Git Product home page Git Product logo

glacier-psbt's People

Contributors

bitcoinhodler avatar

Stargazers

 avatar  avatar  avatar  avatar

Watchers

 avatar  avatar

glacier-psbt's Issues

Wallet import broken

The way I'm doing the wallet import on the online node is based on my question on StackExchange, but it turns out that is unsupported and likely to change in the next major release of Bitcoin Core. See bitcoin#15932 for details.

So, wait for v0.18 release, then redo how the import works.

Investigate new features

Bitcoin Core 13932 adds three new RPCs that might be interesting. See Bitcoin Optech issue 34 for lots of interesting things.

Security analysis of the PSBT proposal

I am trying to get a sense as to why this proposal would degrade the security of the current version of the protocol and if there are ways to fix it.

IMHO introducing PSBT's would be of great benefit and would actually increase the overall security of the protocol.

  1. It would allow to sign transactions without having to have all the required keys at one single place in time.
  2. Advocating full node usage and having a watch only node is a drastic security improvement and it aligns well with the philosophy behind bitcoin.

For the sake of discussion, let A be the full node computer and B a glacier quarantined laptop.

The current concern is that if Glacier gets compromised then an attacker could potentially coordinate his actions on A and B to inject the keys on B and extract them when we access the transaction at A.

As far as I can see this could be mitigated by having (in the ideal scenario) a quarantined laptop C that runs a live Ubuntu with bitcoin core as its only installation.

Then, the transaction signed at B is transferred to C and we use bitcoin-cli to check its validity.

Am I missing something here?

Write output of process 3 to the description

Could we see in the current guideline what the exact output to process 3 is? Specifically the data (transaction?) that will later be used to feed on the quarantined laptop.

I guess I could figure it out from the input passed process 4, but I'd like to have a clear visual representation of what data gets later passed to the guaranteed HW. It would help break down the flow of data passed around and think how this needs to be addressed securely.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.