Bitcoin Wallets BY DAVID BARNES | BITCOIN CO. LTD.

Slides:



Advertisements
Similar presentations
Cloud Computing EDT Cloud Computing Overview Cloud Computing can be defined as a network of applications, services, and infrastructure that are.
Advertisements

CHANGING THE WAY IT WORKS Cloud Computing 4/6/2015 Presented by S.Ganesh ( )
Bitcoin Proof of Payment Andy Ofiesh Senior Software Engineer Armory Technologies, Inc. MIT Bitcoin Expo, March 7 & 8th, 2014 © Armory Technologies, Inc.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Data Storage and Security Best Practices for storing and securing your data The goal of data storage is to ensure that your research data are in a safe.
© 2012 Microsoft Corporation. All rights reserved. Introducing SkyDrive. With Windows 8 never be without your files again. SkyDrive helps you sync, store,
June 23rd, 2009Inflectra Proprietary InformationPage: 1 SpiraTest/Plan/Team Deployment Considerations How to deploy for high-availability and strategies.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
CLOUD COMPUTING.  It is a collection of integrated and networked hardware, software and Internet infrastructure (called a platform).  One can use.
Smart Mail lets you send and receive s from your mobile phone in a quick and easy way using your favorite mail account.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
CRYPTOGRAPHY PROGRAMMING ON ANDROID Jinsheng Xu Associate Professor North Carolina A&T State University.
11:15:01 Storage device. Computer memory Primary storage 11:15:01.
Network Security in a Business Setting By: Brian Haumschild.
Cloud Computing All Copyrights reserved to Talal Abu-Ghazaleh Organization
Osama Shahid ( ) Vishal ( ) BSCS-5B
For more notes and topics visit:
Adam Leidigh Brandon Pyle Bernardo Ruiz Daniel Nakamura Arianna Campos.
Peer to Peer Network Anas Hardan. What is a Network? What is a Network? A network is a group of computers and other devices (such as printers) that are.
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
Virtualization. Virtualization  In computing, virtualization is a broad term that refers to the abstraction of computer resources  It is "a technique.
INFO1 – Practical problem solving in the digital world
File-Mate 1500 Design Review II
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
In the name of God :).
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
By Jonathan….and Darion……….. Reliability Windows File Protection protects core system files from being overwritten by application installs. Driver certification.
- Raghavi Reddy.  With traditional desktop computing, we run copies of software programs on our own computer. The documents we create are stored on our.
Decentralized multi-signature solutions for Bitcoin.
Module 6: Managing Client Access. Overview Implementing Client Access Servers Implementing Client Access Features Implementing Outlook Web Access Introduction.
Continuous Backup for Business CrashPlan PRO offers a paradigm of backup that includes a single solution for on-site and off-site backups that is more.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
{ Cloud computing. Exciting and relatively new technologies allow computing to be a part of our everyday lives. Cloud computing allows users to save their.
Agenda Overview of Seneca Computer System File Servers / Student Computer Accounts Telnet application How to Logon to Learn / Phobos accounts How to Change.
Intro to Block Chain Bitcoin. Blocks ●Ethereum - block chain ●Dogecoin - block chain ●Ripple - not a block chain ●Stellar - not a block chain ●Bitcoin.
Getting To Know Computers COMPUTER BASICS. WHAT IS A COMPUTER? A computer is an electronic device that manipulates information, or “data.” It has the.
Macquarie Fields College of TAFE Version 2 – 13 March HARDWARE 4.
Communications & Networks National 4 & 5 Computing Science.
Introduction TO Network Administration
Web Cache. What is Cache? Cache is the storing of data temporarily to improve performance. Cache exist in a variety of areas such as your CPU, Hard Disk.
Cloud Computing ENG. YOUSSEF ABDELHAKIM. Agenda :  The definitions of Cloud Computing.  Examples of Cloud Computing.  Which companies are using Cloud.
Part One Progress Check. Was your result as good as you hoped? The ‘multiple choice’ questions are OK if you know your stuff But the ‘longer’ questions.
How to Store and Use Bitcoins Tyler Moore, CS 7403, University of Tulsa Slides adapted from Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller,
1INTRODUCTION TO NETWORKING. Objective Introduction to networks. Need for networks. Classification of networks. 2INTRODUCTION TO NETWORKING.
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
People used to install software on their computers
Security Issues.
Open Web App.
Sharp recover issues by Trezor Customer Service Number For Help
Trezor Support Phone Number For You!! Round The Clock
Fix All Your Issues at Trezor Support Phone Number
Get Solution at Trezor Support Phone Number
TREZOR is a hardware wallet which was found in August Trezor was the first Bitcoinwallet that offers safe and secure cold storage.
Cryptocurrency Mobile Wallet Development Company
Chapter 4.
The Application Lifecycle
An Introduction to Computer Networking
SpiraTest/Plan/Team Deployment Considerations
Cloud computing.
Network Media, models and number systems
King Saud University- College OF Applied Studies
Cryptocurrency as a payment option
King Saud University- College OF Applied Studies
Presentation On Bit-Coins.
Your computer is the client
What is Bitcoin?.
Presentation transcript:

Bitcoin Wallets BY DAVID BARNES | BITCOIN CO. LTD.

What is a Bitcoin wallet? A broad definition: A method of storing bitcoins Without any form of wallet your bitcoin will be lost forever

General Types of Bitcoin Wallet  Desktop/Mobile application wallets  Full client wallets  ‘Lite’ client wallets  Web-based wallets  Hosted wallets  Client-side wallets  Offline wallets  Brain wallets  Paper wallets  Hardware wallets

Desktop/Mobile Wallets Full node wallet - “Bitcoin Core” (Satoshi Client)  Original Bitcoin wallet  Download the entire blockchain  Share the blockchain with others  Other application: Armory ProsCons  Independent  Assist in running the Bitcoin network  Dependable API  Slow initial load  Disk/Bandwidth usage Downloads:  

Desktop/Mobile Wallets Lite Clients Only download a small amount of relevant data 2 Methods 1.Download from a centralized server or group of servers  Electrum (  Mycelium Bitcoin Wallet (Google Play Store) 2.Download directly from full client nodes (SPV)  Multibit  “Bitcoin Wallet” for android

Desktop/Mobile Wallets Lite Clients ProsCons  Fast setup  Low disk usage  Low bandwidth usage  Less reliable data Dave Recommends Electrum for Desktop Mycelium for Android

Web-based Wallets Hosted Wallets  A provider holds your Bitcoins for you  Allow you access to your Bitcoins upon request ProsCons  Generally easy to use  No installation required  May offer account limits & account security settings  May be more security aware than you  Reliant completely on 3 rd party  High risk of hacking or dishonest provider  Possible to freeze your account Examples:  

Web-based Wallets Client-side wallets  Javascript based wallet  All cryptographic functions occurs client-side in your browser ProsCons  Generally easy to use  No installation required  May offer account limits *  Allow you to backup/transfer your keys  Partially reliant on 3 rd party  Risk of using a compromised wallet webpage  May be insecure if saved history/bookmarks Examples:   

Offline wallets / Cold Storage Brain wallets 1.Remember your private key directly 5Kjvg8WD11vbwbpJectFGe3EjbNNRzRh4UXiK4oK42yc1pGFmY5 Difficult to remember 2.Use a random passphrase to generate a private key “frequency woman poverty engine standard creature cruel safe” Easy to remember ProsCons  Can never be stolen  Can be transported where ever you go  May forget it  Must use with another wallet for sending Reference:  

Offline wallets / Cold Storage Paper wallets  Generate a key private and write in down  Keep the paper in a safe place and never let others look at it ProsCons  As safe as the location you store the paper  Easy to store  No memory required  Can be given to other people  Can keep multiple copies  May be stolen/lost/destroyed  Must use with another wallet for sending Examples:  brainwallet.github.io  bitaddress.org

Offline wallets / Cold Storage Hardware Wallet  Any computer or device running a wallet application that is not connected to the internet ProsCons  As safe as the location your device  Impossible to hack during the sending process  Safer and more convenient to send transactions compared to other offline wallets  May be stolen/lost/destroyed  Must use with another wallet for sending  Cost money

Other Cool Stuff Deterministic wallets  Wallets that have the ability to generate an infinite number of addresses based on a single “seed” phrase  Can backup all your different addresses with a single sentence  Wallets with deterministic ability include:  Electrum  Armory  Greenaddress

Other Cool Stuff Multisig addresses  Transactions must be signed using multiple keys  Can use a combination of different wallet methods to sign a transaction  Can be signed in totally different location  Wallets with multisig ability include:  Bitcoin Core  Greenaddress

Questions or Other Wallets Does anyone have any questions about wallet? Or want to talk about any wallets that I didn’t mention