By: Jesse AbramowitzBlockchain Developer
In what seems stranger than fiction, earlier this week, Quadriga, admitted that they are unable to recover access to $145 million of BTC and other digital assets. This was announced after 30 year old founder Gerald Cotten was reported dead following complications arising from Crohn’s Disease.
As it turns out, Cotten was the only one with access to Quadriga’s funds in cold storage and the password was lost along with his life.
It is a a very sad end to the story, both for the friends and family of Cotton, but also users of Quadriga.
In the wake of this story, it seems crazy for anyone to keep a significant amount of funds on exchanges, yet this isn’t the first time and this won’t be the last time. For example, Mount Gox. At the very least hopefully, I can make a strong argument in the meantime and maybe change some minds.
Let’s start at the beginning.
The Bitcoin (I mean most cryptocurrencies for the purposes of this article, we’ll use Bitcoin for default) network acts as one giant distributed ledger. It lives on multiple computers, and you can read or update the blockchain on anyone of them. In this trusted environment, how do we guarantee identity? More specifically, how do you know what belongs to whom?
This is accomplished through cryptography. As a user, you generate a private key, from this number, some mathematical magic occurs and voila! you get a public key. From the public key, you hash it and get an address. On the blockchain your funds belong to this address.
The only way to access them is by telling the blockchain what you want to do and signing that message with your private key. Through mathematics, your private key can stay secret but there is proof that the owner of that key generated the message.
Thus the owner of any bitcoin is the person who holds the private key.
In these situations, let’s take look at where your private key usually lies and analyze the possible vectors of attack.
This one is the big troublemaker in the industry. The owner of your private keys is not you. It is the exchange. Your ownership extends to a number on a piece of paper.
Think about it like this: when you go to a bank and give them your money, you no longer own that money, you are just a number on a paper. Now, if we completely ignore the argument of runs on a bank, and we look at North America, for the most part your funds will be safe. Also, the Government (of Canada) does insure our funds up to $100 000.
Exchanges do not have those same protections.
Now, for the most part the people running exchanges do not want to take your funds. This is because that would be illegal and altough they do make money off of you, it makes more sense to provide an exemplary service.
However, as we can see negligence and unfortunate events can sink some of the biggest exchanges.
Negligence and human error is but one vector of attack.
What about something more malicious?
There is a quote I like from an unknown source:
“If you have a safe that has $500 in it make sure it costs $501 to break in.”
To understand the relationship let’s explore the following metaphor: Imagine there is a town and everyone has a small amount of gold. Securing that gold isn’t too hard you put it in a safe, as it isn’t very valuable persay. However, pooling resources and sharing the security with everyone in the town can buy an epic vault with armed guards. This is no doubt more secure but now the potential reward for breaking into that vault has increased drastically.
You have just created a honeypot for criminals to try their hand.
Advantages
Disadvantages/Vectors of Attack
Best Practices
Examples
This is one hundred percent recommended. There is more to it than increased security. There is the idea of the blockchain that as an individual you are responsible for yourself, do not blindly trust authorities.
There are many ways to store your own keys and I am not here to tell you how or what to use. I will give you some best practices and a framework for how to think about key management.
This would be something like a phone or desktop wallet. Something that without having to pass through unreasonable steps you can read and write to the blockchains (as in you may have to login but you can still use it).
Advantages
Disadvantages /vectors of attack
Best Practices
Examples
This is in essence what it sounds like. Pretty much a piece of paper that is not connected to a network. You keys are printed on them. You can receive funds with your address no problem but to move funds you have to connect back to the network.
Advantages
Disadvantages /vectors of attack
Best Practices
Examples
A hardware wallet is a tool you can buy for $100–300 ish. In my opinion it would be optimal for storing larger amounts. It holds your private keys on the device then signs your transactions on the device and sends it to the app you are interacting with.
Advantages
Disadvantages/Vectors of attack
Best Practices
Example
Security can be done, have redundancies, if you are storing a lot of funds it is worthwhile to buy a hardware wallet. Do not ever give out your private keys unless you fully trust an individual with your finances.
What best practices do you use to protect your digital assets? Let us know in the comments below!
Jesse Abramowitz is a Blockchain Developer at BlockX Labs. He has worked on multiple DApps, projects, and Blockchain Networks. Currently, he is also a lab assistant at a local college and is always looking to help, teach and build on the blockchain.
You can reach him at: [email protected]