No video

Bitcoin Q&A: Why is Seed Splitting a Bad Idea?

  Рет қаралды 41,751

aantonop

aantonop

Күн бұрын

Пікірлер: 228
@garthjeffcoat
@garthjeffcoat 4 жыл бұрын
I'm having trouble following the logic of this... How is it better for you if someone finds your entire seed phrase than if they only find 2/3 of it? If they have it all they don't have to crack anything?
@maxx7694
@maxx7694 4 жыл бұрын
I agree.. anybody finding the entire seed phrase could figure out how to steal your coins, but it would take quite a bit more knowledge and effort for them to crack 2/3 of it. While the 2/3 split method may not be optimum, it would seem to provide much more protection from the average snooper.
@Cryptoversity
@Cryptoversity 4 жыл бұрын
Because they shouldn't find it. Secure the whole thing in multiple locations (locked, sealed). It is more likely you hinder yourself or lock yourself out of your own coins. Just like insanely high password complexity in companies just make people end up writing their password on the laptop.
@garthjeffcoat
@garthjeffcoat 4 жыл бұрын
@@Cryptoversity I still don't understand how hiding multiple copies of the full seed in secure locations is better than hiding split copies in secure location. I think the complexity is not much of an issue as, if you're smart enough to split them, you'll be smart enough to figure out how to get them back together. But on the other hand, how many random burglars who say, stole your safe, are going to be able to figure out how to brute force a cryptocurrency wallet?
@garthjeffcoat
@garthjeffcoat 4 жыл бұрын
@@Cryptoversity Okay, so basically it's a bad idea if you can't figure out how to undo a very simple process of combining three sets of words. I think I'm good.
@Cryptoversity
@Cryptoversity 4 жыл бұрын
@@garthjeffcoat Because the chance of getting broken into, and the robber knowing what they are looking for and then instantly using it to rebuild the wallet is far lower than the chance of you being denied access to two of the 3 locations by destruction, pandemic, or other occurence. I learned a long time ago in Enterprise IT networks that too much security is overkill and a risk in itself.
@WilliamSitu
@WilliamSitu Жыл бұрын
I originally agreed with this video, but after revisiting the topic I see the "never split the phrase, no exceptions" as a dogmatic and flawed perspective, which doesn't take into account all threat models. A threat model in favor of a 2 of 3 recovery scheme: you don't have any 100% secure locations, but you have locations that are secure most of the time and can know and act relatively quickly when one of them gets breached: Examples of these locations are homes, apartments, bank safe deposit boxes, and pretty much every safe location because you inherently need to trust people and the environment when it comes to physical items. As other comments have pointed out, someone finding one of your backups is not as bad as someone finding your whole seed phrase, and so each copy of your seed phrase in different locations reduces your security. Also, a tamper evident device has a much better place with part of a split phrase than it does a full phrase, because one will tell you that you need to move your funds asap, while the other will tell you that your funds are gone. And if you are able to move your funds because of a breach faster than the missing words can be cracked, then 80 bits of security is a fine buffer (which my math below says it does). Then Andreas mentions the "super paranoid" method would be using a passphrase, and have that in another secure location (the passphrase would need to be 12 characters long to have higher than 80 bits of security (or 40 characters to match the 256 bits of security), so it won't be easy to remember). However, this is basically a 2 of 2 recovery scheme, so his whole spiel about losing 2 parts that he mentions later is even worse in this method. Unless you aren't confident that you could always access any 2 of 3 locations, splitting would be better. A threat model in favor of phrase splitting over SSS: You don't have access to an airgapped/secure computer, and don't want to be dependent on the few hardware wallets that support SLIP39: Recovering funds with SSS is much more complex compare to putting two phrase parts together. As Andreas said, complexity is the enemy of security and usability. In this case, you'll need to use some software on a computer to reconstruct the phrase from the shamir secrets, and malware stealing keys is generally a bigger threat than having a vault looted (SSS decreasing security). SLIP39 is not widely adopted, and having flexibility in what tools (especially hardware wallets) you can use to recover funds is important (SSS/SLIP39 decreasing usability). Currently, Trezor and some other hardware wallets support SLIP39, but Ledger and many others do not. Also, I would equally want to get a new wallet if I found out one part was breached, whether I was using phrase splitting or SSS, because practically speaking, the attacker just needs one more part. Some math: I would only apply this to 2/3 split for 24 word seed phrases, not sure other threshold/share combinations, and definitely not for 12 word seed phrases. Based on iancoleman's bip39 tool, it would take 3830854 years to crack. My own calculations using 1 trillion guesses per second and either 2048^7 possibilities or 2^80 possibilities, it still would take thousands of years. And I don't see a future where 80 bits is hard to crack for retail but easy to crack for an unsophisticated attacker, which would be the threat model for most people. In security, the only rule that applies to all is that there is no one size fits all.
@Josh-zz4wc
@Josh-zz4wc 3 жыл бұрын
If you are assuming that a bad actor got 1 of your 3 seed splits, wouldn't they just have the whole 24 words in your senario?
@why_so_serious
@why_so_serious Жыл бұрын
This!
@nickyb82
@nickyb82 Жыл бұрын
Don't use a quite sensible idea of splitting your keys in a 2/3 multishard method and securing in safe places. Instead keep your full seed phrase on one sheet and store it in a BANK. Jesus Christ.
@mountains1233
@mountains1233 3 жыл бұрын
If you lose 2 of 3, you're screwed. But if you don't seed split, you just need to lose 1 of them. Maybe I'm not understanding this one.
@uraldamasis6887
@uraldamasis6887 3 жыл бұрын
While I don't necessarily agree that the scheme posed in the question is the best idea (storing 2/3rds of the words in plain text in 3 separate locations), I am convinced that it is a far, far superior idea to the one that aantonop proposed, which is to store the entire 24 words in a single location and physically guard it.
@grahamhenry9368
@grahamhenry9368 2 жыл бұрын
The reason it’s absolutely NOT superior to split the key as mentioned is because if an attacker finds just one of the three keys, they could likely break the key with brute force methods even though they don’t have the other two . This means that your funds are now more vulnerable than keeping your key in one location
@awseko4732
@awseko4732 2 жыл бұрын
@@grahamhenry9368 if 8 words are missing, you need 2048^8 combinations. Basically the entire btc network would need 3.5 years to crack your wallet. Gives you plenty of time to use the other 2 back ups to move your funds to a new wallet. Whereas if an attack stole your whole 24 words then you're fucked and now its a race to move the funds first (assuming you have another copy)
@gorovitz
@gorovitz Жыл бұрын
@@grahamhenry9368 is it safe if attacker finds the entire key?
@grahamhenry9368
@grahamhenry9368 Жыл бұрын
@@gorovitz no, if the attacker finds the whole key then they have your coins
@wrfootball3847
@wrfootball3847 Жыл бұрын
@@grahamhenry9368 so I think that's the point. Surely if the attacker finds the 24 word seed it's all over immediately. Bit if they find 2/3 then it's not over immediately and maybe never
@bartolo5
@bartolo5 2 жыл бұрын
This video is stupid AF. It's trying to argue that physically distributing your seed is worse than having it whole in one place alone. He arguments it by saying that finding one 1 of 3 set make it easier to bruteforce your way into the seed..... vs finding the whole seed which would give you the seed without moving a finger 🤦
@steemium
@steemium 3 жыл бұрын
Good luck cracking 80 bits in the time it takes me to find out one of my shard has been compromised.
@UserHuge
@UserHuge 3 жыл бұрын
Point is the price for that on cloud compute will get down in not so far future.
@krishnayogi
@krishnayogi 3 жыл бұрын
@@UserHuge thats still far better than an attacker getting access to your Full 24 word seed isint
@krishnayogi
@krishnayogi 3 жыл бұрын
exactly man, in many countries ( including UK) govt these days sieze safe deposit boxes ( even private ones unfortunately ) if you keep them there thinkings its safe , the first person that opens it will steal your money and may be quit his job and shit ! its much better not put the full seed in one place
@super8mate
@super8mate Жыл бұрын
@Steemium right, he said it would take about 10 years. So if you do the 2/3 split thing, just reseed every 5 years to be safe, even if you have no suspicion someone has 2 parts. In 5-10 years there will be other better devices/methods too.
@licensedblockhead
@licensedblockhead 4 жыл бұрын
This is the only thing I have ever had the knowledge to disagree on with Andreas. The point is that you can lose one and still be fine and a bad actor would need to find 2. With 8 words missing, even if one is the checksum, it would take a while to crack (enough time to transfer funds). SLIP is too complicated for most retail users. He read the question wrong at one point as well. 3:33. Each has 16 words not 8. So you can lose 1 key and be fine
@krishnayogi
@krishnayogi 3 жыл бұрын
exactly man , Andreas please take down this video or explain more clearly why you want users to store the full seed in once place .... storing the full seed in once place like deposit box is super risky , coz the employees of the bank can sneak up on the seed etc ( in bad countries ) if half the seed is missing and kept in your home say ... its super difficult to guess the thing isint ?
@uraldamasis6887
@uraldamasis6887 3 жыл бұрын
Listen again. He didn't read it wrong. He described each share as having 16 words. But yes, Andreas' argument is wrong.
@seanhoutmeyers3102
@seanhoutmeyers3102 3 жыл бұрын
My neighbor's wife accessed my seed last night. What should I do now??
@DylanMoss
@DylanMoss 3 жыл бұрын
Beware of her husband's brute force attack.
@super8mate
@super8mate Жыл бұрын
Good start. Now find 2 more women and give them each access to 2/3 of your seed too. In case of emergency, you will need to create a threesome using any two. Practice drills recommended.
@simontvrner
@simontvrner Жыл бұрын
If you have all 24 seed words stored in one location and that secure location is compromised, then you have 0 (zero) bits of security. I'd rather have 80 bits than no bits of security. What am I missing here!?
@bpkdasbaum
@bpkdasbaum Жыл бұрын
you don't do that, you add a simple cipher to your 24 words, or you have a passphrase stored separately.
@wrfootball3847
@wrfootball3847 Жыл бұрын
Yes true, but if we compare like for like 2/3 of the 24 words is better than all 24 words right? You could also cipher the 2/3 of 24 words which is safer than cipher of all 24 words.
@copycatt2579
@copycatt2579 10 ай бұрын
@@wrfootball3847doing something non standard is very hard for family later on to figure out. Also there are significantly more secure ways of accomplishing the same thing. The main way being simply adding a pass phrase stored somewhere else. A pass phrase can even be in stored hot.
@agentw2264
@agentw2264 8 ай бұрын
You will increase the probability that your seed is compromised(stolen) by 300%. It's like saying a plane with 3 turbines is safer than a one turbine plane.
@Btree33
@Btree33 Ай бұрын
You’re missing a lot
@npetalas
@npetalas Жыл бұрын
@aantonop any update on this? I think there is a major flaw in your logic (as others have pointed out already), happy to be proven wrong. You were so focused on how much easier it is to brute force 80 bits of entropy vs 256 but that you completely ignored the fact that in the alternative scenario where he hadn't split it up, whoever found 1 copy would have the full seed already and not need to brute force anything, assuming 1 out of 3 locations compromised in both scenarios, all other things being equal etc. Surely an attacker having to brute force "only" 80 bits of entropy is better than them having the entire seed? Looking forward to hearing from you. Cheers
@m.p.6802
@m.p.6802 4 жыл бұрын
I just totally disagree. The biggest risk for your seed is entering it into a normal general purpose computer (your PC). You never know what malware is there, even if you are very professional. That is why you use a hardware wallet. So for your backup you need a mechanism which does not need a computer to create or to restore. The 2 out of 3 scheme allows this SLIP39 does not! Further assuming you use 2 out of 3 with your 24 word seed. Why do you do this and how do you do this. You do this to have a backup and because you have no total control on the locations you store them in. Still you decided to do so to cover risk of lost by catastrophe like fire. Of cause for every day use you have your hardware wallet. You secure your backup as good as possible with a seal so you detect if someone has opened and read the (part) seed words and you lock them as good as possible. You choose locations which are distant and independent of each other. That is required for catastrophe protection, but this means you will not notice a lost backup part at once. But you will notice at some time and then you will move your coins at once to another seed. It is totally unimportant if it is possible to crack this in a cluster somewhere in future requiring still a lot of time. You will (have to) be faster in detecting lost backup and moving your coins. You will not be fast enough if someone gets access to a full backup (all seed words). Now to the numbers: BIP39 uses 1/32 of encoded data as checksum. There are 2048 different words, each word encode 11 bits. The Checksum for 24 word seed is 8 bits, which is quite less than a word. This means if you brute force attack a part backup, you will find every 256 tries a result with a valid checksum. But this does not mean you found the seed. 8 words are 2^88 or 88 bits to crack. Even if you assume you do spare the 8 checksum bits, this is still 80 bits to crack including accessing the blockchain because an attacker will find 2^72 (2^80/2^8) wrong seeds! So my result: 2 out of 3 is an easy to use and sufficient secure method for seed backup of a hardware wallet! A backup which weights and covers all risks (lost and disclosure) very well!
@LetalisLatrodectus
@LetalisLatrodectus 3 жыл бұрын
I would also like to add that physical safes are incredibly easy to get into to. Much easier than brute forcing 8 seed words. The argument about brute forcing doesn't make any sense anyway because the comparison is between storing all seed words vs 16 seed words. Where in one case you don't have to brute force anything at all. So saying "well brute forcing 8 seed words is too easy" doesn't make sense since brute forcing 0 words is even easier. The actual argument should be about how to store your seed words without people gaining access to them and physical safes are not great at this. Especially consumer relatively cheap safes. Extra passphares on top of the seed word is probably the real answer, even though you then have to store those as well. Heck the good thing about that is that you can store that passphrase a bit more liberally as long as nobody knows that's the passphrase for your hardware wallet.
@RoseMarieMullins
@RoseMarieMullins 3 жыл бұрын
@@LetalisLatrodectus Good information. Is storing 2/3 in a bank vault safe? People say the bank can open the safes.. how would or could I ever know if they did that? I don't know what other options I have. I'm not a homeowner or willing to bolt a safe to the basement floor.
@sumofighter
@sumofighter 2 жыл бұрын
I completely agree with you. Securing with 2 out of 3 combination is not bad. But what he forgot to mention is that you need to remember that if one of the piece is missing you need to move your funds to new wallet asap. And I agree with you, do it your way is better than do it the standard way. The best security solutions are the once that have been designed in non standard way. I need to completely disagree with Andreas as much as I admire him.
@sumofighter
@sumofighter 2 жыл бұрын
Also not to advertise to anyone and anything but there is an app that I used lately that exactly does what Andreas is talking about. It gives you an option to secure your words with 2 out of 3 and stated what you have mentioned. The app states that with this approach you are never 100% secured (like with any approach) and you only buy a time to react. Any method even Shamir even if one piece is compromised, user should take further steps to re-secure its wallet with new phrase.
@CubeBag
@CubeBag 2 жыл бұрын
Do SLIP39 by hand
@jamesjacob9632
@jamesjacob9632 3 жыл бұрын
Terrible idea to put your unseizable coins in a bank. It's insane that you would rely on that.
@lluiszardoya
@lluiszardoya 7 күн бұрын
I know wtf is he thinking?????
@michaelngfinance
@michaelngfinance 2 жыл бұрын
Splitting seed words would buy you time to move your coins to another wallet when one of your seed storage devices is stolen.
@sumofighter
@sumofighter 2 жыл бұрын
Exactly, 2 out of 3 is not bullet proof security, but rather gives you a comfortable time to act and move your coins to different wallet. No approach is bullet proof. If you have Shamir with split 2 out of 3 you have the same problem
@Mooja12
@Mooja12 4 жыл бұрын
"Don't split your keys because attackers can brute force it with partial slices." also "Don't split your keys because if you lose one slice you won't be able to brute force it with partial slices." Hummm... something seems amiss here.
@aantonop
@aantonop 4 жыл бұрын
An attacker has the resources and knowledge to brute-force more than the average user. It's an asymmetric risk.
@privacyplease64
@privacyplease64 9 күн бұрын
@@aantonop One of the dumbest things I've ever heard
@mountains1233
@mountains1233 3 жыл бұрын
All it takes is the bank manager to look up the ledger leak list and see if anyone on it is a box holder at his bank. Opens the box (justified by saying "customer was suspicious") takes a pic of your seed, so no way to prove he tampered with it. You're done. Even if you have paraphrase if can be brute forced.
@AChainofBlocks
@AChainofBlocks 4 жыл бұрын
Just a Thank You from me. Please keep em coming...
@My1xT
@My1xT 3 жыл бұрын
Fun fact trezor one (which was MADE by the ppl who made the SLIPs) default recovery also goes down to 80 bits
@UnitAlir
@UnitAlir Жыл бұрын
How so?
@My1xT
@My1xT Жыл бұрын
@@UnitAlir by the nature that you enter the words computer, in a random order dictated by the trezor (shows it on screen which (eg first, second etc) word to enter) So a piece of malware can get all 24 words but not the order. And 24! (24*23...*2*1 aka the combinations of sorting 24 things) is equal to roughly 80 bits
@UnitAlir
@UnitAlir Жыл бұрын
@@My1xT i haven't set up a Trezor yet. At what point does it make you enter your seed on a PC? I haven't seen that step in any tutorials
@My1xT
@My1xT Жыл бұрын
@@UnitAlir Recovery, only applies to the trezor one (trezor T has touch) and only for the default method. there's an advanced recov but it obviously isnt the default.
@UnitAlir
@UnitAlir Жыл бұрын
@@My1xT You didn't word that quite clearly enough. Are you saying that when you recover a trezor one that you enter your seed phrase out of order on a PC?
@alchymista2
@alchymista2 Жыл бұрын
I think this is some sort of crypto urban legend. How in earth could be NOT storing complete phrase in one place less secure that doing so? If the place is compromised it's gone. That's 1bit security. Shamir secret sharing is obviously superior, but in the end of 2022, I'm not aware of any other wallet than Trezor T, that supports it. And using some other tool to create Shamir backup from your seedphrase? Seriously? Maybe on some shady website? :)
@Cryptoversity
@Cryptoversity 4 жыл бұрын
I keep mine in metal safes in 2 countries (one is fireproof) and also inside fireproof LiPo battery sleaves; besides having 2 of 3 Ledgers with me in a (different country than the safes)
@PatrickAyelle
@PatrickAyelle Жыл бұрын
The math on this as follows. Brute forcing 8 words (not including the check sum word) is 2^88. 4:18 . IF the last word (checksum) is included it would be 2^80 as he said. It is not quick nor cheap to brute for this. 6:19 He is saying it could be done in the next decade with a cluster.
@spIette
@spIette 9 ай бұрын
yeah, that's safe enough for me
@Hugo-ew2ko
@Hugo-ew2ko 2 жыл бұрын
I think this logic is very much flawed tbh. Yes you reduce the security to only 80 bits instead of 256 if one location is compromised. However, assuming there is less than 100 million $ hidden behind your keys, it seems unlikely to me that it would be worth the effort to brute force those 7/8 words. It seems much more likely to me that someone will break into your vault and steal your entire seed and take your coins... Especially is you store the entire seed in multiple locations, to me you are increasing liability instead of decreasing it. In aantonop his proposal all you have to do is threaten one person to give you access to the safe and it's game over. If you store it in a bank which should be 'safe' the bank can still fk you. In the proposal of the questioner you would have to do that in two different locations realistically speaking which is much less feasible from a practical standpoint, especially if we're talking 2 different continents.
@LetalisLatrodectus
@LetalisLatrodectus 2 жыл бұрын
That's why he says use a passphrase. There is no need to reduce the security of 256 bit private key to 80 bits when you can achieve the same thing with a passphrase.
@Silarous
@Silarous Жыл бұрын
​@@LetalisLatrodectus80 bits of security with a passphrase is much better than 0 bits of security with a passphrase.
@leesweets4110
@leesweets4110 2 жыл бұрын
I dont get this guy. Kind of BS, if you ask me. He's saying "yes, store a backup of your seed phrase because that is safe" but at the same time "dont split your seed phrase because that makes it unsafe"? WHAT?!?! You dont add vulnerability by splitting it. If youre going to store it anywhere in a safe and responsible manner, then yes, by all means, store it split. Store each part in a safe and responsible way, and you have increased your security, not diminished it. Youre not wrong that it isnt a shamir scheme and that if the partial phrase is uncovered, some information about the seed is revealed. Im not disputing that. Im disputing the assertion that having 2/3 of a phrase is less safe than having all of it, which is what your spiel at the beginning claimed. Clearly having 2/3 is less safe than having none of it, obviously, but you are assuming that any of it will be accessible by a bad actor simply because the user decided to make a split. It think its non-sequitur. This guy is responding to a fundamentally different question than the one asked. The question asked was "is splitting the seed safe" and his answer is "you should store your phrase in a safe". Cant both be true? Youre not answering the question; youre distracting from it.
@Satssetyoufree
@Satssetyoufree 2 ай бұрын
Don't split your seed. Use a passphrase, memorize, and back up (steel / paper). Keep multiple copies of your seed (steel / paper) at your home. Keep your passphrase back ups off site, e.g. relative. Your seed is 100% safe from a thief finding it - you need both the seed and passphrase to restore your wallet
@krishnayogi
@krishnayogi 3 жыл бұрын
I disagree with andreas, its better to split the seed world in two locations coz lets say you put one half in a safe deposit box and other in a secret location etc , the chances of an attack in both the places is incredibly rare ( even siezure from bad govts ) however its not super difficult to pass this knowledge to your heirs! if you ensure its placed few more places
@SillyGrandma99
@SillyGrandma99 4 жыл бұрын
You proved mathematics is important & common sense sucks
@caribbeanwhale-professiona2634
@caribbeanwhale-professiona2634 4 жыл бұрын
not always
@sl523
@sl523 4 жыл бұрын
I wouldn't say this is common sense. Very few people are aware of OP_CHECKSUM function.
@JivanPal
@JivanPal 4 жыл бұрын
@@sl523, the checksum is largely irrelevant to the discussion being had here.
@sl523
@sl523 4 жыл бұрын
Jivan Pal yes it does. Did you watch the video?
@JivanPal
@JivanPal 4 жыл бұрын
​@@sl523, the presence of a checksum does not affect the conclusions made about using trivial splits vs. using Shamir's scheme. The checksum is a trivial afterthought when it comes to encoding the binary seed as a sequence of English words. It is largely added for convenience, making the bijection between binary and English words simpler to implement, whilst also providing a basic form of error-checking when a seed phrase in inputted by a user.
@peterpetrov6522
@peterpetrov6522 4 жыл бұрын
If you guess how many silver coins I hold in my hand, I'l give you both of them.
@GrueneVanilleWaffel
@GrueneVanilleWaffel Жыл бұрын
maybe two?
@adamroberts6935
@adamroberts6935 3 жыл бұрын
What are your thoughts on seedless multisig (ala Casa)? Do you see improving security and UX so anyone can adequately secure without metal plates and treasure maps? I think the risk of loss by over securing(lost seed/passphrase) is greater than loss of funds in most scenarios?
@MasterNeiXD
@MasterNeiXD 4 жыл бұрын
That's cryptography 101.
@seanhoutmeyers3102
@seanhoutmeyers3102 3 жыл бұрын
Why is Bitcoin not even a bit like a Coin??
@jimmymcgill5572
@jimmymcgill5572 3 жыл бұрын
Is it safer splitting 12 words and 12 words and storing separately vs the example you gave of 16/8?
@kllnex7286
@kllnex7286 3 жыл бұрын
no
@jimmymcgill5572
@jimmymcgill5572 3 жыл бұрын
@@kllnex7286 how not? having 16 words has to obviously be easier for a hacker than 12? what am i missing
@kllnex7286
@kllnex7286 3 жыл бұрын
@@jimmymcgill5572 i meant about the one who stores it, if you somehow lose one your 12 words, or one of your 8 - 16 words, you are pretty much left with nothing
@thetribe5054
@thetribe5054 3 жыл бұрын
@Macgruber no. For the same reasons Andreas explained here. Cracking just half of the 24 word mnemonic isnt twice as easy, its something like 10^46 times easier, or that much less secure. Plus im not sure what you didnt get about "splitting is not safe" or "storing together is the only way" (not verbatim)
@jimmymcgill5572
@jimmymcgill5572 3 жыл бұрын
@@thetribe5054 finding a whole key together is a lot easier to steal than half a key...
@Chuck_N0rris
@Chuck_N0rris 7 ай бұрын
If you have a 24-word phrase which is the standard with ledgers nowadays and split it in half, that is pretty secure. Dont spread the pieces all across the world though. Put one piece in the attic and one in the basement for example. Hide your ledgers well. Have at least one clone and hide the clone in a bank box. In case your place burns down, you have the ledger and can withdraw the funds to make a new seed phrase on a new device. You can dig down some crypto steel in a sturdy box in your back yard with your full seed phrase. The likelihood of anyone finding it is close to zero and it would likely survive a natural disaster. Keep in mind that you will die some day and that you might want someone to be able to recover your assets. Maybe dont go as far as trusting any single person with all your info but what you can do is to give them some sort of instruction. Write the instructions in your will or leave them in a bank box. Make sure it is something they will understand but that doesnt necessarily make any sense to any outsiders.
@Steve.191
@Steve.191 4 жыл бұрын
Trust the Banks?
@bradmarcus26
@bradmarcus26 4 ай бұрын
How is shamir different than XOR? Which to choose?
@xinkaelusher663
@xinkaelusher663 2 жыл бұрын
isnt a loteasier to get brute forced if we let the full mnemonic phrase in one place, like a 2.94e79 times easier than 256 bits entropy mnemphrase if someone finds it out in just one place?????
@mokahless
@mokahless 4 жыл бұрын
The new remix of the song at the end made me think someone was tapping on my window.
@richiebtcrich7846
@richiebtcrich7846 Жыл бұрын
Lots of disagreement here. I think the thought is if you hide your key in one place.. ( full Key ) opposed to hiding the 3 partial keys in three places, its more likely ( better chances) that a person would be able to find 2 of the three keys hiding places rather than just one assuming that the hiding place was equal secure.
@macgyver9013
@macgyver9013 3 жыл бұрын
1) What if you use an encyption/file splitting program that for example splits a seed into two encrypted files (that are useless on their own)? Only when they are combined and decrypted together can they produce the entire seed. Could be doing this offline. You could supplement this to a billfodl or cryptosteel type device. We dont want to be opening tamperproof seeds everytime we need to look at it. I suspect most people would still yeild to pen and paper for quick access. 2) What if you are working with a team and dont want any one ( or 2) people to have access to the entire seed? I suspect an admin role would be required to use the entire seed, while other members have no access once wallets are set up.
@FizzBhaal
@FizzBhaal Жыл бұрын
You don't ever want your seed entered into a computer. Yes you could do this offline, but you would have to securely destroy/wipe the hard drive of the device afterwards to ensure the seed was not somehow stored there (perhaps just windows caching the memory to disk). Otherwise someone might later recover the seed from that computer (offline or online). And you end up with two files (which you need to store on e.g. two USB keys), which means you need a computer again to access the seed, again with the same problems. It is just not easy to do well.
@gabrielmorris86
@gabrielmorris86 3 жыл бұрын
Andreas - would your objections be assuaged by splitting the phrase into two batches of twelve words each? Wouldn't having access to only twelve words still leave twelve unknown words - which is sufficient for protecting many wallets on their own? (Echoing the point from Jeffrey Meland earlier in the comments)
@DylanMoss
@DylanMoss 3 жыл бұрын
But then you have no redundancy and you are as vulnerable to loss as storing only one copy. See my comment on a 3 of 4 split, that allows for loss of any one copy.
@hamradiocq
@hamradiocq Жыл бұрын
Safe deposit box!!! Noooooo! Worst place ever.
@JJhodlsBITCOIN
@JJhodlsBITCOIN 7 ай бұрын
What about 12 and 12? im still not convinced 12 and 12 is a bad idea
@Fa1rplayy
@Fa1rplayy 8 күн бұрын
yeah, incredible how this is not explicitly addressed / dismantled, since this should come to mind first one would expect....
@NateB
@NateB Жыл бұрын
Skip to 1:00 for the short answer.
@oliverallen5324
@oliverallen5324 Күн бұрын
You’re more likely to lose the seed than to have it stolen. That’s the reality. Physical barriers are better than cryptography. Keep it simple, don’t tell people about your money. Be kind.
@spotshortmanipulators4721
@spotshortmanipulators4721 4 жыл бұрын
Thank God ! You Answered Just One Question Today ... I Had Time to digest This Time....
@ahmedyildirim-wt3jk
@ahmedyildirim-wt3jk Жыл бұрын
What about this solution for the seed: Location A and C (1-12) Location B and D (13-24). As long only one location ist compromised, no problem. If A and B or C and B or A and D or C and D are compromised to the same time, no problem. Only problem is if A and C or B and C, or at least 3 locations to be compromised. In my opinion it sounds pretty save as it es unlikely that 2 locations are compromised to the same time. In addition memorize all of your words, quite easy with linking 3-5 words by embedding them in a story and repeat everyday for 2 weeks. Then later test your memory once a week. For me personally, it's the only way to feel safe and independent, as i know i can leave country immediately without looking for the seed.
@PURPLE_SHADE_SMOOTHIE
@PURPLE_SHADE_SMOOTHIE 4 жыл бұрын
The general public mass adopters will not pursue this extreme geek-level of detail. What is a simple yet still secure suggestion? Thank you.
@bassmeo3937
@bassmeo3937 4 жыл бұрын
he just said it, you store your mnemonic phrase in a safe.
@sl523
@sl523 4 жыл бұрын
Much safer without any logistical hassle would be the addition of a passphrase.
@JivanPal
@JivanPal 4 жыл бұрын
Andreas has stated it: store the phrase just as you would store backups of your personal data. If you need a _"k_ of _n"_ system of phrases, then generate phrases from the seed phrase in accordance with SLIP-0039, which uses Shamir's scheme under the hood, or alternatively, use a multi-sig wallet.
@My1xT
@My1xT 3 жыл бұрын
@@JivanPal shamir does not work on most hw wallets tho and using a computer is just dumb
@JivanPal
@JivanPal 3 жыл бұрын
@@My1xT, which just reinforces the fact that a _"k_ of _n"_ system is almost always a bad idea, else support for SLIP39 would be prevalent.
@tenslein8977
@tenslein8977 2 жыл бұрын
How were you able to calculate the brute force cracking difficulty? How many years do you think it will be until a 256 "bit" code is brute force-able?
@Andrew_dot_pls
@Andrew_dot_pls Жыл бұрын
There are ways to do this calculation obviously, way beyond me. However if you want to know roughly how hard it is to brute force a 24 word seed.... Count every grain of sand on Earth. Then imagine every one of those grains is another Earth each with the same amount of grains of sand. Your private key is just one of those grains of sand. Currently all the supercomputers (and all of Earths total computing power for that matter) would take 10s of millions of years to find your key! That good enough security for you? :) This is why it's possible to just randomly generate a new seed and not accidentally stumble on someone else's seed. The chances are astronomically unlikely.
@jeffreymeland1495
@jeffreymeland1495 4 жыл бұрын
Would you recommend 24 words over 12 words? Or is 12 words OK?
@foxbox2879
@foxbox2879 4 жыл бұрын
24 is superior. Some wallets are 24, but keep your other 12 words and give you 12. 24 !!!
@JivanPal
@JivanPal 4 жыл бұрын
@@foxbox2879, interesting, I have never come across this - which wallets only give you 12 words? Are these wallets still generating the phrase in accordance with BIP39?
@foxbox2879
@foxbox2879 4 жыл бұрын
@@JivanPal browser wallets like metamask, MEW ( my ether wallet ) give you 12. But I have 24 generated thru a ledger.
@foxbox2879
@foxbox2879 4 жыл бұрын
@@JivanPal Its not uncommon at all.
@JivanPal
@JivanPal 4 жыл бұрын
@@foxbox2879, I've re-read some of BIP32 now, and duh, the 12-word vs 24-word scheme is because many wallets have started using 256-bit seeds rather than 128-bit seeds. For some reason, I thought we'd been using 256-bit seeds all along.
@elizabethwoods8883
@elizabethwoods8883 4 жыл бұрын
Hi aantonop may I ask what is the best wallet keeping USDT. I sold some btc recently and waiting to buy back when btc break down on price. But in the main time I just want to keep my USDT in a personal wallet than in the exchange. Thank you
@samanhataminezhad8092
@samanhataminezhad8092 4 жыл бұрын
Check out unstoppable
@emmanueljames2487
@emmanueljames2487 2 жыл бұрын
Storing keys in an encrypted pendrive with good backed up password a good plan?
@kelperbelcher
@kelperbelcher 3 жыл бұрын
Thanks!
3 жыл бұрын
For all the comments misinterpreting this video, he didn’t say someone finding part of the key is worse than someone finding the whole key. He said that someone finding part of the key built as the question states is worse than someone finding one part of a SSSS
@uraldamasis6887
@uraldamasis6887 3 жыл бұрын
You're missing the point. The comments are NOT misinterpreting the video. His main argument against the scheme was that a bad actor only needs to brute force 7 or 8 words, which could maybe be done with a supercomputer, and then they could access your crypto. His solution was to STORE THE ENTIRE 24 WORDS IN MULTIPLE LOCATIONS, so that a bad actor only needs to find one of your locations and then they immediately have access to all your crypto.
@hireahitCA
@hireahitCA 3 жыл бұрын
@@uraldamasis6887 This is pretty much what I’m getting. Also, a 12 word code is effectively the same as breaking the private key on bitcoin itself, so if an attacker has the resources to do that, they don’t need to mess around with finding half of your 24 word seed. At least to me, this means we need 12 words in practice, so with 24 words, we can safely store up to 12 of them in one place without compromising security.
@kastakan
@kastakan 4 жыл бұрын
Eyebrows!!!
@fatechas
@fatechas 11 ай бұрын
Shamir onde Trezor T is a good option??
@Dajlec
@Dajlec 5 ай бұрын
Ok I'm imagining someone breaking into my home. If the burglar finds 24 words he will immediately go to the local store and transfer all my crypto in a matter of 1 hour. If he finds 12 words he will need to study brute forcing or find a friend who knows about how to brute forcing. In this time I will notece the break in and transfer my founds. I don't get it.
@wilsontexas
@wilsontexas Жыл бұрын
This is the 1st video of his I've seen and I won't watch anymore because of this one
@camillo8575
@camillo8575 2 жыл бұрын
This decentralized world is sending us back to banks
@minwooseo
@minwooseo 2 жыл бұрын
disagree.It's a good idea for most people. 7 words need 2 Millenium to be hacked.
@user-dv2cg5or4h
@user-dv2cg5or4h 8 ай бұрын
i think u missed the point. its not about the nsa trying to crack it - its aboutensuring me mum cant get me crypto braz.
@DarrylBass
@DarrylBass Жыл бұрын
this is what ChatGPT says about brute forcing 7 words. can you explain why AI says one thing and you say another? "Assuming the 7-word phrase is randomly generated from a list of 2048 words (which is the standard for BIP39 mnemonics), there are 2048^7 possible combinations, or about 1.4 x 10^21 combinations."
@barnettwilliams6780
@barnettwilliams6780 2 жыл бұрын
Bro, you misinterpreted the question.
@davoodulhakeem9044
@davoodulhakeem9044 3 жыл бұрын
Can you make a video explaining how to make bitcoin account
@bradmarcus26
@bradmarcus26 4 ай бұрын
So this is a good idea?????? LOL
@123leop
@123leop Жыл бұрын
wrong
@rainbowpineapple715
@rainbowpineapple715 4 жыл бұрын
Nice mug
@PFC_50_Grand
@PFC_50_Grand 4 жыл бұрын
I believe Andreas IS Satoshi himself
@JR-jj2dh
@JR-jj2dh 4 жыл бұрын
paul burdi He isn’t
@PFC_50_Grand
@PFC_50_Grand 4 жыл бұрын
J R he is he told me so
@Steve.191
@Steve.191 4 жыл бұрын
Everyone goes through that stage. ✌️
@aantonop
@aantonop 4 жыл бұрын
I am not Satoshi. I've said I'm not Satoshi several times publicly. I've never told you, or anyone else, differently.
@licensedblockhead
@licensedblockhead 4 жыл бұрын
@@aantonop I know you're not but satoshi would say the same thing if confronted
@stephenkamenar
@stephenkamenar 4 жыл бұрын
if you wanna add a bit of splitting security to your backup a good way would be to use SSSS 2 of 2. put 1 away in high security like normal and keep the 2nd in like dropbox and whatever where it's not very secure but you're sure you'll never lose it.
@steemium
@steemium 3 жыл бұрын
or just split a 24 words in two, 128bit is still uncrackable.
@kevinriley5686
@kevinriley5686 4 жыл бұрын
Haha wow
@monkeytron5061
@monkeytron5061 4 жыл бұрын
What about jumbling up the words based on a number you keep in your brain? Forgetting the number or dying aside, is this MORE secure?
@CryptoGuide
@CryptoGuide 4 жыл бұрын
Depends on your seed length, a 12 word seed can just be brute-force descrambled... Just use a BIP39 passphrase...
@monkeytron5061
@monkeytron5061 4 жыл бұрын
Crypto Guide I.e a 24 word phrase?
@CryptoGuide
@CryptoGuide 4 жыл бұрын
A scrambled 24 word seed has about 10^22 possible combinations, a scrambled 12 word seed has less than a billion...
@monkeytron5061
@monkeytron5061 4 жыл бұрын
Crypto Guide Excellent. I did the maths right for a change.
@jpp59
@jpp59 4 жыл бұрын
@@monkeytron5061 no, 24 word + a long passphrase easy to remember. To be able to import the seed you will need the 24 word and the passphrase. This is very useful because you can put your 24 word papers in a lot of place and backups without risking someone finding it and stealing your funds.
@josexrg
@josexrg 4 жыл бұрын
I have a proposal to save the seeds, distribute them in 3 different places geographically written on paper in key places. But I do not write one of the words in any of the 3 written in case someone casually found it. The missing word is stored only in brain memory. What do you think of this mechanism?
@licensedblockhead
@licensedblockhead 4 жыл бұрын
There is a 25th word you can add to seeds. This is standard on some wallets. You dont need to remove a word
@galmeidayou
@galmeidayou 4 жыл бұрын
@@licensedblockhead It's called passphrase, which is highly recommended for several reasons.
@ericx7736
@ericx7736 2 жыл бұрын
what if you lost part of your memory? say hit by a deer accidentally.
@josexrg
@josexrg 2 жыл бұрын
​@@ericx7736Actually I improve my strategy I save 2 copies on different locations. one of them on a paper. other on a usb with keepass encrypted with password.​ In both I omit 4 words because 4^27 is difficult to brute force (less than 4 words if it falls into the wrong hands it can be discover). The other four words I write down in an unsecured place by writing their position and the word. e.g. 1. key. As it is currently impossible to discover the key with only 4 words I am not even worried about having where others can see them. Finally the usb have a offline backup.
@educateyourself7646
@educateyourself7646 4 жыл бұрын
Satoshi has spoken...
@bitcoin.seit.2016
@bitcoin.seit.2016 4 жыл бұрын
Mathematik he know... but emphatic he dont have
@MasterNeiXD
@MasterNeiXD 4 жыл бұрын
Empathie?
@caribbeanwhale-professiona2634
@caribbeanwhale-professiona2634 4 жыл бұрын
90% traders have same problems)
@MasterNeiXD
@MasterNeiXD 4 жыл бұрын
@@caribbeanwhale-professiona2634 he ain't no "trader" gtfo
@JoergWessels
@JoergWessels 4 жыл бұрын
Englisches Sprak, schweres Sprak, nicht wahr?
@bitcoin.seit.2016
@bitcoin.seit.2016 4 жыл бұрын
you need salt
@JivanPal
@JivanPal 4 жыл бұрын
That's not what salts are for.
Bitcoin Q&A: Key Storage Best Practices
18:15
aantonop
Рет қаралды 55 М.
🩷🩵VS👿
00:38
ISSEI / いっせい
Рет қаралды 26 МЛН
Nurse's Mission: Bringing Joy to Young Lives #shorts
00:17
Fabiosa Stories
Рет қаралды 3,1 МЛН
黑天使遇到什么了?#short #angel #clown
00:34
Super Beauty team
Рет қаралды 47 МЛН
Bitcoin Q&A: What is a Private Key?
18:18
aantonop
Рет қаралды 43 М.
Secret Sharing Explained Visually
7:57
Art of the Problem
Рет қаралды 52 М.
Bitcoin Q&A: Threshold Signatures and Shamir Secret Sharing
15:43
John McAfee: about blockchain, bitcoins and cyber security
37:51
How to Web
Рет қаралды 698 М.
How To Make Your Own Crypto Steel Recovery Seed Backup for Only $3.35
10:24
John Chow dot Com
Рет қаралды 137 М.
How To ACTUALLY Store Your Seed Phrase: Best SAFETY Methods!!
5:57
Bitcoin Q&A: Derivation Paths and Watch-Only Wallets
12:55
aantonop
Рет қаралды 13 М.
🩷🩵VS👿
00:38
ISSEI / いっせい
Рет қаралды 26 МЛН