Hash: SHA512

On 2016-09-15 17:50, Franz wrote:
> On Thu, Sep 15, 2016 at 5:26 AM, Andrew David Wong <a...@qubes-os.org> wrote:
> On 2016-09-14 19:11, Franz wrote:
>>>> On Wed, Sep 14, 2016 at 8:54 PM, Marek Marczykowski-Górecki <
>>>> marma...@invisiblethingslab.com> wrote:
>>>>> On Wed, Sep 14, 2016 at 08:07:35PM -0300, Franz wrote:
>>>>>> On Thu, Jun 30, 2016 at 12:42 AM, Andrew David Wong <a...@qubes-os.org>
>>>>>> wrote:
>>>>>>> On 2016-06-29 09:37, Franz wrote:
>>>>>>>> But how can I trust a printing dispVM for something as sensitive as
>>>>>>>> a hot wallet? We would need two different dispVMs but we are not
>>>>>>>> there yet.
>>>>>>> Indeed, not yet, but it will be implemented in R4.0:
>>>>>>> https://groups.google.com/d/topic/qubes-devel/xLZU0R5ijCg/discussion
>>>>>>> https://github.com/QubesOS/qubes-issues/issues/866
>>>>>>> https://github.com/QubesOS/qubes-issues/issues/2075
>>>>>> Andrew,
>>>>>> After various tests I am getting a bit more confidence about bitcoins.
>>>>> So I
>>>>>> prepared the promised tutorial. I tried to go to Qubes documentation to
>>>>> see
>>>>>> if there is any way to upload it, but found no reference. So I post it
>>>>>> here. Perhaps you know what to do.
> Thank you for taking the time to write this, Franz. However, we
> already have a page on using Split Bitcoin wallets (using
> Electrum) here:
> https://www.qubes-os.org/doc/split-bitcoin/
> Nonetheless, it looks like your guide has some additional
> information that is missing from the current page. Please
> consider submitting a pull request against this page with your
> additions.
>> Andrew
>> Additions? Well I used a somehow different way, because i sign the
>> transactions on both the hot and the cold VM. So the hot VM is not for
>> "watching" it is for doing exactly all what does the non-connected one
>> (including signing) and obviously for doing the real job of generating
>> addresses for receiving and sending bitcoins to other addresses. It is what
>> is called multi-signature.
>> Is it worth to sign the transaction two times, once for each VM? I do not
>> know, but it is not so much additional work because in both cases you
>> always have to copy a file forward and back between VMs.
>> But the two ways are somehow alternative. I see no point to mix them in the
>> tutorial just to increase confusion to a matter that is already a bit
>> complicated.
>> The final part of editing the firewall rules of hot VM to limit connection
>> to Electrum servers may be worth to protect the keys in hot VM, but may
>> have less sense if there are no keys to protect in hot VM.
>> So did nothing, but am obviously open to suggestions.
>> Best
>> Fran

Ok, I understand. Thanks for explaining, Fran.

> You can see the documentation guidelines including
> a step-by-step how-to) here:
> https://www.qubes-os.org/doc/doc-guidelines/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS


You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
For more options, visit https://groups.google.com/d/optout.

Reply via email to