This may look too complicated for a newbie, but when your BTC (thus your money!) are involved, you have to start becoming maniac of security and soon you understand it is not so difficult! Thanks for your tutorials!!
My suggestion would be that they use Ian Coleman's Tool to get the addresses they want to check and then either copy the addresses out, or use a mobile phone watch wallet like Sentinel to monitor the xpub address (I cover it in the 2nd half of this video th-cam.com/video/j5nejoEGWFw/w-d-xo.html) I would suggest that you keep the TAILS install with your keys completely disconnected from any networks.
@@CryptoGuide seems there's an inherent risk to write down a 24 on a web page though :/ With all this neat OPSEC it still boils down to a web site... that's supposed to be a nono to put down a key on the net... as you said. Wait! Did I miss you saying this addy phishing can be done off net? no... uhg it's late I can't think anymore I'm still such a noob coz this doesn't seem feseable :/
@@gaeldesmontagnesnoires1711 it's not actually a website, you are running it as an offline file in your browser in an OS that wipes itself on reboot. Even if the code was malicious, running it in such am environment is safe.
@@CryptoGuide So if I have a brand new laptop, I go online & get on Ian's page then cut off my internet & check data; if I understand correctly... yes my OPSEC suck but I just spent all day(ish) to get around this so I need to unlatch right now. Back @ it 2mrow :)
Wow Air Gap! I have not set up that type of security since the military. That was very interesting and cool but for most people i think setting up an air gap as a solution is way overkill/crypto is not going to go mainstream if you have to jump though these type of hoops. But awesome. Super informative. I also would be using Brave not Chrome. edit: Oh you are Brave verified! Tipped and subbed.
Being fully amnesic is the feature that you want which tails does by default :) Never mind that you should really boot in to tails to play with your seed, not just run it in a VM... You don't want any trace of your desktop OS being able to interact with it at all... (Something which whonix encourages but Tails will actually warn you about)
@@CryptoGuide Awesome, and what do you think about booting a Linux distro like Mint or Kali (as second OS, a pc with Windows and Linux) and runing Tails on it? I am thinking about that option. My idea was Qubes OS but you can't run another OS with that. Thanks!
A secondary OS that isn't your "daily driver" environment would certainly be in improvement, particularly if you then run in a VM. You would need a very sophisticated attack to get data out that way. The issue is that for anything that isn't amnesic, you are placing some level of trust in the integrity of the OS and the virtualization environment. The main thing that tails has going for it is that it is very easy for people to just flash and use :)
Hey, thanks for the tutorial, it was really helpful. However, I have two questions: - how can I send cryptocurrencies, if the internet connection is disabled? - should the mnemonic passphrase be persistently stored in Tails? (as the internet connection is completely disabled, I honestly don't see much issue, knowing it'd be encrypted in a persistent storage which Tails itself provides).
You can send funds by using a watch only wallet that is online which passes the transactions to the offline part to sign. If you want to use persistence, you can, just be sure to keep an offline, physical copy of your seed as a backup.
Are you planning to have a computer that would be used specifically for this or would you be re-using an existing one and just booting into TAILS and re-entering your seed phrase each time?
@@CryptoGuide No I was trying to make a USB drive be used as a laptop or mobile since I don't have other hardware, But I'm thinking about purchasing now a ledger nano for convenience.
A hardware wallet certainly achieves the same thing in a far simpler way. I look at wallets here: cryptoguide.tips/hardware-wallet-comparisons/ and the Ledger Nano S is certainly a great mix of security, accessibility and cost.
You can use Wasabi in Tails connected to the internet through the Tor network as long as you do not manipulate private keys when connected. To avoid key storage in Tails, you can supplement Wasabi with a Trezor or Ledger. It is safer than using it in Windows, an operating system that monitors absolutely everything you are doing. Doing the same thing but without the hardware wallet also seems safe enough, storing some keys in Tails involves some risk but I think it is practically nil, remote, completely minimal, you should be very unlucky to get hacked.
Browser extension went bye bye! Now you just point it to the downloaded file and it verifies it in browser...needless to say I downloaded the sig file and ran PGP....of course even then who knows but at least tails is tails, especially on a dvd-r...
This is true, stuff goes out of date very quickly in this space :) The in-browser verification is functionally the same and also simpler regardless of what browser you are using :
Hello! That's a great video. I'm a newby in the crypto space, but I know from the begining the importance of security. Everything was very easy to understand,very well explained until you introduced the second USB, from there I was in dark, I did not understand why you did that. Sorry for this stupid question. But can you explain, what do you have in the second USB, I did not understand if is a wallet (like metamask) or why you did the process with 24 word. Thx
@@CryptoGuide thank you for answering. So when you introduced the second USB at 13:46, I did not understand from where you have the files on the USB, and why you did that. Thx. If I don't do that I am secure? Thx
This was basically using the files on the USB stick that can be used to generate/verify mnemonics, etc. (Ian Coleman's BIP39 tools) This allows you to just use tails with all networking disabled, as opposed to downloading it all within tails itself and needing to remember to disable networking.
The way you do videos is the same as lectures, three steps; Tell them what you are going to tell them, tell them, then tell them what you told them. Also, try editing this and getting it down to 5-10mins.
Well yea, Tails is supposed to be a very minimal OS, so installing things isn't always straight forward. Honestly, if you are just going with a closed source, software wallet like Exodus, you should just use Ubuntu. The extra security for being on tails, airgapped, etc, is totally undermined by using Exodus...
This may look too complicated for a newbie, but when your BTC (thus your money!) are involved, you have to start becoming maniac of security and soon you understand it is not so difficult! Thanks for your tutorials!!
Yea it does seem a bit over the top, but if people get your private keys, it's all over :( Hope it helps make it seem a bit less daunting :)
Very awesome ... So one could write down their 24 & see the balance safely?
My suggestion would be that they use Ian Coleman's Tool to get the addresses they want to check and then either copy the addresses out, or use a mobile phone watch wallet like Sentinel to monitor the xpub address (I cover it in the 2nd half of this video th-cam.com/video/j5nejoEGWFw/w-d-xo.html)
I would suggest that you keep the TAILS install with your keys completely disconnected from any networks.
@@CryptoGuide Trugarez m8... I agree 100
@@CryptoGuide seems there's an inherent risk to write down a 24 on a web page though :/
With all this neat OPSEC it still boils down to a web site... that's supposed to be a nono to put down a key on the net... as you said.
Wait!
Did I miss you saying this addy phishing can be done off net? no... uhg it's late I can't think anymore I'm still such a noob coz this doesn't seem feseable :/
@@gaeldesmontagnesnoires1711 it's not actually a website, you are running it as an offline file in your browser in an OS that wipes itself on reboot. Even if the code was malicious, running it in such am environment is safe.
@@CryptoGuide So if I have a brand new laptop, I go online & get on Ian's page then cut off my internet & check data; if I understand correctly... yes my OPSEC suck but I just spent all day(ish) to get around this so I need to unlatch right now. Back @ it 2mrow :)
Excellent video! Got everything working, thank you!! Thumbs up & subscribed!!! ....oh wait ...already subscribed long time ago. Stay awesome!!!
Awesome, thank you!
What is the point of downloading Tails to the Windows machine first and not directly to the usb drive?
By the way, your videos are so helpful! Thank you! XD
You need to download the file to flash it on to a USB stuck, so you can't just download directly to the USB stuck.
Wow Air Gap! I have not set up that type of security since the military. That was very interesting and cool but for most people i think setting up an air gap as a solution is way overkill/crypto is not going to go mainstream if you have to jump though these type of hoops. But awesome. Super informative. I also would be using Brave not Chrome. edit: Oh you are Brave verified! Tipped and subbed.
@@CryptoGuide No disagreement there I'm just saying it's a sad State of Affairs when you have to go to such lengths.
Why not Whonix instead of Tails? Tails is more to minimize forensic exploitation ...
Being fully amnesic is the feature that you want which tails does by default :)
Never mind that you should really boot in to tails to play with your seed, not just run it in a VM... You don't want any trace of your desktop OS being able to interact with it at all... (Something which whonix encourages but Tails will actually warn you about)
@@CryptoGuide Awesome, and what do you think about booting a Linux distro like Mint or Kali (as second OS, a pc with Windows and Linux) and runing Tails on it? I am thinking about that option. My idea was Qubes OS but you can't run another OS with that. Thanks!
A secondary OS that isn't your "daily driver" environment would certainly be in improvement, particularly if you then run in a VM. You would need a very sophisticated attack to get data out that way. The issue is that for anything that isn't amnesic, you are placing some level of trust in the integrity of the OS and the virtualization environment.
The main thing that tails has going for it is that it is very easy for people to just flash and use :)
Hey, thanks for the tutorial, it was really helpful. However, I have two questions:
- how can I send cryptocurrencies, if the internet connection is disabled?
- should the mnemonic passphrase be persistently stored in Tails? (as the internet connection is completely disabled, I honestly don't see much issue, knowing it'd be encrypted in a persistent storage which Tails itself provides).
You can send funds by using a watch only wallet that is online which passes the transactions to the offline part to sign.
If you want to use persistence, you can, just be sure to keep an offline, physical copy of your seed as a backup.
@@CryptoGuide Excellent, thank you! Do you have a tutorial as regards the watch only wallet and offline sign method?
Not really with Tails but the process is the same as o demo for securely sweeping a paper wallet with Electrum.
thanks for the video, then how Do I Install electrum now and keep it updated with an offline wallet?
Are you planning to have a computer that would be used specifically for this or would you be re-using an existing one and just booting into TAILS and re-entering your seed phrase each time?
@@CryptoGuide No I was trying to make a USB drive be used as a laptop or mobile since I don't have other hardware, But I'm thinking about purchasing now a ledger nano for convenience.
A hardware wallet certainly achieves the same thing in a far simpler way. I look at wallets here: cryptoguide.tips/hardware-wallet-comparisons/ and the Ledger Nano S is certainly a great mix of security, accessibility and cost.
You can use Wasabi in Tails connected to the internet through the Tor network as long as you do not manipulate private keys when connected. To avoid key storage in Tails, you can supplement Wasabi with a Trezor or Ledger. It is safer than using it in Windows, an operating system that monitors absolutely everything you are doing. Doing the same thing but without the hardware wallet also seems safe enough, storing some keys in Tails involves some risk but I think it is practically nil, remote, completely minimal, you should be very unlucky to get hacked.
Can you use electrum and metamask together from the ledger on tails?
Browser extension went bye bye! Now you just point it to the downloaded file and it verifies it in browser...needless to say I downloaded the sig file and ran PGP....of course even then who knows but at least tails is tails, especially on a dvd-r...
This is true, stuff goes out of date very quickly in this space :) The in-browser verification is functionally the same and also simpler regardless of what browser you are using :
Hello! That's a great video. I'm a newby in the crypto space, but I know from the begining the importance of security. Everything was very easy to understand,very well explained until you introduced the second USB, from there I was in dark, I did not understand why you did that. Sorry for this stupid question. But can you explain, what do you have in the second USB, I did not understand if is a wallet (like metamask) or why you did the process with 24 word. Thx
Where abouts are you getting lost (in terms of timestamp)
@@CryptoGuide thank you for answering. So when you introduced the second USB at 13:46, I did not understand from where you have the files on the USB, and why you did that. Thx. If I don't do that I am secure? Thx
This was basically using the files on the USB stick that can be used to generate/verify mnemonics, etc. (Ian Coleman's BIP39 tools) This allows you to just use tails with all networking disabled, as opposed to downloading it all within tails itself and needing to remember to disable networking.
Disable network connection?? Electrum needs a network connection.
If you are handling your keys then being offline is the way to go. You can use Electrum to offline sign directly in Electrum :)
Okay so how did you get this file to download
Are you having trouble downloading the tails Linux image itself?
The way you do videos is the same as lectures, three steps; Tell them what you are going to tell them, tell them, then tell them what you told them. Also, try editing this and getting it down to 5-10mins.
Basically yea. This video is one of my oldest ones, so not as concise as what I do now :)
HOW TO UPGRAGE YOUR TAILS?? STEP 5 WAS SKIPPED. PLS HELP
Do you mean upgrade and keep your persistence?
Any Tails compatible XRP wallets?
Are you just wanting something for HODL, BIP39 paper wallet style or actually something you can transact with?
I watched this and setup Tails. Than you for this. Need a wallet I can transact with. Tried setting up Exodus Wallet. Nightmare!
Well yea, Tails is supposed to be a very minimal OS, so installing things isn't always straight forward. Honestly, if you are just going with a closed source, software wallet like Exodus, you should just use Ubuntu. The extra security for being on tails, airgapped, etc, is totally undermined by using Exodus...
Thanks a lot brother. Will do this instead. Much appreciated.
.