Blockchain Security Introductory Notes (1)

avatar
慢雾科技
5 years ago
This article is approximately 512 words,and reading the entire article takes about 1 minutes
In order to allow novices to quickly adapt to the world of blockchain security attacks and defenses, SlowMist has launched a series of blockchain security introductory notes.

Blockchain Security Introductory Notes (1)

secondary title

Wallet Wallet

Wallet is a tool for managing private keys. There are various forms of digital currency wallets, but it usually includes a software client that allows users to check, store, and trade the digital currency they hold through the wallet. It is the infrastructure and important entry into the blockchain world.

secondary title

Blockchain Security Introductory Notes (1)

Cold Wallet Cold Wallet

secondary title

Hot Wallet Hot Wallet

secondary title

Public KeyPublic Key

secondary title

Private KeyPrivate Key

The private key (Private Key) is a string of data generated by a random algorithm. It can calculate the public key through an asymmetric encryption algorithm, and the public key can then calculate the address of the coin. The private key is very important as a password, hidden from all but the owner of the address. The blockchain assets are actually on the blockchain, and the owner actually only owns the private key, and has absolute control over the assets of the blockchain through the private key. Therefore, the core issue of blockchain asset security lies in the storage of the private key. The owner needs to do a good job of safekeeping.

secondary title

Mnemonic Mnemonic

secondary title

Keystore

Keystore is mainly common in the Ethereum wallet app (Bitcoin is similar to the Ethereum Keystore mechanism: BIP38). It is obtained by re-encrypting the private key through the wallet password. Unlike the mnemonic, it can generally be saved as text or JSON format storage. In other words, the Keystore needs to be decrypted with the wallet password to be equivalent to the private key. Therefore, Keystore needs to be used with the wallet password to import the wallet. When a hacker steals the Keystore, it is possible to unlock the Keystore by brute force cracking the Keystore password without the password. Therefore, it is recommended that the user set the password a little more complicated, such as bringing special characters, at least 8 characters, and store it safely. .

Blockchain Security Introductory Notes (1)
Picture from imToken Fans activity sharing

Due to the blessing of blockchain technology, the security factor of blockchain digital wallets is higher than that of other digital wallets. The most critical points are two points: anti-theft and anti-lost. Compared with the diversification of reasons for coin theft incidents, there are five main reasons for coin loss incidents: no backup, lost backup, forgotten password, wrong backup, and lost or damaged equipment. Therefore, when we back up a blockchain digital wallet, we must perform multiple and multiple backups of the private key, mnemonic, and Keystore to kill the risk of losing coins in the cradle. Finally, I will provide you with a summary from imTokenWallet security ten principles:

  1. Do not use unbacked up wallets

  2. Does not use email to transfer or store private keys

  3. Do not use WeChat collection or cloud backup to store private keys

  4. Do not take screenshots or take photos to save the private key

  5. Do not use WeChat, QQ to transfer private keys

  6. Do not tell the private key to the people around you

  7. Do not send the private key to the group

  8. Do not use wallet apps from unknown sources provided by third parties

  9. Not using an Apple ID provided by someone else

  10. Do not import private keys to unknown third-party websites

Original article, author:慢雾科技。Reprint/Content Collaboration/For Reporting, Please Contact report@odaily.email;Illegal reprinting must be punished by law.

ODAILY reminds readers to establish correct monetary and investment concepts, rationally view blockchain, and effectively improve risk awareness; We can actively report and report any illegal or criminal clues discovered to relevant departments.

Recommended Reading
Editor’s Picks