Brian Erdelyi [ARCHIVE] on Nostr: π
Original date posted:2015-02-02 π Original message:Another concept... It ...
π
Original date posted:2015-02-02
π Original message:Another concept...
It should be possible to use multisig wallets to protect against malware. For example, a user could generate a wallet with 3 keys and require a transaction that has been signed by 2 of those keys. One key is placed in cold storage and anther sent to a third-party.
It is now possible to generate and sign transactions on the users computer and send this signed transaction to the third-party for the second signature. This now permits the use of out of band transaction verification techniques before the third party signs the transaction and sends to the blockchain.
If the third-party is malicious or becomes compromised they would not have the ability to complete transactions as they only have one private key. If the third-party disappeared, the user could use the key in cold storage to sign transactions and send funds to a new wallet.
Thoughts?
Published at
2023-06-07 15:29:16Event JSON
{
"id": "8e98905bd41104ca785bb90288356099a19cd68c27689034d8a0536df4a4de17",
"pubkey": "5f57805600aff24704ce401a57e78ba1631be95f18e62e28fb3168e3be1ea5c5",
"created_at": 1686151756,
"kind": 1,
"tags": [
[
"e",
"541657d412739d9d2a5bc263564b0f2ef650e16ac828484a06cbef551e18c76c",
"",
"root"
],
[
"e",
"14425d6a0c447898692b100e9178d5ff62008bd63a13b672188ea828b2763472",
"",
"reply"
],
[
"p",
"4152e31c01b342df88fa96d1710e34de9fe547b5c0f387d8eb1c2f1e67c5ace5"
]
],
"content": "π
Original date posted:2015-02-02\nπ Original message:Another concept...\n\nIt should be possible to use multisig wallets to protect against malware. For example, a user could generate a wallet with 3 keys and require a transaction that has been signed by 2 of those keys. One key is placed in cold storage and anther sent to a third-party.\n\nIt is now possible to generate and sign transactions on the users computer and send this signed transaction to the third-party for the second signature. This now permits the use of out of band transaction verification techniques before the third party signs the transaction and sends to the blockchain.\n\nIf the third-party is malicious or becomes compromised they would not have the ability to complete transactions as they only have one private key. If the third-party disappeared, the user could use the key in cold storage to sign transactions and send funds to a new wallet.\n\nThoughts?",
"sig": "2fc54f2e53e6f9aacbf30c9751b1616070723d6f05a48005dd85efe73ba3d44e89a2f0eedd4a0ad3e7adafd5fb5b6b54994796030bed4117af5ab4985dc2b5b6"
}