I wasn't critiquing the 24 word split, just trying to answer the "does it give extra security hit" 🫂
No need to stipulate 👍
People shouldn't have this kind of reaction: rising up or curling into a ball, for a result of a vote. Especially one for a two party corrupt either way system.
If the votes were proven to be rigged, sure. If a war were started or even instigated or fuelled, sure, but not this. This, whether you like it or not, was the result of democracy. It is what a large percentage of your fellow citizens wanted.
This is the result of so much divide and extreme belittling between parties.
Bitcoin Fog founder Roman Sterlingov was sentenced to 12.5 years for laundering $400M in illicit funds; assets were forfeited by U.S. authorities.
https://bitcoinnews.com/legal/bitcoin-fog-founder-12-years-prison/
Bullshit. 😠
Yeah, multisig offers the ability to spread trust across multiple hww, but conversely, it kind of mandates it too. If you are gonna use a single device, with MAYBE the exception of seed signers.
If you were gonna do it all on one device, then what's the pojnt of it? You're bringing the keys into one place, and even if not, you're bringing the keys onto one device.
The main benefit to seedxor for me is that you never lose entropy, or better said, the entropy is only ever as low as the lowest entropy key.
As an example, if I have a random key and xor it wjth 11111.... then if you find the random key, then you are way more than half way there. Conversely if all keys are properly generated, then even if you have 2 of 3 of the 128bit keys, you still are 0% of the way to finding the final answer.
Get me? Like if you have a 256bit 24 word phrase, and split it into 2, 12, and I find the first 12 words, I'm half way there. I only need to brute force 128bits.
If you have 3 128 bit keys, and you find 1 of them, you have nothing, you still need to brute 128 bits... if you find 2 of 3, same, brute 128 bits. If you had 0, brute 128 bits.
Plus each key is valid, checksum and all. So you never even have any clue how many parts there are.
If you haven't had a look at SEEDXOR, definitely do. It allows you to take an existing key and turn it into 2, 3, 4, 10 if you want.
You just generate 9 new keys (for 10, just to be extra here) and combine them, and then combine them with the real key. That will give you the 11th key and you can safely discard of the real key and geo disperse the 10 keys.
Okay, don't do 10 remaining keys.
Curious on people's thoughts on this.
I was thinking about multisig vs single sig and I think I came to the conclusion that multisig protects best against THEFT and not necessarily LOSS.
Let me explain.
If you are considering single sig vs multi sig, consider if you think you are more prone to losing things or if you are more likely to be robbed or targeted.
If you are more prone to losing things, then you are probably also more likely to lose 2 things before you realise you lost anything.
You also burden yourself with finding multiple safe spaces, ideally geographically disperse. Either you don't disperse them well enough and a house fire destroys 2 of 3 keys, or you do, but it is difficult to monitor them and they are MORE prone to losses without your knowledge.
This has always bugged me about multisig, this idea that we just turn one problem into three (or two in case of collaborative custody)
If you are worried more about theft or being targeted, then multisig has a meaningful benefit.
Why might theft be an issue?
- Maybe you insist on a digital key (hot)
- Maybe you are a public figure
- Maybe you live in a bad neighborhood
This doesn't guarantee protection against a $5 wrench attack, but if you have to travel across town with a gun to your back to spend the funds, maybe they'll move on considering it a waste of their time and maybe that leads to more deadly outcomes, but we'll ignore that.
I'm thinking more along the lines of a digital data leak or a home invasion while you are away.
In this case, if you used a single key, your funds are gone. At best you and the attacker are racing or raising fees, just to prevent the other from getting the money.
In a multi sig setup, assuming you are not loss prone and are likely to learn of a copied or stolen key in a reasonable time, you know how to get to 2 keys to recover the funds quickly while the attacker is still looking for another valid key.
If you use collaborative custody, chances are that there are identity checks or time constraints for the attacker and you still have 2 keys to immediately recover.
At the very worst, a sophisticated attacker might steal one key to trigger you to start recovery and then follow you and $5 wrench attack you once they have all the pieces. But this starts to reach into the what if category. Well, you basically have to be a VIP public figure or a dick who boasts about their wealth most likely and also not have hired security.
I'm curious if I hit the nail on the head here or if you have a different opinion. Let me know.
#asknostr
Dunno, I've been enjoying the lack of rain recently to be honest.
Funilly I use both since I use VPN in always on mode.
Still fast.
A previous account I used was blocked for "suspicious logins" which was "for my protection".
I suspect that it was purely due to me beginning to use VPN and switching locations often.
Anyway, I couldn't recover the account because I had to associate an email to recover... I know I can use a throwaway, but I just never wanted to associate any email. I loved that you can use a simple username and password.
That account is now in the graveyard along with my latest account.
I left twitter a while ago too. Reddit had people in need that I could help, twitter just had trolls mostly.
I am now NOSTR only and Reddit lurker, but I let's see, every now and then I start to reply and then remember that I'm banned so I may end up abandoning it all together to avoid that negative feeling.
I never gave Stacker News enough attention. Maybe I'll see how that has evolved.
GM. I just learned how surveilled Reddit is.
I regularly use a VPN, and Librewolf, but I still had a bit of a senior moment.
I wanted to ask /r/Bitcoin an innocent question but didn't want that question associated with my main account for privacy reasons, giving personal-ish info about myself, so I logged out and created a throwaway account.
I didn't go incognito or clear cookies, and I don't know how well that would protect me or not.
After creating my post, I saw my account get permabanned. Not sure why, it wasn't anything against the rules AFAIK, but they said it was.
A few days later, my main account is temporarily banned for circumventing a ban on reddit. I asked why I was banned, what other account and the mods told me that Reddit doesn't tell them which account, but that if I told them, they'd un-ban it so that I wouldn't be banned on my main account. Also that without the temp ban, I was already shadow banned for circumventing a ban on another account.
Before I could reply again, Reddit did a 7 day site ban, so I can't even DM anymore.
I found an appeal form and told them I use VPN and a privacy Brpwser and that it must be a mistake, and got a message that my appeal was denied. I tried to play the plausible deniability card.
Do thet really know? Damn.
I mostly used Reddit on /r/bitcoin exclusively to answer noob questions, esp. About how things worked, what Lightning is, that sort of thing.
I think they lost a good account and I have had my eyes open a little bit more. I don't know exactly what data they linking two accounts, but if they have conclusive evidence despite my setup, it must be through cookies, maybe timing analysis, but then I should have been given the benefit of the doubt.
Either way, anon accounts are not safe on Reddit. They have a surveillance tool behind it looking for links between accounts. Be warned that Reddit ACTIVELY monitors your activity and good bye Reddit. 👋
GM #NOSTR.
Sounds like they're learning that the Fed is not federal.
Just saw that you said your computer was being slow.
1. Jot down all the programs you have installed that you care about.
2. Backup important files but sacrifice folders like the download folder, the desktop and other dumping grounds.
3. System restore: https://support.apple.com/en-gb/guide/mac-help/mh27903/mac
Note that you may want to follow one of the links in the important section at the beginning based on your mac model.
4. Re install apps as you see fit from your notes.
5. Restore your files.
This can be a theraputic thing for many people and anything you lose that you forgot about is likely something you can rebuild. In many cases, you may decide you didn't need it anyway.
Wipe the computer, (usually there is a system restore feature) restore your files from your backups and move on.
What was the impact?
IMO he got very repetetive very quickly. He was fun to listen to for a bit but then he got annoying.
Didn't dislike the guy, just didn't think he ever had anything new to say.
Oh shit, he really lost it all/most of/a lot of his bitcoin?!
I thought he was a real one. And at such an age, I would think he wasn't gonna take risks, and he fucking knew the "asymmetric upside" geez!
Why do you insist on talking to yourself here on nostr?
You know we're all the same people behind all of these accounts.
Sensible web browsing.
In all seriousness, macs are pretty good at keeping itself safe, but consider backup services or tools for important documents, notes and photos like OneDrive or iCloud or whatever.
Antiviruses are basically viruses. They hog all the computer resources, make it slow and pop up ads to upsell you and overall get in your way more than anything.
They won't stop or protect you from things like ransomware but backups do.
