I would follow a pattern like this:
  • Prepare all secrets (seeds, descriptors, passphrases, etc).
  • Encrypt in a secure, airgapped environment.
  • Store the encrypted contents online somehow.
  • Cross the border.
  • Decrypt on airgapped machine in destination, proceed with life.
The specific details (how to encrypt, how to create the secure env, how to store online, etc) can change, but that's the general drill.
Darth's cats picture is an example of this.
reply
I expect these kitties to one day be as famous as Laszlo's pizzas.
I'm curious Darth: do you know how strong the cryptography on this pic is compared to, say, SHA256?
I just thought it would be funny to repeatedly pull this image up everytime some FUDster goes around saying "Bitcoin will end because <insert your favourite cryptographic function here> will soon be broken by <quantum computers/jesus/the fall of the roman empire>".
reply
Sent you a SN DM over LN with an explanation. We can't reveal here in plain sight all teh secrets to grifters.
how strong the cryptography on this pic is compared to, say, SHA256?
I think it can be compared. Nobody broke that until now. But the strength is not in the cryptography but in hiding it in plain sight: the attacker will NEVER know which one is the real one. So let them waste their time looking for empty files. šŸ˜‚šŸ˜‚šŸ˜‚šŸ˜‚šŸ˜‚šŸ˜‚šŸ˜‚šŸ˜‚šŸ˜‚šŸ˜‚
reply
deleted by author
reply