multi signature – Overview of multisig funds safety technique

on

|

views

and

comments


I wish to defend my bitcoin and my menace mannequin is that one of many two paper copies of the seed is accessed to recuperate the pockets and steal the funds. To mitigate this danger I’m considering the choices of a 2-out-3 multi-sig pockets. My first technique is as follows:
enter image description here

I’ve due to this fact 4 geographically separate and secret places (excluding myself). By way of {hardware} wallets with me, I solely have 1 which implies if the principle system is stolen, my bitcoins are protected as yet another key’s wanted. The identical is true if places 1 or 2 are uncovered and a {hardware} pockets gadgets have been to be stolen (as only one {hardware} pockets is there). Nonetheless, taking the seed perspective, two seeds could be compromised.

My first query is whether or not an attacker can steal the funds with the 2 seeds uncovered or if 3 seeds are a should with a purpose to recreate the pockets and take the funds? (I’m assuming that if the attacker would have entry to the two seeds to recreate personal keys and the multisig pockets that was arrange on my private laptop will not be doable). I feel that’s the case, as a result of recovering multisig pockets on Electrum requires 3 seeds (or 1 seed and a couple of public keys of the co-signers), however needed to double-check with the group that certainly no bitcoin will be moved with simply two seeds uncovered. Be aware that with this setup it’s successfully cold-cold storage as shifting bitcoin, on this case, requires going to both location 1 or 2 to take both {hardware} pockets 1 or 2 to co-sign with the {hardware} pockets 3.

The opposite choice is to create a hidden pockets with a passphrase utilizing only one pockets. In that case 2 copies of seed and a couple of copies of the passphrase will be saved in 4 geographically distinct places. If the seed is uncovered then the hidden pockets cannot be accessed and if the passphrase is accessed then the hidden pockets cannot be recreated too. The one vulnerability within the latter case is that if the {hardware} system was stolen and used to maneuver the cash (both by tampering with it bodily or by immediately utilizing it though utilization will be restricted with the system PIN).

My second query is whether or not the primary choice provides a considerably increased entropy for the safety. Be aware that when it comes to prices of storage the price could be the identical as in each instances we should make use of 4 places.

Share this
Tags

Must-read

The Rise of White-Label Crypto Exchanges: Dominating the Market with Turnkey Options | by Codezeros | Sep, 2024

The cryptocurrency market has grown astronomically in recent times. It has garnered the eye of buyers, companies, and know-how fans alike. With the...

AVIA Welcomes Torc – Torc Robotics

WASHINGTON DC – September 18, 2024 – The Autonomous Automobile Trade Affiliation (AVIA) welcomes Torc Robotics, a pioneer in self-driving expertise and an...

The Strategic Information to Taking Earnings 2024 – Blockchain Information, Opinion, TV and Jobs

The cryptocurrency market continues to evolve quickly, making 2024 a pivotal yr for each seasoned buyers and newcomers. Amid this progress, mastering the...

Recent articles

More like this

LEAVE A REPLY

Please enter your comment!
Please enter your name here