[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

How do you keep your private keys safe?

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 41
Thread images: 8

How do you keep your private keys safe?
>>
File: 1483997465702.png (3MB, 1920x1080px) Image search: [Google]
1483997465702.png
3MB, 1920x1080px
>>58847073
With
>This
>>
I don't make them public
>>
>>58847073
Encryption dummy
>>
>>58847073
Put them on my Keychain and keep them in my pocket.

How the fuck else?
>>
File: 1474793128253.jpg (34KB, 500x356px) Image search: [Google]
1474793128253.jpg
34KB, 500x356px
>>58847132
>Uses key to decrypt
>Encrypts the key itself

4D chess anon
>>
>>58847167
You can use passphrase to encrypt private key.
>>
Use TPM.
>>
>>58847272
Thanks NSA.
>>
>>58847242
Just playing with you anon
>>
I stick them in my ass. Not even the gooks can find something you hide in your ass.
>>
>>58847073
I'm careful not to share the Dropbox link.
>>
File: 1463416611459.jpg (33KB, 600x400px) Image search: [Google]
1463416611459.jpg
33KB, 600x400px
>>58847073
>Put key on flash drive
>Encrypt flash drive
>Put that encryption key on 4 point font printed across several pages in comic sans
>Put flash drive hidden inside mouse
>Get a giant safe
>Put key on pages in safe
>Put safe in your closet
>Get swatted
>If police ask where your keys are say in the safe
>They waste all their time opening the safe
>They finally open it and find the keys on paper
>They keep trying that key only for it to fail
>They keep trying thinking they just didn't read the paper correctly
>In court tell them you told them where the key was, to your OTHER KEY!
>Technically you didn't lie
>Get off non-guilty
Its just that simple lads
>>
You best bet is really devices and software programmed properly to not leave keys vulnerable. FIPS or Common Criteria certified devices are "generally" more secure than typical devices. And these types of validations are done by private labs, not government.

>>58847242
Pbkdf's (password based key derivation functions) are weak. It's why they aren't usable for classified information or sensitive by fips standard, the latter only for data storage and even then security isn't assured.
>>
>>58847322
Or you can just say they were kept on a ram disk, but the idiots turned off the PC.
It's really unlikely they'd bring a powerpack. But I'm sure there's ways to force them to powerdown.
>>
>>58847297
Way safer than just slapping it on your disk drive.
>>
>>58847431
More and more after they take down the suspect they will attempt to keep power to the computer and try to check it in place to prevent things like that
>>
Put key on micro SD card
Put micro SD card somewhere inside the case of your speakers/toaster/whatever
>>
File: 1484377088955.jpg (366KB, 1080x608px) Image search: [Google]
1484377088955.jpg
366KB, 1080x608px
>>58847167
>First key is encrypted with another key
>Second key is encrypted with yet another key
>Both keys decrypted are the key to the other key
Nth dimensional chess
>>
>>58847073
For real though how the hell are you supposed to keep them safe
>>
File: 1486527191068.jpg (101KB, 900x773px) Image search: [Google]
1486527191068.jpg
101KB, 900x773px
>>58847322
Kek
>>
>>58847484
I remember reading somewhere about the time when they got the silkroad owner, they managed to distract him to leave his laptop unlocked, then they used a battery pack and mouse jiggler to keep the session alive.
>>
On my keychain.
>>
>>58849244
Yep. The tracked him to a public library and had someone talk to him and convince him to come look at something or some shit
Then before he knew it FBI poured out of every crevice in the building
>>
File: 1485875725446.png (3KB, 186x186px) Image search: [Google]
1485875725446.png
3KB, 186x186px
>>58849244
>not having a dead man switch on your laptop when you are running the biggest darknet market
>>
I store my private keys on an encrypted disk container, which is on a dvd (which can also be played as a tv show season in a dvd player). The key file for that container is a particular section of bytes from a dll file on an old cereal box game disk, which must be encrypted by a passphrase unsalted in order to be used as a key. GOOOD FUCKIN LUCK FBI
>>
>>58847431
Here in Israel, police put the ram on liquid nitrogen
>>
>>58847431
Cold boot attacks are a thing anon.
And generally the cops bring a specialist with them to secure computer evidence, so they won't fuck things up
>>
>>58847073
The way I do it is I forget the fucking password I put on it so nobody can ever use it again.
>>
>>58849438
What's your solution then?
>>
File: 1408468454253.jpg (26KB, 400x462px) Image search: [Google]
1408468454253.jpg
26KB, 400x462px
>>58849494
>his operating system doesn't encrypt virtual memory
>>
>>58849797
weld in the ram so they cant take it out without breaking it


if I was doing shady shit, I would do alll the things
>>
>>58849477
>Passphrase encryption
Might as well give it to them anon.
>>
>>58847073
i store it in my keepassx db... but ill like to know how to keep it save when using it.
>>
>>58847322
>fbi can't get into your stupid encrypted files
>they wipe your drive and install windows 7
>they then install u torrent and hide illegal content on the drive
>They then find the illegal content and prosecute you.
>>
>>58849244
Lol they wish. LEO fucko'd him at a library
>>
>>58852843
>>58849272
How did they track down someone using TOR?
>>
Your ram sticks will certainly get frozen if you get party vanned. The welding idea isn't too bad I've seen it mentioned once or twice before. Honestly you should just LUKS your entire root and be on look out. If they get to your open pc you fucked up long ago.
>> Never leave it unlocked while afk
>>
>>58852878
Arstechnica did a great write up on how he was tracked down. It wasn't through a fault in tor itself. Google the article its very insightful. Although they probably did exploit the SR server through some shady means to find its IP. Its unknown.
>>
>>58847073
>How do you ....?

By not discussing my security protocols in anonymous Tibetan sand-painting nurseries.
>>
>>58847073
Good passphrase.
Thread posts: 41
Thread images: 8


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.