Bitcoin Forum
November 07, 2024, 10:05:49 AM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: [1]
1  Alternate cryptocurrencies / Altcoin Discussion / Re: How to write an Ethereum Smart Contract for an ICO - WildCrypto.com on: August 28, 2017, 07:24:00 PM
This is a lazy money-grab.
2  Bitcoin / Bitcoin Technical Support / Re: Instructions on Crypto Security for high-risk individuals on: August 19, 2017, 09:42:11 PM
however most wallets are mainly designed for Windows and OS X as these are the major players. Linux is often heavily neglected, unfortunately.
That's not true at all. Most wallets are developed on and designed for linux systems as most developers prefer using linux. Linux is often the best supported system since that is where development and testing happens. For both Bitcoin Core and Armory, wallets are developed on Linux and only tested on Windows and OSX briefly and by few people. OSX is often most heavily neglected.

Yep, most of the wallets are actually by default made for GNU/Linux systems and then ported/compiled for windows as well. I would not personally trust windows system with any kind of money related things (for obvious reasons). However i do not think that most GNU/Linux users even need guides for how to safely generate provate keys and such, because most users have enough technical skills to do that. Only way i would be using windows for crptos, would be for example generating the seed on the Ledger Wallet livecd, disconnected from the internet. Revealing or generating your seed on windows is a really bad idea if you care about your coins.

Thinking that Linux is inherently safer than Windows is a common fallacy that has been propagated by word of mouth for years. It simply isn't true. Windows is getting attacked more because there is an actual economic incentive for hackers. It's by far the most used operating system that almost everyone has used at one point in their lives. People take the time to develop malware for it because there is a payoff! Linux is only used by a very small minority which renders the development of sophisticated malware unprofitable.

That's why your statement is completely nonsensical. An airgapped Windows computer won't differ at all from an airgapped Linux machine. We aren't talking about online machines where Windows obviously faces more attack vectors due to economic incentives.

I hope I could clarify it for you now Smiley
3  Alternate cryptocurrencies / Service Announcements (Altcoins) / Re: [ANN][EXCHANGE] WCX – Low-Cost Crypto Exchange built by Apple & Wall St team on: August 18, 2017, 03:43:09 PM
The token sale isn't accessible to U.S investors because your token is a security. Will you comply with other countries securities regulations or just avoid them as well?

How come WCX haven't answered my question?

You guys need to wake up. WCX sell a token that will share future profits with its holders. This means that they are selling UNREGISTERED securities to you people. That's the reason why they are so secretive about their operations as well because this is a fraud. They are not allowed to sell such securities to unaccredited investors, yet they are happily taking your money.

They are trying to circumvent this by excluding U.S investors yet they fail to realise that other countries have strict security laws too.

Wake up people... This is nothing more than a quick money grab.



Calm down, only in US SEC made an annoucement about treating tokens as securities. The rest of the world don't have such a strict laws, we don't need accredited investors, it's all legal.

It doesn't matter whether they announce it or not. If you share profits with owners of a token, it's a security. It's as easy as that. If you don't register securities and sell them to unaccredited investors, you will get caught eventually.

You are also lying that other countries don't have similar strict security laws. Germany has a very similar "Aktiengesetz" (securities law) in place that came into effect in 1937, 3 years after the SEC was founded in the U.S.

I am just trying to warn people that projects like these that sell unregistered securities are ticking time bombs. If you are in here to flip it, that's ok. If you are here because you think of this as a serious long-term investment, you should think twice about it.

Why do you keep being so evasive, WCX?

People, please do NOT invest into this project. Do not get scammed!
4  Alternate cryptocurrencies / Service Announcements (Altcoins) / Re: [ANN][EXCHANGE] WCX – Low-Cost Crypto Exchange built by Apple & Wall St team on: August 17, 2017, 10:08:16 AM
The token sale isn't accessible to U.S investors because your token is a security. Will you comply with other countries securities regulations or just avoid them as well?

How come WCX haven't answered my question?

You guys need to wake up. WCX sell a token that will share future profits with its holders. This means that they are selling UNREGISTERED securities to you people. That's the reason why they are so secretive about their operations as well because this is a fraud. They are not allowed to sell such securities to unaccredited investors, yet they are happily taking your money.

They are trying to circumvent this by excluding U.S investors yet they fail to realise that other countries have strict security laws too.

Wake up people... This is nothing more than a quick money grab.



Calm down, only in US SEC made an annoucement about treating tokens as securities. The rest of the world don't have such a strict laws, we don't need accredited investors, it's all legal.

It doesn't matter whether they announce it or not. If you share profits with owners of a token, it's a security. It's as easy as that. If you don't register securities and sell them to unaccredited investors, you will get caught eventually.

You are also lying that other countries don't have similar strict security laws. Germany has a very similar "Aktiengesetz" (securities law) in place that came into effect in 1937, 3 years after the SEC was founded in the U.S.

I am just trying to warn people that projects like these that sell unregistered securities are ticking time bombs. If you are in here to flip it, that's ok. If you are here because you think of this as a serious long-term investment, you should think twice about it.

5  Alternate cryptocurrencies / Service Announcements (Altcoins) / Re: [ANN][EXCHANGE] WCX – Low-Cost Crypto Exchange built by Apple & Wall St team on: August 17, 2017, 07:38:37 AM
The token sale isn't accessible to U.S investors because your token is a security. Will you comply with other countries securities regulations or just avoid them as well?

How come WCX haven't answered my question?

You guys need to wake up. WCX sell a token that will share future profits with its holders. This means that they are selling UNREGISTERED securities to you people. That's the reason why they are so secretive about their operations as well because this is a fraud. They are not allowed to sell such securities to unaccredited investors, yet they are happily taking your money.

They are trying to circumvent this by excluding U.S investors yet they fail to realise that other countries have strict security laws too.

Wake up people... This is nothing more than a quick money grab.

6  Alternate cryptocurrencies / Service Announcements (Altcoins) / Re: [ANN][EXCHANGE] WCX – Low-Cost Crypto Exchange built by Apple & Wall St team on: August 16, 2017, 03:07:13 PM
The token sale isn't accessible to U.S investors because your token is a security. Will you comply with other countries securities regulations or just avoid them as well?
7  Other / Beginners & Help / Re: Bulletproof strategies for securing your Wallets on: August 16, 2017, 10:41:33 AM
Quote
The Electrum wallet installer gives a warning message when uploading that file to Virustotal.com, it comes up with a Palo Alto Networks generic.ml warning. Does anyone else have this happen too with the latest download from the Electrum wallet site? Is this of concern?

Electrum is legit. It's a false positive. You can always google stuff like that.

Quote
Also, how do you check the checksums with that onlinemd5.com site or with GPG4Win? I've never done that before.

You upload the file to the site and see if its checksum is equal to the provided string of the alleged checksum. This is usually not that strong since if a hacker compromised the download he will also most likely have changed the checksum. As to GPG4Win, there should be tutorials. Essentially you create your own key pair in Kleopatra. Then you download the keys from the entity whose file you are trying to verify (e.g. VeraCrypt). You should sign their identity with your private key in Kleopatra to make them show up as trusted. You can then download the GPG-signed .asc file from them and check by using GPG4Win's tools to see if the file is still from VeraCrypt. It's a bit hard to explain but there are plenty of tutorials on the web. You will not be alone.

Quote
I have to say that your post is a fantastic post for securing your wallet in a bulletproof manner. I've just got to get my head around it all lol

Thank you. I highly appreciate it. There are many articles on crypto security, but most just end up recommending hardware wallets. While I agree that it is the most convenient way for most people to go with, it doesn't have plausible deniability. My methods are definitely overkill for most people, however if I were to store any significant amount of cryptocurrency, I'd do it this way.

I have also opened a separate thread for people to view the strategy. I have refined some explanations. Here it is if you want to follow it:

https://bitcointalk.org/index.php?topic=2093647.msg20917116#msg20917116
8  Bitcoin / Bitcoin Technical Support / Re: Instructions on Crypto Security for high-risk individuals on: August 16, 2017, 09:41:34 AM
Great and detailed instruction, however it is basically made for windows users and everyone knows there is no security attached to windows systems.
So i think you should mention on the post that Windows is NEVER safe at all, so the people can now that this is not a bomb proof tutorial.
If you connect the "Air-Gapped" machine into internet even once, that can be exploited if the Windows Image for example is not clean, or you do not erase the drive right after (Yes, old files can be recovered even if deleted). So i would not call this the ultimate tinfoil information, but still great. I would personally just if i wanted to go ultimate tinfoil do it like this:

  • Remove all of the storage media from the PC, as well as all wireless communications like wifi adapters, bluetooth and such.
  • Boot example from tails and use the built in electrum software for generating the keys.
  • Never connect that instance to internet, or save anything. You can store the seed for example on a paper (if you trust that no one will break into your house or you will not lose it), or you can hide part of the seed around your house for example in safe places if you are holding a huge amount of bitcoin. Or you can for easier approach to store the seed on a USB stick on encrypted container that can only be opened with your Veracrypt password.
  • Never, ever import the seed to a computer that has a windows install. Even if fresh install, you are still looking for trouble. You can sign transactions offline as well, so there is no need to reveal your private key to the internet.

That's my opinion, because i think the guide is still not as secure as it could be but im sure many people will find your tutorial helpful.

Thanks for your feedback, onnz. It's highly appreciated.

You are definitely right in that my tutorial was narrated out of the perspective of a Windows user. I know that Windows is often horrendous (I prefer Ubuntu for dev tasks), however most wallets are mainly designed for Windows and OS X as these are the major players. Linux is often heavily neglected, unfortunately. Nevertheless, other platforms such as OS X, have similar or identical counterparts to the tools used in the instructions (VeraCrypt has an OS X implementation) so my tutorial is "cross-platform compatible" Wink

I also think that your concerns towards Windows are over exaggerated. Windows will always be poisoned with security holes due to its closed source nature, however, as long as you make sure that the machine is in an completely airgapped state (no internet and no external communication possibilities such as Bluetooth, Wifi etc. like you described) then there's absolutely no difference whether you run Windows, Linux (Tails) or OS X.

Tails is an awesome operating system. I love Tor too. It's a very tight, well thought-out, security-conscious and privacy-oriented system. If it wasn't for so many "shitcoins" Wink having only Windows wallets and lots of software only being available to Windows, I'd definitely use it as my main system. It's far better in all other aspects.

Your remaining instructions seem pretty similar to the ones described in my tutorial. So I think that we agree on that :- )

All in all, security is a never ending struggle. There is always some kind of small loophole that could wreck the whole thing. My proposal tries to offer a reliable solution even for high-threat targets.
9  Bitcoin / Bitcoin Technical Support / Instructions on Crypto Security for high-risk individuals on: August 16, 2017, 08:01:07 AM
I have compiled instructions for you on how to setup an actual bulletproof strategy for securing your coins that outperforms any kind of hardware wallet in high-threat scenarios. Hope you enjoy.

Tools used in this tutorial: GPG4Win and VeraCrypt. This tutorial is from the perspective of a Windows user since the most wallet software is on Windows. However, this tutorial is cross-platform compatible since these tools have equivalent counterparts on other operating systems.

1. Download the wallet software from a malware-free and up-to-date computing device and verify its checksums using http://onlinemd5.com/ (or check the GPG signature inside GPG4Win) and upload it to https://www.virustotal.com/en/ to check for any viruses. Sometimes there are false positives, but it's generally better to be safe than sorry.

2. Put that software onto a cleanly formatted(!) flash drive and plug it into an airgapped (airgapped = this computer is not and has not been connected to the internet), malware-free computing device. If you have an old laptop lying around; wipe its harddrive and install a fresh new instance of your preferred operating system (most wallet software uses Windows). You can also use an Raspberry PI or any computing device that can be used as an independent and dedicated computing device that is able to host the software you are trying to use. It's important that you do not EVER connect that dedicated computing device to the internet after you have installed any of your wallet software (even in fact you should not be using it beforehand because malware could accumulate). I'm saying this, because the wallet software you downloaded could have been compromised at some point where the attackers have added in code that sends your private keys to their command-and-control (C&C) servers. Plain malware or even ransomware is known to search through the wallet file directories and send any file found to their C&C servers. It's even more likely though that the attackers have compromised the pseudo-randomness of the key generation algorithm giving them the ability to regenerate your key pairs deterministically. This could especially be the case with lesser known wallet software. Make sure that this is not the case by performing your due diligence on the wallet providers and the software.

3. Install the wallet software on your dedicated machine. Now you have two options: a) Generate some wallets inside the software by letting it create a new seed. b) Create the seed yourself by using dice in order to wipe out any chance of someone having compromised the pseudo-randomness of the wallet's software's algorithms. This is the mega tinfoil hat case, however this can be a serious threat to anyone. If you want to do this for Bitcoin, you can go to https://www.bitaddress.org , download the HTML page file and transfer it via a flash drive safely and securely to your airgapped machine. Open it there and in the "Wallet Details" section, you will be able to find instructions on how to use an actual dice (use a high-quality casino dice that has sharp edges) to generate a private key. You can also find instructions online on how to generate entire seeds using high-quality dices to guarantee real randomness for the safety of your crypto assets. For the average user, this seems like a stretch, however this is an unnecessary risk that can be eliminated easily.

5. Now write down the seeds into a text file on your airgapped machine and back them up on a couple of freshly formatted and clean flash drives distinct from the one that you transferred your files with (also delete the seed text files from your airgapped machine). You can also backup the encrypted wallet files and their passwords alongside the text file/s containing the seeds for even more redundancy.

6. You can now also encrypt these backup drives with a disk encryption tool of your choice (this would be your double encryption). I can highly recommend VeraCrypt. You can create a standard volume on any partition of a flash drive that will host and encrypt any files that are subsequently put into it. Once you mount the volume (only ever mount it on the airgapped machine which you make sure is at all times and costs malware-free), the files are only ever decrypted in RAM and stay on your flash drive at all times which means that your files remain encrypted even in the event of a sudden power outage. You should use a relatively long high-entropy password or a very long and mnemonic passphrase (with lots of cleverly put characters, symbols and numbers) for the disk encryption (in VeraCrypt you can also use PIMs and keyfiles (although I would suggest only using PIMs) for EVEN MORE security). I would recommend the latter so that you have it memorized incase something unexpected happens. Nevertheless you should still write down that password onto a small (hardly noticeable) sheet of paper in its full length. Store that somewhere CLOSE to you (somewhere people wouldn't bother to search incase of high-risk scenarios) and don't store it alongside your backups. You shouldn't ever need it because you should be able to remember your passphrase at all times. Distribute your encrypted backups in your house, at a safety deposit box at your bank, at houses of your relatives etc. Once again, hide them somewhere people don't expect them and make sure that not all the backups are exposed to similar environmental risks (e.g. a flood or fire inside one of the buildings). Incase you are still not paranoid enough, you can also write down the seeds on two distinct sheets of paper where you write down the first half on one sheet and the second on the other. You could then also distribute them in two distinct places and place them somewhere people wouldn't search for them. This method involves more risk because if someone found one half of the seed they could potentially be able to bruteforce the entire seed in some cases.

As far as the backups are concerned, this is the best practice I can come up with. If you are a high-profile and high-threat individual (someone could use extortion to get the passphrase and PIM to your backups) I would also recommend looking into VeraCrypt's hidden volumes. They allow you to create a standard volume on one of your drives that has an inner pointer to an outer hidden volume that requires a different password in order to be mounted. At all times, it cannot be proven from an attacker that the drive actually contains a hidden volume, if certain conditions are met. This means if someone is pointing a gun to your head demanding your passphrase (expecting to find the backups on there), you could give them the password for your standard volume. Into that standard volume, you should place some sensitive-looking files (if a potential attacker is likely to search for Bitcoin then you could place some wallet file in there with a minor part of your Bitcoin stash) in there, however the actual files that you are desperately trying to hide will be placed inside the hidden volume. So for instance, a wealthy individual could place 1000 BTC into the hidden volume and 10 BTC into the standard volume in order to preserve their life in high-threat situations. If they ask for more or for the password to the hidden volume, you have a good excuse that it does not exist. This is called plausible deniability and it's a very important concept.

The concept of hidden volumes can even be expanded onto operating systems which VeraCrypt has already done. In this case, you do a full disk system encryption and setup a hidden volume on a separate partition on your harddrive. Then you install a new fresh instance of your preferred operating system on the hidden partition. Whenever your computer boots, it asks for the encryption passphrase and PIM. If you enter the combination for the standard volume, you will access your decoy operating system. This is the OS you should give the attacker access to in case of extortion. Place some sensitive-looking files in there or even a minority of your coin stash depending on your risk profile. If you enter the combination for the hidden volume, you will be entering your hidden operating system. This is like the hidden volume; for the actual sensitive files that you are trying to preserve at all costs. So this allows for plausible deniability and encryption on the full system level. For more important information and crucial security and behavioral practices in case of high-threat scenarios, check out VeraCrypt's documentation (https://veracrypt.codeplex.com/wikipage?title=VeraCrypt%20Hidden%20Operating%20System).

Installing a hidden operating system on your machines seems like a practical idea. This also directly solves the question: "How do I protect the wallet files on my airgapped machine incase I am not near it?" because the system is now fully encrypted and the only thing an attacker can do is destroy it at this point. In this case, you can also leave the passwords to your encrypted wallet files inside the hidden operating system. You might ask now: "Why do I still need to encrypt the wallet with the wallet software's inbuilt encryption algorithm at this point? The hidden OS takes care of all of this now, right?" Leaving your wallet exposed like that still exposes you to the risk of installing a malicious software that constantly sends out queries to send out your private keys or wallet files to its C&C server just in case that you should ever connect to the internet. That's why you should NEVER connect to the internet on that DEDICATED machine.

Now that you have set up your bulletproof cold storage, you can monitor your wallets on an internet-connected machine (e.g. for BTC on Electrum you would transfer the master public key) that is in sync with the specific blockchain and send transactions via a dedicated malware-free transfer flash drive to the airgapped machine. Then you sign off the transaction on the dedicated machine, transfer it back via a flash drive and broadcast it on the online machine onto the specific P2P network.

This is the ultimate tinfoil hat strategy. This is as bulletproof as crypto security can get. It surpasses the security of every hardware wallet, because this allows you to have plausible deniability in case the attackers manage to find your devices. It is not as convenient, however it is designed to potentially preserve the life of high-profile and high-threat individuals in high-pressure situations.

Please let me know if there are any kind of errors. I would also love to hear your feedback on these methods. Thanks for reading
10  Other / Beginners & Help / Re: Bulletproof strategies for securing your Wallets on: August 16, 2017, 07:43:29 AM
I have compiled instructions for you on how to setup an actual bulletproof strategy for securing your coins that outperforms any kind of hardware wallet in high-threat scenarios.

1. Download the wallet software from a malware-free and up-to-date computing device and verify its checksums using http://onlinemd5.com/ (or check the GPG signature inside GPG4Win) and upload it to https://www.virustotal.com/en/ to check for any viruses. Sometimes there are false positives, but it's generally better to be safe than sorry (like you already said).

2. Put that software onto a cleanly formatted(!) flash drive and plug it into an airgapped (airgapped = this computer is not and has not been connected to the internet), malware-free computing device. If you have an old laptop lying around; wipe its harddrive and install a fresh new instance of your preferred operating system (most wallet software uses Windows). You can also use an Raspberry PI or any computing device that can be used as an independent and dedicated computing device that is able to host the software you are trying to use. It's important that you do not EVER connect that dedicated computing device to the internet after you have installed any of your wallet software (even in fact you should not be using it beforehand because malware could accumulate). I'm saying this, because the wallet software you downloaded could have been compromised at some point where the attackers have added in code that sends your private keys to their command-and-control (C&C) servers. Plain malware or even ransomware is known to search through the wallet file directories and sending any file found to their C&C servers. It's even more likely though that the attackers have compromised the pseudo-randomness of the key generation algorithm giving them the ability to regenerate your key pairs deterministically. This could especially be the case with lesser known wallet software. Make sure that this is not the case by performing your due diligence on the wallet providers and the software.

3. Install the wallet software on your dedicated machine. Now you have two options: a) Generate some wallets inside the software by letting it create a new seed. b) Create the seed yourself by using dice in order to wipe out any chance of someone having compromised the pseudo-randomness of the wallet's software's algorithms. This is the mega tinfoil hat case, however this can be a serious threat to anyone. If you want to do this for Bitcoin, you can go to https://www.bitaddress.org , download the HTML page file and transfer it via a flash drive safely and securely to your airgapped machine. Open it there and in the "Wallet Details" section, you will be able to find instructions on how to use an actual dice (use a high-quality casino dice that has sharp edges) to generate a private key. You can also find instructions online on how to generate entire seeds using high-quality dices to guarantee real randomness for the safety of your crypto assets. For the average user, this seems like a stretch, however this is an unnecessary risk that can be eliminated easily.

5. Now write down the seeds into a text file on your airgapped machine and back them up on a couple of freshly formatted and clean flash drives distinct from the one that you transferred your files with (also delete the seed text files from your airgapped machine). You can also backup the encrypted wallet files and their passwords alongside the text file/s containing the seeds for even more redundancy.

6. You can now also encrypt these backup drives with a disk encryption tool of your choice (this would be your double encryption). I can highly recommend VeraCrypt. You can create a standard volume on any partition of a flash drive that will host and encrypt any files that are subsequently put into it. Once you mount the volume (only ever mount it on the airgapped machine which you make sure is at all times and costs malware-free), the files are only ever decrypted in RAM and stay on your flash drive at all times which means that your files remain encrypted even in the event of a sudden power outage. You should use a relatively long high-entropy password or a very long and mnemonic passphrase (with lots of cleverly put characters, symbols and numbers) for the disk encryption (in VeraCrypt you can also use PIMs and keyfiles (although I would suggest only using PIMs) for EVEN MORE security). I would recommend the latter so that you have it memorized incase something unexpected happens. Nevertheless you should still write down that password onto a small (hardly noticeable) sheet of paper in its full length. Store that somewhere CLOSE to you (somewhere people wouldn't bother to search incase of high-risk scenarios) and don't store it alongside your backups. You shouldn't ever need it because you should be able to remember your passphrase at all times. Distribute your encrypted backups in your house, at a safety deposit box at your bank, at houses of your relatives etc. Once again, hide them somewhere people don't expect them and make sure that not all the backups are exposed to similar environmental risks (e.g. a flood or fire inside one of the buildings). Incase you are still not paranoid enough, you can also write down the seeds on two distinct sheets of paper where you write down the first half on one sheet and the second on the other. You could then also distribute them in two distinct places and place them somewhere people wouldn't search for them. This method involves more risk because if someone found one half of the seed they could potentially be able to bruteforce the entire seed in some cases.

As far as the backups are concerned, this is the best practice I can come up with. If you are a high-profile and high-threat individual (someone could use extortion to get the passphrase and PIM to your backups) I would also recommend looking into VeraCrypt's hidden volumes. They allow you to create a standard volume on one of your drives that has an inner pointer to an outer hidden volume that requires a different password in order to be mounted. At all times, it cannot be proven from an attacker that the drive actually contains a hidden volume, if certain conditions are met. This means if someone is pointing a gun to your head demanding your passphrase (expecting to find the backups on there), you could give them the password for your standard volume. Into that standard volume, you should place some sensitive-looking files (if a potential attacker is likely to search for Bitcoin then you could place some wallet file in there with a minor part of your Bitcoin stash) in there, however the actual files that you are desperately trying to hide will be placed inside the hidden volume. So for instance, a wealthy individual could place 1000 BTC into the hidden volume and 10 BTC into the standard volume in order to preserve their life in high-threat situations. If they ask for more or for the password to the hidden volume, you have a good excuse that it does not exist. This is called plausible deniability and it's a very important concept.

The concept of hidden volumes can even be expanded onto operating systems which VeraCrypt has already done. In this case, you do a full disk system encryption and setup a hidden volume on a separate partition on your harddrive. Then you install a new fresh instance of your preferred operating system on the hidden partition. Whenever your computer boots, it asks for the encryption passphrase and PIM. If you enter the combination for the standard volume, you will access your decoy operating system. This is the OS you should give the attacker access to in case of extortion. Place some sensitive-looking files in there or even a minority of your coin stash depending on your risk profile. If you enter the combination for the hidden volume, you will be entering your hidden operating system. This is like the hidden volume; for the actual sensitive files that you are trying to preserve at all costs. So this allows for plausible deniability and encryption on the full system level. For more important information and crucial security and behavioral practices in case of high-threat scenarios, check out VeraCrypt's documentation (https://veracrypt.codeplex.com/wikipage?title=VeraCrypt%20Hidden%20Operating%20System).

Installing a hidden operating system on your machines seems like a practical idea. This also directly solves the question: "How do I protect the wallet files on my airgapped machine incase I am not near it?" because the system is now fully encrypted and the only thing an attacker can do is destroy it at this point. In this case, you can also leave the passwords to your encrypted wallet files inside the hidden operating system. You might ask now: "Why do I still need to encrypt the wallet with the wallet software's inbuilt encryption algorithm at this point? The hidden OS takes care of all of this now, right?" Leaving your wallet exposed like that still exposes you to the risk of installing a malicious software that constantly sends out queries to send out your private keys or wallet files to its C&C server just in case that you should ever connect to the internet. That's why you should NEVER connect to the internet on that DEDICATED machine.

Now that you have set up your bulletproof cold storage, you can monitor your wallets on an internet-connected machine (e.g. for BTC on Electrum you would transfer the master public key) that is in sync with the specific blockchain and send transactions via a dedicated malware-free transfer flash drive to the airgapped machine. Then you sign off the transaction on the dedicated machine, transfer it back via a flash drive and broadcast it on the online machine onto the specific P2P network.

This is the ultimate tinfoil hat strategy. This is as bulletproof as crypto security can get. It surpasses the security of every hardware wallet, because this allows you to have plausible deniability in case the attackers manage to find your devices. It is not as convenient, however it is designed to potentially preserve the life of high-profile and high-threat individuals in high-pressure situations.

Please let me know if there are any kind of errors.
11  Bitcoin / Bitcoin Discussion / Re: Why Cryptocurrencies Will Never Be Safe Havens on: August 15, 2017, 09:32:58 PM
Bitcoin and all cryptocurrencies are so volatile against fiat currency pairs because of their relatively small market caps. BTC/USD has had an average volatility of 5.41% in the past 60 days.

As of July 12, the total amount of USD in circulation was approximately $1.56 trillion according to the Fed. The ECB has reported similar € amounts to be in circulation. In comparison to BTC/USD, the EUR/USD pair has had an average volatility of 0.73% in the past.

Deeper injections or ejections of capital are required to move legacy markets simply because of their larger market caps. To move BTC/USD 1% ($67 billion market cap as right now), it requires $670 million. To move EUR/USD 1%, it would require at least 100X of that.

Obviously these are very rough and not necessarily spot-on metrics, but they provide a nice view as to why Bitcoin is yet to be regarded as a serious stable medium of exchange, store of value and unit of account (never mind other cryptocurrencies). It is neither of those three.

If we really want to achieve mass adoption and these three necessary proporties of money, we need to achieve these four milestones:

1) Large injections of capital that has lost trust in legacy finance and is willing to withstand the inevitable repetitions of the emotional market cycle on the way to mainstream adoption (smart money). This could happen in the case of an systemic failure in the legacy fiat system fuelled by an exuberant credit bubble.

2) An ever-growing market cap will result in reduced volatility which will increase the credibility of Bitcoin to become 'actual' stable money, fuelling further adoption and reducing volatility and so on..

3) Finally scaling Bitcoin unanimously. No normie will ever take Bitcoin seriously if people keep forking off to create yet another useless altcoin. I'm not a Bitcoin maximalist and lots of altcoins have very interesting technologies, however we need to be honest that many altcoins are trash. SegWit is being activated on the original Bitcoin chain and its way leading us to LN should be finally letting us open the last steps towards mainstream adoption. LN will also allow for atomic cross-chain swaps (essentially blockchain interoperability) that will also allow to enhance the credibility of many altcoins for actual use cases. These technologies could finally provide a gateway to a yet uncharted revolutionary multi-currency financial network that defeats any fiat currency payment network ever created.

4) People will need to start doing commerce with Bitcoin and other cryptocurrencies without needing to exchange its amount to a fiat currency afterwards. There has been a lot of commerce in Bitcoin already, however Bitcoin is still only a proxy for fiat for the vast majority of people.




12  Alternate cryptocurrencies / Announcements (Altcoins) / Re: [ANN][ICO] How blockchain can disrupt online lottery on: August 06, 2017, 04:41:42 PM
The idea is great, but...

..the paper seems very vague to me. 3/4 is basically bragging about how big of a market they could be disrupting. There is only vague information about the design of their architecture.

I also think that it's strange that they will refund all the tokens if they don't reach a certain threshold.

Seems like a red flag to me.
13  Economy / Exchanges / Re: Poloniex Level 2 Verification stuck at sending screen on: June 22, 2017, 12:41:42 AM
Switching browsers and scaling the pictures down to reduce the file sizes seems to have worked for me. I got an "Ok" pop-up.

Thanks for the help folks! Smiley
14  Economy / Exchanges / Poloniex Level 2 Verification stuck at sending screen on: June 21, 2017, 01:04:52 AM
I just finished completing the form and when I try to send it off it gets stuck in a loading screen. I have tried to send it off a couple of times, but the form is never sent off.

Does anyone know what this is / how to resolve it?
Pages: [1]
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!