Skip to content

Commit 6c2585e

Browse files
author
Michael Flaxman
committed
update hosted tradeoffs
1 parent f6b4610 commit 6c2585e

File tree

8 files changed

+29
-30
lines changed

8 files changed

+29
-30
lines changed

.wordlist.txt

+1
Original file line numberDiff line numberDiff line change
@@ -137,6 +137,7 @@ cryptographic
137137
cryptographically
138138
da
139139
disablewallet
140+
diy
140141
dmg
141142
dropdown
142143
electrum

README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ $ bundle exec jekyll serve
1111

1212
Then visit: <http://127.0.0.1:4000>
1313

14-
To spell check:
14+
To spell check (takes ~3s):
1515
```bash
1616
$ pyspelling -c .spellcheck.yml
1717
Spelling check passed :)

_includes/hosted/benefits.md

+1
Original file line numberDiff line numberDiff line change
@@ -6,3 +6,4 @@ No setup is 100% secure.
66

77
Hosted multisig providers make multisig much more accessible/easier for less technically savvy HODLers.
88
They will likely continue to improve over time and have an incentive to push best practices onto their users.
9+
When performed correctly, the hosting provider is unable to censor/steal funds and can only assist you in recovering your own funds.

_includes/hosted/limited_hw.md

+3
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
#### Only Supports Older Hardware Wallets
2+
The lack of PSBT support means that modern hardware wallets with high quality airgaps such as [Cobo Vault](/known-issues/hardware/cobo) and [Specter-DIY](/known-issues/hardware/specter-diy) are not yet supported.
3+
**Properly verifying a receive address is only possible for advanced users** and also requires plugging your hardware wallet into your computer, adding another potential attack vector.

_includes/hosted/spof.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
#### Could Reintroduce Single Points of Failure
2-
While proper multisig allows you to have no single points of failure (see section title [Why Multisig](/why-multisig)), it still requires that you take some control of your financial sovereignty.
2+
Proper multisig allows you to have no single points of failure (see section title [Why Multisig](/why-multisig)), but it still requires you take some control of your financial sovereignty.
33
Users who rely on third-party services may accidentally reintroduce a single points of failure.
44
For example, if a `2-of-3` service holds 1 of your keys and mails you 1 (malicious) hardware wallet they are in a trusted position as they could control a majority of your keys!
55

6-
More realistically, were a multisig service provider to be hacked they might be able to exploit the trust users have for it.
6+
More realistically, were a multisig service provider to be hacked they might be able to exploit the trust users have in them.
77
We've seen [similar attacks](https://cointelegraph.com/news/electrum-bitcoin-wallet-still-plagued-by-known-crypto-phishing-attack) on the popular Electrum Client for many years.
8-
This might might take the form of an invalid receive address (if using a stateless hardware wallet with limited defenses) or an invalid change address (if using a hardware wallet that can't detect it).
8+
This might might take the form of an invalid receive address (if using a stateless hardware wallet with limited defenses) or an invalid change address (if using a hardware wallet that can't detect change attacks).

_includes/hosted/utxo_privacy.md

+1-2
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,4 @@
1-
2-
#### Privacy Alert!
1+
#### Privacy Alert
32
Any third party service that can participate/coordinate multisig transactions will have access to your balance and transaction history.
43
They may be forced to share your records with multiple government agencies, and often be legally unable to disclose their compliance with requests.
54
Of course most bitcoiners buy their coins on exchanges that follow KYC/AML procedures, so this may or may not be a factor for your use-case.

_pages/known-issues/hosted/casa.md

+14-15
Original file line numberDiff line numberDiff line change
@@ -2,16 +2,8 @@
22
title: Casa
33
---
44

5-
{% include hosted/utxo_privacy.md %}
6-
Casa is unique in that they do not perform traditional KYC, and it is even possible to signup without sharing your name.
7-
Customers can pay anonymous with bitcoin or prepaid cards.
8-
[Their privacy policy](https://blog.keys.casa/casa-privacy-and-data-protection-policy/) is intentionally very customer-friendly.
9-
10-
{% include hosted/spof.md %}
11-
12-
#### No Cobo Vault Support
13-
This means that **properly verifying a receive address is only possible for advanced users** (instructions [here](https://blog.keys.casa/watch-only-wallet-guide/) or [here](https://support.keys.casa/hc/en-us/articles/360045032452-Creating-Watch-Only-Wallets)).
14-
This will hopefully change soon.
5+
{% include hosted/limited_hw.md %}
6+
Casa has complex instructions [here](https://blog.keys.casa/watch-only-wallet-guide/) and [here](https://support.keys.casa/hc/en-us/articles/360045032452-Creating-Watch-Only-Wallets) on how to validate a receive address.
157

168
#### Coldcard Implementation Doesn't Verify Cosigner Wallets
179
[Casa recommends you trust PSBTs of your cosigner wallets](https://support.keys.casa/hc/en-us/articles/360044798911-Coldcard-Setup) (meaning don't verify them).
@@ -21,17 +13,24 @@ In the event Casa were compromised, this leaves you at risk of loss when transac
2113
Software hot wallets are inherently less secure but they have a better UX and offer one less device to buy/configure/update.
2214
You can export your mobile key from the app for sovereign recovery purposes (instructions [here](https://walletsrecovery.org/recovery-docs/casa-recovery)).
2315

24-
#### Seedless
25-
Casa is [Seedless](https://blog.keys.casa/casa-seedless-security-model/), meaning that by default there are no seed backups from your hardware wallets (the mobile and Casa keys are backed up automatically).
26-
This has some UX benefits that may improve security, but can also increases the risk of loss.
27-
2816
#### Outdated Firmware
2917
Casa [recommends users don't update their firmware](https://support.keys.casa/hc/en-us/articles/360045411571-Hardware-Wallet-Firmware-Upgrades).
3018
This is likely to prevent hardware wallet vendors from being able to make breaking changes like [this one](https://github.com/trezor/trezor-firmware/issues/1044).
3119
This will hopefully be resolved naturally in the future as hardware wallet vendors have strong incentives not to jeopardize access to user funds.
3220

3321
#### Sovereign Recovery Is Very Hard
34-
While you can leave their service (or recover your coins if they go out of business), [the process](https://walletsrecovery.org/recovery-docs/casa-recovery) is likely only possible for expert users.
22+
While you can leave their service (or recover your coins if they go out of business), [the process](https://walletsrecovery.org/recovery-docs/casa-recovery) is likely only possible for advanced users.
23+
24+
{% include hosted/spof.md %}
25+
26+
{% include hosted/utxo_privacy.md %}
27+
Casa is unique in that they do not perform traditional KYC, and it is even possible to signup without sharing your name.
28+
Customers can pay anonymous with bitcoin or prepaid cards.
29+
[Their privacy policy](https://blog.keys.casa/casa-privacy-and-data-protection-policy/) is intentionally very customer-friendly.
30+
31+
#### Seedless
32+
Casa is [Seedless](https://blog.keys.casa/casa-seedless-security-model/), meaning that by default there are no seed backups from your hardware wallets (the mobile and Casa keys are backed up automatically).
33+
This has some UX benefits that may improve security, but can also increases the risk of loss.
3534

3635
{% include hosted/benefits.md %}
3736
Some noteworthy benefits of using Casa:

_pages/known-issues/hosted/unchained.md

+5-9
Original file line numberDiff line numberDiff line change
@@ -3,19 +3,15 @@ title: Unchained Capital
33
---
44

55

6-
#### Limited Hardware Wallet Support
7-
Unchained doesn't support Coldcard nor Cobo Vault, although they have [plans](https://unchained-capital.com/blog/gearing-up-the-caravan/) to add Coldcard in the future.
8-
This means that **properly verifying a receive address is only possible for advanced users**.
6+
{% include hosted/limited_hw.md %}
7+
Unchained has complex instructions [here](https://medium.com/coinmonks/address-verification-when-changing-keys-for-unchained-capital-vaults-268005e7563e) on how to validate a receive address.
8+
While they [recently added limited address verification functionality to Trezor](https://unchained-capital.com/blog/trezor-and-unchained-make-multisignature-safer/), this doesn't fundamentally fix [Trezor's many known issues](/known-issues/hardware/trezor).
9+
As Trezor is stateless, these steps will only confirm that `1` of your keys is part of the quorum, you must repeat these steps on [*at least* `m` (and preferably `n`) of your devices](/known-issues/verify-receive-address).
910

10-
Unchained [recently added some address verification functionality to Trezor](https://unchained-capital.com/blog/trezor-and-unchained-make-multisignature-safer/).
11-
However, this improvement doesn't fundamentally fix [Trezor's many known issues](/known-issues/hardware/trezor).
12-
As Trezor is stateless, these steps will only confirm that `1` of your keys is part of the quorum (not `m` of your keys are part of your `m-of-n`).
13-
You must repeat these steps on [*at least* `m` of your devices](/known-issues/verify-receive-address).
11+
{% include hosted/spof.md %}
1412

1513
{% include hosted/utxo_privacy.md %}
1614

17-
{% include hosted/spof.md %}
18-
1915
#### Only Option is 2-of-3
2016
[`3-of-5` would be better](/quorum-advanced), especially when using a hosted service that already:
2117
* Abstracts away a lot of multisig's complexity

0 commit comments

Comments
 (0)