#SmartCustody is an ongoing project of @BlockchainComns, a blockchain infrastructure support organization. In it we share the best practices for the use of advanced cryptographic tools in improving the care, maintenance, control, and protection of your digital assets. (1/14)
In the 1st edition of #SmartCustody we detail best practices & default storage scenarios, offer an exercise for you to learn how to model digital asset flows, create a risk model, do an adversarial analysis, and use these tools to modify your personal storage scenario. (2/14)
These resources, paid for by your fellow patrons in the Bitcoin and cryptocurrency digital-asset community, are available for free in the PDF bit.ly/SmartCustodyBo… and at cost in a print-on-demand book bit.ly/SmartCustodyBo… (3/14)
In the year since the release of our #SmartCustody digital-asset checklists, resources, and risk modeling there have been many changes to our ecosystem. For example, last year's edition could only safely recommend single-signature cold storage approaches for self-custody. (4/14)
However, a number of wallets' architectures have since become more mature. So we now feel that multi-sig solutions are feasible for use by regular people. (5/14)
As @BlockchainComns begins work on a major new release of a 2nd edition #SmartCustody, I thought I’d share with you personally some of my own thoughts on how I think about digital asset security, risk modeling, and adversarial analysis. (6/14)
The first thing I'd like to share is particularly unique to how I approach the risk-modelling of digital assets: Adversarial Analaysis. I believe you may find it useful, so I'll be sharing my thoughts about these Adversaries throughout the month of June. (7/14)
Classic risk-modeling techniques can be overwhelming, so the #SmartCustody book offers a different approach that helps users to protect their digital assets by figuring out what endangers them. I do this using a unique method: exposing ADVERSARIES. (8/14)
Classic risk-modeling indentifies vulnerabilities and turns those vulnerabilities into risks based on likelihoods and consequences. You'll still find all of that in #SmartCustody. It's only after we've identified these initial risks that we bring in our adversaries. (9/14)
So what's an adversary? It's an anthropomorphized problem. Each one can encompass many different risks and have many different solutions. Losing your funds due to incapacitation is a potential risk, but DEATH, that's an adversary. (10/14)
Why adversaries? Because they flip the script. We go from discussing somewhat vague and abstract vulnerabilities to considering something more concrete. In the abstract, we might fall prey to our own biases; when things are made concrete, we hew closer to reality. (11/14)
We can look at the motives of Death or Institutional Theft or Blackmail. We can consider what they want, even in situations when they're not thinking beings. By better considering motives, we can better understand if an adversary is actually a threat to *US*. (12/14)
Risk modeling is all about making informed decisions rather than emotional ones. I believe that adversaries help us to do so. I'll be talking more about them in coming days, as I highlight the 27 adversaries in #SmartCustody. (13/14)
What do you think of adversaries? Are they useful for modeling risks? Let us know! And please consider supporting the #SmartCustodywork that this topic is drawn from. We're need support for our 2nd edition, with multi-sigs and other expansions: …tcustody.btcpay.blockchaincommons.com (14/14)
We conclude this series of tweet storms to ask for your help in making V2 of #SmartCustody possible, and to help in our broader mission to support open blockchain infrastructure, internet security, the open web, digital civil liberties, and more.
Bitcoin has quadrupled in value in the last year, which makes #SmartCustody more important than ever. Your holdings might now be worth more than you think. How secure are your digital assets? [1/10]
You could choose to store your keys in hot wallets, which are directly connected to the internet, or in cold storage, which takes them offline. Each has its own advantages and limitations. [2/10]
The #SmartCustody process teaches you how to use cold storage safely and securely, so that you can protect your digital funds yourself. Though emerging tools are changing the landscape, this process remains today the best way to manage self-custody. [3/10] github.com/BlockchainComm…
Twenty years ago today I launched Castle Marrach to the public, my first multiplayer online game design. Unique in offering a #Bartle “socializer-dominant” interactive fiction experience, and a hybrid text & web interactive environment, it was novel for its time. [1/15]
I had founded Skotos in 1999 with a goal of creating "multiplayer interactive fiction on the Internet". We wanted to make games that were more social, more dynamic, more interactive, more “real”, and in particular more story-focused than anything that had been seen before. [2/15]
I also become interested in experimenting with cross-media, and produced two comic books based on our games, Castle Marrach: Awakenings awakenings.marrach.com and Lovecraft Country: Return to Arkham lovecraftcountry.com. [3/15]
Our first adversay in category “Loss by Mistakes" is CONVENIENCE. It sounds, well, convenient, doesn't it? But it is a real adversary because focusing on it instead of safety or security can cause you to lose your digital assets. (1/8)
CONVENIENCE is an error that arises from your decision to ignore your normal security procedures. Yet that decision might be for entirely good and pragmatic reasons. (2/8)
If you're on the road, cold storage might not be accessible, or it might be vulnerable to theft. If you're frequently trading, you might need access to your cryptocurrency in a easy and quick manner. CONVENIENCE is important, but can be also dangerous. (3/8)
DISASTER! Its motivation? "I want to destroy. I want to crumble and burn. I want to ruin with water, to blow things into the air. I am bombs, bullets, and explosions. I am sudden and unexpected but disastrous destruction." (1/9)
This is the third adversary in my #SmartCustody book about protecting your cryptocurrency and other digital assets. And the motivations certainly explain the ways that you could lose your private keys. A house fire, a flood, a tornado, a war. (2/9)
When researching for my book, I heard the story of someone who religiously printed his keys to paper wallets. Every quarter he'd reprint so the ink didn't fade (and would then shred the previous one). Unfortunately, he kept those keys in the basement. Which flooded. (3/9)
Last night @BlockchainComns tagged our first release of bc-seedtool-cli, a Mac & Linux command line tool for for some emerging standards for cryptographic seeds. github.com/BlockchainComm…
We believe this to be a stable and useful release. However, we have not done any formal security auditing — this release is intended for additional review by third-parties before requesting formal auditing.
Seedtool itself is is written in C++, but it uses a number of pure C libraries that we also have tagged as release 0.1. In particular, the bc-shamir, bc-slip39, and bc-bech32 libraries have functionality of broader interest to blockchain community for securing digital assets.
…”consider multiple mental models for better communication and better identity systems. Whatever your own goals, we believe you are more likely to achieve them if you can communicate clearly in terms others understand and can incorporate the needs of others into your own work.”
…”The question we are seeking to answer in this paper is the following: ‘When we are evaluating the evidence, what are we trying to determine?’. Each mental model approaches this differently.”