Bitcoin Forum
May 06, 2024, 06:33:29 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2]  All
  Print  
Author Topic: Please critique my paper-wallet creation steps  (Read 374 times)
20kevin20
Legendary
*
Offline Offline

Activity: 1134
Merit: 1597


View Profile
November 28, 2020, 12:13:41 PM
 #21

If you are that paranoid, you also shouldn't use any computer at all.
Tech and surveillance are advancing too much in too many ways not to be paranoid. I'd rather be overly-cautious than let anyone supervise me. I don't like being watched, so I'd rather take my time and eliminate all potential risks and sources of information leaks. Even if they don't watch me, I personally find these practices as a very interesting and fun hobby to have. And why not, as long as you aren't hurting anyone. Smiley

Using the main power line is another way to exfiltrate data from air-gapped systems. And this actually does work. Powerhammer is doing exactly this.
Doesn't that require having malicious hardware and software though? I mean, no matter what you do electronically, there still is some level of trust you require because you obviously can't begin creating your own efficient hardware components. For that, I'm still waiting for the possibility of owning fully auditable Open-Source hardware.
1715020409
Hero Member
*
Offline Offline

Posts: 1715020409

View Profile Personal Message (Offline)

Ignore
1715020409
Reply with quote  #2

1715020409
Report to moderator
Even in the event that an attacker gains more than 50% of the network's computational power, only transactions sent by the attacker could be reversed or double-spent. The network would not be destroyed.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715020409
Hero Member
*
Offline Offline

Posts: 1715020409

View Profile Personal Message (Offline)

Ignore
1715020409
Reply with quote  #2

1715020409
Report to moderator
LoyceV
Legendary
*
Offline Offline

Activity: 3304
Merit: 16609


Thick-Skinned Gang Leader and Golden Feather 2021


View Profile WWW
November 28, 2020, 12:17:49 PM
 #22

5. Don't rely on software to create a random seed, use coin tosses.
Is it more secure than CSPRNG library or /dev/urandom?
I don't know, but a coin toss is a lot easier to ensure nobody has tampered with it.

pooya87
Legendary
*
Offline Offline

Activity: 3444
Merit: 10550



View Profile
November 28, 2020, 12:38:27 PM
 #23

5. Don't rely on software to create a random seed, use coin tosses.
Is it more secure than CSPRNG library or /dev/urandom?
I don't know, but a coin toss is a lot easier to ensure nobody has tampered with it.
Theoretically any physical source of entropy that could be categorized as "truly random" is safer than computer generated entropy since they are not true entropies.
But realistically we should add the human error factor and possibility of bias in the source to the physical sources such as coin flip where coin may not be balanced or the user making mistakes reading and recording the results.

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
bob123
Legendary
*
Offline Offline

Activity: 1624
Merit: 2481



View Profile WWW
November 28, 2020, 04:18:49 PM
 #24

Doesn't that require having malicious hardware and software though?

Of course.
But that's also the reason to disconnect hard drives, remove speakers, led's, etc..



Is it more secure than CSPRNG library or /dev/urandom?

IMO, no.
/dev/random and dev/urandom are both absolutely fine for an average user.
It has been tested extremely accurate and is being used by governments and 3 letter agencies.

But you'd need to make sure that your not using compromised software or hardware.

Pages: « 1 [2]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!