Questions tagged [data-security]

29 questions
9
votes
1 answer

What are the security considerations for hosting *your own* Electrum server?

Lets say I wanted to use an electrum client but I'm so paranoid and also can't or won't read and understand python code so that I only trust my own server. What security considerations should I have in mind? eg: Do I need to add any encryption to…
barrymac
  • 1,605
  • 10
  • 24
6
votes
1 answer

Why is the length of the transport messages on the lightning network encrypted?

From BOLT 08 we can see that every message is sent in the following way: 2 byte: length 16 byte: MAC [length] byte: Encrypted message 16 byte: MAC In reality these messages will be send over TCP/IP on the internet. The ip header specifies the…
Rene Pickhardt
  • 11,670
  • 8
  • 35
6
votes
1 answer

What could be the impact of the distribution of "tainted" Bitcoinica coins?

The hacker was distributing them in IRC recently, and sent some to the Bitcoin Faucet. Is this a reliable method for evading the "Bitcoin Police"? Here's a forum thread discussing the distribution and a pastebin of the IRC conversation. Pasted below…
Eric Blank
  • 61
  • 2
6
votes
2 answers

How much anonymity do mining pools provide?

How much anonymity does an average mining pool provide to the user (securing your email, other personal information)? What is the best pool to use if you want to remain anonymous, and which is the worst?
ThePiachu
  • 42,931
  • 25
  • 138
  • 347
5
votes
1 answer

What precautions should be taken to protect a Ripple wallet?

What if a Ripple wallet gets hacked? What are the suggested precautions for the average user?
Nameface
  • 51
  • 2
5
votes
2 answers

How do I reconfigure a Mt. Gox Yubikey?

After following the instructions here, which suggested I use ykpers or the gui version, I discovered the Mt. Gox Yubikey is protected by a "configuration protection access code." From the manual: Protection of the key and configuration data Given…
Geremia
  • 4,469
  • 4
  • 37
  • 75
3
votes
2 answers

How to verify the Bitcoin core software?

I just installed Bitcoin core (v0.15.1) for the first time. I've read that it's best to verify the software after downloading, but I don't see the links that are referred to in the instructions/videos. I can see them from my phone browser, but not…
Kat
  • 31
  • 3
3
votes
2 answers

How do on-line wallet or bitcoin exchanges usually secure their private keys?

I suppose they're kept encrypted as not to do so would be the equivalent as saving plaintext passwords. I heard most of them keep a percentage of the funds in cold storage, but then isn't it inconvenient for the users in case a lot of them want to…
Bilthon
  • 237
  • 1
  • 11
3
votes
2 answers

What is it about a Trezor that means it can't be infected by malware?

The Trezor testimonials include that TREZOR ... cannot be infected by malware What is it about a Trezor that means it cannot be infected?
oks
  • 257
  • 3
  • 14
3
votes
1 answer

Is a multisignature transaction propagated through the Network before it accumulates enough signatures?

An N-of-M multisignature Transaction requires to be signed by N addresses to be a valid transaction. I would like to know whether the Bitcoin Protocol would transmit a Transaction with less than N signatures through the Network in order for it to…
ThePiachu
  • 42,931
  • 25
  • 138
  • 347
2
votes
2 answers

Who store seed phrases data

Seed phrases seem to be pretty secure, approximately as strong as bitcoin private key according to this site https://en.bitcoin.it/wiki/Seed_phrase. But who store the private key adresses of these seed phrases, I suppose it is the wallet software…
Saxtheowl
  • 2,760
  • 8
  • 16
  • 34
2
votes
1 answer

Do pools distribute "jobs" to miners based on "failed" solutions which have already been submitted?

My question is this: How exactly does the stratum protocol distribute "work" to miners? More specifically, since mining can be compared (in many regards) to "brute forcing" a cryptographic hash (i.e. hashing random inputs until, by luck, a random…
2
votes
1 answer

Should a JSON-RPC user be required to use a password when backing up the wallet?

I was surprised I was able to back up my wallet over JSON RPC without requiring the wallet password (or even without a secondary backup-only password) I'm concerned that this could create a DOS attack if the following were to occur A read-only…
makerofthings7
  • 12,656
  • 11
  • 60
  • 129
2
votes
1 answer

Does AirBitz have federated servers?

I have been looking for a service that uses federated servers. Why? Because I am paranoid. And because companies pay me to be imaginative in my foe analogies.
Nathan Basanese
  • 368
  • 1
  • 15
2
votes
1 answer

How do mining pools protect their wallets?

Since Slush took quite a hit due to the hacked Linode servers, I'm wondering how do mining pools protect their wallets from theft of file and theft of private keys in those files?
ThePiachu
  • 42,931
  • 25
  • 138
  • 347
1
2