Bitcoin Forum
November 11, 2024, 02:43:50 PM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2] 3 »  All
  Print  
Author Topic: Can Bitcoin wallets be trusted?  (Read 3827 times)
R2D221
Hero Member
*****
Offline Offline

Activity: 658
Merit: 500



View Profile
July 13, 2014, 05:14:46 PM
 #21

This is an important step to take if you truly want to be paranoid about your wallet. This would only prevent an attack if an attacker was able to get control over the domain, but not the dev's private PGP key, and the public PGP key is found somewhere outside of the domain. If a user finds the dev's public PGP key on the same website/domain that they are downloading the file from then the attacker could simply change the PGP key listed and sign a message saying that their (malicious) download is the most up to date and correct one.
Well, it seems that at some point you will need to trust someone or something.
But to minimize the problem of replaced PGP keys, I would publish my public key in all my public profiles I have.

An economy based on endless growth is unsustainable.
InwardContour
Sr. Member
****
Offline Offline

Activity: 644
Merit: 260


View Profile
July 13, 2014, 08:02:32 PM
 #22

This is an important step to take if you truly want to be paranoid about your wallet. This would only prevent an attack if an attacker was able to get control over the domain, but not the dev's private PGP key, and the public PGP key is found somewhere outside of the domain. If a user finds the dev's public PGP key on the same website/domain that they are downloading the file from then the attacker could simply change the PGP key listed and sign a message saying that their (malicious) download is the most up to date and correct one.
Well, it seems that at some point you will need to trust someone or something.
But to minimize the problem of replaced PGP keys, I would publish my public key in all my public profiles I have.
I think a better way for most users would simply be to search the forums for reports of incorrect code being on a particular wallet. There will enviably be people that will check the PGP key and check the source code to make sure everything is "on the up and up" and if not will report it. This would be much simpler for the less technically inclined. 
DjPxH
Full Member
***
Offline Offline

Activity: 210
Merit: 100


View Profile
July 13, 2014, 08:14:03 PM
 #23

Online wallets may be unsafe, yes. If you don't possess the private key for your bitcoin's addresses, you basically don't own them. All you've got is an IOU...

▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
PRIMEDICE
The Premier Bitcoin Gambling Experience @PrimeDice
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
pirsquared
Member
**
Offline Offline

Activity: 109
Merit: 10


View Profile
July 13, 2014, 08:53:05 PM
 #24

i agree -- i just think it's important to make sure you're getting the file that the developer intends. as another poster pointed out, an attack on the developer's site/man-in-the-middle attack could put you at risk if you don't confirm with a PGP signature.

This, I cannot stress how important it is to make sure that you are getting the version that the developer intended and not one that has been placed there with malicious intent thanks to some security hole on the site. The best thing would be to go through every line of code for the open source program and understand what each does, but this requires both a shit ton of time and a knowledge that a majority of people lack.

<---Critical information there. Always check your source and verify the signature.

If you HODL store it CODL!
CEG5952
Hero Member
*****
Offline Offline

Activity: 658
Merit: 500

Buy and sell bitcoins,


View Profile
July 13, 2014, 09:17:56 PM
 #25

This is an important step to take if you truly want to be paranoid about your wallet. This would only prevent an attack if an attacker was able to get control over the domain, but not the dev's private PGP key, and the public PGP key is found somewhere outside of the domain. If a user finds the dev's public PGP key on the same website/domain that they are downloading the file from then the attacker could simply change the PGP key listed and sign a message saying that their (malicious) download is the most up to date and correct one.
Well, it seems that at some point you will need to trust someone or something.
But to minimize the problem of replaced PGP keys, I would publish my public key in all my public profiles I have.
I think a better way for most users would simply be to search the forums for reports of incorrect code being on a particular wallet. There will enviably be people that will check the PGP key and check the source code to make sure everything is "on the up and up" and if not will report it. This would be much simpler for the less technically inclined. 

The problem is, exploits can go on for some time before they are noticed. In the meantime, everyone downloading the file and not verifying the signature is at great risk.

InwardContour
Sr. Member
****
Offline Offline

Activity: 644
Merit: 260


View Profile
July 14, 2014, 01:28:07 AM
 #26

This is an important step to take if you truly want to be paranoid about your wallet. This would only prevent an attack if an attacker was able to get control over the domain, but not the dev's private PGP key, and the public PGP key is found somewhere outside of the domain. If a user finds the dev's public PGP key on the same website/domain that they are downloading the file from then the attacker could simply change the PGP key listed and sign a message saying that their (malicious) download is the most up to date and correct one.
Well, it seems that at some point you will need to trust someone or something.
But to minimize the problem of replaced PGP keys, I would publish my public key in all my public profiles I have.
I think a better way for most users would simply be to search the forums for reports of incorrect code being on a particular wallet. There will enviably be people that will check the PGP key and check the source code to make sure everything is "on the up and up" and if not will report it. This would be much simpler for the less technically inclined.  

The problem is, exploits can go on for some time before they are noticed. In the meantime, everyone downloading the file and not verifying the signature is at great risk.
This is true, however people will often report when they lose bitcoin as you likely see often on these forums and on reddit (if you read reddit) when people lose their bitcoin. I would think that if there was some kind of exploit on say Multibit for example that the community would be able to make this conclusion quickly when a lot of people report loosing their coins when using multibit.

EDIT: the more technological inclined should still check the PGP signature and the source code on github for any issues, and when something is not right should report it and make it public.
jonald_fyookball
Legendary
*
Offline Offline

Activity: 1302
Merit: 1008


Core dev leaves me neg feedback #abuse #political


View Profile
July 14, 2014, 02:11:06 AM
 #27

Excellent advice given in this thread.

I would like to add that large amounts of coins should be put into
cold storage wallet to begin with, and only transferred out
of cold storage using an offline-signed transaction.

Musent
Sr. Member
****
Offline Offline

Activity: 266
Merit: 250


View Profile
July 14, 2014, 02:37:24 AM
 #28


Most bitcoin wallets are open source. This means that anyone is able to inspect the code of the wallet to ensure that these types of attacks could not happen.

typical geek answer. so this is what you would reply with if your grandma asked the question, just before she went and downloaded a wallet from a website she never personally heard of but had been told by a friend to go there...
The same thing could be said about apps or any other software out there.
EtherCoin
Sr. Member
****
Offline Offline

Activity: 338
Merit: 255


View Profile
July 14, 2014, 02:39:23 PM
 #29

Stick with the most common used walles and you should be fine.

bitcoin-qt, electum, multibit or armory.

Choices enough.

Good point too, recap updated:

a) Download a well known, often used wallet from trusted source
b) Check MD5 hash
c) Check PGP signature
d) Have your wallet in a dedicated PC, used exclusively for this usage (come on you stingy BTCers... playing holder of the future of the world economy and not willing to spend 100 bucks in a basic system?)
e) Encrypt wallet
f) Physically disconnect LAN cable when not in use for paranoia users.
g) Faraday cage... wait, wouldn't this also screw the HDD? Cheesy

Eth.

after
e) Encrypt wallet
comes
f) make backups, usb, hdd

So true.

so final recap:

a) Download a well known, often used wallet from trusted source
b) Check MD5 hash
c) Check PGP signature
d) Have your wallet in a dedicated PC, used exclusively for this usage (come on you stingy BTCers... playing holder of the future of the world economy and not willing to spend 100 bucks in a basic system?)
e) Encrypt wallet
f) Backup, backup, backup
g) Physically disconnect LAN cable when not in use for paranoia users.
h) Faraday cage... checked, will not damage your HDD in any way and will protect from random NKorea EMPs Cheesy

Please feel free to bring more suggestions in for the ultimate safe-wallet-procedure

Eth.
itod
Legendary
*
Offline Offline

Activity: 1974
Merit: 1077


^ Will code for Bitcoins


View Profile
July 14, 2014, 03:57:01 PM
 #30

h) Faraday cage... checked, will not damage your HDD in any way and will protect from random NKorea EMPs Cheesy

I believe original poster suggesting the Faraday cage didn't have in mind the protection of your equipment from the EMP, it's for protecting the electromagnetic spilling from your equipment being read outside of the building you are in. There are claims that there is equipment which can read the state of your screen from the car parked in front of your building. I won't mention USB keyloggers which send all your keystrokes to remote C&C servers, just waiting for the attacker's WiFi hotspot to appear on the horizon while he drives by your house. You've protected your machine from being opened while you are out of house and USB keylogger inserted directly on the motherboard, right? Right?!?
juju
Sr. Member
****
Offline Offline

Activity: 381
Merit: 250



View Profile
July 14, 2014, 04:05:34 PM
 #31

The Bitcoin block chain is trustless in the sense that it's automatically secure. What about Bitcoin wallets? Can't they make fraud payments with the users' bitcoins? If someone installs an insincere Bitcoin wallet then it can start paying bitcoins to some other Bitcoin address than what the user has intended. Or?

Generate your own address using the guide below on an offline computer without network card or network card drivers:

http://www.righto.com/2014/02/bitcoins-hard-way-using-raw-bitcoin.html

Live boot to an OS offline and use any wallet to generate a key or vanity Generator, backup the keys on a piece of paper, or to a USB drive after you encrypt the files containing the keys with PGP. If you don't want to live boot, be offline and just make sure too format the computer you used to generate the keys with while its offline before it ever goes back online or destroy the hard drive that generated the keys and buy a new one.
EtherCoin
Sr. Member
****
Offline Offline

Activity: 338
Merit: 255


View Profile
July 14, 2014, 05:51:06 PM
 #32

h) Faraday cage... checked, will not damage your HDD in any way and will protect from random NKorea EMPs Cheesy

I believe original poster suggesting the Faraday cage didn't have in mind the protection of your equipment from the EMP, it's for protecting the electromagnetic spilling from your equipment being read outside of the building you are in. There are claims that there is equipment which can read the state of your screen from the car parked in front of your building. I won't mention USB keyloggers which send all your keystrokes to remote C&C servers, just waiting for the attacker's WiFi hotspot to appear on the horizon while he drives by your house. You've protected your machine from being opened while you are out of house and USB keylogger inserted directly on the motherboard, right? Right?!?

Hehe, a keylogger still requires some code to be executed inside the computer, about the equipment that can read your screen... Didn't know about it, interesting.

Still, faraday cages at affordable prices and with Alienware logo engraved seems like a business with future!

Eth.
minerpumpkin
Hero Member
*****
Offline Offline

Activity: 686
Merit: 500


A pumpkin mines 27 hours a night


View Profile
July 14, 2014, 06:19:52 PM
 #33

h) Faraday cage... checked, will not damage your HDD in any way and will protect from random NKorea EMPs Cheesy

I believe original poster suggesting the Faraday cage didn't have in mind the protection of your equipment from the EMP, it's for protecting the electromagnetic spilling from your equipment being read outside of the building you are in. There are claims that there is equipment which can read the state of your screen from the car parked in front of your building. I won't mention USB keyloggers which send all your keystrokes to remote C&C servers, just waiting for the attacker's WiFi hotspot to appear on the horizon while he drives by your house. You've protected your machine from being opened while you are out of house and USB keylogger inserted directly on the motherboard, right? Right?!?

I see we've entered the realms of unreasonably high security measures again... Reminds of this recent xkcd:
(http://xkcd.com/538/)

I should have gotten into Bitcoin back in 1992...
itod
Legendary
*
Offline Offline

Activity: 1974
Merit: 1077


^ Will code for Bitcoins


View Profile
July 14, 2014, 06:27:01 PM
 #34

h) Faraday cage... checked, will not damage your HDD in any way and will protect from random NKorea EMPs Cheesy

I believe original poster suggesting the Faraday cage didn't have in mind the protection of your equipment from the EMP, it's for protecting the electromagnetic spilling from your equipment being read outside of the building you are in. There are claims that there is equipment which can read the state of your screen from the car parked in front of your building. I won't mention USB keyloggers which send all your keystrokes to remote C&C servers, just waiting for the attacker's WiFi hotspot to appear on the horizon while he drives by your house. You've protected your machine from being opened while you are out of house and USB keylogger inserted directly on the motherboard, right? Right?!?

Hehe, a keylogger still requires some code to be executed inside the computer, about the equipment that can read your screen... Didn't know about it, interesting.

Still, faraday cages at affordable prices and with Alienware logo engraved seems like a business with future!

Eth.

Wrong! No software or drivers required, here's a simpler model which can not be mounted inside the laptop or computer case, so it's easily observable, and doesn't have it's own WiFi:
https://www.keelog.com/usb_hardware_keylogger.html
More sophisticated models may be in the computer next to you  Grin

Edit:
Here's the WiFi version, 0.23BTC on Amazon:
https://www.keelog.com/wifi_hardware_keylogger.html

I can't find now the "inside the case" version, but Google is your friend.
jonald_fyookball
Legendary
*
Offline Offline

Activity: 1302
Merit: 1008


Core dev leaves me neg feedback #abuse #political


View Profile
July 14, 2014, 06:45:28 PM
Last edit: July 14, 2014, 07:10:06 PM by jonald_fyookball
 #35

Re:  bitcoin the "hard way"...  here is a "medium way"
solution:

Just wrote this python script:

https://bitcointalk.org/index.php?topic=694521.new#new

It is compatible with the Electrum wallet (my favorite wallet).
Basically, it is a stand-alone python script that will generate
your seed and addresses for you.

Once you use it to generate your seed, you can use Electrum
normally (OFFLINE -- you should ALWAYS be cold storage for any serious
amounts)... and you can verify the addresses generated to ensure the
seed was generated properly and that everything checks out,
with the added security of seeing the code first hand that
generates the random seed.

- Because the script is small, you can easily review it yourself, quickly,
  so backdoors cannot be hidden in the source code.

- Because you run it from source, there is no danger of running
  a malicious executable

- User friendly for slightly technical users

 

giveBTCpls
Sr. Member
****
Offline Offline

Activity: 322
Merit: 250


View Profile
July 15, 2014, 12:03:02 AM
 #36

Ok maybe this is a bit off topic but I want to ask, when using a non Bitcoin Core wallet like Electrum (i've only used Bitcoin Core ever), can I use my wallet.dat file with Electrum and I will get the up to date balance and payment history plus all of my recieving/sending addresses on there?

jonald_fyookball
Legendary
*
Offline Offline

Activity: 1302
Merit: 1008


Core dev leaves me neg feedback #abuse #political


View Profile
July 15, 2014, 03:17:26 AM
 #37

Ok maybe this is a bit off topic but I want to ask, when using a non Bitcoin Core wallet like Electrum (i've only used Bitcoin Core ever), can I use my wallet.dat file with Electrum and I will get the up to date balance and payment history plus all of my recieving/sending addresses on there?

I think wallet.dat files may be importable across wallets but
it is not guaranteed to work, may require special commands
or procedures, and may not preserve all of your history.
 
Also, if you import addresses into a deterministic wallet
like Electrum, those addresses wouldn't be derived from the
master seed, and therefore are not automatically backed up
or restorable from seed.


giveBTCpls
Sr. Member
****
Offline Offline

Activity: 322
Merit: 250


View Profile
July 16, 2014, 12:54:14 PM
 #38

Big disadvantage of Bitcoin: high rate of scam

I personally don't trust online wallets, exchanges, it's like staying still in the middle of a high speed road waiting to be winnowed.

Take as many precaution as you can, it is your money, real money that costs time and time is life.

Legit, I say I don't trust exchanges but I always end up leaving the coins there because basically lazyness and not wanting to miss good opportunities in the alt coin market.

giveBTCpls
Sr. Member
****
Offline Offline

Activity: 322
Merit: 250


View Profile
July 16, 2014, 12:55:43 PM
 #39

Ok maybe this is a bit off topic but I want to ask, when using a non Bitcoin Core wallet like Electrum (i've only used Bitcoin Core ever), can I use my wallet.dat file with Electrum and I will get the up to date balance and payment history plus all of my recieving/sending addresses on there?

I think wallet.dat files may be importable across wallets but
it is not guaranteed to work, may require special commands
or procedures, and may not preserve all of your history.
 
Also, if you import addresses into a deterministic wallet
like Electrum, those addresses wouldn't be derived from the
master seed, and therefore are not automatically backed up
or restorable from seed.



This seems like a pain in the ass to me. I'll stil to Bitcoin Core for now. I think they should work on full wallet.dat portability as one of the main priorities.

jonald_fyookball
Legendary
*
Offline Offline

Activity: 1302
Merit: 1008


Core dev leaves me neg feedback #abuse #political


View Profile
July 16, 2014, 12:56:34 PM
 #40

Ok maybe this is a bit off topic but I want to ask, when using a non Bitcoin Core wallet like Electrum (i've only used Bitcoin Core ever), can I use my wallet.dat file with Electrum and I will get the up to date balance and payment history plus all of my recieving/sending addresses on there?

I think wallet.dat files may be importable across wallets but
it is not guaranteed to work, may require special commands
or procedures, and may not preserve all of your history.
 
Also, if you import addresses into a deterministic wallet
like Electrum, those addresses wouldn't be derived from the
master seed, and therefore are not automatically backed up
or restorable from seed.



This seems like a pain in the ass to me. I'll stil to Bitcoin Core for now. I think they should work on full wallet.dat portability as one of the main priorities.

I'm not positive about the accuracy of my statement. 

Pages: « 1 [2] 3 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!