Skip to main content

QuadrigaCX Owes Customers $190 Million, Court Filing Shows - CoinDesk

xxx

She added that Cotten held “sole responsibility for handling the funds and coins,” and the remaining team members have had no luck accessing the exchange’s cold wallets since.

From QuadrigaCX Owes Customers $190 Million, Court Filing Shows - CoinDesk.

Cold wallets, as I was just reading in a new book “Blockchain and Decentralised Systems” by Pavel Kravchenko (et al),

A cold wallet is a digital wallet where private keys are stored and processed only on devices that do not have the ability to directly connect to the global internet.

A simple example of deep cold storage is opening a safe deposit box and putting a USB stick containing an encrypted wallet file in it. The public (sending) addresses can be used any time to send additional bitcoins to the wallet, but spending the bitcoins would require physical access to the box (in addition to knowledge of the encryption password).

Comments

Popular posts from this blog

We could fix mobile security, you know. We don't, but we could

Earlier in the week I blogged about mobile banking security , and I said that in design terms it is best to assume that the internet is in the hands of your enemies. In case you think I was exaggerating… The thieves also provided “free” wireless connections in public places to secretly mine users’ personal information. From Gone in minutes: Chinese cybertheft gangs mine smartphones for bank card data | South China Morning Post Personally, I always use an SSL VPN when connected by wifi (even at home!) but I doubt that most people would ever go to this trouble or take the time to configure a VPN and such like. Anyway, the point is that the internet isn’t secure. And actually SMS isn’t much better, which is why it shouldn’t really be used for securing anything as important as home banking. The report also described how gangs stole mobile security codes – which banks automatically send to card holders’ registered mobile phones to verify online transactions – by using either a Trojan...