<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://en.bitcoin.it/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Peterjames</id>
	<title>Bitcoin Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://en.bitcoin.it/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Peterjames"/>
	<link rel="alternate" type="text/html" href="https://en.bitcoin.it/wiki/Special:Contributions/Peterjames"/>
	<updated>2026-04-14T19:15:02Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Storing_bitcoins&amp;diff=66614</id>
		<title>Storing bitcoins</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Storing_bitcoins&amp;diff=66614"/>
		<updated>2019-06-29T08:02:00Z</updated>

		<summary type="html">&lt;p&gt;Peterjames: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page is a discussion of the different ways of storing bitcoins, whether for [[Bitcoin as an investment|investment purposes]] or as a [[Bitcoin as a medium of exchange|medium of exchange]].&lt;br /&gt;
&lt;br /&gt;
As bitcoin is a digital asset, it can be very un-intuitive to store safely. Historically many people have lost their coins but with proper understanding the risks can be eliminated. If your bitcoins do end up lost or stolen then there&#039;s almost certainly nothing that can be done to get them back.&lt;br /&gt;
&lt;br /&gt;
tl;dr The best way to store bitcoin is to either use a [[hardware wallet]], a [[Multisignature|multisignature wallet]] or a [[Cold storage|cold storage wallet]]. Have your wallet create a [[seed phrase]], write it down on paper and store it in a safe place (or several safe places, as backups). The wallet should be backed by your own [[full node]].&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Storage of bitcoin can be broken down in a few independent goals:&lt;br /&gt;
&lt;br /&gt;
* Protection against accidental loss&lt;br /&gt;
* Verification that the bitcoins are genuine&lt;br /&gt;
* Privacy and protection against spying&lt;br /&gt;
* Protection against theft&lt;br /&gt;
* Easy access for spending or moving bitcoins&lt;br /&gt;
&lt;br /&gt;
The art and science of storing bitcoins is about keeping your private keys safe, yet remaining easily available to you when you want to make a transaction. It also requires verifying that you received real bitcoins, and stopping an adversary from spying on you.&lt;br /&gt;
&lt;br /&gt;
[[File:Mnemonic-seed-still-life.jpg|300px|thumb|alt=An example seed phrase written on paper|Example seed phrase on paper.]]&lt;br /&gt;
&lt;br /&gt;
=== Protection from accidental loss ===&lt;br /&gt;
&lt;br /&gt;
In the past many people have accidentally lost bitcoins because of failed backups, mistyped letters, forgotten hard drives or corrupted SSD devices. Through bitter experience it was found that one of the most practical storage mediums is &#039;&#039;&#039;pencil and paper&#039;&#039;&#039;. The private keys of a bitcoin wallet are encoded into [[seed phrase|random words from a dictionary]] which can be written down. If your hard drive crashes, you can find the paper with the [[seed phrase]] and restore the entire wallet. All good wallet software asks their users to write down the [[seed phrase|seed recovery phrase]] of the wallet. It is a good idea to keep backup copies in several locations.&lt;br /&gt;
&lt;br /&gt;
As [[seed phrase]]s use natural language words, they have good error correction. Words written in bad handwriting can often still be read. If one or two letters are missing the word can often still be deduced. The [[Seed_phrase#Word_Lists|word list]] that the seed phrase words are drawn from is carefully chosen so that the first four letters of each word are enough to uniquely identify it.&lt;br /&gt;
&lt;br /&gt;
=== Verification and privacy ===&lt;br /&gt;
&lt;br /&gt;
Storing a [[seed phrase]] only stores [[Private key|private keys]], but it cannot tell you if or how many bitcoins you have actually received. For that you need wallet software.&lt;br /&gt;
&lt;br /&gt;
If you received cash banknotes or gold coins as payment, you wouldn&#039;t accept them without verifying that the banknotes were genuine and that the gold was real. The same is true with bitcoin. Payments must be genuine or else you may be slipped counterfeit bitcoins and be left out of pocket. The most secure kind of wallet is one which independently verifies &#039;&#039;all&#039;&#039; the rules of bitcoin, known as a [[full node]]. For receiving large volumes it is essential to use wallet software backed by a [[full node]]. If bitcoin is digital gold, then a [[full node]] is your own personal goldsmith who checks that received bitcoin payments are actually real. Lightweight wallets which don&#039;t check all of bitcoin&#039;s rules are only appropriate for receiving smaller amounts or when you trust the sender. See the article about [[full node|full nodes]].&lt;br /&gt;
&lt;br /&gt;
Your wallet software will also need to learn the history and balance of its wallet. For a lightweight wallet this usually involves querying a third-party server which leads to a privacy problem as that server can spy on you by seeing your entire balance, all your transactions and usually linking it with your IP address. Using a [[full node]] avoids this problem because the software connects directly to the bitcoin p2p network and downloads the entire [[blockchain]], so any adversary will find it much harder to obtain information. See also: [[Anonymity]]&lt;br /&gt;
&lt;br /&gt;
So for verification and privacy, a good storage solution should be backed by a [[full node]] under your own control for use when receiving payments. The [[full node]] wallet on an online computer can be a [https://whotookmycrypto.com/watch-only-wallets/ watch-only wallet]. This means that it can detect transaction involving addresses belonging to the user and can display transaction information about them, but still does not have the ability to actually spend the bitcoins.&lt;br /&gt;
&lt;br /&gt;
=== Protection from theft ===&lt;br /&gt;
&lt;br /&gt;
Possession of bitcoins comes from your ability to keep the private keys under your exclusive control. In bitcoin, keys are money. Any malware or hackers who learn what your private keys are can create a valid bitcoin transaction sending your coins to themselves, effectively stealing your bitcoins. The average person&#039;s computer is usually vulnerable to malware so that must be taken into account when deciding on storage solutions. Anybody else who discovers a wallet&#039;s [[seed phrase]] can steal all the bitcoins, so it must be kept safe and secret like jewels or cash. In particular phrases should not be typed into any website.&lt;br /&gt;
&lt;br /&gt;
[[Seed phrase]]s can store any amount of bitcoins. It doesn&#039;t seem secure to possibly have enough money to purchase the entire building just sitting on a sheet of paper without any protection. For this reason many wallets make it possible to encrypt a seed phrase with a password. See [[Seed phrase#Two-Factor_Seed_Phrases]]&lt;br /&gt;
&lt;br /&gt;
=== Easy access ===&lt;br /&gt;
&lt;br /&gt;
Some users may not need to actually move their bitcoins very often, especially if they [[Bitcoin as an investment|own bitcoin as an investment]]. Other users will want to be able to quickly and easily move their coins. A solution for storing bitcoins should take into account how convenient it is to spend from depending on the user&#039;s needs.&lt;br /&gt;
&lt;br /&gt;
=== Summary ===&lt;br /&gt;
&lt;br /&gt;
In summary: bitcoin wallets should be backed up by writing down their [[seed phrase]], this phrase must be kept safe and secret, and when sending or receiving transactions the wallet software should obtain information about the bitcoin network from your own [[full node]].&lt;br /&gt;
&lt;br /&gt;
== Discussion of wallet solutions ==&lt;br /&gt;
&lt;br /&gt;
=== Hardware wallets ===&lt;br /&gt;
&lt;br /&gt;
[[Hardware wallet]]s are special purpose security-hardened devices for storing Bitcoins on a peripheral that is trusted to generate wallet keys and sign transactions.&lt;br /&gt;
&lt;br /&gt;
A [[hardware wallet]] typically holds the private keys in its internal storage and is designed to be malware resistant. The device signs the transactions internally and only transmits the signed transactions to the computer. The separation of the private keys from the vulnerable environment allows the user to spend bitcoins without running any risk even when using an untrustworthy computer. Hardware wallets are relatively user-friendly and are a top solution for holding private keys.&lt;br /&gt;
&lt;br /&gt;
Some downsides are that hardware wallets are recognizable physical objects which could be discovered and which prove that you probably own bitcoins. This is worth considering when for example crossing borders. They also cost more than software wallets. Still physical access to a hardware wallet, even though it reduces its security strength, does not mean that the keys are easily compromised. The companies creating them, have gone to great lengths to secure them and, though not impossible, only technically skilled people with specialized equipment have been able to get access to the private keys without the owner&#039;s knowledge. However, physically-powerful people such as armed border guards upon seeing the hardware wallet could force you to type in the PIN number to unlock the device and steal the bitcoins.&lt;br /&gt;
&lt;br /&gt;
Main article: [[Hardware wallet]]&lt;br /&gt;
&lt;br /&gt;
=== Multisignature wallets ===&lt;br /&gt;
&lt;br /&gt;
A multisignature wallet is one where multiple private keys are required to move the bitcoins instead of a single key, avoiding a single point of failure. These private keys can be spread across multiple machines in various locations with the rationale that malware and hackers are unlikely to infect all of them. The multisig wallet can be of the m-of-n type where any m private keys out of a possible n are required to move the money. For example a 2-of-3 multisig wallet might have your private keys spread across a desktop, laptop and smartphone; any two are required to move the money but the loss of any one does not result in loss of money especially because they can be restored from paper backup.&lt;br /&gt;
&lt;br /&gt;
Multisignature wallets have the advantage of being cheaper than hardware wallets since they are implemented in software and can be downloaded for free, as well as being convenient as all keys are online and the wallet user interfaces are typically easy to use. Wallet software [[Electrum]] and [[Armory]] can create multisig wallets. Hardware and multisignature wallets can be combined by having a multisignature wallet with the private keys held on hardware wallets; after all a single hardware wallet is still a single point of failure. Cold storage and multisignature can also be combined, by having the multisignature wallet with the private keys held in cold storage to avoid them being kept online.&lt;br /&gt;
&lt;br /&gt;
Main article: [[Multisignature]]&lt;br /&gt;
&lt;br /&gt;
=== Cold storage wallets ===&lt;br /&gt;
&lt;br /&gt;
A cold wallet generates and stores private wallet keys offline on a clean, newly-installed [https://en.wikipedia.org/wiki/Air_gap_(networking) air-gapped] computer. Payments are received online with a [https://whotookmycrypto.com/watch-only-wallets/ watch-only wallet]. Unsigned transactions are generated online, transferred offline for signing, and the signed transaction is transferred online to be broadcast to the Bitcoin network.&lt;br /&gt;
&lt;br /&gt;
This allows funds to be managed offline in [[Cold storage]]. Used correctly a cold wallet is protected against online threats, such as viruses and hackers. Cold wallets are similar to hardware wallets, except that a general purpose computing device is used instead of a special purpose peripheral. The downside is that the transferring of transactions to and fro can be fiddly and unweilding, and less practical for carrying around like a hardware wallet.&lt;br /&gt;
&lt;br /&gt;
Main article: [[Cold storage]]&lt;br /&gt;
&lt;br /&gt;
=== Hot wallets ===&lt;br /&gt;
&lt;br /&gt;
A hot wallet refers to keeping single-signature wallets with private keys kept on an online computer or mobile phone. Most bitcoin wallet software out there is a hot wallet. The bitcoins are easy to spend but are maximally vulnerable to malware or hackers. Hot wallets may be appropriate for small amounts and day-to-day spending.&lt;br /&gt;
&lt;br /&gt;
Main article: [[Hot wallet]]&lt;br /&gt;
&lt;br /&gt;
== Bad wallet ideas ==&lt;br /&gt;
&lt;br /&gt;
=== Custodial wallets ===&lt;br /&gt;
&lt;br /&gt;
Custodial wallets are where an exchange, broker or other third party holds your bitcoins in trust.&lt;br /&gt;
&lt;br /&gt;
The number one rule to storing bitcoin is this: if you don’t hold the private keys, you don’t actually own the assets. There are many historical examples of loss due to custodial wallets: Bitcoinica, Silk Road, Bitfloor, [[Collapse of Mt. Gox|MTGOX]], Sheep Marketplace, BTC-e, Bitstamp, Bitfinex, Bithumb, Cryptsy, Bter, Mintpal and many more&amp;lt;ref&amp;gt;https://bitcointalk.org/index.php?topic=576337&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;Isn&#039;t it just like keeping your money in a bank?&amp;quot; ====&lt;br /&gt;
&lt;br /&gt;
:There are trade offs with everything, but trusting Coinbase with your Bitcoin is &#039;&#039;not&#039;&#039; the same as trusting a bank with your dollars:&lt;br /&gt;
&lt;br /&gt;
:Suppose 5 people are needed to access the funds, within Coinbase, e.g. the CEO, the tech lead engineer and 3 other senior employees. Suppose one day they wake up and decide to be evil and move all the Bitcoin to some private account of theirs, and perhaps make up a story in the press about how they&#039;ve been &amp;quot;hacked&amp;quot;. You have a serious problem, as you might find there is a protracted legal battle (see MtGox), but you can&#039;t actually retrieve the funds unless in some way the company is re-stocked with Bitcoin, or perhaps an equivalent in fiat.&lt;br /&gt;
&lt;br /&gt;
:If on the other hand you controlled the funds with a majority of keys in a multisig i.e. you own both of the two needed keys of a 2-of-3 multisig, then it would always effectively be your bitcoin, even though the third key may belong to a trusted third party custodian. But this also comes with the responsibility that if you get hacked, you lose all your funds. That is why it&#039;s prudent, in a 2-of-3 multisig where you have the two needed keys, to have them in separate systems/locations. If one of them fails, you can go to the custodian to supply the third key and transfer your funds again to safety. But the custodian alone, cannot touch your funds just by virtue of having the third key.&lt;br /&gt;
&lt;br /&gt;
:Now, if your bank gets hacked similarly - 5 key operatives in the bank decide to swipe your money and pretend it was external hackers - SWIFT transfers are made to accounts in Russia and China. Here it will always ultimately be at the discretion of legal agencies whether you &amp;quot;actually&amp;quot; still have the money that is stolen. Because dollars are not real, they can be created at a whim&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Fractional-reserve_banking&amp;lt;/ref&amp;gt;, and while reversing international transfers is not &#039;&#039;quite&#039;&#039; so simple, very often that reversal can be achieved (e.g. recent SWIFT hack at bangladesh&amp;lt;ref&amp;gt;https://www.wired.com/2016/05/insane-81m-bangladesh-bank-heist-heres-know/&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Bangladesh_Bank_robbery&amp;lt;/ref&amp;gt; bank; $1 billion stolen, all but $80 million &amp;quot;recovered&amp;quot; (just means wire transfers reversed)). Added to that consider that fiat money is insured, so even when transfers can&#039;t be reversed, the money can be &amp;quot;recovered&amp;quot;. If too many banks get hacked all at once the Federal Reserve and the government together can make up some &amp;quot;fund&amp;quot; that magically reassigns balances any time they like, with sufficient political will (that&#039;s essentially what was happening in 2008 TARP etc).&lt;br /&gt;
&lt;br /&gt;
:So far no insurance company has ever paid out on a Bitcoin company&#039;s claim. Worth considering also.&lt;br /&gt;
&lt;br /&gt;
:You might say, since it&#039;s risky both ways, why not trust Coinbase? Aren&#039;t they more competent in security than me?&lt;br /&gt;
&lt;br /&gt;
:Almost certainly, but this argument has two massive holes in it: (1) because they &#039;&#039;concentrate&#039;&#039; funds they are a massive target for hackers, while you are not - at all. (2) they are a &#039;&#039;trusted third party&#039;&#039; so the situation is strictly worse - not only do you have to trust their security skills, but you also have to trust them not to steal (modulo multisig, as mentioned above) (edited to add: as well as literal stealing, there is things like political confiscation, don&#039;t forget).&amp;lt;ref&amp;gt;https://www.reddit.com/r/Bitcoin/comments/5py495/brian_armstrong_controlling_your_own_wealth_as_a/dcve9xx/?context=3&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Web wallets ===&lt;br /&gt;
&lt;br /&gt;
Web wallets have all the downsides of custodial wallets (no direct possession, private keys are held by a third party) along with all the downsides of hot wallets (exposed private keys), as well as all the downsides of lightweight wallets (not verifying bitcoin&#039;s rules, someone could send you a billion bitcoins and under certain conditions the dumb web wallet would happily accept it)&lt;br /&gt;
&lt;br /&gt;
Someone who needs the easy access of a web wallet should download a lightweight wallet like [[Electrum]].&lt;br /&gt;
&lt;br /&gt;
Main article: [[Browser-based wallet]]&lt;br /&gt;
&lt;br /&gt;
=== Paper wallets ===&lt;br /&gt;
&lt;br /&gt;
So-called [[paper wallets]] are an obsolete and unsafe method of storing bitcoin which should not be recommended to beginners. They simply store a single private/public keypair on paper. They promote [[address reuse]] and require unwieldy and complicated live OS system boots to be safe, they risk theft by printers, and typically rely on [[Javascript cryptography]].&lt;br /&gt;
&lt;br /&gt;
Paper wallets also do not provide any method of displaying to the user when money has arrived. There&#039;s no practical way to use a [[full node]] wallet. Users are typically driven to use third-party blockchain explorers which can lie to them and spy on them.&lt;br /&gt;
&lt;br /&gt;
A much better way to accomplish what paper wallets do is to use [[seed phrase]]s instead.&lt;br /&gt;
&lt;br /&gt;
Main article: [[Paper wallets]]&lt;br /&gt;
&lt;br /&gt;
=== Cloud storage ===&lt;br /&gt;
&lt;br /&gt;
This means storing your encrypted (or not) wallet file on a cloud storage solution such as Dropbox, or emailing them to yourself on gmail. This very similar to trusting a custodial wallet service, and is not recommended for the same reasons&amp;lt;ref&amp;gt;https://www.reddit.com/r/Bitcoin/comments/8i6via/28_btc_stolen_10_btc_reward_please_help/&amp;lt;/ref&amp;gt;. You might say you use encryption for two-factor authentication, but uploading the wallet to the cloud reduces this to one-factor.&lt;br /&gt;
&lt;br /&gt;
=== Removable media ===&lt;br /&gt;
&lt;br /&gt;
This refers to storing wallet files on removable media like SSD or hard drives.&lt;br /&gt;
&lt;br /&gt;
Refer to the warnings from these two links:&lt;br /&gt;
&lt;br /&gt;
* https://www.reddit.com/r/Bitcoin/comments/6nj0eb/reminder_beware_of_data_rot_always_make_paper/&lt;br /&gt;
&lt;br /&gt;
* https://tedjonesweb.blogspot.co.uk/2017/08/do-not-use-flash-memory-ssd-drives.html&lt;br /&gt;
&lt;br /&gt;
Those articles recommend using GPG for encryption or a printer, instead a better solution is [[seed phrase]]s.&lt;br /&gt;
&lt;br /&gt;
== Other ideas ==&lt;br /&gt;
&lt;br /&gt;
=== Time-locked wallets ===&lt;br /&gt;
&lt;br /&gt;
An interesting unconventional solution. The idea is to use [[Timelock|time-lock contracts]] to create a wallet which cannot be spent from until a certain date. One possible use-case might be by a gambling addict who locks up money for paying bills for a month, after a month has passed and their time-lock wallet is opened they use that money for paying bills instead of gambling. This is the equivalent proposal towards compulsive shoppers to freeze their credit card in a block of ice, so when they feel the urge to immediately buy something they see on the TV, they will need to wait for the block to melt until they can retrieve the credit card to be able to place the order. This hopefully gives them the time to cool off, and reconsider an otherwise meaningless purchase.&lt;br /&gt;
&lt;br /&gt;
Time lock wallets don&#039;t exist yet except for simple [https://coinb.in/#newTimeLocked javascript pages] which rely on [[Javascript cryptography]] and are therefore not safe.&lt;br /&gt;
&lt;br /&gt;
=== Consulting ===&lt;br /&gt;
&lt;br /&gt;
If you intend to store a very large amount of bitcoins, for example in a business, you should consider paying for security consulting.&lt;br /&gt;
&lt;br /&gt;
== The 5 dollar wrench attack ==&lt;br /&gt;
&lt;br /&gt;
[[File:Security.png|400px|none|alt=xkcd comic on the 5 dollar wrench attack.]]&lt;br /&gt;
&lt;br /&gt;
It&#039;s sometimes said that all this security is worthless because the $5 wrench attack can be used.&lt;br /&gt;
&lt;br /&gt;
There are two ways to beat this attack: by hiding or by defending yourself.&lt;br /&gt;
&lt;br /&gt;
Stored bitcoins are not secured by [[seed phrase]]s, [[hardware wallet]]s, [[multisignature]], passwords, hash functions or anything like that; they are secured by &#039;&#039;people&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Technology is never the root of system security. Technology is a tool to help people secure what they value. Security requires people to act. A server cannot be secured by a firewall if there is no lock on the door to the server room, and a lock cannot secure the server room without a guard to monitor the door, and a guard cannot secure the door without risk of personal harm.&amp;lt;ref&amp;gt;[https://github.com/libbitcoin/libbitcoin/wiki/Risk-Sharing-Principle Libbitcoin wiki Risk Sharing Principle]&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Bitcoin is no different. The technology discussed on this page is only a tool to tip the scales in the defender&#039;s favour. Following from this principle, the way to beat the $5 wrench attack is to bear arms. Either your own, or employ guards, or use a safety deposit box, or rely on the police forces and army; or whatever may be appropriate and proportionate in your situation. If someone physically overpowers you then no technology on Earth can save your bitcoins. You can&#039;t be your own bank without bank-level security.&lt;br /&gt;
&lt;br /&gt;
See Also: [https://twitter.com/i/moments/942083114385281024 Guns + Bitcoin Hardware Wallets]&lt;br /&gt;
&lt;br /&gt;
== Further reading ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/BlockchainCommons/SmartCustodyWhitePapers/blob/master/%23SmartCustody-_Simple_Self-Custody_Cold_Storage_Scenario.md SmartCustody: Simple Self-Custody Cold Storage Scenario]&lt;br /&gt;
&lt;br /&gt;
* https://bitzuma.com/posts/a-gentle-introduction-to-bitcoin-cold-storage/&lt;br /&gt;
&lt;br /&gt;
* https://medium.com/@lopp/thoughts-on-secure-storage-of-bitcoins-and-other-crypto-assets-210cadabb53d&lt;br /&gt;
&lt;br /&gt;
* https://medium.com/@michaelflaxman/how-should-i-store-my-bitcoin-43874ac208e4&lt;br /&gt;
&lt;br /&gt;
* Two-factor authentication on custodial wallets doesn&#039;t work as well as you might think https://medium.com/@CodyBrown/how-to-lose-8k-worth-of-bitcoin-in-15-minutes-with-verizon-and-coinbase-com-ba75fb8d0bac&lt;br /&gt;
&lt;br /&gt;
* This is why you shouldn’t use texts for two-factor authentication https://www.theverge.com/2017/9/18/16328172/sms-two-factor-authentication-hack-password-bitcoin Hacking 2FA based on SMS is easy.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Security]]&lt;/div&gt;</summary>
		<author><name>Peterjames</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Storing_bitcoins&amp;diff=66598</id>
		<title>Storing bitcoins</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Storing_bitcoins&amp;diff=66598"/>
		<updated>2019-06-29T04:35:48Z</updated>

		<summary type="html">&lt;p&gt;Peterjames: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page is a discussion of the different ways of storing bitcoins, whether for [[Bitcoin as an investment|investment purposes]] or as a [[Bitcoin as a medium of exchange|medium of exchange]].&lt;br /&gt;
&lt;br /&gt;
As bitcoin is a digital asset, it can be very un-intuitive to store safely. Historically many people have lost their coins but with proper understanding the risks can be eliminated. If your bitcoins do end up lost or stolen then there&#039;s almost certainly nothing that can be done to get them back.&lt;br /&gt;
&lt;br /&gt;
tl;dr The best way to store bitcoin is to either use a [[hardware wallet]], a [[Multisignature|multisignature wallet]] or a [[Cold storage|cold storage wallet]]. Have your wallet create a [[seed phrase]], write it down on paper and store it in a safe place (or several safe places, as backups). The wallet should be backed by your own [[full node]].&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Storage of bitcoin can be broken down in a few independent goals:&lt;br /&gt;
&lt;br /&gt;
* Protection against accidental loss&lt;br /&gt;
* Verification that the bitcoins are genuine&lt;br /&gt;
* Privacy and protection against spying&lt;br /&gt;
* Protection against theft&lt;br /&gt;
* Easy access for spending or moving bitcoins&lt;br /&gt;
&lt;br /&gt;
The art and science of storing bitcoins is about keeping your private keys safe, yet remaining easily available to you when you want to make a transaction. It also requires verifying that you received real bitcoins, and stopping an adversary from spying on you.&lt;br /&gt;
&lt;br /&gt;
[[File:Mnemonic-seed-still-life.jpg|300px|thumb|alt=An example seed phrase written on paper|Example seed phrase on paper.]]&lt;br /&gt;
&lt;br /&gt;
=== Protection from accidental loss ===&lt;br /&gt;
&lt;br /&gt;
In the past many people have accidentally lost bitcoins because of failed backups, mistyped letters, forgotten hard drives or corrupted SSD devices. Through bitter experience it was found that one of the most practical storage mediums is &#039;&#039;&#039;pencil and paper&#039;&#039;&#039;. The private keys of a bitcoin wallet are encoded into [[seed phrase|random words from a dictionary]] which can be written down. If your hard drive crashes, you can find the paper with the [[seed phrase]] and restore the entire wallet. All good wallet software asks their users to write down the [[seed phrase|seed recovery phrase]] of the wallet. It is a good idea to keep backup copies in several locations.&lt;br /&gt;
&lt;br /&gt;
As [[seed phrase]]s use natural language words, they have good error correction. Words written in bad handwriting can often still be read. If one or two letters are missing the word can often still be deduced. The [[Seed_phrase#Word_Lists|word list]] that the seed phrase words are drawn from is carefully chosen so that the first four letters of each word are enough to uniquely identify it.&lt;br /&gt;
&lt;br /&gt;
=== Verification and privacy ===&lt;br /&gt;
&lt;br /&gt;
Storing a [[seed phrase]] only stores [[Private key|private keys]], but it cannot tell you if or how many bitcoins you have actually received. For that you need wallet software.&lt;br /&gt;
&lt;br /&gt;
If you received cash banknotes or gold coins as payment, you wouldn&#039;t accept them without verifying that the banknotes were genuine and that the gold was real. The same is true with bitcoin. Payments must be genuine or else you may be slipped counterfeit bitcoins and be left out of pocket. The most secure kind of wallet is one which independently verifies &#039;&#039;all&#039;&#039; the rules of bitcoin, known as a [[full node]]. For receiving large volumes it is essential to use wallet software backed by a [[full node]]. If bitcoin is digital gold, then a [[full node]] is your own personal goldsmith who checks that received bitcoin payments are actually real. Lightweight wallets which don&#039;t check all of bitcoin&#039;s rules are only appropriate for receiving smaller amounts or when you trust the sender. See the article about [[full node|full nodes]].&lt;br /&gt;
&lt;br /&gt;
Your wallet software will also need to learn the history and balance of its wallet. For a lightweight wallet this usually involves querying a third-party server which leads to a privacy problem as that server can spy on you by seeing your entire balance, all your transactions and usually linking it with your IP address. Using a [[full node]] avoids this problem because the software connects directly to the bitcoin p2p network and downloads the entire [[blockchain]], so any adversary will find it much harder to obtain information. See also: [[Anonymity]]&lt;br /&gt;
&lt;br /&gt;
So for verification and privacy, a good storage solution should be backed by a [[full node]] under your own control for use when receiving payments. The [[full node]] wallet on an online computer can be a [https://whotookmycrypto.com/watch-only-wallets/ watch-only wallet]. This means that it can detect transaction involving addresses belonging to the user and can display transaction information about them, but still does not have the ability to actually spend the bitcoins.&lt;br /&gt;
&lt;br /&gt;
=== Protection from theft ===&lt;br /&gt;
&lt;br /&gt;
Possession of bitcoins comes from your ability to keep the private keys under your exclusive control. In bitcoin, keys are money. Any malware or hackers who learn what your private keys are can create a valid bitcoin transaction sending your coins to themselves, effectively stealing your bitcoins. The average person&#039;s computer is usually vulnerable to malware so that must be taken into account when deciding on storage solutions. Anybody else who discovers a wallet&#039;s [[seed phrase]] can steal all the bitcoins, so it must be kept safe and secret like jewels or cash. In particular phrases should not be typed into any website.&lt;br /&gt;
&lt;br /&gt;
[[Seed phrase]]s can store any amount of bitcoins. It doesn&#039;t seem secure to possibly have enough money to purchase the entire building just sitting on a sheet of paper without any protection. For this reason many wallets make it possible to encrypt a seed phrase with a password. See [[Seed phrase#Two-Factor_Seed_Phrases]]&lt;br /&gt;
&lt;br /&gt;
=== Easy access ===&lt;br /&gt;
&lt;br /&gt;
Some users may not need to actually move their bitcoins very often, especially if they [[Bitcoin as an investment|own bitcoin as an investment]]. Other users will want to be able to quickly and easily move their coins. A solution for storing bitcoins should take into account how convenient it is to spend from depending on the user&#039;s needs.&lt;br /&gt;
&lt;br /&gt;
=== Summary ===&lt;br /&gt;
&lt;br /&gt;
In summary: bitcoin wallets should be backed up by writing down their [[seed phrase]], this phrase must be kept safe and secret, and when sending or receiving transactions the wallet software should obtain information about the bitcoin network from your own [[full node]].&lt;br /&gt;
&lt;br /&gt;
== Discussion of wallet solutions ==&lt;br /&gt;
&lt;br /&gt;
=== Hardware wallets ===&lt;br /&gt;
&lt;br /&gt;
[[Hardware wallet]]s are special purpose security-hardened devices for storing Bitcoins on a peripheral that is trusted to generate wallet keys and sign transactions.&lt;br /&gt;
&lt;br /&gt;
A [[hardware wallet]] typically holds the private keys in its internal storage and is designed to be malware resistant. The device signs the transactions internally and only transmits the signed transactions to the computer. The separation of the private keys from the vulnerable environment allows the user to spend bitcoins without running any risk even when using an untrustworthy computer. Hardware wallets are relatively user-friendly and are a top solution for holding private keys.&lt;br /&gt;
&lt;br /&gt;
Some downsides are that hardware wallets are recognizable physical objects which could be discovered and which prove that you probably own bitcoins. This is worth considering when for example crossing borders. They also cost more than software wallets. Still physical access to a hardware wallet, even though it reduces its security strength, does not mean that the keys are easily compromised. The companies creating them, have gone to great lengths to secure them and, though not impossible, only technically skilled people with specialized equipment have been able to get access to the private keys without the owner&#039;s knowledge. However, physically-powerful people such as armed border guards upon seeing the hardware wallet could force you to type in the PIN number to unlock the device and steal the bitcoins.&lt;br /&gt;
&lt;br /&gt;
Main article: [[Hardware wallet]]&lt;br /&gt;
&lt;br /&gt;
=== Multisignature wallets ===&lt;br /&gt;
&lt;br /&gt;
A multisignature wallet is one where multiple private keys are required to move the bitcoins instead of a single key, avoiding a single point of failure. These private keys can be spread across multiple machines in various locations with the rationale that malware and hackers are unlikely to infect all of them. The multisig wallet can be of the m-of-n type where any m private keys out of a possible n are required to move the money. For example a 2-of-3 multisig wallet might have your private keys spread across a desktop, laptop and smartphone; any two are required to move the money but the loss of any one does not result in loss of money especially because they can be restored from paper backup.&lt;br /&gt;
&lt;br /&gt;
Multisignature wallets have the advantage of being cheaper than hardware wallets since they are implemented in software and can be downloaded for free, as well as being convenient as all keys are online and the wallet user interfaces are typically easy to use. Wallet software [[Electrum]] and [[Armory]] can create multisig wallets. Hardware and multisignature wallets can be combined by having a multisignature wallet with the private keys held on hardware wallets; after all a single hardware wallet is still a single point of failure. Cold storage and multisignature can also be combined, by having the multisignature wallet with the private keys held in cold storage to avoid them being kept online.&lt;br /&gt;
&lt;br /&gt;
Main article: [[Multisignature]]&lt;br /&gt;
&lt;br /&gt;
=== Cold storage wallets ===&lt;br /&gt;
&lt;br /&gt;
A cold wallet generates and stores private wallet keys offline on a clean, newly-installed [https://en.wikipedia.org/wiki/Air_gap_(networking) air-gapped] computer. Payments are received online with a watch-only wallet. Unsigned transactions are generated online, transferred offline for signing, and the signed transaction is transferred online to be broadcast to the Bitcoin network.&lt;br /&gt;
&lt;br /&gt;
This allows funds to be managed offline in [[Cold storage]]. Used correctly a cold wallet is protected against online threats, such as viruses and hackers. Cold wallets are similar to hardware wallets, except that a general purpose computing device is used instead of a special purpose peripheral. The downside is that the transferring of transactions to and fro can be fiddly and unweilding, and less practical for carrying around like a hardware wallet.&lt;br /&gt;
&lt;br /&gt;
Main article: [[Cold storage]]&lt;br /&gt;
&lt;br /&gt;
=== Hot wallets ===&lt;br /&gt;
&lt;br /&gt;
A hot wallet refers to keeping single-signature wallets with private keys kept on an online computer or mobile phone. Most bitcoin wallet software out there is a hot wallet. The bitcoins are easy to spend but are maximally vulnerable to malware or hackers. Hot wallets may be appropriate for small amounts and day-to-day spending.&lt;br /&gt;
&lt;br /&gt;
Main article: [[Hot wallet]]&lt;br /&gt;
&lt;br /&gt;
== Bad wallet ideas ==&lt;br /&gt;
&lt;br /&gt;
=== Custodial wallets ===&lt;br /&gt;
&lt;br /&gt;
Custodial wallets are where an exchange, broker or other third party holds your bitcoins in trust.&lt;br /&gt;
&lt;br /&gt;
The number one rule to storing bitcoin is this: if you don’t hold the private keys, you don’t actually own the assets. There are many historical examples of loss due to custodial wallets: Bitcoinica, Silk Road, Bitfloor, [[Collapse of Mt. Gox|MTGOX]], Sheep Marketplace, BTC-e, Bitstamp, Bitfinex, Bithumb, Cryptsy, Bter, Mintpal and many more&amp;lt;ref&amp;gt;https://bitcointalk.org/index.php?topic=576337&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;Isn&#039;t it just like keeping your money in a bank?&amp;quot; ====&lt;br /&gt;
&lt;br /&gt;
:There are trade offs with everything, but trusting Coinbase with your Bitcoin is &#039;&#039;not&#039;&#039; the same as trusting a bank with your dollars:&lt;br /&gt;
&lt;br /&gt;
:Suppose 5 people are needed to access the funds, within Coinbase, e.g. the CEO, the tech lead engineer and 3 other senior employees. Suppose one day they wake up and decide to be evil and move all the Bitcoin to some private account of theirs, and perhaps make up a story in the press about how they&#039;ve been &amp;quot;hacked&amp;quot;. You have a serious problem, as you might find there is a protracted legal battle (see MtGox), but you can&#039;t actually retrieve the funds unless in some way the company is re-stocked with Bitcoin, or perhaps an equivalent in fiat.&lt;br /&gt;
&lt;br /&gt;
:If on the other hand you controlled the funds with a majority of keys in a multisig i.e. you own both of the two needed keys of a 2-of-3 multisig, then it would always effectively be your bitcoin, even though the third key may belong to a trusted third party custodian. But this also comes with the responsibility that if you get hacked, you lose all your funds. That is why it&#039;s prudent, in a 2-of-3 multisig where you have the two needed keys, to have them in separate systems/locations. If one of them fails, you can go to the custodian to supply the third key and transfer your funds again to safety. But the custodian alone, cannot touch your funds just by virtue of having the third key.&lt;br /&gt;
&lt;br /&gt;
:Now, if your bank gets hacked similarly - 5 key operatives in the bank decide to swipe your money and pretend it was external hackers - SWIFT transfers are made to accounts in Russia and China. Here it will always ultimately be at the discretion of legal agencies whether you &amp;quot;actually&amp;quot; still have the money that is stolen. Because dollars are not real, they can be created at a whim&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Fractional-reserve_banking&amp;lt;/ref&amp;gt;, and while reversing international transfers is not &#039;&#039;quite&#039;&#039; so simple, very often that reversal can be achieved (e.g. recent SWIFT hack at bangladesh&amp;lt;ref&amp;gt;https://www.wired.com/2016/05/insane-81m-bangladesh-bank-heist-heres-know/&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Bangladesh_Bank_robbery&amp;lt;/ref&amp;gt; bank; $1 billion stolen, all but $80 million &amp;quot;recovered&amp;quot; (just means wire transfers reversed)). Added to that consider that fiat money is insured, so even when transfers can&#039;t be reversed, the money can be &amp;quot;recovered&amp;quot;. If too many banks get hacked all at once the Federal Reserve and the government together can make up some &amp;quot;fund&amp;quot; that magically reassigns balances any time they like, with sufficient political will (that&#039;s essentially what was happening in 2008 TARP etc).&lt;br /&gt;
&lt;br /&gt;
:So far no insurance company has ever paid out on a Bitcoin company&#039;s claim. Worth considering also.&lt;br /&gt;
&lt;br /&gt;
:You might say, since it&#039;s risky both ways, why not trust Coinbase? Aren&#039;t they more competent in security than me?&lt;br /&gt;
&lt;br /&gt;
:Almost certainly, but this argument has two massive holes in it: (1) because they &#039;&#039;concentrate&#039;&#039; funds they are a massive target for hackers, while you are not - at all. (2) they are a &#039;&#039;trusted third party&#039;&#039; so the situation is strictly worse - not only do you have to trust their security skills, but you also have to trust them not to steal (modulo multisig, as mentioned above) (edited to add: as well as literal stealing, there is things like political confiscation, don&#039;t forget).&amp;lt;ref&amp;gt;https://www.reddit.com/r/Bitcoin/comments/5py495/brian_armstrong_controlling_your_own_wealth_as_a/dcve9xx/?context=3&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Web wallets ===&lt;br /&gt;
&lt;br /&gt;
Web wallets have all the downsides of custodial wallets (no direct possession, private keys are held by a third party) along with all the downsides of hot wallets (exposed private keys), as well as all the downsides of lightweight wallets (not verifying bitcoin&#039;s rules, someone could send you a billion bitcoins and under certain conditions the dumb web wallet would happily accept it)&lt;br /&gt;
&lt;br /&gt;
Someone who needs the easy access of a web wallet should download a lightweight wallet like [[Electrum]].&lt;br /&gt;
&lt;br /&gt;
Main article: [[Browser-based wallet]]&lt;br /&gt;
&lt;br /&gt;
=== Paper wallets ===&lt;br /&gt;
&lt;br /&gt;
So-called [[paper wallets]] are an obsolete and unsafe method of storing bitcoin which should not be recommended to beginners. They simply store a single private/public keypair on paper. They promote [[address reuse]] and require unwieldy and complicated live OS system boots to be safe, they risk theft by printers, and typically rely on [[Javascript cryptography]].&lt;br /&gt;
&lt;br /&gt;
Paper wallets also do not provide any method of displaying to the user when money has arrived. There&#039;s no practical way to use a [[full node]] wallet. Users are typically driven to use third-party blockchain explorers which can lie to them and spy on them.&lt;br /&gt;
&lt;br /&gt;
A much better way to accomplish what paper wallets do is to use [[seed phrase]]s instead.&lt;br /&gt;
&lt;br /&gt;
Main article: [[Paper wallets]]&lt;br /&gt;
&lt;br /&gt;
=== Cloud storage ===&lt;br /&gt;
&lt;br /&gt;
This means storing your encrypted (or not) wallet file on a cloud storage solution such as Dropbox, or emailing them to yourself on gmail. This very similar to trusting a custodial wallet service, and is not recommended for the same reasons&amp;lt;ref&amp;gt;https://www.reddit.com/r/Bitcoin/comments/8i6via/28_btc_stolen_10_btc_reward_please_help/&amp;lt;/ref&amp;gt;. You might say you use encryption for two-factor authentication, but uploading the wallet to the cloud reduces this to one-factor.&lt;br /&gt;
&lt;br /&gt;
=== Removable media ===&lt;br /&gt;
&lt;br /&gt;
This refers to storing wallet files on removable media like SSD or hard drives.&lt;br /&gt;
&lt;br /&gt;
Refer to the warnings from these two links:&lt;br /&gt;
&lt;br /&gt;
* https://www.reddit.com/r/Bitcoin/comments/6nj0eb/reminder_beware_of_data_rot_always_make_paper/&lt;br /&gt;
&lt;br /&gt;
* https://tedjonesweb.blogspot.co.uk/2017/08/do-not-use-flash-memory-ssd-drives.html&lt;br /&gt;
&lt;br /&gt;
Those articles recommend using GPG for encryption or a printer, instead a better solution is [[seed phrase]]s.&lt;br /&gt;
&lt;br /&gt;
== Other ideas ==&lt;br /&gt;
&lt;br /&gt;
=== Time-locked wallets ===&lt;br /&gt;
&lt;br /&gt;
An interesting unconventional solution. The idea is to use [[Timelock|time-lock contracts]] to create a wallet which cannot be spent from until a certain date. One possible use-case might be by a gambling addict who locks up money for paying bills for a month, after a month has passed and their time-lock wallet is opened they use that money for paying bills instead of gambling. This is the equivalent proposal towards compulsive shoppers to freeze their credit card in a block of ice, so when they feel the urge to immediately buy something they see on the TV, they will need to wait for the block to melt until they can retrieve the credit card to be able to place the order. This hopefully gives them the time to cool off, and reconsider an otherwise meaningless purchase.&lt;br /&gt;
&lt;br /&gt;
Time lock wallets don&#039;t exist yet except for simple [https://coinb.in/#newTimeLocked javascript pages] which rely on [[Javascript cryptography]] and are therefore not safe.&lt;br /&gt;
&lt;br /&gt;
=== Consulting ===&lt;br /&gt;
&lt;br /&gt;
If you intend to store a very large amount of bitcoins, for example in a business, you should consider paying for security consulting.&lt;br /&gt;
&lt;br /&gt;
== The 5 dollar wrench attack ==&lt;br /&gt;
&lt;br /&gt;
[[File:Security.png|400px|none|alt=xkcd comic on the 5 dollar wrench attack.]]&lt;br /&gt;
&lt;br /&gt;
It&#039;s sometimes said that all this security is worthless because the $5 wrench attack can be used.&lt;br /&gt;
&lt;br /&gt;
There are two ways to beat this attack: by hiding or by defending yourself.&lt;br /&gt;
&lt;br /&gt;
Stored bitcoins are not secured by [[seed phrase]]s, [[hardware wallet]]s, [[multisignature]], passwords, hash functions or anything like that; they are secured by &#039;&#039;people&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Technology is never the root of system security. Technology is a tool to help people secure what they value. Security requires people to act. A server cannot be secured by a firewall if there is no lock on the door to the server room, and a lock cannot secure the server room without a guard to monitor the door, and a guard cannot secure the door without risk of personal harm.&amp;lt;ref&amp;gt;[https://github.com/libbitcoin/libbitcoin/wiki/Risk-Sharing-Principle Libbitcoin wiki Risk Sharing Principle]&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Bitcoin is no different. The technology discussed on this page is only a tool to tip the scales in the defender&#039;s favour. Following from this principle, the way to beat the $5 wrench attack is to bear arms. Either your own, or employ guards, or use a safety deposit box, or rely on the police forces and army; or whatever may be appropriate and proportionate in your situation. If someone physically overpowers you then no technology on Earth can save your bitcoins. You can&#039;t be your own bank without bank-level security.&lt;br /&gt;
&lt;br /&gt;
See Also: [https://twitter.com/i/moments/942083114385281024 Guns + Bitcoin Hardware Wallets]&lt;br /&gt;
&lt;br /&gt;
== Further reading ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/BlockchainCommons/SmartCustodyWhitePapers/blob/master/%23SmartCustody-_Simple_Self-Custody_Cold_Storage_Scenario.md SmartCustody: Simple Self-Custody Cold Storage Scenario]&lt;br /&gt;
&lt;br /&gt;
* https://bitzuma.com/posts/a-gentle-introduction-to-bitcoin-cold-storage/&lt;br /&gt;
&lt;br /&gt;
* https://medium.com/@lopp/thoughts-on-secure-storage-of-bitcoins-and-other-crypto-assets-210cadabb53d&lt;br /&gt;
&lt;br /&gt;
* https://medium.com/@michaelflaxman/how-should-i-store-my-bitcoin-43874ac208e4&lt;br /&gt;
&lt;br /&gt;
* Two-factor authentication on custodial wallets doesn&#039;t work as well as you might think https://medium.com/@CodyBrown/how-to-lose-8k-worth-of-bitcoin-in-15-minutes-with-verizon-and-coinbase-com-ba75fb8d0bac&lt;br /&gt;
&lt;br /&gt;
* This is why you shouldn’t use texts for two-factor authentication https://www.theverge.com/2017/9/18/16328172/sms-two-factor-authentication-hack-password-bitcoin Hacking 2FA based on SMS is easy.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Security]]&lt;/div&gt;</summary>
		<author><name>Peterjames</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Brainwallet&amp;diff=66597</id>
		<title>Brainwallet</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Brainwallet&amp;diff=66597"/>
		<updated>2019-06-29T04:34:28Z</updated>

		<summary type="html">&lt;p&gt;Peterjames: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A &#039;&#039;&#039;brainwallet&#039;&#039;&#039; refers to the concept of storing Bitcoins in one&#039;s own mind by memorizing a [[seed phrase]]. If the seed is not recorded anywhere, the Bitcoins can be thought of as being held only in the mind of the owner. If a brainwallet is forgotten or the person dies or is permanently incapacitated, the Bitcoins are lost forever. Using memory techniques allow them to be memorized and recalled easily.&lt;br /&gt;
&lt;br /&gt;
To create a brainwallet, use Bitcoin wallet software to generate a seed phrase and then memorize it. Such seeds are generated by wallets like [[Electrum]], [[Armory]] and [[Mycelium]].&lt;br /&gt;
&lt;br /&gt;
Brainwallets are not recommended to be used in general because of fallible human memory. But in special situations they could be very useful, for example when fleeing a country with only the clothes on your back.&lt;br /&gt;
&lt;br /&gt;
== Worked Example ==&lt;br /&gt;
&lt;br /&gt;
# On a computer with no malware, run [[Electrum]] and generate a [[seed phrase]].&lt;br /&gt;
# Memorize the phrase using http://en.wikipedia.org/wiki/Mnemonic_peg_system&lt;br /&gt;
# When spending or saving, restore the wallet from memory using the phrase.&lt;br /&gt;
# Use the master public key to create an online [https://whotookmycrypto.com/watch-only-wallets/ watch-only wallet], where you can send to but not spend.&lt;br /&gt;
# Spend from the wallet in the manner of [[Cold_storage|deep cold storage]]. Transferring the unsigned transaction to the cold storage computer, signing it and broadcasting to the network.&lt;br /&gt;
&lt;br /&gt;
=== Example Mnemonic Peg ===&lt;br /&gt;
To memorize a seed with this method you must invent a story which hits the words as &amp;quot;keynotes&amp;quot;. Try to make it like a fairy tale story, use imagery. Make it somehow striking and emotionally resonant. When remembering you just remember the key words, not all the other words - the other can be remembered more as images and thoughts (which are hard to write down)&lt;br /&gt;
&lt;br /&gt;
Let&#039;s say we have this seed:&lt;br /&gt;
&lt;br /&gt;
    witch collapse practice feed shame open despair creek road again ice least&lt;br /&gt;
&lt;br /&gt;
You&#039;d imagine walking through a building familiar to you, maybe your own home or workplace or school.&lt;br /&gt;
&lt;br /&gt;
* You imagine looking in the first room and seeing your mother dressed as a &#039;&#039;&#039;witch&#039;&#039;&#039;, playing the jenga boardgame until the tower &#039;&#039;&#039;collapses&#039;&#039;&#039;.&lt;br /&gt;
* You walk to the next room and see your father &#039;&#039;&#039;practising&#039;&#039;&#039; with a longbow, he shoots a chicken to &#039;&#039;&#039;feeds&#039;&#039;&#039; himself.&lt;br /&gt;
* In the next room you see your brother naked in &#039;&#039;&#039;shame&#039;&#039;&#039; attempting to cover himself, he&#039;s looking through a window that&#039;s &#039;&#039;&#039;open&#039;&#039;&#039; and flapping in the wind.&lt;br /&gt;
* Now you reach the kitchen, girlfriend is looking at Picasso&#039;s [https://en.wikipedia.org/wiki/Guernica_%28Picasso%29 Guernica] on the wall. She is in &#039;&#039;&#039;despair&#039;&#039;&#039; from it. Next to it is a television playing the show Dawson&#039;s &#039;&#039;&#039;Creek&#039;&#039;&#039;.&lt;br /&gt;
* Next you&#039;re in the garage, your childhood friend is working on his car. He plans to go on a &#039;&#039;&#039;road&#039;&#039;&#039; trip for the 5th time this month, he&#039;s going &#039;&#039;&#039;again&#039;&#039;&#039;.&lt;br /&gt;
* Finally to go outside to the garden. It&#039;s early spring and the ground is covered in melting &#039;&#039;&#039;ice&#039;&#039;&#039;. Two of your other friends are there, one friend has a huge basket of apples, the other has a smaller basket but you&#039;re holding only some apples. You&#039;ve got the &#039;&#039;&#039;least&#039;&#039;&#039; apples.&lt;br /&gt;
&lt;br /&gt;
Repeat this story in your head several times over a short period - the first few days. It will sink in, deep, after that. You&#039;ll only have to revisit it very occasionally. After a while you can ignore it for months and it&#039;ll still come back, not that I&#039;d recommend relying on that.&lt;br /&gt;
&lt;br /&gt;
=== Video Example of Mnemonic Peg Method ===&lt;br /&gt;
&lt;br /&gt;
From the BBC documentary The Human Mind (2003) by Professor Robert Winston. Approximately 31 minutes in. Memorizing a list of 30 random words.&lt;br /&gt;
&lt;br /&gt;
https://www.youtube.com/watch?v=lRhfQCW1f68&amp;amp;t=1867&lt;br /&gt;
&lt;br /&gt;
=== Fallible Memory Warning ===&lt;br /&gt;
Despite the memory aids, human memory can be very fallible. So if your only storage is memory you may find that it just vanished one day.&lt;br /&gt;
&lt;br /&gt;
Data should always be backed up. Storing a seed phrase in one place is bad, even if that one place is your brain.&lt;br /&gt;
&lt;br /&gt;
== Obsolete Brainwallet Style ==&lt;br /&gt;
&lt;br /&gt;
An early old-style brainwallet was created by by memorization of a passphrase and converting it a [[private key]] with a hashing or key derivation algorithm (example: SHA256). That private key is then used to compute a Bitcoin address. This method was found to be very insecure and &#039;&#039;&#039;should not be used&#039;&#039;&#039;. Humans are not a good source of entropy. Using a single address also has problems associated with [[address reuse]].&lt;br /&gt;
&lt;br /&gt;
=== Low Entropy from Human-Generated Passphrases ===&lt;br /&gt;
&lt;br /&gt;
Practically everyone who knows about or cares loudly yells at people DO NOT USE BRAINWALLETS [GENERATED BY HUMANS].  We&#039;ve seen pretty concrete evidence that users are resistant to good advice in this space, and they are shocked when their favorite quotation is cracked and they lose their coins (But it was 60 characters long! I even added a special character! how is this possible?!),  the existing sites promoting this stuff won&#039;t use a KDF stronger than SHA256*1 because &amp;quot;users are stupid if they use weak passwords&amp;quot;. &amp;lt;ref&amp;gt;[https://bitcointalk.org/index.php?topic=311000.msg3345309#msg3345309 Re: hardening brain-wallets with a useful blind proof of work ]&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Ryan Castellucci DEFCON Talk === &lt;br /&gt;
&lt;br /&gt;
Ryan Castellucci gave a talk at DEFCON23 about cracking brainwallet passphrases. Although brainwallet passphrases were being exploited for years by this point, the talk helped bring the issues to more popular consciousness.&amp;lt;ref&amp;gt;[https://rya.nc/cracking_cryptocurrency_brainwallets.pdf Ryan Castellucci DEFCON Talk]&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;[https://www.reddit.com/r/Bitcoin/comments/3g9f1s/why_im_releasing_a_brainwallet_cracker_at_defcon/ Reddit thread on Ryan&#039;s talk]&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;[https://www.youtube.com/watch?v=foil0hzl4Pg a video of Ryan&#039;s talk]&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Legacy Code ===&lt;br /&gt;
&lt;br /&gt;
If you have coins in an old-style brainwallet, the website http://www.bitaddress.org/ contains a GUI for generating the private key using the sha256(passphrase) algorithm. It&#039;s highly recommended you move the out as soon as you can.&lt;br /&gt;
&lt;br /&gt;
=References=&lt;br /&gt;
&amp;lt;references&amp;gt;&lt;br /&gt;
&amp;lt;/references&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Instructional]]&lt;/div&gt;</summary>
		<author><name>Peterjames</name></author>
	</entry>
</feed>