SlideShare a Scribd company logo
1 of 16
Download to read offline
CRYPTO OPSEC:
HOW TO
STORE BITCOIN
SECURELY
Bitcoin vs. Bank Paradigm
● There are no coins
● Database - list of addresses and balances
● Private keys allow spending balances from
the corresponding addresses
● Protect your key
● Lost key = lost bitcoin
● Exposed key = stolen bitcoin
Task - have enough private key backups, so you can always recover it, and
keep the key secret, so no one else can find it.
Private Key
● 256-bit number
● One private key - one address
● Example in HEX format:
E9873D79C6D87DC0FB6A5778633389F4453213
303DA61F20BD67FC233AA33262
Secret number mathematically related to a bitcoin address that allows
bitcoins to be spent
Hierarchically Deterministic Wallet
● Uses Master Extended Key (512 bits)
● Derives private keys and addresses
● Backup only the Master Extended Key
● Represented by a seed phrase (12-24
words out of 2048 standard word list)
● BIP32 standard (recover anywhere)
Seed Phrase
Not safe to invent your own seed phrase- humans are bad at
randomness. Allow the wallet software to generate it.
● Two-factor seed phrases
● Encrypted with password
● Something you “have” + “know”
● “Seed extension”. “Extension word”,
“13th/25th word”
Warning: Forgetting this password will result in the bitcoin wallet and
any contained money being lost. Do not overestimate your ability to
remember passphrases especially when you may not use it very often.
Storage of Bitcoin
● Protection against accidental loss
● Verification that the bitcoins are genuine
● Privacy and protection against spying
● Protection against theft
● Easy access for spending or moving bitcoins
Protection From Loss
● Backup Seed Phrase
● Pencil and paper
● Even a damaged word is identifiable
● First four letters are enough to uniquely
identify the word from the standard list
Storing Seed Phrases
● Memorizing
● Metal engraving
● Chiseling into stone
● Writing on paper
● Acid free paper (archival)
● Use pencil - doesn’t fade
● Store in the dark
● No temperature or moisture extremes
Bad Seed Phrase Storing
● Splitting the Seed Phrase into different
locations weakens security. If one part is
found - easier to brute force
● Use multisignature instead
● Adding decoy words to the list - bad idea
- easy to weed out by comparing with the
standard list
Verification and Privacy - Run a Full Node
● Seed phrase stores private keys
● Wallet software verifies you received Bitcoin
● Full node verifies if Bitcoin is genuine
● Lightweight wallets (SPV) are good for smaller
amounts or when you trust the sender
● SPV exposes to the full node all your addresses,
balances and IP-address
Protection from Theft
● Private keys = money
● On computer or smartphone private keys
stored in memory and can be extracted
remotely
● Hardware wallets keep private keys in a
separate device and never share them
Hardware Wallets
Pros:
● Malware resistant internal storage for private keys
● Only transmits signed transactions, sometimes air
gapped
● No risk even if computer is compromised
Cons:
● Recognizable device
● Supply chain attacks
● Physical attacks
● Possible to extract keys with special equipment
Special purpose security-hardened devices that is trusted to
generate private keys and sign transactions.
Multisignature Wallet
● Requires multiple signatures to send a tx
● Exponentially higher security - difficult to
compromise several devices
● m-of-n signatures (3-of-5)
● Best used with Hardware wallets from different
manufacturers
● Solution now: full node + electrum server +
electrum wallet + HW
● No user-friendly solution yet
Custodians
Pros:
● Their security is better than yours
● Easy recovery and inheritance
Cons:
● Honey pot for attackers, while you are not
● Inside job attacks
● Government seizure
● Not the same as bank (irreversible, not insured)
Solution: Custodian keeps one key from a multisig, that can be used for recovery if
you lose one of your keys, but not enough to spend your bitcoin
$5-Wrench Attack
● Don’t talk about your wealth
● Use multsig with keys in
multiple locations
● Bear arms, hire guards, rely on
police or army
There are two ways to beat this attack: by hiding or by defending yourself.
You can't be your own bank without
bank-level security.
Tips
● Backup your seed phrase
● Never Keep Coins on Exchanges
● Don’t buy altcoins
● Learn about security
● Denis Serebryakov
twitter.com/ThatCryptoTO

More Related Content

Similar to Crypto OpSec - How to Securely Store Bitcoin and Other Crypto Assets

Securing your Bitcoin wallet
Securing your Bitcoin walletSecuring your Bitcoin wallet
Securing your Bitcoin walletRon Reiter
 
AES-GCM common pitfalls and how to work around them.pptx
AES-GCM common pitfalls and how to work around them.pptxAES-GCM common pitfalls and how to work around them.pptx
AES-GCM common pitfalls and how to work around them.pptxskantos
 
Cryptography For The Average Developer - Sunshine PHP
Cryptography For The Average Developer - Sunshine PHPCryptography For The Average Developer - Sunshine PHP
Cryptography For The Average Developer - Sunshine PHPAnthony Ferrara
 
All Your Password Are Belong To Us
All Your Password Are Belong To UsAll Your Password Are Belong To Us
All Your Password Are Belong To UsCharles Southerland
 
BTC2019 - The Key Creation Ceremony
BTC2019 - The Key Creation CeremonyBTC2019 - The Key Creation Ceremony
BTC2019 - The Key Creation CeremonyJoshua McDougall
 
Bitcoin explained. Talk at Vaughan Public Library
Bitcoin explained. Talk at Vaughan Public LibraryBitcoin explained. Talk at Vaughan Public Library
Bitcoin explained. Talk at Vaughan Public LibraryThatCrypto
 
Bitcoin Explained: What Is Bitcoin, Why It Exists, How It Works
Bitcoin Explained: What Is Bitcoin, Why It Exists, How It WorksBitcoin Explained: What Is Bitcoin, Why It Exists, How It Works
Bitcoin Explained: What Is Bitcoin, Why It Exists, How It WorksThatCrypto
 
ContainerDays Boston 2016: "Hiding in Plain Sight: Managing Secrets in a Cont...
ContainerDays Boston 2016: "Hiding in Plain Sight: Managing Secrets in a Cont...ContainerDays Boston 2016: "Hiding in Plain Sight: Managing Secrets in a Cont...
ContainerDays Boston 2016: "Hiding in Plain Sight: Managing Secrets in a Cont...DynamicInfraDays
 
Security for Data Scientists
Security for Data ScientistsSecurity for Data Scientists
Security for Data ScientistsDavid Arcos
 
Defense in Depth: Securing your new Kubernetes cluster from the challenges th...
Defense in Depth: Securing your new Kubernetes cluster from the challenges th...Defense in Depth: Securing your new Kubernetes cluster from the challenges th...
Defense in Depth: Securing your new Kubernetes cluster from the challenges th...CloudOps2005
 
Secret Management Journey - Here Be Dragons aka Secret Dragons
Secret Management Journey - Here Be Dragons aka Secret DragonsSecret Management Journey - Here Be Dragons aka Secret Dragons
Secret Management Journey - Here Be Dragons aka Secret DragonsMichael Man
 
Distributed unique id generation
Distributed unique id generationDistributed unique id generation
Distributed unique id generationTung Nguyen
 
Identity and the quest for Self-Sovereign Identity - Daniel Hardman
Identity and the quest for Self-Sovereign Identity - Daniel HardmanIdentity and the quest for Self-Sovereign Identity - Daniel Hardman
Identity and the quest for Self-Sovereign Identity - Daniel HardmanSSIMeetup
 

Similar to Crypto OpSec - How to Securely Store Bitcoin and Other Crypto Assets (20)

Securing your Bitcoin wallet
Securing your Bitcoin walletSecuring your Bitcoin wallet
Securing your Bitcoin wallet
 
Cryptocurrency tutorial
Cryptocurrency tutorialCryptocurrency tutorial
Cryptocurrency tutorial
 
AES-GCM common pitfalls and how to work around them.pptx
AES-GCM common pitfalls and how to work around them.pptxAES-GCM common pitfalls and how to work around them.pptx
AES-GCM common pitfalls and how to work around them.pptx
 
Cryptography For The Average Developer - Sunshine PHP
Cryptography For The Average Developer - Sunshine PHPCryptography For The Average Developer - Sunshine PHP
Cryptography For The Average Developer - Sunshine PHP
 
All Your Password Are Belong To Us
All Your Password Are Belong To UsAll Your Password Are Belong To Us
All Your Password Are Belong To Us
 
BTC2019 - The Key Creation Ceremony
BTC2019 - The Key Creation CeremonyBTC2019 - The Key Creation Ceremony
BTC2019 - The Key Creation Ceremony
 
Bitcoin explained. Talk at Vaughan Public Library
Bitcoin explained. Talk at Vaughan Public LibraryBitcoin explained. Talk at Vaughan Public Library
Bitcoin explained. Talk at Vaughan Public Library
 
Bitcoin Explained: What Is Bitcoin, Why It Exists, How It Works
Bitcoin Explained: What Is Bitcoin, Why It Exists, How It WorksBitcoin Explained: What Is Bitcoin, Why It Exists, How It Works
Bitcoin Explained: What Is Bitcoin, Why It Exists, How It Works
 
ContainerDays Boston 2016: "Hiding in Plain Sight: Managing Secrets in a Cont...
ContainerDays Boston 2016: "Hiding in Plain Sight: Managing Secrets in a Cont...ContainerDays Boston 2016: "Hiding in Plain Sight: Managing Secrets in a Cont...
ContainerDays Boston 2016: "Hiding in Plain Sight: Managing Secrets in a Cont...
 
Security for Data Scientists
Security for Data ScientistsSecurity for Data Scientists
Security for Data Scientists
 
Defense in Depth: Securing your new Kubernetes cluster from the challenges th...
Defense in Depth: Securing your new Kubernetes cluster from the challenges th...Defense in Depth: Securing your new Kubernetes cluster from the challenges th...
Defense in Depth: Securing your new Kubernetes cluster from the challenges th...
 
Secret Management Journey - Here Be Dragons aka Secret Dragons
Secret Management Journey - Here Be Dragons aka Secret DragonsSecret Management Journey - Here Be Dragons aka Secret Dragons
Secret Management Journey - Here Be Dragons aka Secret Dragons
 
Week12
Week12Week12
Week12
 
Cryptography 101
Cryptography 101Cryptography 101
Cryptography 101
 
Vault
VaultVault
Vault
 
Web security 101
Web security 101Web security 101
Web security 101
 
Websec
WebsecWebsec
Websec
 
Secure Your Encryption with HSM
Secure Your Encryption with HSMSecure Your Encryption with HSM
Secure Your Encryption with HSM
 
Distributed unique id generation
Distributed unique id generationDistributed unique id generation
Distributed unique id generation
 
Identity and the quest for Self-Sovereign Identity - Daniel Hardman
Identity and the quest for Self-Sovereign Identity - Daniel HardmanIdentity and the quest for Self-Sovereign Identity - Daniel Hardman
Identity and the quest for Self-Sovereign Identity - Daniel Hardman
 

More from ThatCrypto

How to Purchase Bitcoin Privately & Securely: Exchanges, ATMs, OTC, Giftcards
How to Purchase Bitcoin Privately & Securely: Exchanges, ATMs, OTC, GiftcardsHow to Purchase Bitcoin Privately & Securely: Exchanges, ATMs, OTC, Giftcards
How to Purchase Bitcoin Privately & Securely: Exchanges, ATMs, OTC, GiftcardsThatCrypto
 
Privacy and Bitcoin - Attack Vectors
Privacy and Bitcoin - Attack VectorsPrivacy and Bitcoin - Attack Vectors
Privacy and Bitcoin - Attack VectorsThatCrypto
 
Why Buy Bitcoin - Monetary Good
Why Buy Bitcoin - Monetary GoodWhy Buy Bitcoin - Monetary Good
Why Buy Bitcoin - Monetary GoodThatCrypto
 
Crypto Fundamentals - Bitcoin, Altcoins, Forks, Blockchain
Crypto Fundamentals - Bitcoin, Altcoins, Forks, BlockchainCrypto Fundamentals - Bitcoin, Altcoins, Forks, Blockchain
Crypto Fundamentals - Bitcoin, Altcoins, Forks, BlockchainThatCrypto
 
Best Store of Value: Investing in Bitcoin vs. Gold vs. Gold-backed Stablecoins
Best Store of Value: Investing in Bitcoin vs. Gold vs. Gold-backed StablecoinsBest Store of Value: Investing in Bitcoin vs. Gold vs. Gold-backed Stablecoins
Best Store of Value: Investing in Bitcoin vs. Gold vs. Gold-backed StablecoinsThatCrypto
 
Fundraising on Blockchain: ICO vs. IEO vs. STO
Fundraising on Blockchain:   ICO vs. IEO vs. STOFundraising on Blockchain:   ICO vs. IEO vs. STO
Fundraising on Blockchain: ICO vs. IEO vs. STOThatCrypto
 
DeFi - Decentralized Finance - Wallstreet Meets Blockchain
DeFi - Decentralized Finance - Wallstreet Meets BlockchainDeFi - Decentralized Finance - Wallstreet Meets Blockchain
DeFi - Decentralized Finance - Wallstreet Meets BlockchainThatCrypto
 
Crypto exchange hacks: Trade Bitcoin Securely
Crypto exchange hacks: Trade Bitcoin SecurelyCrypto exchange hacks: Trade Bitcoin Securely
Crypto exchange hacks: Trade Bitcoin SecurelyThatCrypto
 
Practical Use of Blockchain: Remittances
Practical Use of Blockchain: RemittancesPractical Use of Blockchain: Remittances
Practical Use of Blockchain: RemittancesThatCrypto
 

More from ThatCrypto (9)

How to Purchase Bitcoin Privately & Securely: Exchanges, ATMs, OTC, Giftcards
How to Purchase Bitcoin Privately & Securely: Exchanges, ATMs, OTC, GiftcardsHow to Purchase Bitcoin Privately & Securely: Exchanges, ATMs, OTC, Giftcards
How to Purchase Bitcoin Privately & Securely: Exchanges, ATMs, OTC, Giftcards
 
Privacy and Bitcoin - Attack Vectors
Privacy and Bitcoin - Attack VectorsPrivacy and Bitcoin - Attack Vectors
Privacy and Bitcoin - Attack Vectors
 
Why Buy Bitcoin - Monetary Good
Why Buy Bitcoin - Monetary GoodWhy Buy Bitcoin - Monetary Good
Why Buy Bitcoin - Monetary Good
 
Crypto Fundamentals - Bitcoin, Altcoins, Forks, Blockchain
Crypto Fundamentals - Bitcoin, Altcoins, Forks, BlockchainCrypto Fundamentals - Bitcoin, Altcoins, Forks, Blockchain
Crypto Fundamentals - Bitcoin, Altcoins, Forks, Blockchain
 
Best Store of Value: Investing in Bitcoin vs. Gold vs. Gold-backed Stablecoins
Best Store of Value: Investing in Bitcoin vs. Gold vs. Gold-backed StablecoinsBest Store of Value: Investing in Bitcoin vs. Gold vs. Gold-backed Stablecoins
Best Store of Value: Investing in Bitcoin vs. Gold vs. Gold-backed Stablecoins
 
Fundraising on Blockchain: ICO vs. IEO vs. STO
Fundraising on Blockchain:   ICO vs. IEO vs. STOFundraising on Blockchain:   ICO vs. IEO vs. STO
Fundraising on Blockchain: ICO vs. IEO vs. STO
 
DeFi - Decentralized Finance - Wallstreet Meets Blockchain
DeFi - Decentralized Finance - Wallstreet Meets BlockchainDeFi - Decentralized Finance - Wallstreet Meets Blockchain
DeFi - Decentralized Finance - Wallstreet Meets Blockchain
 
Crypto exchange hacks: Trade Bitcoin Securely
Crypto exchange hacks: Trade Bitcoin SecurelyCrypto exchange hacks: Trade Bitcoin Securely
Crypto exchange hacks: Trade Bitcoin Securely
 
Practical Use of Blockchain: Remittances
Practical Use of Blockchain: RemittancesPractical Use of Blockchain: Remittances
Practical Use of Blockchain: Remittances
 

Recently uploaded

原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证jdkhjh
 
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Roomdivyansh0kumar0
 
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingHow Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingAggregage
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfHenry Tapper
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdfHenry Tapper
 
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyInterimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyTyöeläkeyhtiö Elo
 
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...Suhani Kapoor
 
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...makika9823
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130Suhani Kapoor
 
Financial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and DisadvantagesFinancial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and Disadvantagesjayjaymabutot13
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfAdnet Communications
 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfshaunmashale756
 
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawl
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service AizawlVip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawl
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawlmakika9823
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignHenry Tapper
 
Stock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfStock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfMichael Silva
 
House of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHouse of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHenry Tapper
 
Quantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector CompaniesQuantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector Companiesprashantbhati354
 
Financial institutions facilitate financing, economic transactions, issue fun...
Financial institutions facilitate financing, economic transactions, issue fun...Financial institutions facilitate financing, economic transactions, issue fun...
Financial institutions facilitate financing, economic transactions, issue fun...Avanish Goel
 
Stock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfStock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfMichael Silva
 

Recently uploaded (20)

原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
 
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Room
 
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingHow Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of Reporting
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdf
 
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyInterimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
 
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
 
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
 
Financial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and DisadvantagesFinancial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and Disadvantages
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdf
 
Commercial Bank Economic Capsule - April 2024
Commercial Bank Economic Capsule - April 2024Commercial Bank Economic Capsule - April 2024
Commercial Bank Economic Capsule - April 2024
 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdf
 
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawl
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service AizawlVip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawl
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawl
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaign
 
Stock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfStock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdf
 
House of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHouse of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview document
 
Quantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector CompaniesQuantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector Companies
 
Financial institutions facilitate financing, economic transactions, issue fun...
Financial institutions facilitate financing, economic transactions, issue fun...Financial institutions facilitate financing, economic transactions, issue fun...
Financial institutions facilitate financing, economic transactions, issue fun...
 
Stock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfStock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdf
 

Crypto OpSec - How to Securely Store Bitcoin and Other Crypto Assets

  • 1. CRYPTO OPSEC: HOW TO STORE BITCOIN SECURELY
  • 2. Bitcoin vs. Bank Paradigm ● There are no coins ● Database - list of addresses and balances ● Private keys allow spending balances from the corresponding addresses ● Protect your key ● Lost key = lost bitcoin ● Exposed key = stolen bitcoin Task - have enough private key backups, so you can always recover it, and keep the key secret, so no one else can find it.
  • 3. Private Key ● 256-bit number ● One private key - one address ● Example in HEX format: E9873D79C6D87DC0FB6A5778633389F4453213 303DA61F20BD67FC233AA33262 Secret number mathematically related to a bitcoin address that allows bitcoins to be spent
  • 4. Hierarchically Deterministic Wallet ● Uses Master Extended Key (512 bits) ● Derives private keys and addresses ● Backup only the Master Extended Key ● Represented by a seed phrase (12-24 words out of 2048 standard word list) ● BIP32 standard (recover anywhere)
  • 5. Seed Phrase Not safe to invent your own seed phrase- humans are bad at randomness. Allow the wallet software to generate it. ● Two-factor seed phrases ● Encrypted with password ● Something you “have” + “know” ● “Seed extension”. “Extension word”, “13th/25th word” Warning: Forgetting this password will result in the bitcoin wallet and any contained money being lost. Do not overestimate your ability to remember passphrases especially when you may not use it very often.
  • 6. Storage of Bitcoin ● Protection against accidental loss ● Verification that the bitcoins are genuine ● Privacy and protection against spying ● Protection against theft ● Easy access for spending or moving bitcoins
  • 7. Protection From Loss ● Backup Seed Phrase ● Pencil and paper ● Even a damaged word is identifiable ● First four letters are enough to uniquely identify the word from the standard list
  • 8. Storing Seed Phrases ● Memorizing ● Metal engraving ● Chiseling into stone ● Writing on paper ● Acid free paper (archival) ● Use pencil - doesn’t fade ● Store in the dark ● No temperature or moisture extremes
  • 9. Bad Seed Phrase Storing ● Splitting the Seed Phrase into different locations weakens security. If one part is found - easier to brute force ● Use multisignature instead ● Adding decoy words to the list - bad idea - easy to weed out by comparing with the standard list
  • 10. Verification and Privacy - Run a Full Node ● Seed phrase stores private keys ● Wallet software verifies you received Bitcoin ● Full node verifies if Bitcoin is genuine ● Lightweight wallets (SPV) are good for smaller amounts or when you trust the sender ● SPV exposes to the full node all your addresses, balances and IP-address
  • 11. Protection from Theft ● Private keys = money ● On computer or smartphone private keys stored in memory and can be extracted remotely ● Hardware wallets keep private keys in a separate device and never share them
  • 12. Hardware Wallets Pros: ● Malware resistant internal storage for private keys ● Only transmits signed transactions, sometimes air gapped ● No risk even if computer is compromised Cons: ● Recognizable device ● Supply chain attacks ● Physical attacks ● Possible to extract keys with special equipment Special purpose security-hardened devices that is trusted to generate private keys and sign transactions.
  • 13. Multisignature Wallet ● Requires multiple signatures to send a tx ● Exponentially higher security - difficult to compromise several devices ● m-of-n signatures (3-of-5) ● Best used with Hardware wallets from different manufacturers ● Solution now: full node + electrum server + electrum wallet + HW ● No user-friendly solution yet
  • 14. Custodians Pros: ● Their security is better than yours ● Easy recovery and inheritance Cons: ● Honey pot for attackers, while you are not ● Inside job attacks ● Government seizure ● Not the same as bank (irreversible, not insured) Solution: Custodian keeps one key from a multisig, that can be used for recovery if you lose one of your keys, but not enough to spend your bitcoin
  • 15. $5-Wrench Attack ● Don’t talk about your wealth ● Use multsig with keys in multiple locations ● Bear arms, hire guards, rely on police or army There are two ways to beat this attack: by hiding or by defending yourself. You can't be your own bank without bank-level security.
  • 16. Tips ● Backup your seed phrase ● Never Keep Coins on Exchanges ● Don’t buy altcoins ● Learn about security ● Denis Serebryakov twitter.com/ThatCryptoTO