Wallet Security Strategies and Risk Tier Management
Colin Wu . 2023-08-24 . Data

In the realm of cryptocurrency’s dark forest, a vigilant stance on asset security is indispensable. This article will delve into my strategies for managing wallet private key security and implementing tiered management for various assets.

Relevance of Hardware Devices

● Apple MacBook Pro + Trezor or Other Hardware Wallets

Whenever possible, refrain from using Windows-based computers. While Apple systems are not immune to computer virus attacks, their frequency and likelihood are significantly lower.

Hierarchical Risk Management for Cold and Hot Wallets

1. Outermost Layer for Airdrops (Google Account 1 or Computer 1)

Functioning as the least secure level of hot wallets, these are designated for interaction with various potential airdrop projects. As these wallets require installation of diverse Chrome wallet plugins for purposes such as learning, translation, AI, and more, the security of some plugins cannot be guaranteed. To mitigate this risk, I’ve created a less frequently used Google account to install these plugins.

Furthermore, if you have entertainment or gaming requirements, it’s best to use a separate computer to avoid mixing gaming and wallet interactions on the same device.

2. Outermost Layer for Interaction (Google Account 2 or Computer 2)

Unlike the outer layer for airdrops, this layer involves several hot wallets for legitimate DeFi trading. Personally, I use the MetaMask Chrome browser plugin. Under this Google account, apart from MetaMask, I only use the essential 1Password password management plugin.

Assets in this tier constitute <5% of the portfolio and are utilized for various DeFi operations, signature approval, NFT trading, etc. Allocate funds you can afford to lose to these outer layer hot wallets.

Generally, these hot wallets are also ranked by risk level. You can have “risk-tolerant” wallets for basic projects, wallets for premium airdrops, and wallets exclusively for interacting with major blue-chip DeFi platforms like Curve, Convex, Uniswap, Liquity, Lido, etc. Regardless of the project, caution is advised against phishing websites. I’ve previously encountered a phishing website resembling RocketPool. It appeared identical but would prompt you to sign a transaction upon connecting your wallet, transferring all your ETH. Therefore, it’s imperative to carefully review transaction details, including amounts and target addresses, before signing any transactions.

3. Outer Layer for Cold Wallets

A cold wallet, also known as an offline wallet, keeps your private keys isolated from the internet. Feasible options include paper wallets, brain wallets, steel plate mnemonic phrases, or old smartphones. A secure and convenient method I recommend is combining a hardware wallet with a paper wallet or steel plate mnemonic phrase.

A paradox exists in offline storage of private keys or mnemonic phrases: while dispersing storage across multiple locations reduces the risk of loss, it makes them more susceptible to being breached at a single point and more prone to leakage.

To address this dilemma, cryptographers have devised a private key fragment backup scheme based on cryptography — Shamir’s Backup. This scheme allows you to divide your original private key into multiple fragments and use only a subset to recover the private key. This concept is also utilized in the cryptography of recent Distributed Validation Technology (DVT), albeit with validator keys for Ethereum staking.

As far as I’m aware, the only hardware wallet currently supporting Shamir’s Backup is Trezor Model T.

Even though the security of hardware wallets is robust, the funds in this layer should also remain below 5%. After all, in the event of a personal security threat, it’s essential to prioritize personal safety (most hardware wallets also provide solutions for such situations). Therefore, it’s recommended not to flaunt hardware wallets or wealth.

4. Middle Layer for Cold Wallets

The outer cold wallet layer doesn’t house your core assets; it merely serves as a decoy. Ensuring the safety of assets in this layer implies the security of your private key. Even if compromised, the loss is minimal, and there’s time to transfer assets from this middle layer.

So, what distinguishes this middle layer from the outer cold wallet layer? It’s the use of a hidden wallet employing passphrase technology.

Passphrases are not exclusive to Trezor; they can also be used with Ledger. The method involves adding a word or any string (even a space) to the existing 24-word (or 12-word) mnemonic phrase. The passphrase can be up to 50 characters long. This prompts the hardware wallet to derive a new address from the existing private key. Since this passphrase isn’t stored on any physical medium, its only repository is your mind or the mind of a family member. Whether dealing with hackers or real-life thieves, this remains an enduring secret shared between you and your family.

Assets in this layer constitute approximately 50% of the portfolio.

Asset Type: LSD assets, native Ethereum through SAAS-style POS staking.

Operational Strategy: No DEFI interaction, approval; only transfers between this wallet and the outer cold wallet address (for transferring LSD assets). The only operations conducted on this wallet are signatures during the Ethereum staking process and interactions with the Ethereum POS deposit contract. Additionally, the withdrawal address for Ethereum staking is the same as this wallet’s address.

This strategy ensures that hackers have to overcome multiple obstacles to access your assets: obtaining a majority of your private key fragments, knowledge of your asset details, extracting the passphrase from you, understanding your Ethereum POS staking, signing the un-staking sequence, and patiently waiting for the 4 to 5 days needed for unstaking. Only after these five steps can they potentially gain access to your assets.

4. Core Layer for Cold Wallets

Constructing the core cold wallet layer follows the same principles as the middle layer. However, the middle layer’s vulnerability lies in the potentially inadequate strength of the passphrase. If a hacker gains direct access to your private key, cracking a passphrase of a relatively low length would take a very short time. Hence, the necessity of establishing a deeper-layer, higher-security cold wallet.

I could further extend passphrase1 from the middle layer of the cold wallet, perhaps opting for a sequence stored in my family’s minds rather than a single word.

Assets in this layer constitute approximately 40% of the portfolio.

Asset Type: Native BTC and ETH.

Operational Strategy: Restricted to transfers between wallets.

In the End

The path of simplicity is profound. As they say, the simplest approach is often the most secure one. The fewer actions you undertake, the fewer intricacies you engage with, the more secure your wallet becomes. However, you must strike a balance and not become overly rigid, rejecting new concepts and experiences. What you can do is akin to what this article describes: risk stratification, asset isolation. Occasional theft of an asset isn’t the primary concern; the true fear lies in losing everything in one fell swoop. In a way, this approach resembles a gamble where you’re all in every time. Prolonged gambling leads to losses; a slight deviation could determine who ultimately claims the profits you’ve accumulated.

Follow us
Twitter: https://twitter.com/WuBlockchain
Telegram: https://t.me/wublockchainenglish

 



Read the original text