Bitcoin Forum
May 11, 2024, 02:18:36 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: [1]
1  Bitcoin / Bitcoin Technical Support / How to set up PGP 'Offline signing keys' and meaningfully verify them on: February 05, 2014, 11:28:15 AM
Alan Reiner of BitcoinArmory (fantastic program btw!) has an 'Offline signing key'

http://pgp.mit.edu:11371/pks/lookup?op=vindex&search=0x4AB16AEA98832223


I am inferring that this is a PGP private key on a 'cold storage' computer, with a different passphrase to his main 'hot' computer private key(s), that protects his electronic signature against keyloggers by using an air-gap, just like Armory does for bitcoins. Therefore a sig of a hash of a binary (eg Armory) is very difficult to impersonate with a malware binary.

However, I think that the above can only achieved by having a separate 'cold signing' keypair (but I'm not sure, hence this post).  I'm thinking this because:

  • Alan's key has only have one subkey within the public key he distributes (FF52507FDE6B2D74).  This means I can only validate against one key, which is presumably the same one used for receiving emails etc, ie on his main 'hot' computer...
  • Even if his cold-signing subkey was included, when I do gpg --verify filename, it only shows the main keyid, not the subkey, for example "gpg: Signature made Wed 25 Dec 17:06:03 2013 GMT using RSA key ID 98832223". Thus if the hot key's passphrase was compromised, then a hot-signed malware would still be indistinguishable from the cold-signed genuine binary.

I want to have a separate passphrase that I only use for signing on an air-gapped computer. Am I right in my thinking?  Or am I missing something? 

I'm doing this on OSX using gpg (GnuPG/MacGPG2) 2.0.22 by the way.
2  Other / Beginners & Help / bitcoin-central.net hacked (24-Apr-2013) - anyone got their BTC back? on: May 02, 2013, 01:24:30 PM
Newbie so unable to reply to this Re: Bitcoin-Central.net "We have been compromised" thread:
https://bitcointalk.org/index.php?topic=186609.0
I can understand time taken from manually processing from a cold wallet, but some guys have been waiting 6 days:
Quote
I did it as soon as the failover adress went public, on Apr. 26 2013 14:03 CEST

I'm not sure if I should trust entering my password on https://failover.bitcoin-central.net/?
Has anyone got their BTC back? 
Pages: [1]
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!