Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: cymbeline
If they have a keystroke logger, you're pretty much screwed no matter what you are using to transact online. So the first order of business would be to have a reasonably secure machine in the first place. Which is good advice whether using crypto or not.

Wait, let me walk that back a bit. Hardcore crypto security-minded folks advise using an offline (never connected to the internet) machine that they process their crypto transactions on. This should be absolutely secure (short of someone planting a spy camera in the room). They use the offline computer to generate a transaction and then type it into an online computer to publish the TX to the network. In this case a keystroke logger would know you've sent a transaction, but your account (private key) would be totally secure.

With traditional financial accounts the keystroke logger would have your account ID/password, but with a crypto wallet it would never see anything that could compromise your funds with this setup.

15 posted on 09/20/2022 3:04:12 PM PDT by EnderWiggin1970
[ Post Reply | Private Reply | To 14 | View Replies ]


To: EnderWiggin1970

“If they have a keystroke logger, you’re pretty much screwed”

If I’m receiving data using double-key encryption (forgot what it’s called), I generated both public and private keys and sent the public one to the other end. The other end uses the public key to send stuff to me.

Do you create the keys on your offline computer? If so, when you get an encrypted message from the other guy on your online computer, how do you get that message to your offline computer so you can decrypt it.

I’m probably missing something.

Here’s my idea to deal with hacking. Use very simple, primitive, internet software, perhaps like what we ran 20 years ago. Communicate only with text. No software downloading. The software in the computers is burned in ROM and never changes. This would not be your entertainment computer. It would be only for secure communication. The two-factor encrpytion scheme could be used.


17 posted on 09/20/2022 5:08:46 PM PDT by cymbeline
[ Post Reply | Private Reply | To 15 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson