Skip to content

Use Honeypots #50

@weasel3

Description

@weasel3

Consider updating _docs/extend/improvements.md, because ...

Consider leaving a relatively easy accessible loaded honeypot-wallet on each supposedly secure location (e.g. a paper printed with the seed and QR-Code of the xpriv/xpub for quick sweep-access).
When using a m-of-n multisig constallation with passphrase for the real funds, load up each single wallet originating from each cosigner's seeds (w/o passphrase) with "f*ck-up-money" and set up a notification process when the honeypot is emptied (e.g. IFTTT).
Do the same with the multisig-wallet w/o the passphrase and the trap is set.

Drawbacks:

  • a honeypot could trigger an attacker to "go for more"
  • a honeypot could be identified as such from the attacker and not be emptied, leaving the originator in a false sense of security

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions