Show thread history
Marc
3w ago
Andreas said this in a video a few years ago, but I disagree.
1) You can keep the output descriptor with each key. You are unlikely to use 2-of-3 of these copies.
2) You can combine multisig with Seed XOR(2-of-2). Ideally, each key would be in steel it requires each key to have part a or b of each other key. You should also have the extra word, but I am not sure it's necessary.
This is better from a privacy perspective because if one key is comprised, the thief has no way of knowing how much bitcoin you have.
Here is how it would work:

1) You can keep the output descriptor with each key. You are unlikely to use 2-of-3 of these copies.
2) You can combine multisig with Seed XOR(2-of-2). Ideally, each key would be in steel it requires each key to have part a or b of each other key. You should also have the extra word, but I am not sure it's necessary.
This is better from a privacy perspective because if one key is comprised, the thief has no way of knowing how much bitcoin you have.
Here is how it would work:

See translation
1
1
0
0
0
Replies
mike
@mike
3w ago
It’s so much more pleasant on NOSTR than X 😂
mike
•
3w ago
I wonder how people survive over on X 😂


See translation
See translation
1
0
0
0
0
Marc
@Marc
3w ago
I don't condone his shitcoin takes, but Andreas taught me a lot about bitcoin cybersecurity back in the day.
See translation
1
1
0
0
8
mike
@mike
♥︎ by author
3w ago
I have no interest in the person, only the knowledge they are sharing.
See translation
1
1
0
0
0
mike
@mike
3w ago
Actually a better way of putting this is;
I only judge the knowledge, not the person.
I only judge the knowledge, not the person.
See translation
0
0
0
0
0