09.07.2014 Views

Crypto Biz Magazine—July, 2014/Issue.02

Digital Currencies & Crypto Innovations—We observe and explore all aspects of the crypto world, including mining, financial trading, exchanges, development and business.

Digital Currencies & Crypto Innovations—We observe and explore all aspects of the crypto world, including mining, financial trading, exchanges, development and business.

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

WHY YOU SHOULD PROBABLY BE<br />

USING A MULTISIG BITCOIN WALLET<br />

by ARIANNA SIMPSON<br />

If you’re like most people,<br />

you probably like things to be<br />

simple. Many users simply don’t<br />

want the headache of thinking<br />

about security, which is the<br />

appeal of a full-service solution<br />

that stores your private keys<br />

for you. These full-service solutions<br />

become problematic for<br />

more advanced or tech-savvy<br />

users, who generally want a<br />

heightened degree of security<br />

while maintaining control over<br />

their assets.<br />

Page.26 July.<strong>2014</strong><br />

<strong>Crypto</strong> <strong>Biz</strong> Magazine<br />

I WOULD SAY I’M GENERALLY<br />

a jovial person, but if I woke up<br />

and realized I had lost 7500<br />

bitcoins, I would encourage<br />

the rest of the world to back<br />

away from me… very slowly and<br />

without making any sudden<br />

movements. Fortunately, this<br />

hasn’t happened to me, but it<br />

did happen, unfortunately, to<br />

Jeremy Howells, who became<br />

infamous in the Bitcoin community<br />

for accidentally disposing<br />

of his hard drive with the keys<br />

to all of his bitcoins on it.<br />

At this point in time, we’re still<br />

in the early stages of Bitcoin’s<br />

life cycle, and five years is like<br />

the blink of an eye in currency<br />

years. Although there is a strong<br />

trend toward mass adoption<br />

(5 million wallets, growing 8x<br />

year-over-year, according to<br />

Mary Meeker’s annual report),<br />

we’re not there yet. As things<br />

currently stand, there’s a<br />

fundamental disconnect<br />

between usability and control.<br />

You can choose to keep your<br />

private keys yourself in what is<br />

known as a client-side wallet,<br />

or you can hand them over to<br />

a third party that stores them<br />

for you in a web wallet. When<br />

you do the latter, you’re trusting<br />

that the third party is taking<br />

appropriate security measures,<br />

which includes keeping at least<br />

the majority of your bitcoins in<br />

cold storage. As we’ve learned<br />

from Mt. Gox and other similar<br />

fiascos, this isn’t always the<br />

case, which is why the safest<br />

thing to do is to diversify your<br />

holdings by using a variety of<br />

wallets so if one gets hacked,<br />

you don’t lose everything.<br />

Conveniently enough, the<br />

Bitcoin protocol can accommodate<br />

such a tall order. Pay<br />

to Script Hash (P2SH) is a type<br />

of Bitcoin address that was<br />

introduced as part of Bitcoin<br />

Improvement Proposal 16<br />

(also known as BIP 16), early in<br />

2012. P2SH addresses can be<br />

secured using a more complex<br />

algorithm than standard addresses,<br />

and involve the use of<br />

multiple Elliptic Curve Digital<br />

Signature Algorithm (more<br />

commonly known as ECDSA)<br />

keys, rather than only one.<br />

Multi-signature (M of N) wallets<br />

allow users to maintain<br />

direct control over their<br />

bitcoins while also removing<br />

some of the security burden<br />

from them. In the event that<br />

one of their private keys is lost<br />

or stolen, it no longer means<br />

lost access to your bitcoins,<br />

as they can still be accessed<br />

using the backup keys.<br />

The concept of m-of-n signature<br />

schemes is fairly simple,<br />

at least at an abstract level:<br />

In order to complete a transaction,<br />

more than one private key<br />

(m) is needed out of a total<br />

number generated (n). In a<br />

2-of-3 scenario, you would need

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!