mike678 (OP)
|
 |
July 14, 2011, 04:20:01 PM |
|
I won't lie I'm not sure if this is any more secure but what if you stored a completely separate wallet on a virtual machine and transfered from your normal wallet to the virtual machine wallet. If an exe that is meant to steal wallet's infects your computer could it just search and find the wallet in the vm or would it specifically need to know your running a vm to be able to find it?
I'm just curious because that would make things simpler I think because you don't have to worry about an encrypted drive breaking and losing all the data forever.
So feel free to rip away and tell me why this wont work.
|
|
|
|
|
|
|
|
"You Asked For Change, We Gave You Coins" -- casascius
|
|
|
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
|
XRcode
|
 |
July 14, 2011, 04:24:08 PM |
|
It would make it more unlikely that a trojan would get your wallet, but it is still possible.
|
|
|
|
mike678 (OP)
|
 |
July 14, 2011, 04:29:21 PM |
|
How much harder would it be for a trojan to find it?
|
|
|
|
error
|
 |
July 14, 2011, 05:38:39 PM |
|
No trojans in the wild currently look for Bitcoin wallets in virtual machines; however you can be sure that if it becomes common, someone will write a new trojan.
|
3KzNGwzRZ6SimWuFAgh4TnXzHpruHMZmV8
|
|
|
lowlevel
|
 |
July 14, 2011, 05:47:56 PM |
|
This also doesn't really help you if you happen to execute a trojan within your virtual machine.
|
|
|
|
mike678 (OP)
|
 |
July 14, 2011, 05:50:29 PM |
|
This also doesn't really help you if you happen to execute a trojan within your virtual machine.
Well the only point of the vm would be to hold the wallet not to do anything else. Why would you search the web or add programs in it?
|
|
|
|
XRcode
|
 |
July 14, 2011, 06:18:29 PM |
|
You would probably just be better off to store your wallet on a usb drive that you remove from your computer when not in use.
|
|
|
|
JoelKatz
Legendary
Offline
Activity: 1596
Merit: 1012
Democracy is vulnerable to a 51% attack.
|
 |
July 14, 2011, 06:22:57 PM |
|
If the vm were only running when needed, was only used to hold the wallet, and all vm sharing features were turned off *in* *the* *vm*, you should be relatively safe. The truly paranoid would encrypt the vm's virtual hard drive partition containing the wallet from within the vm, that way the trojan can't extract it from the host's file holding the vm's hard drive data.
|
I am an employee of Ripple. Follow me on Twitter @JoelKatz 1Joe1Katzci1rFcsr9HH7SLuHVnDy2aihZ BM-NBM3FRExVJSJJamV9ccgyWvQfratUHgN
|
|
|
grod
|
 |
July 14, 2011, 11:20:04 PM |
|
Don't run Windows on any machine you have your master wallet on, create a separate account JUST to use that wallet, only log into that account to send funds and never to web surf or run executables and you should be safe enough.
In fact, boot a live CD of some oddball, pre-bitcoin, tiny market share OS like Dragonfly BSD from '09, use a USB drive for your encrypted home directory, wallet & bitcoin installation and you should be safe from common wallet-stealing malware.
|
|
|
|
|