Trezor uses a doubling delay and Ledger uses a wipe after X failed attempts for protecting the pin from brute force attacks. Both are effective methods for pin protection.
something about the music at the end gives me a bittersweet aching feeling, somewhat like nostalgia. Except it's a premonitory sort, as if I can already feel how someday I'll look back at now and long for the relative youth or innocence or simple life that I'm current experiencing
Question: Im interested in setting up multisig. But my concern is that it will increase the amount of physical seed security needed. Now i got one hardware wallet with rudandacy of 2 (gonna be 3) locations. Already at "2 of 3" multisig i would need to physically protect 3x3=9 seed phrases in different locations!? This is why im hesitant about multisig.
for high profile thefts there are companies like chainalysis or elliptic and more than are specialized in reconciliation Wallet adresses to IP adresses. This is how the IRS know who owns what for eg
Many thanks for yoir contents au usual. About tracking stolen crypto.: once the cryptos are moved to an exchange wallet why can't the person be identified? There is an identity behind it (kyc is required) and i guess in case of theft some agency can enforce the disclosure of the identity... what do i miss here? thanks
"As soon as an attacker gains control of your private keys, the first thing they will do is do a sweep." I disagree. An attacker that has access to your private keys may also have access to the private keys of many other people, accessed by the same unknown exploit or vulnerability that affects the victim(s). If the attacker sweeps one wallet from one victim, or even several victims, the likelihood of the security vulnerability that led to the compromised keys becoming known increases. Once the vulnerability becomes known, people will react and destroy the attacker's chance of stealing the funds. If I'm malwaring many different victims via a specific attack vector, it is in my interest as an attacker to wait before sweeping. If I sweep 1-2-3-4 victims, other potential victims will get wise and adjust. As an attacker, I would rather wait until the attack has allowed me access to a larger number of victim's wallets, THEN sweep. We will see this one day. A major exploit that some attacker sat on for months, or years, quietly accumulating private keys...and then one day...BAM...time to sweep. The future fucking scares me.
Android User fair point, but the attacker would have to gamble that the security hole remains a secret that only they know about. As soon as it becomes public knowledge, they are in a race to scoop up all the assets before their victims, or other crooks. Or the hole is patched.
Dear Andreas these wallet oriented lectures are one of the most valuable ones in my opinion. Thank You!
By far the best friend to the bitcoin community. Thanks Andreas.
"Be careful with your seed" - Andreas 2018
:P
5:59 for Multisig
Andreas, Thank you for your service work.
Trezor uses a doubling delay and Ledger uses a wipe after X failed attempts for protecting the pin from brute force attacks. Both are effective methods for pin protection.
Thanks for doing your part Andreas.
something about the music at the end gives me a bittersweet aching feeling, somewhat like nostalgia. Except it's a premonitory sort, as if I can already feel how someday I'll look back at now and long for the relative youth or innocence or simple life that I'm current experiencing
Itll be one of the feelings we remember when we're looking at everyone from the moon (: best of luck to you
Please make review about Safe Pal hardware wallet
Thank you
Next level!!!!
great Andreas thank you
Question: Im interested in setting up multisig. But my concern is that it will increase the amount of physical seed security needed. Now i got one hardware wallet with rudandacy of 2 (gonna be 3) locations. Already at "2 of 3" multisig i would need to physically protect 3x3=9 seed phrases in different locations!? This is why im hesitant about multisig.
I have the same doubts. I think multisig is really appropriate for organizations, maybe not individuals.
Omg andreas replyed to me😲 #1 fan here😬
❤
Great info - Thanks
No one is on andreas level
for high profile thefts there are companies like chainalysis or elliptic and more than are specialized in reconciliation Wallet adresses to IP adresses. This is how the IRS know who owns what for eg
Copay and MT Dox on chain multi signature technology electrum
Whats a multisig system?
Sir is copay multisig very safe?
Can you talk about threshold cryptography? Much better than multi sig and will be more prevalent over the next year.
Many thanks for yoir contents au usual.
About tracking stolen crypto.: once the cryptos are moved to an exchange wallet why can't the person be identified? There is an identity behind it (kyc is required) and i guess in case of theft some agency can enforce the disclosure of the identity... what do i miss here?
thanks
6:20 multisig
Always use a strong password and backup wallet.dat, DeepOnion and other QT wallets are the same.
sir I will appreciate if u please tell me how to recover bitpay multisig wallet if u have all three phrases
How are they asking him?
I H i wish i could ask him something
I H thanks for the info and i wont be able to keep up with these guys im more a philosipher😂
Yes, I take questions through the MOOC (which occurs twice a year), but also in monthly sessions via Patreon: www.patreon.com/aantonop
I make my own paper wallets :p
Juber_meme the realist crypto propa ganda
"As soon as an attacker gains control of your private keys, the first thing they will do is do a sweep."
I disagree.
An attacker that has access to your private keys may also have access to the private keys of many other people, accessed by the same unknown exploit or vulnerability that affects the victim(s).
If the attacker sweeps one wallet from one victim, or even several victims, the likelihood of the security vulnerability that led to the compromised keys becoming known increases. Once the vulnerability becomes known, people will react and destroy the attacker's chance of stealing the funds.
If I'm malwaring many different victims via a specific attack vector, it is in my interest as an attacker to wait before sweeping. If I sweep 1-2-3-4 victims, other potential victims will get wise and adjust. As an attacker, I would rather wait until the attack has allowed me access to a larger number of victim's wallets, THEN sweep.
We will see this one day. A major exploit that some attacker sat on for months, or years, quietly accumulating private keys...and then one day...BAM...time to sweep.
The future fucking scares me.
Android User fair point, but the attacker would have to gamble that the security hole remains a secret that only they know about. As soon as it becomes public knowledge, they are in a race to scoop up all the assets before their victims, or other crooks. Or the hole is patched.
Please unblock my Twitter I have no idea why it's blocked. 😐🤨
Smashed the like first......
It’s all bullsit
Who the fuck down voted
Smashed the like first.....