How to build a secure computer for storing digital crypto assets

Discussion in 'Crypto Assets' started by johnarb, Aug 19, 2023.

  1. johnarb

    johnarb

    6. Encrypted backups and recovery

    If you've completed all the steps (sections), congratulations! It was not as hard as it looked. May have been time consuming especially the Bitcoin blockchain download, but not difficult

    The last section is the most difficult and complex... for security reasons

    There is no bitcoins or crypto assets, yet. I've never mentioned to transfer any to any of the wallets, for good reason

    Now is the time to test the waters

    Generate 110 receiving addresses on the bitcoin core (it's under help menu, here's a button called receive, and there's a button create new address button, segwit addresses)

    Let's review, on a previous section you did encrypt the wallet with a strong password that you saved to your new fake google email? Good (It's under settings "encrypt wallet")

    When you back up the "walletFileName.dat", it comes with 100 bitcoin addresses and private keys, if you generate 110 addresses, it will generate not 10, but another 100, so if you ever use more than 100 addresses, this back up will cover you for up to 200 addresses, when you exceed that you have to update your backup

    Send $100 worth of btc to any of the addresses on the bitcoin core wallet, Once confirmed, you can use bitcoin core to send to another address in the bitcoin core list of addresses, it will ask for a password, use your password, if it doesn't work, you contributed $100 worth of btc to everyone. You did not save your password correctly

    If it worked, shutdown bitcoin core and you are now ready to move the walletFilename.dat to an encrypted volume container

    ---------

    On Metamask, generate 5 addresses "drop down arrow add account "and send $100 worth of Eth.to the third address

    Wipe out Metamask (reset) by un-installing the google web extension, but make sure you have written down the 12 words, if you need to check, you can go to settings and security and privacy, reveal secret recovery phrase

    Install Metamask web extension and use the 12 words and generate 5 addresses if you see your Eth on the 3rd address, you are ready to back up the 12 words to the encrypted volume container

    --------

    https://www.digitalocean.com/commun...o-create-an-encrypted-volume-on-an-ubuntu-vps

    You will move your walletFileName.dat to the encrypted volume, create a text file on the volume with the 12 word passphrase

    uninstall Metamask

    shutdown the computer. After 5 days, restore your bitcoin-core wallet by copying from the encrypted volume and also restore Metamask from the text file on the encrypted volume

    If successful, you can start to load up the bitcoin core with more bitcoins and the Metamask with more digital assets,

    make copies of the encypted volume and send to offsite, share the process with a loved one

    Good luck and let me know if you have any questions. Yes, this last part is difficult. Yes, there are things I did not say since I will only get questions if someone actually made it this far
     
    #21     Aug 20, 2023
    NoahA likes this.
  2. johnarb

    johnarb

    I said linux user, not linux system. The nuance is important

    Smart contract platforms are blockchain systems and do not ask for user information, the private keys ownership of the digital assets are part of authentication, web3, et al

    If the smart contract platform requires user information, that is a centralized company project, not defi or decentralized finance

    yes, google is bad, but it's good enough for this function. Google will not have access to your linux local files nor bitcoin core software
     
    #22     Aug 20, 2023
  3. I do use Linux systems, longer than all of you, for sure, just because of my age and my job.
    I am not trying to undermine them. I think they are the best systems, but they are not unbreakable. If you know what you are doing, you might be able to resist an attack, but if you are targeted they will find your flaws. Specially if you follow a list like the one you guys are discussing. Laying out your applications in a list is the easiest way to plan an attack on you, they simply know the applications that you are using, so they can narrow the attack on them.

    Windows and MacOs can be way more secure than Linux is they are properly configured.

    Linux systems get hacked on a daily basis, just saying "I don't know any Linux system that has been hacked" means that you don't have a clue of what is going on. You are simply too little and too weak to be targeted by any attack, that is all. You are not interesting as a target. That is why you've never been hacked.

    https://gbhackers.com/rekoobe-backdoor-linux-systems/
    https://www.zdnet.com/article/these-hackers-have-been-quietly-targeting-linux-servers-for-years/

    There are courses specialized in Linux hardening, Hakin9 is one of the best magazines out there in terms of security, in case you are interested:
    https://hakin9.org/course/linux-system-hardening-w45/

    Guys, this topic is flying way over your head.
     
    #23     Aug 20, 2023
    engineering likes this.
  4. johnarb

    johnarb

    Yes, I'm too little a target. I'm not interesting a target at all. You might say I'm invisible. I'd like to keep it that way

    Which if you haven't noticed is the point of why I created this thread about a dedicated secure linux computer

    To make the people who follow the instructions invisible

    A dedicated linux system with the bare necessities for using bitcoin and other crypto assets.. to have no ties to heir real world identities, i.e. a fake google account

    to not have ties to their location, i.e. VPN
     
    #24     Aug 20, 2023
  5. newwurldmn

    newwurldmn

    Engrave on aerospace grade aluminum and store in a fire proof gun safe.
     
    #25     Aug 20, 2023
  6. My bad, I need the right audience for what I am saying.

    A plastic bag would do.

    upload_2023-8-20_12-35-33.png
     
    #26     Aug 20, 2023
  7. Pekelo

    Pekelo

    Bonus points if you can explain this to your grandma.
     
    #27     Aug 21, 2023
    johnarb likes this.
  8. johnarb

    johnarb

    You have no idea what I did for a living... I mentioned it once in a post

    I was a computer technician

    Without exaggerating, over the years, I have cleaned over 100 Windows machines of viruses and all kinds of malware

    I did this at work and I was the go-to guy for friends and family

    It was one of the main functions of our only windows desktop at home, I get a call from someone in-need, bring the computer, I take out the hard drive, connect it to the USB-cable converter, many required a power, those old mechanical drives, Backup their data before doing anything, then after backup is done, fire up my free MalwareBytes software and scan and clean, some files cannot be cleaned so manually delete them

    Never charged anyone a single penny. Best Buy charges over $300 with a week turn around from what I've heard

    You've probably seen the effects of these Windows users getting hacked, their FB starts sending spam, or their email starts sending spam...

    So fuck no, Windows are not fucking secure

    and Even though I'm not a Mac guy, I've also cleaned a few Mac of malware, that's why there's MalwareBytes version for Mac. There is no version for linux, wonder why, lol

    This will go over your head but I've cracked over a hundred Windows passwords over the years, Evil maid attack went over your head, google it

    http://falconfour.com/falconfours-ultimate-boot-cd-usb-v4-6-f4ubcd/
     
    #28     Aug 21, 2023
  9. 2rosy

    2rosy

    #29     Aug 21, 2023
  10. In every single bank I worked, and I did work in a few, they use Windows as their main OS.
    We were allowed to use Linux in the team, but just us because we needed special tools that only came with Linux distros.
    Windows can be very secure, if it is configured properly. Those pcs that came with all sort of viruses to your hands were obviously standard user pcs. That is not what you see in corporate environments.
    Corporate pcs have a restricted user account that can't install anything, as part of a very strict domain. Only the IT department can install in those computers by pushing releases through a secure environment. Applications can only be installed from a certain drive that is in quarantine.

    There is no way you can break in there, and that is all Windows based.
     
    #30     Aug 21, 2023