<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://en.bitcoin.it/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ijel</id>
	<title>Bitcoin Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://en.bitcoin.it/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ijel"/>
	<link rel="alternate" type="text/html" href="https://en.bitcoin.it/wiki/Special:Contributions/Ijel"/>
	<updated>2026-04-09T08:37:35Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Talk:Securing_your_wallet&amp;diff=23692</id>
		<title>Talk:Securing your wallet</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Talk:Securing_your_wallet&amp;diff=23692"/>
		<updated>2012-02-11T03:55:33Z</updated>

		<summary type="html">&lt;p&gt;Ijel: /* ‘Shred’ cannot always be assumed to be secure on modern filesystems! */ Don&amp;#039;t mind me, I&amp;#039;m just a freaking perfectionist. I&amp;#039;ll try not to edit spam so much next time. :-)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The article is too huge. The Mac solution does not scale; the suggested sizes are too low and the maximum size is infinite. [[User:X|X]] 17:10, 8 January 2012 (GMT)&lt;br /&gt;
&lt;br /&gt;
This article needs a rewrite following the introduction of the Bitcoin.org client&#039;s ability to passphrase protect the keys in the wallet.  Perhaps some sections also -- something like &amp;quot;typical consumer use&amp;quot; (where the client&#039;s encryption is adequate) and &amp;quot;commercial-grade protection&amp;quot; where the topics such as encryption at the filesystem is addressed. - [[User:Sgornick|Sgornick]] 10:24, 28 December 2011 (GMT) &lt;br /&gt;
&lt;br /&gt;
The five paragraphs in Technical Background all say the same thing. --[[User:Mcandre|Mcandre]]&lt;br /&gt;
&lt;br /&gt;
Note: the backupwallet.sh script in the linux section doesn&#039;t actually work.&lt;br /&gt;
I suspect it is caused by the wiki changing the formatting.&lt;br /&gt;
I wrote my own version that uses much more standard shell syntax.&lt;br /&gt;
&lt;br /&gt;
[[User:Wscott|Wscott]] 11:28, 11 February 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
I fixed the backupwallet.sh script. It just needed a nowiki tag around a conditional statement. -- [[User:Mweather|Mweather]] 23:48, 20 May 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
The approach for &amp;quot;Making a secure workspace&amp;quot; seems to differ greatly for linux and mac. Why? It seems like if you are going to make firefox secure, which is basically all the linux section recommends, you would want to do that on a mac too. And the recommendation in the mac section to keep the wallet in an encrypted volume with a symlink in the expected system location should be done on a linux box too, shouldn&#039;t it, like using truecrypt or something... Am I wrong??? Can someone with advanced knowledge please advise...? Also, if you want bitcoin to run all the time in the background on linux, but you have it set up in a separate user from your main user account, well, you are out of luck? Can justifications and explanations be added to the recommendations, and also I guess some alternatives with pros and cons be offered, for people with different needs and computing situations. Thanks! --[[User:GusGustavo|GusGustavo]] 13:33, 26 May 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
== Time Sensitivity ==&lt;br /&gt;
&lt;br /&gt;
Is it possible to still send money to my wallet, even if it&#039;s backed up and offline?  Do bitcoins ever expire if they&#039;re not spent, or is there anything bad that can happen by not using my bitcoin client in a long time? [[User:Daniel.benoy|Daniel.benoy]] 23:18, 8 June 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
== How often is it needed to backup the Wallet? ==&lt;br /&gt;
&lt;br /&gt;
Is it necessary to make a backup after each transaction? This page is not clear about this.&lt;br /&gt;
Please add this information to the page!&lt;br /&gt;
&lt;br /&gt;
== Creating a New Wallet ==&lt;br /&gt;
&lt;br /&gt;
This section isn&#039;t helpful; it tells you when to create a new wallet, but not how.  I&#039;m a new user, and the wallet was created when I installed the BitCoin program.  I will find out how to create a new wallet, and then edit this section so that it actually explains the task that it sets out to explain. :-) [[User:ErgoOne|ErgoOne]] 15:19, 9 June 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
== Making a secure workspace ==&lt;br /&gt;
&lt;br /&gt;
For me space needed in ~/Library/Application Support/Bitcoin (Mac) is more than 400MB (!) after having loaded all blocks from bitcoin app. So 100MB is much too small (may be sufficient for just wallet.dat, but then the steps to do had to be changed). [[User:Hartrock|Hartrock]] 18:48, 12 June 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
I updated the wiki steps to just backup wallet.dat --[[User:ChocoboLee|ChocoboLee]] 19:18, 15 June 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
== Flaws with argument regarding encryption ==&lt;br /&gt;
&lt;br /&gt;
Can someone please explain to me how encrypting your wallet will actually protect against a trojan stealing it.  Because once you mount the encrypted file, and decrypt it not only can bitcoin see it but the trojan can as well.  This strategy seems to work only in the following circumstances:&lt;br /&gt;
1. The wallet that has the majority of your cash you never decrypt when you have an open internet connection.&lt;br /&gt;
2. Assumes that a trojan only operates when an internet connection is present and it can transmit the wallet data file.&lt;br /&gt;
&lt;br /&gt;
Even if you were paranoid and never were connected to the internet when the wallet file with the bulk of your funds was decrypted this still would not solve the problem.  In the event that a trojan seeks to copy your wallet file to another location on your computer it could wait for an open internet connection to transmit this data.  So even if you reencrypt the wallet file before connecting to the internet this type of trojan has already made a copy of the decrypted file and can transmit it as soon as an internet connection becomes available.&lt;br /&gt;
&lt;br /&gt;
Also how in the world could you ever use this wallet to transfer cash to another user if you are offline?  Maybe I don&#039;t understand how bitcoin works but don&#039;t you need to be online in order to transfer bitcoins?  Basically the bottom line is that bitcoin cannot read an encrypted wallet file which means that in order to use the wallet you need to decrypt it which means its vulnerable to trojans who can steal it the moment you want to use it.&lt;br /&gt;
&lt;br /&gt;
This seems to be a fundamental flaw in this discussion &amp;quot;securing your wallet&amp;quot;  Why doesn&#039;t bitcoin just address this in the software allowing for the wallet to always be encrypted and require a password upon startup.  If you want bitcoin to go mainstream I don&#039;t understand why you can&#039;t address this fundamental flaw that would be solved by an always encrypted wallet file that the software can read and write to.&lt;br /&gt;
&lt;br /&gt;
::The fundamental flaw is trying to secure the wallet when the whole system is already technically compromised. It does not help to have a secure wallet then. What a trojan could do is, for example, to replace the bitcoin client by a sligthly changed one that usually works as expected, but once in a while sends the money to an address which is owned by the attacker. The people you think you pay will become angry because the money you think to send never does arrive at them. Of course, the malicious client can be intelligent enough to wait until the is some real amount of coins in the play. One day you&#039;ll think you bought a car but the money is somewhere else. The same applies, for example, if the payment addresses you receive are modified by some malicious e-mail program.&lt;br /&gt;
&lt;br /&gt;
::So what is the bottom line? Encrypting the wallet helps against a roommate stealing your coins if he has two minutes of physical access to your computer. It helps against burglary and forgetting the laptop in the train. It generally does NOT help against compromise of the system. The &#039;&#039;&#039;whole&#039;&#039;&#039; system &#039;&#039;&#039;must&#039;&#039;&#039; be kept safe, not just the data in the wallet. And this is not something that the bitcoin software is responsible for. It is the responsibility of the user to install and maintain a secure system. It is a fundamental fallacy to expect that a certain piece of software should still work as the user expects if the whole system is not any more under the control of the user. In this sense, bitcoin can not go mainstream. Instead, main stream users need to reach some point of mental sanity. --[[User:Joise|Joise]] 09:14, 14 August 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
====Added a new entry to backup methods====&lt;br /&gt;
[[WalletPaperbackup]] Is a great way to get your wallet out of the digital world and onto paper&lt;br /&gt;
--[[User:Jrwr|Jrwr]] 02:02, 24 June 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
== Unsecure suggestion for passwords ==&lt;br /&gt;
&lt;br /&gt;
Especially with Bitcoins the Password advice from Gibson Research is dangerous because passwords must&lt;br /&gt;
also be safe in the future when it comes to wallet storing.&lt;br /&gt;
This is definitely not given with this system. It might be true, that&lt;br /&gt;
with today&#039;s brute-force tools, the &amp;quot;d0g...........&amp;quot; pw is safer than&lt;br /&gt;
hkjhHZ756s=&amp;amp;g%7 but in the very near future (maybe already exists)&lt;br /&gt;
there will be new tools, that will find out, what kind of simplifiers&lt;br /&gt;
are often used by humans and will combine brutforce with simplifiers&lt;br /&gt;
and thus come to &amp;quot;d0g............&amp;quot; very quickly!&lt;br /&gt;
&lt;br /&gt;
== Section 4.2 ==&lt;br /&gt;
If you recommend  that one backup wallet.dat on a mac via creating an encrypted image file, don&#039;t you think you should also remind the user to backup his ~/Library/Keychains directory? There is little point in backing up wallet.dmg on Wuala or whatever if you lose your AES key to the image, and the scenario when you need to recover wallet.dmg is probably the scenario where you&#039;ve also lost ~/Library/Keychains... e.g. laptop stolent, etc.&lt;br /&gt;
&lt;br /&gt;
== Back-Translation of German Version ==&lt;br /&gt;
&lt;br /&gt;
Hi,&lt;br /&gt;
&lt;br /&gt;
I have translated the page to the German Version, expanded it by several points and concepts  which seem important to me - namely, a disticion between data confidentality, system integrity and the notion of technical compromise, and adapted the ordering according to these concepts. Here is the back-translated version as a suggestion what could be expanded. I&#039;ve translated it quickly using Google Translate, that means wording and style can&#039;t be expected to be perfect. Nevertheless, I hope it&#039;s helpful. --[[User:Joise|Joise]] 09:14, 14 August 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Introduction ===&lt;br /&gt;
The security of the wallet can be divided into two separate objectives:&lt;br /&gt;
&lt;br /&gt;
1. Safeguard against loss&lt;br /&gt;
&lt;br /&gt;
2. Secure against theft&lt;br /&gt;
&lt;br /&gt;
In the case of a currently not adequately secured wallet (eg with a weak password uploaded on the Internet):&lt;br /&gt;
&lt;br /&gt;
3. New, create a mew secure wallet (with a reasonably long password)&lt;br /&gt;
&lt;br /&gt;
=== Technical background ===&lt;br /&gt;
The important first objective of the design of the wallet is protection against data loss. The personal bitcoin wallet has a pool of queued keys stored in a file named wallet.dat. The default number is 100 keys in the [[Key Pool | Key pool.]] The number of can be adjusted with the &amp;quot;-keypool&amp;quot; parameter in the command line. If for some reason you need a new address, it is not generated on the fly, but taken from the pool. A new key is then created to fill the pool back to 100 keys. If a backup is first created, it contains all used keys plus 100 unused ones. After a transaction, 99 unused keys remain. After 100 operations which require a new key, new keys are used, which are not present in the backup. Because the backup does not have these new keys, this backup can possibly lead to a recovery loss of Bitcoins if the wallet file is destroyed, for example by a head crash.&lt;br /&gt;
&lt;br /&gt;
The safety of deposits in Bitcoin depends on three conditions:&lt;br /&gt;
# The &#039;&#039;&#039;confidentiality (secrecy)&#039;&#039;&#039; of the private key for the entire time from initial production to final use&lt;br /&gt;
# The &#039;&#039;&#039;integrity&#039;&#039;&#039; of the software on the system used.&lt;br /&gt;
# As well as the &#039;&#039;&#039;protection from loss of wallet&#039;&#039;&#039; eg by failure of the hard disk&lt;br /&gt;
&lt;br /&gt;
The bitcoin software assumes (for very good reasons) that integrity and confidentality of the computer and user account is intact. The reason for this is that, strictly spoken, securing the computer is not the business of some application software like bitcoin. A computer which has not &#039;&#039;&#039;both&#039;&#039;&#039; its confidentiality &#039;&#039;&#039;and&#039;&#039;&#039; integrity ensured, is &#039;&#039;&#039;compromised&#039;&#039;&#039;. This means, that it can not longer be excluded that Bitcoins are stolen. A computer on which &#039;&#039;&#039;malware&#039;&#039;&#039; in the form of some trojan is installed or which runs any virus, is always compromised. All data - including the bitcoin wallet - could be &amp;quot;stolen&amp;quot;. On the other hand - and this is far more far-reaching and important  - the other software on the computer is absolutely no longer under control of the user. A compromised system can &#039;&#039;&#039;only&#039;&#039;&#039; be brought back to a safe condition if it is completely erased, fully installed with a fresh operating system and all new security updates are applied. A &amp;quot;disinfection&amp;quot; of virus-infected programs is not enough! Erasing the old, compromised system can also mean it is necessary to flash the BIOS and do a BIOS update - there is some malware which modifies the BIOS.&lt;br /&gt;
&lt;br /&gt;
A password that belongs to a data backup must be permanently protected from loss just like the files themselves, otherwise in case of doubt the backup is worthless.&lt;br /&gt;
&lt;br /&gt;
=== Securing the confidentiality and integrity of the Wallet and Software ===&lt;br /&gt;
&lt;br /&gt;
==== Creating a New Wallet ====&lt;br /&gt;
&lt;br /&gt;
In the event that the wallet was possibly or actually stored in a compromised state, or spreaded, it is wise to create a new wallet and to transfer all money amounts in the old wallet to the new. Once this is done, someone who has attained knowledge of the old private keys, can not longer use them to steal bitcoins. Keep in mind that leaked keys can be used much later from their generation. For example, if you generate some keys to day, transfer them to a new computer in three years, and throw the old computer in ten years to the trash, and it still contains keys that you have created today, these could still be used to access bitcoins that you received in the meantime.&lt;br /&gt;
&lt;br /&gt;
Creating a new wallet can be useful, for example, if someone has saved a wallet with a password of 12 characters for a service online. Meanwhile, passwords with 12 up to about 15 characters are decoded and the private keys are no longer safe. The strategy only to re-encrypt the wallet is not enough, because the keys are not safe.&lt;br /&gt;
&lt;br /&gt;
==== Creating a safe and secure work space ====&lt;br /&gt;
&lt;br /&gt;
Large and complex programs like Web browsers are never completely safe. Therefore, it is extremely useful, not to run the Bitcoin client program with the user identity that you use to surf the Web or read e-mails. The modern operating systems can isolate applications for different user IDs from each other quite effectively, and this is a huge advantage to security.&lt;br /&gt;
&lt;br /&gt;
===== Digression: Secure Passwords =====&lt;br /&gt;
&lt;br /&gt;
====== Passwords ======&lt;br /&gt;
A proven method for producing safe, but still learnable passwords goes as follows:&lt;br /&gt;
&lt;br /&gt;
* Make up a nonsense phrase like&lt;br /&gt;
 &amp;quot;Thirty crows fly backwards to the moon, but they do not have a ticket.&amp;quot;&lt;br /&gt;
The more bizarre the sentence, the better you remember it.&lt;br /&gt;
&lt;br /&gt;
* The first letters and numbers are used for the password:&lt;br /&gt;
 30CfbwttM,btdnhaT&lt;br /&gt;
&lt;br /&gt;
* Now we get creative and replace a few characters, eg &amp;quot;A&amp;quot; looks like but like &amp;quot;4&amp;quot;:&lt;br /&gt;
 30Cfbw2tM,b|dnh@T&lt;br /&gt;
&lt;br /&gt;
* Now insert one or a few signs that are not found on English keyboards [https://en.bitcoin.it/wiki/Microsoft_Windows_Unicode_Input (Tips)]:&lt;br /&gt;
 3ß0Cþfböw2tM,b|dnh@฿T&lt;br /&gt;
&lt;br /&gt;
Strong passwords are now, where huge computing resources like hashed databases and botnets are available for cracking, about 15 to 20 characters long. Few people can remember so long passwords  error-free, especially if they make some longer holiday. Therefore, write to the password and put it in his wallet. (That&#039;s still heretical but I have a good Reference - [http://en.wikipedia.org/wiki/Bruce_Schneier Bruce Schneier] [http://www.schneier.com/blog/archives/2005/06/write_down_your.html])&lt;br /&gt;
&lt;br /&gt;
* To protect against unauthorized use of the written down password one should append some characters that you really have in your head.&lt;br /&gt;
&lt;br /&gt;
Now it is so that a forgotten password is at least as bad as a cracked. A button labeled &amp;quot;Forgot your password, sent new by e-mail&amp;quot; does not exist in Bitcoin. &#039;&#039;&#039;So the consequence of &amp;quot;Password away&amp;quot; is inevitable &amp;quot;money away &amp;quot;&#039;&#039;&#039;. Don&#039;t forget that!&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;The written-down password&#039;&#039;&#039; should be preserved in something like a bank deposit box (can be rented for a few bucks yearly) or in a fireproof safe. I you have USD 100,000 in BTC, you want to have a fireproof safe if your house has burned down. Believe me.&lt;br /&gt;
&lt;br /&gt;
====== Passphrases (password phrases) or mantras ======&lt;br /&gt;
&lt;br /&gt;
* An alternative to passwords which has at least the same strength against techniques like rainbow tables, &#039;&#039;&#039;but is in comparison  much easier to remember&#039;&#039;&#039; is the use of &#039;&#039;&#039;pass-phrases&#039;&#039;&#039; or a &amp;quot;mantra&amp;quot;. The required length depends on the use. Passphrases for online services may be safe enough with four common words. Secure passphrases for files (which can be rapidly tried off-line) should contain at least six unusual words and at least 35 characters in length. This [http://www.explainxkcd.com/2011/08/10/password-strength/ comic by XKCD] explains the principle.&lt;br /&gt;
&lt;br /&gt;
* An example sentence would be: &amp;quot;The Lemon flambé the okapi a phosphorescent absolution.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Much of the strength of this method relies on technical reasons: Once a password has reached a certain minimal complexity, the fastest way to crack the password is a brute-force search with rainbow tables and charts. And since for this methods, the length of the password is the decisive factor, long pass phrases, which are comparatively much better to remember, win over short very complex passwords (which are hard to remember but easier to crack).&lt;br /&gt;
&lt;br /&gt;
* In-depth information on passphrases here: [http://www.iusmentis.com/security/passphrasefaq/ passphrase FAQ] by Randall T. Williams.&lt;br /&gt;
&lt;br /&gt;
* Warning: Completely unsuitable are fixed expressions and popular idioms. Don&#039;t use any meaningful sentence and anything that might be published on the web.&lt;br /&gt;
&lt;br /&gt;
===== Special Linux distributions =====&lt;br /&gt;
&lt;br /&gt;
To  secure a Windows system comprehensively is a complex and difficult task. Securing which is appropriate for the administration of five-figure amounts requires knowledge which the average user does not have.&lt;br /&gt;
&lt;br /&gt;
As an alternative, there are some special Linux distributions. Using them, one can create a secure space specially for Bitcoin,  and they require almost no setup:&lt;br /&gt;
&lt;br /&gt;
* [http://www.heise.de/ct/projekte/Sicheres-Online-Banking-mit-Bankix-284099.html c&#039;t Bankix], a distribution for online banking, is a adapted and, of course, free version of Ubuntu that was created by the renowned German Heise magazine publisher. Following to the (important) first update the system will be put on a read-only medium and cannot longer be manipulated by unauthorized changes to the software.&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Damn_Small_Linux Damn Small Linux] is a popular, small Debian-based Linux, which contains only the most important functions and thus provides less attack surface. The derivation from Debian guarantees speedy and thorough security updates.&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Knoppix Knoppix] is a popular live-CD distribution with excellent hardware detection, which has a slightly larger footprint than Damn Small Linux, and a number of interesting features. For example, it offers support for blind and visually impaired persons.&lt;br /&gt;
* [http://forum.bitcoin.org/index.php?topic=7374 LinuxCoin], many additional functions for mining&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following distributions are suitable only for users with good knowledge. However, their excellent safety features makes them quite interesting starting points for Bitcoin Appliances:&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Tin_Hat_Linux Tin Hat Linux] is a [http://en.wikipedia.org/wiki/Hardened_Gentoo Hardened Gentoo] derivative. In addition to a very small size and a very comprehensive encryption it has interesting additional security features, such as [http://en.wikipedia.org/wiki/Grsecurity Grsecurity].&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Alpine_Linux Alpine Linux] uses, similar to Tin Hat Linux etc. Kernel functions with Stack Smashing Protection. It uses instead of the standard glibc the uClibc, which means that the Bitcoin client needs to be compiled specifically for this distribution.&lt;br /&gt;
&lt;br /&gt;
===== Linux =====&lt;br /&gt;
====== Protected user account ======&lt;br /&gt;
&lt;br /&gt;
The first step is [https://help.ubuntu.com/8.04/serverguide/C/user-management.html to create a new user], which goes with the command:&lt;br /&gt;
&lt;br /&gt;
sudo adduser &amp;lt;code&amp;gt; new_user_name &amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On the message &amp;quot;Enter a new value or press ENTER for the default&amp;quot; one needs only to press the Return key.&lt;br /&gt;
&lt;br /&gt;
Then do you register as a new user, eg &amp;quot;Switch User&amp;quot; with (at Ubuntu in the menu to log off). If you are logged in, we search for the file manager, select this from the home directory (with the house icon), then right-click &amp;quot;Properties&amp;quot;, then the access permissions. Here you select &amp;quot;Other&amp;quot; and set the permissions to &amp;quot;nobody&amp;quot;. With this step, other programs can not read the other user&#039;s wallet.&lt;br /&gt;
&lt;br /&gt;
The newly created user should be safe to use in order to keep him safe, exclusively for Bitcoin.&lt;br /&gt;
&lt;br /&gt;
There is also a good idea to encrypt this user&#039;s home directory with the package ecryptfs-utils.&lt;br /&gt;
&lt;br /&gt;
# If the home directory is not empty, first backup it to some other medium.&lt;br /&gt;
# Now install ecryptfs-utils (Ubuntu: sudo apt-get install ecryptfs-utils)&lt;br /&gt;
# From X11 (graphical system) log and log in with Ctrl + Alt + F1 in the Linux console - if you are logged in X11, the home directory is encrypted.&lt;br /&gt;
# The current directory change so that it is not in the home folder, eg &amp;quot;Cd /&amp;quot;.&lt;br /&gt;
# The migration tool to run: (in Ubuntu: sudo ecryptfs-migrate-home-u username)&lt;br /&gt;
# If it succeeds then you can press ALT + F8 to go back and log in X11.&lt;br /&gt;
# Run the command &#039;ecryptfs-unwrap-passphrase&#039;. Without exception &#039;&#039;&#039;write and store the code that you receive on a secure medium&#039;&#039;. &#039;&#039;&#039;Without this code no data - including the wallet  - can be accessed if the system does not work&#039;&#039;&#039;&lt;br /&gt;
# Run the command &#039;ecryptfs-setup-swap&#039; run, which encrypts the swap partition. Otherwise, keys in your purse in plain text can go to the the swap partition where they might be stolen. This unfortunately also means that &amp;quot;idle&amp;quot; or Hibernate can not be used anymore because the bootloader can not restore the dump. An more conventient alternative is to overwrite the swap partition when you shut down the machine (after the deactivation of virtual memory) with random data.&lt;br /&gt;
&lt;br /&gt;
(Instructions from [http://bodhizazen.net/Tutorials/Ecryptfs/ # Migrate])&lt;br /&gt;
&lt;br /&gt;
====== For more information ======&lt;br /&gt;
* [https://help.ubuntu.com/community/Security Security features on ubuntu]&lt;br /&gt;
&lt;br /&gt;
* [http://www.techrepublic.com/blog/10things/10-ways-to-secure-your-linux-desktop/359 10 ways to secure your lInux desktop]&lt;br /&gt;
&lt;br /&gt;
===== Windows =====&lt;br /&gt;
&lt;br /&gt;
* [http://windows.microsoft.com/de-DE/windows7/help/security-privacy-user-accounts Basics]&lt;br /&gt;
&lt;br /&gt;
* Create an extra user, under which only the Bitcoin software is running. So the wallet is somewhat protected from malicious code in applications for other users:&lt;br /&gt;
** [http://support.microsoft.com/kb/905056/en Windows XP]&lt;br /&gt;
** [http://windows.microsoft.com/en-US/windows7/Create-a-user-account Windows 7]&lt;br /&gt;
&lt;br /&gt;
====Browser Security ====&lt;br /&gt;
&lt;br /&gt;
===== Firefox =====&lt;br /&gt;
To secure the browser, you start Firefox, go to menu &amp;quot;Edit&amp;quot; (edit), and select &amp;quot;Preferences&amp;quot; (Settings).&lt;br /&gt;
&lt;br /&gt;
* Now you start with the tabs on the left, select the &amp;quot;Startup&amp;quot; option &amp;quot;Show a blank page&amp;quot; (Clean Slate).&lt;br /&gt;
* By &amp;quot;content&amp;quot; (content)&lt;br /&gt;
** The option &amp;quot;Load images automatically / Load images automatically&amp;quot; opt out,&lt;br /&gt;
** Also &amp;quot;Enable Javascript Enable / javascript&amp;quot; opt out.&lt;br /&gt;
* In the tab &amp;quot;privacy / data protection&amp;quot; in the &amp;quot;History / History History,&amp;quot; select &amp;quot;Never remember history&amp;quot; / &amp;quot;do not save history&amp;quot;.&lt;br /&gt;
* In the tab &amp;quot;Security&amp;quot; in the &amp;quot;Passwords&amp;quot;&lt;br /&gt;
** The &amp;quot;remember passwords / passwords save&amp;quot; deselect&lt;br /&gt;
** Also &amp;quot;use a master password&amp;quot; / &amp;quot;master password&amp;quot;.&lt;br /&gt;
* Finally, in the tab &amp;quot;Advanced&amp;quot; / &amp;quot;Advanced&amp;quot; option&lt;br /&gt;
** &amp;quot;Automatically check for updates&amp;quot; deselect&lt;br /&gt;
** As &amp;quot;add-ons&amp;quot; and&lt;br /&gt;
** &amp;quot;Search engines&amp;quot; / &amp;quot;search engines&amp;quot; opt out.&lt;br /&gt;
&lt;br /&gt;
If Javascript is disabled, the page linux download page] to download new versions of the Bitcoin Clients will no longer automatically download, so you have to link to the &amp;quot;direct link&amp;quot; on notice &amp;quot;Problems with the download? Please use this &#039;direct link&#039; or try another mirror.&amp;quot; . click Once you make the effort made, of course you checked the download of new clients Bitcoin the checksums, which are indicated on the sourceforge page, with the program sha1.&lt;br /&gt;
&lt;br /&gt;
=== Protect against data loss: Backup ===&lt;br /&gt;
Secure the only file you need is the wallet.dat. Advance to make sure that Bitcoin not running anymore! The best way would be to encrypt the file and store somewhere safe.&lt;br /&gt;
&lt;br /&gt;
You can also [[API | backupwallet]] JSON-RPC command used to create a backup on the fly.&lt;br /&gt;
&lt;br /&gt;
==== Where to find the Bitcoin folder ====&lt;br /&gt;
The [[Bitcoin folder]] is the folder where the data is wallet.dat along with the file.&lt;br /&gt;
&lt;br /&gt;
===== Windows =====&lt;br /&gt;
Click on &amp;quot;Start&amp;quot;, then Run and enter this:&lt;br /&gt;
:% APPDATA% \ Bitcoin&lt;br /&gt;
A folder should open now, for most it would be:&lt;br /&gt;
 C: \ Documents and Settings \ username \ Application Data \ Bitcoin (XP)&lt;br /&gt;
 C: \ Users \ username \ appdata \ roaming \ Bitcoin (Vista and 7)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!---&lt;br /&gt;
&lt;br /&gt;
===== Windows =====&lt;br /&gt;
&lt;br /&gt;
If you are using Windows XP or Windows 7, you can keep your wallet on an encrypted disk image created by third-party software, such as [http://www.truecrypt.org/ TrueCrypt] (open source) or [http: / / www.jetico.com/encryption-bestcrypt/ Jetico BestCrypt] (commercial). You can probably do the same with Windows Vista or Windows 2000.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE:&#039;&#039;&#039; You should configure Bitcoin in this manner only on computers where you use Bitcoin, but not do use that computer to mine. For example, this is a good configuration for a notebook or tablet computer.&lt;br /&gt;
&lt;br /&gt;
Assuming that you have installed the Windows client Bitcoin and run it at least once, the process is Described below.&lt;br /&gt;
&lt;br /&gt;
To mount the &amp;lt;p&amp;gt; Bitcoin DataDirectory on an encrypted drive &amp;lt;/ b&amp;gt; &amp;lt;/ p&amp;gt;&lt;br /&gt;
&amp;lt;ol start=1 type=1&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; use the third-party disk image encryption program of your choice to create and mount an encrypted disk image of at least 100 MB in size. &amp;lt;/ li&amp;gt;&lt;br /&gt;
Locate the &amp;lt;li&amp;gt; Bitcoin data directory, and copy the directory with all contents to the encrypted drive.&lt;br /&gt;
&amp;lt;p&amp;gt; For help finding this directory, see &amp;lt;b&amp;gt; [[# Securing_your_wallet Locating_BitCoin_s_data_directory | Locating Bitcoin&#039;s data directory]] &amp;lt;/ b&amp;gt; &amp;lt;/ p&amp;gt; &amp;lt;/ li&amp;gt;.&lt;br /&gt;
Create a Windows shortcut &amp;lt;li&amp;gt; that starts with the Bitcoin &amp;lt;code&amp;gt;-datadir &amp;lt;/ code&amp;gt; parameter specifier and the encrypted drive and directory.&lt;br /&gt;
&amp;lt;p&amp;gt; For example, if you Bitcoin installed in the default directory, mounted encrypted drive as your Bitcoin &amp;lt;code&amp;gt; E: \ &amp;lt;/ code&amp;gt;, and stored it on your Bitcoin DataDirectory as &amp;lt;code&amp;gt; Bitcoin &amp;lt;/ code&amp;gt;, you would type the following command as the shortcut target: &amp;lt;/ p&amp;gt;&lt;br /&gt;
blockquote &amp;lt;code&amp;gt; C: \ Program Files \ Bitcoin \ bitcoin.exe-datadir = E: \ Bitcoin &amp;lt;/ code&amp;gt; &amp;lt;/ blockquote&amp;gt; &amp;lt;/ li&amp;gt;&lt;br /&gt;
Open &amp;lt;li&amp;gt; Bitcoin&#039;s settings and configure it &amp;lt;b&amp;gt; NOT &amp;lt;/ b&amp;gt; to start automatically when you start Windows.&lt;br /&gt;
This is to allow &amp;lt;p&amp;gt; you to mount the encrypted disk image Bitcoin before starting Bitcoin. &amp;lt;/ p&amp;gt; &amp;lt;/ li&amp;gt;&lt;br /&gt;
Shut down &amp;lt;li&amp;gt; Bitcoin, and then restart it from the new shortcut. &amp;lt;/ li&amp;gt;&lt;br /&gt;
&amp;lt;/ Ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
After doing this, any time you want to use Bitcoin, you must first mount the encrypted disk image Bitcoin using the same drive designation, and then run from the shortcut that you Bitcoin created so that it can find its data and your wallet. :-)&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== Linux =====&lt;br /&gt;
Bitcoin should create a hidden folder in your home directory of the running user.&lt;br /&gt;
 ~ /. Bitcoin /&lt;br /&gt;
&lt;br /&gt;
It should not be there, it can be possibly due&lt;br /&gt;
Find /-name wallet.dat-print 2&amp;gt; / dev / null&lt;br /&gt;
. find Or as root&lt;br /&gt;
: Updatedb&lt;br /&gt;
followed by&lt;br /&gt;
: Locate wallet.dat&lt;br /&gt;
&lt;br /&gt;
The handiest backup method under Linux is probably the copy on one or more wallet.dat used for USB flash drives or memory cards that are kept in a safe place (fireproof safe, bank safe, aquarium with piranhas, etc).&lt;br /&gt;
&lt;br /&gt;
====== Individual encryption of the wallet.dat file ======&lt;br /&gt;
* For individual encryption of the purse, the available cross-platform program&#039;&#039;&#039;[http://ccrypt.sourceforge.net/ ccrypt]&#039;&#039;&#039; is well suited. It encodes a variant of the AES Rijndael algorithm. a recognized standard, which is considered very safe. The plain-text version of Wallet.dat will be replaced automatically. As with all strong encryption, a careful backup of data and keys is essential - under Linux, the risk of loss due to forgetting the key is much higher than by computer intrusions and malware.&lt;br /&gt;
&lt;br /&gt;
* For automatic storage of encrypted copies GnuPG  (Gnu Privacy Guard) is well suited. To encrypt data, ones need  only the public key.  Only to decrypt a backup, the private key is used, which can be stored otherwise in a safe place. Using a fixed pair of keys reduces also the risk of loss of a key by unnoticed typos when typing them.&lt;br /&gt;
&lt;br /&gt;
* Additional protection against attacks by key loggers provide smart cards and hardware tokens like the [http://www.privacyfoundation.de/crypto_stick/ Crypto Stick] the Deutsch Privacy Foundation or the  GnuPG Fellowship smart card. The special advantage is that you GnuPG keys that are very safe due to their length, and can be stored on the smart card. A six-digit PIN code protects the contents of the smart card. If it is entered incorrectly multiple times, then the content will be deleted. [https://www.privacyfoundation.de/wiki/CryptoStickSoftware instructions here].&lt;br /&gt;
&lt;br /&gt;
* Together with the FUSE-based file system [http://de.wikipedia.org/wiki/EncFS EncFS] can you also back up individual files as wallet.dat individually. The entire list can Bitcoin but are not used because the database is encrypted with EncFS.&lt;br /&gt;
&lt;br /&gt;
===== Mac ===== &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Note: The following instruction are not checked due to lack of hardware. Please check and correct if necessary, then remove the note!&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The directory containing the Bitcoin wallet.dat is usually here:&lt;br /&gt;
 ~ / Library / Application Support / Bitcoin /&lt;br /&gt;
&lt;br /&gt;
====== Secure all data (500 megabytes) ======&lt;br /&gt;
These steps (chain wallet and block) of all data stored on Bitcoin an encrypted disk image:&lt;br /&gt;
# Disk Utility Open&lt;br /&gt;
# Click on &amp;quot;New Image&amp;quot;, 500MB, 128-bit or 256-bit (faster or more secure) encryption specify eintelne partition.&lt;br /&gt;
# Copy in a place where you will not lose the image (eg Wuala, Strong Space ofer whatever)&lt;br /&gt;
# A strong and secure password select&lt;br /&gt;
# Copy everything from ~ / Library / Application Support / Bitcoin / in the image&lt;br /&gt;
# Create symlink to the old place, so the app can benuutzen it&lt;br /&gt;
::: Ln-s / Volumes / Bitcoin ~ / Library / Application Support / Bitcoin&lt;br /&gt;
&lt;br /&gt;
Do not forget to mount the image before using Bitcoin and unmount afterwards.&lt;br /&gt;
&lt;br /&gt;
====== Backup file wallet.dat purses alone (40MB ) ======&lt;br /&gt;
These steps only protect the file wallet.dat. This causes a small memory dump, but is more complicated.&lt;br /&gt;
&lt;br /&gt;
# Disk Utility Open&lt;br /&gt;
# Click on &amp;quot;New Image&amp;quot;, 40MB, 128-bit or 256-bit, single select partition.&lt;br /&gt;
# Store in a place where you will not lose the backup.&lt;br /&gt;
# A secure and strong password, select&lt;br /&gt;
# The file wallet.dat move in the image&lt;br /&gt;
# Create symlink to the old place, so the app can find and use the file&lt;br /&gt;
::: Ln-s / Volumes / Bitcoin / wallet.dat ~ / Library / Application Support / Bitcoin / wallet.dat&lt;br /&gt;
&lt;br /&gt;
[[File: MountWalletAndLauchnBitcoin_OSX_Automator.png | thumbnail | 150px | Mount Wallet and launch Bitcoin]]&lt;br /&gt;
Do not forget to mount the image before using Bitcoin and unmount afterwards.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note:&#039;&#039;&#039; If you start the application Bitcoin without the image is mounted, the program is the symlink (a kind of shortcut) wallet.dat with the new one. Do not panic! Rename the new order wallet.dat or delete it, mount the image, and just put a new symlink. The old wallet.dat may of course be canceled under any circumstances.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Automation:&#039;&#039;&#039; The program [http://en.wikipedia.org/wiki/Automator_% 29% 28software Automator] (included in OS X) can automatically mount your wallet and start Bitcoin App.&lt;br /&gt;
&lt;br /&gt;
Alternatively, the following shell script can be used to decrypt wallet.dat which automatically starts the Bitcoin client, and they subsequently re-encrypted. The script works for sowoghl for OSX and Linux: [http://lorelei.kaverit.org/bitcoin.sh Bitcoin-launch-script]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== General solution ====&lt;br /&gt;
wallet.dat is not usually encrypted, everyone who has access to the file, can freely dispose of the coins. You can encrypt your wallet.dat with one of these programs, should there be the slightest chance that someone else has access.&lt;br /&gt;
&lt;br /&gt;
Note: Encryption does not protect the wallet against security risk &#039;&#039;after&#039;&#039; they have occured. Encryping a wallet after finding a computer virus or a trojan helps absolutely nothing. Also, encryption does not help against the complete loss of control which a system compromise means.&lt;br /&gt;
&lt;br /&gt;
* [http://www.7-zip.org/ 7-Zip]&lt;br /&gt;
* [http://www.axantum.com/axcrypt/ AxCrypt]&lt;br /&gt;
* [http://www.truecrypt.org/ TrueCrypt]&lt;br /&gt;
* [http://www.rarlab.com/ WinRar]&lt;br /&gt;
* [http://de.wikipedia.org/wiki/EncFS EncFS] (Linux)&lt;br /&gt;
&lt;br /&gt;
==== Encryption with Smart Card ====&lt;br /&gt;
&lt;br /&gt;
Folders can be encrypted with GnuPG-compatible smart card. A very secure solution is to stick the Crypto Deutsch Privacy Foundation:&lt;br /&gt;
&lt;br /&gt;
[http://www.privacyfoundation.de/crypto_stick/ Crypto Stick overview]&lt;br /&gt;
&lt;br /&gt;
[https://www.privacyfoundation.de/wiki/CryptoStickSoftware Intallation and use]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Storing the Archives ====&lt;br /&gt;
A backup on Flash Media / Memory Sticks and storing them in secure locations is a reasonable solution.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== BOTG: Bitcoin Off The Grid===&lt;br /&gt;
* Another alternative that is suitable for high security requirements,is  &amp;quot;BOTG - Bitcoin off-the-grid&amp;quot; [http://forum.bitcoin.org/index.php?topic=7374.msg108351 see info in the announcement to LinuxCoin]. It is a script that  can create a key pair &#039;&#039;without&#039;&#039; Internet connection. As the private keys are created on a system that does not have Internet access, and are stored offline, they can not get lost via the Internet. The public key can be passed on and received as normal transactions that can be looked up in block Explorer. Only if you want to use the fund, you must import the private key into a Bitcoin client. From then on, the normal safety precautions apply.&lt;br /&gt;
&lt;br /&gt;
=Securing your wallet on Ubuntu and/or Suse=&lt;br /&gt;
For users that use a Linux system that comes with AppArmor, it is probably possible to use&lt;br /&gt;
the MinorFs system with a procedure not unlike that described here for secure ssh without a passphrase:&lt;br /&gt;
&lt;br /&gt;
http://minorfs.polacanthus.net/wiki/Ssh_private_keys_without_passphrase&lt;br /&gt;
&lt;br /&gt;
Its a bit of a hack, but it would make it impossible for malware running under the same user id as&lt;br /&gt;
bitcoin to gain access to the wallet. &lt;br /&gt;
&lt;br /&gt;
It may be worth it if someone would describe the correct procedure to secure the bitcoin wallet using MinorFs/AppArmor in a way similar to described in the above link for ssh keys without passphrases.&lt;br /&gt;
&lt;br /&gt;
= ‘Shred’ cannot always be assumed to be secure on modern filesystems! =&lt;br /&gt;
&lt;br /&gt;
I don&#039;t feel entirely comfortable with the suggested usage of the ‘shred’ command in the given Linux script.  My understanding (and according to shred&#039;s manpage) is that on modern (especially journaled) filesystems, there is &#039;&#039;no&#039;&#039; guarantee that when an application like shred asks the OS to overwrite a file, that the file will actually be physically overwritten in place on the disk.  Unless there have been features implemented to allow special handling by the kernel for such security applications (I haven&#039;t investigated, so maybe there are, or maybe not), it would probably be safer to disable all system swap (i.e., with ‘swapoff’) and then store the unencrypted data on a temporary RAM disk only, then unmount the RAM disk afterwards to ensure it never gets written to disk.  I&#039;ve done this before, though unfortunately it&#039;s a bit of a hassle and normally requires running commands that need root privileges or sudo, etc.  Comments?&lt;br /&gt;
~ [[User:Ijel|Ijel]] 03:49, 11 February 2012 (GMT)&lt;/div&gt;</summary>
		<author><name>Ijel</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Talk:Securing_your_wallet&amp;diff=23691</id>
		<title>Talk:Securing your wallet</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Talk:Securing_your_wallet&amp;diff=23691"/>
		<updated>2012-02-11T03:52:58Z</updated>

		<summary type="html">&lt;p&gt;Ijel: /* Protected user account */ Fix incorrect end tag that was messing up formatting up rest of page ;-)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The article is too huge. The Mac solution does not scale; the suggested sizes are too low and the maximum size is infinite. [[User:X|X]] 17:10, 8 January 2012 (GMT)&lt;br /&gt;
&lt;br /&gt;
This article needs a rewrite following the introduction of the Bitcoin.org client&#039;s ability to passphrase protect the keys in the wallet.  Perhaps some sections also -- something like &amp;quot;typical consumer use&amp;quot; (where the client&#039;s encryption is adequate) and &amp;quot;commercial-grade protection&amp;quot; where the topics such as encryption at the filesystem is addressed. - [[User:Sgornick|Sgornick]] 10:24, 28 December 2011 (GMT) &lt;br /&gt;
&lt;br /&gt;
The five paragraphs in Technical Background all say the same thing. --[[User:Mcandre|Mcandre]]&lt;br /&gt;
&lt;br /&gt;
Note: the backupwallet.sh script in the linux section doesn&#039;t actually work.&lt;br /&gt;
I suspect it is caused by the wiki changing the formatting.&lt;br /&gt;
I wrote my own version that uses much more standard shell syntax.&lt;br /&gt;
&lt;br /&gt;
[[User:Wscott|Wscott]] 11:28, 11 February 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
I fixed the backupwallet.sh script. It just needed a nowiki tag around a conditional statement. -- [[User:Mweather|Mweather]] 23:48, 20 May 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
The approach for &amp;quot;Making a secure workspace&amp;quot; seems to differ greatly for linux and mac. Why? It seems like if you are going to make firefox secure, which is basically all the linux section recommends, you would want to do that on a mac too. And the recommendation in the mac section to keep the wallet in an encrypted volume with a symlink in the expected system location should be done on a linux box too, shouldn&#039;t it, like using truecrypt or something... Am I wrong??? Can someone with advanced knowledge please advise...? Also, if you want bitcoin to run all the time in the background on linux, but you have it set up in a separate user from your main user account, well, you are out of luck? Can justifications and explanations be added to the recommendations, and also I guess some alternatives with pros and cons be offered, for people with different needs and computing situations. Thanks! --[[User:GusGustavo|GusGustavo]] 13:33, 26 May 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
== Time Sensitivity ==&lt;br /&gt;
&lt;br /&gt;
Is it possible to still send money to my wallet, even if it&#039;s backed up and offline?  Do bitcoins ever expire if they&#039;re not spent, or is there anything bad that can happen by not using my bitcoin client in a long time? [[User:Daniel.benoy|Daniel.benoy]] 23:18, 8 June 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
== How often is it needed to backup the Wallet? ==&lt;br /&gt;
&lt;br /&gt;
Is it necessary to make a backup after each transaction? This page is not clear about this.&lt;br /&gt;
Please add this information to the page!&lt;br /&gt;
&lt;br /&gt;
== Creating a New Wallet ==&lt;br /&gt;
&lt;br /&gt;
This section isn&#039;t helpful; it tells you when to create a new wallet, but not how.  I&#039;m a new user, and the wallet was created when I installed the BitCoin program.  I will find out how to create a new wallet, and then edit this section so that it actually explains the task that it sets out to explain. :-) [[User:ErgoOne|ErgoOne]] 15:19, 9 June 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
== Making a secure workspace ==&lt;br /&gt;
&lt;br /&gt;
For me space needed in ~/Library/Application Support/Bitcoin (Mac) is more than 400MB (!) after having loaded all blocks from bitcoin app. So 100MB is much too small (may be sufficient for just wallet.dat, but then the steps to do had to be changed). [[User:Hartrock|Hartrock]] 18:48, 12 June 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
I updated the wiki steps to just backup wallet.dat --[[User:ChocoboLee|ChocoboLee]] 19:18, 15 June 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
== Flaws with argument regarding encryption ==&lt;br /&gt;
&lt;br /&gt;
Can someone please explain to me how encrypting your wallet will actually protect against a trojan stealing it.  Because once you mount the encrypted file, and decrypt it not only can bitcoin see it but the trojan can as well.  This strategy seems to work only in the following circumstances:&lt;br /&gt;
1. The wallet that has the majority of your cash you never decrypt when you have an open internet connection.&lt;br /&gt;
2. Assumes that a trojan only operates when an internet connection is present and it can transmit the wallet data file.&lt;br /&gt;
&lt;br /&gt;
Even if you were paranoid and never were connected to the internet when the wallet file with the bulk of your funds was decrypted this still would not solve the problem.  In the event that a trojan seeks to copy your wallet file to another location on your computer it could wait for an open internet connection to transmit this data.  So even if you reencrypt the wallet file before connecting to the internet this type of trojan has already made a copy of the decrypted file and can transmit it as soon as an internet connection becomes available.&lt;br /&gt;
&lt;br /&gt;
Also how in the world could you ever use this wallet to transfer cash to another user if you are offline?  Maybe I don&#039;t understand how bitcoin works but don&#039;t you need to be online in order to transfer bitcoins?  Basically the bottom line is that bitcoin cannot read an encrypted wallet file which means that in order to use the wallet you need to decrypt it which means its vulnerable to trojans who can steal it the moment you want to use it.&lt;br /&gt;
&lt;br /&gt;
This seems to be a fundamental flaw in this discussion &amp;quot;securing your wallet&amp;quot;  Why doesn&#039;t bitcoin just address this in the software allowing for the wallet to always be encrypted and require a password upon startup.  If you want bitcoin to go mainstream I don&#039;t understand why you can&#039;t address this fundamental flaw that would be solved by an always encrypted wallet file that the software can read and write to.&lt;br /&gt;
&lt;br /&gt;
::The fundamental flaw is trying to secure the wallet when the whole system is already technically compromised. It does not help to have a secure wallet then. What a trojan could do is, for example, to replace the bitcoin client by a sligthly changed one that usually works as expected, but once in a while sends the money to an address which is owned by the attacker. The people you think you pay will become angry because the money you think to send never does arrive at them. Of course, the malicious client can be intelligent enough to wait until the is some real amount of coins in the play. One day you&#039;ll think you bought a car but the money is somewhere else. The same applies, for example, if the payment addresses you receive are modified by some malicious e-mail program.&lt;br /&gt;
&lt;br /&gt;
::So what is the bottom line? Encrypting the wallet helps against a roommate stealing your coins if he has two minutes of physical access to your computer. It helps against burglary and forgetting the laptop in the train. It generally does NOT help against compromise of the system. The &#039;&#039;&#039;whole&#039;&#039;&#039; system &#039;&#039;&#039;must&#039;&#039;&#039; be kept safe, not just the data in the wallet. And this is not something that the bitcoin software is responsible for. It is the responsibility of the user to install and maintain a secure system. It is a fundamental fallacy to expect that a certain piece of software should still work as the user expects if the whole system is not any more under the control of the user. In this sense, bitcoin can not go mainstream. Instead, main stream users need to reach some point of mental sanity. --[[User:Joise|Joise]] 09:14, 14 August 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
====Added a new entry to backup methods====&lt;br /&gt;
[[WalletPaperbackup]] Is a great way to get your wallet out of the digital world and onto paper&lt;br /&gt;
--[[User:Jrwr|Jrwr]] 02:02, 24 June 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
== Unsecure suggestion for passwords ==&lt;br /&gt;
&lt;br /&gt;
Especially with Bitcoins the Password advice from Gibson Research is dangerous because passwords must&lt;br /&gt;
also be safe in the future when it comes to wallet storing.&lt;br /&gt;
This is definitely not given with this system. It might be true, that&lt;br /&gt;
with today&#039;s brute-force tools, the &amp;quot;d0g...........&amp;quot; pw is safer than&lt;br /&gt;
hkjhHZ756s=&amp;amp;g%7 but in the very near future (maybe already exists)&lt;br /&gt;
there will be new tools, that will find out, what kind of simplifiers&lt;br /&gt;
are often used by humans and will combine brutforce with simplifiers&lt;br /&gt;
and thus come to &amp;quot;d0g............&amp;quot; very quickly!&lt;br /&gt;
&lt;br /&gt;
== Section 4.2 ==&lt;br /&gt;
If you recommend  that one backup wallet.dat on a mac via creating an encrypted image file, don&#039;t you think you should also remind the user to backup his ~/Library/Keychains directory? There is little point in backing up wallet.dmg on Wuala or whatever if you lose your AES key to the image, and the scenario when you need to recover wallet.dmg is probably the scenario where you&#039;ve also lost ~/Library/Keychains... e.g. laptop stolent, etc.&lt;br /&gt;
&lt;br /&gt;
== Back-Translation of German Version ==&lt;br /&gt;
&lt;br /&gt;
Hi,&lt;br /&gt;
&lt;br /&gt;
I have translated the page to the German Version, expanded it by several points and concepts  which seem important to me - namely, a disticion between data confidentality, system integrity and the notion of technical compromise, and adapted the ordering according to these concepts. Here is the back-translated version as a suggestion what could be expanded. I&#039;ve translated it quickly using Google Translate, that means wording and style can&#039;t be expected to be perfect. Nevertheless, I hope it&#039;s helpful. --[[User:Joise|Joise]] 09:14, 14 August 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Introduction ===&lt;br /&gt;
The security of the wallet can be divided into two separate objectives:&lt;br /&gt;
&lt;br /&gt;
1. Safeguard against loss&lt;br /&gt;
&lt;br /&gt;
2. Secure against theft&lt;br /&gt;
&lt;br /&gt;
In the case of a currently not adequately secured wallet (eg with a weak password uploaded on the Internet):&lt;br /&gt;
&lt;br /&gt;
3. New, create a mew secure wallet (with a reasonably long password)&lt;br /&gt;
&lt;br /&gt;
=== Technical background ===&lt;br /&gt;
The important first objective of the design of the wallet is protection against data loss. The personal bitcoin wallet has a pool of queued keys stored in a file named wallet.dat. The default number is 100 keys in the [[Key Pool | Key pool.]] The number of can be adjusted with the &amp;quot;-keypool&amp;quot; parameter in the command line. If for some reason you need a new address, it is not generated on the fly, but taken from the pool. A new key is then created to fill the pool back to 100 keys. If a backup is first created, it contains all used keys plus 100 unused ones. After a transaction, 99 unused keys remain. After 100 operations which require a new key, new keys are used, which are not present in the backup. Because the backup does not have these new keys, this backup can possibly lead to a recovery loss of Bitcoins if the wallet file is destroyed, for example by a head crash.&lt;br /&gt;
&lt;br /&gt;
The safety of deposits in Bitcoin depends on three conditions:&lt;br /&gt;
# The &#039;&#039;&#039;confidentiality (secrecy)&#039;&#039;&#039; of the private key for the entire time from initial production to final use&lt;br /&gt;
# The &#039;&#039;&#039;integrity&#039;&#039;&#039; of the software on the system used.&lt;br /&gt;
# As well as the &#039;&#039;&#039;protection from loss of wallet&#039;&#039;&#039; eg by failure of the hard disk&lt;br /&gt;
&lt;br /&gt;
The bitcoin software assumes (for very good reasons) that integrity and confidentality of the computer and user account is intact. The reason for this is that, strictly spoken, securing the computer is not the business of some application software like bitcoin. A computer which has not &#039;&#039;&#039;both&#039;&#039;&#039; its confidentiality &#039;&#039;&#039;and&#039;&#039;&#039; integrity ensured, is &#039;&#039;&#039;compromised&#039;&#039;&#039;. This means, that it can not longer be excluded that Bitcoins are stolen. A computer on which &#039;&#039;&#039;malware&#039;&#039;&#039; in the form of some trojan is installed or which runs any virus, is always compromised. All data - including the bitcoin wallet - could be &amp;quot;stolen&amp;quot;. On the other hand - and this is far more far-reaching and important  - the other software on the computer is absolutely no longer under control of the user. A compromised system can &#039;&#039;&#039;only&#039;&#039;&#039; be brought back to a safe condition if it is completely erased, fully installed with a fresh operating system and all new security updates are applied. A &amp;quot;disinfection&amp;quot; of virus-infected programs is not enough! Erasing the old, compromised system can also mean it is necessary to flash the BIOS and do a BIOS update - there is some malware which modifies the BIOS.&lt;br /&gt;
&lt;br /&gt;
A password that belongs to a data backup must be permanently protected from loss just like the files themselves, otherwise in case of doubt the backup is worthless.&lt;br /&gt;
&lt;br /&gt;
=== Securing the confidentiality and integrity of the Wallet and Software ===&lt;br /&gt;
&lt;br /&gt;
==== Creating a New Wallet ====&lt;br /&gt;
&lt;br /&gt;
In the event that the wallet was possibly or actually stored in a compromised state, or spreaded, it is wise to create a new wallet and to transfer all money amounts in the old wallet to the new. Once this is done, someone who has attained knowledge of the old private keys, can not longer use them to steal bitcoins. Keep in mind that leaked keys can be used much later from their generation. For example, if you generate some keys to day, transfer them to a new computer in three years, and throw the old computer in ten years to the trash, and it still contains keys that you have created today, these could still be used to access bitcoins that you received in the meantime.&lt;br /&gt;
&lt;br /&gt;
Creating a new wallet can be useful, for example, if someone has saved a wallet with a password of 12 characters for a service online. Meanwhile, passwords with 12 up to about 15 characters are decoded and the private keys are no longer safe. The strategy only to re-encrypt the wallet is not enough, because the keys are not safe.&lt;br /&gt;
&lt;br /&gt;
==== Creating a safe and secure work space ====&lt;br /&gt;
&lt;br /&gt;
Large and complex programs like Web browsers are never completely safe. Therefore, it is extremely useful, not to run the Bitcoin client program with the user identity that you use to surf the Web or read e-mails. The modern operating systems can isolate applications for different user IDs from each other quite effectively, and this is a huge advantage to security.&lt;br /&gt;
&lt;br /&gt;
===== Digression: Secure Passwords =====&lt;br /&gt;
&lt;br /&gt;
====== Passwords ======&lt;br /&gt;
A proven method for producing safe, but still learnable passwords goes as follows:&lt;br /&gt;
&lt;br /&gt;
* Make up a nonsense phrase like&lt;br /&gt;
 &amp;quot;Thirty crows fly backwards to the moon, but they do not have a ticket.&amp;quot;&lt;br /&gt;
The more bizarre the sentence, the better you remember it.&lt;br /&gt;
&lt;br /&gt;
* The first letters and numbers are used for the password:&lt;br /&gt;
 30CfbwttM,btdnhaT&lt;br /&gt;
&lt;br /&gt;
* Now we get creative and replace a few characters, eg &amp;quot;A&amp;quot; looks like but like &amp;quot;4&amp;quot;:&lt;br /&gt;
 30Cfbw2tM,b|dnh@T&lt;br /&gt;
&lt;br /&gt;
* Now insert one or a few signs that are not found on English keyboards [https://en.bitcoin.it/wiki/Microsoft_Windows_Unicode_Input (Tips)]:&lt;br /&gt;
 3ß0Cþfböw2tM,b|dnh@฿T&lt;br /&gt;
&lt;br /&gt;
Strong passwords are now, where huge computing resources like hashed databases and botnets are available for cracking, about 15 to 20 characters long. Few people can remember so long passwords  error-free, especially if they make some longer holiday. Therefore, write to the password and put it in his wallet. (That&#039;s still heretical but I have a good Reference - [http://en.wikipedia.org/wiki/Bruce_Schneier Bruce Schneier] [http://www.schneier.com/blog/archives/2005/06/write_down_your.html])&lt;br /&gt;
&lt;br /&gt;
* To protect against unauthorized use of the written down password one should append some characters that you really have in your head.&lt;br /&gt;
&lt;br /&gt;
Now it is so that a forgotten password is at least as bad as a cracked. A button labeled &amp;quot;Forgot your password, sent new by e-mail&amp;quot; does not exist in Bitcoin. &#039;&#039;&#039;So the consequence of &amp;quot;Password away&amp;quot; is inevitable &amp;quot;money away &amp;quot;&#039;&#039;&#039;. Don&#039;t forget that!&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;The written-down password&#039;&#039;&#039; should be preserved in something like a bank deposit box (can be rented for a few bucks yearly) or in a fireproof safe. I you have USD 100,000 in BTC, you want to have a fireproof safe if your house has burned down. Believe me.&lt;br /&gt;
&lt;br /&gt;
====== Passphrases (password phrases) or mantras ======&lt;br /&gt;
&lt;br /&gt;
* An alternative to passwords which has at least the same strength against techniques like rainbow tables, &#039;&#039;&#039;but is in comparison  much easier to remember&#039;&#039;&#039; is the use of &#039;&#039;&#039;pass-phrases&#039;&#039;&#039; or a &amp;quot;mantra&amp;quot;. The required length depends on the use. Passphrases for online services may be safe enough with four common words. Secure passphrases for files (which can be rapidly tried off-line) should contain at least six unusual words and at least 35 characters in length. This [http://www.explainxkcd.com/2011/08/10/password-strength/ comic by XKCD] explains the principle.&lt;br /&gt;
&lt;br /&gt;
* An example sentence would be: &amp;quot;The Lemon flambé the okapi a phosphorescent absolution.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Much of the strength of this method relies on technical reasons: Once a password has reached a certain minimal complexity, the fastest way to crack the password is a brute-force search with rainbow tables and charts. And since for this methods, the length of the password is the decisive factor, long pass phrases, which are comparatively much better to remember, win over short very complex passwords (which are hard to remember but easier to crack).&lt;br /&gt;
&lt;br /&gt;
* In-depth information on passphrases here: [http://www.iusmentis.com/security/passphrasefaq/ passphrase FAQ] by Randall T. Williams.&lt;br /&gt;
&lt;br /&gt;
* Warning: Completely unsuitable are fixed expressions and popular idioms. Don&#039;t use any meaningful sentence and anything that might be published on the web.&lt;br /&gt;
&lt;br /&gt;
===== Special Linux distributions =====&lt;br /&gt;
&lt;br /&gt;
To  secure a Windows system comprehensively is a complex and difficult task. Securing which is appropriate for the administration of five-figure amounts requires knowledge which the average user does not have.&lt;br /&gt;
&lt;br /&gt;
As an alternative, there are some special Linux distributions. Using them, one can create a secure space specially for Bitcoin,  and they require almost no setup:&lt;br /&gt;
&lt;br /&gt;
* [http://www.heise.de/ct/projekte/Sicheres-Online-Banking-mit-Bankix-284099.html c&#039;t Bankix], a distribution for online banking, is a adapted and, of course, free version of Ubuntu that was created by the renowned German Heise magazine publisher. Following to the (important) first update the system will be put on a read-only medium and cannot longer be manipulated by unauthorized changes to the software.&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Damn_Small_Linux Damn Small Linux] is a popular, small Debian-based Linux, which contains only the most important functions and thus provides less attack surface. The derivation from Debian guarantees speedy and thorough security updates.&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Knoppix Knoppix] is a popular live-CD distribution with excellent hardware detection, which has a slightly larger footprint than Damn Small Linux, and a number of interesting features. For example, it offers support for blind and visually impaired persons.&lt;br /&gt;
* [http://forum.bitcoin.org/index.php?topic=7374 LinuxCoin], many additional functions for mining&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following distributions are suitable only for users with good knowledge. However, their excellent safety features makes them quite interesting starting points for Bitcoin Appliances:&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Tin_Hat_Linux Tin Hat Linux] is a [http://en.wikipedia.org/wiki/Hardened_Gentoo Hardened Gentoo] derivative. In addition to a very small size and a very comprehensive encryption it has interesting additional security features, such as [http://en.wikipedia.org/wiki/Grsecurity Grsecurity].&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Alpine_Linux Alpine Linux] uses, similar to Tin Hat Linux etc. Kernel functions with Stack Smashing Protection. It uses instead of the standard glibc the uClibc, which means that the Bitcoin client needs to be compiled specifically for this distribution.&lt;br /&gt;
&lt;br /&gt;
===== Linux =====&lt;br /&gt;
====== Protected user account ======&lt;br /&gt;
&lt;br /&gt;
The first step is [https://help.ubuntu.com/8.04/serverguide/C/user-management.html to create a new user], which goes with the command:&lt;br /&gt;
&lt;br /&gt;
sudo adduser &amp;lt;code&amp;gt; new_user_name &amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On the message &amp;quot;Enter a new value or press ENTER for the default&amp;quot; one needs only to press the Return key.&lt;br /&gt;
&lt;br /&gt;
Then do you register as a new user, eg &amp;quot;Switch User&amp;quot; with (at Ubuntu in the menu to log off). If you are logged in, we search for the file manager, select this from the home directory (with the house icon), then right-click &amp;quot;Properties&amp;quot;, then the access permissions. Here you select &amp;quot;Other&amp;quot; and set the permissions to &amp;quot;nobody&amp;quot;. With this step, other programs can not read the other user&#039;s wallet.&lt;br /&gt;
&lt;br /&gt;
The newly created user should be safe to use in order to keep him safe, exclusively for Bitcoin.&lt;br /&gt;
&lt;br /&gt;
There is also a good idea to encrypt this user&#039;s home directory with the package ecryptfs-utils.&lt;br /&gt;
&lt;br /&gt;
# If the home directory is not empty, first backup it to some other medium.&lt;br /&gt;
# Now install ecryptfs-utils (Ubuntu: sudo apt-get install ecryptfs-utils)&lt;br /&gt;
# From X11 (graphical system) log and log in with Ctrl + Alt + F1 in the Linux console - if you are logged in X11, the home directory is encrypted.&lt;br /&gt;
# The current directory change so that it is not in the home folder, eg &amp;quot;Cd /&amp;quot;.&lt;br /&gt;
# The migration tool to run: (in Ubuntu: sudo ecryptfs-migrate-home-u username)&lt;br /&gt;
# If it succeeds then you can press ALT + F8 to go back and log in X11.&lt;br /&gt;
# Run the command &#039;ecryptfs-unwrap-passphrase&#039;. Without exception &#039;&#039;&#039;write and store the code that you receive on a secure medium&#039;&#039;. &#039;&#039;&#039;Without this code no data - including the wallet  - can be accessed if the system does not work&#039;&#039;&#039;&lt;br /&gt;
# Run the command &#039;ecryptfs-setup-swap&#039; run, which encrypts the swap partition. Otherwise, keys in your purse in plain text can go to the the swap partition where they might be stolen. This unfortunately also means that &amp;quot;idle&amp;quot; or Hibernate can not be used anymore because the bootloader can not restore the dump. An more conventient alternative is to overwrite the swap partition when you shut down the machine (after the deactivation of virtual memory) with random data.&lt;br /&gt;
&lt;br /&gt;
(Instructions from [http://bodhizazen.net/Tutorials/Ecryptfs/ # Migrate])&lt;br /&gt;
&lt;br /&gt;
====== For more information ======&lt;br /&gt;
* [https://help.ubuntu.com/community/Security Security features on ubuntu]&lt;br /&gt;
&lt;br /&gt;
* [http://www.techrepublic.com/blog/10things/10-ways-to-secure-your-linux-desktop/359 10 ways to secure your lInux desktop]&lt;br /&gt;
&lt;br /&gt;
===== Windows =====&lt;br /&gt;
&lt;br /&gt;
* [http://windows.microsoft.com/de-DE/windows7/help/security-privacy-user-accounts Basics]&lt;br /&gt;
&lt;br /&gt;
* Create an extra user, under which only the Bitcoin software is running. So the wallet is somewhat protected from malicious code in applications for other users:&lt;br /&gt;
** [http://support.microsoft.com/kb/905056/en Windows XP]&lt;br /&gt;
** [http://windows.microsoft.com/en-US/windows7/Create-a-user-account Windows 7]&lt;br /&gt;
&lt;br /&gt;
====Browser Security ====&lt;br /&gt;
&lt;br /&gt;
===== Firefox =====&lt;br /&gt;
To secure the browser, you start Firefox, go to menu &amp;quot;Edit&amp;quot; (edit), and select &amp;quot;Preferences&amp;quot; (Settings).&lt;br /&gt;
&lt;br /&gt;
* Now you start with the tabs on the left, select the &amp;quot;Startup&amp;quot; option &amp;quot;Show a blank page&amp;quot; (Clean Slate).&lt;br /&gt;
* By &amp;quot;content&amp;quot; (content)&lt;br /&gt;
** The option &amp;quot;Load images automatically / Load images automatically&amp;quot; opt out,&lt;br /&gt;
** Also &amp;quot;Enable Javascript Enable / javascript&amp;quot; opt out.&lt;br /&gt;
* In the tab &amp;quot;privacy / data protection&amp;quot; in the &amp;quot;History / History History,&amp;quot; select &amp;quot;Never remember history&amp;quot; / &amp;quot;do not save history&amp;quot;.&lt;br /&gt;
* In the tab &amp;quot;Security&amp;quot; in the &amp;quot;Passwords&amp;quot;&lt;br /&gt;
** The &amp;quot;remember passwords / passwords save&amp;quot; deselect&lt;br /&gt;
** Also &amp;quot;use a master password&amp;quot; / &amp;quot;master password&amp;quot;.&lt;br /&gt;
* Finally, in the tab &amp;quot;Advanced&amp;quot; / &amp;quot;Advanced&amp;quot; option&lt;br /&gt;
** &amp;quot;Automatically check for updates&amp;quot; deselect&lt;br /&gt;
** As &amp;quot;add-ons&amp;quot; and&lt;br /&gt;
** &amp;quot;Search engines&amp;quot; / &amp;quot;search engines&amp;quot; opt out.&lt;br /&gt;
&lt;br /&gt;
If Javascript is disabled, the page linux download page] to download new versions of the Bitcoin Clients will no longer automatically download, so you have to link to the &amp;quot;direct link&amp;quot; on notice &amp;quot;Problems with the download? Please use this &#039;direct link&#039; or try another mirror.&amp;quot; . click Once you make the effort made, of course you checked the download of new clients Bitcoin the checksums, which are indicated on the sourceforge page, with the program sha1.&lt;br /&gt;
&lt;br /&gt;
=== Protect against data loss: Backup ===&lt;br /&gt;
Secure the only file you need is the wallet.dat. Advance to make sure that Bitcoin not running anymore! The best way would be to encrypt the file and store somewhere safe.&lt;br /&gt;
&lt;br /&gt;
You can also [[API | backupwallet]] JSON-RPC command used to create a backup on the fly.&lt;br /&gt;
&lt;br /&gt;
==== Where to find the Bitcoin folder ====&lt;br /&gt;
The [[Bitcoin folder]] is the folder where the data is wallet.dat along with the file.&lt;br /&gt;
&lt;br /&gt;
===== Windows =====&lt;br /&gt;
Click on &amp;quot;Start&amp;quot;, then Run and enter this:&lt;br /&gt;
:% APPDATA% \ Bitcoin&lt;br /&gt;
A folder should open now, for most it would be:&lt;br /&gt;
 C: \ Documents and Settings \ username \ Application Data \ Bitcoin (XP)&lt;br /&gt;
 C: \ Users \ username \ appdata \ roaming \ Bitcoin (Vista and 7)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!---&lt;br /&gt;
&lt;br /&gt;
===== Windows =====&lt;br /&gt;
&lt;br /&gt;
If you are using Windows XP or Windows 7, you can keep your wallet on an encrypted disk image created by third-party software, such as [http://www.truecrypt.org/ TrueCrypt] (open source) or [http: / / www.jetico.com/encryption-bestcrypt/ Jetico BestCrypt] (commercial). You can probably do the same with Windows Vista or Windows 2000.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE:&#039;&#039;&#039; You should configure Bitcoin in this manner only on computers where you use Bitcoin, but not do use that computer to mine. For example, this is a good configuration for a notebook or tablet computer.&lt;br /&gt;
&lt;br /&gt;
Assuming that you have installed the Windows client Bitcoin and run it at least once, the process is Described below.&lt;br /&gt;
&lt;br /&gt;
To mount the &amp;lt;p&amp;gt; Bitcoin DataDirectory on an encrypted drive &amp;lt;/ b&amp;gt; &amp;lt;/ p&amp;gt;&lt;br /&gt;
&amp;lt;ol start=1 type=1&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; use the third-party disk image encryption program of your choice to create and mount an encrypted disk image of at least 100 MB in size. &amp;lt;/ li&amp;gt;&lt;br /&gt;
Locate the &amp;lt;li&amp;gt; Bitcoin data directory, and copy the directory with all contents to the encrypted drive.&lt;br /&gt;
&amp;lt;p&amp;gt; For help finding this directory, see &amp;lt;b&amp;gt; [[# Securing_your_wallet Locating_BitCoin_s_data_directory | Locating Bitcoin&#039;s data directory]] &amp;lt;/ b&amp;gt; &amp;lt;/ p&amp;gt; &amp;lt;/ li&amp;gt;.&lt;br /&gt;
Create a Windows shortcut &amp;lt;li&amp;gt; that starts with the Bitcoin &amp;lt;code&amp;gt;-datadir &amp;lt;/ code&amp;gt; parameter specifier and the encrypted drive and directory.&lt;br /&gt;
&amp;lt;p&amp;gt; For example, if you Bitcoin installed in the default directory, mounted encrypted drive as your Bitcoin &amp;lt;code&amp;gt; E: \ &amp;lt;/ code&amp;gt;, and stored it on your Bitcoin DataDirectory as &amp;lt;code&amp;gt; Bitcoin &amp;lt;/ code&amp;gt;, you would type the following command as the shortcut target: &amp;lt;/ p&amp;gt;&lt;br /&gt;
blockquote &amp;lt;code&amp;gt; C: \ Program Files \ Bitcoin \ bitcoin.exe-datadir = E: \ Bitcoin &amp;lt;/ code&amp;gt; &amp;lt;/ blockquote&amp;gt; &amp;lt;/ li&amp;gt;&lt;br /&gt;
Open &amp;lt;li&amp;gt; Bitcoin&#039;s settings and configure it &amp;lt;b&amp;gt; NOT &amp;lt;/ b&amp;gt; to start automatically when you start Windows.&lt;br /&gt;
This is to allow &amp;lt;p&amp;gt; you to mount the encrypted disk image Bitcoin before starting Bitcoin. &amp;lt;/ p&amp;gt; &amp;lt;/ li&amp;gt;&lt;br /&gt;
Shut down &amp;lt;li&amp;gt; Bitcoin, and then restart it from the new shortcut. &amp;lt;/ li&amp;gt;&lt;br /&gt;
&amp;lt;/ Ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
After doing this, any time you want to use Bitcoin, you must first mount the encrypted disk image Bitcoin using the same drive designation, and then run from the shortcut that you Bitcoin created so that it can find its data and your wallet. :-)&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== Linux =====&lt;br /&gt;
Bitcoin should create a hidden folder in your home directory of the running user.&lt;br /&gt;
 ~ /. Bitcoin /&lt;br /&gt;
&lt;br /&gt;
It should not be there, it can be possibly due&lt;br /&gt;
Find /-name wallet.dat-print 2&amp;gt; / dev / null&lt;br /&gt;
. find Or as root&lt;br /&gt;
: Updatedb&lt;br /&gt;
followed by&lt;br /&gt;
: Locate wallet.dat&lt;br /&gt;
&lt;br /&gt;
The handiest backup method under Linux is probably the copy on one or more wallet.dat used for USB flash drives or memory cards that are kept in a safe place (fireproof safe, bank safe, aquarium with piranhas, etc).&lt;br /&gt;
&lt;br /&gt;
====== Individual encryption of the wallet.dat file ======&lt;br /&gt;
* For individual encryption of the purse, the available cross-platform program&#039;&#039;&#039;[http://ccrypt.sourceforge.net/ ccrypt]&#039;&#039;&#039; is well suited. It encodes a variant of the AES Rijndael algorithm. a recognized standard, which is considered very safe. The plain-text version of Wallet.dat will be replaced automatically. As with all strong encryption, a careful backup of data and keys is essential - under Linux, the risk of loss due to forgetting the key is much higher than by computer intrusions and malware.&lt;br /&gt;
&lt;br /&gt;
* For automatic storage of encrypted copies GnuPG  (Gnu Privacy Guard) is well suited. To encrypt data, ones need  only the public key.  Only to decrypt a backup, the private key is used, which can be stored otherwise in a safe place. Using a fixed pair of keys reduces also the risk of loss of a key by unnoticed typos when typing them.&lt;br /&gt;
&lt;br /&gt;
* Additional protection against attacks by key loggers provide smart cards and hardware tokens like the [http://www.privacyfoundation.de/crypto_stick/ Crypto Stick] the Deutsch Privacy Foundation or the  GnuPG Fellowship smart card. The special advantage is that you GnuPG keys that are very safe due to their length, and can be stored on the smart card. A six-digit PIN code protects the contents of the smart card. If it is entered incorrectly multiple times, then the content will be deleted. [https://www.privacyfoundation.de/wiki/CryptoStickSoftware instructions here].&lt;br /&gt;
&lt;br /&gt;
* Together with the FUSE-based file system [http://de.wikipedia.org/wiki/EncFS EncFS] can you also back up individual files as wallet.dat individually. The entire list can Bitcoin but are not used because the database is encrypted with EncFS.&lt;br /&gt;
&lt;br /&gt;
===== Mac ===== &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Note: The following instruction are not checked due to lack of hardware. Please check and correct if necessary, then remove the note!&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The directory containing the Bitcoin wallet.dat is usually here:&lt;br /&gt;
 ~ / Library / Application Support / Bitcoin /&lt;br /&gt;
&lt;br /&gt;
====== Secure all data (500 megabytes) ======&lt;br /&gt;
These steps (chain wallet and block) of all data stored on Bitcoin an encrypted disk image:&lt;br /&gt;
# Disk Utility Open&lt;br /&gt;
# Click on &amp;quot;New Image&amp;quot;, 500MB, 128-bit or 256-bit (faster or more secure) encryption specify eintelne partition.&lt;br /&gt;
# Copy in a place where you will not lose the image (eg Wuala, Strong Space ofer whatever)&lt;br /&gt;
# A strong and secure password select&lt;br /&gt;
# Copy everything from ~ / Library / Application Support / Bitcoin / in the image&lt;br /&gt;
# Create symlink to the old place, so the app can benuutzen it&lt;br /&gt;
::: Ln-s / Volumes / Bitcoin ~ / Library / Application Support / Bitcoin&lt;br /&gt;
&lt;br /&gt;
Do not forget to mount the image before using Bitcoin and unmount afterwards.&lt;br /&gt;
&lt;br /&gt;
====== Backup file wallet.dat purses alone (40MB ) ======&lt;br /&gt;
These steps only protect the file wallet.dat. This causes a small memory dump, but is more complicated.&lt;br /&gt;
&lt;br /&gt;
# Disk Utility Open&lt;br /&gt;
# Click on &amp;quot;New Image&amp;quot;, 40MB, 128-bit or 256-bit, single select partition.&lt;br /&gt;
# Store in a place where you will not lose the backup.&lt;br /&gt;
# A secure and strong password, select&lt;br /&gt;
# The file wallet.dat move in the image&lt;br /&gt;
# Create symlink to the old place, so the app can find and use the file&lt;br /&gt;
::: Ln-s / Volumes / Bitcoin / wallet.dat ~ / Library / Application Support / Bitcoin / wallet.dat&lt;br /&gt;
&lt;br /&gt;
[[File: MountWalletAndLauchnBitcoin_OSX_Automator.png | thumbnail | 150px | Mount Wallet and launch Bitcoin]]&lt;br /&gt;
Do not forget to mount the image before using Bitcoin and unmount afterwards.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note:&#039;&#039;&#039; If you start the application Bitcoin without the image is mounted, the program is the symlink (a kind of shortcut) wallet.dat with the new one. Do not panic! Rename the new order wallet.dat or delete it, mount the image, and just put a new symlink. The old wallet.dat may of course be canceled under any circumstances.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Automation:&#039;&#039;&#039; The program [http://en.wikipedia.org/wiki/Automator_% 29% 28software Automator] (included in OS X) can automatically mount your wallet and start Bitcoin App.&lt;br /&gt;
&lt;br /&gt;
Alternatively, the following shell script can be used to decrypt wallet.dat which automatically starts the Bitcoin client, and they subsequently re-encrypted. The script works for sowoghl for OSX and Linux: [http://lorelei.kaverit.org/bitcoin.sh Bitcoin-launch-script]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== General solution ====&lt;br /&gt;
wallet.dat is not usually encrypted, everyone who has access to the file, can freely dispose of the coins. You can encrypt your wallet.dat with one of these programs, should there be the slightest chance that someone else has access.&lt;br /&gt;
&lt;br /&gt;
Note: Encryption does not protect the wallet against security risk &#039;&#039;after&#039;&#039; they have occured. Encryping a wallet after finding a computer virus or a trojan helps absolutely nothing. Also, encryption does not help against the complete loss of control which a system compromise means.&lt;br /&gt;
&lt;br /&gt;
* [http://www.7-zip.org/ 7-Zip]&lt;br /&gt;
* [http://www.axantum.com/axcrypt/ AxCrypt]&lt;br /&gt;
* [http://www.truecrypt.org/ TrueCrypt]&lt;br /&gt;
* [http://www.rarlab.com/ WinRar]&lt;br /&gt;
* [http://de.wikipedia.org/wiki/EncFS EncFS] (Linux)&lt;br /&gt;
&lt;br /&gt;
==== Encryption with Smart Card ====&lt;br /&gt;
&lt;br /&gt;
Folders can be encrypted with GnuPG-compatible smart card. A very secure solution is to stick the Crypto Deutsch Privacy Foundation:&lt;br /&gt;
&lt;br /&gt;
[http://www.privacyfoundation.de/crypto_stick/ Crypto Stick overview]&lt;br /&gt;
&lt;br /&gt;
[https://www.privacyfoundation.de/wiki/CryptoStickSoftware Intallation and use]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Storing the Archives ====&lt;br /&gt;
A backup on Flash Media / Memory Sticks and storing them in secure locations is a reasonable solution.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== BOTG: Bitcoin Off The Grid===&lt;br /&gt;
* Another alternative that is suitable for high security requirements,is  &amp;quot;BOTG - Bitcoin off-the-grid&amp;quot; [http://forum.bitcoin.org/index.php?topic=7374.msg108351 see info in the announcement to LinuxCoin]. It is a script that  can create a key pair &#039;&#039;without&#039;&#039; Internet connection. As the private keys are created on a system that does not have Internet access, and are stored offline, they can not get lost via the Internet. The public key can be passed on and received as normal transactions that can be looked up in block Explorer. Only if you want to use the fund, you must import the private key into a Bitcoin client. From then on, the normal safety precautions apply.&lt;br /&gt;
&lt;br /&gt;
=Securing your wallet on Ubuntu and/or Suse=&lt;br /&gt;
For users that use a Linux system that comes with AppArmor, it is probably possible to use&lt;br /&gt;
the MinorFs system with a procedure not unlike that described here for secure ssh without a passphrase:&lt;br /&gt;
&lt;br /&gt;
http://minorfs.polacanthus.net/wiki/Ssh_private_keys_without_passphrase&lt;br /&gt;
&lt;br /&gt;
Its a bit of a hack, but it would make it impossible for malware running under the same user id as&lt;br /&gt;
bitcoin to gain access to the wallet. &lt;br /&gt;
&lt;br /&gt;
It may be worth it if someone would describe the correct procedure to secure the bitcoin wallet using MinorFs/AppArmor in a way similar to described in the above link for ssh keys without passphrases.&lt;br /&gt;
&lt;br /&gt;
= ‘Shred’ cannot always be assumed to be secure on modern filesystems! =&lt;br /&gt;
&lt;br /&gt;
I don&#039;t feel entirely comfortable with the suggested usage of the ‘shred’ command in the given Linux script.  My understanding (and according to shred&#039;s manpage) is that on modern filesystems, it is &#039;&#039;no&#039;&#039; guarantee that when an application like shred asks the OS to overwrite a file, that the file will actually be physically overwritten in place on the disk.  Unless there have been features implemented to allow special handling by the kernel for such security applications (I haven&#039;t investigated, so maybe there are, or maybe not), it would probably be safer to disable all system swap (i.e., with ‘swapoff’) and then store the unencrypted data on a temporary RAM disk only, then unmount the RAM disk afterwards to ensure it never gets written to disk.  I&#039;ve done this before, though unfortunately it&#039;s a bit of a hassle and normally requires running commands that need root privileges or sudo, etc.  Comments?&lt;br /&gt;
~ [[User:Ijel|Ijel]] 03:49, 11 February 2012 (GMT)&lt;/div&gt;</summary>
		<author><name>Ijel</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Talk:Securing_your_wallet&amp;diff=23690</id>
		<title>Talk:Securing your wallet</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Talk:Securing_your_wallet&amp;diff=23690"/>
		<updated>2012-02-11T03:50:59Z</updated>

		<summary type="html">&lt;p&gt;Ijel: Whoops, the “add topic” button didn&amp;#039;t thread properly for some reason&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The article is too huge. The Mac solution does not scale; the suggested sizes are too low and the maximum size is infinite. [[User:X|X]] 17:10, 8 January 2012 (GMT)&lt;br /&gt;
&lt;br /&gt;
This article needs a rewrite following the introduction of the Bitcoin.org client&#039;s ability to passphrase protect the keys in the wallet.  Perhaps some sections also -- something like &amp;quot;typical consumer use&amp;quot; (where the client&#039;s encryption is adequate) and &amp;quot;commercial-grade protection&amp;quot; where the topics such as encryption at the filesystem is addressed. - [[User:Sgornick|Sgornick]] 10:24, 28 December 2011 (GMT) &lt;br /&gt;
&lt;br /&gt;
The five paragraphs in Technical Background all say the same thing. --[[User:Mcandre|Mcandre]]&lt;br /&gt;
&lt;br /&gt;
Note: the backupwallet.sh script in the linux section doesn&#039;t actually work.&lt;br /&gt;
I suspect it is caused by the wiki changing the formatting.&lt;br /&gt;
I wrote my own version that uses much more standard shell syntax.&lt;br /&gt;
&lt;br /&gt;
[[User:Wscott|Wscott]] 11:28, 11 February 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
I fixed the backupwallet.sh script. It just needed a nowiki tag around a conditional statement. -- [[User:Mweather|Mweather]] 23:48, 20 May 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
The approach for &amp;quot;Making a secure workspace&amp;quot; seems to differ greatly for linux and mac. Why? It seems like if you are going to make firefox secure, which is basically all the linux section recommends, you would want to do that on a mac too. And the recommendation in the mac section to keep the wallet in an encrypted volume with a symlink in the expected system location should be done on a linux box too, shouldn&#039;t it, like using truecrypt or something... Am I wrong??? Can someone with advanced knowledge please advise...? Also, if you want bitcoin to run all the time in the background on linux, but you have it set up in a separate user from your main user account, well, you are out of luck? Can justifications and explanations be added to the recommendations, and also I guess some alternatives with pros and cons be offered, for people with different needs and computing situations. Thanks! --[[User:GusGustavo|GusGustavo]] 13:33, 26 May 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
== Time Sensitivity ==&lt;br /&gt;
&lt;br /&gt;
Is it possible to still send money to my wallet, even if it&#039;s backed up and offline?  Do bitcoins ever expire if they&#039;re not spent, or is there anything bad that can happen by not using my bitcoin client in a long time? [[User:Daniel.benoy|Daniel.benoy]] 23:18, 8 June 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
== How often is it needed to backup the Wallet? ==&lt;br /&gt;
&lt;br /&gt;
Is it necessary to make a backup after each transaction? This page is not clear about this.&lt;br /&gt;
Please add this information to the page!&lt;br /&gt;
&lt;br /&gt;
== Creating a New Wallet ==&lt;br /&gt;
&lt;br /&gt;
This section isn&#039;t helpful; it tells you when to create a new wallet, but not how.  I&#039;m a new user, and the wallet was created when I installed the BitCoin program.  I will find out how to create a new wallet, and then edit this section so that it actually explains the task that it sets out to explain. :-) [[User:ErgoOne|ErgoOne]] 15:19, 9 June 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
== Making a secure workspace ==&lt;br /&gt;
&lt;br /&gt;
For me space needed in ~/Library/Application Support/Bitcoin (Mac) is more than 400MB (!) after having loaded all blocks from bitcoin app. So 100MB is much too small (may be sufficient for just wallet.dat, but then the steps to do had to be changed). [[User:Hartrock|Hartrock]] 18:48, 12 June 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
I updated the wiki steps to just backup wallet.dat --[[User:ChocoboLee|ChocoboLee]] 19:18, 15 June 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
== Flaws with argument regarding encryption ==&lt;br /&gt;
&lt;br /&gt;
Can someone please explain to me how encrypting your wallet will actually protect against a trojan stealing it.  Because once you mount the encrypted file, and decrypt it not only can bitcoin see it but the trojan can as well.  This strategy seems to work only in the following circumstances:&lt;br /&gt;
1. The wallet that has the majority of your cash you never decrypt when you have an open internet connection.&lt;br /&gt;
2. Assumes that a trojan only operates when an internet connection is present and it can transmit the wallet data file.&lt;br /&gt;
&lt;br /&gt;
Even if you were paranoid and never were connected to the internet when the wallet file with the bulk of your funds was decrypted this still would not solve the problem.  In the event that a trojan seeks to copy your wallet file to another location on your computer it could wait for an open internet connection to transmit this data.  So even if you reencrypt the wallet file before connecting to the internet this type of trojan has already made a copy of the decrypted file and can transmit it as soon as an internet connection becomes available.&lt;br /&gt;
&lt;br /&gt;
Also how in the world could you ever use this wallet to transfer cash to another user if you are offline?  Maybe I don&#039;t understand how bitcoin works but don&#039;t you need to be online in order to transfer bitcoins?  Basically the bottom line is that bitcoin cannot read an encrypted wallet file which means that in order to use the wallet you need to decrypt it which means its vulnerable to trojans who can steal it the moment you want to use it.&lt;br /&gt;
&lt;br /&gt;
This seems to be a fundamental flaw in this discussion &amp;quot;securing your wallet&amp;quot;  Why doesn&#039;t bitcoin just address this in the software allowing for the wallet to always be encrypted and require a password upon startup.  If you want bitcoin to go mainstream I don&#039;t understand why you can&#039;t address this fundamental flaw that would be solved by an always encrypted wallet file that the software can read and write to.&lt;br /&gt;
&lt;br /&gt;
::The fundamental flaw is trying to secure the wallet when the whole system is already technically compromised. It does not help to have a secure wallet then. What a trojan could do is, for example, to replace the bitcoin client by a sligthly changed one that usually works as expected, but once in a while sends the money to an address which is owned by the attacker. The people you think you pay will become angry because the money you think to send never does arrive at them. Of course, the malicious client can be intelligent enough to wait until the is some real amount of coins in the play. One day you&#039;ll think you bought a car but the money is somewhere else. The same applies, for example, if the payment addresses you receive are modified by some malicious e-mail program.&lt;br /&gt;
&lt;br /&gt;
::So what is the bottom line? Encrypting the wallet helps against a roommate stealing your coins if he has two minutes of physical access to your computer. It helps against burglary and forgetting the laptop in the train. It generally does NOT help against compromise of the system. The &#039;&#039;&#039;whole&#039;&#039;&#039; system &#039;&#039;&#039;must&#039;&#039;&#039; be kept safe, not just the data in the wallet. And this is not something that the bitcoin software is responsible for. It is the responsibility of the user to install and maintain a secure system. It is a fundamental fallacy to expect that a certain piece of software should still work as the user expects if the whole system is not any more under the control of the user. In this sense, bitcoin can not go mainstream. Instead, main stream users need to reach some point of mental sanity. --[[User:Joise|Joise]] 09:14, 14 August 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
====Added a new entry to backup methods====&lt;br /&gt;
[[WalletPaperbackup]] Is a great way to get your wallet out of the digital world and onto paper&lt;br /&gt;
--[[User:Jrwr|Jrwr]] 02:02, 24 June 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
== Unsecure suggestion for passwords ==&lt;br /&gt;
&lt;br /&gt;
Especially with Bitcoins the Password advice from Gibson Research is dangerous because passwords must&lt;br /&gt;
also be safe in the future when it comes to wallet storing.&lt;br /&gt;
This is definitely not given with this system. It might be true, that&lt;br /&gt;
with today&#039;s brute-force tools, the &amp;quot;d0g...........&amp;quot; pw is safer than&lt;br /&gt;
hkjhHZ756s=&amp;amp;g%7 but in the very near future (maybe already exists)&lt;br /&gt;
there will be new tools, that will find out, what kind of simplifiers&lt;br /&gt;
are often used by humans and will combine brutforce with simplifiers&lt;br /&gt;
and thus come to &amp;quot;d0g............&amp;quot; very quickly!&lt;br /&gt;
&lt;br /&gt;
== Section 4.2 ==&lt;br /&gt;
If you recommend  that one backup wallet.dat on a mac via creating an encrypted image file, don&#039;t you think you should also remind the user to backup his ~/Library/Keychains directory? There is little point in backing up wallet.dmg on Wuala or whatever if you lose your AES key to the image, and the scenario when you need to recover wallet.dmg is probably the scenario where you&#039;ve also lost ~/Library/Keychains... e.g. laptop stolent, etc.&lt;br /&gt;
&lt;br /&gt;
== Back-Translation of German Version ==&lt;br /&gt;
&lt;br /&gt;
Hi,&lt;br /&gt;
&lt;br /&gt;
I have translated the page to the German Version, expanded it by several points and concepts  which seem important to me - namely, a disticion between data confidentality, system integrity and the notion of technical compromise, and adapted the ordering according to these concepts. Here is the back-translated version as a suggestion what could be expanded. I&#039;ve translated it quickly using Google Translate, that means wording and style can&#039;t be expected to be perfect. Nevertheless, I hope it&#039;s helpful. --[[User:Joise|Joise]] 09:14, 14 August 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Introduction ===&lt;br /&gt;
The security of the wallet can be divided into two separate objectives:&lt;br /&gt;
&lt;br /&gt;
1. Safeguard against loss&lt;br /&gt;
&lt;br /&gt;
2. Secure against theft&lt;br /&gt;
&lt;br /&gt;
In the case of a currently not adequately secured wallet (eg with a weak password uploaded on the Internet):&lt;br /&gt;
&lt;br /&gt;
3. New, create a mew secure wallet (with a reasonably long password)&lt;br /&gt;
&lt;br /&gt;
=== Technical background ===&lt;br /&gt;
The important first objective of the design of the wallet is protection against data loss. The personal bitcoin wallet has a pool of queued keys stored in a file named wallet.dat. The default number is 100 keys in the [[Key Pool | Key pool.]] The number of can be adjusted with the &amp;quot;-keypool&amp;quot; parameter in the command line. If for some reason you need a new address, it is not generated on the fly, but taken from the pool. A new key is then created to fill the pool back to 100 keys. If a backup is first created, it contains all used keys plus 100 unused ones. After a transaction, 99 unused keys remain. After 100 operations which require a new key, new keys are used, which are not present in the backup. Because the backup does not have these new keys, this backup can possibly lead to a recovery loss of Bitcoins if the wallet file is destroyed, for example by a head crash.&lt;br /&gt;
&lt;br /&gt;
The safety of deposits in Bitcoin depends on three conditions:&lt;br /&gt;
# The &#039;&#039;&#039;confidentiality (secrecy)&#039;&#039;&#039; of the private key for the entire time from initial production to final use&lt;br /&gt;
# The &#039;&#039;&#039;integrity&#039;&#039;&#039; of the software on the system used.&lt;br /&gt;
# As well as the &#039;&#039;&#039;protection from loss of wallet&#039;&#039;&#039; eg by failure of the hard disk&lt;br /&gt;
&lt;br /&gt;
The bitcoin software assumes (for very good reasons) that integrity and confidentality of the computer and user account is intact. The reason for this is that, strictly spoken, securing the computer is not the business of some application software like bitcoin. A computer which has not &#039;&#039;&#039;both&#039;&#039;&#039; its confidentiality &#039;&#039;&#039;and&#039;&#039;&#039; integrity ensured, is &#039;&#039;&#039;compromised&#039;&#039;&#039;. This means, that it can not longer be excluded that Bitcoins are stolen. A computer on which &#039;&#039;&#039;malware&#039;&#039;&#039; in the form of some trojan is installed or which runs any virus, is always compromised. All data - including the bitcoin wallet - could be &amp;quot;stolen&amp;quot;. On the other hand - and this is far more far-reaching and important  - the other software on the computer is absolutely no longer under control of the user. A compromised system can &#039;&#039;&#039;only&#039;&#039;&#039; be brought back to a safe condition if it is completely erased, fully installed with a fresh operating system and all new security updates are applied. A &amp;quot;disinfection&amp;quot; of virus-infected programs is not enough! Erasing the old, compromised system can also mean it is necessary to flash the BIOS and do a BIOS update - there is some malware which modifies the BIOS.&lt;br /&gt;
&lt;br /&gt;
A password that belongs to a data backup must be permanently protected from loss just like the files themselves, otherwise in case of doubt the backup is worthless.&lt;br /&gt;
&lt;br /&gt;
=== Securing the confidentiality and integrity of the Wallet and Software ===&lt;br /&gt;
&lt;br /&gt;
==== Creating a New Wallet ====&lt;br /&gt;
&lt;br /&gt;
In the event that the wallet was possibly or actually stored in a compromised state, or spreaded, it is wise to create a new wallet and to transfer all money amounts in the old wallet to the new. Once this is done, someone who has attained knowledge of the old private keys, can not longer use them to steal bitcoins. Keep in mind that leaked keys can be used much later from their generation. For example, if you generate some keys to day, transfer them to a new computer in three years, and throw the old computer in ten years to the trash, and it still contains keys that you have created today, these could still be used to access bitcoins that you received in the meantime.&lt;br /&gt;
&lt;br /&gt;
Creating a new wallet can be useful, for example, if someone has saved a wallet with a password of 12 characters for a service online. Meanwhile, passwords with 12 up to about 15 characters are decoded and the private keys are no longer safe. The strategy only to re-encrypt the wallet is not enough, because the keys are not safe.&lt;br /&gt;
&lt;br /&gt;
==== Creating a safe and secure work space ====&lt;br /&gt;
&lt;br /&gt;
Large and complex programs like Web browsers are never completely safe. Therefore, it is extremely useful, not to run the Bitcoin client program with the user identity that you use to surf the Web or read e-mails. The modern operating systems can isolate applications for different user IDs from each other quite effectively, and this is a huge advantage to security.&lt;br /&gt;
&lt;br /&gt;
===== Digression: Secure Passwords =====&lt;br /&gt;
&lt;br /&gt;
====== Passwords ======&lt;br /&gt;
A proven method for producing safe, but still learnable passwords goes as follows:&lt;br /&gt;
&lt;br /&gt;
* Make up a nonsense phrase like&lt;br /&gt;
 &amp;quot;Thirty crows fly backwards to the moon, but they do not have a ticket.&amp;quot;&lt;br /&gt;
The more bizarre the sentence, the better you remember it.&lt;br /&gt;
&lt;br /&gt;
* The first letters and numbers are used for the password:&lt;br /&gt;
 30CfbwttM,btdnhaT&lt;br /&gt;
&lt;br /&gt;
* Now we get creative and replace a few characters, eg &amp;quot;A&amp;quot; looks like but like &amp;quot;4&amp;quot;:&lt;br /&gt;
 30Cfbw2tM,b|dnh@T&lt;br /&gt;
&lt;br /&gt;
* Now insert one or a few signs that are not found on English keyboards [https://en.bitcoin.it/wiki/Microsoft_Windows_Unicode_Input (Tips)]:&lt;br /&gt;
 3ß0Cþfböw2tM,b|dnh@฿T&lt;br /&gt;
&lt;br /&gt;
Strong passwords are now, where huge computing resources like hashed databases and botnets are available for cracking, about 15 to 20 characters long. Few people can remember so long passwords  error-free, especially if they make some longer holiday. Therefore, write to the password and put it in his wallet. (That&#039;s still heretical but I have a good Reference - [http://en.wikipedia.org/wiki/Bruce_Schneier Bruce Schneier] [http://www.schneier.com/blog/archives/2005/06/write_down_your.html])&lt;br /&gt;
&lt;br /&gt;
* To protect against unauthorized use of the written down password one should append some characters that you really have in your head.&lt;br /&gt;
&lt;br /&gt;
Now it is so that a forgotten password is at least as bad as a cracked. A button labeled &amp;quot;Forgot your password, sent new by e-mail&amp;quot; does not exist in Bitcoin. &#039;&#039;&#039;So the consequence of &amp;quot;Password away&amp;quot; is inevitable &amp;quot;money away &amp;quot;&#039;&#039;&#039;. Don&#039;t forget that!&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;The written-down password&#039;&#039;&#039; should be preserved in something like a bank deposit box (can be rented for a few bucks yearly) or in a fireproof safe. I you have USD 100,000 in BTC, you want to have a fireproof safe if your house has burned down. Believe me.&lt;br /&gt;
&lt;br /&gt;
====== Passphrases (password phrases) or mantras ======&lt;br /&gt;
&lt;br /&gt;
* An alternative to passwords which has at least the same strength against techniques like rainbow tables, &#039;&#039;&#039;but is in comparison  much easier to remember&#039;&#039;&#039; is the use of &#039;&#039;&#039;pass-phrases&#039;&#039;&#039; or a &amp;quot;mantra&amp;quot;. The required length depends on the use. Passphrases for online services may be safe enough with four common words. Secure passphrases for files (which can be rapidly tried off-line) should contain at least six unusual words and at least 35 characters in length. This [http://www.explainxkcd.com/2011/08/10/password-strength/ comic by XKCD] explains the principle.&lt;br /&gt;
&lt;br /&gt;
* An example sentence would be: &amp;quot;The Lemon flambé the okapi a phosphorescent absolution.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Much of the strength of this method relies on technical reasons: Once a password has reached a certain minimal complexity, the fastest way to crack the password is a brute-force search with rainbow tables and charts. And since for this methods, the length of the password is the decisive factor, long pass phrases, which are comparatively much better to remember, win over short very complex passwords (which are hard to remember but easier to crack).&lt;br /&gt;
&lt;br /&gt;
* In-depth information on passphrases here: [http://www.iusmentis.com/security/passphrasefaq/ passphrase FAQ] by Randall T. Williams.&lt;br /&gt;
&lt;br /&gt;
* Warning: Completely unsuitable are fixed expressions and popular idioms. Don&#039;t use any meaningful sentence and anything that might be published on the web.&lt;br /&gt;
&lt;br /&gt;
===== Special Linux distributions =====&lt;br /&gt;
&lt;br /&gt;
To  secure a Windows system comprehensively is a complex and difficult task. Securing which is appropriate for the administration of five-figure amounts requires knowledge which the average user does not have.&lt;br /&gt;
&lt;br /&gt;
As an alternative, there are some special Linux distributions. Using them, one can create a secure space specially for Bitcoin,  and they require almost no setup:&lt;br /&gt;
&lt;br /&gt;
* [http://www.heise.de/ct/projekte/Sicheres-Online-Banking-mit-Bankix-284099.html c&#039;t Bankix], a distribution for online banking, is a adapted and, of course, free version of Ubuntu that was created by the renowned German Heise magazine publisher. Following to the (important) first update the system will be put on a read-only medium and cannot longer be manipulated by unauthorized changes to the software.&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Damn_Small_Linux Damn Small Linux] is a popular, small Debian-based Linux, which contains only the most important functions and thus provides less attack surface. The derivation from Debian guarantees speedy and thorough security updates.&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Knoppix Knoppix] is a popular live-CD distribution with excellent hardware detection, which has a slightly larger footprint than Damn Small Linux, and a number of interesting features. For example, it offers support for blind and visually impaired persons.&lt;br /&gt;
* [http://forum.bitcoin.org/index.php?topic=7374 LinuxCoin], many additional functions for mining&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following distributions are suitable only for users with good knowledge. However, their excellent safety features makes them quite interesting starting points for Bitcoin Appliances:&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Tin_Hat_Linux Tin Hat Linux] is a [http://en.wikipedia.org/wiki/Hardened_Gentoo Hardened Gentoo] derivative. In addition to a very small size and a very comprehensive encryption it has interesting additional security features, such as [http://en.wikipedia.org/wiki/Grsecurity Grsecurity].&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Alpine_Linux Alpine Linux] uses, similar to Tin Hat Linux etc. Kernel functions with Stack Smashing Protection. It uses instead of the standard glibc the uClibc, which means that the Bitcoin client needs to be compiled specifically for this distribution.&lt;br /&gt;
&lt;br /&gt;
===== Linux =====&lt;br /&gt;
====== Protected user account ======&lt;br /&gt;
&lt;br /&gt;
The first step is [https://help.ubuntu.com/8.04/serverguide/C/user-management.html to create a new user], which goes with the command:&lt;br /&gt;
&lt;br /&gt;
sudo adduser &amp;lt;code&amp;gt; new_user_name &amp;lt;/ code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On the message &amp;quot;Enter a new value or press ENTER for the default&amp;quot; one needs only to press the Return key.&lt;br /&gt;
&lt;br /&gt;
Then do you register as a new user, eg &amp;quot;Switch User&amp;quot; with (at Ubuntu in the menu to log off). If you are logged in, we search for the file manager, select this from the home directory (with the house icon), then right-click &amp;quot;Properties&amp;quot;, then the access permissions. Here you select &amp;quot;Other&amp;quot; and set the permissions to &amp;quot;nobody&amp;quot;. With this step, other programs can not read the other user&#039;s wallet.&lt;br /&gt;
&lt;br /&gt;
The newly created user should be safe to use in order to keep him safe, exclusively for Bitcoin.&lt;br /&gt;
&lt;br /&gt;
There is also a good idea to encrypt this user&#039;s home directory with the package ecryptfs-utils.&lt;br /&gt;
&lt;br /&gt;
# If the home directory is not empty, first backup it to some other medium.&lt;br /&gt;
# Now install ecryptfs-utils (Ubuntu: sudo apt-get install ecryptfs-utils)&lt;br /&gt;
# From X11 (graphical system) log and log in with Ctrl + Alt + F1 in the Linux console - if you are logged in X11, the home directory is encrypted.&lt;br /&gt;
# The current directory change so that it is not in the home folder, eg &amp;quot;Cd /&amp;quot;.&lt;br /&gt;
# The migration tool to run: (in Ubuntu: sudo ecryptfs-migrate-home-u username)&lt;br /&gt;
# If it succeeds then you can press ALT + F8 to go back and log in X11.&lt;br /&gt;
# Run the command &#039;ecryptfs-unwrap-passphrase&#039;. Without exception &#039;&#039;&#039;write and store the code that you receive on a secure medium&#039;&#039;. &#039;&#039;&#039;Without this code no data - including the wallet  - can be accessed if the system does not work&#039;&#039;&#039;&lt;br /&gt;
# Run the command &#039;ecryptfs-setup-swap&#039; run, which encrypts the swap partition. Otherwise, keys in your purse in plain text can go to the the swap partition where they might be stolen. This unfortunately also means that &amp;quot;idle&amp;quot; or Hibernate can not be used anymore because the bootloader can not restore the dump. An more conventient alternative is to overwrite the swap partition when you shut down the machine (after the deactivation of virtual memory) with random data.&lt;br /&gt;
&lt;br /&gt;
(Instructions from [http://bodhizazen.net/Tutorials/Ecryptfs/ # Migrate])&lt;br /&gt;
&lt;br /&gt;
====== For more information ======&lt;br /&gt;
* [https://help.ubuntu.com/community/Security Security features on ubuntu]&lt;br /&gt;
&lt;br /&gt;
* [http://www.techrepublic.com/blog/10things/10-ways-to-secure-your-linux-desktop/359 10 ways to secure your lInux desktop]&lt;br /&gt;
&lt;br /&gt;
===== Windows =====&lt;br /&gt;
&lt;br /&gt;
* [http://windows.microsoft.com/de-DE/windows7/help/security-privacy-user-accounts Basics]&lt;br /&gt;
&lt;br /&gt;
* Create an extra user, under which only the Bitcoin software is running. So the wallet is somewhat protected from malicious code in applications for other users:&lt;br /&gt;
** [http://support.microsoft.com/kb/905056/en Windows XP]&lt;br /&gt;
** [http://windows.microsoft.com/en-US/windows7/Create-a-user-account Windows 7]&lt;br /&gt;
&lt;br /&gt;
====Browser Security ====&lt;br /&gt;
&lt;br /&gt;
===== Firefox =====&lt;br /&gt;
To secure the browser, you start Firefox, go to menu &amp;quot;Edit&amp;quot; (edit), and select &amp;quot;Preferences&amp;quot; (Settings).&lt;br /&gt;
&lt;br /&gt;
* Now you start with the tabs on the left, select the &amp;quot;Startup&amp;quot; option &amp;quot;Show a blank page&amp;quot; (Clean Slate).&lt;br /&gt;
* By &amp;quot;content&amp;quot; (content)&lt;br /&gt;
** The option &amp;quot;Load images automatically / Load images automatically&amp;quot; opt out,&lt;br /&gt;
** Also &amp;quot;Enable Javascript Enable / javascript&amp;quot; opt out.&lt;br /&gt;
* In the tab &amp;quot;privacy / data protection&amp;quot; in the &amp;quot;History / History History,&amp;quot; select &amp;quot;Never remember history&amp;quot; / &amp;quot;do not save history&amp;quot;.&lt;br /&gt;
* In the tab &amp;quot;Security&amp;quot; in the &amp;quot;Passwords&amp;quot;&lt;br /&gt;
** The &amp;quot;remember passwords / passwords save&amp;quot; deselect&lt;br /&gt;
** Also &amp;quot;use a master password&amp;quot; / &amp;quot;master password&amp;quot;.&lt;br /&gt;
* Finally, in the tab &amp;quot;Advanced&amp;quot; / &amp;quot;Advanced&amp;quot; option&lt;br /&gt;
** &amp;quot;Automatically check for updates&amp;quot; deselect&lt;br /&gt;
** As &amp;quot;add-ons&amp;quot; and&lt;br /&gt;
** &amp;quot;Search engines&amp;quot; / &amp;quot;search engines&amp;quot; opt out.&lt;br /&gt;
&lt;br /&gt;
If Javascript is disabled, the page linux download page] to download new versions of the Bitcoin Clients will no longer automatically download, so you have to link to the &amp;quot;direct link&amp;quot; on notice &amp;quot;Problems with the download? Please use this &#039;direct link&#039; or try another mirror.&amp;quot; . click Once you make the effort made, of course you checked the download of new clients Bitcoin the checksums, which are indicated on the sourceforge page, with the program sha1.&lt;br /&gt;
&lt;br /&gt;
=== Protect against data loss: Backup ===&lt;br /&gt;
Secure the only file you need is the wallet.dat. Advance to make sure that Bitcoin not running anymore! The best way would be to encrypt the file and store somewhere safe.&lt;br /&gt;
&lt;br /&gt;
You can also [[API | backupwallet]] JSON-RPC command used to create a backup on the fly.&lt;br /&gt;
&lt;br /&gt;
==== Where to find the Bitcoin folder ====&lt;br /&gt;
The [[Bitcoin folder]] is the folder where the data is wallet.dat along with the file.&lt;br /&gt;
&lt;br /&gt;
===== Windows =====&lt;br /&gt;
Click on &amp;quot;Start&amp;quot;, then Run and enter this:&lt;br /&gt;
:% APPDATA% \ Bitcoin&lt;br /&gt;
A folder should open now, for most it would be:&lt;br /&gt;
 C: \ Documents and Settings \ username \ Application Data \ Bitcoin (XP)&lt;br /&gt;
 C: \ Users \ username \ appdata \ roaming \ Bitcoin (Vista and 7)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!---&lt;br /&gt;
&lt;br /&gt;
===== Windows =====&lt;br /&gt;
&lt;br /&gt;
If you are using Windows XP or Windows 7, you can keep your wallet on an encrypted disk image created by third-party software, such as [http://www.truecrypt.org/ TrueCrypt] (open source) or [http: / / www.jetico.com/encryption-bestcrypt/ Jetico BestCrypt] (commercial). You can probably do the same with Windows Vista or Windows 2000.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE:&#039;&#039;&#039; You should configure Bitcoin in this manner only on computers where you use Bitcoin, but not do use that computer to mine. For example, this is a good configuration for a notebook or tablet computer.&lt;br /&gt;
&lt;br /&gt;
Assuming that you have installed the Windows client Bitcoin and run it at least once, the process is Described below.&lt;br /&gt;
&lt;br /&gt;
To mount the &amp;lt;p&amp;gt; Bitcoin DataDirectory on an encrypted drive &amp;lt;/ b&amp;gt; &amp;lt;/ p&amp;gt;&lt;br /&gt;
&amp;lt;ol start=1 type=1&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; use the third-party disk image encryption program of your choice to create and mount an encrypted disk image of at least 100 MB in size. &amp;lt;/ li&amp;gt;&lt;br /&gt;
Locate the &amp;lt;li&amp;gt; Bitcoin data directory, and copy the directory with all contents to the encrypted drive.&lt;br /&gt;
&amp;lt;p&amp;gt; For help finding this directory, see &amp;lt;b&amp;gt; [[# Securing_your_wallet Locating_BitCoin_s_data_directory | Locating Bitcoin&#039;s data directory]] &amp;lt;/ b&amp;gt; &amp;lt;/ p&amp;gt; &amp;lt;/ li&amp;gt;.&lt;br /&gt;
Create a Windows shortcut &amp;lt;li&amp;gt; that starts with the Bitcoin &amp;lt;code&amp;gt;-datadir &amp;lt;/ code&amp;gt; parameter specifier and the encrypted drive and directory.&lt;br /&gt;
&amp;lt;p&amp;gt; For example, if you Bitcoin installed in the default directory, mounted encrypted drive as your Bitcoin &amp;lt;code&amp;gt; E: \ &amp;lt;/ code&amp;gt;, and stored it on your Bitcoin DataDirectory as &amp;lt;code&amp;gt; Bitcoin &amp;lt;/ code&amp;gt;, you would type the following command as the shortcut target: &amp;lt;/ p&amp;gt;&lt;br /&gt;
blockquote &amp;lt;code&amp;gt; C: \ Program Files \ Bitcoin \ bitcoin.exe-datadir = E: \ Bitcoin &amp;lt;/ code&amp;gt; &amp;lt;/ blockquote&amp;gt; &amp;lt;/ li&amp;gt;&lt;br /&gt;
Open &amp;lt;li&amp;gt; Bitcoin&#039;s settings and configure it &amp;lt;b&amp;gt; NOT &amp;lt;/ b&amp;gt; to start automatically when you start Windows.&lt;br /&gt;
This is to allow &amp;lt;p&amp;gt; you to mount the encrypted disk image Bitcoin before starting Bitcoin. &amp;lt;/ p&amp;gt; &amp;lt;/ li&amp;gt;&lt;br /&gt;
Shut down &amp;lt;li&amp;gt; Bitcoin, and then restart it from the new shortcut. &amp;lt;/ li&amp;gt;&lt;br /&gt;
&amp;lt;/ Ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
After doing this, any time you want to use Bitcoin, you must first mount the encrypted disk image Bitcoin using the same drive designation, and then run from the shortcut that you Bitcoin created so that it can find its data and your wallet. :-)&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== Linux =====&lt;br /&gt;
Bitcoin should create a hidden folder in your home directory of the running user.&lt;br /&gt;
 ~ /. Bitcoin /&lt;br /&gt;
&lt;br /&gt;
It should not be there, it can be possibly due&lt;br /&gt;
Find /-name wallet.dat-print 2&amp;gt; / dev / null&lt;br /&gt;
. find Or as root&lt;br /&gt;
: Updatedb&lt;br /&gt;
followed by&lt;br /&gt;
: Locate wallet.dat&lt;br /&gt;
&lt;br /&gt;
The handiest backup method under Linux is probably the copy on one or more wallet.dat used for USB flash drives or memory cards that are kept in a safe place (fireproof safe, bank safe, aquarium with piranhas, etc).&lt;br /&gt;
&lt;br /&gt;
====== Individual encryption of the wallet.dat file ======&lt;br /&gt;
* For individual encryption of the purse, the available cross-platform program&#039;&#039;&#039;[http://ccrypt.sourceforge.net/ ccrypt]&#039;&#039;&#039; is well suited. It encodes a variant of the AES Rijndael algorithm. a recognized standard, which is considered very safe. The plain-text version of Wallet.dat will be replaced automatically. As with all strong encryption, a careful backup of data and keys is essential - under Linux, the risk of loss due to forgetting the key is much higher than by computer intrusions and malware.&lt;br /&gt;
&lt;br /&gt;
* For automatic storage of encrypted copies GnuPG  (Gnu Privacy Guard) is well suited. To encrypt data, ones need  only the public key.  Only to decrypt a backup, the private key is used, which can be stored otherwise in a safe place. Using a fixed pair of keys reduces also the risk of loss of a key by unnoticed typos when typing them.&lt;br /&gt;
&lt;br /&gt;
* Additional protection against attacks by key loggers provide smart cards and hardware tokens like the [http://www.privacyfoundation.de/crypto_stick/ Crypto Stick] the Deutsch Privacy Foundation or the  GnuPG Fellowship smart card. The special advantage is that you GnuPG keys that are very safe due to their length, and can be stored on the smart card. A six-digit PIN code protects the contents of the smart card. If it is entered incorrectly multiple times, then the content will be deleted. [https://www.privacyfoundation.de/wiki/CryptoStickSoftware instructions here].&lt;br /&gt;
&lt;br /&gt;
* Together with the FUSE-based file system [http://de.wikipedia.org/wiki/EncFS EncFS] can you also back up individual files as wallet.dat individually. The entire list can Bitcoin but are not used because the database is encrypted with EncFS.&lt;br /&gt;
&lt;br /&gt;
===== Mac ===== &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Note: The following instruction are not checked due to lack of hardware. Please check and correct if necessary, then remove the note!&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The directory containing the Bitcoin wallet.dat is usually here:&lt;br /&gt;
 ~ / Library / Application Support / Bitcoin /&lt;br /&gt;
&lt;br /&gt;
====== Secure all data (500 megabytes) ======&lt;br /&gt;
These steps (chain wallet and block) of all data stored on Bitcoin an encrypted disk image:&lt;br /&gt;
# Disk Utility Open&lt;br /&gt;
# Click on &amp;quot;New Image&amp;quot;, 500MB, 128-bit or 256-bit (faster or more secure) encryption specify eintelne partition.&lt;br /&gt;
# Copy in a place where you will not lose the image (eg Wuala, Strong Space ofer whatever)&lt;br /&gt;
# A strong and secure password select&lt;br /&gt;
# Copy everything from ~ / Library / Application Support / Bitcoin / in the image&lt;br /&gt;
# Create symlink to the old place, so the app can benuutzen it&lt;br /&gt;
::: Ln-s / Volumes / Bitcoin ~ / Library / Application Support / Bitcoin&lt;br /&gt;
&lt;br /&gt;
Do not forget to mount the image before using Bitcoin and unmount afterwards.&lt;br /&gt;
&lt;br /&gt;
====== Backup file wallet.dat purses alone (40MB ) ======&lt;br /&gt;
These steps only protect the file wallet.dat. This causes a small memory dump, but is more complicated.&lt;br /&gt;
&lt;br /&gt;
# Disk Utility Open&lt;br /&gt;
# Click on &amp;quot;New Image&amp;quot;, 40MB, 128-bit or 256-bit, single select partition.&lt;br /&gt;
# Store in a place where you will not lose the backup.&lt;br /&gt;
# A secure and strong password, select&lt;br /&gt;
# The file wallet.dat move in the image&lt;br /&gt;
# Create symlink to the old place, so the app can find and use the file&lt;br /&gt;
::: Ln-s / Volumes / Bitcoin / wallet.dat ~ / Library / Application Support / Bitcoin / wallet.dat&lt;br /&gt;
&lt;br /&gt;
[[File: MountWalletAndLauchnBitcoin_OSX_Automator.png | thumbnail | 150px | Mount Wallet and launch Bitcoin]]&lt;br /&gt;
Do not forget to mount the image before using Bitcoin and unmount afterwards.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note:&#039;&#039;&#039; If you start the application Bitcoin without the image is mounted, the program is the symlink (a kind of shortcut) wallet.dat with the new one. Do not panic! Rename the new order wallet.dat or delete it, mount the image, and just put a new symlink. The old wallet.dat may of course be canceled under any circumstances.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Automation:&#039;&#039;&#039; The program [http://en.wikipedia.org/wiki/Automator_% 29% 28software Automator] (included in OS X) can automatically mount your wallet and start Bitcoin App.&lt;br /&gt;
&lt;br /&gt;
Alternatively, the following shell script can be used to decrypt wallet.dat which automatically starts the Bitcoin client, and they subsequently re-encrypted. The script works for sowoghl for OSX and Linux: [http://lorelei.kaverit.org/bitcoin.sh Bitcoin-launch-script]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== General solution ====&lt;br /&gt;
wallet.dat is not usually encrypted, everyone who has access to the file, can freely dispose of the coins. You can encrypt your wallet.dat with one of these programs, should there be the slightest chance that someone else has access.&lt;br /&gt;
&lt;br /&gt;
Note: Encryption does not protect the wallet against security risk &#039;&#039;after&#039;&#039; they have occured. Encryping a wallet after finding a computer virus or a trojan helps absolutely nothing. Also, encryption does not help against the complete loss of control which a system compromise means.&lt;br /&gt;
&lt;br /&gt;
* [http://www.7-zip.org/ 7-Zip]&lt;br /&gt;
* [http://www.axantum.com/axcrypt/ AxCrypt]&lt;br /&gt;
* [http://www.truecrypt.org/ TrueCrypt]&lt;br /&gt;
* [http://www.rarlab.com/ WinRar]&lt;br /&gt;
* [http://de.wikipedia.org/wiki/EncFS EncFS] (Linux)&lt;br /&gt;
&lt;br /&gt;
==== Encryption with Smart Card ====&lt;br /&gt;
&lt;br /&gt;
Folders can be encrypted with GnuPG-compatible smart card. A very secure solution is to stick the Crypto Deutsch Privacy Foundation:&lt;br /&gt;
&lt;br /&gt;
[http://www.privacyfoundation.de/crypto_stick/ Crypto Stick overview]&lt;br /&gt;
&lt;br /&gt;
[https://www.privacyfoundation.de/wiki/CryptoStickSoftware Intallation and use]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Storing the Archives ====&lt;br /&gt;
A backup on Flash Media / Memory Sticks and storing them in secure locations is a reasonable solution.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== BOTG: Bitcoin Off The Grid===&lt;br /&gt;
* Another alternative that is suitable for high security requirements,is  &amp;quot;BOTG - Bitcoin off-the-grid&amp;quot; [http://forum.bitcoin.org/index.php?topic=7374.msg108351 see info in the announcement to LinuxCoin]. It is a script that  can create a key pair &#039;&#039;without&#039;&#039; Internet connection. As the private keys are created on a system that does not have Internet access, and are stored offline, they can not get lost via the Internet. The public key can be passed on and received as normal transactions that can be looked up in block Explorer. Only if you want to use the fund, you must import the private key into a Bitcoin client. From then on, the normal safety precautions apply.&lt;br /&gt;
&lt;br /&gt;
=Securing your wallet on Ubuntu and/or Suse=&lt;br /&gt;
For users that use a Linux system that comes with AppArmor, it is probably possible to use&lt;br /&gt;
the MinorFs system with a procedure not unlike that described here for secure ssh without a passphrase:&lt;br /&gt;
&lt;br /&gt;
http://minorfs.polacanthus.net/wiki/Ssh_private_keys_without_passphrase&lt;br /&gt;
&lt;br /&gt;
Its a bit of a hack, but it would make it impossible for malware running under the same user id as&lt;br /&gt;
bitcoin to gain access to the wallet. &lt;br /&gt;
&lt;br /&gt;
It may be worth it if someone would describe the correct procedure to secure the bitcoin wallet using MinorFs/AppArmor in a way similar to described in the above link for ssh keys without passphrases.&lt;br /&gt;
&lt;br /&gt;
= ‘Shred’ cannot always be assumed to be secure on modern filesystems! =&lt;br /&gt;
&lt;br /&gt;
I don&#039;t feel entirely comfortable with the suggested usage of the ‘shred’ command in the given Linux script.  My understanding (and according to shred&#039;s manpage) is that on modern filesystems, it is &#039;&#039;no&#039;&#039; guarantee that when an application like shred asks the OS to overwrite a file, that the file will actually be physically overwritten in place on the disk.  Unless there have been features implemented to allow special handling by the kernel for such security applications (I haven&#039;t investigated, so maybe there are, or maybe not), it would probably be safer to disable all system swap (i.e., with ‘swapoff’) and then store the unencrypted data on a temporary RAM disk only, then unmount the RAM disk afterwards to ensure it never gets written to disk.  I&#039;ve done this before, though unfortunately it&#039;s a bit of a hassle and normally requires running commands that need root privileges or sudo, etc.  Comments?&lt;br /&gt;
~ [[User:Ijel|Ijel]] 03:49, 11 February 2012 (GMT)&lt;/div&gt;</summary>
		<author><name>Ijel</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Talk:Securing_your_wallet&amp;diff=23689</id>
		<title>Talk:Securing your wallet</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Talk:Securing_your_wallet&amp;diff=23689"/>
		<updated>2012-02-11T03:49:21Z</updated>

		<summary type="html">&lt;p&gt;Ijel: /* ‘Shred’ cannot always be assumed to be secure on modern filesystems! */ new section&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The article is too huge. The Mac solution does not scale; the suggested sizes are too low and the maximum size is infinite. [[User:X|X]] 17:10, 8 January 2012 (GMT)&lt;br /&gt;
&lt;br /&gt;
This article needs a rewrite following the introduction of the Bitcoin.org client&#039;s ability to passphrase protect the keys in the wallet.  Perhaps some sections also -- something like &amp;quot;typical consumer use&amp;quot; (where the client&#039;s encryption is adequate) and &amp;quot;commercial-grade protection&amp;quot; where the topics such as encryption at the filesystem is addressed. - [[User:Sgornick|Sgornick]] 10:24, 28 December 2011 (GMT) &lt;br /&gt;
&lt;br /&gt;
The five paragraphs in Technical Background all say the same thing. --[[User:Mcandre|Mcandre]]&lt;br /&gt;
&lt;br /&gt;
Note: the backupwallet.sh script in the linux section doesn&#039;t actually work.&lt;br /&gt;
I suspect it is caused by the wiki changing the formatting.&lt;br /&gt;
I wrote my own version that uses much more standard shell syntax.&lt;br /&gt;
&lt;br /&gt;
[[User:Wscott|Wscott]] 11:28, 11 February 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
I fixed the backupwallet.sh script. It just needed a nowiki tag around a conditional statement. -- [[User:Mweather|Mweather]] 23:48, 20 May 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
The approach for &amp;quot;Making a secure workspace&amp;quot; seems to differ greatly for linux and mac. Why? It seems like if you are going to make firefox secure, which is basically all the linux section recommends, you would want to do that on a mac too. And the recommendation in the mac section to keep the wallet in an encrypted volume with a symlink in the expected system location should be done on a linux box too, shouldn&#039;t it, like using truecrypt or something... Am I wrong??? Can someone with advanced knowledge please advise...? Also, if you want bitcoin to run all the time in the background on linux, but you have it set up in a separate user from your main user account, well, you are out of luck? Can justifications and explanations be added to the recommendations, and also I guess some alternatives with pros and cons be offered, for people with different needs and computing situations. Thanks! --[[User:GusGustavo|GusGustavo]] 13:33, 26 May 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
== Time Sensitivity ==&lt;br /&gt;
&lt;br /&gt;
Is it possible to still send money to my wallet, even if it&#039;s backed up and offline?  Do bitcoins ever expire if they&#039;re not spent, or is there anything bad that can happen by not using my bitcoin client in a long time? [[User:Daniel.benoy|Daniel.benoy]] 23:18, 8 June 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
== How often is it needed to backup the Wallet? ==&lt;br /&gt;
&lt;br /&gt;
Is it necessary to make a backup after each transaction? This page is not clear about this.&lt;br /&gt;
Please add this information to the page!&lt;br /&gt;
&lt;br /&gt;
== Creating a New Wallet ==&lt;br /&gt;
&lt;br /&gt;
This section isn&#039;t helpful; it tells you when to create a new wallet, but not how.  I&#039;m a new user, and the wallet was created when I installed the BitCoin program.  I will find out how to create a new wallet, and then edit this section so that it actually explains the task that it sets out to explain. :-) [[User:ErgoOne|ErgoOne]] 15:19, 9 June 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
== Making a secure workspace ==&lt;br /&gt;
&lt;br /&gt;
For me space needed in ~/Library/Application Support/Bitcoin (Mac) is more than 400MB (!) after having loaded all blocks from bitcoin app. So 100MB is much too small (may be sufficient for just wallet.dat, but then the steps to do had to be changed). [[User:Hartrock|Hartrock]] 18:48, 12 June 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
I updated the wiki steps to just backup wallet.dat --[[User:ChocoboLee|ChocoboLee]] 19:18, 15 June 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
== Flaws with argument regarding encryption ==&lt;br /&gt;
&lt;br /&gt;
Can someone please explain to me how encrypting your wallet will actually protect against a trojan stealing it.  Because once you mount the encrypted file, and decrypt it not only can bitcoin see it but the trojan can as well.  This strategy seems to work only in the following circumstances:&lt;br /&gt;
1. The wallet that has the majority of your cash you never decrypt when you have an open internet connection.&lt;br /&gt;
2. Assumes that a trojan only operates when an internet connection is present and it can transmit the wallet data file.&lt;br /&gt;
&lt;br /&gt;
Even if you were paranoid and never were connected to the internet when the wallet file with the bulk of your funds was decrypted this still would not solve the problem.  In the event that a trojan seeks to copy your wallet file to another location on your computer it could wait for an open internet connection to transmit this data.  So even if you reencrypt the wallet file before connecting to the internet this type of trojan has already made a copy of the decrypted file and can transmit it as soon as an internet connection becomes available.&lt;br /&gt;
&lt;br /&gt;
Also how in the world could you ever use this wallet to transfer cash to another user if you are offline?  Maybe I don&#039;t understand how bitcoin works but don&#039;t you need to be online in order to transfer bitcoins?  Basically the bottom line is that bitcoin cannot read an encrypted wallet file which means that in order to use the wallet you need to decrypt it which means its vulnerable to trojans who can steal it the moment you want to use it.&lt;br /&gt;
&lt;br /&gt;
This seems to be a fundamental flaw in this discussion &amp;quot;securing your wallet&amp;quot;  Why doesn&#039;t bitcoin just address this in the software allowing for the wallet to always be encrypted and require a password upon startup.  If you want bitcoin to go mainstream I don&#039;t understand why you can&#039;t address this fundamental flaw that would be solved by an always encrypted wallet file that the software can read and write to.&lt;br /&gt;
&lt;br /&gt;
::The fundamental flaw is trying to secure the wallet when the whole system is already technically compromised. It does not help to have a secure wallet then. What a trojan could do is, for example, to replace the bitcoin client by a sligthly changed one that usually works as expected, but once in a while sends the money to an address which is owned by the attacker. The people you think you pay will become angry because the money you think to send never does arrive at them. Of course, the malicious client can be intelligent enough to wait until the is some real amount of coins in the play. One day you&#039;ll think you bought a car but the money is somewhere else. The same applies, for example, if the payment addresses you receive are modified by some malicious e-mail program.&lt;br /&gt;
&lt;br /&gt;
::So what is the bottom line? Encrypting the wallet helps against a roommate stealing your coins if he has two minutes of physical access to your computer. It helps against burglary and forgetting the laptop in the train. It generally does NOT help against compromise of the system. The &#039;&#039;&#039;whole&#039;&#039;&#039; system &#039;&#039;&#039;must&#039;&#039;&#039; be kept safe, not just the data in the wallet. And this is not something that the bitcoin software is responsible for. It is the responsibility of the user to install and maintain a secure system. It is a fundamental fallacy to expect that a certain piece of software should still work as the user expects if the whole system is not any more under the control of the user. In this sense, bitcoin can not go mainstream. Instead, main stream users need to reach some point of mental sanity. --[[User:Joise|Joise]] 09:14, 14 August 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
====Added a new entry to backup methods====&lt;br /&gt;
[[WalletPaperbackup]] Is a great way to get your wallet out of the digital world and onto paper&lt;br /&gt;
--[[User:Jrwr|Jrwr]] 02:02, 24 June 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
== Unsecure suggestion for passwords ==&lt;br /&gt;
&lt;br /&gt;
Especially with Bitcoins the Password advice from Gibson Research is dangerous because passwords must&lt;br /&gt;
also be safe in the future when it comes to wallet storing.&lt;br /&gt;
This is definitely not given with this system. It might be true, that&lt;br /&gt;
with today&#039;s brute-force tools, the &amp;quot;d0g...........&amp;quot; pw is safer than&lt;br /&gt;
hkjhHZ756s=&amp;amp;g%7 but in the very near future (maybe already exists)&lt;br /&gt;
there will be new tools, that will find out, what kind of simplifiers&lt;br /&gt;
are often used by humans and will combine brutforce with simplifiers&lt;br /&gt;
and thus come to &amp;quot;d0g............&amp;quot; very quickly!&lt;br /&gt;
&lt;br /&gt;
== Section 4.2 ==&lt;br /&gt;
If you recommend  that one backup wallet.dat on a mac via creating an encrypted image file, don&#039;t you think you should also remind the user to backup his ~/Library/Keychains directory? There is little point in backing up wallet.dmg on Wuala or whatever if you lose your AES key to the image, and the scenario when you need to recover wallet.dmg is probably the scenario where you&#039;ve also lost ~/Library/Keychains... e.g. laptop stolent, etc.&lt;br /&gt;
&lt;br /&gt;
== Back-Translation of German Version ==&lt;br /&gt;
&lt;br /&gt;
Hi,&lt;br /&gt;
&lt;br /&gt;
I have translated the page to the German Version, expanded it by several points and concepts  which seem important to me - namely, a disticion between data confidentality, system integrity and the notion of technical compromise, and adapted the ordering according to these concepts. Here is the back-translated version as a suggestion what could be expanded. I&#039;ve translated it quickly using Google Translate, that means wording and style can&#039;t be expected to be perfect. Nevertheless, I hope it&#039;s helpful. --[[User:Joise|Joise]] 09:14, 14 August 2011 (GMT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Introduction ===&lt;br /&gt;
The security of the wallet can be divided into two separate objectives:&lt;br /&gt;
&lt;br /&gt;
1. Safeguard against loss&lt;br /&gt;
&lt;br /&gt;
2. Secure against theft&lt;br /&gt;
&lt;br /&gt;
In the case of a currently not adequately secured wallet (eg with a weak password uploaded on the Internet):&lt;br /&gt;
&lt;br /&gt;
3. New, create a mew secure wallet (with a reasonably long password)&lt;br /&gt;
&lt;br /&gt;
=== Technical background ===&lt;br /&gt;
The important first objective of the design of the wallet is protection against data loss. The personal bitcoin wallet has a pool of queued keys stored in a file named wallet.dat. The default number is 100 keys in the [[Key Pool | Key pool.]] The number of can be adjusted with the &amp;quot;-keypool&amp;quot; parameter in the command line. If for some reason you need a new address, it is not generated on the fly, but taken from the pool. A new key is then created to fill the pool back to 100 keys. If a backup is first created, it contains all used keys plus 100 unused ones. After a transaction, 99 unused keys remain. After 100 operations which require a new key, new keys are used, which are not present in the backup. Because the backup does not have these new keys, this backup can possibly lead to a recovery loss of Bitcoins if the wallet file is destroyed, for example by a head crash.&lt;br /&gt;
&lt;br /&gt;
The safety of deposits in Bitcoin depends on three conditions:&lt;br /&gt;
# The &#039;&#039;&#039;confidentiality (secrecy)&#039;&#039;&#039; of the private key for the entire time from initial production to final use&lt;br /&gt;
# The &#039;&#039;&#039;integrity&#039;&#039;&#039; of the software on the system used.&lt;br /&gt;
# As well as the &#039;&#039;&#039;protection from loss of wallet&#039;&#039;&#039; eg by failure of the hard disk&lt;br /&gt;
&lt;br /&gt;
The bitcoin software assumes (for very good reasons) that integrity and confidentality of the computer and user account is intact. The reason for this is that, strictly spoken, securing the computer is not the business of some application software like bitcoin. A computer which has not &#039;&#039;&#039;both&#039;&#039;&#039; its confidentiality &#039;&#039;&#039;and&#039;&#039;&#039; integrity ensured, is &#039;&#039;&#039;compromised&#039;&#039;&#039;. This means, that it can not longer be excluded that Bitcoins are stolen. A computer on which &#039;&#039;&#039;malware&#039;&#039;&#039; in the form of some trojan is installed or which runs any virus, is always compromised. All data - including the bitcoin wallet - could be &amp;quot;stolen&amp;quot;. On the other hand - and this is far more far-reaching and important  - the other software on the computer is absolutely no longer under control of the user. A compromised system can &#039;&#039;&#039;only&#039;&#039;&#039; be brought back to a safe condition if it is completely erased, fully installed with a fresh operating system and all new security updates are applied. A &amp;quot;disinfection&amp;quot; of virus-infected programs is not enough! Erasing the old, compromised system can also mean it is necessary to flash the BIOS and do a BIOS update - there is some malware which modifies the BIOS.&lt;br /&gt;
&lt;br /&gt;
A password that belongs to a data backup must be permanently protected from loss just like the files themselves, otherwise in case of doubt the backup is worthless.&lt;br /&gt;
&lt;br /&gt;
=== Securing the confidentiality and integrity of the Wallet and Software ===&lt;br /&gt;
&lt;br /&gt;
==== Creating a New Wallet ====&lt;br /&gt;
&lt;br /&gt;
In the event that the wallet was possibly or actually stored in a compromised state, or spreaded, it is wise to create a new wallet and to transfer all money amounts in the old wallet to the new. Once this is done, someone who has attained knowledge of the old private keys, can not longer use them to steal bitcoins. Keep in mind that leaked keys can be used much later from their generation. For example, if you generate some keys to day, transfer them to a new computer in three years, and throw the old computer in ten years to the trash, and it still contains keys that you have created today, these could still be used to access bitcoins that you received in the meantime.&lt;br /&gt;
&lt;br /&gt;
Creating a new wallet can be useful, for example, if someone has saved a wallet with a password of 12 characters for a service online. Meanwhile, passwords with 12 up to about 15 characters are decoded and the private keys are no longer safe. The strategy only to re-encrypt the wallet is not enough, because the keys are not safe.&lt;br /&gt;
&lt;br /&gt;
==== Creating a safe and secure work space ====&lt;br /&gt;
&lt;br /&gt;
Large and complex programs like Web browsers are never completely safe. Therefore, it is extremely useful, not to run the Bitcoin client program with the user identity that you use to surf the Web or read e-mails. The modern operating systems can isolate applications for different user IDs from each other quite effectively, and this is a huge advantage to security.&lt;br /&gt;
&lt;br /&gt;
===== Digression: Secure Passwords =====&lt;br /&gt;
&lt;br /&gt;
====== Passwords ======&lt;br /&gt;
A proven method for producing safe, but still learnable passwords goes as follows:&lt;br /&gt;
&lt;br /&gt;
* Make up a nonsense phrase like&lt;br /&gt;
 &amp;quot;Thirty crows fly backwards to the moon, but they do not have a ticket.&amp;quot;&lt;br /&gt;
The more bizarre the sentence, the better you remember it.&lt;br /&gt;
&lt;br /&gt;
* The first letters and numbers are used for the password:&lt;br /&gt;
 30CfbwttM,btdnhaT&lt;br /&gt;
&lt;br /&gt;
* Now we get creative and replace a few characters, eg &amp;quot;A&amp;quot; looks like but like &amp;quot;4&amp;quot;:&lt;br /&gt;
 30Cfbw2tM,b|dnh@T&lt;br /&gt;
&lt;br /&gt;
* Now insert one or a few signs that are not found on English keyboards [https://en.bitcoin.it/wiki/Microsoft_Windows_Unicode_Input (Tips)]:&lt;br /&gt;
 3ß0Cþfböw2tM,b|dnh@฿T&lt;br /&gt;
&lt;br /&gt;
Strong passwords are now, where huge computing resources like hashed databases and botnets are available for cracking, about 15 to 20 characters long. Few people can remember so long passwords  error-free, especially if they make some longer holiday. Therefore, write to the password and put it in his wallet. (That&#039;s still heretical but I have a good Reference - [http://en.wikipedia.org/wiki/Bruce_Schneier Bruce Schneier] [http://www.schneier.com/blog/archives/2005/06/write_down_your.html])&lt;br /&gt;
&lt;br /&gt;
* To protect against unauthorized use of the written down password one should append some characters that you really have in your head.&lt;br /&gt;
&lt;br /&gt;
Now it is so that a forgotten password is at least as bad as a cracked. A button labeled &amp;quot;Forgot your password, sent new by e-mail&amp;quot; does not exist in Bitcoin. &#039;&#039;&#039;So the consequence of &amp;quot;Password away&amp;quot; is inevitable &amp;quot;money away &amp;quot;&#039;&#039;&#039;. Don&#039;t forget that!&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;The written-down password&#039;&#039;&#039; should be preserved in something like a bank deposit box (can be rented for a few bucks yearly) or in a fireproof safe. I you have USD 100,000 in BTC, you want to have a fireproof safe if your house has burned down. Believe me.&lt;br /&gt;
&lt;br /&gt;
====== Passphrases (password phrases) or mantras ======&lt;br /&gt;
&lt;br /&gt;
* An alternative to passwords which has at least the same strength against techniques like rainbow tables, &#039;&#039;&#039;but is in comparison  much easier to remember&#039;&#039;&#039; is the use of &#039;&#039;&#039;pass-phrases&#039;&#039;&#039; or a &amp;quot;mantra&amp;quot;. The required length depends on the use. Passphrases for online services may be safe enough with four common words. Secure passphrases for files (which can be rapidly tried off-line) should contain at least six unusual words and at least 35 characters in length. This [http://www.explainxkcd.com/2011/08/10/password-strength/ comic by XKCD] explains the principle.&lt;br /&gt;
&lt;br /&gt;
* An example sentence would be: &amp;quot;The Lemon flambé the okapi a phosphorescent absolution.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Much of the strength of this method relies on technical reasons: Once a password has reached a certain minimal complexity, the fastest way to crack the password is a brute-force search with rainbow tables and charts. And since for this methods, the length of the password is the decisive factor, long pass phrases, which are comparatively much better to remember, win over short very complex passwords (which are hard to remember but easier to crack).&lt;br /&gt;
&lt;br /&gt;
* In-depth information on passphrases here: [http://www.iusmentis.com/security/passphrasefaq/ passphrase FAQ] by Randall T. Williams.&lt;br /&gt;
&lt;br /&gt;
* Warning: Completely unsuitable are fixed expressions and popular idioms. Don&#039;t use any meaningful sentence and anything that might be published on the web.&lt;br /&gt;
&lt;br /&gt;
===== Special Linux distributions =====&lt;br /&gt;
&lt;br /&gt;
To  secure a Windows system comprehensively is a complex and difficult task. Securing which is appropriate for the administration of five-figure amounts requires knowledge which the average user does not have.&lt;br /&gt;
&lt;br /&gt;
As an alternative, there are some special Linux distributions. Using them, one can create a secure space specially for Bitcoin,  and they require almost no setup:&lt;br /&gt;
&lt;br /&gt;
* [http://www.heise.de/ct/projekte/Sicheres-Online-Banking-mit-Bankix-284099.html c&#039;t Bankix], a distribution for online banking, is a adapted and, of course, free version of Ubuntu that was created by the renowned German Heise magazine publisher. Following to the (important) first update the system will be put on a read-only medium and cannot longer be manipulated by unauthorized changes to the software.&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Damn_Small_Linux Damn Small Linux] is a popular, small Debian-based Linux, which contains only the most important functions and thus provides less attack surface. The derivation from Debian guarantees speedy and thorough security updates.&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Knoppix Knoppix] is a popular live-CD distribution with excellent hardware detection, which has a slightly larger footprint than Damn Small Linux, and a number of interesting features. For example, it offers support for blind and visually impaired persons.&lt;br /&gt;
* [http://forum.bitcoin.org/index.php?topic=7374 LinuxCoin], many additional functions for mining&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following distributions are suitable only for users with good knowledge. However, their excellent safety features makes them quite interesting starting points for Bitcoin Appliances:&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Tin_Hat_Linux Tin Hat Linux] is a [http://en.wikipedia.org/wiki/Hardened_Gentoo Hardened Gentoo] derivative. In addition to a very small size and a very comprehensive encryption it has interesting additional security features, such as [http://en.wikipedia.org/wiki/Grsecurity Grsecurity].&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Alpine_Linux Alpine Linux] uses, similar to Tin Hat Linux etc. Kernel functions with Stack Smashing Protection. It uses instead of the standard glibc the uClibc, which means that the Bitcoin client needs to be compiled specifically for this distribution.&lt;br /&gt;
&lt;br /&gt;
===== Linux =====&lt;br /&gt;
====== Protected user account ======&lt;br /&gt;
&lt;br /&gt;
The first step is [https://help.ubuntu.com/8.04/serverguide/C/user-management.html to create a new user], which goes with the command:&lt;br /&gt;
&lt;br /&gt;
sudo adduser &amp;lt;code&amp;gt; new_user_name &amp;lt;/ code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On the message &amp;quot;Enter a new value or press ENTER for the default&amp;quot; one needs only to press the Return key.&lt;br /&gt;
&lt;br /&gt;
Then do you register as a new user, eg &amp;quot;Switch User&amp;quot; with (at Ubuntu in the menu to log off). If you are logged in, we search for the file manager, select this from the home directory (with the house icon), then right-click &amp;quot;Properties&amp;quot;, then the access permissions. Here you select &amp;quot;Other&amp;quot; and set the permissions to &amp;quot;nobody&amp;quot;. With this step, other programs can not read the other user&#039;s wallet.&lt;br /&gt;
&lt;br /&gt;
The newly created user should be safe to use in order to keep him safe, exclusively for Bitcoin.&lt;br /&gt;
&lt;br /&gt;
There is also a good idea to encrypt this user&#039;s home directory with the package ecryptfs-utils.&lt;br /&gt;
&lt;br /&gt;
# If the home directory is not empty, first backup it to some other medium.&lt;br /&gt;
# Now install ecryptfs-utils (Ubuntu: sudo apt-get install ecryptfs-utils)&lt;br /&gt;
# From X11 (graphical system) log and log in with Ctrl + Alt + F1 in the Linux console - if you are logged in X11, the home directory is encrypted.&lt;br /&gt;
# The current directory change so that it is not in the home folder, eg &amp;quot;Cd /&amp;quot;.&lt;br /&gt;
# The migration tool to run: (in Ubuntu: sudo ecryptfs-migrate-home-u username)&lt;br /&gt;
# If it succeeds then you can press ALT + F8 to go back and log in X11.&lt;br /&gt;
# Run the command &#039;ecryptfs-unwrap-passphrase&#039;. Without exception &#039;&#039;&#039;write and store the code that you receive on a secure medium&#039;&#039;. &#039;&#039;&#039;Without this code no data - including the wallet  - can be accessed if the system does not work&#039;&#039;&#039;&lt;br /&gt;
# Run the command &#039;ecryptfs-setup-swap&#039; run, which encrypts the swap partition. Otherwise, keys in your purse in plain text can go to the the swap partition where they might be stolen. This unfortunately also means that &amp;quot;idle&amp;quot; or Hibernate can not be used anymore because the bootloader can not restore the dump. An more conventient alternative is to overwrite the swap partition when you shut down the machine (after the deactivation of virtual memory) with random data.&lt;br /&gt;
&lt;br /&gt;
(Instructions from [http://bodhizazen.net/Tutorials/Ecryptfs/ # Migrate])&lt;br /&gt;
&lt;br /&gt;
====== For more information ======&lt;br /&gt;
* [https://help.ubuntu.com/community/Security Security features on ubuntu]&lt;br /&gt;
&lt;br /&gt;
* [http://www.techrepublic.com/blog/10things/10-ways-to-secure-your-linux-desktop/359 10 ways to secure your lInux desktop]&lt;br /&gt;
&lt;br /&gt;
===== Windows =====&lt;br /&gt;
&lt;br /&gt;
* [http://windows.microsoft.com/de-DE/windows7/help/security-privacy-user-accounts Basics]&lt;br /&gt;
&lt;br /&gt;
* Create an extra user, under which only the Bitcoin software is running. So the wallet is somewhat protected from malicious code in applications for other users:&lt;br /&gt;
** [http://support.microsoft.com/kb/905056/en Windows XP]&lt;br /&gt;
** [http://windows.microsoft.com/en-US/windows7/Create-a-user-account Windows 7]&lt;br /&gt;
&lt;br /&gt;
====Browser Security ====&lt;br /&gt;
&lt;br /&gt;
===== Firefox =====&lt;br /&gt;
To secure the browser, you start Firefox, go to menu &amp;quot;Edit&amp;quot; (edit), and select &amp;quot;Preferences&amp;quot; (Settings).&lt;br /&gt;
&lt;br /&gt;
* Now you start with the tabs on the left, select the &amp;quot;Startup&amp;quot; option &amp;quot;Show a blank page&amp;quot; (Clean Slate).&lt;br /&gt;
* By &amp;quot;content&amp;quot; (content)&lt;br /&gt;
** The option &amp;quot;Load images automatically / Load images automatically&amp;quot; opt out,&lt;br /&gt;
** Also &amp;quot;Enable Javascript Enable / javascript&amp;quot; opt out.&lt;br /&gt;
* In the tab &amp;quot;privacy / data protection&amp;quot; in the &amp;quot;History / History History,&amp;quot; select &amp;quot;Never remember history&amp;quot; / &amp;quot;do not save history&amp;quot;.&lt;br /&gt;
* In the tab &amp;quot;Security&amp;quot; in the &amp;quot;Passwords&amp;quot;&lt;br /&gt;
** The &amp;quot;remember passwords / passwords save&amp;quot; deselect&lt;br /&gt;
** Also &amp;quot;use a master password&amp;quot; / &amp;quot;master password&amp;quot;.&lt;br /&gt;
* Finally, in the tab &amp;quot;Advanced&amp;quot; / &amp;quot;Advanced&amp;quot; option&lt;br /&gt;
** &amp;quot;Automatically check for updates&amp;quot; deselect&lt;br /&gt;
** As &amp;quot;add-ons&amp;quot; and&lt;br /&gt;
** &amp;quot;Search engines&amp;quot; / &amp;quot;search engines&amp;quot; opt out.&lt;br /&gt;
&lt;br /&gt;
If Javascript is disabled, the page linux download page] to download new versions of the Bitcoin Clients will no longer automatically download, so you have to link to the &amp;quot;direct link&amp;quot; on notice &amp;quot;Problems with the download? Please use this &#039;direct link&#039; or try another mirror.&amp;quot; . click Once you make the effort made, of course you checked the download of new clients Bitcoin the checksums, which are indicated on the sourceforge page, with the program sha1.&lt;br /&gt;
&lt;br /&gt;
=== Protect against data loss: Backup ===&lt;br /&gt;
Secure the only file you need is the wallet.dat. Advance to make sure that Bitcoin not running anymore! The best way would be to encrypt the file and store somewhere safe.&lt;br /&gt;
&lt;br /&gt;
You can also [[API | backupwallet]] JSON-RPC command used to create a backup on the fly.&lt;br /&gt;
&lt;br /&gt;
==== Where to find the Bitcoin folder ====&lt;br /&gt;
The [[Bitcoin folder]] is the folder where the data is wallet.dat along with the file.&lt;br /&gt;
&lt;br /&gt;
===== Windows =====&lt;br /&gt;
Click on &amp;quot;Start&amp;quot;, then Run and enter this:&lt;br /&gt;
:% APPDATA% \ Bitcoin&lt;br /&gt;
A folder should open now, for most it would be:&lt;br /&gt;
 C: \ Documents and Settings \ username \ Application Data \ Bitcoin (XP)&lt;br /&gt;
 C: \ Users \ username \ appdata \ roaming \ Bitcoin (Vista and 7)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!---&lt;br /&gt;
&lt;br /&gt;
===== Windows =====&lt;br /&gt;
&lt;br /&gt;
If you are using Windows XP or Windows 7, you can keep your wallet on an encrypted disk image created by third-party software, such as [http://www.truecrypt.org/ TrueCrypt] (open source) or [http: / / www.jetico.com/encryption-bestcrypt/ Jetico BestCrypt] (commercial). You can probably do the same with Windows Vista or Windows 2000.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE:&#039;&#039;&#039; You should configure Bitcoin in this manner only on computers where you use Bitcoin, but not do use that computer to mine. For example, this is a good configuration for a notebook or tablet computer.&lt;br /&gt;
&lt;br /&gt;
Assuming that you have installed the Windows client Bitcoin and run it at least once, the process is Described below.&lt;br /&gt;
&lt;br /&gt;
To mount the &amp;lt;p&amp;gt; Bitcoin DataDirectory on an encrypted drive &amp;lt;/ b&amp;gt; &amp;lt;/ p&amp;gt;&lt;br /&gt;
&amp;lt;ol start=1 type=1&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; use the third-party disk image encryption program of your choice to create and mount an encrypted disk image of at least 100 MB in size. &amp;lt;/ li&amp;gt;&lt;br /&gt;
Locate the &amp;lt;li&amp;gt; Bitcoin data directory, and copy the directory with all contents to the encrypted drive.&lt;br /&gt;
&amp;lt;p&amp;gt; For help finding this directory, see &amp;lt;b&amp;gt; [[# Securing_your_wallet Locating_BitCoin_s_data_directory | Locating Bitcoin&#039;s data directory]] &amp;lt;/ b&amp;gt; &amp;lt;/ p&amp;gt; &amp;lt;/ li&amp;gt;.&lt;br /&gt;
Create a Windows shortcut &amp;lt;li&amp;gt; that starts with the Bitcoin &amp;lt;code&amp;gt;-datadir &amp;lt;/ code&amp;gt; parameter specifier and the encrypted drive and directory.&lt;br /&gt;
&amp;lt;p&amp;gt; For example, if you Bitcoin installed in the default directory, mounted encrypted drive as your Bitcoin &amp;lt;code&amp;gt; E: \ &amp;lt;/ code&amp;gt;, and stored it on your Bitcoin DataDirectory as &amp;lt;code&amp;gt; Bitcoin &amp;lt;/ code&amp;gt;, you would type the following command as the shortcut target: &amp;lt;/ p&amp;gt;&lt;br /&gt;
blockquote &amp;lt;code&amp;gt; C: \ Program Files \ Bitcoin \ bitcoin.exe-datadir = E: \ Bitcoin &amp;lt;/ code&amp;gt; &amp;lt;/ blockquote&amp;gt; &amp;lt;/ li&amp;gt;&lt;br /&gt;
Open &amp;lt;li&amp;gt; Bitcoin&#039;s settings and configure it &amp;lt;b&amp;gt; NOT &amp;lt;/ b&amp;gt; to start automatically when you start Windows.&lt;br /&gt;
This is to allow &amp;lt;p&amp;gt; you to mount the encrypted disk image Bitcoin before starting Bitcoin. &amp;lt;/ p&amp;gt; &amp;lt;/ li&amp;gt;&lt;br /&gt;
Shut down &amp;lt;li&amp;gt; Bitcoin, and then restart it from the new shortcut. &amp;lt;/ li&amp;gt;&lt;br /&gt;
&amp;lt;/ Ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
After doing this, any time you want to use Bitcoin, you must first mount the encrypted disk image Bitcoin using the same drive designation, and then run from the shortcut that you Bitcoin created so that it can find its data and your wallet. :-)&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== Linux =====&lt;br /&gt;
Bitcoin should create a hidden folder in your home directory of the running user.&lt;br /&gt;
 ~ /. Bitcoin /&lt;br /&gt;
&lt;br /&gt;
It should not be there, it can be possibly due&lt;br /&gt;
Find /-name wallet.dat-print 2&amp;gt; / dev / null&lt;br /&gt;
. find Or as root&lt;br /&gt;
: Updatedb&lt;br /&gt;
followed by&lt;br /&gt;
: Locate wallet.dat&lt;br /&gt;
&lt;br /&gt;
The handiest backup method under Linux is probably the copy on one or more wallet.dat used for USB flash drives or memory cards that are kept in a safe place (fireproof safe, bank safe, aquarium with piranhas, etc).&lt;br /&gt;
&lt;br /&gt;
====== Individual encryption of the wallet.dat file ======&lt;br /&gt;
* For individual encryption of the purse, the available cross-platform program&#039;&#039;&#039;[http://ccrypt.sourceforge.net/ ccrypt]&#039;&#039;&#039; is well suited. It encodes a variant of the AES Rijndael algorithm. a recognized standard, which is considered very safe. The plain-text version of Wallet.dat will be replaced automatically. As with all strong encryption, a careful backup of data and keys is essential - under Linux, the risk of loss due to forgetting the key is much higher than by computer intrusions and malware.&lt;br /&gt;
&lt;br /&gt;
* For automatic storage of encrypted copies GnuPG  (Gnu Privacy Guard) is well suited. To encrypt data, ones need  only the public key.  Only to decrypt a backup, the private key is used, which can be stored otherwise in a safe place. Using a fixed pair of keys reduces also the risk of loss of a key by unnoticed typos when typing them.&lt;br /&gt;
&lt;br /&gt;
* Additional protection against attacks by key loggers provide smart cards and hardware tokens like the [http://www.privacyfoundation.de/crypto_stick/ Crypto Stick] the Deutsch Privacy Foundation or the  GnuPG Fellowship smart card. The special advantage is that you GnuPG keys that are very safe due to their length, and can be stored on the smart card. A six-digit PIN code protects the contents of the smart card. If it is entered incorrectly multiple times, then the content will be deleted. [https://www.privacyfoundation.de/wiki/CryptoStickSoftware instructions here].&lt;br /&gt;
&lt;br /&gt;
* Together with the FUSE-based file system [http://de.wikipedia.org/wiki/EncFS EncFS] can you also back up individual files as wallet.dat individually. The entire list can Bitcoin but are not used because the database is encrypted with EncFS.&lt;br /&gt;
&lt;br /&gt;
===== Mac ===== &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Note: The following instruction are not checked due to lack of hardware. Please check and correct if necessary, then remove the note!&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The directory containing the Bitcoin wallet.dat is usually here:&lt;br /&gt;
 ~ / Library / Application Support / Bitcoin /&lt;br /&gt;
&lt;br /&gt;
====== Secure all data (500 megabytes) ======&lt;br /&gt;
These steps (chain wallet and block) of all data stored on Bitcoin an encrypted disk image:&lt;br /&gt;
# Disk Utility Open&lt;br /&gt;
# Click on &amp;quot;New Image&amp;quot;, 500MB, 128-bit or 256-bit (faster or more secure) encryption specify eintelne partition.&lt;br /&gt;
# Copy in a place where you will not lose the image (eg Wuala, Strong Space ofer whatever)&lt;br /&gt;
# A strong and secure password select&lt;br /&gt;
# Copy everything from ~ / Library / Application Support / Bitcoin / in the image&lt;br /&gt;
# Create symlink to the old place, so the app can benuutzen it&lt;br /&gt;
::: Ln-s / Volumes / Bitcoin ~ / Library / Application Support / Bitcoin&lt;br /&gt;
&lt;br /&gt;
Do not forget to mount the image before using Bitcoin and unmount afterwards.&lt;br /&gt;
&lt;br /&gt;
====== Backup file wallet.dat purses alone (40MB ) ======&lt;br /&gt;
These steps only protect the file wallet.dat. This causes a small memory dump, but is more complicated.&lt;br /&gt;
&lt;br /&gt;
# Disk Utility Open&lt;br /&gt;
# Click on &amp;quot;New Image&amp;quot;, 40MB, 128-bit or 256-bit, single select partition.&lt;br /&gt;
# Store in a place where you will not lose the backup.&lt;br /&gt;
# A secure and strong password, select&lt;br /&gt;
# The file wallet.dat move in the image&lt;br /&gt;
# Create symlink to the old place, so the app can find and use the file&lt;br /&gt;
::: Ln-s / Volumes / Bitcoin / wallet.dat ~ / Library / Application Support / Bitcoin / wallet.dat&lt;br /&gt;
&lt;br /&gt;
[[File: MountWalletAndLauchnBitcoin_OSX_Automator.png | thumbnail | 150px | Mount Wallet and launch Bitcoin]]&lt;br /&gt;
Do not forget to mount the image before using Bitcoin and unmount afterwards.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note:&#039;&#039;&#039; If you start the application Bitcoin without the image is mounted, the program is the symlink (a kind of shortcut) wallet.dat with the new one. Do not panic! Rename the new order wallet.dat or delete it, mount the image, and just put a new symlink. The old wallet.dat may of course be canceled under any circumstances.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Automation:&#039;&#039;&#039; The program [http://en.wikipedia.org/wiki/Automator_% 29% 28software Automator] (included in OS X) can automatically mount your wallet and start Bitcoin App.&lt;br /&gt;
&lt;br /&gt;
Alternatively, the following shell script can be used to decrypt wallet.dat which automatically starts the Bitcoin client, and they subsequently re-encrypted. The script works for sowoghl for OSX and Linux: [http://lorelei.kaverit.org/bitcoin.sh Bitcoin-launch-script]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== General solution ====&lt;br /&gt;
wallet.dat is not usually encrypted, everyone who has access to the file, can freely dispose of the coins. You can encrypt your wallet.dat with one of these programs, should there be the slightest chance that someone else has access.&lt;br /&gt;
&lt;br /&gt;
Note: Encryption does not protect the wallet against security risk &#039;&#039;after&#039;&#039; they have occured. Encryping a wallet after finding a computer virus or a trojan helps absolutely nothing. Also, encryption does not help against the complete loss of control which a system compromise means.&lt;br /&gt;
&lt;br /&gt;
* [http://www.7-zip.org/ 7-Zip]&lt;br /&gt;
* [http://www.axantum.com/axcrypt/ AxCrypt]&lt;br /&gt;
* [http://www.truecrypt.org/ TrueCrypt]&lt;br /&gt;
* [http://www.rarlab.com/ WinRar]&lt;br /&gt;
* [http://de.wikipedia.org/wiki/EncFS EncFS] (Linux)&lt;br /&gt;
&lt;br /&gt;
==== Encryption with Smart Card ====&lt;br /&gt;
&lt;br /&gt;
Folders can be encrypted with GnuPG-compatible smart card. A very secure solution is to stick the Crypto Deutsch Privacy Foundation:&lt;br /&gt;
&lt;br /&gt;
[http://www.privacyfoundation.de/crypto_stick/ Crypto Stick overview]&lt;br /&gt;
&lt;br /&gt;
[https://www.privacyfoundation.de/wiki/CryptoStickSoftware Intallation and use]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Storing the Archives ====&lt;br /&gt;
A backup on Flash Media / Memory Sticks and storing them in secure locations is a reasonable solution.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== BOTG: Bitcoin Off The Grid===&lt;br /&gt;
* Another alternative that is suitable for high security requirements,is  &amp;quot;BOTG - Bitcoin off-the-grid&amp;quot; [http://forum.bitcoin.org/index.php?topic=7374.msg108351 see info in the announcement to LinuxCoin]. It is a script that  can create a key pair &#039;&#039;without&#039;&#039; Internet connection. As the private keys are created on a system that does not have Internet access, and are stored offline, they can not get lost via the Internet. The public key can be passed on and received as normal transactions that can be looked up in block Explorer. Only if you want to use the fund, you must import the private key into a Bitcoin client. From then on, the normal safety precautions apply.&lt;br /&gt;
&lt;br /&gt;
=Securing your wallet on Ubuntu and/or Suse=&lt;br /&gt;
For users that use a Linux system that comes with AppArmor, it is probably possible to use&lt;br /&gt;
the MinorFs system with a procedure not unlike that described here for secure ssh without a passphrase:&lt;br /&gt;
&lt;br /&gt;
http://minorfs.polacanthus.net/wiki/Ssh_private_keys_without_passphrase&lt;br /&gt;
&lt;br /&gt;
Its a bit of a hack, but it would make it impossible for malware running under the same user id as&lt;br /&gt;
bitcoin to gain access to the wallet. &lt;br /&gt;
&lt;br /&gt;
It may be worth it if someone would describe the correct procedure to secure the bitcoin wallet using MinorFs/AppArmor in a way similar to described in the above link for ssh keys without passphrases.&lt;br /&gt;
&lt;br /&gt;
== ‘Shred’ cannot always be assumed to be secure on modern filesystems! ==&lt;br /&gt;
&lt;br /&gt;
I don&#039;t feel entirely comfortable with the suggested usage of the ‘shred’ command in the given Linux script.  My understanding (and according to shred&#039;s manpage) is that on modern filesystems, it is &#039;&#039;no&#039;&#039; guarantee that when an application like shred asks the OS to overwrite a file, that the file will actually be physically overwritten in place on the disk.  Unless there have been features implemented to allow special handling by the kernel for such security applications (I haven&#039;t investigated, so maybe there are, or maybe not), it would probably be safer to disable all system swap (i.e., with ‘swapoff’) and then store the unencrypted data on a temporary RAM disk only, then unmount the RAM disk afterwards to ensure it never gets written to disk.  I&#039;ve done this before, though unfortunately it&#039;s a bit of a hassle and normally requires running commands that need root privileges or sudo, etc.  Comments?&lt;br /&gt;
~ [[User:Ijel|Ijel]] 03:49, 11 February 2012 (GMT)&lt;/div&gt;</summary>
		<author><name>Ijel</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Weaknesses&amp;diff=23688</id>
		<title>Weaknesses</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Weaknesses&amp;diff=23688"/>
		<updated>2012-02-11T02:40:25Z</updated>

		<summary type="html">&lt;p&gt;Ijel: Update some broken forum links&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Might be a problem ==&lt;br /&gt;
=== Wallet Vulnerable To Theft ===&lt;br /&gt;
&lt;br /&gt;
The [[wallet]] is stored unencrypted, by default, and thus becomes a valuable target for theft.  Recent releases of the Bitcoin client now supports encryption to protect the wallet data, though the user must opt-in.&lt;br /&gt;
&lt;br /&gt;
=== Tracing a coin&#039;s history ===&lt;br /&gt;
Tracing a coin&#039;s history can be used to connect identities to addresses. [[Anonymity|More info]].&lt;br /&gt;
&lt;br /&gt;
=== Cancer nodes ===&lt;br /&gt;
It&#039;s trivial for an attacker to fill the network with clients controlled by him. This might be helpful in the execution of other attacks.&lt;br /&gt;
&lt;br /&gt;
For example, an attacker might connect 100,000 IP addresses to the IRC bootstrap channel. You would then be very likely to connect only to attacker nodes. This state can be exploited in (at least) the following ways:&lt;br /&gt;
* The attacker can refuse to relay blocks and transactions from everyone, disconnecting you from the network.&lt;br /&gt;
* The attacker can relay only blocks that he creates, putting you on a separate network. You&#039;re then open to double-spending attacks.&lt;br /&gt;
* If you rely on transactions with 0 confirmations, the attacker can just filter out certain transactions to execute a double-spending attack.&lt;br /&gt;
* Low-latency encryption/anonymization of Bitcoin&#039;s transmissions (With Tor, JAP, etc.) can be defeated relatively easy with a timing attack if you&#039;re connected to several of the attacker&#039;s nodes and the attacker is watching your transmissions at your ISP.&lt;br /&gt;
&lt;br /&gt;
Bitcoin makes these attacks more difficult by only making an outbound connection to one IP address per /16 (x.y.0.0). Incoming connections are unlimited and unregulated, but this is generally only a problem in the anonymity case, where you&#039;re probably already unable to accept incoming connections.&lt;br /&gt;
&lt;br /&gt;
Looking for suspiciously low network hash-rates may help prevent the second one.&lt;br /&gt;
&lt;br /&gt;
=== No authentication for IP transfers ===&lt;br /&gt;
Since there&#039;s no authentication when sending to an [[IP address]] (as opposed to a [[Address|Bitcoin address]]), executing a man-in-the-middle attack and stealing the sent BitCoins is trivial. This attack is downright &#039;&#039;likely&#039;&#039; if you&#039;re using Tor.&lt;br /&gt;
&lt;br /&gt;
=== Packet sniffing ===&lt;br /&gt;
Someone who can see all of your Internet traffic can easily see when you send a transaction that you didn&#039;t receive (which means that it&#039;s yours). This would be made more difficult (but not impossible) if node-to-node encryption was used.&lt;br /&gt;
&lt;br /&gt;
=== Denial of Service (DoS) attacks ===&lt;br /&gt;
Sending lots of data to a node may make it so busy it cannot process normal bitcoin transactions.  Bitcoin has some denial-of-service prevention built-in (it will drop connections to peers that send it too much data too quickly), but is likely still vulnerable to more sophisticated denial-of-service attacks.&lt;br /&gt;
&lt;br /&gt;
=== Forcing clock drift against a target node ===&lt;br /&gt;
&lt;br /&gt;
See [http://culubas.blogspot.com/2011/05/timejacking-bitcoin_802.html Timejacking] for a description of this attack. It can be fixed by changing how nodes calculate the current time.&lt;br /&gt;
&lt;br /&gt;
=== Illegal content in the block chain ===&lt;br /&gt;
It is illegal in some countries to possess/distribute certain kinds of data. Since arbitrary data can be included in Bitcoin transactions, and clients must normally have a copy of all unspent transactions, this could cause legal problems.&lt;br /&gt;
&lt;br /&gt;
Unspent transactions can be safely forgotten if more than half of all users are forgetting those transactions. If a miner neglects to forget an unspent transaction and is in the minority, its blocks will be rejected by the majority if those transactions are subsequently spent. Probably users will not want to coordinate enough to forget illegal transactions, as it would require a high degree of centralization. Miners can safely refuse to accept illegal transactions, which may be enough to avoid legal problems, but this is basically impractical due to illegal content being extremely complex to detect.&lt;br /&gt;
&lt;br /&gt;
Transaction data can also be deleted with minimal risk if it can be proven that data will never be used. For example, if the standard template for a tx output is used, the only place you can put arbitrary data is the pubkey hash. If you set this to, say, English text or part of a JPEG, that tx output can be deleted because the chances of anyone finding a public key that hashes to that specific bit of meaningful data is very remote. However, someone could still encrypt the data so miners cannot detect it, and this carries the same liability for miners who neglect to drop it.&lt;br /&gt;
&lt;br /&gt;
== Probably not a problem ==&lt;br /&gt;
&lt;br /&gt;
===Breaking the cryptography===&lt;br /&gt;
SHA-256 and ECDSA are considered very strong currently, but they might be broken in the far future. If that happens, BitCoin can shift to a stronger algorithm. [https://bitcointalk.org/index.php?topic=191.msg1585#msg1585 More info].&lt;br /&gt;
&lt;br /&gt;
===Scalability===&lt;br /&gt;
BitCoin can easily scale beyond the level of traffic VISA sees globally today. See the discussion on the [[scalability]] page for more information.&lt;br /&gt;
&lt;br /&gt;
===Segmentation===&lt;br /&gt;
If there is even a &amp;quot;trickle&amp;quot; of a connection between two sides of a segmented network, things should still work perfectly. When block chains are combined, all of the non-generation transactions in the shorter chain are re-added to the transaction pool -- they&#039;ll start over at 0/unconfirmed, but they&#039;ll still be valid. No mature transactions will be lost unless the segmentation persists for longer than ~120 blocks. Then generations will start to mature, and any transactions based on those generations will become invalid when recombined with the longer chain. [https://bitcointalk.org/index.php?topic=241.msg2071#msg2071 More info].&lt;br /&gt;
&lt;br /&gt;
=== Attacking all users ===&lt;br /&gt;
The IP addresses of most users are totally public. You can use Tor to hide this, but the network won&#039;t work if everyone does this. BitCoin requires that &#039;&#039;some&#039;&#039; country is still free.&lt;br /&gt;
&lt;br /&gt;
=== Dropping transactions ===&lt;br /&gt;
Nodes that generate blocks can choose not to include a transaction in their blocks. When this happens, the transaction remains &amp;quot;active&amp;quot; and can be included in a later block. Two things discourage this:&lt;br /&gt;
* Nodes only hash a fixed-size &#039;&#039;header&#039;&#039;, so there is no speed advantage to dropping transactions.&lt;br /&gt;
* [[Satoshi]] has [https://bitcointalk.org/index.php?topic=165.msg1595#msg1595 communicated] that he will write code to stop this kind of thing if it becomes a problem.&lt;br /&gt;
&lt;br /&gt;
=== Attacker has a lot of computing power ===&lt;br /&gt;
An attacker that controls more than 50% of the network&#039;s computing power can, for the time that he is in control, exclude and modify the ordering of transactions. This allows him to:&lt;br /&gt;
* Reverse transactions that he sends while he&#039;s in control&lt;br /&gt;
* Prevent some or all transactions from gaining any confirmations&lt;br /&gt;
* Prevent some or all other miners from mining any valid blocks&lt;br /&gt;
The attacker &#039;&#039;can&#039;t&#039;&#039;:&lt;br /&gt;
* Reverse other people&#039;s transactions&lt;br /&gt;
* Prevent transactions from being sent at all (they&#039;ll show as 0/unconfirmed)&lt;br /&gt;
* Change the number of coins generated per block&lt;br /&gt;
* Create coins out of thin air&lt;br /&gt;
* Send coins that never belonged to him&lt;br /&gt;
&lt;br /&gt;
It&#039;s much more difficult to change historical blocks, and it becomes exponentially more difficult the further back you go. As above, changing historical blocks only allows you to exclude and change the ordering of transactions. It&#039;s impossible to change blocks created before the last checkpoint.&lt;br /&gt;
&lt;br /&gt;
Since this attack doesn&#039;t permit all that much power over the network, it is expected that no one will attempt it. A profit-seeking person will always gain more by just following the rules, and even someone trying to destroy the system will probably find other attacks more attractive. However, if this attack is successfully executed, it will be difficult or impossible to &amp;quot;untangle&amp;quot; the mess created -- any changes the attacker makes might become permanent.&lt;br /&gt;
&lt;br /&gt;
=== Spamming transactions ===&lt;br /&gt;
&lt;br /&gt;
It is easy to send transactions to yourself repeatedly. If these transactions fill blocks to the maximum size (1MB), other transactions would be delayed until the next block.&lt;br /&gt;
&lt;br /&gt;
This is made expensive by the [[transaction fee|fees]] that would be required after the 50KB of free transactions per block are exhausted. An attacker will eventually eliminate free transactions, but Bitcoin fees will always be low because raising fees above 0.01 BTC per KB would require spending transaction fees. An attacker will eventually run out of money. Even if an attacker wants to waste money, transactions are further prioritized by the time since the coins were last spent, so attacks spending the same coins repeatedly are less effective.&lt;br /&gt;
&lt;br /&gt;
=== The &amp;quot;Finney&amp;quot; attack ===&lt;br /&gt;
Named for Hal Finney, who first described this variation of a double-spend attack involving accepting [http://www.bitcointalk.org/index.php?topic=3441.msg48384#msg48384 0-confirmation transactions].  Accepting 0-confirmation large-value transactions is problematic; accepting them for low-value transactions (after waiting several seconds to detect an ordinary double-spend attempt) is probably safe.&lt;br /&gt;
&lt;br /&gt;
===Rival/malicious client code===&lt;br /&gt;
Any rival client must follow Bitcoin&#039;s rules or else all current BitCoin clients will ignore it. You&#039;d have to actually get people to &#039;&#039;use&#039;&#039; your client. A better client that pretends to follow the same rules, but with an exception known only to the author (possibly by making it closed source), might conceivably be able to gain widespread adoption. At that point, its author could use his exception and go largely unnoticed.&lt;br /&gt;
&lt;br /&gt;
== Definitely not a problem ==&lt;br /&gt;
&lt;br /&gt;
===Coin destruction===&lt;br /&gt;
Bitcoin has 2.1 quadrillion raw units, making up 8 decimals of BTC precision, so the entire network could potentially operate on much less than the full quantity of Bitcoins. If deflation gets to the point where transactions of more than 10 BTC are unheard of, clients can just switch to another unit so that, for example, it shows 10 mBTC rather than 0.01 BTC.&lt;br /&gt;
&lt;br /&gt;
The maximum number of raw units might not be enough if the &#039;&#039;entire world&#039;&#039; starts using BTC, but it would not be too difficult to increase precision in that case. The transaction format and version number would be scheduled to change at some particular block number after a year or two, and everyone would have to update by then.&lt;br /&gt;
&lt;br /&gt;
===Generating tons of addresses===&lt;br /&gt;
Generating an address doesn&#039;t touch the network at all. You&#039;d only be wasting your CPU resources and disk space.&lt;br /&gt;
&lt;br /&gt;
Also, a collision is highly unlikely.&lt;br /&gt;
&lt;br /&gt;
Keys are 256 bit in length and are hashed in a 160 bit address.(2^160th power)&lt;br /&gt;
Divide it by the world population and you have about 215,000,000,000,000,000,000,000,000,000,000,000,000 addresses per capita.(2.15 x 10^38)[http://www.wolframalpha.com/input/?i=2^160+%2F+world+population]&lt;br /&gt;
&lt;br /&gt;
===Everyone calculates at the same rate===&lt;br /&gt;
If everyone began with identical blocks and started their nonce at 1 and incremented, the fastest machine would always win. However, each block contains a new, random public key known only to you in the list of transactions.  The 256-bit &amp;quot;Merkle tree&amp;quot; hash of this is part of the block header.&lt;br /&gt;
&lt;br /&gt;
So everyone begins with slightly different blocks and everyone truly has a random chance of winning (modified by CPU power).&lt;br /&gt;
&lt;br /&gt;
===Generate &amp;quot;valid&amp;quot; blocks with a lower difficulty than normal===&lt;br /&gt;
Using unmodified Bitcoin code, an attacker could segment himself from the main network and generate a long block chain with a lower difficulty than the real network. These blocks would be totally valid for his network. However, it would be impossible to combine the two networks (and the &amp;quot;false&amp;quot; chain would be destroyed in the process).&lt;br /&gt;
&lt;br /&gt;
* Even though your network&#039;s difficulty can be less than the real difficulty, this doesn&#039;t give you any advantage over the real network. You&#039;ll gain ground when the real network is taking more than 10 minutes to generate a block, but you&#039;ll lose ground when the network takes less than 10 minutes.&lt;br /&gt;
* Every few releases of Bitcoin, a recent block hash is hardcoded into the source code. Any blocks before that point can&#039;t be changed. An attacker starting at that point would have to reduce the difficulty, but this would require him to generate blocks at a much slower rate than once per 10 minutes. By the time he finally gets to a difficulty of 1, a new version of Bitcoin with an updated hardcoded block will probably have been released.&lt;br /&gt;
* &amp;quot;Block chain length&amp;quot; is calculated from the combined difficulty of all the blocks, not just the number of blocks in the chain. The one that represents the most CPU usage will win.&lt;br /&gt;
&lt;br /&gt;
[[Category:Technical]]&lt;/div&gt;</summary>
		<author><name>Ijel</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=23686</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=23686"/>
		<updated>2012-02-11T02:34:32Z</updated>

		<summary type="html">&lt;p&gt;Ijel: General copyediting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The purpose of this page is to provide a general overview of the Bitcoin system and economy.&lt;br /&gt;
&lt;br /&gt;
==Basic Concepts==&lt;br /&gt;
&lt;br /&gt;
===Currency===&lt;br /&gt;
&lt;br /&gt;
Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. A dollar bill is a piece of paper which is very easy to create (by those who can), but which is accepted by people in exchange for valuable products and services in the real world, such as the socks Alice wants to buy. One simple thing Alice can do is put a dollar bill in an envelope, mail it to Bob, and then wait for Bob to send the socks to her.&lt;br /&gt;
&lt;br /&gt;
===Banks===&lt;br /&gt;
&lt;br /&gt;
Another thing Alice can do is to &amp;quot;wire&amp;quot; the money to Bob. She can do that by first giving her dollar bills to an institution called a bank, the job of which is to safe-keep Alice&#039;s dollar bills and, in return, to give Alice a written promise (called a &amp;quot;bank statement&amp;quot;) that, whenever she wishes, she can come to the bank to take back the same number of dollar bills that she deposited. Since the money is still Alice&#039;s, she is entitled to do with it whatever she pleases, and the bank (like most banks), for a small fee, will do Alice the service of &amp;quot;giving&amp;quot; the dollar bills to Bob instead of her. This could be done by sending a person to Bob&#039;s door, with Alice&#039;s dollar bills in hand but usually it is done by Alice&#039;s bank by giving the dollar bills to Bob&#039;s bank and informing them that the money is for Bob, who will then see the amount in his next statement, or, if he is in a hurry, the next time he contacts his bank asking about how much money they have for him.&lt;br /&gt;
&lt;br /&gt;
Since banks have many customers, and bank employees require money for doing the job of talking to people and signing documents, banks in recent times have been using machines such as ATMs and web servers that do the job of interacting with customers instead of paid bank employees. The job of these machines is to learn what each customer wants to do with his money and, to the extent that it is possible, act on what the customer wants (for example, ATMs can hand cash). The people can always know how much money they have in their accounts, and they are confident that the numbers they see in their bank statements and on their computer screens accurately reflect the number of dollars that they can get from the bank on demand. They can be so sure of this that they can accept those numbers in the same way they accept paper dollars (this is similar to the way people started accepting paper dollars when they had been accepting gold or silver).&lt;br /&gt;
&lt;br /&gt;
Such a system has several disadvantages:&lt;br /&gt;
* It is costly. EFTs in Europe can cost 25 euros. Credit transactions can cost several percent of the transaction.&lt;br /&gt;
* It is slow. Checking services take days to complete.&lt;br /&gt;
* In most cases, it cannot be anonymous.&lt;br /&gt;
* Accounts can be frozen. &lt;br /&gt;
* Banks and other payment processors like PayPal, Visa, and Mastercard can and sometimes do refuse to process payments for legal entities. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bitcoin is a system of owning and voluntarily transferring amounts of so-called &#039;&#039;bitcoins&#039;&#039;, in a manner similar to an on-line banking interface, but anonymously and without reliance on a central authority to maintain account balances. These bitcoins are valuable because they are useful and limited in supply.&lt;br /&gt;
&lt;br /&gt;
==Bitcoin Basics==&lt;br /&gt;
&lt;br /&gt;
===Creation of coins===&lt;br /&gt;
The creation of coins must be limited for the currency to have any value. &lt;br /&gt;
&lt;br /&gt;
New coins are slowly [[Mining|mined]] into existence by following a mutually agreed-upon set of rules. A user [[Mining|mining]] bitcoins is running a program that searches tirelessly for a solution to a very difficult math problem whose difficulty is precisely known. The difficulty is automatically adjusted regularly so that the number of solutions found globally, by everyone, is constant: an average of 6 per hour. When a solution is found, the user may tell everyone of the existence of this newly found solution, along with other information, packaged together in what is called a &amp;quot;[[Block|block]]&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Blocks contain 50 bitcoins at present. This amount is an incentive for people to perform the computation work required for block generation. Roughly every 4 years, the number of bitcoins that can be &amp;quot;mined&amp;quot; in a block reduces by 50%. Any blocks that are created by a malicious user that do not follow this rule (or any other rules) will be rejected by everyone else. The result is that no more than 21 million bitcoins will ever exist. &lt;br /&gt;
&lt;br /&gt;
Because the mining incentive to put forth the computational power to create blocks will eventually diminish, miners will some day instead pay for their hardware and electricity costs by collecting [[Transaction_fee|transaction fees]]. The sender of money may voluntarily pay a small transaction fee which will be kept by whoever finds the next block. Paying this fee will encourage the miner to include the transaction in a block more quickly.&lt;br /&gt;
&lt;br /&gt;
===Transferring a coin===&lt;br /&gt;
To guarantee that an eavesdropper, Eve, cannot access other people&#039;s bitcoins by creating transactions in their names we use a [[Wikipedia:Public-key_cryptography|public key system]] to make digital signatures. In this system, each person, such as Alice or Bob, has a pair of public and private keys which he/she stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the transaction to give some of his bitcoins to somebody else, but any one can validate the signature using the user’s public key.&lt;br /&gt;
&lt;br /&gt;
Suppose Alice wants to send a bitcoin to Bob.&lt;br /&gt;
* Bob sends his public key to Alice.&lt;br /&gt;
* Alice adds Bob’s public key along with the amount she wants to transfer to a message: a &#039;transaction&#039; message.&lt;br /&gt;
* Alice signs the transaction with her secret private key.&lt;br /&gt;
* Alice broadcasts the transaction out over the bitcoin network for all to see.&lt;br /&gt;
&lt;br /&gt;
(Only the first step is actually completed by a human. The rest is done by the bitcoin client software.)&lt;br /&gt;
&lt;br /&gt;
As a result, anyone who knows the public keys of both Alice and Bob can now see that Alice agreed to transfer the amount to Bob, because nobody other than Alice has Alice&#039;s private key. Alice would be foolish to give her private key to other people, as this would allow them to sign transactions in her name, removing funds from her control.&lt;br /&gt;
&lt;br /&gt;
Later on, when Bob wishes to transfer the same bitcoin to Charley, he will do the same thing:&lt;br /&gt;
* Charlie sends Bob his public key.&lt;br /&gt;
* Bob adds Charlie&#039;s public key along with the amount he wants to transfer to a message: a &#039;transaction&#039; message.&lt;br /&gt;
* Bob signs the transaction with his private key.&lt;br /&gt;
* Bob broadcasts the transaction out over the bitcoin network for all to see. &lt;br /&gt;
&lt;br /&gt;
Only Bob can do this because only Bob has the private key that corresponds to the public key Alice included in the previous transaction. &lt;br /&gt;
&lt;br /&gt;
Eve cannot change who the coins belong to by replacing Bob’s public key with her public key, because Alice signed the transfer to Bob using her private key, declaring that the coins which belonged to her now belong to Bob, and Alice&#039;s private key is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
===Preventing double-spending===&lt;br /&gt;
The process described above does not prevent Alice from using a coin in more than one transaction. The following process does. This is the primary innovation behind Bitcoin.&lt;br /&gt;
&lt;br /&gt;
* Details about the [[Transactions|transaction]] are [[Network|sent and forwarded]] to all or as many other computers as possible.&lt;br /&gt;
* A constantly growing chain of [[Blocks|blocks]] that contains a record of all transactions is collectively maintained by all computers (each has a full copy).&lt;br /&gt;
* To be accepted in the chain, transaction blocks must be valid and must include [[proof of work]] (one block generated by the network every 10 minutes).&lt;br /&gt;
* Blocks are chained in a way so that, if any one is modified, all following blocks will have to be recomputed.&lt;br /&gt;
* When multiple valid continuations to this chain appear, only the longest such branch is accepted and it is then extended further.&lt;br /&gt;
&lt;br /&gt;
When Bob sees that his transaction has been included in a block, which has been made part of the single longest and fastest-growing block chain (extended with significant computational effort), he can be confident that the transaction by Alice has been accepted by the computers in the network and is permanently recorded, preventing Alice from creating a second transaction with the same coin. In order for Alice to thwart this system and double-spend her coins, she would need to muster more computing power than all other bitcoin users combined.&lt;br /&gt;
&lt;br /&gt;
===Anonymity===&lt;br /&gt;
There are no bitcoin &amp;quot;accounts&amp;quot; to set up, no e-mail addresses and no user-names and passwords to give, just for owning bitcoins. Each balance is simply associated with a randomly generated public-private key pair, and the money &amp;quot;belongs&amp;quot; to whoever has the private key and can sign transactions with it. Moreover, those keys do not have to be registered anywhere in advance, as they are only actually used if and when there is a transaction involving them. Transacting parties do not need to know each other&#039;s identity in the same way that a store owner does not know Bob&#039;s name is Bob when Bob goes and buys groceries with cash.&lt;br /&gt;
&lt;br /&gt;
A [[Address|Bitcoin address]] mathematically corresponds to a public key and looks like this:&lt;br /&gt;
&lt;br /&gt;
:15VjRaDX9zpbA8LVnbrCAFzrVzN7ixHNsC&lt;br /&gt;
&lt;br /&gt;
Each person can have many such addresses, each with its own balance, which makes it very difficult to know which person owns what amount. In order to protect his [[Anonymity|privacy]], Bob can even generate a new public-private key pair for each individual transaction. The Bitcoin software encourages this behavior by default. Continuing the example from above, when Charlie receives the bitcoin from Bob, Charlie will not be able to identify who owned the coin before Bob (not without asking Bob).&lt;br /&gt;
&lt;br /&gt;
You have completed reading our Bitcoin introduction!&lt;br /&gt;
&lt;br /&gt;
==Where to see and explore==&lt;br /&gt;
You can directly explore the system in action by visiting [http://blockchain.info/ Blockchain.info] or [http://blockexplorer.com/ Bitcoin Block Explorer].&lt;br /&gt;
The site shows you the latest blocks in the block chain. The [[Block_chain|block chain]] contains the agreed history of all transactions that took place in the system.&lt;br /&gt;
Note how many blocks were generated in the last hour, which on average will be 6. Also notice the number of transactions and the total amount transferred in the last hour (last time I checked it was about 64 and 15K).&lt;br /&gt;
This should give you an indication of how active the system is.&lt;br /&gt;
&lt;br /&gt;
Next, navigate to one of these blocks.&lt;br /&gt;
The block&#039;s [[hash|hash]] begins with a run of zeros. This is what made creating the block so difficult; a hash that begins with many zeros is much more difficult to find than a hash with few or no zeros. The computer that generated this block had to try many &#039;&#039;Nonce&#039;&#039; values (also listed on the block&#039;s page) until it found one that generated this run of zeros.&lt;br /&gt;
Next, see the line titled &#039;&#039;Previous block&#039;&#039;. Each block contains the hash of the block that came before it. This is what forms the chain of blocks.&lt;br /&gt;
Now take a look at all the transactions the block contains. The first transaction is the income earned by the computer that generated this block. It includes a fixed amount of coins created out of &amp;quot;thin air&amp;quot; and possibly a fee collected from other transactions in the same block.&lt;br /&gt;
&lt;br /&gt;
Drill down into any of the transactions and you will see how it is made up of one or more amounts coming in and out.&lt;br /&gt;
Having more than one incoming and outgoing amount in a transaction enables the system to join and break amounts in any possible way, allowing for any fractional amount needed. Each incoming amount is a past transaction (which you can also view) from someone&#039;s address, and each outgoing amount is addressed to someone and will be part of a future transaction (which you can also navigate down into if it has already taken place.)&lt;br /&gt;
&lt;br /&gt;
Finally you can follow any of the [[Address|addresses]] links and see what public information is available for them.&lt;br /&gt;
&lt;br /&gt;
To get an impression of the amount of activity on the Bitcoin network, you might like to visit the monitoring websites [[Bitcoin Monitor]] and [[Bitcoin Watch]]. The first shows a real-time visualization of events on the Bitcoin network, and the second lists general statistics on the amount and size of recent transactions.&lt;br /&gt;
&lt;br /&gt;
===How many people use Bitcoin?===&lt;br /&gt;
&lt;br /&gt;
This is quite a difficult question to answer accurately. The best estimation is to count how many bitcoin clients connected to the network in the last 24 hours. We can do this as the clients transmit their addresses to the other members of the network periodically. The estimate as of September 2011 is about 60,000 users. To get a more current estimate see [http://bitcoinstatus.rowit.co.uk/ Bitcoin Network Status Charts]&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
* [http://www.youtube.com/watch?v=Um63OQz3bjo What is Bitcoin?] video introduction&lt;br /&gt;
* Installing Bitcoin [[getting started]] &lt;br /&gt;
* [[How bitcoin works]]&lt;br /&gt;
* [[Using Bitcoin]]&lt;br /&gt;
* A gentle introduction to Bitcoin - [[BitcoinMe]]&lt;br /&gt;
* [http://coinlab.com/2011/12/bitcoin-primer Bitcoin Primer] from CoinLab&lt;br /&gt;
* Another introduction, &#039;&#039;The Rebooting Of Money&#039;&#039; podcast is found at [[Bitcoin Money]]&lt;br /&gt;
* A beginner&#039;s step-by-step guide to using Bitcoin, use of alternative wallets, and generally keeping your money and computer secure - [http://BitcoinIntro.com BitcoinIntro.com]&lt;br /&gt;
&lt;br /&gt;
[[zh-cn:简介]]&lt;br /&gt;
&lt;br /&gt;
[[de:Einführung]]&lt;/div&gt;</summary>
		<author><name>Ijel</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=User:Ijel&amp;diff=23684</id>
		<title>User:Ijel</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=User:Ijel&amp;diff=23684"/>
		<updated>2012-02-11T01:57:41Z</updated>

		<summary type="html">&lt;p&gt;Ijel: Created page with &amp;quot;Hi. I like to proofread things and stuff. :-)  Contributors Award participant: 1DZiVND3NWkMZ9x5MS6HMc8YTfvYd9Si7W&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hi. I like to proofread things and stuff. :-)&lt;br /&gt;
&lt;br /&gt;
Contributors Award participant: 1DZiVND3NWkMZ9x5MS6HMc8YTfvYd9Si7W&lt;/div&gt;</summary>
		<author><name>Ijel</name></author>
	</entry>
</feed>