🔒 Unlock the power of your Coldcard MK7 Wallet with our practical guide on how to connect it with Sparrow, Electrum, and Nunchuck wallets. Learn the different ways to transact via USB, MicroSD, and NFC, and find the method that suits your needs. Don't forget to like, share, and subscribe for more useful crypto insights!💡🔒Get your very own Coldcard super-secure hardware wallet here: store.coinkite.com/promo/1EAFA81551CF2D7F4897
Hey there @cryptodad I've tried installing sparrow and nunchuk and Avast keeps alerting me to possible trojans. I've even gone so far as to ensure I've downloaded the packages from official sites (Sparrow- I've checked certificates PGP keys, hashs etc.) and still get possible trojan alerts. Is there an antivirus that specializes with BTC enough to have analyzed the code for false positives etc? thanks in advance.
Thanks for sharing! Just a quick off-topic question: I have USDT in my OKX wallet and I have the recovery phrase. 《pride》-《pole》-《obtain》-《together》-《second》-《when》-《future》-《mask》-《review》-《nature》-《potato》-《bulb》. What is the best way to transfer them to Binance?
in case i created a wallet at spawwor and connected in the laptop, should i re-do my seed phases for security reason in case i would like to use only offile ?
Because the device requires power. I mentioned that it is connected to a power brick, not my computer. There are battery powered chargers, but I consider this overkill. I'm not worried about hackers in my power outlets.
@@CryptoDadAlthough unlikely it is possible the power brick can collect data from the CC. These days even regular usb cables have been known to have firmware in them that collects data transmitted through them and sends that to the hacker. Coinkite stocks a 9V battery connector to eliminate any doubts
@@pinoyrunningpenguina power bank could have a hacking device attached to it too. /s Amazes me the level of paranoia people have ! Jeez just use a USB instead. Coldcard and Sparrow are both open source. It's not like you are verifying the contents of the SD card and decrypting the hex values of the transaction signature or the PSBT. USB is actually more secure than using an SD card because SD card file can be manipulated as soon as it is connected to your computer. But a USB to sparrow wallet communication cannot be intercepted as easily as modifying a file on external storage.
Hi your video's are really helpful. I have some questions and I haven't been able to find the answers anywhere. I hope you know this. Once I've exported a JSON file to import in Sparrow can I delete the JSON file from the sd card? If I don't delete it can I always just import the first JSON file on the sd card or do I need to export it again from the coldcard when I need it for a new computer later? I assume the first JSON file would be fine to use?
It asks me to "Insert an SD card to do this operation" when I am trying to generate a wallet file for Sparrow. But I do have an SD inside the card reader for exactly that purpose but the coldcard doesnt seem to recognize it.
Great tutorial! One question, how is transferring data via SD card more secure than the plain USB cable? Aren't they both touching the computer and inevitably interfacing with the internet? If the private key is secured by the two security chips on the Coldcard what is the worry?
The cards don't really have to know about new wallets. The cards have the master private key. If you've added new cryptos, using one card, then they will be on the app. When a signature is required from a card, it basically reads the master private key from the card. So any card will work. I'm just kind of spit balling here, but I'm pretty sure that's the essence of how it works. A good question by the way.
The only weakness I can see is if the private key momentarily leaves the secure chip and goes into a flash memory (similar to the Trezor physical hack flaw that was discovered) but I can't imagine that is how the Coldcard works. I'm sure they've learned from that mistake. They must run checksum algorithms on the files on the SDcard to ensure nothing malicious is entering the Coldcard, and the transaction is passed to the secure chip for signing and not the other way around. I don't know, it just mystifies me. I would have thought that passing the transactions via QR codes and a camera would be a better way to go. But then maybe there are malicious QR codes? Anyway, thanks for getting back to me!@@CryptoDad
Interesting, but if this is what's required to do self-custody of the BTC you own then BTC doesn't have a future. Enough people aren't going to do this to matter, so when others' BTC, that is being held by Coinbase or whatever other custodial exchange they have it on, gets confiscated by the various gov'ts, there will be so little BTC available for circulation at that point that it won't be worth spending the money to upkeep the infrastructure required to support it.
@@DownUnderBlues-f3t I totally agree. I’m not a huge fan of the cold card, but it is definitely one of the most secure solutions out there and has a big commitment to transparency. However, I would definitely not recommend it for beginners. You should check out my videos covering Ledger and Trezor, they are the most mainstream hardware wallets out there
🔒 Unlock the power of your Coldcard MK7 Wallet with our practical guide on how to connect it with Sparrow, Electrum, and Nunchuck wallets. Learn the different ways to transact via USB, MicroSD, and NFC, and find the method that suits your needs. Don't forget to like, share, and subscribe for more useful crypto insights!💡🔒Get your very own Coldcard super-secure hardware wallet here: store.coinkite.com/promo/1EAFA81551CF2D7F4897
Hey there @cryptodad I've tried installing sparrow and nunchuk and Avast keeps alerting me to possible trojans. I've even gone so far as to ensure I've downloaded the packages from official sites (Sparrow- I've checked certificates PGP keys, hashs etc.) and still get possible trojan alerts. Is there an antivirus that specializes with BTC enough to have analyzed the code for false positives etc? thanks in advance.
Best video on this topic ive seen. Thanks!
Good normal length video .... jeeezzzz that 2 hours are crazy no time for that
Thanks for sharing! Just a quick off-topic question: I have USDT in my OKX wallet and I have the recovery phrase. 《pride》-《pole》-《obtain》-《together》-《second》-《when》-《future》-《mask》-《review》-《nature》-《potato》-《bulb》. What is the best way to transfer them to Binance?
Why did you choose Electrum for the Airgapped Transaction? Are there any benefits to using Electrum vs Sparrow? Thanks!
in case i created a wallet at spawwor and connected in the laptop, should i re-do my seed phases for security reason in case i would like to use only offile ?
can you use the same wallet created in nunchuck for multiple transfers? or do i need keep generating different wallets from the cc4 key? thanks
Thanks, great job, 👍👌
do you need three physical MK4 coldcards in order to do multisig? Thanks
quick question, why you keep your coldcard connected to the usb-c cable while doing air gap sign?
Because the device requires power. I mentioned that it is connected to a power brick, not my computer. There are battery powered chargers, but I consider this overkill. I'm not worried about hackers in my power outlets.
@@CryptoDadAlthough unlikely it is possible the power brick can collect data from the CC. These days even regular usb cables have been known to have firmware in them that collects data transmitted through them and sends that to the hacker. Coinkite stocks a 9V battery connector to eliminate any doubts
@@CryptoDad why not just use a power bank?
@@pinoyrunningpenguina power bank could have a hacking device attached to it too. /s Amazes me the level of paranoia people have ! Jeez just use a USB instead. Coldcard and Sparrow are both open source. It's not like you are verifying the contents of the SD card and decrypting the hex values of the transaction signature or the PSBT. USB is actually more secure than using an SD card because SD card file can be manipulated as soon as it is connected to your computer. But a USB to sparrow wallet communication cannot be intercepted as easily as modifying a file on external storage.
Hi your video's are really helpful. I have some questions and I haven't been able to find the answers anywhere. I hope you know this. Once I've exported a JSON file to import in Sparrow can I delete the JSON file from the sd card? If I don't delete it can I always just import the first JSON file on the sd card or do I need to export it again from the coldcard when I need it for a new computer later? I assume the first JSON file would be fine to use?
More ColdCard videos please
It asks me to "Insert an SD card to do this operation" when I am trying to generate a wallet file for Sparrow. But I do have an SD inside the card reader for exactly that purpose but the coldcard doesnt seem to recognize it.
mine wont connect to my coldcard. i get an error that says "error connecting to wallet" .."error executing hwi"... any help?
Hi. Have a problem, where u connect the usb, my computer cant find any devise :(
Brilliant! Merci beaucoup
Great tutorial! One question, how is transferring data via SD card more secure than the plain USB cable? Aren't they both touching the computer and inevitably interfacing with the internet? If the private key is secured by the two security chips on the Coldcard what is the worry?
The cards don't really have to know about new wallets. The cards have the master private key. If you've added new cryptos, using one card, then they will be on the app. When a signature is required from a card, it basically reads the master private key from the card. So any card will work. I'm just kind of spit balling here, but I'm pretty sure that's the essence of how it works. A good question by the way.
The only weakness I can see is if the private key momentarily leaves the secure chip and goes into a flash memory (similar to the Trezor physical hack flaw that was discovered) but I can't imagine that is how the Coldcard works. I'm sure they've learned from that mistake. They must run checksum algorithms on the files on the SDcard to ensure nothing malicious is entering the Coldcard, and the transaction is passed to the secure chip for signing and not the other way around. I don't know, it just mystifies me. I would have thought that passing the transactions via QR codes and a camera would be a better way to go. But then maybe there are malicious QR codes? Anyway, thanks for getting back to me!@@CryptoDad
Sparrow is the best wallet for PC and should only be used air gapped.
NFC is airgapped? So there is no possible way to hack over nfc?
Not hack but possible to steal data though ever difficult since it’s near field
Thank you Sir. waiting for this one any more cold card tips will be great
The "AI you" just seems to be getting younger.
I noticed that doesn't have any age spots either!
Blockstream jade please
Ok… time to show how to work with the passphrase
Aha!!!!.... Krypto Dad takes vitamin D3 and K2!!!!!
At least the AI version of me does.
Interesting, but if this is what's required to do self-custody of the BTC you own then BTC doesn't have a future. Enough people aren't going to do this to matter, so when others' BTC, that is being held by Coinbase or whatever other custodial exchange they have it on, gets confiscated by the various gov'ts, there will be so little BTC available for circulation at that point that it won't be worth spending the money to upkeep the infrastructure required to support it.
This is so complicated and confusing for a beginner.
@@DownUnderBlues-f3t I totally agree. I’m not a huge fan of the cold card, but it is definitely one of the most secure solutions out there and has a big commitment to transparency. However, I would definitely not recommend it for beginners. You should check out my videos covering Ledger and Trezor, they are the most mainstream hardware wallets out there
I like using bluewallet for mobile.