SlideShare a Scribd company logo
1 of 32
Download to read offline
PROTECTING
CRYPTOCURRENCY KEYS
DIMITRIS TSAPAKIDIS
@DIMITRIS
LINKEDIN.COM/IN/DIMITRIS
DECEMBER 2022
“THE ONLY MEANINGFUL
ADOPTION METRIC IS PEOPLE
WHO SELF CUSTODY BITCOIN”
@HODLONAUT
AGENDA
• Exchange & custodial threats
• Self-custody threats
• What to protect?
• How to protect?
NOT YOUR KEYS, NOT YOUR COINS
• Custodial wallets can be hacked
• Exchanges might not be solvent
• Bankruptcy takes years and you get cents on your Euro
• Exchanges selling you paper Bitcoin also suppress the price
• Exchanges might ask your for strict KYC and Source of Wealth
documentation
• Having exchanges hold a large % of all Bitcoin is a systemic risk
• Bitcoin is not valuable if it can be confiscated and you need to ask
permission to send it
NOT YOUR KEYS, NOT YOUR COINS
• Use 2 Factor Authentication, without SMS
• Watermark your KYC documents!
• Journey from exchange to personal custody
• Learn about sending coins to your personal (non-custodial) wallet
• Learn about sending coins between wallets
• Practice and become confident
• Buy a hardware wallet
• Don’t wait for a bank (exchange) run to start!
BITCOIN KEYS
abandon ability able about
above absent absorb
abstract absurd abuse
access accident account
accuse achieve acid
acoustic acquire across act
action actor actress actual
Mnemonic Seed
Phrase
Public
Private
Bitcoin private keys
Bitcoin receive addresses
0.3BTC 0.5BTC
THREATS
• Theft
• Destruction
• Take them with you to your grave
• Multiparty/Institutional ownership
• Receiving coins on your behalf: web server, teller/waiter
• Privacy
• Low-entropy keys
abandon ability able about
above absent absorb
abstract absurd abuse
access accident account
accuse achieve acid
acoustic acquire across act
action actor actress actual
Mnemonic Seed
Phrase
Public
Private
Bitcoin private keys
Bitcoin receive addresses
0.3BTC 0.5BTC
THREATS
• Dust
• Kidnap/robbery: https://github.com/jlopp/physical-bitcoin-attacks
TOOLS
• Use these tools to protect your coins
• They are building blocks to mix and match like LEGOs
FIRST RULE OF FIGHT CLUB
• Don’t talk about your Bitcoin
TIERED WALLETS
• Cellphone: spending cash
• Hardware wallet: savings
• Multisig with cold wallets: long term investments
MEMORIZE THE SEED PHRASE
• Useful if you have to walk from Syria to Germany and you have to
swim across the Mediterranean
abandon ability able about
above absent absorb
abstract absurd abuse
access accident account
accuse achieve acid
acoustic acquire across act
action actor actress actual
Mnemonic Seed
Phrase
CRYPTOSTEEL
• Store your seed phrase
• Protects against fire
• Protects against water
• Split in two: password and
encrypted seed
abandon ability able about
above absent absorb
abstract absurd abuse
access accident account
accuse achieve acid
acoustic acquire across act
action actor actress actual
Mnemonic Seed
Phrase
SAFETY DEPOSIT BOXES IN GREECE
• One master owner
• Multiple co-owners
• Can only access the box while the master own is alive
• When the master owner dies the box is sealed
• Opened in the presence of public notary, heirs, heir appraiser
and an appraiser sent by the tax office
GENERATE YOUR OWN SEED PHRASE
https://iancoleman.io/bip39/
abandon ability able about
above absent absorb
abstract absurd abuse
access accident account
accuse achieve acid
acoustic acquire across act
action actor actress actual
Mnemonic Seed
Phrase
KEYS NEVER EXPOSED
HARDWARE WALLETS
Key generation
Transaction signing
Devices are offline
Ledger
Trezor
Coldcard
RISKS OF SOFTWARE WALLETS
• Insecure, general-purpose computing devices
• Seed copied off screen
• Private keys stolen after you unlock your wallet
• Keyboard sniffers or learning/prediction algorithms
• Fake wallets
VERIFY DESTINATION ADDRESSES
• Are you sending money to
the correct address?
• Computer clipboard can be
altered
ONE ADDRESS PER TRANSACTION
• Wallets automatically
generate new addresses
• Preserve your privacy
• Preserve everyone’s privacy
DEAD MAN’S SWITCH
• “If something happens to
me” movie line
• Does nothing as long as we
are alive
• Acts when we stop
demonstrating signs of life
• Google’s Inactive Account
Manager
• Test it!
LAST WILL AND TESTAMENT
• Gifting €5,000 vs gifting
€500,000
• So your loved ones can
spend your coins
• Read articles by Pamela
Morgan https://medium.com/
@pamelawjd
SHAMIR’S SECRET SHARING
• Break any secret into X pieces
• At least Y pieces required to reconstruct the secret
• Y<=X
• e.g. 3 out of 5
• https://en.wikipedia.org/wiki/Shamir%27s_Secret_Sharing
MULTISIG ADDRESSES
MULTISIGNATURES
2 of 4 keys
MULTISIG USE CASES
• Authorizing payments as a group of people: 2 of 3: CEO, CFO,
Accountant
• Gift your coins to your descendants after you get hit by a bus: 2 of 4:
your phone, your hardware wallet, bank vault, a relative
• Use your coins with untrusted wallets: your phone, your computers,
bank vault. Optionally: go Seedless.
• Use your coins with an offsite wallet: your phone, authenticated
payment provider, bank vault. See https://greenaddress.it
• Payment escrow: 2 of 3: Buyer, Seller, Trusted Escrow Agent. See
https://www.openbazaar.org
MULTISIG WALLETS
• CoPay/Bitpay
• Electrum
• Casa (Seedless)
• Bluewallet
• Sparrow Wallet
• Multisig has extra backup requirements
• You need to backup a copy of everyone’s public key (xpub)
COLD WALLETS
• Private keys only used on an offline computer
• Private keys can be permanently or temporarily stored
• Can sign transactions
• http://docs.electrum.org/en/latest/coldstorage.html
abandon ability able about
above absent absorb
abstract absurd abuse
access accident account
accuse achieve acid
acoustic acquire across act
action actor actress actual
Mnemonic Seed
Phrase
Public
Private
Bitcoin private keys
WATCH-ONLY WALLETS
• Wallets with public addresses only
• Can view balance
• Can generate receive addresses
• Can generate transactions but cannot sign them (cold wallet will
do the signing)
• Can broadcast signed transactions
Public
Private
Bitcoin receive addresses
0.3BTC 0.5BTC
SEED BACKUP & RESTORE
• Restoring a seed might show no or less funds!!!
• Keep in mind derivation paths!
• You can try them all, there are only a few options
• Keep in mind the 20 address gap!
• Your family should also be aware of this
DISTRESS WALLET
• A distress wallet has some coins and looks plausible. You can give
up this wallet
• Offered by Ledger and Trezor
NLOCKTIME TRANSACTIONS
• Sign a transaction with nLockTime into the future e.g. next year
• Give the transaction to recipient
• Move the funds off your address if you are still alive and repeat
• Bitcoin Core wallet is introducing support for such non-standard
transactions
MOVE KEYS IN PARALLEL
• How to destroy your privacy:
• Bought a shiny new Trezor or Ledger and merged all your keys
into one
• Split your keys for a coin fork and merged all your keys into one
• You could clone keys one by one :) Some software to automate
the process would be great!
THANK YOU!

More Related Content

Similar to Protecting Cryptocurrency Keys 2022.pdf

Similar to Protecting Cryptocurrency Keys 2022.pdf (20)

Bitcoin
BitcoinBitcoin
Bitcoin
 
Defcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetDefcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internet
 
Introduction to Bitcoin and Crypto-currency
Introduction to Bitcoin and Crypto-currency Introduction to Bitcoin and Crypto-currency
Introduction to Bitcoin and Crypto-currency
 
Ashok misra presentation
Ashok misra presentationAshok misra presentation
Ashok misra presentation
 
Cryptocurrency, a deep dive
Cryptocurrency, a deep diveCryptocurrency, a deep dive
Cryptocurrency, a deep dive
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
How To Secure Your Cryptocurrency In 2020
How To Secure Your Cryptocurrency In 2020How To Secure Your Cryptocurrency In 2020
How To Secure Your Cryptocurrency In 2020
 
Flaying the Blockchain Ledger for Fun, Profit, and Hip Hop
Flaying the Blockchain Ledger for Fun, Profit, and Hip HopFlaying the Blockchain Ledger for Fun, Profit, and Hip Hop
Flaying the Blockchain Ledger for Fun, Profit, and Hip Hop
 
Crypto currency
Crypto currencyCrypto currency
Crypto currency
 
Bitcoin, Cryptocurrency, & Blockchain Presentation
Bitcoin, Cryptocurrency, & Blockchain PresentationBitcoin, Cryptocurrency, & Blockchain Presentation
Bitcoin, Cryptocurrency, & Blockchain Presentation
 
Bitcoin 101 &amp; the state of the industry
Bitcoin 101 &amp; the state of the industryBitcoin 101 &amp; the state of the industry
Bitcoin 101 &amp; the state of the industry
 
Amber & SnapChat - Presentation
Amber & SnapChat - PresentationAmber & SnapChat - Presentation
Amber & SnapChat - Presentation
 
Digital Hygiene for Nomads
Digital Hygiene for NomadsDigital Hygiene for Nomads
Digital Hygiene for Nomads
 
[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners
[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners
[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners
 
Crypto Presentation
Crypto PresentationCrypto Presentation
Crypto Presentation
 
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsA Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
 
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsA Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
 
What is a blockchain?
What is a blockchain? What is a blockchain?
What is a blockchain?
 
Bitcoin 101 - Certified Bitcoin Professional Training Session
Bitcoin 101 - Certified Bitcoin Professional Training SessionBitcoin 101 - Certified Bitcoin Professional Training Session
Bitcoin 101 - Certified Bitcoin Professional Training Session
 
Blockchain and security v3
Blockchain and security v3Blockchain and security v3
Blockchain and security v3
 

Recently uploaded

CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
Wonjun Hwang
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 

Recently uploaded (20)

Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 

Protecting Cryptocurrency Keys 2022.pdf

  • 2. “THE ONLY MEANINGFUL ADOPTION METRIC IS PEOPLE WHO SELF CUSTODY BITCOIN” @HODLONAUT
  • 3. AGENDA • Exchange & custodial threats • Self-custody threats • What to protect? • How to protect?
  • 4. NOT YOUR KEYS, NOT YOUR COINS • Custodial wallets can be hacked • Exchanges might not be solvent • Bankruptcy takes years and you get cents on your Euro • Exchanges selling you paper Bitcoin also suppress the price • Exchanges might ask your for strict KYC and Source of Wealth documentation • Having exchanges hold a large % of all Bitcoin is a systemic risk • Bitcoin is not valuable if it can be confiscated and you need to ask permission to send it
  • 5. NOT YOUR KEYS, NOT YOUR COINS • Use 2 Factor Authentication, without SMS • Watermark your KYC documents! • Journey from exchange to personal custody • Learn about sending coins to your personal (non-custodial) wallet • Learn about sending coins between wallets • Practice and become confident • Buy a hardware wallet • Don’t wait for a bank (exchange) run to start!
  • 6. BITCOIN KEYS abandon ability able about above absent absorb abstract absurd abuse access accident account accuse achieve acid acoustic acquire across act action actor actress actual Mnemonic Seed Phrase Public Private Bitcoin private keys Bitcoin receive addresses 0.3BTC 0.5BTC
  • 7. THREATS • Theft • Destruction • Take them with you to your grave • Multiparty/Institutional ownership • Receiving coins on your behalf: web server, teller/waiter • Privacy • Low-entropy keys abandon ability able about above absent absorb abstract absurd abuse access accident account accuse achieve acid acoustic acquire across act action actor actress actual Mnemonic Seed Phrase Public Private Bitcoin private keys Bitcoin receive addresses 0.3BTC 0.5BTC
  • 8. THREATS • Dust • Kidnap/robbery: https://github.com/jlopp/physical-bitcoin-attacks
  • 9. TOOLS • Use these tools to protect your coins • They are building blocks to mix and match like LEGOs
  • 10. FIRST RULE OF FIGHT CLUB • Don’t talk about your Bitcoin
  • 11. TIERED WALLETS • Cellphone: spending cash • Hardware wallet: savings • Multisig with cold wallets: long term investments
  • 12. MEMORIZE THE SEED PHRASE • Useful if you have to walk from Syria to Germany and you have to swim across the Mediterranean abandon ability able about above absent absorb abstract absurd abuse access accident account accuse achieve acid acoustic acquire across act action actor actress actual Mnemonic Seed Phrase
  • 13. CRYPTOSTEEL • Store your seed phrase • Protects against fire • Protects against water • Split in two: password and encrypted seed abandon ability able about above absent absorb abstract absurd abuse access accident account accuse achieve acid acoustic acquire across act action actor actress actual Mnemonic Seed Phrase
  • 14. SAFETY DEPOSIT BOXES IN GREECE • One master owner • Multiple co-owners • Can only access the box while the master own is alive • When the master owner dies the box is sealed • Opened in the presence of public notary, heirs, heir appraiser and an appraiser sent by the tax office
  • 15. GENERATE YOUR OWN SEED PHRASE https://iancoleman.io/bip39/ abandon ability able about above absent absorb abstract absurd abuse access accident account accuse achieve acid acoustic acquire across act action actor actress actual Mnemonic Seed Phrase
  • 16. KEYS NEVER EXPOSED HARDWARE WALLETS Key generation Transaction signing Devices are offline Ledger Trezor Coldcard
  • 17. RISKS OF SOFTWARE WALLETS • Insecure, general-purpose computing devices • Seed copied off screen • Private keys stolen after you unlock your wallet • Keyboard sniffers or learning/prediction algorithms • Fake wallets
  • 18. VERIFY DESTINATION ADDRESSES • Are you sending money to the correct address? • Computer clipboard can be altered
  • 19. ONE ADDRESS PER TRANSACTION • Wallets automatically generate new addresses • Preserve your privacy • Preserve everyone’s privacy
  • 20. DEAD MAN’S SWITCH • “If something happens to me” movie line • Does nothing as long as we are alive • Acts when we stop demonstrating signs of life • Google’s Inactive Account Manager • Test it!
  • 21. LAST WILL AND TESTAMENT • Gifting €5,000 vs gifting €500,000 • So your loved ones can spend your coins • Read articles by Pamela Morgan https://medium.com/ @pamelawjd
  • 22. SHAMIR’S SECRET SHARING • Break any secret into X pieces • At least Y pieces required to reconstruct the secret • Y<=X • e.g. 3 out of 5 • https://en.wikipedia.org/wiki/Shamir%27s_Secret_Sharing
  • 24. MULTISIG USE CASES • Authorizing payments as a group of people: 2 of 3: CEO, CFO, Accountant • Gift your coins to your descendants after you get hit by a bus: 2 of 4: your phone, your hardware wallet, bank vault, a relative • Use your coins with untrusted wallets: your phone, your computers, bank vault. Optionally: go Seedless. • Use your coins with an offsite wallet: your phone, authenticated payment provider, bank vault. See https://greenaddress.it • Payment escrow: 2 of 3: Buyer, Seller, Trusted Escrow Agent. See https://www.openbazaar.org
  • 25. MULTISIG WALLETS • CoPay/Bitpay • Electrum • Casa (Seedless) • Bluewallet • Sparrow Wallet • Multisig has extra backup requirements • You need to backup a copy of everyone’s public key (xpub)
  • 26. COLD WALLETS • Private keys only used on an offline computer • Private keys can be permanently or temporarily stored • Can sign transactions • http://docs.electrum.org/en/latest/coldstorage.html abandon ability able about above absent absorb abstract absurd abuse access accident account accuse achieve acid acoustic acquire across act action actor actress actual Mnemonic Seed Phrase Public Private Bitcoin private keys
  • 27. WATCH-ONLY WALLETS • Wallets with public addresses only • Can view balance • Can generate receive addresses • Can generate transactions but cannot sign them (cold wallet will do the signing) • Can broadcast signed transactions Public Private Bitcoin receive addresses 0.3BTC 0.5BTC
  • 28. SEED BACKUP & RESTORE • Restoring a seed might show no or less funds!!! • Keep in mind derivation paths! • You can try them all, there are only a few options • Keep in mind the 20 address gap! • Your family should also be aware of this
  • 29. DISTRESS WALLET • A distress wallet has some coins and looks plausible. You can give up this wallet • Offered by Ledger and Trezor
  • 30. NLOCKTIME TRANSACTIONS • Sign a transaction with nLockTime into the future e.g. next year • Give the transaction to recipient • Move the funds off your address if you are still alive and repeat • Bitcoin Core wallet is introducing support for such non-standard transactions
  • 31. MOVE KEYS IN PARALLEL • How to destroy your privacy: • Bought a shiny new Trezor or Ledger and merged all your keys into one • Split your keys for a coin fork and merged all your keys into one • You could clone keys one by one :) Some software to automate the process would be great!