Bitcoin Forum
April 27, 2024, 08:29:01 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Poll
Question: Will you support Gavin's new block size limit hard fork of 8MB by January 1, 2016 then doubling every 2 years?
1.  yes
2.  no

Pages: « 1 ... 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 [1074] 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 ... 1557 »
  Print  
Author Topic: Gold collapsing. Bitcoin UP.  (Read 2032138 times)
cypherdoc (OP)
Legendary
*
Offline Offline

Activity: 1764
Merit: 1002



View Profile
February 23, 2015, 09:14:59 PM
 #21461

can the Trezor ppl see our balances and tx's while the Trezor is logged into myTrezor.com?

Out of curiosity, how do you guys plan on using your Trezor? I looked into them, like the idea and would like to get one, but couldn't see how a Trezor would fit into how I currently manage my BTC.

In my case I use Armory offline wallets for primary BTC storage, with secure HD seed backups so I'm confident I can always restore the wallets. For day to day usage I keep a small amount in Mycelium, and use this for buying pizza, etc. To fund Mycelium, in Armory I create spending addresses with a small amount of BTC and export the private key to Mycelium. The advantage to this is if I lose my phone, the BTC are recoverable in Armory or HD seed backups. The worse case is if someone steals and breaks my phone, I can only lose the amount on the phone (similar to cash in a real wallet). I like this method because: 1)  I can store and use BTC on my phone without worrying about losing the coins because they are simultaneously in Armory (which is an awesome property of Bitcoin) and 2) Only a small amount are ever "at risk", with the majority secure in Armory.

Because of this I can't see how a Trezor would fit. So how do you guys use it?

I use the trezor for both secure long-term storage and also for day-to-day spending. I actually think it's at least as secure a any armory (or other solution running on multipurpose hardware)-based solution. It's the nice thing about trezor: it combines ease of use with extreme security. In conjunction with electrum (as an example) I can also use address-based coin control for increasing privacy.

Of course, for ordering pizza or making the odd donation I use mycelium. It's just way faster (I make a habit of unplugging the trezor after use) and scanning qr-codes from the screen and seeing the payment arrive a second later has something very special to it.


now i believe that is not right.  i assume you have just one Trezor.  why carry around your long term storage for daily spending?  i assume it has a sizeable balance.  think rubber hosing...

I admit I have multiple trezors.

thatta boy Smiley
"I'm sure that in 20 years there will either be very large transaction volume or no volume." -- Satoshi
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
marcus_of_augustus
Legendary
*
Offline Offline

Activity: 3920
Merit: 2348


Eadem mutata resurgo


View Profile
February 23, 2015, 09:26:46 PM
 #21462

Why would you need multiple trezors?

The seed is the key, the trezor is like a blank that can be loaded with any key, wiped then loaded with a different key.

In fact having loaded trezors around is riskier than having an empty one with seeds stored elsewhere, off-site, divided up etc.

rocks
Legendary
*
Offline Offline

Activity: 1153
Merit: 1000


View Profile
February 23, 2015, 09:29:36 PM
 #21463

if SINGLE privkey is compromised from linear chain then ALL privkeys can be computed in same chain.

that's not right.  you'd need more information, like the chain code if it's even possible, than just a single privkey from the chain.

you need the master seed and one privkey if I understand correctly. Not sure what kind of other information would be sufficient, but a single private key isn't.

shown here by Vitalik: https://bitcoinmagazine.com/8396/deterministic-wallets-advantages-flaw/

If you have the master seed can't you already generate every private key?

The main question is if you have just the private key for one or more addresses in a deterministic wallet, are the other addresses at risk or are they secure.

My understanding was they are still secure.
rocks
Legendary
*
Offline Offline

Activity: 1153
Merit: 1000


View Profile
February 23, 2015, 09:32:34 PM
 #21464

Why would you need multiple trezors?

The seed is the key, the trezor is like a blank that can be loaded with any key, wiped then loaded with a different key.

In fact having loaded trezors around is riskier than having an empty one with seeds stored elsewhere, off-site, divided up etc.

If I did get one this is how I'd use it too. Keep the "cold" wallets off trezor and secured as backups only, and keep the "hot" wallet on trezor for daily use.
cypherdoc (OP)
Legendary
*
Offline Offline

Activity: 1764
Merit: 1002



View Profile
February 23, 2015, 09:40:21 PM
 #21465

Why would you need multiple trezors?

The seed is the key, the trezor is like a blank that can be loaded with any key, wiped then loaded with a different key.

In fact having loaded trezors around is riskier than having an empty one with seeds stored elsewhere, off-site, divided up etc.

it gets even more complicated than this.

turns out, you can have multiple wallets loaded into the Trezor all based off of one seed.  to do this, you click "Enable Passphrases" in advanced settings.  each time it asks you for the passphrase, enter in a different one, and you will generate multiple wallets.  a different passphrase acts like an additional 25th word of the original 24 word seed thus creating a new wallet.  you could deposit all your cold storage savings in one wallet then deposit 1-2 BTC in another.  then if someone rubber hoses you simply reveal the passphrase to the 1-2 BTC wallet for plausible deniability.  it's a clever little device.
marcus_of_augustus
Legendary
*
Offline Offline

Activity: 3920
Merit: 2348


Eadem mutata resurgo


View Profile
February 23, 2015, 09:41:47 PM
 #21466

Why would you need multiple trezors?

The seed is the key, the trezor is like a blank that can be loaded with any key, wiped then loaded with a different key.

In fact having loaded trezors around is riskier than having an empty one with seeds stored elsewhere, off-site, divided up etc.

If I did get one this is how I'd use it too. Keep the "cold" wallets off trezor and secured as backups only, and keep the "hot" wallet on trezor for daily use.

I should have qualified that with a conditional, multiple trezors might be useful in respect of back-up hardware, in case one fails or for spoof wallet, leave one around with a few millibits in it to hand over to thugs gubmint or otherwise, etc.

cypherdoc (OP)
Legendary
*
Offline Offline

Activity: 1764
Merit: 1002



View Profile
February 23, 2015, 09:43:01 PM
 #21467

Why would you need multiple trezors?

The seed is the key, the trezor is like a blank that can be loaded with any key, wiped then loaded with a different key.

In fact having loaded trezors around is riskier than having an empty one with seeds stored elsewhere, off-site, divided up etc.

If I did get one this is how I'd use it too. Keep the "cold" wallets off trezor and secured as backups only, and keep the "hot" wallet on trezor for daily use.

I should have qualified that with a conditional, multiple trezors might be useful in respect of back-up hardware, in case one fails or for spoof wallet, leave one around with a few millibits in it to hand over to thugs gubmint or otherwise, etc.

you don't need the backup hardware.  just load the recovery seed into Mycelium.  totally compatible.
rocks
Legendary
*
Offline Offline

Activity: 1153
Merit: 1000


View Profile
February 23, 2015, 09:47:57 PM
 #21468

Why would you need multiple trezors?

The seed is the key, the trezor is like a blank that can be loaded with any key, wiped then loaded with a different key.

In fact having loaded trezors around is riskier than having an empty one with seeds stored elsewhere, off-site, divided up etc.

If I did get one this is how I'd use it too. Keep the "cold" wallets off trezor and secured as backups only, and keep the "hot" wallet on trezor for daily use.

I should have qualified that with a conditional, multiple trezors might be useful in respect of back-up hardware, in case one fails or for spoof wallet, leave one around with a few millibits in it to hand over to thugs gubmint or otherwise, etc.

Yes, there are those useful purposes to having more than one. But you'd still have "unloaded" wallets for colder storage.

In end, what I really want is a single secure back-end that secures multiple wallets. Some wallets are "cold" and used as permanent storage and which are usually in a fully "offline" state. Some wallets are "hot" and used for daily spending with only nominal amounts loaded on them.

Today I can mostly replicate that with Armory. It sounds with current planned development Trezor+Armory front-end will be able to support that as well.
molecular
Donator
Legendary
*
Offline Offline

Activity: 2772
Merit: 1019



View Profile
February 23, 2015, 09:49:18 PM
 #21469

Why would you need multiple trezors?

The seed is the key, the trezor is like a blank that can be loaded with any key, wiped then loaded with a different key.

In fact having loaded trezors around is riskier than having an empty one with seeds stored elsewhere, off-site, divided up etc.

it gets even more complicated than this.

turns out, you can have multiple wallets loaded into the Trezor all based off of one seed.  to do this, you click "Enable Passphrases" in advanced settings.  each time it asks you for the passphrase, enter in a different one, and you will generate multiple wallets.  a different passphrase acts like an additional 25th word of the original 24 word seed thus creating a new wallet.  you could deposit all your cold storage savings in one wallet then deposit 1-2 BTC in another.  then if someone rubber hoses you simply reveal the passphrase to the 1-2 BTC wallet for plausible deniability.  it's a clever little device.

now that you've posted this your denial is implausible, so I will use monkey wrench attack until I get at least 5 passwords from you (or you die). (sorry to put it that drastically. this is not really my plan, of course, just making a point)

If you want your money safe against such attack, you better have a component involved that you really "don't know" and that isn't "on you", like a seed in a safe somewhere. Shamirs secret sharing sounds like a good idea.

In the end, an attacker can always abduct a loved one and extort coins from you, no matter which way you have secured them.

There's nothing better for safety than a world in which everyone participates sufficiently in prosperity.

PGP key molecular F9B70769 fingerprint 9CDD C0D3 20F8 279F 6BE0  3F39 FC49 2362 F9B7 0769
cypherdoc (OP)
Legendary
*
Offline Offline

Activity: 1764
Merit: 1002



View Profile
February 23, 2015, 10:45:46 PM
 #21470

Why would you need multiple trezors?

The seed is the key, the trezor is like a blank that can be loaded with any key, wiped then loaded with a different key.

In fact having loaded trezors around is riskier than having an empty one with seeds stored elsewhere, off-site, divided up etc.

it gets even more complicated than this.

turns out, you can have multiple wallets loaded into the Trezor all based off of one seed.  to do this, you click "Enable Passphrases" in advanced settings.  each time it asks you for the passphrase, enter in a different one, and you will generate multiple wallets.  a different passphrase acts like an additional 25th word of the original 24 word seed thus creating a new wallet.  you could deposit all your cold storage savings in one wallet then deposit 1-2 BTC in another.  then if someone rubber hoses you simply reveal the passphrase to the 1-2 BTC wallet for plausible deniability.  it's a clever little device.

now that you've posted this your denial is implausible, so I will use monkey wrench attack until I get at least 5 passwords from you (or you die). (sorry to put it that drastically. this is not really my plan, of course, just making a point)

If you want your money safe against such attack, you better have a component involved that you really "don't know" and that isn't "on you", like a seed in a safe somewhere. Shamirs secret sharing sounds like a good idea.

In the end, an attacker can always abduct a loved one and extort coins from you, no matter which way you have secured them.

There's nothing better for safety than a world in which everyone participates sufficiently in prosperity.


Nowhere did I say I am  doing this. I'm just quoting from their help documents what is possible.
cypherdoc (OP)
Legendary
*
Offline Offline

Activity: 1764
Merit: 1002



View Profile
February 23, 2015, 11:22:03 PM
 #21471

Why would you need multiple trezors?

The seed is the key, the trezor is like a blank that can be loaded with any key, wiped then loaded with a different key.

In fact having loaded trezors around is riskier than having an empty one with seeds stored elsewhere, off-site, divided up etc.

it gets even more complicated than this.

turns out, you can have multiple wallets loaded into the Trezor all based off of one seed.  to do this, you click "Enable Passphrases" in advanced settings.  each time it asks you for the passphrase, enter in a different one, and you will generate multiple wallets.  a different passphrase acts like an additional 25th word of the original 24 word seed thus creating a new wallet.  you could deposit all your cold storage savings in one wallet then deposit 1-2 BTC in another.  then if someone rubber hoses you simply reveal the passphrase to the 1-2 BTC wallet for plausible deniability.  it's a clever little device.

now that you've posted this your denial is implausible, so I will use monkey wrench attack until I get at least 5 passwords from you (or you die). (sorry to put it that drastically. this is not really my plan, of course, just making a point)

If you want your money safe against such attack, you better have a component involved that you really "don't know" and that isn't "on you", like a seed in a safe somewhere. Shamirs secret sharing sounds like a good idea.

In the end, an attacker can always abduct a loved one and extort coins from you, no matter which way you have secured them.

There's nothing better for safety than a world in which everyone participates sufficiently in prosperity.


hey molecular,

next time you come over, look in the Altoid tin:



D05GTO
Sr. Member
****
Offline Offline

Activity: 406
Merit: 250


View Profile
February 23, 2015, 11:35:58 PM
 #21472

Man, that would suck if someone threw away your altoids.   Use a Trezor myself.  Really impressed with it so far.  Only have one little gripe.. the usb cable that came with it was flaky but I have at least 10 micro usb cables laying around.



 
 
           ▄████▄
         ▄████████▄
       ▄████████████▄
     ▄████████████████▄
    ████████████████████      ▄█▄                 ▄███▄                 ▄███▄                 ▄████████████████▀   ▄██████████

  ▄▄▄▀█████▀▄▄▄▄▀█████▀▄▄▄     ▀██▄             ▄██▀ ▀██▄             ▄██▀ ▀██▄             ▄██▀                   ██
▄█████▄▀▀▀▄██████▄▀▀▀▄█████▄     ▀██▄         ▄██▀     ▀██▄         ▄██▀     ▀██▄         ▄██▀        ▄█▄          ▀██████████████▄
████████████████████████████       ▀██▄     ▄██▀         ▀██▄     ▄██▀         ▀██▄     ▄██▀          ▀█▀                        ██
 ▀████████████████████████▀          ▀██▄ ▄██▀             ▀██▄ ▄██▀     ▄█▄     ▀██▄ ▄██▀                                       ██
   ▀████████████████████▀              ▀███▀                 ▀███▀       ▀█▀       ▀███▀      ▄███████████████████████████████████▀
     ▀████████████████▀
       ▀████████████▀
         ▀████████▀
           ▀████▀
║║


║║
.
.

║║
██
║║
.
.

║║
██
║║
.
║║


║║
cypherdoc (OP)
Legendary
*
Offline Offline

Activity: 1764
Merit: 1002



View Profile
February 23, 2015, 11:47:05 PM
 #21473

After 1000s of Years Enjoying Gold Standard now Welcome to the Bitcoin Standard

http://blog.btcxindia.com/after-1000s-of-years-enjoying-gold-standard-now-welcome-to-the-bitcoin-standard/
justusranvier
Legendary
*
Offline Offline

Activity: 1400
Merit: 1009



View Profile
February 24, 2015, 12:43:35 AM
 #21474

i foresee the Trezor replacing the offline wallet and its pc and being more secure since the offline wallets can be susceptible to a USB malware attack.  as far as i know, there is no way to get privkeys off a Trezor so in that sense it is safer
I think this is a dangerous assumption to make.

Trezor has a larger attack surface than an offline laptop, since you have to plug it in directly to a potential hostile machine every time you use it.

You can reduce your attack surface with an offline laptop by using CD-R media instead of USB drives, or maybe by using the audio cable transfer method.
Kupsi
Legendary
*
Offline Offline

Activity: 1193
Merit: 1003


9.9.2012: I predict that single digits... <- FAIL


View Profile
February 24, 2015, 12:55:03 AM
 #21475

The main question is if you have just the private key for one or more addresses in a deterministic wallet, are the other addresses at risk or are they secure.

A full Armory wallet is just

1x Root Private Key
1x Root Public Key
1x Chaincode


A watching-only Armory wallet is just

1x Root Public Key
1x Chaincode

So basically watching-only wallets don't have any private key data at all, and the chain code is just a constant that is carried through all the calculations.  With the priv key + chaincode, you can compute all private keys.  With public key + chain, you can compute all public keys that match the private keys produced on the full/offline wallet.

The chaincode and public key are not security-sensitive.  Someone getting them is a breach of privacy, not security.  All internet security is based on the fact that the public key is widely distributed (i.e. "public") and that the scheme maintains full security as long as no one else has the private key.


How about any derived private key, which is not the root key? How serious a leak would that make? Does it compromise all the other private keys as well, if the attacker knows the chain code? (which I assumed is the same for both, private and public chains).


You should always assume that revealing a private key from a deterministic wallet will reveal all siblings.   In Armory wallets, if private key x is revealed with the chaincode, all private keys >= X+1 are revealed.

But I don't spend much time worrying about this.  We do not support or claim to support any use cases where private keys are intentionally revealed.  And if your wallet is unintentionally compromised, they will all be revealed anyway. 
Kupsi
Legendary
*
Offline Offline

Activity: 1193
Merit: 1003


9.9.2012: I predict that single digits... <- FAIL


View Profile
February 24, 2015, 12:57:24 AM
 #21476

i foresee the Trezor replacing the offline wallet and its pc and being more secure since the offline wallets can be susceptible to a USB malware attack.  as far as i know, there is no way to get privkeys off a Trezor so in that sense it is safer
I think this is a dangerous assumption to make.

Trezor has a larger attack surface than an offline laptop, since you have to plug it in directly to a potential hostile machine every time you use it.

You can reduce your attack surface with an offline laptop by using CD-R media instead of USB drives, or maybe by using the audio cable transfer method.

Trezor & Offline Armory multisig FTW Smiley
Adrian-x
Legendary
*
Offline Offline

Activity: 1372
Merit: 1000



View Profile
February 24, 2015, 01:31:00 AM
 #21477



How about any derived private key, which is not the root key? How serious a leak would that make? Does it compromise all the other private keys as well, if the attacker knows the chain code? (which I assumed is the same for both, private and public chains).


You should always assume that revealing a private key from a deterministic wallet will reveal all siblings.   In Armory wallets, if private key x is revealed with the chaincode, all private keys >= X+1 are revealed.

But I don't spend much time worrying about this.  We do not support or claim to support any use cases where private keys are intentionally revealed.  And if your wallet is unintentionally compromised, they will all be revealed anyway. 

Thanks for that just to clear up my understanding it is bad practice to distribute private keys from a deterministic wallet.

However is it still true one would need the chaincode and a private key from that chaincode to reveal the resulting private keys of the children keys?


Thank me in Bits 12MwnzxtprG2mHm3rKdgi7NmJKCypsMMQw
megadeth
Sr. Member
****
Offline Offline

Activity: 289
Merit: 252

bagholder since 2013


View Profile
February 24, 2015, 02:01:54 AM
 #21478

"It's the Blockchain, not Bitcoin that's the real killer app." Debunked
http://www.joecoin.com/2015/02/crypto-20-and-other-misconceptions.html

bagholder since 2013
My sig space is not for sale.
cypherdoc (OP)
Legendary
*
Offline Offline

Activity: 1764
Merit: 1002



View Profile
February 24, 2015, 02:43:52 AM
 #21479



How about any derived private key, which is not the root key? How serious a leak would that make? Does it compromise all the other private keys as well, if the attacker knows the chain code? (which I assumed is the same for both, private and public chains).


You should always assume that revealing a private key from a deterministic wallet will reveal all siblings.   In Armory wallets, if private key x is revealed with the chaincode, all private keys >= X+1 are revealed.

But I don't spend much time worrying about this.  We do not support or claim to support any use cases where private keys are intentionally revealed.  And if your wallet is unintentionally compromised, they will all be revealed anyway. 

Thanks for that just to clear up my understanding it is bad practice to distribute private keys from a deterministic wallet.

However is it still true one would need the chaincode and a private key from that chaincode to reveal the resulting private keys of the children keys?


cypherdoc (OP)
Legendary
*
Offline Offline

Activity: 1764
Merit: 1002



View Profile
February 24, 2015, 02:52:10 AM
 #21480

"It's the Blockchain, not Bitcoin that's the real killer app." Debunked
http://www.joecoin.com/2015/02/crypto-20-and-other-misconceptions.html

nice find:

"As established above, any so-called feature that allows Bitcoin to play nice with competing tokens only serves to make it more vulnerable to being usurped.

The argument that Sidechains will promote a vibrant innovative cryptocurrency ecosystem is misguided at best and disingenuous at worst. Thus far, I've yet to see any charges of treason being discussed by Bitcoin's collective mind of core developers and mining pool decision makers. We'll see if it becomes wise before it's too late."


what am i?  chopped liver?
Pages: « 1 ... 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 [1074] 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 ... 1557 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!