocurrency In 2020
How To Secure Your Cryptocurrency In 2020How To Secure Your Cryptocurrency In 2020
How To Secure Your Cryptocurrency In 2020
 
Breaking vaults: Stealing Lastpass protected secrets
Breaking vaults: Stealing Lastpass protected secretsBreaking vaults: Stealing Lastpass protected secrets
Breaking vaults: Stealing Lastpass protected secrets
 
Blockchain and security v3
Blockchain and security v3Blockchain and security v3
Blockchain and security v3
 
Ashok misra presentation
Ashok misra presentationAshok misra presentation
Ashok misra presentation
 
Flaying the Blockchain Ledger for Fun, Profit, and Hip Hop
Flaying the Blockchain Ledger for Fun, Profit, and Hip HopFlaying the Blockchain Ledger for Fun, Profit, and Hip Hop
Flaying the Blockchain Ledger for Fun, Profit, and Hip Hop
 
An Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
An Investigator’s Guide to Blockchain, Bitcoin and Wallet TransactionsAn Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
An Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
 
[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners
[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners
[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners
 
11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home
 
Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)
 
Blockchain's AOL moment
Blockchain's AOL momentBlockchain's AOL moment
Blockchain's AOL moment
 

Último

A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 

Último (20)

A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 

Protecting Bitcoin and cryptocurrency Keys

  • 2. “THE ONLY MEANINGFUL ADOPTION METRIC IS PEOPLE WHO SELF CUSTODY BITCOIN” @HODLONAUT
  • 3. AGENDA • Exchange & custodial threats • Self-custody threats • What to protect? • How to protect?
  • 4. NOT YOUR KEYS, NOT YOUR COINS • Custodial wallets can be hacked • Exchanges might not be solvent • Bankruptcy takes years and you get cents on your Euro • Exchanges selling you paper Bitcoin also suppress the price • Exchanges might ask your for strict KYC and Source of Wealth documentation • Having exchanges hold a large % of all Bitcoin is a systemic risk • Bitcoin is not valuable if it can be confiscated and you need to ask permission to send it
  • 5. NOT YOUR KEYS, NOT YOUR COINS • Use 2 Factor Authentication, without SMS • Journey from exchange to personal custody • Learn about sending coins to your personal (non-custodial) wallet • Learn about sending coins between wallets • Practice and become confident • Buy a hardware wallet • Don’t wait for a bank (exchange) run to start!
  • 6. BITCOIN KEYS abandon ability able about above absent absorb abstract absurd abuse access accident account accuse achieve acid acoustic acquire across act action actor actress actual Mnemonic Seed Phrase Public Private Bitcoin private keys Bitcoin receive addresses 0.3BTC 0.5BTC
  • 7. THREATS • Theft • Destruction • Take them with you to your grave • Multiparty/Institutional ownership • Receiving coins on your behalf: web server, teller/waiter • Privacy • Low-entropy keys abandon ability able about above absent absorb abstract absurd abuse access accident account accuse achieve acid acoustic acquire across act action actor actress actual Mnemonic Seed Phrase Public Private Bitcoin private keys Bitcoin receive addresses 0.3BTC 0.5BTC
  • 8. THREATS • Dust • Kidnap/robbery: https://github.com/jlopp/physical-bitcoin-attacks
  • 9. TOOLS • Use these tools to protect your coins • They are building blocks to mix and match like LEGOs
  • 10. MEMORIZE THE SEED PHRASE • Useful if you have to walk from Syria to Germany and you have to swim across the Mediterranean abandon ability able about above absent absorb abstract absurd abuse access accident account accuse achieve acid acoustic acquire across act action actor actress actual Mnemonic Seed Phrase
  • 11. CRYPTOSTEEL • Store your seed phrase • Protects against fire • Protects against water • Split in two: password and encrypted seed abandon ability able about above absent absorb abstract absurd abuse access accident account accuse achieve acid acoustic acquire across act action actor actress actual Mnemonic Seed Phrase
  • 12. GENERATE YOUR OWN SEED PHRASE https://iancoleman.io/bip39/ abandon ability able about above absent absorb abstract absurd abuse access accident account accuse achieve acid acoustic acquire across act action actor actress actual Mnemonic Seed Phrase
  • 13. KEYS NEVER EXPOSED HARDWARE WALLETS Key generation Transaction signing Ledger Trezor KeepKey
  • 14. RISKS OF SOFTWARE WALLETS • Insecure, general-purpose computing devices • Seed copied off screen • Private keys stolen after you unlock your wallet • Keyboard sniffers or learning/prediction algorithms
  • 15. VERIFY DESTINATION ADDRESSES • Are you sending money to the correct address? • Computer clipboard can be altered
  • 16. ONE ADDRESS PER TRANSACTION • Wallets automatically generate new addresses • Preserve your privacy • Preserve everyone’s privacy
  • 17. MOVE KEYS IN PARALLEL • How to destroy your privacy: • Bought a shiny new Trezor or Ledger and merged all your keys into one • Split your keys for a coin fork and merged all your keys into one • You could clone keys one by one :) Some software to automate the process would be great!
  • 18. DEAD MAN’S SWITCH • “If something happens to me” movie line • Does nothing as long as we are alive • Acts when we stop demonstrating signs of life • Google’s Inactive Account Manager • Test it!
  • 19. LAST WILL AND TESTAMENT • Gifting €5,000 vs gifting €500,000 • So your loved ones can spend your coins • Read articles by Pamela Morgan https://medium.com/ @pamelawjd
  • 20. SHAMIR’S SECRET SHARING • Break any secret into X pieces • At least Y pieces required to reconstruct the secret • Y<=X • e.g. 3 out of 5 • https://en.wikipedia.org/wiki/Shamir%27s_Secret_Sharing
  • 22. MULTISIG USE CASES • Authorizing payments as a group of people: 2 of 3: CEO, CFO, Accountant • Gift your coins to your descendants after you get hit by a bus: 2 of 4: your phone, your hardware wallet, bank vault, a relative • Use your coins with untrusted wallets: your phone, your computers, bank vault. Optionally: go Seedless. • Use your coins with an offsite wallet: your phone, authenticated payment provider, bank vault. See https://greenaddress.it • Payment escrow: 2 of 3: Buyer, Seller, Trusted Escrow Agent. See https://www.openbazaar.org
  • 23. MULTISIG WALLETS • CoPay/Bitpay • Electrum • Casa (Seedless) • Bluewallet • Sparrow Wallet • Multisig has extra backup requirements • You need to backup a copy of everyone’s public key (xpub)
  • 24. COLD WALLETS • Private keys only used on an offline computer • Private keys can be permanently or temporarily stored • Can sign transactions • http://docs.electrum.org/en/latest/coldstorage.html abandon ability able about above absent absorb abstract absurd abuse access accident account accuse achieve acid acoustic acquire across act action actor actress actual Mnemonic Seed Phrase Public Private Bitcoin private keys
  • 25. WATCH-ONLY WALLETS • Wallets with public addresses only • Can view balance • Can generate receive addresses • Can generate transactions but cannot sign them (cold wallet will do the signing) • Can broadcast signed transactions Public Private Bitcoin receive addresses 0.3BTC 0.5BTC
  • 26. TIERED WALLETS • Cellphone: spending cash • Hardware wallet: savings • Multisig with cold wallets: long term investments
  • 27. SEED BACKUP & RESTORE • Restoring a seed might show no or less funds!!! • Keep in mind derivation paths! • You can try them all, there are only a few options • Keep in mind the 20 address gap! • Your family should also be aware of this
  • 28. DISTRESS WALLET • A distress wallet has some coins and looks plausible. You can give up this wallet • Offered by Ledger and Trezor
  • 29. NLOCKTIME TRANSACTIONS • Sign a transaction with nLockTime into the future e.g. next year • Give the transaction to recipient • Move the funds off your address if you are still alive and repeat • Bitcoin Core wallet is introducing support for such non-standard transactions