Bitcoin Forum
May 07, 2024, 03:54:04 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Delete offine wallet after paper backup?  (Read 745 times)
sbj175 (OP)
Newbie
*
Offline Offline

Activity: 10
Merit: 0


View Profile
January 15, 2014, 01:34:13 AM
 #1

I have read all of the posts I could find on the "offline wallet" concept in Armory.

I think it's great, but there is one question I have not seen asked (and answered) directly, so I'm going to ask it just to be sure.

1) I have created a wallet on an offline Ubuntu laptop
2) I created a paper backup and tested importing it without issues
3) I created a watching only wallet on an online computer
4) I sent some coins to the offline wallet via "receive coins" in the watching-only wallet

This laptop, however, is not *always* offline. So what I really would like to do is delete the offline wallet.

My understanding is the paper backup makes this entirely safe. (Assume the paper itself is physically perfectly secure.)

At any point in the future, I could restore the wallet from paper backup and spend the coins - correct?
1715097244
Hero Member
*
Offline Offline

Posts: 1715097244

View Profile Personal Message (Offline)

Ignore
1715097244
Reply with quote  #2

1715097244
Report to moderator
"The nature of Bitcoin is such that once version 0.1 was released, the core design was set in stone for the rest of its lifetime." -- Satoshi
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715097244
Hero Member
*
Offline Offline

Posts: 1715097244

View Profile Personal Message (Offline)

Ignore
1715097244
Reply with quote  #2

1715097244
Report to moderator
1715097244
Hero Member
*
Offline Offline

Posts: 1715097244

View Profile Personal Message (Offline)

Ignore
1715097244
Reply with quote  #2

1715097244
Report to moderator
1715097244
Hero Member
*
Offline Offline

Posts: 1715097244

View Profile Personal Message (Offline)

Ignore
1715097244
Reply with quote  #2

1715097244
Report to moderator
goatpig
Moderator
Legendary
*
Offline Offline

Activity: 3668
Merit: 1347

Armory Developer


View Profile
January 15, 2014, 07:01:28 AM
 #2

As someone once told me:

- short answer: yes
- long answer: yes

Automatic
Full Member
***
Offline Offline

Activity: 238
Merit: 105


View Profile
January 18, 2014, 02:29:33 PM
 #3

As someone once told me:

- short answer: yes
- long answer: yes

Short answer:- Safe to delete, yes.
Long answer:- Safe to delete, yes, but, that doesn't stop malware on the computer from recording data while the PC is offline, and, broadcasting it when it's online, which, is why this is not recommended in the slightest. If you are going to do this, carry around a hardware USB write blocker (Or a SATA to USB, with a SATA write blocker, would probably be cheaper) with Debian installed & the .deb for Armory on it, boot into a live 'CD' whenever you're going to do this.

Please ask for a signed message from my on-site Bitcoin address (Check my profile) before doing any offsite trades with me.
sbj175 (OP)
Newbie
*
Offline Offline

Activity: 10
Merit: 0


View Profile
January 29, 2014, 03:53:52 AM
 #4

I get your point. But in practice, how common is malware on linux systems. Maybe I am mistaken, but I have always felt this to be less likely there.
Automatic
Full Member
***
Offline Offline

Activity: 238
Merit: 105


View Profile
January 31, 2014, 01:19:01 AM
 #5

I get your point. But in practice, how common is malware on linux systems. Maybe I am mistaken, but I have always felt this to be less likely there.

Less likely? Sure. Majority of malware probably isn't developed to target an operating system that's rarely used by 'stupid' people* (I.E. people who'd run "SuperHotPorn.jpg.exe" from the newsgroup a.b.erotica), and, an operating system that controls a shit ton less market share than it's buddies Macintosh and Windows.

Impossible? No.

*Yes, I realize there are pieces of malware out there that spread via exploits in popular 'open'/'public' software (Such as service daemons) and for that reason specifically target the operating system that runs the faulty software (And, in most cases, that'd be *NIX), but, I feel that the majority of malware is spread via items such as torrents and dodgy web-downloads, rather than actually specific exploits in applications to run executable code smuggled in from the outside.

Please ask for a signed message from my on-site Bitcoin address (Check my profile) before doing any offsite trades with me.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!