multisig should be used ONLY for corporations and/or cases when are involved more than 1 people into managing funds. For single users is really dumb and unnecessary. Keep it simple, don't complicate it when it could be simple.
What do you think of shamir like on the trezor T ? I know its not the same as multi sig. 🤙
reply
I hide 12 words on 12 mountain peaks (for real, this is not a joke), over 3000m altitude, hard to reach them, only for the brave, not for the weak. It is only me that knows the order, even if somebody will find the capsule I left in those peaks.
So tell me how is this compared with a HW? How many intents would be possible to "break" this security? Good luck finding my peaks...
reply
Pro shamir, got it 😅
reply
Interesting setup. I have thought about steganography too. If it is OK for you to reveal that (don't hesitate to say you don't want to) I am curious to know in what kind of place (under a rock, etc) you put your words on the peaks, and if when you come back it was still there at the same place (because of rain and wind slowly moving it for example).
reply
reply
Interesting, so you use a USB key with Tails, huh. I was wondering how you could recover a physical picture and its exact pixel value to get the password recovered but you do it with Tails so this explains that. Thank you for sharing! By the way I don't know what kind of people are hiking where you are but it could be that they are honest so they don't steal you (for example even if I went there I wouldn't like to steal your property)
reply
openstego.com
reply
I think it depends on your situation and location (or threat model). Without travelling I agree, and thanks to my location singlesig was enough. Now what happens in a more adverserial environment? Multisig makes sense to manage keys with trusted people against loss of property. In this situation multisig can be like encrypting a disk: prevent the worst case scenario in case of loss, even if this loss may never happen. I don't drink alcohol so I don't care but I have heard people drinking and losing their work computer. I had a friend recently coerced with a gun to give his phone, it could happen with a hardware wallet as well (even though it is unlikely).
reply
reply
I see. To be fair the decoy with Trezor is good AFAIK and there is also a self-destruction after entering a wrong pin too much times with the coldcard.
reply