Skip to main content

Security with Crypto Assets in the Cryptonomy

By Mulima Chibuye
Guest contributor


There has never been a time when one needs to be more security conscious with their digital data than now when it is common place to see social media shaming, leaked passwords, leaked conversations and a whole lot of other unsavoury information. What has led to all these hacks you may wonder, well, we do live in the information age and data is king. There is a global drive towards an e-economy spurred by e-government and the massive rollout of public telecommunication infrastructure. While we throw away the paper based files and folders, we say hello to electronic documents, flash disks, hard drives and cloud storage. With a world so interconnected, one can see why it is important to understand some basic security concepts in dealing with data. Specifically, I here discuss how you can secure your cryptocurrencies in the world today.

Crypto currencies live on the internet. It is also quite possible to store them on a device that is not connected to the internet but the very act of transferring to that device will make use of the internet or at least the transaction will be broadcast on the internet. A crypto transaction occurs when a private key is used to sign and manipulate the data stored at a location identified by the public key. In blockchain terminology,  block will contain the public key information such as the balance and preceding transaction information. Therefore, if someone has access to the private key, they can spend the associated crypto value in the public key. We can therefore see that securing the private key is of paramount importance. The best way to secure the private key would have probably been to memorise it but considering its length and unsightly composition, visitations to hypnotherapist and psychics for recovery would have been  hot business. There are 3 main ways in which  private key and crypto assets may be kept safe but each has advantages and disadvantages. Each of their strengths and weakness are discussed below. I hope the reader will be able to use their understanding and pick the best method that works for them.

Generate a Private/Public Key Pair Offline

This requires a bit of some technical prowess hence is probably reserved for those that are in he advanced stages of working crypto assets. We will nonetheless discuss this, you never know if you are a genius. Because crypto currencies require a public and private key, those keys have to come from somewhere. The keys are generated using some algorithm that makes it virtually impossible to have the same key pair generated twice. The usual methods people use is to obtain their key pair from software wallet that is connected to the internet. Now, what if the developer of the software has a backdoor entry? They wipe out accounts if they had sinister motives. Therefore, one way to protect oneself from that relatively probable robbery is to generate the key pair on a device that is not connected to the internet so that the private key is never known.


Use a key only once


This is perhaps one of the easiest to pull off. Every transaction should have a new combination of a private/public key pair. This for example means that every deposit that one makes should always be to a new public key address. The obvious downside is that there would be as many private keys as there are public keys. How does one keep track of all these? Fortunately, we have what are termed as Hierarchical Deterministic (HD) wallets. These use a mnemonic that can regenerate all the private/public key combination that has been used in a wallet. Think of a wallet here as a common storage location of all your crypto assets, normally from the same family e.g. Bitcoin wallet. The obvious drawback is that anybody can memorise the mnemonic because they are normally written in clear concise everyday words, usually less than 16 words. One might further protect the mnemonic by memorizing it, printing it on a long-lasting piece of paper with permanent and non volatile ink and locking it up in a safe. Remember, this is your money.

Use 2 factor Authentication (2FA)


For all accounts that support it, it is highly recommended that 2 factor authentication is enabled. This is especially important for online wallets and services. Two factor authentication uses something that the user knows and something that they have in order to prove the identity of a user trying to access a system or resource. The most common form of 2 factor authentication today is the random number code that is sent to ones phone(something someone has) and the password(something someone knows). In case someone were to guess ones password, they would still not be able to access the breached account due to the fact that they do not have the phone. SMS’s are however not very safe and can be intercepted hence the best methods in use today use an app that has a secure connection and uses a random number generator with a handshake confirmation. THis means that the app generates a number and the wallet expects the same number, a correct entry from the user confirms that the access is authorized. However, the phone can be stolen and the wallet compromised because the hacker has the phone too. This brings us to the next point.

Protect your Phone


In case one may feel lazy using a password on their mobile device, it is best to at least have a level of protection by using a PIN code. Most people do not secure their mobile devices as they have an inherent belief that they may not lose them. What about all those leaks we see online? People's consciousness will have to change by realising that their mobile phones must be kept as secure as possible. A mobile phone without security in the crypto world is like a signed open check.

Store your Crypto Assets on Cold Storage


Cold storage is defined as an electronic storage location or physical storage location that does not interact with the internet. Cold storage might be for example like storing Bitcoin private/public key combinations on a hard disk that isn't connected to the internet or storing Bitcoins as QR pairs on a paper wallet. The problem with a paper wallet is that somebody with a camera may be able to do what is called sweeping the wallet which makes it possible for them to spend the Bitcoins.

About the writer:
Mulima Chibuye is a Telecom Engineer, Computer Science Researcher and Crypto Trader. He will be one of the speakers at the forthcoming CrypTALK Session on 17th February, 2018. Click here to register for the event.

Comments

Popular posts from this blog

5 WAYS TO EARN, GROW AND SPEND BITCOIN IN ZAMBIA IN 2021

One frequently asked question by newcomers in the Crypto Tamanga community is: HOW CAN I EARN BITCOIN WITHOUT INVESTING. Well, the answer to this is not a straight forward one because a lot of factors come into play. Factors such as, how much time do you to have to burn? Services available in your locality, and general adoption levels of crypto in your locality. To put in context, in Zambia we do not have services that reward users in bitcoin and neither is the adoption to a point where I could readily be tipped or paid in bitcoin. That being said, for future purposes, here are some ways one can earn bitcoin without having to invest your money. Disclaimer: The content in this article is meant for educational purposes only, and must not be taken as financial advice. For financial advice, please seek the services of a registered financial advisor. For one who is a new comer to crypto, the thought of owning the first fraction of Bitcoin is a daunting one. This is mainly because, as a be...

What Is A Smart Contract

Image courtesy of Hacker noon In this article I take a look at Smart Contracts. Smart Contracts have taken a center stage as one of the applications of blockchain technology. Although it is widely accepted that they have great potential to change the way business is conducted globally, there still remains a low understanding of the concept. This article attempts to give an understanding of the concepts surrounding Smart Contracts, the potential, challenges, and future of smart contracts. History of smart contracts In 1994, Nick Szabo, a legal scholar and cryptographer realized that the decentralized ledger could be used to convert contracts to computer code so that they could be stored and replicated on the system and supervised by the network of computers that run the blockchain. He introduced what he called smart contracts, also known as digital contracts or self-executing contracts. Definition of smart contract A smart contract is a computer protocol intende...

Extract: Crypto Crime Report by Chainalysis

Chainalysis released a report on crime in the cryptocurrency ecosystem. The report, which   was released in January 2019, highlights the different types of illicit activities taking root in different cryptocurrencies. The report delves into how d ecoding hacks shed light on two prominent groups and their laundering strategies, how Darknet markets demonstrated resilience, and how Ethereum scams are small in scale but evolving fast. In this article we extracted the section that talks about Ethereum scams. The full report can be found here . Fewer scams, bigger revenues: a radically changing landscape for Ethereum crime In 2018, only 0.01% of ether was stolen in scams, worth $36 million, double the $17 million take for 2017. This makes scamming on the Ethereum blockchain one of the lowest-earning types of crypto crime analyzed in this report for 2018. Furthermore, the number of scams declined through 2018, although those that remained were bigger, more sophisticated,...