Bitcoin Forum
October 17, 2025, 04:38:11 AM *
News: Latest Bitcoin Core release: 30.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Security flaws of this setup  (Read 169 times)
28e7166c23e70c2014feb5d64 (OP)
Newbie
*
Offline Offline

Activity: 19
Merit: 0


View Profile
September 30, 2025, 07:17:29 PM
 #1

Consider a bitcoiner named Joe that has the following setup:

- Joe has a Linux machine.
- This machine is Joe's personal machine where he does everything, from watching movies to E-Banking.
- Joe is the only person that uses this machine, and no one else has access to it.
- Everything is run on his Linux user account `joe94`.
- `joe94` is sudoer.
- Joe installed Bitcoin Core and runs it with the default `bitcoin.conf`.
- Joe runs Electrs Electrum server.
- Joe has a Trezor hardware wallet.
- Joe uses the Trezor Suite app.
- Joe points the Trezor app to the local Electrum (instead of Trezor nodes).
- Joe follows all the "Trezor good practices" like storing his seed phrase only on physical media such as paper, checking the receiving address and sending address for every transaction, etc.
- Joe's computer is a laptop, so he can bring it anywhere and connect it to any random Wi-Fi network he finds on the go.

Would you consider Joe is at risk?
LoyceV
Legendary
*
Offline Offline

Activity: 3836
Merit: 20149


Thick-Skinned Gang Leader and Golden Feather 2021


View Profile WWW
September 30, 2025, 08:20:39 PM
 #2

- Joe uses the Trezor Suite app.
- Joe points the Trezor app to the local Electrum (instead of Trezor nodes).
Why not use Electrum as a wallet instead of Trezor Suite?

Quote
Would you consider Joe is at risk?
At risk of what? Does Joe bring his Trezor hardware wallet with him?

Quote
- Joe runs Electrs Electrum server.
he can bring it anywhere and connect it to any random Wi-Fi network
I wouldn't run a server on public Wi-Fi. It just doesn't feel right.

¡uʍop ǝpᴉsdn pɐǝɥ ɹnoʎ ɥʇᴉʍ ʎuunɟ ʞool no⅄
Amphenomenon
Hero Member
*****
Offline Offline

Activity: 1050
Merit: 730


Hope Jeremiah 17vs7


View Profile WWW
September 30, 2025, 09:27:03 PM
 #3


Would you consider Joe is at risk?
This is pretty much risky. Connecting to random Wi-Fi is susceptible to man in the middle attacks.
Taking your pc around will increase the risks of it falling into hands of theft.
Using such pc to  run every activity online increase risks of malware.

While Joe coins are not directly at risks, his privacy and general security are.

 
█▄
R


▀▀██████▄▄
████████████████
▀█████▀▀▀█████
████████▌███▐████
▄█████▄▄▄█████
████████████████
▄▄██████▀▀
LLBIT▀█ 
  TH#1 SOLANA CASINO  
████████████▄
▀▀██████▀▀███
██▄▄▀▀▄▄████
████████████
██████████
███▀████████
▄▄█████████
████████████
████████████
████████████
████████████
█████████████
████████████▀
████████████▄
▀▀▀▀▀▀▀██████
████████████
███████████
██▄█████████
████▄███████
████████████
█░▀▀████████
▀▀██████████
█████▄█████
████▀▄▀████
▄▄▄▄▄▄▄██████
████████████▀
........5,000+........
GAMES
 
......INSTANT......
WITHDRAWALS
..........HUGE..........
REWARDS
 
............VIP............
PROGRAM
 .
   PLAY NOW    
ABCbits
Legendary
*
Offline Offline

Activity: 3402
Merit: 9256



View Profile
October 01, 2025, 09:01:58 AM
 #4

- Joe has a Linux machine.
- This machine is Joe's personal machine where he does everything, from watching movies to E-Banking.

While malware designed for linux is rare, the risk is exist if watching movie involve pirated/cracked stuff.

- Joe's computer is a laptop, so he can bring it anywhere and connect it to any random Wi-Fi network he finds on the go.

Aside from MITM, evil twin attack (fake wifi hotspot with similar name with real one) can be risky if E-Banking is involved. Although using VPN you can trust supposed to solve this issue.

suzanne5223
Hero Member
*****
Offline Offline

Activity: 3108
Merit: 698


Want top-notch marketing for your project, Hire me


View Profile WWW
October 01, 2025, 08:22:11 PM
 #5

Would you consider Joe is at risk?
Yes, I consider Joe to be at risk for using random/public WiFi networks because one of the strategies used by hackers to attack and also steal private data is to use public WiFi. Besides, some online thieves usually create their own public WiFi and disguise it as a genuine WiFi network.
There's no benefit in using public WiFi, and the price to pay is always a big one.

█████████████████████████
█████████████████████████
███████▀█████████▀███████
█████████████████████████
█████████████████████████
████████████▀████████████
███████▀███████▄███████
███████████▄▄▄███████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████

 2UP.io 
█████████████████████████████
█████████████████████████
████████████████████████
████████████████████
███████████████████████
████████████████████████
████████████████████████
███████████████████
████████████████████████
███████████████████
████████████████████████
█████████████████████████
█████████████████████████████
███████████████████████████████████████████████████████████████████████████████████████
 
FASTEST-GROWING CRYPTO
CASINO & SPORTSBOOK

 

███████████████████████████████████████████████████████████████████████████████████████
█████████████████████████████
█████████████████████████
███████████████████████
███████████████████████
████████████████████████
███████████████████████
███████████████████████
██████████████████████
████████████████████████
███████████████████████
███████████████████████
█████████████████████████
█████████████████████████████
 
   WELCOME BONUS   
200% + 500 FS

..PLAY NOW..
LoyceV
Legendary
*
Offline Offline

Activity: 3836
Merit: 20149


Thick-Skinned Gang Leader and Golden Feather 2021


View Profile WWW
October 02, 2025, 06:39:00 AM
Last edit: October 02, 2025, 07:50:53 PM by LoyceV
Merited by vapourminer (1)
 #6

There's no benefit in using public WiFi
Not everyone has unlimited mobile data.

¡uʍop ǝpᴉsdn pɐǝɥ ɹnoʎ ɥʇᴉʍ ʎuunɟ ʞool no⅄
suzanne5223
Hero Member
*****
Offline Offline

Activity: 3108
Merit: 698


Want top-notch marketing for your project, Hire me


View Profile WWW
October 02, 2025, 10:01:30 PM
 #7

There's no benefit in using public WiFi
Not everyone has unlimited mobile data.
You have a point, but if we think about the consequences and the level of how hacker use the man in the middle attack through the creation of fake Wi-Fi hotspots to read their target emails, steal personal information, and check the websites they are visiting, it is always better to always seek safety first, not some minutes of free public WiFi internet service.

█████████████████████████
█████████████████████████
███████▀█████████▀███████
█████████████████████████
█████████████████████████
████████████▀████████████
███████▀███████▄███████
███████████▄▄▄███████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████

 2UP.io 
█████████████████████████████
█████████████████████████
████████████████████████
████████████████████
███████████████████████
████████████████████████
████████████████████████
███████████████████
████████████████████████
███████████████████
████████████████████████
█████████████████████████
█████████████████████████████
███████████████████████████████████████████████████████████████████████████████████████
 
FASTEST-GROWING CRYPTO
CASINO & SPORTSBOOK

 

███████████████████████████████████████████████████████████████████████████████████████
█████████████████████████████
█████████████████████████
███████████████████████
███████████████████████
████████████████████████
███████████████████████
███████████████████████
██████████████████████
████████████████████████
███████████████████████
███████████████████████
█████████████████████████
█████████████████████████████
 
   WELCOME BONUS   
200% + 500 FS

..PLAY NOW..
LoyceV
Legendary
*
Offline Offline

Activity: 3836
Merit: 20149


Thick-Skinned Gang Leader and Golden Feather 2021


View Profile WWW
October 03, 2025, 06:01:53 AM
 #8

You have a point, but if we think about the consequences and the level of how hacker use the man in the middle attack through the creation of fake Wi-Fi hotspots to read their target emails, steal personal information, and check the websites they are visiting, it is always better to always seek safety first, not some minutes of free public WiFi internet service.
That's what encryption is for: once my browser knows the security certificate for a website, no man in the middle can read the data.

¡uʍop ǝpᴉsdn pɐǝɥ ɹnoʎ ɥʇᴉʍ ʎuunɟ ʞool no⅄
Amphenomenon
Hero Member
*****
Offline Offline

Activity: 1050
Merit: 730


Hope Jeremiah 17vs7


View Profile WWW
October 03, 2025, 09:23:39 AM
 #9

You have a point, but if we think about the consequences and the level of how hacker use the man in the middle attack through the creation of fake Wi-Fi hotspots to read their target emails, steal personal information, and check the websites they are visiting, it is always better to always seek safety first, not some minutes of free public WiFi internet service.
That's what encryption is for: once my browser knows the security certificate for a website, no man in the middle can read the data.
Yes except from the evil twin attack, if the user is not using a VPN.

 
█▄
R


▀▀██████▄▄
████████████████
▀█████▀▀▀█████
████████▌███▐████
▄█████▄▄▄█████
████████████████
▄▄██████▀▀
LLBIT▀█ 
  TH#1 SOLANA CASINO  
████████████▄
▀▀██████▀▀███
██▄▄▀▀▄▄████
████████████
██████████
███▀████████
▄▄█████████
████████████
████████████
████████████
████████████
█████████████
████████████▀
████████████▄
▀▀▀▀▀▀▀██████
████████████
███████████
██▄█████████
████▄███████
████████████
█░▀▀████████
▀▀██████████
█████▄█████
████▀▄▀████
▄▄▄▄▄▄▄██████
████████████▀
........5,000+........
GAMES
 
......INSTANT......
WITHDRAWALS
..........HUGE..........
REWARDS
 
............VIP............
PROGRAM
 .
   PLAY NOW    
Cricktor
Legendary
*
Offline Offline

Activity: 1288
Merit: 3075



View Profile
October 05, 2025, 09:23:30 PM
 #10

- Joe has a Linux machine.
...
- Joe's computer is a laptop, so he can bring it anywhere and connect it to any random Wi-Fi network he finds on the go.
Does this Linux laptop setup have a full disk encryption? I would recommend to use this for devices that are carried around and could easily be stolen.

I don't really like the random wifi networks usage but this can be mitigated.

It's imperative to carefully check certificates used in browsers to avoid MITM attacks.

Still not a big fan to use such a network "promiscuous" device for crypto wallets and e-banking.


- This machine is Joe's personal machine where he does everything, from watching movies to E-Banking.
I wouldn't want to use my daily driver for my crypto wallet stuff, but this depends strongly on what is done with the device and how security educated someone is and if the user does "risky" stuff on the internet. Some people install all the time some software they want to try out and whatnotelse. This could be a recipe for later desaster, especially when having all under one user account which is in the sudoers group. Priviledge escalation is only a step away...

Using a hardware wallet to secure private keys is good for Joe and mitigates a few problems that could arise with a daily driver device.

Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!