手机怎么做冷钱包 用手机做冷钱包

『壹』 在TP钱包怎么抢发行的币

方法如下:
准备两部手机,一步联网的,用作观察钱包,一步不联网的,用作冷钱包,联网手机官网下载tp,用蓝牙传到另一部不联网手机,保存好安装包。
然后在不联网手机,打开tp,点创建钱包-我没有钱包_点击想要的钱包类型,比如btc,然后点击创建钱包,_设置钱包名称,和密码,然后记下助记词,用笔抄在本子上,可以多写几份。然后卸载tp,再重新安装tp,点击我有钱包,用刚才的助记词,重新登陆,看看助记词是否正确。如果正确,点击冷钱包,导入冷钱包,助记词,用刚才的助记词,然后,冷钱包创建完毕。可以把你交易所里的币提到这个钱包里面,第一次少提,验证一下。
联网手机,打开tp点击我有钱包,点击观察钱包,输入助记词,观察钱包创建完成,从这里可以看到你刚才转入的币。

『贰』 热钱包,冷钱包,TP钱包,傻傻分不清

(请原谅千漫写币圈的内容。这是我进入币圈学习了近半年的心得体会。内心深处,我为自己骄傲和自豪,因为币圈对于我这样一个完全数字以及逻辑盲的人,本来是不可能学得进去的。但是我坚持住了。

币圈多坑,而最好的方式是我进入这个行业,了解了非常多,那么别人无法忽悠我。

另外,还有一种态度是,我宣扬真正好的东西,伪劣的坑人的那些东西,就会空间小一些。TP团队是我认真考察过的团队。总部办公室在深圳。

如果你不喜欢,那么可以看看我的画 或者平时的碎碎念。)

作为一个TP侠,我对Tokenpocket钱包念念不忘---最喜欢这个侠字。作为一个币圈小白,进来快半年了,已经有一点点脱白,变成米白,不再是那么高亮刺眼傻白傻白。

可是,作为小白,进来币圈,面对什么虚拟货币,热钱包,冷钱包,观察钱包,一脸懵逼的感觉,记忆犹新。所以,我要来写一下,这些曾经特别困扰我的各种钱包,到底是什么---其实,自己多使用几次,也就不神秘啦。

自8月份支持TRON底层以来,9月TP钱包迎来了TRON底层一个较大的更新,其内容包括:支持TRON底层的观察钱包、冷钱包、TP SDK集成TRON、增加TRON资产归集功能。

那么,什么是观察钱包?什么是冷钱包?

观察钱包:

使用在联网手机上,用来查看对应地址的转账、收款、交易记录等内容,比起区块浏览器数据查看方式显得更加直观,操作起来更加便捷,也符合平时使用习惯,一般可以单独使用,也可以配合冷钱包一起使用。

---只给查看账户状况,不能买卖,进行交易。---为啥呢?为了安全啊!!!

很多虚拟货币的持有者,并不像使用支付宝或者微信一样频繁。私钥也可能存放在纸质小本本上,不方便携带。出门在外,经常想念自己的比特币,这个币,那个币,毕竟这是以后暴富的种子---想看看它们,那么就可以使用观察钱包。

冷钱包:

也叫做离线钱包,它有别于观察钱包和正常使用的钱包模式,其采用和网络物理隔离的方式来使用,因为不连接网络,所以符合波场私钥格式的明文私钥都可以导入冷钱包,所以当用户变更过私钥后记得同步更新冷钱包的私钥内容。

冷钱包是虚拟货币最牢不可破的保障。因为热钱包虽然安全,毕竟在网络上运行,而只要在网络上运行,理论上就有被黑客获取的可能性。

冷钱包是绝对禁止网络的,可以用一个断网的手机,或者平时不用的电脑来进行操作。

不过,个人的钱包被盗,很大一部分是自己泄密或者私钥保管不当的案例更多一些。黑客攻击交易所的愿望更强烈一些,毕竟,投入时间,盗我的几聪比特币,有点浪费心情,哈哈。

如何制作冷钱包?

我曾经看过一篇比特傻的文章,讲到他第一次制作冷钱包,紧张得浑身冒汗,制作好以后,瘫坐在地---读起来非常有画面感,感觉制作冷钱包,是个很酷的事情。

等我有闲置的手机,也准备试试。

具体如何制作冷钱包,以及如何在TRON底层使用观察钱包和冷钱包,Tokenpocket公众号9月25日《秀秀秀秀秀秀秀秀秀》,有非常详细的教程。可以加钱包的公众号观看。

另外,TP钱包官方,币乎9月26日同名文章,有非常详细的教程,链接在这里:

https://bihu.com/article/1055030040

真的,没有你想的那么那么难,经常用用钱包,就会了。记得先一定用小额的费用试手,来回转账打款什么的,熟悉它的流程,等操作熟练了,那就可以想买多少就买多少---

喂,土豪,请留步---土豪带带我!我这有一个钱包地址,接受打赏---

『叁』 冷钱包和助记词硬件是怎么做的

不同于硬件冷钱包,软件冷钱包使用纯软件的方式实现冷钱包功能。用户需要使用两部手机,其中一部永久离线,作为冷钱包存储私钥(助记词)。另一部联网,作为观察钱包使用。
拓展资料:
使用冷钱包注意事项:
1、软件冷钱包可以实现更彻底的去信任(即不需要信任软件开发者),用户可以自行证明其钱包的绝对安全性。 在资产安全中,首当其冲的是助记词的安全。而在助记词的安全中,首要确认是助记词生成的随机性。如果您使用了一个作恶的硬件厂商(或者有 bug)的硬件钱包,您可能在第一步就已经陷落了。因为您拿到的助记词可能不是随机的,是预先生成的,或者是假随机的。 硬件冷钱包无法向用户证明在这点上它们是安全的。我们继续使用硬件钱包是基于对该硬件厂商的信任,而这点在数字货币的世界里是脆弱的。软件冷钱包却能给出证明。
2、在使用软件冷钱包时,你可选择信任软件,让其帮助您生成助记词。也可以选择不信任软件,自行在它处生成助记词。然后通过离线导入的方式生成冷钱包。因为冷钱包的设备是永久离线,不存在向互联网传输数据的可能(唯一的交互是通过二维码扫描和观察钱包之间进行明文传输,可审查),所以助记词的安全性得到了绝对的保障。 因此,软件冷钱包的助记词的安全性高于硬件冷钱包。
3、硬件冷钱包无法向用户证明在这点上它们是安全的。我们继续使用硬件钱包是基于对该硬件厂商的信任,而这点在数字货币的世界里是脆弱的。软件冷钱包却能给出证明。 在使用软件冷钱包时,你可选择信任软件,让其帮助您生成助记词。也可以选择不信任软件,自行在它处生成助记词。然后通过离线导入的方式生成冷钱包。因为冷钱包的设备是永久离线,不存在向互联网传输数据的可能(唯一的交互是通过二维码扫描和观察钱包之间进行明文传输,可审查),所以助记词的安全性得到了绝对的保障。

『肆』 比特币冷钱包到底应该怎么做

比特币冷钱包就是下载一个比特币客户端钱包,然后不让存放这个钱包的设备(电脑、手机、U盘等)断网。只要不联网,黑客就无法盗取比特币的比特币,理论上是这样的。目前,比特币冷存储是业界公认的最安全的比特币存储方法。

『伍』 冷钱包和助记词硬件是怎么做的

通过可信任的助记词、增加灵活性。
软件冷钱包,不同于硬件冷钱包,软件冷钱包使用纯软件的方式实现冷钱包功能。用户需要使用两部手机,其中一部永久离线,作为冷钱包存储私钥(助记词)。另一部联网,作为观察钱包使用。软件冷钱包和硬件冷钱包实现同样的功能,安全级别类似。但是它们有一些显著的区别:软件冷钱包可以使用闲置手机,没有额外的硬件;硬件冷钱包通过数据线或蓝牙传输数据,而软件冷钱包通过扫描二维码。
可信任的助记词:软件冷钱包可以实现更彻底的去信任(即不需要信任软件开发者),用户可以自行证明其钱包的绝对安全性。在资产安全中,首当其冲的是助记词的安全。而在助记词的安全中,首要确认是助记词生成的随机性。如果您使用了一个作恶的硬件厂商(或者有 bug)的硬件钱包,您可能在第一步就已经陷落了。
在使用软件冷钱包时,你可选择信任软件,让其帮助您生成助记词。也可以选择不信任软件,自行在它处生成助记词。因此,软件冷钱包的助记词的安全性高于硬件冷钱包。
软件冷钱包比硬件冷钱包更加灵活。通常软件冷钱包可以实现比硬件冷钱包更加复杂的功能。软件冷钱包的灵活性,也让其在资产的恢复方面也更加有优势。如果您的硬件钱包损坏,需要购买(同一厂商)的硬件,进行硬件恢复。而使用软件冷钱包,则没有这样的顾虑。
拓展资料:
目前市场上,虽然主要的冷钱包产品依然是以硬件冷钱包为主,但是它们正在受到软件冷钱包的冲击。硬件冷钱包: Ledger 是最知名的硬件冷钱包方案提供商; Trezor 是另一个知名的硬件冷钱包提供商;软件冷钱包:Ownbit 是最早实现软件冷钱包方案的钱包,也是支持冷钱包币种最多的钱包之一; Parity Signer 是 Parity 出品的以太坊软件冷钱包; 未来 事物发展的方向永远是化繁为简。越来越多的冷钱包正在以软件的方式实现。

『陆』 如何制作冷钱包

冷钱包,简单点说是永远不联网的钱包。

永远不联网的钱包,在生成的时候就不联网?那么网络会承认吗?

在生成钱包地址的时候就不联网,放心,网络会承认的。

1.钱包生成的原理

区块链钱包是根据非对称加密算法生成私钥和公钥,根据公钥通过一系列计算推导出地址。

因此任何人均可大量生成私钥、公钥、地址。怎么生成,可借助区块链钱包工具,生成私钥、公钥、生成符合公链规范的地址

比特币的私钥、公钥、地址生成的大致过程:

2.生成冷钱包

简便生成冷钱包,需要工具:手机+内存卡。
步骤如下:

一个冷钱包创建成功。

把不需要经常转账交易的币,转到该地址中去,可以先转入少量代币试一下。该地址的私钥和助记词是从未联网的。

3.冷钱包好处

冷钱包永不联网,不能被网络访问,因而避免了黑客盗取私钥的风险,相比热钱包更安全。

价值投资者,把冷钱包放进保险柜,避免放在交易所,时不时“手贱”操作一把。

当然,如果需要经常用来交易或频繁交易的,当资产较大的时候,冷热钱包配合使用,经常需要交易的用热钱包储存;无需进程交易的,用冷钱包储存。

『柒』 【提醒】离线冷钱包的潜在安全风险

通常情况下,拔掉网线,关闭WIFI,物理上与网络隔离的冷钱包是安全的。
但如果冷钱包里的资金太多,足以影响你的生活。应该多一些小心为好。

通常我们使用单独的电脑、手机或可启动U盘做冷钱包,
Linux 或 Windows启动后的登录密码只是一个初级的保护。黑客一旦获得了冷钱包,其可绕过登录密码修改文件。
一旦冷钱包里的文件被恶意修改过,而用户却不知情,继续使用修改过的冷钱包,就有被盗币的风险。

如果制作冷钱包的操作系统或钱包程序本身就被修改过,更不安全。

离线冷钱包的潜在安全风险:

1,修改操作系统的随机数生成器。

钱包地址的生成和交易的签名都依赖于随机数。一旦操作系统的随机数生成器被修改。生成随机数有特定规律,就算是离线也不安全。
a,随机数没有足够的熵,钱包地址易被暴力破解。
b,如果黑客知道交易签名时的用的随机数,可以通过数学公式倒推私钥。
c,如果同一地址在两个交易交易签名时的用了同一随机数,可以通过数学公式倒推私钥。在现有的区块链中有实例。

2,修改钱包程序

多数钱包程序是开源的,黑客很容易编译一个恶意的版本。一旦有机会,就可能在用户不知情时替换了正版。
通常离线冷钱包会用来对支付交易签名,恶意的钱包程序可能在签名这个步骤动手脚,比如:将余额发到的地址改为黑客的地址后再签名。
这个恶意的修改有可能只针对大额钱包地址,也就是对于小额钱包地址一切正常。

3,超声波信息的泄漏。

通常情况我们认为信息会通过网线,WIFI, 蓝牙传递。在离线的电脑或手机上,黑客程序也可能通过生成超声波(高频声音)发送信息,
超过20Khz的高频声音,多数人听不见,狗、蝙蝠和黑客的录音设备可以听见。

4,恶意USB固件攻击

USB设备包括U盘,键盘,鼠标等,如果USB通信固件被重写过,都有可能对系统发动攻击。比如模拟USB键盘输入,修改文件等。

5, 平板手机做的冷钱包,不要使用不可靠的充电器。

手机充电器大多是USB借口,这和第4点同理,只是因为充电器使用频率太大,易被忽视,同时人们有常有借用充电器和使用公用充电器的习惯,恶意改造过的USB充电器可能修改文件,或是注入程序。

建议:

1,制作冷钱包操作系统和钱包程序一定要仔细校验,确保来自官网且未被修改过。
2,不要使用不可靠的USB设备包括U盘,键盘,鼠标,充电器等.
3,你需要有个办法识别你的钱包是否被悄悄地修改过。(在洗澡或度假时)

把冷钱包锁在保险柜里更安全,把U盘钱包用信封封好,在封处出签名也是一个好办法。

『捌』 冷钱包需要单独一个手机

冷钱包确实需要单独一个手机,操作步骤如下:
1、找一部不用的手机或专门用作钱包的手机,手机恢复出厂设置
2、断开手机网络
3、安装imtoken钱包
4、用imtoken钱包创建钱包
5、将私钥备份至内存卡。

『玖』 冷钱包怎么申请好的地址

冷钱包申请好的地址过程。
1、首先,准备两部手机,一部不联机网络的手机,安装TP钱包。使用冷钱包的手机进入APP,创建冷钱包。
2、其次,用第二部手机打开TP钱包导入观察者钱包。用观察者钱包这台手机地址转账,
3、最后会弹出一个二维码用冷钱包手机打开TP,进入到冷钱包里,点击扫码申请好的地址。


『一』How to grab issued coins in TP wallet

The method is as follows:
Prepare two mobile phones, one with Internet connection for observing the wallet, one without Internet connection for As a cold wallet, download the tp from the official website of the connected mobile phone, use Bluetooth to transfer it to another non-connected mobile phone, and save the installation package.
Then on a mobile phone that is not connected to the Internet, open TP and click Create Wallet - I don’t have a wallet. Click on the wallet type you want, such as btc, then click Create Wallet, set the wallet name and password, and then write down the mnemonic phrase. Use a pen to copy it in a notebook. You can write more copies. Then uninstall tp, reinstall tp, click I have a wallet, use the mnemonic just now, log in again, and see if the mnemonic is correct. If it is correct, click on the cold wallet, import the cold wallet, mnemonic phrase, use the mnemonic phrase just now, and then the cold wallet is created. You can put the coins in your exchange into this wallet. Don't mention it for the first time and verify it.
On an Internet-connected mobile phone, open TP and click I have a wallet, click Observe Wallet, enter the mnemonic phrase, and observe that the wallet is created. From here you can see the coins you just transferred.

『二』Hot wallet, cold wallet, TP wallet, I can’t tell them apart

(Please forgive Qian Man for writing about the currency circle. This is my entry into the currency circle to learn My experience in the past six months. Deep down, I am proud of myself, because it is impossible for a person like me who is completely blind to numbers and logic to learn the currency circle. But I persevered.

There are many pitfalls in the currency circle, and the best way is for me to enter this industry and understand a lot, so others cannot fool me.

In addition, there is another attitude that I preach There will be less room for really good stuff, as well as shoddy stuff that deceives people. The TP team is a team that I have carefully inspected. The headquarter office is in Shenzhen.

If you don’t like it, you can watch it Look at my paintings or my usual thoughts.)

As a TP hero, I have never forgotten the Tokenpocket wallet---I like this character the most. As a novice in the currency circle, I have been in the industry for almost half a year, and I have already lost my whiteness a little, turning into off-white, and it is no longer so bright and dazzling.

However, as a novice, I came into the currency circle and faced virtual currencies, hot wallets, cold wallets, observing wallets, and the feeling of confusion is still fresh in my memory. Therefore, I am going to write about what these various wallets that once particularly troubled me are - in fact, it will no longer be a mystery if I use them a few times.

Since supporting TRON’s bottom layer in August, TP wallet has received a major update to TRON’s bottom layer in September, which includes: supporting TRON’s bottom layer observation wallet, cold wallet, TP SDK integrating TRON, Added TRON asset collection function.

So, what is an observation wallet? WhatIs it a cold wallet?

Observe the wallet:

Used on an Internet-connected mobile phone to view transfers, receipts, transaction records, etc. of the corresponding address. Compared with the block browser data viewing method It appears more intuitive, more convenient to operate, and conforms to daily usage habits. It can generally be used alone or in conjunction with a cold wallet.

---You can only view the account status, but cannot buy or sell. ---why? For safety! ! !

Many virtual currency holders do not use Alipay or WeChat as frequently. The private key may also be stored in a small paper notebook, which is inconvenient to carry. When I go out, I often miss my Bitcoins, this coin, that coin. After all, these are the seeds of getting rich in the future---If you want to see them, then you can use the observation wallet.

Cold wallet:

Also called offline wallet, it is different from the observation wallet and the normal wallet mode. It is used in a way that is physically isolated from the network because it does not Connect to the Internet, so any plaintext private key that conforms to the Tron private key format can be imported into the cold wallet, so when the user changes the private key, remember to update the private key content of the cold wallet simultaneously.

Cold wallets are the most unbreakable protection for virtual currencies. Although hot wallets are safe, they run on the network after all, and as long as they run on the network, there is a theoretical possibility of being obtained by hackers.

Cold wallets are absolutely prohibited from the Internet, and can be operated with a mobile phone that is disconnected from the Internet, or a computer that is not usually used.

However, when personal wallets are stolen, a large part of them are caused by personal leakage or improper storage of private keys. The desire to hack exchanges is stronger. After all, investing time and stealing a few satoshis of my Bitcoins is a bit of a waste, haha.

How to create a cold wallet?

I once read an article by BitStupid. He talked about the first time he made a cold wallet. He was so nervous that he was sweating. After making it, he collapsed on the ground---it was very interesting to read. The visuals make it feel like making a cold wallet is a cool thing.

When I have a spare mobile phone, I am going to try it too.

Specifically how to make a cold wallet, and how to use observation wallets and cold wallets at the bottom of TRON, the Tokenpocket public account has a very detailed tutorial on September 25th "Xiu Xiu Xiu Xiu Xiu Xiu Xiu Xiu" . You can add the official account of the wallet to watch.

In addition, TP Wallet official, Bihu article of the same name on September 26, has a very detailed tutorial, the link is here:

https://bihu.com/article /1055030040

Really, it’s not as difficult as you think. Just use your wallet regularly and you’ll be fine. Remember to try it out with a small fee first, transfer money back and forth, etc., and become familiar with its process. Once you are proficient in the operation, you can buy as much as you want---

Hello, Tuhao, please stay - Tuhao, take me with you! I have a wallet address here, accept tips---

『三』How are cold wallets and mnemonic hardware made?

Different from hardware cold wallets, software cold wallets Use pure software to implement the cold wallet function. Users need to use two mobile phones, one of which is permanently offline, as a cold wallet to store private keys (mnemonic phrases). The other one is connected to the Internet and used as an observation wallet.
Extended information:
Notes on using cold wallets:
1. Software cold wallets can achieve more complete trustlessness (that is, there is no need to trust software developers), and users can prove the absolute security of their wallets by themselves. . In asset security, the first thing that bears the brunt is the security of mnemonic phrases. In the security of mnemonic words, the first confirmation is the randomness of mnemonic word generation. If you use a hardware wallet from a rogue hardware manufacturer (or a buggy one), you may already be trapped on the first step. Because the mnemonic phrase you get may not be random, may be pre-generated, or may be pseudo-random. Hardware cold wallets cannot prove to users that they are secure at this point. Our continued use of hardware wallets is based on trust in the hardware manufacturer, which is fragile in the world of digital currency. Software cold wallets can provide proof.
2. When using a software cold wallet, you can choose to trust the software and let it help you generate a mnemonic phrase. You can also choose not to trust the software and generate the mnemonic phrase yourself elsewhere. Then generate a cold wallet through offline import. Because the cold wallet device is permanently offline, there is no possibility of transmitting data to the Internet (the only interaction is through QR code scanning and observation of clear text transmission between wallets, which can be reviewed), so the security of the mnemonic phrase is absolutely guaranteed. protection. Therefore, the security of the mnemonic phrase of software cold wallet is higher than that of hardware cold wallet.
3. Hardware cold wallets cannot prove to users that they are safe at this point. Our continued use of hardware wallets is based on trust in the hardware manufacturer, which is fragile in the world of digital currency. Software cold wallets can provide proof. When using a software cold wallet, you can choose to trust the software and let it help you generate a mnemonic phrase. You can also choose not to trust the software and generate the mnemonic phrase yourself elsewhere. Then generate a cold wallet through offline import. Because the cold wallet device is permanently offline, there is no possibility of transmitting data to the Internet (the only interaction is through QR code scanning and observation of clear text transmission between wallets, which can be reviewed), so the security of the mnemonic phrase is absolutely guaranteed. protection.

『四』How to do a Bitcoin cold wallet

A Bitcoin cold wallet is to download a Bitcoin client wallet.Then prevent the device (computer, mobile phone, USB flash drive, etc.) storing this wallet from being disconnected from the Internet. As long as you are not connected to the Internet, hackers cannot steal Bitcoins, in theory. Currently, Bitcoin cold storage is recognized as the safest method of Bitcoin storage in the industry.

『Wu』How to use cold wallet and mnemonic hardware

Increase flexibility through trusted mnemonic words.
Software cold wallet is different from hardware cold wallet. Software cold wallet uses pure software to realize the cold wallet function. Users need to use two mobile phones, one of which is permanently offline, as a cold wallet to store private keys (mnemonic phrases). The other one is connected to the Internet and used as an observation wallet. Software cold wallets and hardware cold wallets implement the same functions and have similar security levels. But they have some significant differences: software cold wallets can use idle mobile phones with no additional hardware; hardware cold wallets transmit data via data cables or Bluetooth, while software cold wallets scan QR codes.
Trusted mnemonic: Software cold wallet can achieve more complete trustlessness (that is, there is no need to trust the software developer), and users can prove the absolute security of their wallets by themselves. In asset security, the first thing that bears the brunt is the security of mnemonic phrases. In the security of mnemonic words, the first confirmation is the randomness of mnemonic word generation. If you use a hardware wallet from a rogue hardware manufacturer (or a buggy one), you may already be trapped on the first step.
When using a software cold wallet, you can choose to trust the software and let it help you generate a mnemonic phrase. You can also choose not to trust the software and generate the mnemonic phrase yourself elsewhere. Therefore, the security of the mnemonic phrase of software cold wallet is higher than that of hardware cold wallet.
Software cold wallets are more flexible than hardware cold wallets. Generally, software cold wallets can implement more complex functions than hardware cold wallets. The flexibility of software cold wallet also makes it more advantageous in asset recovery. If your hardware wallet is damaged, you need to purchase hardware (from the same manufacturer) for hardware recovery. With software cold wallets, there are no such concerns.
Extended information:
At present, although the main cold wallet products in the market are still hardware cold wallets, they are being impacted by software cold wallets. Hardware cold wallet: Ledger is the most well-known hardware cold wallet solution provider; Trezor is another well-known hardware cold wallet provider; Software cold wallet: Ownbit is the first wallet to implement software cold wallet solution and supports the most cold wallet currencies One of the wallets; Parity Signer is an Ethereum software cold wallet produced by Parity; The direction of future development of things is always to simplify the complex. More and more cold wallets are being implemented in software.

『Lu』 How to make a cold wallet

A cold wallet, to put it simply, is a wallet that is never connected to the Internet.

A wallet that is never connected to the Internet is not connected to the Internet when it is generated? So will the network admit it?

Do not connect to the Internet when generating the wallet address. Don’t worry, the network will recognize it.

1. Principle of wallet generation

Blockchain wallet generates private key and public key based on asymmetric encryption algorithm, and derives the address through a series of calculations based on the public key.

Therefore, anyone can generate private keys, public keys, and addresses in large quantities. How to generate, you can use blockchain wallet tools to generate private keys, public keys, and addresses that comply with public chain specifications

The general process of generating Bitcoin's private keys, public keys, and addresses:

2. Generate a cold wallet

To easily generate a cold wallet, you need tools: mobile phone + memory card.
The steps are as follows:

A cold wallet is created successfully.

Transfer coins that do not require frequent transfers and transactions to this address. You can try transferring a small amount of coins first. The private key and mnemonic phrase for this address have never been connected to the Internet.

3. Benefits of cold wallets

Cold wallets are never connected to the Internet and cannot be accessed by the network, thus avoiding the risk of hackers stealing private keys and making them safer than hot wallets.

Value investors, put the cold wallet in a safe and avoid putting it on the exchange. From time to time, you can operate it with "cheap hands".

Of course, if you need to trade often or frequently, when the assets are large, hot and cold wallets should be used together. If you often need to trade, use the hot wallet to store it; if you don’t need process transactions, use the cold wallet. store.

『撒』 [Reminder] Potential security risks of offline cold wallets

Under normal circumstances, cold wallets that are physically isolated from the network are safe by unplugging the network cable, turning off WIFI, and physically isolated from the network.
But if there are too many funds in the cold wallet, it can affect your life. It would be better to be more careful.

Usually we use a separate computer, mobile phone or bootable USB disk as a cold wallet.
The login password after Linux or Windows is started is only a primary protection. Once a hacker obtains a cold wallet, he or she can bypass the login password and modify the files.
Once the files in the cold wallet have been maliciously modified, but the user does not know it and continues to use the modified cold wallet, there is a risk of coins being stolen.

It is even more unsafe if the operating system or wallet program itself that creates the cold wallet has been modified.

Potential security risks of offline cold wallets:

1. Modify the random number generator of the operating system.

Both the generation of wallet addresses and the signature of transactions rely on random numbers. Once the operating system's random number generator is modified. There are specific rules for generating random numbers, and it is not safe even when offline.
a. The random number does not have enough entropy, and the wallet address is easily cracked by brute force.
b, ifA hacker knows the random number used when signing a transaction and can use mathematical formulas to infer the private key.
c. If the same address uses the same random number when signing two transactions, the private key can be inferred through mathematical formulas. There are examples in existing blockchains.

2. Modify the wallet program

Most wallet programs are open source, and it is easy for hackers to compile a malicious version. If given the opportunity, the genuine version may be replaced without the user's knowledge.
Usually offline cold wallets are used to sign payment transactions. Malicious wallet programs may manipulate the signing step, such as changing the address to which the balance is sent to the hacker's address before signing.
This malicious modification may only target large wallet addresses, which means that everything is normal for small wallet addresses.

3. Leakage of ultrasonic information.

Usually we think that information will be transmitted through network cables, WIFI, and Bluetooth. On an offline computer or mobile phone, hacker programs may also send information by generating ultrasonic waves (high-frequency sounds).
High-frequency sounds exceeding 20Khz are inaudible to most people, but can be heard by dogs, bats, and hacker recording devices.

4. Malicious USB firmware attack

USB devices include USB flash drives, keyboards, mice, etc. If the USB communication firmware has been rewritten, it is possible to launch attacks on the system. For example, simulate USB keyboard input, modify files, etc.

5. Do not use unreliable chargers for cold wallets made from phablets.

Most mobile phone chargers are USB excuses. This is the same as point 4, but because the charger is used too frequently, it is easy to be ignored. At the same time, people often borrow chargers and use public chargers. Habits, maliciously modified USB chargers may modify files or inject programs.

Suggestions:

1. When creating a cold wallet operating system and wallet program, you must carefully verify it to ensure that it comes from the official website and has not been modified.
2. Do not use unreliable USB devices including USB flash drives, keyboards, mice, chargers, etc.
3. You need to have a way to identify whether your wallet has been quietly modified. (While taking a bath or on vacation)

It is safer to lock the cold wallet in a safe. It is also a good idea to seal the USB flash drive wallet in an envelope and sign the seal.

『8』 A cold wallet requires a separate mobile phone

A cold wallet does require a separate mobile phone. The steps are as follows:
1. Find an unused mobile phone or use it specifically for Wallet mobile phone, restore the phone to factory settings
2. Disconnect the mobile phone network
3. Install imtoken wallet
4. Create a wallet with imtoken wallet
5. Back up the private key to the memory card.

『玖』How to apply for a good address for a cold wallet

The process of applying for a good address for a cold wallet.
1. First, prepare two mobile phones, one not connected to the network, and install TP wallet. Use the mobile phone of the cold wallet to enter the APP and create the cold wallet.
2. Secondly, use a second mobile phone to open the TP wallet and import it into the observer wallet. Use the mobile address of the Observer Wallet to transfer funds,
3. Finally, a QR code will pop up. Use the cold wallet mobile phone to open TP, enter the cold wallet, and click to scan the code to apply for the address.

本文来源: 网络 文章作者: 网络投稿
    下一篇

⑴ 钱包空空天气冷怎么发朋友圈钱包空空天气冷发朋友圈:1、以前觉得安全感是一个承诺,是爱人秒回的信息,他的早安晚安,和过马路紧握的手,而如今能给我安全感的却只有出门时口袋里的钱包和钥匙和手机里显示的满