Bitcoin Forum
May 05, 2024, 06:35:49 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Encrypted Wallet Concerns.  (Read 839 times)
NRF (OP)
Sr. Member
****
Offline Offline

Activity: 279
Merit: 250



View Profile
August 16, 2012, 11:56:09 PM
 #1

Hi All,

I am in the process of writing up a set of “Best Practices” guidelines in regards to Bitcoin’s for the use internally within the company that I work for.

There is one hole in my test plans that I would like to fill in regards to Encrypted Wallets.  I have a plan for unencrypted wallets that goes something like this;-

* New private key generated
* Wallet corrupted (note: before backup, bdb file is corrupted)
* pywallet fails to extract new key
* wallet-recover fails to extract new key (see this for what I mean) https://bitcointalk.org/index.php?topic=25091.0;all
* Hex editor fails to extract new key (tested, but not documented as yet.  See https://bitcointalk.org/index.php?topic=8274.0 )
* Bitcoin’s lost! (not the ideal end for a test plan, but it is a valid one)

Now I want to replicate the plan above with Encrypted wallets but I am at a bit of a loss as how to achieve this. 

I think I have identified the keys in an encrypted wallet ( they start with “63 6B 65 79 21”, or “cKey!”) but I now need pointers on how to extract the correct amounts of bytes and decrypt them (assuming I have the pass phrase).

Once I achieve this I will gladly report my findings back here, I might even dust off my very rusty programming skills and backport it to one of the above tool’s (most likely wallet-recover)

Thanks.
1714890949
Hero Member
*
Offline Offline

Posts: 1714890949

View Profile Personal Message (Offline)

Ignore
1714890949
Reply with quote  #2

1714890949
Report to moderator
1714890949
Hero Member
*
Offline Offline

Posts: 1714890949

View Profile Personal Message (Offline)

Ignore
1714890949
Reply with quote  #2

1714890949
Report to moderator
1714890949
Hero Member
*
Offline Offline

Posts: 1714890949

View Profile Personal Message (Offline)

Ignore
1714890949
Reply with quote  #2

1714890949
Report to moderator
BitcoinCleanup.com: Learn why Bitcoin isn't bad for the environment
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
etotheipi
Legendary
*
expert
Offline Offline

Activity: 1428
Merit: 1093


Core Armory Developer


View Profile WWW
August 17, 2012, 12:15:54 AM
 #2

Hi All,

I am in the process of writing up a set of “Best Practices” guidelines in regards to Bitcoin’s for the use internally within the company that I work for.

There is one hole in my test plans that I would like to fill in regards to Encrypted Wallets.  I have a plan for unencrypted wallets that goes something like this;-

* New private key generated
* Wallet corrupted (note: before backup, bdb file is corrupted)
* pywallet fails to extract new key
* wallet-recover fails to extract new key (see this for what I mean) https://bitcointalk.org/index.php?topic=25091.0;all
* Hex editor fails to extract new key (tested, but not documented as yet.  See https://bitcointalk.org/index.php?topic=8274.0 )
* Bitcoin’s lost! (not the ideal end for a test plan, but it is a valid one)

Now I want to replicate the plan above with Encrypted wallets but I am at a bit of a loss as how to achieve this.  

I think I have identified the keys in an encrypted wallet ( they start with “63 6B 65 79 21”, or “cKey!”) but I now need pointers on how to extract the correct amounts of bytes and decrypt them (assuming I have the pass phrase).

Once I achieve this I will gladly report my findings back here, I might even dust off my very rusty programming skills and backport it to one of the above tool’s (most likely wallet-recover)

Thanks.

(Disclosure:  I am biased, since I wrote Armory)  This is one very good reason to be using deterministic wallets like Armory uses (and other alternative clients).  You create an encrypted wallet, and before you use it the first time, you create paper backups (which are unencrypted, but you can encrypt the information manually before printing, if you want).  Put it in a safe-deposit box or any other means you consider secure.

Now you can generate an infinite number of addresses, and never have to worry about permanent loss. Ever.  If the wallet is corrupted or HDD fails, just get a new computer, and restore the wallet from the paper backup.  All money is recovered.

And of course, Armory additionally lets you maintain the private keys offline but still use a watching-only wallet to generate/distribute addresses and monitor payments, but without risk of compromise.  If you need to move the coins, use a USB key to get the offline computer to sign the transaction.  Of course, the offline computer should have limited access, but you can still keep the keys encrypted on it in case someone does get access to it.  I designed this feature with businesses in mind (and regular users, but businesses really require this level of robustness and security)


Founder and CEO of Armory Technologies, Inc.
Armory Bitcoin Wallet: Bringing cold storage to the average user!
Only use Armory software signed by the Armory Offline Signing Key (0x98832223)

Please donate to the Armory project by clicking here!    (or donate directly via 1QBDLYTDFHHZAABYSKGKPWKLSXZWCCJQBX -- yes, it's a real address!)
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!