6. Encrypted backups and recovery If you've completed all the steps (sections), congratulations! It was not as hard as it looked. May have been time consuming especially the Bitcoin blockchain download, but not difficult The last section is the most difficult and complex... for security reasons There is no bitcoins or crypto assets, yet. I've never mentioned to transfer any to any of the wallets, for good reason Now is the time to test the waters Generate 110 receiving addresses on the bitcoin core (it's under help menu, here's a button called receive, and there's a button create new address button, segwit addresses) Let's review, on a previous section you did encrypt the wallet with a strong password that you saved to your new fake google email? Good (It's under settings "encrypt wallet") When you back up the "walletFileName.dat", it comes with 100 bitcoin addresses and private keys, if you generate 110 addresses, it will generate not 10, but another 100, so if you ever use more than 100 addresses, this back up will cover you for up to 200 addresses, when you exceed that you have to update your backup Send $100 worth of btc to any of the addresses on the bitcoin core wallet, Once confirmed, you can use bitcoin core to send to another address in the bitcoin core list of addresses, it will ask for a password, use your password, if it doesn't work, you contributed $100 worth of btc to everyone. You did not save your password correctly If it worked, shutdown bitcoin core and you are now ready to move the walletFilename.dat to an encrypted volume container --------- On Metamask, generate 5 addresses "drop down arrow add account "and send $100 worth of Eth.to the third address Wipe out Metamask (reset) by un-installing the google web extension, but make sure you have written down the 12 words, if you need to check, you can go to settings and security and privacy, reveal secret recovery phrase Install Metamask web extension and use the 12 words and generate 5 addresses if you see your Eth on the 3rd address, you are ready to back up the 12 words to the encrypted volume container -------- https://www.digitalocean.com/commun...o-create-an-encrypted-volume-on-an-ubuntu-vps You will move your walletFileName.dat to the encrypted volume, create a text file on the volume with the 12 word passphrase uninstall Metamask shutdown the computer. After 5 days, restore your bitcoin-core wallet by copying from the encrypted volume and also restore Metamask from the text file on the encrypted volume If successful, you can start to load up the bitcoin core with more bitcoins and the Metamask with more digital assets, make copies of the encypted volume and send to offsite, share the process with a loved one Good luck and let me know if you have any questions. Yes, this last part is difficult. Yes, there are things I did not say since I will only get questions if someone actually made it this far
I said linux user, not linux system. The nuance is important Smart contract platforms are blockchain systems and do not ask for user information, the private keys ownership of the digital assets are part of authentication, web3, et al If the smart contract platform requires user information, that is a centralized company project, not defi or decentralized finance yes, google is bad, but it's good enough for this function. Google will not have access to your linux local files nor bitcoin core software
I do use Linux systems, longer than all of you, for sure, just because of my age and my job. I am not trying to undermine them. I think they are the best systems, but they are not unbreakable. If you know what you are doing, you might be able to resist an attack, but if you are targeted they will find your flaws. Specially if you follow a list like the one you guys are discussing. Laying out your applications in a list is the easiest way to plan an attack on you, they simply know the applications that you are using, so they can narrow the attack on them. Windows and MacOs can be way more secure than Linux is they are properly configured. Linux systems get hacked on a daily basis, just saying "I don't know any Linux system that has been hacked" means that you don't have a clue of what is going on. You are simply too little and too weak to be targeted by any attack, that is all. You are not interesting as a target. That is why you've never been hacked. https://gbhackers.com/rekoobe-backdoor-linux-systems/ https://www.zdnet.com/article/these-hackers-have-been-quietly-targeting-linux-servers-for-years/ There are courses specialized in Linux hardening, Hakin9 is one of the best magazines out there in terms of security, in case you are interested: https://hakin9.org/course/linux-system-hardening-w45/ Guys, this topic is flying way over your head.
Yes, I'm too little a target. I'm not interesting a target at all. You might say I'm invisible. I'd like to keep it that way Which if you haven't noticed is the point of why I created this thread about a dedicated secure linux computer To make the people who follow the instructions invisible A dedicated linux system with the bare necessities for using bitcoin and other crypto assets.. to have no ties to heir real world identities, i.e. a fake google account to not have ties to their location, i.e. VPN
You have no idea what I did for a living... I mentioned it once in a post I was a computer technician Without exaggerating, over the years, I have cleaned over 100 Windows machines of viruses and all kinds of malware I did this at work and I was the go-to guy for friends and family It was one of the main functions of our only windows desktop at home, I get a call from someone in-need, bring the computer, I take out the hard drive, connect it to the USB-cable converter, many required a power, those old mechanical drives, Backup their data before doing anything, then after backup is done, fire up my free MalwareBytes software and scan and clean, some files cannot be cleaned so manually delete them Never charged anyone a single penny. Best Buy charges over $300 with a week turn around from what I've heard You've probably seen the effects of these Windows users getting hacked, their FB starts sending spam, or their email starts sending spam... So fuck no, Windows are not fucking secure and Even though I'm not a Mac guy, I've also cleaned a few Mac of malware, that's why there's MalwareBytes version for Mac. There is no version for linux, wonder why, lol This will go over your head but I've cracked over a hundred Windows passwords over the years, Evil maid attack went over your head, google it http://falconfour.com/falconfours-ultimate-boot-cd-usb-v4-6-f4ubcd/
In every single bank I worked, and I did work in a few, they use Windows as their main OS. We were allowed to use Linux in the team, but just us because we needed special tools that only came with Linux distros. Windows can be very secure, if it is configured properly. Those pcs that came with all sort of viruses to your hands were obviously standard user pcs. That is not what you see in corporate environments. Corporate pcs have a restricted user account that can't install anything, as part of a very strict domain. Only the IT department can install in those computers by pushing releases through a secure environment. Applications can only be installed from a certain drive that is in quarantine. There is no way you can break in there, and that is all Windows based.