You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The lack of PSBT support means that modern hardware wallets with high quality airgaps such as [Cobo Vault](/known-issues/hardware/cobo) and [Specter-DIY](/known-issues/hardware/specter-diy) are not yet supported.
3
+
**Properly verifying a receive address is only possible for advanced users** and also requires plugging your hardware wallet into your computer, adding another potential attack vector.
While proper multisig allows you to have no single points of failure (see section title [Why Multisig](/why-multisig)), it still requires that you take some control of your financial sovereignty.
2
+
Proper multisig allows you to have no single points of failure (see section title [Why Multisig](/why-multisig)), but it still requires you take some control of your financial sovereignty.
3
3
Users who rely on third-party services may accidentally reintroduce a single points of failure.
4
4
For example, if a `2-of-3` service holds 1 of your keys and mails you 1 (malicious) hardware wallet they are in a trusted position as they could control a majority of your keys!
5
5
6
-
More realistically, were a multisig service provider to be hacked they might be able to exploit the trust users have for it.
6
+
More realistically, were a multisig service provider to be hacked they might be able to exploit the trust users have in them.
7
7
We've seen [similar attacks](https://cointelegraph.com/news/electrum-bitcoin-wallet-still-plagued-by-known-crypto-phishing-attack) on the popular Electrum Client for many years.
8
-
This might might take the form of an invalid receive address (if using a stateless hardware wallet with limited defenses) or an invalid change address (if using a hardware wallet that can't detect it).
8
+
This might might take the form of an invalid receive address (if using a stateless hardware wallet with limited defenses) or an invalid change address (if using a hardware wallet that can't detect change attacks).
Copy file name to clipboardExpand all lines: _pages/known-issues/hosted/casa.md
+14-15
Original file line number
Diff line number
Diff line change
@@ -2,16 +2,8 @@
2
2
title: Casa
3
3
---
4
4
5
-
{% include hosted/utxo_privacy.md %}
6
-
Casa is unique in that they do not perform traditional KYC, and it is even possible to signup without sharing your name.
7
-
Customers can pay anonymous with bitcoin or prepaid cards.
8
-
[Their privacy policy](https://blog.keys.casa/casa-privacy-and-data-protection-policy/) is intentionally very customer-friendly.
9
-
10
-
{% include hosted/spof.md %}
11
-
12
-
#### No Cobo Vault Support
13
-
This means that **properly verifying a receive address is only possible for advanced users** (instructions [here](https://blog.keys.casa/watch-only-wallet-guide/) or [here](https://support.keys.casa/hc/en-us/articles/360045032452-Creating-Watch-Only-Wallets)).
14
-
This will hopefully change soon.
5
+
{% include hosted/limited_hw.md %}
6
+
Casa has complex instructions [here](https://blog.keys.casa/watch-only-wallet-guide/) and [here](https://support.keys.casa/hc/en-us/articles/360045032452-Creating-Watch-Only-Wallets) on how to validate a receive address.
[Casa recommends you trust PSBTs of your cosigner wallets](https://support.keys.casa/hc/en-us/articles/360044798911-Coldcard-Setup) (meaning don't verify them).
@@ -21,17 +13,24 @@ In the event Casa were compromised, this leaves you at risk of loss when transac
21
13
Software hot wallets are inherently less secure but they have a better UX and offer one less device to buy/configure/update.
22
14
You can export your mobile key from the app for sovereign recovery purposes (instructions [here](https://walletsrecovery.org/recovery-docs/casa-recovery)).
23
15
24
-
#### Seedless
25
-
Casa is [Seedless](https://blog.keys.casa/casa-seedless-security-model/), meaning that by default there are no seed backups from your hardware wallets (the mobile and Casa keys are backed up automatically).
26
-
This has some UX benefits that may improve security, but can also increases the risk of loss.
27
-
28
16
#### Outdated Firmware
29
17
Casa [recommends users don't update their firmware](https://support.keys.casa/hc/en-us/articles/360045411571-Hardware-Wallet-Firmware-Upgrades).
30
18
This is likely to prevent hardware wallet vendors from being able to make breaking changes like [this one](https://github.com/trezor/trezor-firmware/issues/1044).
31
19
This will hopefully be resolved naturally in the future as hardware wallet vendors have strong incentives not to jeopardize access to user funds.
32
20
33
21
#### Sovereign Recovery Is Very Hard
34
-
While you can leave their service (or recover your coins if they go out of business), [the process](https://walletsrecovery.org/recovery-docs/casa-recovery) is likely only possible for expert users.
22
+
While you can leave their service (or recover your coins if they go out of business), [the process](https://walletsrecovery.org/recovery-docs/casa-recovery) is likely only possible for advanced users.
23
+
24
+
{% include hosted/spof.md %}
25
+
26
+
{% include hosted/utxo_privacy.md %}
27
+
Casa is unique in that they do not perform traditional KYC, and it is even possible to signup without sharing your name.
28
+
Customers can pay anonymous with bitcoin or prepaid cards.
29
+
[Their privacy policy](https://blog.keys.casa/casa-privacy-and-data-protection-policy/) is intentionally very customer-friendly.
30
+
31
+
#### Seedless
32
+
Casa is [Seedless](https://blog.keys.casa/casa-seedless-security-model/), meaning that by default there are no seed backups from your hardware wallets (the mobile and Casa keys are backed up automatically).
33
+
This has some UX benefits that may improve security, but can also increases the risk of loss.
Copy file name to clipboardExpand all lines: _pages/known-issues/hosted/unchained.md
+5-9
Original file line number
Diff line number
Diff line change
@@ -3,19 +3,15 @@ title: Unchained Capital
3
3
---
4
4
5
5
6
-
#### Limited Hardware Wallet Support
7
-
Unchained doesn't support Coldcard nor Cobo Vault, although they have [plans](https://unchained-capital.com/blog/gearing-up-the-caravan/) to add Coldcard in the future.
8
-
This means that **properly verifying a receive address is only possible for advanced users**.
6
+
{% include hosted/limited_hw.md %}
7
+
Unchained has complex instructions [here](https://medium.com/coinmonks/address-verification-when-changing-keys-for-unchained-capital-vaults-268005e7563e) on how to validate a receive address.
8
+
While they [recently added limited address verification functionality to Trezor](https://unchained-capital.com/blog/trezor-and-unchained-make-multisignature-safer/), this doesn't fundamentally fix [Trezor's many known issues](/known-issues/hardware/trezor).
9
+
As Trezor is stateless, these steps will only confirm that `1` of your keys is part of the quorum, you must repeat these steps on [*at least*`m` (and preferably `n`) of your devices](/known-issues/verify-receive-address).
9
10
10
-
Unchained [recently added some address verification functionality to Trezor](https://unchained-capital.com/blog/trezor-and-unchained-make-multisignature-safer/).
11
-
However, this improvement doesn't fundamentally fix [Trezor's many known issues](/known-issues/hardware/trezor).
12
-
As Trezor is stateless, these steps will only confirm that `1` of your keys is part of the quorum (not `m` of your keys are part of your `m-of-n`).
13
-
You must repeat these steps on [*at least*`m` of your devices](/known-issues/verify-receive-address).
11
+
{% include hosted/spof.md %}
14
12
15
13
{% include hosted/utxo_privacy.md %}
16
14
17
-
{% include hosted/spof.md %}
18
-
19
15
#### Only Option is 2-of-3
20
16
[`3-of-5` would be better](/quorum-advanced), especially when using a hosted service that already:
0 commit comments