Bitcoin Forum
June 21, 2024, 10:17:25 PM *
News: Voting for pizza day contest
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: brain wallet and multi-sig question.  (Read 775 times)
successcouncil (OP)
Newbie
*
Offline Offline

Activity: 46
Merit: 0


View Profile
June 01, 2014, 03:42:58 AM
 #1

First, I believe the following to be true, and it is true, then tell me if you conclusion is correct.

Belief: If I chose a very guessable brain wallet eg:"bitcoin123"  I will probably lose my coins by the end of the day because algo's are regularly testing for simple brain wallets.   They do this by trying simple phrases and getting the public key from those simple phrases, and then using a blockchain explorer look fora positive balance. And then spending those coins. True?

Conclusion:  If I use 3 simple brain wallets to create a 3 of 3 multi sig address, then this will be quite difficult to steal the coins because the "blockchain explorer" step above will will not reveal that this simple brain wallet is part of a multisig wallet?  Perhaps the algos could just try to spend a handful of satoshis for combinations of stupid brain wallets.
But it seems having 1 simple brain wallet on a multisig would not be such a terrible idea.

Is this true?  thoughts?

Thanks in advance
jonald_fyookball
Legendary
*
Offline Offline

Activity: 1302
Merit: 1004


Core dev leaves me neg feedback #abuse #political


View Profile
June 01, 2014, 04:18:43 AM
 #2

Mostly Right but it won't be long before people are running similar password dictionary scripts on multisig addresses so I wouldn't recommend weak passwords even if it's multisig.

DannyHamilton
Legendary
*
Offline Offline

Activity: 3430
Merit: 4669



View Profile
June 01, 2014, 04:34:17 AM
 #3

There is no need to use a blockchain explorer.

If I was going to attack brainwallets, I'd generate a list of all possible bitcoin addresses (actually, I'd just use public key hashes instead of actual addresses, but the concept is the same) built from simple brain wallets. Then, I'd create a custom Bitcoin Core wallet.  The Bitcoin Core wallet acts as a peer on the network.  It receives every transaction as it is being relayed from peers, and re-transmits it to any connected peers that haven't heard of the transaction yet.

For every transaction received, my modified Bitcoin Core would scan the pre-generated list of addresses to see if the transaction was sending to any of them.  If I found that any address in the list was receiving bitcoins from the transaction, my custom Bitcoin Core would immediately (and automatically) build and transmit a transaction paying those bitcoins to some other address that ONLY I had.

As for multi-sig, the attacker can pre-generate and scan against a list of possible hashes from multi-sig P2SH.  The more signatures that are needed, the more possibilities the attacker will need to generate (just like passphrases with more characters require generating more possibilities).
Beliathon
Hero Member
*****
Offline Offline

Activity: 784
Merit: 1000


https://youtu.be/PZm8TTLR2NU


View Profile WWW
June 01, 2014, 04:43:15 AM
 #4

Use a long password that only you would ever know. Nothing that has ever been written or recorded anywhere, ever.

A shitty poem you wrote as a child, for example, would not be safe because it was once written on paper.

A shitty poem you make up right now, and are 99.999% sure you will never forget, would be a reasonably good password.

Remember Aaron Swartz, a 26 year old computer scientist who died defending the free flow of information.
junshong
Full Member
***
Offline Offline

Activity: 192
Merit: 100

Hi!


View Profile
June 01, 2014, 06:21:24 AM
 #5

Do not choose any password that is in the dictionary or short, they can be cracked fairly easily.

shorena
Copper Member
Legendary
*
Offline Offline

Activity: 1498
Merit: 1520


No I dont escrow anymore.


View Profile WWW
June 01, 2014, 06:42:25 AM
 #6

-snip-
A shitty poem you make up right now, and are 99.999% sure you will never forget, would be a reasonably good password.

If you have to make up a shitty peom anyway, why not generate a private key properly and remember that. For all I care remember it in a form of a peom.

5Horses you Zionist van Queer need From no Xiam Lizardqueen ...

you get the picture.

Im not really here, its just your imagination.
Harley997
Sr. Member
****
Offline Offline

Activity: 266
Merit: 250


View Profile
June 09, 2014, 11:59:45 PM
 #7

Quote
Belief: If I chose a very guessable brain wallet eg:"bitcoin123"  I will probably lose my coins by the end of the day because algo's are regularly testing for simple brain wallets.   They do this by trying simple phrases and getting the public key from those simple phrases, and then using a blockchain explorer look fora positive balance. And then spending those coins. True?

Brain wallets are generally very easy to steal from.

A brain wallet of "bitcoin123 would probably not even be allowed by most websites/software that allows you to create brainwallets. If you were able to create a brain wallet with this password then the coins would likely be stolen before you can even check to see if the transaction was propagated throughout the network. 

The best advise for brain wallets is to use something that is not found in any piece of literature (including movie scripts, songs, plays) that is in any language. At the very minimum a brain wallet should be at least 12 words that are in somewhat of a random order.

If you would like to see how quickly funds in a brainwallet can be stolen then checkout the following address: 1JwSSubhmg6iPtRjtyqhUYYH7bZg3Lfy1T

▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
PRIMEDICE
The Premier Bitcoin Gambling Experience @PrimeDice
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!