Hi Everyone. I want to get everyone's opinion. Say you have an ultra secure type of situation where you want to store very sensitive information. I will use crypto as a perfect example.
So if everyone is not aware there has been bitcoin exchanges compromised in the past (mt gox). With the way bitcoin works if it's stolen from an exchange there is no FDIC insurance. Honestly i haven’t read up on it that much but i’m not sure if they are sure if it was an inside job or not but anyways best practice is to take it off the exchange ASAP (especially if it's a significant amount).
So say you want to secure $2,000,000 of crypto on your own system. Probably best practice dictates you don’t do it on the computer you use everyday. Realize with crypto if they get your keys they don’t need to have access to any of your computers. Its all in the blockchain and everything you have would be lost in seconds.
So unless you have the money to buy a separate computer for it a good idea might be to setup a VM.
Best practices would dictate you install the least amount of software on this vm as possible. Say made the decision to use Windows 10. What security software would you use? I think the least # of vendors you have to trust the better. While Kaspersky, Bitdefender, Eset, ect are IMO better than Windows Defender all it takes is one rogue employee at one of these organizations to compromise your keys and steal all your money for any place in the world. If it did happen it's pretty unlikely that you would ever be able to track it down. So if you think you would load up this computer with different security software then you better trust every single vendor and they systems in place for tracking every employee. So what would you do? You might even thinking about turning the screws up on windows defender with something like configuredefender. While i agree Andy is a great guy and probably would never do anything nefarious but we are talking about $2,000,000. You probably should never trust that much to anyone over the internet (or in person). So would you rather just trust Microsoft at this point have to trust other companies.
Then you have to choose where to store these golden keys. There are local only password managers like keypass or cloud based ones like 1password, bitwarden, lastpass, roboform, dashlane, ect.. I’m a big proponent of open source but everyone thinks they are safe if they use open source. There has been big vulnerabilities in open source software that wasn’t found for more than 10 years (openssl). The pro for open source is that everyone can review the code the con is everyone can review the code
. If someone finds a vulnerability they might disclose it responsibly, keep it for their own malicious purpose, or sell it. Also how comfortable are you with the binaries that you are downloading? Who built them and how sure are you they didn’t add something a little something extra extra
? Unless you download the source and build them manually and you're smart enough to review the source yourself.
Some of you might be saying I would never store this info in the cloud but i see major issues with using the (local only) solution. If you use something like keypass (local only) you would have to have it backed up somehow. Are you going to stick it on a file server? Well you can no longer DMZ the vm and if you are then you might be opening Pandora’s box for anything on your network. If they can grab the file then they could do an offline brute force attack. Even if you are going to store it on a file server how are you going to back it up? Then what attack service does that open (cloud or software based).
Some of you might say why not linux? While I agree that linux is much more secure for general computing we generally do run secure software (how many AV vendors run on linux other than crappy ones like clamav)? There has been back doors in linux because someone stuck something extra in (AUR in Arch for example).
I wanted to get your guys thoughts on this? I think this is a very hard security problem.
So if everyone is not aware there has been bitcoin exchanges compromised in the past (mt gox). With the way bitcoin works if it's stolen from an exchange there is no FDIC insurance. Honestly i haven’t read up on it that much but i’m not sure if they are sure if it was an inside job or not but anyways best practice is to take it off the exchange ASAP (especially if it's a significant amount).
So say you want to secure $2,000,000 of crypto on your own system. Probably best practice dictates you don’t do it on the computer you use everyday. Realize with crypto if they get your keys they don’t need to have access to any of your computers. Its all in the blockchain and everything you have would be lost in seconds.
So unless you have the money to buy a separate computer for it a good idea might be to setup a VM.
Best practices would dictate you install the least amount of software on this vm as possible. Say made the decision to use Windows 10. What security software would you use? I think the least # of vendors you have to trust the better. While Kaspersky, Bitdefender, Eset, ect are IMO better than Windows Defender all it takes is one rogue employee at one of these organizations to compromise your keys and steal all your money for any place in the world. If it did happen it's pretty unlikely that you would ever be able to track it down. So if you think you would load up this computer with different security software then you better trust every single vendor and they systems in place for tracking every employee. So what would you do? You might even thinking about turning the screws up on windows defender with something like configuredefender. While i agree Andy is a great guy and probably would never do anything nefarious but we are talking about $2,000,000. You probably should never trust that much to anyone over the internet (or in person). So would you rather just trust Microsoft at this point have to trust other companies.
Then you have to choose where to store these golden keys. There are local only password managers like keypass or cloud based ones like 1password, bitwarden, lastpass, roboform, dashlane, ect.. I’m a big proponent of open source but everyone thinks they are safe if they use open source. There has been big vulnerabilities in open source software that wasn’t found for more than 10 years (openssl). The pro for open source is that everyone can review the code the con is everyone can review the code
Some of you might be saying I would never store this info in the cloud but i see major issues with using the (local only) solution. If you use something like keypass (local only) you would have to have it backed up somehow. Are you going to stick it on a file server? Well you can no longer DMZ the vm and if you are then you might be opening Pandora’s box for anything on your network. If they can grab the file then they could do an offline brute force attack. Even if you are going to store it on a file server how are you going to back it up? Then what attack service does that open (cloud or software based).
Some of you might say why not linux? While I agree that linux is much more secure for general computing we generally do run secure software (how many AV vendors run on linux other than crappy ones like clamav)? There has been back doors in linux because someone stuck something extra in (AUR in Arch for example).
I wanted to get your guys thoughts on this? I think this is a very hard security problem.