<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://en.bitcoin.it/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Glitch003</id>
	<title>Bitcoin Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://en.bitcoin.it/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Glitch003"/>
	<link rel="alternate" type="text/html" href="https://en.bitcoin.it/wiki/Special:Contributions/Glitch003"/>
	<updated>2026-04-10T00:17:16Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Vanitygen&amp;diff=49234</id>
		<title>Vanitygen</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Vanitygen&amp;diff=49234"/>
		<updated>2014-07-31T00:15:32Z</updated>

		<summary type="html">&lt;p&gt;Glitch003: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Vanitygen&#039;&#039;&#039; is a command-line vanity bitcoin address generator.&lt;br /&gt;
&lt;br /&gt;
If you&#039;re tired of the random, cryptic addresses generated by regular bitcoin clients, you can use vanitygen to create a more personalized address.&lt;br /&gt;
Add unique flair when you tell people to send bitcoins to 1stDownqyMHHqnDPRSfiZ5GXJ8Gk9dbjO.&lt;br /&gt;
Alternatively, vanitygen can be used to generate random addresses offline.&lt;br /&gt;
&lt;br /&gt;
Vanitygen accepts as input a pattern, or list of patterns to search for, and produces a list of addresses and private keys.  Vanitygen&#039;s search is probabilistic, and the amount of time required to find a given pattern depends on how complex the pattern is, the speed of your computer, and whether you get lucky.&lt;br /&gt;
&lt;br /&gt;
The example below illustrates a session of vanitygen.  It is typical, and takes about 10 sec to finish, using a Core 2 Duo E6600 CPU on x86-64 Linux:&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
$ ./vanitygen 1Boat&lt;br /&gt;
Difficulty: 4476342&lt;br /&gt;
Pattern: 1Boat                                                                 &lt;br /&gt;
Address: 1BoatSLRHtKNngkdXEeobR76b53LETtpyT&lt;br /&gt;
Privkey: 5J4XJRyLVgzbXEgh8VNi4qovLzxRftzMd8a18KkdXv4EqAwX3tS&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Vanitygen includes components to perform address searching on your CPU (vanitygen) and your OpenCL-compatible GPU (oclvanitygen).  Both can be built from source, and both are included in the Windows binary package.  Also included is oclvanityminer, the vanity address mining client.  Oclvanityminer can be used to automatically claim bounties on sites such as [[User:ThePiachu|ThePiachu]]&#039;s [[Vanity Pool]].&lt;br /&gt;
&lt;br /&gt;
Current version: 0.22&lt;br /&gt;
&lt;br /&gt;
Windows x86+x64 binaries [https://github.com/downloads/samr7/vanitygen/vanitygen-0.20-win.zip here].  PGP signature [http://insight.gotdns.org/~samr7/vanitygen-0.20-win.zip.asc here].&lt;br /&gt;
&lt;br /&gt;
Get the source from [https://github.com/samr7/vanitygen GitHub].  Includes Makefiles for Linux and Mac OS X.&lt;br /&gt;
&lt;br /&gt;
Main discussion at [https://bitcointalk.org/index.php?topic=25804.0 BitCoinTalk]&lt;br /&gt;
&lt;br /&gt;
For AMD Catalyst 13.1+ you need to run the AMD APP SDK Runtime from Catalyst 12.10 in order to get this program to work. (So all your Catalyst drivers would be brand new except for the SDK Runtime.) This is discussed on [https://github.com/samr7/vanitygen/issues/19 GitHub]. Linux users try [https://github.com/samr7/vanitygen/issues/19#issuecomment-28689948 this solution].&lt;br /&gt;
&lt;br /&gt;
Also the latest source doesn&#039;t work properly for high-end AMD cards (7XXX and greater). Solution is to change line 459 in oclengine.c from: return quirks; to: return quirks &amp;amp; ~VG_OCL_AMD_BFI_INT;&lt;br /&gt;
Windows x86+x64 binaries that solve this problem plus provide support for compressed keys [https://lifeboat.com/oclvanitygen here]. PGP signature [https://lifeboat.com/oclvanitygen.zip.sig here]. If you have any problems with the binaries, join the relevant [https://bitcointalk.org/index.php?topic=301068.0 BitCoinTalk discussion].&lt;br /&gt;
&lt;br /&gt;
== Expected keysearch rate ==&lt;br /&gt;
Main article: [[Vanitygen keysearch rate]]&lt;br /&gt;
&lt;br /&gt;
What key search rate can I expect from hardware X?&lt;br /&gt;
&lt;br /&gt;
Detailed list forthcoming.  Some ballpark estimates are listed below.&lt;br /&gt;
&lt;br /&gt;
 Dual-core desktop CPUs, 32-bit mode: 100-250 Kkey/s.&lt;br /&gt;
 Dual-core desktop CPUs, 64-bit mode: 150-450 Kkey/s.&lt;br /&gt;
 Quad-core desktop CPUs, 32-bit mode: 200-400 Kkey/s.&lt;br /&gt;
 Quad-core desktop CPUs, 64-bit mode: 300-750 Kkey/s.&lt;br /&gt;
 NVIDIA GT200 GPUs: up to 6.5 Mkey/s.&lt;br /&gt;
 NVIDIA GTX 770 GPUs: around 29.5 Mkey/s.&lt;br /&gt;
 AMD Radeon 58XX, 68XX GPUs: up to 23.5 Mkey/s.&lt;br /&gt;
 AMD Radeon 69XX GPUs: up to 19.5 Mkey/s.&lt;br /&gt;
&lt;br /&gt;
As vanitygen performs a lot of large integer arithmetic, running it in 64-bit mode makes a huge difference in key search rate, easily a 50% improvement over 32-bit mode.  If you are using a 64-bit edition of Windows, and not using a GPU, be sure to use vanitygen64.exe.&lt;br /&gt;
&lt;br /&gt;
Radeon 58XX outperforms Radeon 69XX by a very comfortable margin.  Oclvanitygen is sensitive to integer multiply throughput, and Radeon 58XX can multiply concurrently with other operations.  At similar clocks, a hobbled Radeon 5830 will outperform a Radeon 6970.&lt;br /&gt;
&lt;br /&gt;
In custom builds, CPU performance will be less than expected if the OpenSSL library is an older version (&amp;lt;1.0.0d) or is not built with the appropriate optimizations enabled.&lt;br /&gt;
&lt;br /&gt;
== Vanity addresses for other crypto-coins ==&lt;br /&gt;
Main article: [[Using Vanitygen with Alt-Coins]]&lt;br /&gt;
&lt;br /&gt;
Vanitygen (as of version 0.22) can be used to produce vanity addresses for other crypto coins as well as bitcoin (but not for bitmessage addresses), by using the &amp;quot;-X&amp;quot; option.  Examples and usage can be found in the main article [[Using Vanitygen with Alt-Coins]]&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
* [[Bitcoin Vanity Generation Website]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Vanity address]]&lt;/div&gt;</summary>
		<author><name>Glitch003</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Securing_your_wallet&amp;diff=49083</id>
		<title>Securing your wallet</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Securing_your_wallet&amp;diff=49083"/>
		<updated>2014-07-23T03:08:11Z</updated>

		<summary type="html">&lt;p&gt;Glitch003: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Introduction==&lt;br /&gt;
&lt;br /&gt;
Unless you are using a [[hardware wallet]] it is strongly recommended to read this page.&lt;br /&gt;
&lt;br /&gt;
Wallet security can be broken down into two independent goals:&lt;br /&gt;
# Protecting your wallet against loss.&lt;br /&gt;
# Protecting your wallet against theft.&lt;br /&gt;
&lt;br /&gt;
In the case that your current wallet hasn&#039;t been protected adequately (e.g. put online with a weaker password):&lt;br /&gt;
# Making a new secure wallet, using appropriate long-term protection.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;For a brief overview see also: [[Wallet Security Dos and Don&#039;ts|Wallet Security Dos and Don&#039;ts]]&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Paper Wallets==&lt;br /&gt;
[[Paper wallet]]s can be used to store bitcoins offline in non-digital format. Using securely generated paper wallets significantly decreases the chances of your bitcoins being stolen by hackers or computer viruses.&lt;br /&gt;
&lt;br /&gt;
Fundamentally, a paper wallet is merely a physical record of a [[private key]] (most commonly written as a sequence of fifty-one alphanumeric characters beginning with a &#039;5&#039;) and its corresponding [[public key]]. The private key is used to prove your right to spend the bitcoins transferred to the paper wallet, and as such should be kept hidden and secret. If the private key on a paper wallet is exposed (for example in a photograph) then the wallet may be &amp;quot;swept&amp;quot; by anyone who sees the key. To guard against accidental revelation, the private key displayed on the paper wallet may be encrypted using a password (&amp;quot;BIP38&amp;quot;) or split into several different parts (&amp;quot;Shamir&#039;s secret sharing scheme&amp;quot;). At the very least, the private key should be well hidden e.g. by folding the wallet in half and sealing it shut.&lt;br /&gt;
&lt;br /&gt;
You can send bitcoins to the public address on your paper wallet as often as you like, and they will be inaccessible until the private key is imported into a &amp;quot;live&amp;quot; wallet. You can use a service such as [[BlockChain.info]] to verify the balance of your paper wallet, which is a matter of public record. As of version 0.6.0, the bitcoin QT software has a command line feature called &amp;quot;importprivkey&amp;quot; that can load private keys. Online exchanges and wallets such as [[Coinbase (business)|Coinbase]] and BlockChain.info have features for importing (or &amp;quot;sweeping&amp;quot;) paper wallet private keys as well.&lt;br /&gt;
&lt;br /&gt;
=== Software for generating paper wallets ===&lt;br /&gt;
&lt;br /&gt;
Some [[Paper wallet|paper wallet generators]] have been written entirely in HTML/JavaScript to make it fairly easy to generate paper wallets on virtually any operating system. Although these generators use a web browser, they are generally capable of running offline since address generation happens entirely within the web browser. It&#039;s advisable to use those services from [https://en.wikipedia.org/wiki/Live_CD live disc], to ensure that private keys are not compromised by spyware. &lt;br /&gt;
&lt;br /&gt;
To generate a safer paper wallet, first save the paper wallet generating code to a newly-formatted USB stick and verify the integrity (SHA1 hash or PGP signature) of the code. Then &amp;quot;clean-boot&amp;quot; your computer with a bootable CD (such as a Linux Live CD) while disconnected from the Internet. Insert the USB stick and open the wallet generator&#039;s HTML file using a web browser. Print your paper wallets or store them on external media (do not save them on the computer), and then shut down the computer. You may need to load an appropriate printer driver in order to print while booted from the live CD.&lt;br /&gt;
&lt;br /&gt;
=== Tips for making paper wallets ===&lt;br /&gt;
&lt;br /&gt;
* Disconnecting from the Internet guarantees that that the paper wallet generator is truly self-contained and isn&#039;t transmitting your keys online. &lt;br /&gt;
&lt;br /&gt;
* Verifying the integrity of the code (and the trustworthiness of the author) is important to make sure a hacker hasn&#039;t modified the HTML so that it generates predictable addresses instead of truly random keys.&lt;br /&gt;
&lt;br /&gt;
* Using a very basic printer is advisable since high-end office printers may have WiFi or internal storage that keeps a cache of printed documents.&lt;br /&gt;
&lt;br /&gt;
* Remember, spyware and viruses often attempt to monitor your computer activities so that their authors can steal from you. They are interested in passwords to online accounts, and anything of value. Bitcoin wallets and private keys are something of value that have already been targeted by malware. If your computer is infected with spyware or viruses - even if there are no symptoms, or your antivirus isn&#039;t reporting anything - then anything you type, view, or save on your computer, could potentially be stolen by someone remotely controlling your computer. Your private key can then be intercepted while you enter it, so only enter a Bitcoin private key into your computer when your intent is to redeem its value &#039;&#039;immediately&#039;&#039; or when you want to transfer your funds into a secure [[hardware wallet]].&lt;br /&gt;
&lt;br /&gt;
== Hardware wallets ==&lt;br /&gt;
[[Hardware wallet]]s are a major step to enhanced security and usability.&lt;br /&gt;
&lt;br /&gt;
See the [[Hardware wallet]]s page for more information on which hardware wallet solutions are currently available.&lt;br /&gt;
&lt;br /&gt;
==Importance of security updates==&lt;br /&gt;
&lt;br /&gt;
No software is perfect, and from time to time there may be security vulnerabilities found in your Bitcoin client as well.&lt;br /&gt;
Be sure you keep your client updated with the latest bug fixes, especially when a new vulnerability is discovered.&lt;br /&gt;
We maintain a [[CVEs|list a known vulnerabilities]] on this wiki - you can watch that page to get updates.&lt;br /&gt;
Note that you &#039;&#039;don&#039;t&#039;&#039; need to be running the latest major client version: some clients, including the popular Bitcoin-Qt, have older versions available with bugfix-only updates.&lt;br /&gt;
&lt;br /&gt;
==Securing the Bitcoin-QT or bitcoind wallet==&lt;br /&gt;
&lt;br /&gt;
Bitcoin transactions send Bitcoins to a specific public key. A Bitcoin address is an encoded hash of a public key. In order to use received Bitcoins, you need to have the private key matching the public key you received with. This is sort of like a super long password associated with an account (the account is the public key). Your Bitcoin wallet contains all of the private keys necessary for spending your received transactions. If you delete your wallet without a backup, then you no longer have the authorization information necessary to claim your coins, and the coins associated with those keys are lost forever.&lt;br /&gt;
&lt;br /&gt;
The wallet contains a pool of queued keys. By default there are 100 keys in the [[key pool]].  The size of the pool is configurable using the &amp;quot;-keypool&amp;quot; command line argument.  When you need an address for whatever reason (send, “new address”, generation, etc.), the key is not actually generated freshly, but taken from this pool. A brand new address is generated to fill the pool back to 100. So when a backup is first created, it has all of your old keys plus 100 unused keys. After sending a transaction, it has 99 unused keys. After a total of 100 new-key actions, you will start using keys that are not in your backup. Since the backup does not have the private keys necessary for authorizing spends of these coins, restoring from the old backup will cause you to lose Bitcoins.&lt;br /&gt;
&lt;br /&gt;
Creating a new address generates a new pair of public and private keys, which are added to your wallet. Each keypair is mostly random numbers, so they cannot be known prior to generation. If you backup your wallet and then create more than 100 new addresses, the keypair associated with the newest addresses will not be in the old wallet because the new keypairs are only known after creating them. Any coins received at these addresses will be lost if you restore from the backup.&lt;br /&gt;
&lt;br /&gt;
The situation is made somewhat more confusing because the receiving addresses shown in the UI are not the only keys in your wallet. Each Bitcoin generation is given a new public key, and, more importantly, each sent transaction also sends some number of Bitcoins back to yourself at a new key. When sending Bitcoins to anyone, you generate a new keypair for yourself and simultaneously send Bitcoins to your new public key and the actual recipient&#039;s public key. This is an anonymity feature – it makes tracking Bitcoin transactions much more difficult.&lt;br /&gt;
&lt;br /&gt;
So if you create a backup, do more than 100 things that cause a new key to be used, and then restore from the backup, some Bitcoins will be lost. Bitcoin has not deleted any keys (keys are never deleted) – it has created a new key that is not in your old backup and then sent Bitcoins to it.&lt;br /&gt;
&lt;br /&gt;
== Making a new Bitcoin-QT or bitcoind wallet ==&lt;br /&gt;
&lt;br /&gt;
If a wallet or an encrypted wallet&#039;s password has been compromised, it is wise to create a new wallet and transfer the full balance of bitcoins to addresses contained only in the newly created wallet. Examples of ways a wallet may be compromised are through password re-use, minimal strength passwords, computer hack or virus attack.&lt;br /&gt;
&lt;br /&gt;
There are a number of ways to create a new wallet with Bitcoin-QT or bitcoind but this is a process that has been tested with bitcoind 0.6.3. We use the copy command to minimize the chance of any data loss but you are warned to make backups of any wallet.dat that holds a balance for you.&lt;br /&gt;
&lt;br /&gt;
:1. Shut down the Bitcoin program.&lt;br /&gt;
:2. Find and make a backup of the &amp;quot;compromised&amp;quot; wallet.dat file and rename it, perhaps adding a short description:&lt;br /&gt;
:::wallet.dat -&amp;gt;  wallet-compromised.dat&lt;br /&gt;
:Depending on your OS, the wallet file will be located at:&lt;br /&gt;
:::Windows: %APPDATA%\Bitcoin\&lt;br /&gt;
:::Linux: ~/.bitcoin/&lt;br /&gt;
:::Mac: ~/Library/Application Support/Bitcoin/&lt;br /&gt;
:3. Start the Bitcoin program and it will create a new wallet.dat. You may then encrypt the wallet as desired and make a new backup.&lt;br /&gt;
:4. Once you&#039;ve made a new wallet, you can obtain one or more addresses and copy them into a text editor. After obtaining the new address(es), shut down the Bitcoin program, make a backup of the new wallet.dat file and copy it to a new file named wallet-new.dat.&lt;br /&gt;
:5. Copy the wallet-compromised.dat file back to wallet.dat, start the Bitcoin program and transfer your balance to the new address(es) you put in your text editor. Once the balance is back to 0 for your compromised wallet, you may want to wait a couple minutes or for a confirmation or check block explorer to be sure the transactions have been broadcasted. Then you may shut down the Bitcoin program.&lt;br /&gt;
:6. Rename wallet.dat to wallet-compromised.dat. &lt;br /&gt;
:7. Rename wallet-new.dat to wallet.dat.&lt;br /&gt;
&lt;br /&gt;
You should now have a new wallet with all the bitcoins from the old wallet.&lt;br /&gt;
&lt;br /&gt;
==Making a secure workspace==&lt;br /&gt;
&lt;br /&gt;
Unless you are using a [[hardware wallet]], you must take care that the system is free of malware, viruses, keyloggers, remote access tools, and other tools that may be used to make remote copies of your wallet, Bitcoin-related passwords, or Bitcoin private keys. When your computer is compromised, the precautions taken below may provide additional protection.&lt;br /&gt;
&lt;br /&gt;
A [[hardware wallet]] typically holds the private keys on its internal storage that is not accessible by any malware. The device signs the transactions internally and only transmits the signed transactions to the computer. The separation of the private keys from the vulnerable environment allows the user to spend bitcoins on a compromised computer without any risk. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Debian-based Linux===&lt;br /&gt;
&lt;br /&gt;
==== Store all into an encrypted folder (Tomb) ====&lt;br /&gt;
&lt;br /&gt;
Tomb is a simple tool to manage encrypted storage on GNU/Linux. Among its features are bind-hooks to set up a tomb&#039;s contents in the place where other programs expect them, for example in our case mount -o bind the .bitcoin directory in a user&#039;s home.&lt;br /&gt;
&lt;br /&gt;
First install tomb from https://files.dyne.org/tomb (homepage is on http://www.dyne.org/software/tomb)&lt;br /&gt;
&lt;br /&gt;
Among the requirements: zsh, cryptsetup, pinentry-curses, gnupg, sudo.&lt;br /&gt;
&lt;br /&gt;
Recommended: wipe, dcfldd, steghide, qrencode.&lt;br /&gt;
&lt;br /&gt;
Then create a tomb (we name it bitcoin) with three commands:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;tomb dig -s 100 bitcoin.tomb&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;tomb forge bitcoin.tomb.key&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;tomb lock  bitcoin.tomb -k bitcoin.tomb.key&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then open it&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;tomb open bitcoin.tomb&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This will require you to input again the password you selected.&lt;br /&gt;
&lt;br /&gt;
Once open the tomb contents are in /media/bitcoin.tomb&lt;br /&gt;
&lt;br /&gt;
Move there your bitcoin wallet:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;mv ~/.bitcoin /media/bitcoin.tomb/my-safe-wallet&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then create a file &amp;quot;/media/bitcoin.tomb/bind-hooks&amp;quot; and put a single line:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;my-safe-wallet    .bitcoin&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Which means that every time the tomb is open, the directory my-safe-wallet needs to be bound to ~/.bitcoin. Just make sure an empty ~/.bitcoin directory exists in your home.&lt;br /&gt;
&lt;br /&gt;
Now close the tomb and store its keys safely, make sure you memorize the password. Have a look at Tomb&#039;s documentation, there is a number of things you can do like steganography or printing out keys on a paper to hide and such.&lt;br /&gt;
&lt;br /&gt;
That&#039;s it. Every time you like to access your wallet open the tomb and the .bitcoin will be in place. One can also store the bitcoin binary inside the tomb and even start the bitcoin client using the exec-hooks. Tomb&#039;s manual page &amp;quot;man tomb&amp;quot; explains the possibilities.&lt;br /&gt;
&lt;br /&gt;
The advantage of this approach over an encrypted home is that it becomes extremely portable across computers and even online shells: a Tomb is just a file and its key can be stored far away, on different shells, usb sticks or mobile phones.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Secure the whole user home directory ====&lt;br /&gt;
The first step is to make a [http://www.howtogeek.com/howto/ubuntu/add-a-user-on-ubuntu-server/ new user]. In order for that new user to have an encrypted home directory, you&#039;ll first need the encryption utility. Run:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;sudo apt-get install ecryptfs-utils&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now you&#039;re ready to create a new user&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;sudo adduser --encrypt-home new_user_name&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You&#039;ll need to come up with a [[#Choosing_A_Strong_Password|secure]] new password for that user.&lt;br /&gt;
&lt;br /&gt;
When you get to the prompt &#039;Enter the new value, or press ENTER for the default&#039;, just keep hitting ENTER.&lt;br /&gt;
&lt;br /&gt;
Then switch user to the new user.  To get to the new user you can use the switch user icon for your system, which on Ubuntu is in the &#039;System/Quit&#039; screen, or if there is no switch icon on your system you can log out and log back in as the new user.&lt;br /&gt;
&lt;br /&gt;
Since the home folder of this user is encrypted, if you&#039;re not logged in as that user, data that is saved there can&#039;t be browsed, even by a root user. If something goes wrong with your system, and you need to decrypt the new user&#039;s files, you&#039;ll need its decryption key.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;ecryptfs-unwrap-passphrase&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
It will ask you for your user&#039;s password and give you the decryption key. &#039;&#039;&#039;WRITE DOWN OR SAVE THE CODE IT RETURNS&#039;&#039;&#039; because you will need it if you ever have to pull your data off while the OS is not working. (You can run it again later if you need to, but run it now so that you can get your data if your Linux install gets botched.)&lt;br /&gt;
&lt;br /&gt;
The encrypted folder data is not encrypted while it&#039;s in memory, and so if it&#039;s ever sent to the swap partition it can be stolen from there unless that too is encrypted - be aware that this will mean you cannot use Hibernate anymore, as the bootloader won&#039;t be able to restore the hibernation data.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;ecryptfs-setup-swap&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then click on a folder in the new user to display the file browser, then keep going up folders until you see the new user home directory, then right click to bring up the Properties dialog, then click on the Permissions tab, then in the Others section, set the folder access to None.&lt;br /&gt;
&lt;br /&gt;
For secure browsing, open Firefox, and then go into the Edit menu and click Preferences.  Starting from the left, click on the General tab, and in the &#039;Startup/When Firefox starts&#039; pop up menu, choose &#039;Show a Blank Page&#039;.  Then click on the Content tab, and deselect &#039;Load images automatically&#039; and deselect &#039;Enable JavaScript&#039;.  Then click on the Privacy tab, and in the &#039;History/Firefox will&#039; pop up menu, choose &#039;Never remember history&#039;.  Then click on the Security tab, and in the Passwords section, deselect &#039;Remember passwords for sites&#039; and deselect &#039;Use a master password&#039;.  Then click on the Advanced tab, then click on the Update tab, and then in the &#039;Automatically check for updates to&#039; section, deselect &#039;Add-ons&#039; and &#039;Search Engines&#039;.&lt;br /&gt;
&lt;br /&gt;
When JavaScript is disabled, the [http://sourceforge.net/projects/bitcoin/files/Bitcoin/bitcoin-0.3.23/bitcoin-0.3.23-linux.tar.gz/download Linux download page] will not download automatically, so you&#039;ll have to click on the &#039;direct link&#039; part of the &amp;quot;Problems with the download? Please use this &#039;direct link&#039; or try another mirror.&amp;quot; line.&lt;br /&gt;
&lt;br /&gt;
===Mac===&lt;br /&gt;
This solution &#039;&#039;&#039;does not scale&#039;&#039;&#039;; the amount of needed space can grow beyond the image size.&lt;br /&gt;
&lt;br /&gt;
===Windows===&lt;br /&gt;
&lt;br /&gt;
Due to the frequency with which Windows computers are compromised, it is advised to encrypt your wallet or to keep your wallet on an encrypted disk image created by third-party software, such as [http://www.truecrypt.org/ TrueCrypt] (open source) or [http://www.jetico.com/encryption-bestcrypt/ Jetico BestCrypt] (commercial). This also applies to the storage of passwords, private keys and other data that can be used to access any of your Bitcoin balances.&lt;br /&gt;
&lt;br /&gt;
Assuming that you have installed the Windows Bitcoin client and run it at least once, the process is described below.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;lt;b&amp;gt;To mount the Bitcoin data directory on an encrypted drive&amp;lt;/b&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol start=1 type=1&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Use the third-party disk image encryption program of your choice to create and mount an encrypted disk image of at least 5GB in size. This procedure stores the entire block chain database with the wallet.dat file so the required size of the encrypted disk image required may grow in the future.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Locate the Bitcoin data directory, and copy the directory with all contents to the encrypted drive.&lt;br /&gt;
&amp;lt;p&amp;gt;For help finding this directory, see &amp;lt;b&amp;gt;[[Securing_your_wallet#Locating_Bitcoin_s_data_directory|Locating Bitcoin&#039;s Data Directory]]&amp;lt;/b&amp;gt;.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Create a Windows shortcut that starts Bitcoin with the &amp;lt;code&amp;gt;-datadir&amp;lt;/code&amp;gt; parameter and specifies the encrypted drive and directory.&lt;br /&gt;
&amp;lt;p&amp;gt;For example, if you installed Bitcoin in the default directory, mounted your Bitcoin encrypted drive as &amp;lt;code&amp;gt;E:\&amp;lt;/code&amp;gt;, and stored your Bitcoin data directory on it as &amp;lt;code&amp;gt;Bitcoin&amp;lt;/code&amp;gt;, you would type the following command as the shortcut Target:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&amp;lt;code&amp;gt;C:\Program Files\Bitcoin\bitcoin.exe -datadir=E:\Bitcoin&amp;lt;/code&amp;gt;&amp;lt;/blockquote&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Open Bitcoin&#039;s settings and configure it &amp;lt;b&amp;gt;NOT&amp;lt;/b&amp;gt; to start automatically when you start Windows.&lt;br /&gt;
&amp;lt;p&amp;gt;This is to allow you to mount the Bitcoin encrypted disk image before starting Bitcoin.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Shut down Bitcoin, and then restart it from the new shortcut.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
After doing this, any time you want to use Bitcoin, you must first mount the Bitcoin encrypted disk image using the same drive designation, and then run Bitcoin from the shortcut that you created, so that it can find its data and your wallet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== General Solutions ===&lt;br /&gt;
&lt;br /&gt;
Your wallet.dat file is not encrypted by the Bitcoin program by default but the most current release of the Bitcoin client provides a method to encrypt with a passphrase the private keys stored in the wallet. Anyone who can access an unencrypted wallet can easily steal all of your coins.  Use one of these encryption programs if there is any chance someone might gain access to your wallet.&lt;br /&gt;
* [http://www.7-zip.org/ 7-zip] - Supports strongly-encrypted archives.&lt;br /&gt;
* [http://www.axantum.com/axcrypt/ AxCrypt by Axantum]&lt;br /&gt;
* [http://lrzip.kolivas.org lrzip] - Compression software for Linux and OSX that supports very high grade password protected encryption&lt;br /&gt;
* [http://www.truecrypt.org/ TrueCrypt] - Volume-based on-the-fly encryption (for advanced users)&lt;br /&gt;
&lt;br /&gt;
There is also a list of [[OpenSourceEncryptionSoftware|open source encryption software.]]&lt;br /&gt;
&lt;br /&gt;
Decrypting and encrypting the wallet.dat every time you start or quit the Bitcoin client can be &#039;&#039;tedious&#039;&#039; (and outright error-prone). If you want to keep your wallet encrypted (except while you&#039;re actually running the Bitcoin client), it&#039;s better to relegate the automation to a [http://lorelei.kaverit.org/bitcoin.sh small shell script] that handles the en/decryption and starting up Bitcoin client for you (Linux and OSX). &lt;br /&gt;
&lt;br /&gt;
There is also a method to print out and encrypt your wallet.dat as a special, scannable code. See details here: [[WalletPaperbackup]]&lt;br /&gt;
&lt;br /&gt;
==== Password Strength ====&lt;br /&gt;
Brute-force password cracking has come a long way. A password including capitals, numbers, and special characters with a length of 8 characters can be trivially solved now (using appropriate hardware). The recommended length is &#039;&#039;&#039;at least&#039;&#039;&#039; 12 characters long.  You can also use a multi-word password and there are techniques to increase the strength of your passwords without sacrificing usability. [http://www.baekdal.com/tips/password-security-usability The Usability of Passwords] &lt;br /&gt;
&lt;br /&gt;
However, simply using dictionary words is also insecure as it opens you up to a dictionary attack. If you use dictionary words, be sure to include random symbols and numbers in the mix as well.&lt;br /&gt;
&lt;br /&gt;
If you use keyfiles in addition to a password, it is unlikely that your encrypted file can ever be cracked using brute-force methods, even when even a 12 character password might be too short.&lt;br /&gt;
&lt;br /&gt;
Assume that any encrypted files you store online (eg. Gmail, Dropbox) will be stored somewhere forever and can never be erased.&lt;br /&gt;
&lt;br /&gt;
===== Choosing A Strong Password =====&lt;br /&gt;
Make sure you pick at least one character in each group:&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  Lowercase: abcdefghijklmnopqrstuvwxyz&lt;br /&gt;
  Uppercase: ABCDEFGHIJKLMNOPQRSTUVWXYZ&lt;br /&gt;
  Number: 1234567890&lt;br /&gt;
  Symbol: `~!@#$%^&amp;amp;*()-_=+\|[{]};:&#039;&amp;quot;,&amp;lt;.&amp;gt;/? (space)&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;9 char = unsuitable for use&lt;br /&gt;
  09 char = insecure&lt;br /&gt;
  10 char = low security&lt;br /&gt;
  11 char = medium security&lt;br /&gt;
  12 char = good security (good enough for your wallet)&lt;br /&gt;
  13 char = very good, enough for anything.&lt;br /&gt;
&lt;br /&gt;
You might want to read [http://security.stackexchange.com/questions/662/what-is-your-way-to-create-good-passwords-that-can-actually-be-remembered What is your way to create good passwords that can actually be remembered?] and [http://security.stackexchange.com/questions/6095/xkcd-936-short-complex-password-or-long-dictionary-passphrase XKCD #936: Short complex password, or long dictionary passphrase?]&lt;br /&gt;
&lt;br /&gt;
== Backing up your wallet ==&lt;br /&gt;
&lt;br /&gt;
Backing up your wallet is not necessary if you use a wallet with implemented [[BIP 0032]] (hierarchical deterministic wallet). Today, only [[TREZOR]], [[Electrum]] and [[CarbonWallet]] fully support BIP 0032.&lt;br /&gt;
&lt;br /&gt;
For advise on the backup process see [[Backingup_your_wallet|Backing up your wallet]].&lt;br /&gt;
&lt;br /&gt;
==Erasing Plain-text Wallets==&lt;br /&gt;
&lt;br /&gt;
In most operating systems, including Windows, Linux, and Mac OS X, simply deleting a wallet.dat file will &#039;&#039;not&#039;&#039; generally destroy it. It is likely that advanced tools can still be used to recover the wallet.dat file, even after it has been deleted.&lt;br /&gt;
&lt;br /&gt;
The Linux &#039;&#039;&#039;shred&#039;&#039;&#039; command can be used to overwrite the wallet file with random data prior to deleting; this particular copy of the file will then be practically impossible to recover.  Using shred (and similar tools on Windows) however does not guarantee that still other copies don&#039;t exist somewhere hidden on your HD. That will depend on your system configuration and what packages you have installed. Some system restore and backup tools, for instance, create periodic snapshots of your  filesystem, duplicating your wallet.dat.&lt;br /&gt;
&lt;br /&gt;
In Mac OS, the equivalent of &#039;&#039;&#039;shred&#039;&#039;&#039; is &#039;&#039;&#039;srm&#039;&#039;&#039; (introduced in Leopard). Using the Finder to remove files, clicking &amp;quot;Secure Empty Trash&amp;quot; in the Finder menu will shred the contents of the trash can. As with any OS this doesn&#039;t guarantee that there are not other copies elsewhere on your system.&lt;br /&gt;
&lt;br /&gt;
For Windows, the built-in command &#039;&#039;cipher /W&#039;&#039; will shred all previously-deleted files. [http://www.cylog.org/utilities/cybershredder.jsp CyberShredder] can securely deleted individual files.&lt;br /&gt;
&lt;br /&gt;
==Online and Mobile Wallets==&lt;br /&gt;
&lt;br /&gt;
Thus far, this article has been discussing the security of a wallet file for Bitcoin-QT or bitcoind that is under your sole control. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Online wallets have a number of pros and cons to consider. For example, you can access your wallet on any computer in the world, but you are essentially storing your private keys or wallet with the provider of the online wallet. &lt;br /&gt;
Depending on the level of security of such service, your bitcoins may be lost if the service is compromised. &lt;br /&gt;
&lt;br /&gt;
The invention of [[hardware wallet]]s makes it possible to use online wallets in a more secure manner.&lt;br /&gt;
A hardware wallet keeps your private keys apart from the computer and internet. An online wallet compatible with a hardware wallet (such as [http://mytrezor.com myTREZOR.com]) then does not need to store any sensitive data (private keys, passwords or email addresses) and only serves as tool for broadcasting transactions signed in the hardware wallet out to the blockchain. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mobile wallet applications are available for Android devices that allow you to send bitcoins by QR code or NFC, but this opens up the possibility of loss if mobile device is compromised. It may be possible to encrypt and backup the wallet or private keys on a mobile device but it is not advisable to store a large amount of bitcoins there without doing your own research and testing. Mobile wallets are useful for small spending and not for storing your bitcoin savings.&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
* [[Data directory]]&lt;br /&gt;
* [[How to import private keys]]&lt;br /&gt;
* [http://bitcoinx.io/wallets/ Where to get a Bitcoin wallet]&lt;br /&gt;
* [http://startbitcoin.com/how-to-create-a-secure-bitcoin-wallet/ Secure Bitcoin Wallet Tutorial]&lt;br /&gt;
* [[How to set up a secure offline savings wallet]]&lt;br /&gt;
* [http://arimaa.com/bitcoin/ Bitcoin Gateway - A Peer-to-peer Bitcoin Vault and Payment Network]&lt;br /&gt;
* [http://blog.cyplo.net/2012/04/01/bitcoin-wallet-recovery-photorec/ Find lost wallet eg. after disk format, using Photorec]&lt;br /&gt;
* [https://docs.google.com/document/d/1dNZ7N_lQXHQp0jWkeN7dW4bWNMpcTBRM4iEoSuQwLho/edit# The Ultimate Guide to Web Wallet Security]&lt;br /&gt;
&lt;br /&gt;
[[Category:Security]]&lt;br /&gt;
&lt;br /&gt;
[[de:Sichere deine Geldbörse]]&lt;br /&gt;
[[ru:Bitcoin и безопасность]]&lt;br /&gt;
[[es:Cómo asegurar su monedero]]&lt;br /&gt;
[[zh-cn:保护你的钱包]]&lt;/div&gt;</summary>
		<author><name>Glitch003</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Hardware_wallet&amp;diff=49082</id>
		<title>Hardware wallet</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Hardware_wallet&amp;diff=49082"/>
		<updated>2014-07-23T03:05:26Z</updated>

		<summary type="html">&lt;p&gt;Glitch003: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A &#039;&#039;&#039;hardware wallet&#039;&#039;&#039; is a device that stores a part of a user&#039;s [[wallet]] securely in mostly-offline hardware. They have major advantages over other wallet types:&lt;br /&gt;
&lt;br /&gt;
* the key is often stored in a protected area of a microcontroller, and cannot be transferred out of the device in plaintext&lt;br /&gt;
* immune to computer viruses that steal from software wallets&lt;br /&gt;
* can be used securely and interactively, as opposed to a [[paper wallet]] which must be imported to software at some point&lt;br /&gt;
* much of the time, the software is open source, allowing a user to validate the entire operation of the device&lt;br /&gt;
&lt;br /&gt;
This page is an attempt to summarize all the known developments of hardware wallets that can use Bitcoin as part of their operation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Purchasable hardware wallets ==&lt;br /&gt;
&lt;br /&gt;
=== Piper - Standalone bitcoin paper wallet printer ===&lt;br /&gt;
[http://www.piperwallet.com PiperWallet.com]&lt;br /&gt;
[[File:piper.jpg|300px|thumb|left|Piper wallet from the front]]&lt;br /&gt;
Piper is the easiest way to store bitcoin and other cryptocurrencies securely.&lt;br /&gt;
&lt;br /&gt;
* Easy: Simply press the button to print a new paper wallet. You can choose to have Piper store your keys. Backup is as easy as plugging in a USB drive.&lt;br /&gt;
* Secure: Paper wallets are the most secure way to store your Bitcoin.  Piper is the only offline wallet to pass all 26 Dieharder tests to ensure secure private key generation.&lt;br /&gt;
* Customizable: Plug in a display, mouse, and keyboard and customize Piper to do whatever you want. It&#039;s Linux-based, open source, and powered by the Raspberry Pi. You can even use your own printer! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== [[TREZOR]] The Bitcoin Safe ===&lt;br /&gt;
[http://bitcointrezor.com BitcoinTrezor.com]&lt;br /&gt;
[[File:Trezor-tx.jpg|300px|thumb|left|Confirming transaction with TREZOR]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://bitcointrezor.com/faq/ FAQ @BitcoinTrezor.com]&lt;br /&gt;
&lt;br /&gt;
[[TREZOR]] is a secure bitcoin storage and a transaction signing tool. &lt;br /&gt;
&lt;br /&gt;
The private keys generated by the device never leave it and cannot be accessed by a malware. Thanks to a limited USB protocol only a payment template can be sent into the device (address and amount) which then has to be confirmed by a physical user interaction (visual verification of the transaction details and pressing the confirmation button).&lt;br /&gt;
&lt;br /&gt;
[[TREZOR]] uses a deterministic wallet structure which means it can hold an unlimited number of keys (BIP32). &lt;br /&gt;
&lt;br /&gt;
A recovery seed is generated when the device is initialized. In case it gets lost or stolen, all it&#039;s contents can be recovered using the seed (private keys, bitcoin balance and transaction history) into a new device or another BIP39 compatible wallet. &lt;br /&gt;
&lt;br /&gt;
[[TREZOR]] introduced a unique way of PIN entering preventing keyloggers from recording it even when entered on a compromised computer.&lt;br /&gt;
&lt;br /&gt;
An encryption passphrase can be set on top of the PIN protection. More passphrases can be used for plausible deniability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Pi Wallet - cold storage ===&lt;br /&gt;
[[File:Piwallet.jpeg|300px|thumb|left|Pi-Wallet]]&lt;br /&gt;
[http://www.pi-wallet.com/ Pi-Wallet Shop]&lt;br /&gt;
&lt;br /&gt;
[http://www.pi-wallet.com/pages/what-is-pi-wallet Further informations about Pi-Wallet]&lt;br /&gt;
&lt;br /&gt;
The Pi-Wallet is comparable to an offline Notebook. &lt;br /&gt;
&lt;br /&gt;
However it combines all features of the Armory bitcoin client (e.g. offline transaction signing) with the advantages of a tiny computer.&lt;br /&gt;
&lt;br /&gt;
To sign offline-transaction you will need an (unused) USB stick.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Not purchasable hardware wallets ==&lt;br /&gt;
&lt;br /&gt;
=== BitcoinCard Megion Technologies-Card based wallet ===&lt;br /&gt;
[[File:Bitcoincard-medley-large.jpg|400px|thumb|left|Bitcoin Card]]&lt;br /&gt;
[http://www.bitcoincard.org/ Bitcoincard Home Page]&lt;br /&gt;
&lt;br /&gt;
[http://blog.bitinstant.com/blog/2012/6/19/our-discovery-in-vienna-the-bitcoin-card.html Excellent review by evoorhees]&lt;br /&gt;
&lt;br /&gt;
Incorporates a e-paper display, keypad, and radio (custom ISM band protocol.) Unfortunately it is fairly limited in terms of transaction I/O, requiring a radio gateway or another bitcoincard wherever funds need to be transferred.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== BitSafe - allten/someone42&#039;s hardware wallet ===&lt;br /&gt;
[[File:Bitsafe-wallet-sizecompare.jpg|200px|thumb|left|Bitsafe wallet]]&lt;br /&gt;
[https://bitcointalk.org/index.php?topic=127587.0 BitSafe Hardware Wallet Development - BOM Ready - 50 kits being prepared]&lt;br /&gt;
&lt;br /&gt;
Signing transactions only, requires USB host software for transactions &amp;amp; USB power. Has a OLED display and Confirm/Cancel buttons. Evolved out of someone42&#039;s prototype below, and has significant contributions from someone42 as well.&lt;br /&gt;
&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
=== someone42&#039;s original prototype ===&lt;br /&gt;
[[File:Someone42-wallet-prototype.jpg|300px|thumb|left|someone42&#039;s original prototype]]&lt;br /&gt;
[https://bitcointalk.org/index.php?topic=78614.0 Hardware Bitcoin wallet - a minimal Bitcoin wallet for embedded devices]&lt;br /&gt;
&lt;br /&gt;
Signing transactions only, requires USB host software for transactions &amp;amp; USB power. All work is rolled into the above BitSafe wallet currently.&lt;br /&gt;
&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
=== BTChip btchip USB based transaction signer and private key holder ===&lt;br /&gt;
[[File:Btchip-wallet.jpg|300px|thumb|left|BTChip]]&lt;br /&gt;
[https://bitcointalk.org/index.php?topic=134999.0 ANN Smartcard wallet project + btchip implementation (no reader required)]&lt;br /&gt;
&lt;br /&gt;
[http://www.btchip.com www.btchip.com]&lt;br /&gt;
&lt;br /&gt;
USB smartcard dedicated to bitcoins, no keypad or display so trust in the host device is required. An improvement has been implemented that uses a secret value known to the user during the transaction for additional security.&lt;br /&gt;
&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
=== Other/Defunct but with good discussion: ===&lt;br /&gt;
* natman3400&#039;s BitClip Jun 2011 [https://bitcointalk.org/index.php?topic=24852.0 https://bitcointalk.org/index.php?topic=24852.0]&lt;br /&gt;
:Seems to have gone defunct around Dec 2011. Some good ideas though and seemed to have started on execution.&lt;br /&gt;
* jim618 hardware wallet proposal Apr 2012 [https://bitcointalk.org/index.php?topic=77553.0 Dedicated bitcoin devices - dealing with untrusted networks]&lt;br /&gt;
:Great discussion and good ideas from jim618. Also linked the following video:&lt;br /&gt;
* Prof. Clemens Cap&#039;s hardware wallet? (video:)[https://www.youtube.com/watch?v=IavQ-Wc8S1U Clemens Cap about electronic bitcoin wallet at EuroBit]&lt;br /&gt;
:Clemens Cap of Uni Rostock explains the Electronic Bitcoin wallet device he&#039;s working on. It&#039;s based on adafruit microtouch device.&lt;br /&gt;
* ripper234&#039;s discussion based on Yubikeys Aug 2012 [https://bitcointalk.org/index.php?topic=99492 Having a YUBIKEY as one of the parties for m-of-n signatures]&lt;br /&gt;
:The use of Yubikeys. They only support symmetric crypto, so you&#039;d have to trust the host device.&lt;br /&gt;
* kalleguld&#039;s hardware wallet proposal Oct 2012 [https://bitcointalk.org/index.php?topic=115294.0 Proposal: Hardware wallet (Win 3 BTC)]&lt;br /&gt;
* Vaporware: Matthew N Wright&#039;s ellet [https://bitcointalk.org/index.php?topic=85931.0 ANN The world&#039;s first handheld Bitcoin device, the Ellet!] (Vaporware)&lt;br /&gt;
&lt;br /&gt;
== Smart Card based wallets ==&lt;br /&gt;
This type of device requires complete trust in the host device, as there is no method for user input.&lt;br /&gt;
See [[Smart card wallet]]&lt;br /&gt;
&lt;br /&gt;
== Related Resources ==&lt;br /&gt;
* slush&#039;s Hardware wallet wire protocol discussion: [https://bitcointalk.org/index.php?topic=125383.0 Hardware wallet wire protocol]&lt;br /&gt;
* kjj&#039;s Todo List discussion for client protocol requirements: [https://bitcointalk.org/index.php?topic=19080.msg272348#msg272348 in topic Re: Split private keys]&lt;br /&gt;
* paybitcoin&#039;s original post: [https://bitcointalk.org/index.php?topic=134277.0 Hardware Wallet Roundup]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=135090.0 This thread] about editing this very wiki entry.&lt;br /&gt;
* Various Hardware Wallets and Reviews: [http://www.offlinewallets.com/hardware-wallets Offline Hardware Wallets]&lt;br /&gt;
&lt;br /&gt;
[[Category:Security]]&lt;br /&gt;
[[Category:Wallets]]&lt;br /&gt;
[[Category:Hardware]]&lt;/div&gt;</summary>
		<author><name>Glitch003</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=File:Piper.jpg&amp;diff=49081</id>
		<title>File:Piper.jpg</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=File:Piper.jpg&amp;diff=49081"/>
		<updated>2014-07-23T03:02:46Z</updated>

		<summary type="html">&lt;p&gt;Glitch003: A photo of the Piper Wallet paper wallet printer device&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
A photo of the Piper Wallet paper wallet printer device&lt;br /&gt;
== Licensing ==&lt;br /&gt;
{{self|GFDL|cc-by-sa-all|migration=redundant}}&lt;/div&gt;</summary>
		<author><name>Glitch003</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Hardware_wallet&amp;diff=49080</id>
		<title>Hardware wallet</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Hardware_wallet&amp;diff=49080"/>
		<updated>2014-07-23T02:59:42Z</updated>

		<summary type="html">&lt;p&gt;Glitch003: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A &#039;&#039;&#039;hardware wallet&#039;&#039;&#039; is a device that stores a part of a user&#039;s [[wallet]] securely in mostly-offline hardware. They have major advantages over other wallet types:&lt;br /&gt;
&lt;br /&gt;
* the key is often stored in a protected area of a microcontroller, and cannot be transferred out of the device in plaintext&lt;br /&gt;
* immune to computer viruses that steal from software wallets&lt;br /&gt;
* can be used securely and interactively, as opposed to a [[paper wallet]] which must be imported to software at some point&lt;br /&gt;
* much of the time, the software is open source, allowing a user to validate the entire operation of the device&lt;br /&gt;
&lt;br /&gt;
This page is an attempt to summarize all the known developments of hardware wallets that can use Bitcoin as part of their operation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Purchasable hardware wallets ==&lt;br /&gt;
&lt;br /&gt;
=== Piper - Standalone bitcoin paper wallet printer ===&lt;br /&gt;
[http://www.piperwallet.com PiperWallet.com]&lt;br /&gt;
&lt;br /&gt;
Piper is the easiest way to store bitcoin and other cryptocurrencies securely.&lt;br /&gt;
&lt;br /&gt;
* Easy: Simply press the button to print a new paper wallet. You can choose to have Piper store your keys. Backup is as easy as plugging in a USB drive.&lt;br /&gt;
* Secure: Paper wallets are the most secure way to store your Bitcoin.  Piper is the only offline paper wallet printer to pass all 26 Dieharder tests to ensure secure private key generation.&lt;br /&gt;
* Customizable: Plug in a display, mouse, and keyboard and customize Piper to do whatever you want. It&#039;s Linux-based, open source, and powered by the Raspberry Pi. You can even use your own printer! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== [[TREZOR]] The Bitcoin Safe ===&lt;br /&gt;
[http://bitcointrezor.com BitcoinTrezor.com]&lt;br /&gt;
[[File:Trezor-tx.jpg|300px|thumb|left|Confirming transaction with TREZOR]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://bitcointrezor.com/faq/ FAQ @BitcoinTrezor.com]&lt;br /&gt;
&lt;br /&gt;
[[TREZOR]] is a secure bitcoin storage and a transaction signing tool. &lt;br /&gt;
&lt;br /&gt;
The private keys generated by the device never leave it and cannot be accessed by a malware. Thanks to a limited USB protocol only a payment template can be sent into the device (address and amount) which then has to be confirmed by a physical user interaction (visual verification of the transaction details and pressing the confirmation button).&lt;br /&gt;
&lt;br /&gt;
[[TREZOR]] uses a deterministic wallet structure which means it can hold an unlimited number of keys (BIP32). &lt;br /&gt;
&lt;br /&gt;
A recovery seed is generated when the device is initialized. In case it gets lost or stolen, all it&#039;s contents can be recovered using the seed (private keys, bitcoin balance and transaction history) into a new device or another BIP39 compatible wallet. &lt;br /&gt;
&lt;br /&gt;
[[TREZOR]] introduced a unique way of PIN entering preventing keyloggers from recording it even when entered on a compromised computer.&lt;br /&gt;
&lt;br /&gt;
An encryption passphrase can be set on top of the PIN protection. More passphrases can be used for plausible deniability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Pi Wallet - cold storage ===&lt;br /&gt;
[[File:Piwallet.jpeg|300px|thumb|left|Pi-Wallet]]&lt;br /&gt;
[http://www.pi-wallet.com/ Pi-Wallet Shop]&lt;br /&gt;
&lt;br /&gt;
[http://www.pi-wallet.com/pages/what-is-pi-wallet Further informations about Pi-Wallet]&lt;br /&gt;
&lt;br /&gt;
The Pi-Wallet is comparable to an offline Notebook. &lt;br /&gt;
&lt;br /&gt;
However it combines all features of the Armory bitcoin client (e.g. offline transaction signing) with the advantages of a tiny computer.&lt;br /&gt;
&lt;br /&gt;
To sign offline-transaction you will need an (unused) USB stick.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Not purchasable hardware wallets ==&lt;br /&gt;
&lt;br /&gt;
=== BitcoinCard Megion Technologies-Card based wallet ===&lt;br /&gt;
[[File:Bitcoincard-medley-large.jpg|400px|thumb|left|Bitcoin Card]]&lt;br /&gt;
[http://www.bitcoincard.org/ Bitcoincard Home Page]&lt;br /&gt;
&lt;br /&gt;
[http://blog.bitinstant.com/blog/2012/6/19/our-discovery-in-vienna-the-bitcoin-card.html Excellent review by evoorhees]&lt;br /&gt;
&lt;br /&gt;
Incorporates a e-paper display, keypad, and radio (custom ISM band protocol.) Unfortunately it is fairly limited in terms of transaction I/O, requiring a radio gateway or another bitcoincard wherever funds need to be transferred.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== BitSafe - allten/someone42&#039;s hardware wallet ===&lt;br /&gt;
[[File:Bitsafe-wallet-sizecompare.jpg|200px|thumb|left|Bitsafe wallet]]&lt;br /&gt;
[https://bitcointalk.org/index.php?topic=127587.0 BitSafe Hardware Wallet Development - BOM Ready - 50 kits being prepared]&lt;br /&gt;
&lt;br /&gt;
Signing transactions only, requires USB host software for transactions &amp;amp; USB power. Has a OLED display and Confirm/Cancel buttons. Evolved out of someone42&#039;s prototype below, and has significant contributions from someone42 as well.&lt;br /&gt;
&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
=== someone42&#039;s original prototype ===&lt;br /&gt;
[[File:Someone42-wallet-prototype.jpg|300px|thumb|left|someone42&#039;s original prototype]]&lt;br /&gt;
[https://bitcointalk.org/index.php?topic=78614.0 Hardware Bitcoin wallet - a minimal Bitcoin wallet for embedded devices]&lt;br /&gt;
&lt;br /&gt;
Signing transactions only, requires USB host software for transactions &amp;amp; USB power. All work is rolled into the above BitSafe wallet currently.&lt;br /&gt;
&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
=== BTChip btchip USB based transaction signer and private key holder ===&lt;br /&gt;
[[File:Btchip-wallet.jpg|300px|thumb|left|BTChip]]&lt;br /&gt;
[https://bitcointalk.org/index.php?topic=134999.0 ANN Smartcard wallet project + btchip implementation (no reader required)]&lt;br /&gt;
&lt;br /&gt;
[http://www.btchip.com www.btchip.com]&lt;br /&gt;
&lt;br /&gt;
USB smartcard dedicated to bitcoins, no keypad or display so trust in the host device is required. An improvement has been implemented that uses a secret value known to the user during the transaction for additional security.&lt;br /&gt;
&amp;lt;br clear=&amp;quot;all&amp;quot;&amp;gt;&lt;br /&gt;
=== Other/Defunct but with good discussion: ===&lt;br /&gt;
* natman3400&#039;s BitClip Jun 2011 [https://bitcointalk.org/index.php?topic=24852.0 https://bitcointalk.org/index.php?topic=24852.0]&lt;br /&gt;
:Seems to have gone defunct around Dec 2011. Some good ideas though and seemed to have started on execution.&lt;br /&gt;
* jim618 hardware wallet proposal Apr 2012 [https://bitcointalk.org/index.php?topic=77553.0 Dedicated bitcoin devices - dealing with untrusted networks]&lt;br /&gt;
:Great discussion and good ideas from jim618. Also linked the following video:&lt;br /&gt;
* Prof. Clemens Cap&#039;s hardware wallet? (video:)[https://www.youtube.com/watch?v=IavQ-Wc8S1U Clemens Cap about electronic bitcoin wallet at EuroBit]&lt;br /&gt;
:Clemens Cap of Uni Rostock explains the Electronic Bitcoin wallet device he&#039;s working on. It&#039;s based on adafruit microtouch device.&lt;br /&gt;
* ripper234&#039;s discussion based on Yubikeys Aug 2012 [https://bitcointalk.org/index.php?topic=99492 Having a YUBIKEY as one of the parties for m-of-n signatures]&lt;br /&gt;
:The use of Yubikeys. They only support symmetric crypto, so you&#039;d have to trust the host device.&lt;br /&gt;
* kalleguld&#039;s hardware wallet proposal Oct 2012 [https://bitcointalk.org/index.php?topic=115294.0 Proposal: Hardware wallet (Win 3 BTC)]&lt;br /&gt;
* Vaporware: Matthew N Wright&#039;s ellet [https://bitcointalk.org/index.php?topic=85931.0 ANN The world&#039;s first handheld Bitcoin device, the Ellet!] (Vaporware)&lt;br /&gt;
&lt;br /&gt;
== Smart Card based wallets ==&lt;br /&gt;
This type of device requires complete trust in the host device, as there is no method for user input.&lt;br /&gt;
See [[Smart card wallet]]&lt;br /&gt;
&lt;br /&gt;
== Related Resources ==&lt;br /&gt;
* slush&#039;s Hardware wallet wire protocol discussion: [https://bitcointalk.org/index.php?topic=125383.0 Hardware wallet wire protocol]&lt;br /&gt;
* kjj&#039;s Todo List discussion for client protocol requirements: [https://bitcointalk.org/index.php?topic=19080.msg272348#msg272348 in topic Re: Split private keys]&lt;br /&gt;
* paybitcoin&#039;s original post: [https://bitcointalk.org/index.php?topic=134277.0 Hardware Wallet Roundup]&lt;br /&gt;
* [https://bitcointalk.org/index.php?topic=135090.0 This thread] about editing this very wiki entry.&lt;br /&gt;
* Various Hardware Wallets and Reviews: [http://www.offlinewallets.com/hardware-wallets Offline Hardware Wallets]&lt;br /&gt;
&lt;br /&gt;
[[Category:Security]]&lt;br /&gt;
[[Category:Wallets]]&lt;br /&gt;
[[Category:Hardware]]&lt;/div&gt;</summary>
		<author><name>Glitch003</name></author>
	</entry>
</feed>