Bitcoin Forum
May 07, 2024, 06:28:09 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Most Secure wallet ever Guide!!!  (Read 1886 times)
dsp (OP)
Newbie
*
Offline Offline

Activity: 52
Merit: 0


View Profile
July 27, 2011, 09:50:13 PM
 #1

1. Use vanity gen to create 1TB of addresses.
2. Use Sipa's Import feature load em into the wallet.
3. Throttle bandwidth on router or install old 10baseT card.

1715063289
Hero Member
*
Offline Offline

Posts: 1715063289

View Profile Personal Message (Offline)

Ignore
1715063289
Reply with quote  #2

1715063289
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715063289
Hero Member
*
Offline Offline

Posts: 1715063289

View Profile Personal Message (Offline)

Ignore
1715063289
Reply with quote  #2

1715063289
Report to moderator
bitlotto
Hero Member
*****
Offline Offline

Activity: 672
Merit: 500


BitLotto - best odds + best payouts + cheat-proof


View Profile WWW
July 27, 2011, 10:19:26 PM
 #2

LOL, I always thought it would go:

1. Buy a cheap new still in the box computer from a store far away (in case someone is expecting you to buy one locally and rigs them all to spy on you)
2. Inside a tent (to prevent spys with fancy camera, spy satellites, etc) in a large field boot Live CD and run vanitygen
3. Memorize address and private key
4. Destroy computer
5. Huh
6. Profit!

*Next Draw Feb 1*  BitLotto: monthly raffle (0.25 BTC per ticket) Completely transparent and impossible to manipulate who wins. TOR
TOR2WEB
Donations to: 1JQdiQsjhV2uJ4Y8HFtdqteJsZhv835a8J are appreciated.
julz
Legendary
*
Offline Offline

Activity: 1092
Merit: 1001



View Profile
July 28, 2011, 01:22:25 AM
 #3

That's all you need Its called limited bandwidth security. (LBS)

Otherwise known as - lame and ineffective.

(quite how a 10baseT NIC, which at 10Mbps is faster than most people's available upload bandwidth anyway is 'limited' I don't know)

You do realize that an attacker doesn't need to suck down the entire 1TB of noise you've generated to steal money don't you?

I guess it might stop a basic attack which simply tries to grab the entire wallet... but if anyone actually believed this was 'most secure' - a script which was smarter about grabbing only the private keys which correspond to some coinage would soon evolve.



@electricwings   BM-GtyD5exuDJ2kvEbr41XchkC8x9hPxdFd
grue
Legendary
*
Offline Offline

Activity: 2058
Merit: 1431



View Profile
July 28, 2011, 02:54:51 AM
 #4

2. Inside a tent (to prevent spys with fancy camera, spy satellites, etc) in a large field boot Live CD and run vanitygen
lol, what if the cd was tampered with? what if the cd burning software was tampered with?

better idea:
1. go to github via https with triple AES 512
2. download source code
3. look at how the private/public keys are generated
4. use Schrödinger's cat to generate random data for keys (THE DICES ARE INFECTED!11!1)
5. execute the code in your head (WHAT IF INTEL/AMD RIGGED THE CHIPS?!?!?!)

It is pitch black. You are likely to be eaten by a grue.

Adblock for annoying signature ads | Enhanced Merit UI
Vod
Legendary
*
Offline Offline

Activity: 3696
Merit: 3073


Licking my boob since 1970


View Profile WWW
July 29, 2011, 12:37:34 AM
 #5

LOL, I always thought it would go:

1. Buy a cheap new still in the box computer from a store far away (in case someone is expecting you to buy one locally and rigs them all to spy on you)
2. Inside a tent (to prevent spys with fancy camera, spy satellites, etc) in a large field boot Live CD and run vanitygen
3. Memorize address and private key
4. Destroy computer
5. Huh
6. Profit!

The tent needs to be lined with tinfoil, or satellites could read the data by measuring the magnetic fields emitted by the hard drives.

https://nastyscam.com - landing page up     https://vod.fan - advanced image hosting - coming soon!
OGNasty has early onset dementia; keep this in mind when discussing his past actions.
Vod
Legendary
*
Offline Offline

Activity: 3696
Merit: 3073


Licking my boob since 1970


View Profile WWW
July 29, 2011, 12:41:36 AM
 #6

That's all you need Its called limited bandwidth security. (LBS)

I sure wish installing a 10 Meg card limited my bandwidth. Maybe I could find a .10 meg card somewhere.

You can get an older token ring card, and set up a LAN with 253 other slaves, and one proxy to the internet.  Set all the other computers to generate random bit images of smurf porn and transfer via bittorrent.  That would slow your network right down.

https://nastyscam.com - landing page up     https://vod.fan - advanced image hosting - coming soon!
OGNasty has early onset dementia; keep this in mind when discussing his past actions.
ctoon6
Sr. Member
****
Offline Offline

Activity: 350
Merit: 251



View Profile
July 29, 2011, 12:53:55 AM
 #7

why are we slowing down the network connection?

Sukrim
Legendary
*
Offline Offline

Activity: 2618
Merit: 1006


View Profile
July 29, 2011, 01:03:08 AM
 #8

To make it harder/longer for an attacker to upload the wallet.dat.

https://www.coinlend.org <-- automated lending at various exchanges.
https://www.bitfinex.com <-- Trade BTC for other currencies and vice versa.
ctoon6
Sr. Member
****
Offline Offline

Activity: 350
Merit: 251



View Profile
July 29, 2011, 01:05:22 AM
 #9

To make it harder/longer for an attacker to upload the wallet.dat.

would it not be easier to just not have a NIC then? might as well come up with a system where you plug a USB drive in with packets to and from 2 computers and accept or deny any packets you don't want.

Vod
Legendary
*
Offline Offline

Activity: 3696
Merit: 3073


Licking my boob since 1970


View Profile WWW
July 29, 2011, 01:10:41 AM
 #10

To make it harder/longer for an attacker to upload the wallet.dat.

would it not be easier to just not have a NIC then? might as well come up with a system where you plug a USB drive in with packets to and from 2 computers and accept or deny any packets you don't want.

Come on, that's just STUPID.   

 Grin

https://nastyscam.com - landing page up     https://vod.fan - advanced image hosting - coming soon!
OGNasty has early onset dementia; keep this in mind when discussing his past actions.
Sukrim
Legendary
*
Offline Offline

Activity: 2618
Merit: 1006


View Profile
July 29, 2011, 01:18:06 AM
 #11

"Portable transactions" though would be really nice...

Just get a copy of the blockchain + allow exporting transactions in a txt file or so. Then use an online client to send this transaction(s) off.

https://www.coinlend.org <-- automated lending at various exchanges.
https://www.bitfinex.com <-- Trade BTC for other currencies and vice versa.
ctoon6
Sr. Member
****
Offline Offline

Activity: 350
Merit: 251



View Profile
July 29, 2011, 01:28:18 AM
 #12

"Portable transactions" though would be really nice...

Just get a copy of the blockchain + allow exporting transactions in a txt file or so. Then use an online client to send this transaction(s) off.

the client is opensource, make it happen  Grin

Sukrim
Legendary
*
Offline Offline

Activity: 2618
Merit: 1006


View Profile
July 29, 2011, 02:30:43 AM
 #13

"Portable transactions" though would be really nice...

Just get a copy of the blockchain + allow exporting transactions in a txt file or so. Then use an online client to send this transaction(s) off.

the client is opensource, make it happen  Grin
Pay me for my efforts and I'll try.

https://www.coinlend.org <-- automated lending at various exchanges.
https://www.bitfinex.com <-- Trade BTC for other currencies and vice versa.
IlbiStarz
Full Member
***
Offline Offline

Activity: 336
Merit: 100



View Profile
July 29, 2011, 06:06:02 AM
 #14

2. Inside a tent (to prevent spys with fancy camera, spy satellites, etc) in a large field boot Live CD and run vanitygen
lol, what if the cd was tampered with? what if the cd burning software was tampered with?

better idea:
1. go to github via https with triple AES 512
2. download source code
3. look at how the private/public keys are generated
4. use Schrödinger's cat to generate random data for keys (THE DICES ARE INFECTED!11!1)
5. execute the code in your head (WHAT IF INTEL/AMD RIGGED THE CHIPS?!?!?!)


AHAHA THIS.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!