OmniBon
Junior Member
- Messages
- 68
In order to keep something safe from hack what you would do is just keep a machine offline. You would just physically transport the information by hand from the machine offline to the machine online. In the case of cryptocurrency what you might do is create a rub golbrick machine to essentially use computing power of the offline computer, and robotically port the information to the online computer, which even that computer could be used to only send the work, but not receive it. I.e. you have to simulate the block chain with one portion being offline. You have to do this because of "middle man" hacking, i.e. you CAN NEVER BRING THE OFFLINE MACHINE BACK ONLINE OR YOU ARE SUSCEPTIBLE TO A HACK because the hack can reside on your machine offline and then run when brought online. So, you need robotics or manual porting to keep a machine offline indefinitely and control what information is sent and received.
This type of stuff is true about offline wallet generation especially, but I would just use a 3rd party like Coinbase that could insure your wallet. Ultimately, depending on the coin, like Monero, you will want to be careful how you A. generate a wallet B. load said wallet and C. spend crypto on said wallet and/or convert it to USD etc. Permanent offline storage or insurance etc, should always be accounted for.
Also, using your memory ONLY and never recording information is best practice. Hard, yes, but your mind with strengthen and it is more than entirely possible - entire books have been remembered this way for centuries.
Further in the case of cryptocurrency, you would want to download the full node and right your own mining script in C/C++ to be sure whatever miner you are using isn't compromised. Even with the offline machine this must be done because whatever is reported to the block chain likely is a result of the original mining script used etc. I.e. that is a point to be controlled as well.
Last for cryptocurrency, you rely on the full node itself to not be hacking you, but that isn't super relavant, because likely the majority of minors play by the same rules AND ultimately you are waying revenue (crypto mined and turned into USD etc) versus costs (power usage) to get the profit (USD earned after all fees and costs etc), so ultimately, you and others are just weighing profitability of playing the crypto game altogether anyway. So as long as you can get to the full node you are about as good as it gets, so long as you follow the above security precautions.
This type of stuff is true about offline wallet generation especially, but I would just use a 3rd party like Coinbase that could insure your wallet. Ultimately, depending on the coin, like Monero, you will want to be careful how you A. generate a wallet B. load said wallet and C. spend crypto on said wallet and/or convert it to USD etc. Permanent offline storage or insurance etc, should always be accounted for.
Also, using your memory ONLY and never recording information is best practice. Hard, yes, but your mind with strengthen and it is more than entirely possible - entire books have been remembered this way for centuries.
Further in the case of cryptocurrency, you would want to download the full node and right your own mining script in C/C++ to be sure whatever miner you are using isn't compromised. Even with the offline machine this must be done because whatever is reported to the block chain likely is a result of the original mining script used etc. I.e. that is a point to be controlled as well.
Last for cryptocurrency, you rely on the full node itself to not be hacking you, but that isn't super relavant, because likely the majority of minors play by the same rules AND ultimately you are waying revenue (crypto mined and turned into USD etc) versus costs (power usage) to get the profit (USD earned after all fees and costs etc), so ultimately, you and others are just weighing profitability of playing the crypto game altogether anyway. So as long as you can get to the full node you are about as good as it gets, so long as you follow the above security precautions.