Sunday, June 15, 2025
HomeBitcoinAssessment of multisig funds safety technique

Assessment of multisig funds safety technique

I need to defend my bitcoin and my risk mannequin is that one of many two paper copies of the seed is accessed to recuperate the pockets and steal the funds. To mitigate this danger I’m considering the choices of a 2-out-3 multi-sig pockets. My first technique is as follows:
Assessment of multisig funds safety technique

I’ve subsequently 4 geographically separate and secret places (excluding myself). When it comes to {hardware} wallets with me, I solely have 1 which implies if the principle machine is stolen, my bitcoins are secure as another secret’s wanted. The identical is true if places 1 or 2 are uncovered and a {hardware} pockets gadgets had been to be stolen (as only one {hardware} pockets is there). Nevertheless, taking the seed perspective, two seeds can be compromised.

My first query is whether or not an attacker can steal the funds with the 2 seeds uncovered or if 3 seeds are a should with a view to recreate the pockets and take the funds? (I’m assuming that if the attacker would have entry to the two seeds to recreate personal keys and the multisig pockets that was arrange on my private laptop just isn’t potential). I believe that’s the case, as a result of recovering multisig pockets on Electrum requires 3 seeds (or 1 seed and a pair of public keys of the co-signers), however wished to double-check with the neighborhood that certainly no bitcoin could be moved with simply two seeds uncovered. Be aware that with this setup it’s successfully cold-cold storage as shifting bitcoin, on this case, requires going to both location 1 or 2 to take both {hardware} pockets 1 or 2 to co-sign with the {hardware} pockets 3.

The opposite possibility is to create a hidden pockets with a passphrase utilizing only one pockets. In that case 2 copies of seed and a pair of copies of the passphrase could be saved in 4 geographically distinct places. If the seed is uncovered then the hidden pockets cannot be accessed and if the passphrase is accessed then the hidden pockets cannot be recreated too. The one vulnerability within the latter case is that if the {hardware} machine was stolen and used to maneuver the cash (both by tampering with it bodily or by instantly utilizing it though utilization could be restricted with the machine PIN).

My second query is whether or not the primary possibility provides a considerably greater entropy for the safety. Be aware that by way of prices of storage the fee can be the identical as in each instances we should make use of 4 places.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments