Avatar
Cykros
fe32b72cf7c34a8ea1a45f2b98d389258d9b3f3f4b0c704601e2368914cfcb1e
šŸ‡µšŸ‡øšŸ“ā€ā˜ ļø

In a Pascal's wager sort of sense.

The thing is, for this to work, it'd have to be done BEFORE a quantum threat arises.

And it never may.

But let's just assume we need to operate like it will for fear of the theoretical repecussions however unfounded they are.

At least the thief is honest about what they are. You have the audacity to suggest your theft is somehow justified.

I'm going to get a trademark on Quantum Computer and just start selling desktops I put together just to fuck with the SEO.

There you go -- that makes you orderly AND clean.

I just wake up hours before my wife. And only sleep with a sheet anyway. It's gotta be cold for me to want a blanket.

Yea, your bed stays warmer and moister fostering increased bacterial growth to be exposed to.

Which isn't itself inherently sensitive information and is therefore far easier to back up than your xpriv or mnemonic phrase.

It's easy to mess up with inadequate education, sure. As is anything about handling Bitcoin.

Designing custody around what the biggest retards in society will do ensures that you end up with a retarded custody model.

Yea, that's the attitude these marketers appear to take. Which is why I'll happily warn people away from them at every chance.

It is wild how little emphasis gets placed on Liana on that point. All but idiot proof multisig which significantly reduces wrenchability when set up thoughtfully.

Side note, even with inflation, there are still $5 wrenches, even big enough to beat keys out of someone with: https://www.harborfreight.com/10-inch-steel-pipe-wrench-39642.html

Good to know about SD cards.

The problem of audits is knowing who to trust with the audits. And trusting anyone at all runs contrary to the don't trust, verify ethos.

If we trust the cable, what else gets trusted? Should we dispense with a screen, like Bitkey did?

I do want my airgapped system audited, to have the second set of eyes on it. But there's always the question of: who audits the auditor?

The matter of checking QR codes, and the difficulty of doing it manually, does make me wonder if there's room for a device that, also offline, can be used to take translate the QR to de-serialized format to make checking the full psbt an easier process. Probably a niche use case, especially given laziness and quickness to trust, but it could be useful for the truly paranoid.

As for the assumption that 'they can, but they won't' -- this is precisely the sort of presumption I see as common and take issue with. Some people will cut corners either way, but we should be letting them know explicitly they are doing so, rather than operating with rhetoric suggesting that they are using best practices when in actuality there is trust they are extending unwittingly. IF you are not going to verify everything, AND are willing to trust an auditor, it sounds like you're suggesting that you can achieve a better security model without an airgap than if you aren't going to verify everything and use an airgap. No complaint from me there, but those conditions should always be explicit. Users can choose to consent to risk taking, but when suggested to take risks they're not aware of, well, I have a hard time distinguishing that from being intentionally misled. I don't want to quite call it scamming, but it's adjacent especially when there is financial gain from selling these products that require the trust model.

I agree that it's not a silver bullet. But it's a transparent data layer -- that is, you can scan that QR code with another device that is not involves in transacting to see exactly what data it contains. Likewise, you can examine what is on an SD card. Whether you do or not is what will determine your security -- but you get that choice.

When there is a wire connecting devices, it is EXTREMELY difficult for an end user to verify what is or is not going over that wire.

GM

Anyone going to podcasters for knowledge should probably stop.

I listen to at least 40 hpw and it's more about keeping my thumb on the pulse of OPINIONS in the space, and to learn what I might want to go check out. Even those that know a thing or two usually advocate all manner of corner cutting because they assume they'll scare people away if they tell you how you should actually handle your Bitcoin and cryptography hygeine. Notice all the ads for Start9, Trezor, and other non-airgapped signers.

For knowledge, try cracking a book, reading some documentation, or ideally, check out some code. And most importantly, reasoning, to put it all together.

For the first year of contracting global liquidity in Bitcoin's lifetime it was pretty okay.

It's a lot easier to design like this when you cook one type of cuisine.

I almost need a second fridge for the various ingredients I use to make Japanese, Thai, Haitian, German, French, Italian, Swedish, Russian, English, Chinese, Mexican, Cuban, and other foods.

And that's when I'm stuck cooking for my picky wife and child -- I'd otherwise cook much more diversely.

It is certainly cute though.