Bitcoin Forum
November 10, 2024, 05:32:10 PM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2]  All
  Print  
Author Topic: Most Secure Method To Sweep Paper Wallet  (Read 257 times)
RealMinecache (OP)
Newbie
*
Offline Offline

Activity: 17
Merit: 6


View Profile
April 04, 2021, 07:05:15 PM
 #21

This guy talks through the general process:

https://www.youtube.com/watch?v=-9kf9LMnJpI&t=3s

o_e_l_e_o
In memoriam
Legendary
*
Offline Offline

Activity: 2268
Merit: 18746


View Profile
April 05, 2021, 09:24:09 AM
 #22

This guy talks through the general process:

https://www.youtube.com/watch?v=-9kf9LMnJpI&t=3s
It's pretty much the same process as described earlier in this thread, except instead of using a second computer as your airgapped device, he is using a phone.

This is certainly better than just sweeping your private key in to a hot wallet, but it is not as good as using an airgapped computer for a couple of reasons. A phone in flight mode is not truly airgapped, and studies have shown it still pings for cell towers, it can still send location data, it can still leak via WiFi and Bluetooth, and so on. A phone is not truly airgapped unless you open it up and start ripping out the antennas and WiFi modules. You also are not starting on a clean device, and your phone could have any type of malware on it already. Even if you factory reset your phone, you aren't starting from scratch, but rather starting from whatever bloatware and spyware your carrier/manufacturer has pre-installed, and with their (usually) closed source OS.

An airgapped phone is an OK middle ground, but it is not as good as using a fully airgapped computer with a clean install of an open source OS.
20kevin20
Legendary
*
Offline Offline

Activity: 1134
Merit: 1598


View Profile
April 05, 2021, 03:00:16 PM
 #23

Since you're looking for the safest way to do it, I agree with @o_e_l_e_o's answer above. You only get closer to the highest safety/security possible when you eliminate all the potential risks and flaws out of your method. And so far, the only remaining potential security threats is someone physically tampering with your airgapped device which is imo a quite low probability unless you're being watched by intelligence agencies or have some bad actor around. That is unless you somehow mess up yourself and accidentally enter the airgapped device's seed into the online PC, which I believe is something that has a low chance of happening as well.

I would not use a phone because it has just too many backdoors and unknown/non-removable components. A PC is quite modular and you can easily remove or add anything you might or might not need. For me, privacy & security are not only interests but also a fascinating hobby (and now addiction, I guess). Even if you aren't followed by 3-letter agencies, I would still recommend to follow the best security practices as it's more than worth it over the long term. And since it's both fun and safer, why not?
RealMinecache (OP)
Newbie
*
Offline Offline

Activity: 17
Merit: 6


View Profile
April 14, 2021, 08:36:02 AM
 #24

This guy talks through the general process:

https://www.youtube.com/watch?v=-9kf9LMnJpI&t=3s
It's pretty much the same process as described earlier in this thread, except instead of using a second computer as your airgapped device, he is using a phone.

This is certainly better than just sweeping your private key in to a hot wallet, but it is not as good as using an airgapped computer for a couple of reasons. A phone in flight mode is not truly airgapped, and studies have shown it still pings for cell towers, it can still send location data, it can still leak via WiFi and Bluetooth, and so on. A phone is not truly airgapped unless you open it up and start ripping out the antennas and WiFi modules. You also are not starting on a clean device, and your phone could have any type of malware on it already. Even if you factory reset your phone, you aren't starting from scratch, but rather starting from whatever bloatware and spyware your carrier/manufacturer has pre-installed, and with their (usually) closed source OS.

An airgapped phone is an OK middle ground, but it is not as good as using a fully airgapped computer with a clean install of an open source OS.


Since you're looking for the safest way to do it, I agree with @o_e_l_e_o's answer above. You only get closer to the highest safety/security possible when you eliminate all the potential risks and flaws out of your method. And so far, the only remaining potential security threats is someone physically tampering with your airgapped device which is imo a quite low probability unless you're being watched by intelligence agencies or have some bad actor around. That is unless you somehow mess up yourself and accidentally enter the airgapped device's seed into the online PC, which I believe is something that has a low chance of happening as well.

I would not use a phone because it has just too many backdoors and unknown/non-removable components. A PC is quite modular and you can easily remove or add anything you might or might not need. For me, privacy & security are not only interests but also a fascinating hobby (and now addiction, I guess). Even if you aren't followed by 3-letter agencies, I would still recommend to follow the best security practices as it's more than worth it over the long term. And since it's both fun and safer, why not?

Absolutely I agree with you both. I just posted the video link to illustrate the general process as it was all I could locate online. I'd never use a mobile phone with downloaded app.

Thanks.
Pages: « 1 [2]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!