Every time you create a new BTC wallet, you’ll get a 12 word 'recovery phrase' that needs to be noted down and hidden somewhere, which - to me at least - seems like a pretty gaping security gap. It doesn’t matter whether you write the words down and hide them in your attic, or stamp them on metal and bury them in your garden, the ‘master key’ to your wallet is still just sat somewhere, hoping that no-one finds it.
This has always been my main concern about Bitcoin: the balance between making sure I don't lose access, and making sure nobody else gains access.
Each line in this key was formed of a triplet that referred to the page, line and word-number of a specific word, which, when looked up (using the exact correct book), was in fact the relevant ‘recovery word’. In 12 lines, he’d noted all 12 of the words in his recovery phrase without actually giving anything away to a casual reader/attacker. So long as the attacker didn’t know the book it referred to, the recovery phrase would be secure.
I've seen many topics from people who don't know how to access their standard wallet anymore. I've also seen people lose access to their funds because of their own handwriting.
Any complication you add, largely increases the chance of losing access by yourself.
I created a secret, unknown Github persona, and this persona has uploaded the *entire* bank of 2048 potential Bitcoin recovery phrase words, in randomised order, in 256 rows of 8, to a repo. *I* know the name of this account, and the name of the specific repo, but an attacker wouldn’t.
If I wanted to rely on a third party to get to my money, I'd use a bank
Ideally, it would be even further extended so that *anyone* could fork it, and just add their own unique details (their Github name, unique repo address, login details for Git & whichever cloud provider we choose).
What if the attacker has access to Github logs?
What this would mean would be that, for *even higher* levels of security, not only could you choose a random account as your referent, you could also choose a random *day* too, so that there would only be 2 ‘keys’ for you to remember - a Github ID and a date, the ‘day of push’ - which you would memorise, never write down, and keep as your truly ‘secret' keys.
Instead of making it random and publishing it, why not use the username and date as a random seed, and use a pseudo-random list that you can reproduce? It's just as unlikely to be guessed, but you won't lose it.
--> Why hide the book?? No-one would know that my keynote refers to it, so it can sit on my shelf with the rest
Are you saying you only have one backup of your seed phrase? What if your house burns down?