paint-brush
How to Create a Cold Storage Crypto Wallet with a USB Memory Stickby@noaahhh
29,079 reads
29,079 reads

How to Create a Cold Storage Crypto Wallet with a USB Memory Stick

by Nuh Yurduseven1mOctober 1st, 2021
Read on Terminal Reader
Read this story w/o Javascript

Too Long; Didn't Read

Cryptocurrency is not a phenomenon that is stored like physical money. The amount transferred from one account to the other account is recorded in the data structure. For this reason, crypto money cannot be stored in any hardware. The entire blockchain can be downloaded to disk by downloading the bitcoin core for bitcoin core. This is the safest method, but as of August 4, 2021, the chain size is 349.3 GB. The tails operating system is configured to be more of a portable system. The system can be "persistent" so that the files can be saved to the USB memory.

Coin Mentioned

Mention Thumbnail
featured image - How to Create a Cold Storage Crypto Wallet with a USB Memory Stick
Nuh Yurduseven HackerNoon profile picture

Hi, today I'm gonna teach you how to create a cold-storage wallet for bitcoin or other crypto coins using USB memory and tails.


Tails, an operating system based on Debian and providing anonymity by routing all network traffic through Tor, will be used as the operating system. We will examine what features are available in some security-oriented distributions. Let's dive into the content.

Cold-wallets vs Hot-wallets

Cold wallets are a type of wallet that is used to store your private key and other information on hardware that does not have an internet connection. As another type, paper wallets can also be considered cold wallets. Here, only the private key and the information that will enable us to reach the total balance in the blockchain are available. Examples of hardware wallets are ledger and trazor. These are electronic devices similar to USB sticks that are configured to generate public and private keys and are used to store keys with the highest level of security. It can be ordered and used within a certain fee. On the other hand, hot wallets are the type of wallet where the private key you will use to access your account on the internet is stored in a cloud-based wallet. This one is more insecure than the other but faster. Security in these types of wallets depends on measures taken by the provider of the wallet application, such as two-factor authentication. On the other hand, the security of the provider database also depends on the security measures that the wallet provider can take. This service, offered by many crypto exchanges, makes it easy to use money.


It's good to say it again. Cryptocurrency is not a phenomenon that is stored like physical money. The amount transferred from one account to the other account is recorded in the blocks in the data structure, which is in the form of an interconnected list called Blockchain and is added to the end of the block as a result of the transactions related to the operation of the blockchain network. In other words, this database does not have an architecture where the amount of money and other information of any account is kept in an object as in banks. For this reason, crypto money cannot be stored in any hardware. The entire blockchain can be downloaded to disk by downloading the bitcoin core for bitcoin. This is the safest method. But as of August 4, 2021, the chain size is 349.3 GB. For this reason, this method is not preferred except for bitcoin miners.


Tails

Tails is a GNU/Linux distribution with Debian-based security customizations. This system is often used by cybersecurity professionals as a portable and secure operating system. In the crypto world, many people use this method to access and manage their money on the blockchain. You can click the link below to download Tails.


The tails operating system is configured to be more of a portable system. The Internet connection can be routed through the Tor network. At the same time, the system can be "persistent" so that the files can be saved to the USB memory, and this section is encrypted to provide security. It should be noted that using the Tor network does not provide complete protection and complete invisibility. This is one of the common mistakes made by groups called “Lamer” or “Script Kiddie” in cyber security. Every system running on the Internet may have a security vulnerability. That's why it's still good to be careful. However, I believe that it can be quite useful as a cold wallet if used carefully.


Installation on a USB stick

After the iso is downloaded, the iso can be written to a USB stick. You can use dd or etcher or any of the Rufus software for this. Then the system is started via USB memory. At the first boot, the basic language-keyboard settings are taken and configured and the live system is started in this way.


The method I use will be to create a KVM-qemu virtual machine on the host I use, and select and add the USB memory connected to the host machine with the virt-manager visual interface from the hardware list and start it from the boot menu on this device. Installation in a virtual machine is not recommended by tails. You can even detect that tails OS is running on the virtual machine and you will see a warning message. However, there will be no harm in doing the first installation in this way. The system works on USB but is still a live system.

Make persistent and encryption

For this feature, it can be used by encrypting the part that the system does not fill on the USB memory with the configure persistent volume option from the application menu. This section can be used with this password when you set a password and start the new system, but you can use this section as a live system without opening it.


Cold-wallet configuration

TailsOS comes with an electrum bitcoin wallet installed. To use this wallet, the Bitcoin client must be activated from the configuration persistent volume application, so that the configurations and other data of this application can be saved in the persistent partition. A reboot is then required.


The necessary configurations can now be made by opening the Electrum wallet.


Electrum wallet is a very common wallet application. It can be installed on any machine, but in this way, it will provide a safer use. First, the wallet must be given a name. Many options are available in the next menu. If you have a standard, 2-factor authentication, multi-signature, or previously prepared wallet, you can import it. I will create a standard wallet.


In the next option, it is necessary to create a new seed. This is an algorithm that generates the private key. It generates a list of 12 words and this list represents your private key for you. You must record these words in order.


Do not share these words with anyone


In the next step, it asks you to enter these words in order. It then asks you for a password to re-encrypt your wallet.


You can see the public key and other information of the wallet from the "Wallet information" tab.


Now you can start using it

It is necessary to use different wallets for other cryptocurrencies and tokens. For this, you can download and download different wallets and install them on the system.


Other security oriented GNU/Linux OS

Linux Kodachi is also a tails-like system but is a newer distribution. It routes network traffic through VPN and Tor. It can be installed on USB memory or DVD. Likewise, this is a Debian-based distribution.


Whonix is ​​an operating system with a Debian-based Tor network and a security architecture based on isolation. Whonix consists of two parts: One runs only Tor and acts as a gateway, called the Whonix-Gateway. The other part, called Whonix-Workstation, is on a completely isolated network. Only connections through Tor are possible. It is one of the recommended distributions in the Cubes system. Security is provided by increasing isolation with virtualization on the Xen kernel.

Some distributions such as Kali, Black Arch, and Parrot are distributions where the test tools needed for offensive and defensive security are collected. These come pre-loaded with many tools such as Metasploit where known exploits are collected, medusa which is a brute force tool, Nmap for network scanning, Wireshark, and SQL ninja.



This article was first published on Dev.to