1/ Let's look at the second item of the three major components of cryptocurrency security:

2. How you store your private key

2/ Now that you've generated your keys securely (as we discussed in ), you need to store them safely. The most secure way to store private keys is on a device that is not connected to the internet. This is what we call "cold storage".
3/ Cold storage of your private keys gives you better security because people have to have physical access to the key to attack you. This rules out billions of people from attacking you over the internet by hacking into your computer.
4/ Cold storage can be a number of different things: an always-offline laptop, an encrypted USB drive, or even a piece of paper.
5/ Security is always a tradeoff. The tradeoff here is that private keys stored in cold storage are not as convenient to use. The alternative is to store your keys in hot storage...i.e. a computer that is connected to the internet.
6/ With hot storage you should think about how easy it would be for a hacker or virus to get your keys. Wallet software that encrypts your keys and requires a password to decrypt them will be more secure than wallets that store your keys unencrypted.
7/ If your keys are encrypted, the attacker can't just copy your keys. They would also have to obtain your password somehow...perhaps by installing a key logger on your computer or perhaps with some other kind of attack.
8/ Hardware wallets are kind of a middle ground between cold and hot wallets. They are specially designed devices that can store keys but are designed to make it impossible to actually get the private keys off the device.
9/ Instead of copying the key off the device, you send your transaction into the device and the device signs the transaction with the private key embedded into it and gives you back the signature.
10/ Hardware wallet devices are the current best practice for securing cryptocurrency. Some are dedicated to crypto like Ledger / Trezor / etc. But in some cases you also may be able to use other 2-factor devices like Yubikeys or Apple TouchID / FaceID to hold your keys.
11/ Dedicated crypto hardware wallets have been in use for awhile, but look for other 2nd-factor devices to become more widely supported in the future.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with CryptoDoug

CryptoDoug Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @KadenaDirEng

13 May
1/ Cross-chain transfers on @kadena_io deserve a more detailed explanation. As I've discussed previously, Kadena scales by using multiple chains connected together. Each chain behaves as a standalone blockchain. This has several ramifications.
2/ Nothing can happen on a blockchain without someone sending in a transaction. Smart contracts cannot "go out to the internet" to get more data. They can only access what's already on the blockchain and in the transaction itself.
3/ This means that to do a cross-chain transfer, you have to do two transactions: one to burn the coins on the sending chain, and a second to reconstitute those coins on the target chain. Because of the above criteria, there's no way around this. It's essential complexity.
Read 10 tweets
21 Mar
1/ The only way to scale Proof of Work is to scale block production. This is why @kadena_io has emphasized how many blocks the network has mined. Let's examine the technical details of why this is the case...
2/ There's a limit to how many transactions you can fit into a block and there's also a limit to how low you can make the block time. Improvements in the network efficiency can help you do more within these limits, but at the end of the day there's only so much you can do.
3/ First let's look at the limit on the number of transactions in a block. This is driven by two factors: space and time. Every transaction uses some space because you have to store at least the sender, receiver, and amount
Read 12 tweets
12 Mar
1/ A few weeks ago I did a survey and more than 50% of responders said that they had lost money due to a mistake in entering public keys. With @kadena_io you can do what I call a Safe Transfer which makes it impossible to lose coins. Here's how they work...
2/ If we take a step back and think about the #cryptocurrency safe transfer problem, what we really need is some way of guaranteeing that someone has a private key corresponding to the public key to which we're sending.
3/ There's an obvious way to do this...sign the transaction with the *receiver's* private key! Signing something is the definitive way to prove possession of a private key.
Read 12 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!

:(