attack vectors for your ‘multi-sig’ set-up

practical considerations, obvious choices & the future of p2p

keyMonkey
4 min readOct 2, 2018

now, that the $5 wrench-attack problem is solved & your bitcoin can’t be simply stolen, our next challenge is to defend against and defeat the next level of attack — a RANSOM

Mel did it, can we?…

when setting up your MS/ML (multi-signature, multi-location) cold-storage so as not to be a SPoF (single-point-of-failure), you need to make 2 choices :

  • “single” signatory — vs — “multiple human” signatories
  • multi-sig softwarevs — separating access information

Spoiler Alert — separating access information & using “multiple/p2p” signatories, is better! — & here’s why…

“single” vs “multi” signatory set-ups

a “signatory” — is someone who signs a transaction

some current vocabulary is misleading, so we need to clarify things

usually, we think in terms of :

“single” — i’m the only person signing… i travel to the different locations and control all the hardware devises myself

“multiple” — other people are signing the transactions that i create

but, in reality —

almost all multi-sig setups are multi-signatory

someone is always verifying …

usually, people leverage traditional infrastructure, like bank vaults & security guards

true “single” signatory

the other possibility — a true “single” signatory set-up would involve no one knowing or helping you… for example, your other hardware devises are buried under trees out in the forest

ok, that’s pure “single-signatory”, but it’s not much better than SPoF (single-point-of-failure) because an attacker could simply impel you to divulge the locations…traveling would slow down the attack, but there are no further defenses/no Signatories to protect it…

more accurately, the options today are :

“centralized” vs “p2p” signatory set-ups

“single” is misleading as it uses multiple people…

the clearer defining-quality is that they’re clustered or centralized in giant banks, private vaults & boutique companies…

p2p is opposite, right ?…

but, regardless of definitions, the game-theory is what’s important —

Who will get kidnapped — you OR your loved ones ?…

when you use a “single/centralized” set-up, attackers can not target you because, as we all know, they would have no leverage. they can’t come with you into the bank vault, because you would simply alert the guards before…

So — this set-up forces attackers to kidnap your loved ones — then, under duress, you could travel & sign all the transactions by yourself…

when you use a “multiple/p2p” set-up, attackers have a choice. they could target your loved ones, but they probably won’t, because — then, you are the only point that can fail. In contrast, if they kidnap you — then, each of your signatories is a possible point of failure. all other things being equal, Attackers would obviously choose the strategy that provided more opportunities for success…

so the incentives are clear —

  • “single, centralized” — incentivize a loved-one’s kidnapping
  • “multiple/p2p” — incentivize your-own kidnapping

and the only moral choice is obvious…

again, the big problem with “single” is that it’s “centralized” —

even if the best private-key custody services of today, like Casa, proliferate and expand — banks, Brinks & private companies will hold most private-keys…

governments will extort & seize these giant honey pots until Bitcoin fails…

How can centralized private-key custody scale ?…

please don’t say — “hold your own keys” — as this is pre-bank, stone-age…

and whereas, sometimes — you may need to use both centralized services & p2p relationships, please consider the effects of your actions on the future of the network…& so, please don’t use only centralized solutions !

“p2p” signatories

everyone’s situation is different, so i’ll only make some generalizations —

who has more skin-in-the-game ?…

  • “centralized” — security guards and bank/company employees
  • “p2p” — your friends and family

for p2p, consider the quality of your signatories —

  • vetted — don’t have major vulnerabilities, like a gambling addiction, that could be exploited or may lead to problems
  • trained — you should train them appropriately
  • familiar — the better that they know you, the better they will be able to detect if you are in destress or even if you are trying to deceive them
  • incentivized —increase the quality of their work by monetizing it

multi-sig softwarevs — separating access information

problems with using multi-sig for cold-storage

the only tested/trusted multi-sig software today is limited to [m-of-n] configurations…

multi-sig with a — “p2p/multiple” signatory set-up

  • your wallet’s balance is exposed — No privacy
  • there’s potential for signatory collusion

multi-sig with a — “single/centralized” signatory set-up

the above 2 issues are avoided, But —

  • incentivizes a loved-ones kidnapping
  • requires physical travel

these & related issues are discussed in more detail, in the article below

separating access information

there are 2 main ways —

— separate [seed-phrase] from [pass-phrase]

  • potential for weak, user-generated pass-phrases
  • can’t use pass-phrases for heir’s wallets for inheritance

— seed-splitting

  • simple, non-technical, free

for a more detailed comparison —

to Summarize —

you MUST use “p2p/multiple” signatories so that you don’t incentive Attackers to kidnap your loved-ones

and you CAN’T do that today with current multi-sig software !…

separate your access-information !

set-up secure storage with Signatories !

& HODL Safe with CWAP !…

i’m @keyMonkey on mastodon

i’m @oceans4all on twitter

cool links & about me

--

--

keyMonkey

— CWAP — “Seed-Splitting” BTC Storage — HODL Safe! —