Questions tagged [data-security]
29 questions
9
votes
1 answer
What are the security considerations for hosting *your own* Electrum server?
Lets say I wanted to use an electrum client but I'm so paranoid and also can't or won't read and understand python code so that I only trust my own server.
What security considerations should I have in mind? eg: Do I need to add any encryption to…
barrymac
- 1,605
- 10
- 24
6
votes
1 answer
Why is the length of the transport messages on the lightning network encrypted?
From BOLT 08 we can see that every message is sent in the following way:
2 byte: length
16 byte: MAC
[length] byte: Encrypted message
16 byte: MAC
In reality these messages will be send over TCP/IP on the internet. The ip header specifies the…
Rene Pickhardt
- 11,670
- 8
- 35
6
votes
1 answer
What could be the impact of the distribution of "tainted" Bitcoinica coins?
The hacker was distributing them in IRC recently, and sent some to the Bitcoin Faucet. Is this a reliable method for evading the "Bitcoin Police"?
Here's a forum thread discussing the distribution and a pastebin of the IRC conversation. Pasted below…
Eric Blank
- 61
- 2
6
votes
2 answers
How much anonymity do mining pools provide?
How much anonymity does an average mining pool provide to the user (securing your email, other personal information)? What is the best pool to use if you want to remain anonymous, and which is the worst?
ThePiachu
- 42,931
- 25
- 138
- 347
5
votes
1 answer
What precautions should be taken to protect a Ripple wallet?
What if a Ripple wallet gets hacked?
What are the suggested precautions for the average user?
Nameface
- 51
- 2
5
votes
2 answers
How do I reconfigure a Mt. Gox Yubikey?
After following the instructions here, which suggested I use ykpers or the gui version, I discovered the Mt. Gox Yubikey is protected by a "configuration protection access code."
From the manual:
Protection of the key and configuration data
Given…
Geremia
- 4,469
- 4
- 37
- 75
3
votes
2 answers
How to verify the Bitcoin core software?
I just installed Bitcoin core (v0.15.1) for the first time. I've read that it's best to verify the software after downloading, but I don't see the links that are referred to in the instructions/videos. I can see them from my phone browser, but not…
Kat
- 31
- 3
3
votes
2 answers
How do on-line wallet or bitcoin exchanges usually secure their private keys?
I suppose they're kept encrypted as not to do so would be the equivalent as saving plaintext passwords. I heard most of them keep a percentage of the funds in cold storage, but then isn't it inconvenient for the users in case a lot of them want to…
Bilthon
- 237
- 1
- 11
3
votes
2 answers
What is it about a Trezor that means it can't be infected by malware?
The Trezor testimonials include that
TREZOR ... cannot be infected by malware
What is it about a Trezor that means it cannot be infected?
oks
- 257
- 3
- 14
3
votes
1 answer
Is a multisignature transaction propagated through the Network before it accumulates enough signatures?
An N-of-M multisignature Transaction requires to be signed by N addresses to be a valid transaction. I would like to know whether the Bitcoin Protocol would transmit a Transaction with less than N signatures through the Network in order for it to…
ThePiachu
- 42,931
- 25
- 138
- 347
2
votes
2 answers
Who store seed phrases data
Seed phrases seem to be pretty secure, approximately as strong as bitcoin private key according to this site https://en.bitcoin.it/wiki/Seed_phrase.
But who store the private key adresses of these seed phrases, I suppose it is the wallet software…
Saxtheowl
- 2,760
- 8
- 16
- 34
2
votes
1 answer
Do pools distribute "jobs" to miners based on "failed" solutions which have already been submitted?
My question is this: How exactly does the stratum protocol distribute "work" to miners? More specifically, since mining can be compared (in many regards) to "brute forcing" a cryptographic hash (i.e. hashing random inputs until, by luck, a random…
Dylan Bennett
- 23
- 2
2
votes
1 answer
Should a JSON-RPC user be required to use a password when backing up the wallet?
I was surprised I was able to back up my wallet over JSON RPC without requiring the wallet password (or even without a secondary backup-only password)
I'm concerned that this could create a DOS attack if the following were to occur
A read-only…
makerofthings7
- 12,656
- 11
- 60
- 129
2
votes
1 answer
Does AirBitz have federated servers?
I have been looking for a service that uses federated servers.
Why?
Because I am paranoid. And because companies pay me to be imaginative in my foe analogies.
Nathan Basanese
- 368
- 1
- 15
2
votes
1 answer
How do mining pools protect their wallets?
Since Slush took quite a hit due to the hacked Linode servers, I'm wondering how do mining pools protect their wallets from theft of file and theft of private keys in those files?
ThePiachu
- 42,931
- 25
- 138
- 347