Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use Honeypots #50

Open
weasel3 opened this issue Dec 28, 2020 · 1 comment
Open

Use Honeypots #50

weasel3 opened this issue Dec 28, 2020 · 1 comment

Comments

@weasel3
Copy link

weasel3 commented Dec 28, 2020

Consider updating _docs/extend/improvements.md, because ...

Consider leaving a relatively easy accessible loaded honeypot-wallet on each supposedly secure location (e.g. a paper printed with the seed and QR-Code of the xpriv/xpub for quick sweep-access).
When using a m-of-n multisig constallation with passphrase for the real funds, load up each single wallet originating from each cosigner's seeds (w/o passphrase) with "f*ck-up-money" and set up a notification process when the honeypot is emptied (e.g. IFTTT).
Do the same with the multisig-wallet w/o the passphrase and the trap is set.

Drawbacks:

  • a honeypot could trigger an attacker to "go for more"
  • a honeypot could be identified as such from the attacker and not be emptied, leaving the originator in a false sense of security
@bitcoinhodler
Copy link
Collaborator

This is an interesting idea. Glacier doesn't use xpubs or xprvs today, but each paper packet does include one WIF private key. The user could load up that key's corresponding P2PKH address with a small amount of funds and set an alarm if those funds ever move.

Each paper packet also includes the multisig redeem script and P2SH address, so an attacker can easily see the funds available in the multisig wallet, and that might make it obvious that the P2PKH funds are a honeypot.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants