Bitcoin Forum
April 30, 2024, 09:16:56 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Deterministic wallet backups and multisig lockboxes  (Read 821 times)
hhanh00 (OP)
Sr. Member
****
Offline Offline

Activity: 467
Merit: 266


View Profile
August 29, 2014, 12:48:24 PM
 #1

Deterministic wallets have a very good backup feature: They only require you to backup a single piece of data - the seed (Electrum) or the root key (Armory). All present and future keys are created from it.
It's a very comforting idea to know that regardless of what I do to my computer - as long as I have the seed stored somewhere safe - nothing can happen to my funds.

But now what happens if I use multisigs? They use P2SH scripts which basically moves the responsibility of remembering the participant public keys to the redeemer. It's easy to fund a lockbox, it's just an address.
If I create a lockbox for a trust fund, it may take years before someone wants to redeem it. By then, if no one has a copy of the lockbox definition, the fund is lost.
Essentially, when using multisigs I am back to having to maintain individual backups for every multisig address - less I risk a permanent loss. It's much more work than the deterministic wallet case, don't you think?

Am I missing something?

Thanks

PS: As a workaround, I considered sending a small transaction to the participants when the lockbox is created in order to store its definition in the blockchain.

1714511816
Hero Member
*
Offline Offline

Posts: 1714511816

View Profile Personal Message (Offline)

Ignore
1714511816
Reply with quote  #2

1714511816
Report to moderator
1714511816
Hero Member
*
Offline Offline

Posts: 1714511816

View Profile Personal Message (Offline)

Ignore
1714511816
Reply with quote  #2

1714511816
Report to moderator
1714511816
Hero Member
*
Offline Offline

Posts: 1714511816

View Profile Personal Message (Offline)

Ignore
1714511816
Reply with quote  #2

1714511816
Report to moderator
The forum strives to allow free discussion of any ideas. All policies are built around this principle. This doesn't mean you can post garbage, though: posts should actually contain ideas, and these ideas should be argued reasonably.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714511816
Hero Member
*
Offline Offline

Posts: 1714511816

View Profile Personal Message (Offline)

Ignore
1714511816
Reply with quote  #2

1714511816
Report to moderator
wasserman99
Sr. Member
****
Offline Offline

Activity: 476
Merit: 250



View Profile
August 29, 2014, 05:14:44 PM
 #2

You are correct. If you have an m-of-n multisig address then you should keep regular backups of each of your "n" private keys in the same way that you would backup your private keys that can be used for a "traditional" bitcoin address. The difference is that you should store each of these keys separately.

I would argue that using multisig is generally not good for long term storage, but is better for shorter term transactions, for example when you pay for a good on the internet but don't release the funds until you receive the goods.

Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!