Bitcoin Forum
November 12, 2024, 03:01:04 PM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 [4] 5 »  All
  Print  
Author Topic: Is old 3.5 floppy safer than USB drive for cold storage?  (Read 5734 times)
rodgerdoger
Newbie
*
Offline Offline

Activity: 4
Merit: 0


View Profile
October 08, 2014, 07:47:42 PM
 #61

Honnestly I think paper with redundancy is the best, but the exploit is difficult to execute and will not really be a big deal.
Connor936
Member
**
Offline Offline

Activity: 109
Merit: 10


View Profile
October 09, 2014, 01:26:22 AM
 #62

I guess most people are missing the main question. I already have paper backups in a safety deposit box. The only thing I'm temporarily storing are files created on my cold storage (offline computer), or the only computer that contains the private keys. These "signature files" are stored to the floppy, then my online computer will read them from the floppy and broadcast the transaction. I can do this with a USB drive also but because of the BadUSB hack I was wondering if the old technology would be safer - I know the USD hack won't work on an FDD controller.
I think a better solution would be to use QR codes to transmit the unsigned/signed TXs between computers (I think this was suggested once or twice above). This would prevent any physical attack to your offline computer and would ensure that nothing that has touched your online computer will ever touch your offline computer
Newar
Legendary
*
Offline Offline

Activity: 1358
Merit: 1001


https://gliph.me/hUF


View Profile
October 09, 2014, 06:00:50 AM
 #63

I think a better solution would be to use QR codes to transmit the unsigned/signed TXs between computers (I think this was suggested once or twice above). This would prevent any physical attack to your offline computer and would ensure that nothing that has touched your online computer will ever touch your offline computer

For spending from cold storage, yes. See CIYAM's solution: https://susestudio.com/a/kp8B3G/ciyam-safe

For tx signing, not so easy:

[...]

Okay, so that gets us back to the original question of "how much data do we have to transfer between online and offline computer?"  Unfortunately, the simplest case is not relevant to this discussion:  you have to design the protocol around the 99.9'th percentile case:  which is the case that someone has an offline donation address that they want to clear out.  Let's say they have received 40 donations.

So the transaction will have 40 inputs and 2 outputs. 

The bulk of the data is the supporting transactions which can be anything (transactions created by the donors).  Each one itself may have dozens of inputs, and the signatures are necessarily included!  Let's assume 30 "standard" supporting transactions, and the other ten have 10 inputs each.

  • Tx-to-be-signed:  30 inputs (unsigned) of 48 bytes each, and two outputs of 40 bytes each = 1.5 kB 
  • 30 standard supporting tx:  250 bytes each = 7.5 kB
  • Ten larger tx:  180 bytes for each input (signed), so about 2 kB each = 20 kB

So the online computer needs to communicate 30 kB to the offline computer in this case.  And the offline computer needs to transfer back 30 signatures, which is, at best, 2 kB at a minimum.  The "maximum" a QR code can handle is 3 kB of binary, so that's 10 QR codes from online to offline.  1-2 QR codes the other way.

So the protocol should handle 30 kB without causing a lot of pain.  If the user has to wait a little bit because of a slow communication rate, that's okay because this case is abnormal and waiting 60s for the transfer isn't the end of the world.  But if they can't succeed because it's confusing and they can't figure out how many and which QR codes have been scanned, or which webcam they're supposed to be pointing at which device, and frustrated there are wires everywhere, etc.  Then there's a problem...

As you can tell, I'm very sensitive to the "convenience" of a given feature.  I think the biggest barrier to security is convenience -- users just don't use things that are inconvenient.  But I also don't want to sacrifice security, at all, no matter how much work it is for me.  Which is why there are so many recommendations here that are great, but don't quite the bill.  But I'm pretty sure a solution exists where the user can actually have both, in which case everyone wins Smiley

OTC rating | GPG keyid 1DC91318EE785FDE | Gliph: lightning bicycle tree music | Mycelium, a swift & secure Bitcoin client for Android | LocalBitcoins
CIYAM
Legendary
*
Offline Offline

Activity: 1890
Merit: 1086


Ian Knowles - CIYAM Lead Developer


View Profile WWW
October 09, 2014, 08:58:53 AM
 #64

This is what I really don't *get* when Armory (in particular) talk about offline signing for "cold storage" - it always seems as though they are trying to solve problems for "idiots" (but they seem to forget that "idiots and ingenious" and are going to lose their BTC no matter which software they use - and yes I don't recommend CIYAM Safe for "idiots").

Why on earth would I have "40 donations" to a "cold storage address" that should never have never published. Huh

CIYAM Safe works perfectly on the assumption that you "know what you are doing" and you don't go "publishing your cold storage addresses publicly" (so there should only be 1 UTXO to deal with every time which works perfectly with just QR codes - one to receive the unsigned raw tx and one to send the signed raw tx).

With CIYAM anyone can create 100% generated C++ web applications in literally minutes.

GPG Public Key | 1ciyam3htJit1feGa26p2wQ4aw6KFTejU
Moria843 (OP)
Sr. Member
****
Offline Offline

Activity: 442
Merit: 250


Found Lost beach - quiet now


View Profile
October 09, 2014, 05:47:59 PM
 #65

I guess most people are missing the main question. I already have paper backups in a safety deposit box. The only thing I'm temporarily storing are files created on my cold storage (offline computer), or the only computer that contains the private keys. These "signature files" are stored to the floppy, then my online computer will read them from the floppy and broadcast the transaction. I can do this with a USB drive also but because of the BadUSB hack I was wondering if the old technology would be safer - I know the USD hack won't work on an FDD controller.
I think a better solution would be to use QR codes to transmit the unsigned/signed TXs between computers (I think this was suggested once or twice above). This would prevent any physical attack to your offline computer and would ensure that nothing that has touched your online computer will ever touch your offline computer
Sounds good, but how would I get the QR codes off of the offline computer and onto the online computer. I can generate them on the offline computer and scan them into my phone, but how do I get them to the online computer without using a wand or some other USB interface I'm trying to avoid?

Hot time, summer in the city, back of my mine getting hot & gritty!!!
bornil267645
Sr. Member
****
Offline Offline

Activity: 406
Merit: 250


AltoCenter.com


View Profile WWW
October 09, 2014, 05:53:35 PM
 #66

I don't think there's any significant difference between the floppy and USB. They both have same kind of storage or at least I have used both of them.

Newar
Legendary
*
Offline Offline

Activity: 1358
Merit: 1001


https://gliph.me/hUF


View Profile
October 09, 2014, 07:04:05 PM
 #67

This is what I really don't *get* when Armory (in particular) talk about offline signing for "cold storage" - it always seems as though they are trying to solve problems for "idiots" (but they seem to forget that "idiots and ingenious" and are going to lose their BTC no matter which software they use - and yes I don't recommend CIYAM Safe for "idiots").

Why on earth would I have "40 donations" to a "cold storage address" that should never have never published. Huh

CIYAM Safe works perfectly on the assumption that you "know what you are doing" and you don't go "publishing your cold storage addresses publicly" (so there should only be 1 UTXO to deal with every time which works perfectly with just QR codes - one to receive the unsigned raw tx and one to send the signed raw tx).

Because like you said the other day, Armory is a wallet, that offers the possibility to keep the private keys cold. It's not a single key cold storage. Doesn't matter if it's 40 tx to one address or 40 different addresses. Say you have armoryd (watch-only) giving out addresses to customers. Later you want to spend from those, via the offline computer. There's the problem there.

OTC rating | GPG keyid 1DC91318EE785FDE | Gliph: lightning bicycle tree music | Mycelium, a swift & secure Bitcoin client for Android | LocalBitcoins
Newar
Legendary
*
Offline Offline

Activity: 1358
Merit: 1001


https://gliph.me/hUF


View Profile
October 09, 2014, 07:08:28 PM
 #68

Sounds good, but how would I get the QR codes off of the offline computer and onto the online computer. I can generate them on the offline computer and scan them into my phone, but how do I get them to the online computer without using a wand or some other USB interface I'm trying to avoid?

Built-in webcam on the online PC? Reads the QR code from the offline PC and you always can double check and compare the output the software provides (QtQR for Linux, for example). But depending on tx size you'll end up scanning several QR codes. (etotheipi's post)

OTC rating | GPG keyid 1DC91318EE785FDE | Gliph: lightning bicycle tree music | Mycelium, a swift & secure Bitcoin client for Android | LocalBitcoins
blastmaster
Newbie
*
Offline Offline

Activity: 11
Merit: 0


View Profile
October 09, 2014, 07:47:45 PM
 #69

In addition to the 5.25 inch floppy of course, I just use 2 USB drives and a CD all kept in different places. Done.
CIYAM
Legendary
*
Offline Offline

Activity: 1890
Merit: 1086


Ian Knowles - CIYAM Lead Developer


View Profile WWW
October 10, 2014, 12:34:51 AM
 #70

It's not a single key cold storage.

Not sure what you mean by this - but just to be clear you can have as many "keys" as you like using CIYAM Safe.

With CIYAM anyone can create 100% generated C++ web applications in literally minutes.

GPG Public Key | 1ciyam3htJit1feGa26p2wQ4aw6KFTejU
BIGbangTheory
Member
**
Offline Offline

Activity: 83
Merit: 10


View Profile
October 10, 2014, 01:02:51 AM
 #71

Sounds good, but how would I get the QR codes off of the offline computer and onto the online computer. I can generate them on the offline computer and scan them into my phone, but how do I get them to the online computer without using a wand or some other USB interface I'm trying to avoid?

Built-in webcam on the online PC? Reads the QR code from the offline PC and you always can double check and compare the output the software provides (QtQR for Linux, for example). But depending on tx size you'll end up scanning several QR codes. (etotheipi's post)
Many computers with built in webcam have built in wifi so if the OP is trying to avoid using USB period then he would probably not to be dealing with a computer that could have it's wifi antenna enabled (although this is serious tinfoil hat status).

@moria I believe the risk of using a USB drive is very low. You can further minimize this risk by utilizing good physical security to both your USB drive and your computer that holds the private keys.
CIYAM
Legendary
*
Offline Offline

Activity: 1890
Merit: 1086


Ian Knowles - CIYAM Lead Developer


View Profile WWW
October 10, 2014, 01:20:06 AM
 #72

Many computers with built in webcam have built in wifi so if the OP is trying to avoid using USB period then he would probably not to be dealing with a computer that could have it's wifi antenna enabled (although this is serious tinfoil hat status).

Funnily enough when I bought the old laptop that I use for my "offline system" here in China I got my wife to ask them to remove the WiFi card which surprised the store owner a lot (prompting him to ask why). She looked at him blankly for a few seconds and then explained that the problem is that when she gets online she always ends up in fights with people on the internet so her husband doesn't want her to be able to get online. Smiley

With CIYAM anyone can create 100% generated C++ web applications in literally minutes.

GPG Public Key | 1ciyam3htJit1feGa26p2wQ4aw6KFTejU
Newar
Legendary
*
Offline Offline

Activity: 1358
Merit: 1001


https://gliph.me/hUF


View Profile
October 10, 2014, 09:24:22 AM
 #73

Many computers with built in webcam have built in wifi so if the OP is trying to avoid using USB period then he would probably not to be dealing with a computer that could have it's wifi antenna enabled (although this is serious tinfoil hat status).

Disable it in the BIOS? Or in the OS on first run? Some come with hardware switches that you can super-glue in the off position? Not really a problem.

OTC rating | GPG keyid 1DC91318EE785FDE | Gliph: lightning bicycle tree music | Mycelium, a swift & secure Bitcoin client for Android | LocalBitcoins
Newar
Legendary
*
Offline Offline

Activity: 1358
Merit: 1001


https://gliph.me/hUF


View Profile
October 10, 2014, 09:33:32 AM
 #74

It's not a single key cold storage.

Not sure what you mean by this - but just to be clear you can have as many "keys" as you like using CIYAM Safe.


I understand that. I think the approach is different.

If I understand correctly, CIYAM Safe is meant to put coins in a cold storage as you would with a paper wallet. Put one bitcoin in address A and one in address B. Now, to spend 1.5 BTC for example in single transaction from CIYAM Safe I imagine is a bit tricky?

Whereas with Armory it will create a single transaction 2 BTC -> 1.5 BTC and 0.5 BTC change (to a new adddress) for you. It will also try and select the optimal inputs for a transaction.

I think they are just different solutions to different use cases.


OTC rating | GPG keyid 1DC91318EE785FDE | Gliph: lightning bicycle tree music | Mycelium, a swift & secure Bitcoin client for Android | LocalBitcoins
CIYAM
Legendary
*
Offline Offline

Activity: 1890
Merit: 1086


Ian Knowles - CIYAM Lead Developer


View Profile WWW
October 10, 2014, 09:35:15 AM
Last edit: October 10, 2014, 11:41:08 AM by CIYAM
 #75

I think they are just different solutions to different use cases.

Indeed - I don't deal with "cold storage" like *normal transactions* (and I seriously doubt that anyone else does either).

The basic idea is that you have X "cold storage addresses" and then you "move funds to a hot wallet" from one at a time.

With CIYAM anyone can create 100% generated C++ web applications in literally minutes.

GPG Public Key | 1ciyam3htJit1feGa26p2wQ4aw6KFTejU
evok3d
Sr. Member
****
Offline Offline

Activity: 534
Merit: 250


The Protocol for the Audience Economy


View Profile
October 10, 2014, 11:38:50 AM
 #76

I would probably keep a copy on as many mediums and platforms as you can think being safe, such as :

- Print it out
- Encrypted backups on different mediums
- Put it in a vault if you have to Smiley

I would not say one single method is safe enough. You dont know what is going to happen long term.

  M E   D I   A
P  R -    ▄▄███████▄▄   
  ▄██████▀██████▄ 
 ███████   ███████
▐██████     ██████▌
██████▌     ▐██████
▐██████     ██████▌
 ▀██████▄ ▄██████▀
   ▀███████████▀  
      ▀▀▀▀▀▀▀     
- T  O  C - O - L
MEDIA Protocol in Action
              ▄▄██████▄▄
            ▄████████████▄
           █████▌ ▀▀███████
   ▄████▄▄██████     ▀█████▌
 ▄███▀ ▀████████      ▐█████
▐███▌   ▐████████      ████▌
▐███    ██████████▄▄  ▐████
 ▀███▄▄████▀▀████████████▀
   ▀▀███▀▀     ▀▀████▀▀
   ▄▄▄████████████████▄▄▄    
 ████████████████████████▄  
▐███████████████▀▀▀▀▀▀████▌ 
████████████▀▀▀        █████ 
█████████▀             █████ 
███████              ▐█████ 
█████▀               ██████ 
███▌              ▄██████ 
█████             ▄█████████ 
████▌          ▄▄██████████ 
▐████▄▄▄▄██████████████████▌ 
 ▀███████████████████████▀  
   ▀▀███████████████████▀    
evok3d
Sr. Member
****
Offline Offline

Activity: 534
Merit: 250


The Protocol for the Audience Economy


View Profile
October 10, 2014, 11:40:36 AM
 #77

I ended up using audio using minimodem. This [1] is in the Armory section and for Linux, but it might give you some ideas (you can transmit any kind of data). Cheap investment too for a 3.5mm jack-jack cable.

[1] https://bitcointalk.org/index.php?topic=735111.0

This is a pretty pro way of doing this, though i would not really bother unless you have a large amount of bitcoins Cheesy

  M E   D I   A
P  R -    ▄▄███████▄▄   
  ▄██████▀██████▄ 
 ███████   ███████
▐██████     ██████▌
██████▌     ▐██████
▐██████     ██████▌
 ▀██████▄ ▄██████▀
   ▀███████████▀  
      ▀▀▀▀▀▀▀     
- T  O  C - O - L
MEDIA Protocol in Action
              ▄▄██████▄▄
            ▄████████████▄
           █████▌ ▀▀███████
   ▄████▄▄██████     ▀█████▌
 ▄███▀ ▀████████      ▐█████
▐███▌   ▐████████      ████▌
▐███    ██████████▄▄  ▐████
 ▀███▄▄████▀▀████████████▀
   ▀▀███▀▀     ▀▀████▀▀
   ▄▄▄████████████████▄▄▄    
 ████████████████████████▄  
▐███████████████▀▀▀▀▀▀████▌ 
████████████▀▀▀        █████ 
█████████▀             █████ 
███████              ▐█████ 
█████▀               ██████ 
███▌              ▄██████ 
█████             ▄█████████ 
████▌          ▄▄██████████ 
▐████▄▄▄▄██████████████████▌ 
 ▀███████████████████████▀  
   ▀▀███████████████████▀    
BTCfan668
Member
**
Offline Offline

Activity: 88
Merit: 10


View Profile
October 10, 2014, 11:13:31 PM
 #78

It's not a single key cold storage.

Not sure what you mean by this - but just to be clear you can have as many "keys" as you like using CIYAM Safe.


I understand that. I think the approach is different.

If I understand correctly, CIYAM Safe is meant to put coins in a cold storage as you would with a paper wallet. Put one bitcoin in address A and one in address B. Now, to spend 1.5 BTC for example in single transaction from CIYAM Safe I imagine is a bit tricky?

Whereas with Armory it will create a single transaction 2 BTC -> 1.5 BTC and 0.5 BTC change (to a new adddress) for you. It will also try and select the optimal inputs for a transaction.

I think they are just different solutions to different use cases.


Most people do not send bitcoin directly from their cold storage to the address(es) they are sending to. In my experience most businesses will have a "hot wallet" that will contain a "target" amount of bitcoin. If the hot wallet gets too low then bitcoin will be transferred from their cold storage into their hot wallet. If the hot wallet starts to get too much bitcoin then the company will transfer some of the bitcoin to their cold storage
pumawolf
Sr. Member
****
Offline Offline

Activity: 968
Merit: 250



View Profile
October 10, 2014, 11:30:55 PM
 #79

i dont trust usb drives. i have a magnetic field machine i use in my room time to time. i have my flash drives in my closet. my flash drives dont work anymore, lucky i pull my coins out way before it happen. im very paranoid about my coins now, i dont fuk around no more,i hand write my private keys, twice.
Eisenhower34
Legendary
*
Offline Offline

Activity: 906
Merit: 1002



View Profile
October 11, 2014, 04:13:11 AM
 #80

Many computers with built in webcam have built in wifi so if the OP is trying to avoid using USB period then he would probably not to be dealing with a computer that could have it's wifi antenna enabled (although this is serious tinfoil hat status).

Disable it in the BIOS? Or in the OS on first run? Some come with hardware switches that you can super-glue in the off position? Not really a problem.
If it is in there, in theory it can be used. Some people want to use thicker "tinfoil hats" then others. I personally don't think it is necessary to go to these extremes (or to the extremes that CIYAM went to above) as I believe the incremental amount of security is low
Pages: « 1 2 3 [4] 5 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!