SlideShare a Scribd company logo
1 of 27
Multi-Sig Recipes
Ben Davenport, BitGo
@bendavenport ben@bitgo.com
Goal
Learn some ways to use multi-sig to provide
enhanced security for your service and unlock
new possibilities for users.
Agenda
● Ingredients
● Recipes
● Real world examples
Ingredient: Multi-Sig
● Introduced in BIP 11 (Oct 2011)
● OP_CHECKMULTISIG
● Requires M-of-N keys to sign
● Eliminates a single point of failure (the key)
● Direct use supplanted by indirect (P2SH)
Ingredient: P2SH
● Introduced in BIP 16 (Mar 2012)
o P2PKH: 1DRW7nQ4adMk7xPTXf2KeB7AxzDtX1fNrU
o P2SH: 3Q8pEaNZeaC6pHtaFRsTUrFhdrH8e6hkBe
● ~8% of bitcoin currently in P2SH addresses
● Mainly used for multi-sig today
The Recipes
● Use basic ingredients of P2SH and multi-sig
● Add additional techniques
● Describe security for a single wallet
● Combine recipes as necessary
But First: Multi-Sig Diagrams
● Single key is easy to reason about
● Multi-sig => Combinatorial explosion
● Need a visual language
● Represent as graphs
o Nodes = entities
o Directed edges = control (full or partial)
Recipe: Good Old Single-Key
As simple as it gets:
Recipe: 2-of-2 Multi-Device
2-of-2 Multi-Device Examples
● Multiple computers
o BitcoinD createmultisigaddress
o Armory lockboxes
● Computer + Phone
o Bitcoin Authenticator
● Computer + Hardware Wallet
o Trezor
o Ledger
Recipe: Joint Wallet (M-of-N)
Joint Wallet Examples
● Husband & Wife
● Custodial wallet for child
● Business partnership
Recipe: Trustless Escrow
Multi-Sig Escrow Examples
● HashTrust
● BitRated
● OpenBazaar
Ingredient: Co-Signing Service
● 2 keys held by customer, 1 key by
service
● User creates and half-signs transaction,
then sends to co-signer
● Co-signer executes security and logic
Recipe: Co-Signed Wallet (1 user)
Co-Signed Wallet Example
● Core model for all BitGo wallets
● Enables additional control / security
o Require 2FA from user
o Time-delays / out-of-band notification
o Transaction velocity limits
o White/black-listing of addresses
o Apply fraud detection algos
Recipe: Multi-User Co-Signed Wallet
● Per-day limits / Per-transaction limits
● Destination bitcoin address whitelists
● Time of day restrictions
● Human approvals - User/password/2FA
● Red button (kill switch)
● Blacklisting, IP lockdown, ...
● External webhooks
BitGo Co-Signer Logic
Corporate Treasury
● Multiple users on a wallet
o Require 2FA and User Auth
● Lower level emp can spend limited amounts
● CEO, CFO able to approve large withdrawals
● Can add/remove privileges of users at any time
● Example customers: SecondMarket, ChangeTip, BitFury
ATM Provider
● Shared wallet with multiple machines
● One access token per machine
● IP lockdown for each token
● Tokens may be individually revoked
● Example customers: Lamassu ATMs
Exchange Hot Wallet
● Per-day limit
● Callback via webhook
● Enforce human approver for large transactions
● Examples: Bitstamp, BitSpark, BitQuick
Exchange-owned Segregated Wallet
● One wallet per exchange user
● Per-user-wallet policy granularity
● Withdrawals require user 2FA
● Transactions to house wallet whitelisted
Recipe: Exchange Segregated Wallet
Exchange+User Joint Wallet
● User and exchange each own a private key
● Instant confirmation
● Withdrawals depend on
o Webhook call to exchange to ensure user has
sufficient margin
We Want to Work with You
How can we help you?
● Co-develop new recipes
● Enhance your security
● Improve your operational efficiency
Thank you
visit: https://www.bitgo.com/platform
twitter: @bendavenport
email: ben@bitgo.com

More Related Content

Viewers also liked

Hoe we kunnen zorgen dat iedereen profiteert van robotisering | ConferentieSo...
Hoe we kunnen zorgen dat iedereen profiteert van robotisering | ConferentieSo...Hoe we kunnen zorgen dat iedereen profiteert van robotisering | ConferentieSo...
Hoe we kunnen zorgen dat iedereen profiteert van robotisering | ConferentieSo...
Matthijs Pontier
 
Chapyter6devianceandcrime with poll
Chapyter6devianceandcrime with pollChapyter6devianceandcrime with poll
Chapyter6devianceandcrime with poll
Ray Brannon
 
Explaining the Digital Divide
Explaining the Digital DivideExplaining the Digital Divide
Explaining the Digital Divide
Anas Tawileh
 

Viewers also liked (14)

Build Upon- GBC Italia - WS4 Social Housing
Build Upon- GBC Italia - WS4 Social HousingBuild Upon- GBC Italia - WS4 Social Housing
Build Upon- GBC Italia - WS4 Social Housing
 
Hoe we kunnen zorgen dat iedereen profiteert van robotisering | ConferentieSo...
Hoe we kunnen zorgen dat iedereen profiteert van robotisering | ConferentieSo...Hoe we kunnen zorgen dat iedereen profiteert van robotisering | ConferentieSo...
Hoe we kunnen zorgen dat iedereen profiteert van robotisering | ConferentieSo...
 
Snake bite (Comedy Sketch)
Snake bite (Comedy Sketch)Snake bite (Comedy Sketch)
Snake bite (Comedy Sketch)
 
1.2.1 Система навесных шкафов и щитков
1.2.1 Система навесных шкафов и щитков1.2.1 Система навесных шкафов и щитков
1.2.1 Система навесных шкафов и щитков
 
Código agrupador 2017
Código agrupador 2017Código agrupador 2017
Código agrupador 2017
 
Chapyter6devianceandcrime with poll
Chapyter6devianceandcrime with pollChapyter6devianceandcrime with poll
Chapyter6devianceandcrime with poll
 
2010 Russian Banks & Money Laundering
2010    Russian Banks & Money Laundering2010    Russian Banks & Money Laundering
2010 Russian Banks & Money Laundering
 
Azure仮想マシンでActive Directoryドメインサービス
Azure仮想マシンでActive DirectoryドメインサービスAzure仮想マシンでActive Directoryドメインサービス
Azure仮想マシンでActive Directoryドメインサービス
 
Boletín 24/02/2017
Boletín 24/02/2017Boletín 24/02/2017
Boletín 24/02/2017
 
Explaining the Digital Divide
Explaining the Digital DivideExplaining the Digital Divide
Explaining the Digital Divide
 
What frequent acquirers expect from software vendors
What frequent acquirers expect from software vendorsWhat frequent acquirers expect from software vendors
What frequent acquirers expect from software vendors
 
Principales escuelas del pensamiento economico.
Principales escuelas del pensamiento economico.Principales escuelas del pensamiento economico.
Principales escuelas del pensamiento economico.
 
Recro vs Actavis Zohydro Case Memorandum - Filed 02/22/17
Recro vs Actavis Zohydro Case Memorandum - Filed 02/22/17Recro vs Actavis Zohydro Case Memorandum - Filed 02/22/17
Recro vs Actavis Zohydro Case Memorandum - Filed 02/22/17
 
7.4.17 Электромонтажные системы OptiLine 45
7.4.17 Электромонтажные системы OptiLine 457.4.17 Электромонтажные системы OptiLine 45
7.4.17 Электромонтажные системы OptiLine 45
 

Similar to Multi-Sig Recipes

Predicting Startup Market Trends based on the news and social media - Albert ...
Predicting Startup Market Trends based on the news and social media - Albert ...Predicting Startup Market Trends based on the news and social media - Albert ...
Predicting Startup Market Trends based on the news and social media - Albert ...
GetInData
 

Similar to Multi-Sig Recipes (20)

Blockchain Basics
Blockchain BasicsBlockchain Basics
Blockchain Basics
 
It's Time to End the Cold Storage Ice Age and Adopt Multi-Sig
It's Time to End the Cold Storage Ice Age and Adopt Multi-SigIt's Time to End the Cold Storage Ice Age and Adopt Multi-Sig
It's Time to End the Cold Storage Ice Age and Adopt Multi-Sig
 
Suricata: A Decade Under the Influence (of packet sniffing)
Suricata: A Decade Under the Influence (of packet sniffing)Suricata: A Decade Under the Influence (of packet sniffing)
Suricata: A Decade Under the Influence (of packet sniffing)
 
gething started - ethereum & using the geth golang client
gething started - ethereum & using the geth golang clientgething started - ethereum & using the geth golang client
gething started - ethereum & using the geth golang client
 
Unifying Events and Logs into the Cloud
Unifying Events and Logs into the CloudUnifying Events and Logs into the Cloud
Unifying Events and Logs into the Cloud
 
Unifying Events and Logs into the Cloud
Unifying Events and Logs into the CloudUnifying Events and Logs into the Cloud
Unifying Events and Logs into the Cloud
 
Security .NET.pdf
Security .NET.pdfSecurity .NET.pdf
Security .NET.pdf
 
Cost-Effective Two-Factor Authentication
Cost-Effective Two-Factor AuthenticationCost-Effective Two-Factor Authentication
Cost-Effective Two-Factor Authentication
 
Modern Authentication for ASP.NET Core with IdentityServer 4 (Progressive .NE...
Modern Authentication for ASP.NET Core with IdentityServer 4 (Progressive .NE...Modern Authentication for ASP.NET Core with IdentityServer 4 (Progressive .NE...
Modern Authentication for ASP.NET Core with IdentityServer 4 (Progressive .NE...
 
Introduction to Bitcoin for programmers
Introduction to Bitcoin for programmersIntroduction to Bitcoin for programmers
Introduction to Bitcoin for programmers
 
SPDY and What to Consider for HTTP/2.0
SPDY and What to Consider for HTTP/2.0SPDY and What to Consider for HTTP/2.0
SPDY and What to Consider for HTTP/2.0
 
Total privacy of transactions, Mimblewimble and Grin
Total privacy of transactions, Mimblewimble and GrinTotal privacy of transactions, Mimblewimble and Grin
Total privacy of transactions, Mimblewimble and Grin
 
The practical side of bitcoin code camp 2014
The practical side of bitcoin  code camp 2014The practical side of bitcoin  code camp 2014
The practical side of bitcoin code camp 2014
 
[Madmagz] The Blockchain
[Madmagz] The Blockchain[Madmagz] The Blockchain
[Madmagz] The Blockchain
 
Binance Clone Script - A Comprehensive Guide For Business seekers.pdf
Binance Clone Script - A Comprehensive Guide For Business seekers.pdfBinance Clone Script - A Comprehensive Guide For Business seekers.pdf
Binance Clone Script - A Comprehensive Guide For Business seekers.pdf
 
Bitcoin Talk at Rainbow
Bitcoin Talk at RainbowBitcoin Talk at Rainbow
Bitcoin Talk at Rainbow
 
Staking in a Multi-Chain World - Key Analytics & Concepts to Know
Staking in a Multi-Chain World - Key Analytics & Concepts to KnowStaking in a Multi-Chain World - Key Analytics & Concepts to Know
Staking in a Multi-Chain World - Key Analytics & Concepts to Know
 
Fluent-bit
Fluent-bitFluent-bit
Fluent-bit
 
Predicting Startup Market Trends based on the news and social media - Albert ...
Predicting Startup Market Trends based on the news and social media - Albert ...Predicting Startup Market Trends based on the news and social media - Albert ...
Predicting Startup Market Trends based on the news and social media - Albert ...
 
Wallet from noob to pro
Wallet from noob to proWallet from noob to pro
Wallet from noob to pro
 

Recently uploaded

CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 

Recently uploaded (20)

%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 

Multi-Sig Recipes

Editor's Notes

  1. (Delivered at Boost, Mar 17 2015) Hi everyone, my name is Ben Davenport I’m co-founder and Chief Product Officer at BitGo (My history with Bitcoin / BitGo)
  2. Keys to cooking: know your ingredients, your techniques, and how to combine them into great recipes Same for building secure systems: understand the building blocks & how to put them together successfully. Follow proven recipes for security where possible -- generally innovate on product, not security.
  3. The first standard BIP Con: pubkeys are revealed in blockchain prior to spending (inferior to P2PKH) Bigger con: communicating payment instructions from recipient to sender (no longer an address) Never achieved much adoption, problems were solved by P2SH
  4. P2SH was developed in 2012, in BIP16 Allows recipient to give sender arbitrary Bitcoin script hash to receive payment -- sender doesn’t care what the script looks like. Helps retain the useful fiction of addresses that have balances - they just look different Moves fee burden due to script complexity to recipient Amount held in P2SH addresses is only around 8%. Many people haven’t moved their coins out of single key addresses yet. Inertia is powerful. Single key addresses are risky because of the rising amount of hacks, malware and viruses out there today targeting Bitcoin. No single online machine can be considered uncompromisable The only truly ‘safe’ move with a single key address setup is to hold coins it in cold storage and not use them. Cold / hot model is inherently a pooled, off-blockchain approach: we can do better P2SH and multi-sig allow for new ways to use Bitcoin in a more secure fashion.
  5. We’ll now take a look at several multi-sig concepts and scenarios that have emerged or are emerging today. We’ll add additional techniques which help provide access control and eliminate single points of failure Recipes are typically describing security model of a single wallet or scenario A real business will ultimately need to expand these recipes and/or combine a number of recipes
  6. Single key systems are pretty simple - not many ways to combine them. Multi-sig recipes can have many more moving parts There’s a fundamental combinatorial explosion It’s useful to have a visual design language to understand how the pieces of the system relate
  7. Bitcoin is controlled by 1 key Key is controlled by 1 user As simple as it gets Only way it gets simpler is if the user loses his key, or gets hit by a bus
  8. A single user controls 2 keys, both of which are required to move the bitcoin They better be on different devices, because otherwise, why bother? Better than single key, because multiple machines would need to be compromised Note: still potentially a single point of failure (the user)
  9. A number of different ways to approach this Started out very raw & manual with BitcoinD, improving over time Essentially using multi-sig as “2FA for Bitcoin” Hardware wallets are a great step forward in security + ease of use Private keys never leave the device during signing (but allow for initial backup via seed) Good for humans, not very usable in an automated environment
  10. Keys are still on different devices, but now also controlled by separate users 2-of-2 is the simplest model, but has no room for error What if Alice or Bob loses a key or becomes hostile? What if Bob is involved in a tragic kayaking accident?
  11. Copay (BitPay) has led the way developing this multi-user peer-to-peer model Has some limitations in terms of coordination Downsides: Cannot change signers once address created All signers are equally important Collusion risk
  12. Temporary wallet for escrow of funds vs. a promised real-world delivery of goods WIth bitcoin, for the first time ever, the escrow agent can never steal the funds! Only needs to be trusted to arbitrate fairly. Arbitrator has a single key and can co-sign for buyer or seller Users have indirect control over the arbitrator by giving their okay or disputing the transaction This was seen as a potential huge use case seen for multi-sig Assumed people would be doing significant volume of peer-to-peer purchases Well, they were, but mostly drugs.
  13. Currently a technology in search of a truly successful P2P market
  14. A brief diversion to explain smart co-signing services... Also known as oracles (as proposed originally by Mike Hearn) A co-signing service typically holds 1 key, but could hold more Job of the oracle is to co-sign transactions when instructed by the user, but only under certain conditions Allows layering more subtle security policies on a wallet Let’s first see how it improves things for a single-user wallet When a user wants to spend funds, they create a transaction and sign it, then pass it on to the service for co-signing & submission
  15. Oracle represented by “O” here 2-of-3 model. In this example, user is in control of 2, while oracle holds 1. User maintains 1 key online, and 1 key offline as a cold backup Similar to escrow model, oracle need not be trusted not to steal funds. User maintains full custody in a mathematical sense
  16. We’ve now introduced a second user into the picture The situation is quite a bit more complex than the joint wallet we saw previously Note that both users share a single key We’ve also introduced a custodian (C) who is responsible for holding a cold backup key The custodian has a contract with one or more of the users, or the company they work for Will release key for disaster recovery under certain circumstances The users, since they share a single key, cannot collude to take funds “outside the system” The signing oracle can require multiple users to approve a given transaction or policy change Benefit: Adding new users to a wallet is possible Benefit: Users can have different levels of access rights
  17. Before co-signing BitGo runs a set of automated policies and rules before sending a transaction to the network. Some of these rules help security while others bridge external state (contracts) onto bitcoin. Every bitcoin application is different, and you can customize your policies. Even the most basic of policies like a day limit would improve security by leaps and bounds over single-key. The co-signer model is possibly the most powerful multi-sig concept because logic can now happen externally to the blockchain, It is still secure because the co-signer cannot access the funds, only veto or approve transactions. Let’s take a look at some of the scenarios now possible with the cosigner.
  18. This model is great because you are able to change number of approvers More typical to match a company hierarchy Pros: stops hackers who steal private keys, no inside jobs
  19. Multiple machine are set up with an access tokens each Each token IP locked down to the machine If a machine is lost, tokens may be individually revoked Pros: shared balance, no need to keep capital funds on each machine Also can set up: Time of day restrictions, transaction limits humans able to approve
  20. This is currently the most common exchange multi-sig integration - its used with bitstamp The exchange manages a hot wallet with funds for deposits and withdrawals Outgoing withdrawals can be limited to a certain amount per day to minimize losses. The co-signer can also make an automated request callback to the exchange out of band to confirm each transaction on the accounts database Tihs helps when the accounts database is on a separate machine from the machine sending the coins Pros: quick integration path with bitcoind I’ll also show a demo of an exchange integration later
  21. Up-and-coming model Exchange maintains a wallet for each user with the co-signer Per-user-wallet policy granularity Transactions to settlement wallet whitelisted Co-signer can require user’s 2FA for withdrawals Remember that the exchange owns the keys, so they can debit the balance. Support margin trading, cases where user does not close trade Pros: Full control by exchange but with security policies Cons: Hard work compared to pooled wallets, customer does not own key
  22. Here’s an example of a specific model we’re actively developing at BitGo Exchange end-user does not have a key, but can auth to BitGo (oracle) The exchange can initiate transactions to the settlement wallet Withdrawals to external address are initiated by user thru exchange Exchange acts on behalf of user via OAuth to BitGo, passing thru user’s 2FA
  23. A future model User and exchange each have their own private key Outstanding sell orders lock up margin (off-blockchain) Withdrawals gated on Webhook call to exchange to ensure that the user has sufficient margin to be able to withdraw Additional policies added by the user and their 2FA Pro: Funds recoverable if exchange goes down Con: more burden on customer to maintain key