What would be the ideal solution for generating and storing crypto-related secrets?
According to the experts, this “ideal” solution would have to meet several important criteria.
Firstly, you’d need to use a device dedicated to managing and storing your most important data. These “secrets”, passwords, seedphrases, passphrase or 2FA code etc… should be known only to you, and it’s important to keep them separate from your other usual means of storage.
So, while saving an unimportant text file on a USB key is unlikely to put you in danger, it’s a different matter to store your bank access codes, or the PIN code that unlocks your hardware wallet.
You’ll need a secure device dedicated to this function.
Encrypted hardware
Of course, security means encrypting your data. There’s no point in saving your most important secrets on a specific device if you store your data in plain text.
Encrypting your data means that anyone accessing your device (whether through loss or theft, or stumbling across it by chance) will not be able to read its contents.
As a general rule, the device is unlocked by a PIN code known only to you, thus reinforcing the security of your solution. Make sure you don’t forget this code, or you’ll lose access to all your data.
Off-line support
No device is perfect. And depending on your Internet activities, the devices you use may be more or less at risk.
Downloading files, movies or games from untrusted sources can not only be illegal, but also a major source of risk for your machine.
Similarly, some streaming sites have an interface specifically designed to force users to install browser extensions or other unwanted elements on your machine that you clearly don’t need.
There’s a story on the Internet of someone who lost a large part of his crypto assets after downloading a texture pack for Minecraft, put online by a Russian hacker. The software that infects your machine is vicious and waits patiently for you to access the data it’s interested in, then passes it on to the attacker sometimes weeks after infection.
By choosing an offline storage mode, you reduce this risk, as any viruses or malware cannot install themselves on your backup media.
Durable, practical and portable
While some passwords are not intended to be used for long (one-off subscription to a given service, trying out a new site or service), others need to be kept for years.
This is the case for access to public and health services. Or access to your bank accounts and other financial services. The same goes for your seedphrase, which you’ll probably want to pass on to your descendants.
So it’s essential that the device you use to store your data can stand the test of time.
And since you’ll probably need to access your accounts even when you’re on the move, your device needs to be easily transportable.
To achieve this, your passwords need to slip easily into your wallet, so you don’t have to worry about whether you’ve got them on you or not.
Less electronics means more safety
It goes without saying that the durability of a product goes hand in hand with the robustness and reliability of its design. Devices packed with electronics should be avoided wherever possible, as their buttons, screens and electronic circuits may not stand the test of time.
A complex device is also more likely to suffer from reliability problems, whether mechanical or electronic. It is also less likely to withstand dust accumulation or a handling error that causes it to take on water (even briefly).
Inexpensive
Finally, as password management is an essential part of our digital lives, the miracle product must be accessible to all, so that no one is left behind. Every Internet user is entitled to protection of his or her secrets.
In this respect, it’s worth noting that some online password management services offer subscription packages, often relatively expensive, which justify your remaining in control of your data storage by purchasing the dedicated solution you deem best suited to your needs.
In a world where every compromised connection can be disastrous, don’t leave your data unprotected. Join us for more information about security: https: //seedkeeper.io
Credit: Source link