At the end of the day using a hardware device is going to be way more secure than exposing your private key to a general purpose computer.
If vendor and supply chain attacks are in your threat model, then use multisig, otherwise single-sig + passphrase with an airgapped coldcard device should be ok and is simpler to backup over long periods of time. This was my goto-recommendation for ages but I’m not sure how long that will be if supply chain attacks ramp up.
Alternatively you can just do a 2of2 or 2of3 multisig with two different hwws and a tapsigner for convenience. Just make sure to have plate backups for both wallets stored in two physically separate locations.
This is a bit more complicated, this is why Ive always like the simplicity of singlesig + passphrase. Passphrase acts like a two factor in case the physical security of the seed is compromised.
As for generating a singlesig key in 2024, i would use coldcards dice-entropy feature. Depending on your level of paranoia I would verify the algorithm a few times on a computer to make sure it’s not back-doored or something (sha2(dice roll string)), doing the final run without the verification step, as that would expose the key to a general purpose computer.
Thank you Will. I appreciate it.
I will review these notes carefully before asking further.
🤙🏽
Thread collapsed
Thread collapsed
Don't forget to backup the pubx of the multisig or you can't restore it :)
Thread collapsed