Why Nostr? What is Njump?
2024-02-08 14:49:14

Jason Hodlers on Nostr: ...

๐— ๐˜‚๐—น๐˜๐—ถ๐˜€๐—ถ๐—ด ๐˜ƒ๐˜€. ๐—ฆ๐—ฝ๐—น๐—ถ๐˜๐˜๐—ถ๐—ป๐—ด ๐—ž๐—ฒ๐˜†๐˜€

To truly own your bitcoin, you must custody your private key. This usually involves writing down a 12 or 24-word seed phrase, and keeping it offline where itโ€™s safe from theft, flood, and fire.

But what if itโ€™s discovered? Is it safer to use multiple private keys connected to the same wallet, or to split up a single seed phrase into multiple pieces?

Letโ€™s explore this below๐Ÿ‘‡



Multisignature, commonly referred to as ๐˜ฎ๐˜ถ๐˜ญ๐˜ต๐˜ช๐˜ด๐˜ช๐˜จ, is a method of ๐—ฑ๐—ถ๐˜€๐˜๐—ฟ๐—ถ๐—ฏ๐˜‚๐˜๐—ถ๐—ป๐—ด ๐—ฐ๐—ผ๐—ป๐˜๐—ฟ๐—ผ๐—น ๐—ผ๐˜ƒ๐—ฒ๐—ฟ ๐—ฎ ๐—ฏ๐—ถ๐˜๐—ฐ๐—ผ๐—ถ๐—ป ๐˜„๐—ฎ๐—น๐—น๐—ฒ๐˜ ๐˜‚๐˜€๐—ถ๐—ป๐—ด ๐—บ๐˜‚๐—น๐˜๐—ถ๐—ฝ๐—น๐—ฒ ๐˜„๐—ต๐—ผ๐—น๐—ฒ ๐—ฝ๐—ฟ๐—ถ๐˜ƒ๐—ฎ๐˜๐—ฒ ๐—ธ๐—ฒ๐˜†๐˜€. So instead of one private key being used to control the asset, multiple private keys are required to sign, execute, and validate a transaction.

The most common multisig implementation is a 2-of-3 scheme, where any 2 of the 3 private keys are needed to sign a valid transaction. In this setup, ๐˜ฏ๐˜ฐ๐˜ฏ๐˜ฆ ๐˜ฐ๐˜ง ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฌ๐˜ฆ๐˜บ ๐˜ด๐˜ช๐˜จ๐˜ฏ๐˜ฆ๐˜ณ๐˜ด ๐˜ฏ๐˜ฆ๐˜ฆ๐˜ฅ ๐˜ต๐˜ฐ ๐˜ฑ๐˜ณ๐˜ฐ๐˜ท๐˜ช๐˜ฅ๐˜ฆ ๐˜ต๐˜ฉ๐˜ฆ๐˜ช๐˜ณ ๐˜ฑ๐˜ณ๐˜ช๐˜ท๐˜ข๐˜ต๐˜ฆ ๐˜ฌ๐˜ฆ๐˜บ ๐˜ต๐˜ฐ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฐ๐˜ต๐˜ฉ๐˜ฆ๐˜ณ๐˜ด, allowing for trustless wallet management, even among a walletโ€™s co-owners.

Contrasting that with splitting your private key into smaller pieces, ๐˜ข๐˜ฏ ๐˜ข๐˜ต๐˜ต๐˜ข๐˜ค๐˜ฌ๐˜ฆ๐˜ณ ๐˜ค๐˜ฐ๐˜ถ๐˜ญ๐˜ฅ ๐˜ฑ๐˜ฐ๐˜ต๐˜ฆ๐˜ฏ๐˜ต๐˜ช๐˜ข๐˜ญ๐˜ญ๐˜บ ๐˜ข๐˜ค๐˜ค๐˜ฆ๐˜ด๐˜ด ๐˜บ๐˜ฐ๐˜ถ๐˜ณ ๐˜ค๐˜ฐ๐˜ช๐˜ฏ๐˜ด ๐˜ฃ๐˜บ ๐˜ฐ๐˜ฃ๐˜ต๐˜ข๐˜ช๐˜ฏ๐˜ช๐˜ฏ๐˜จ ๐˜ซ๐˜ถ๐˜ด๐˜ต ๐˜ฐ๐˜ฏ๐˜ฆ ๐˜ฑ๐˜ช๐˜ฆ๐˜ค๐˜ฆ, and then correctly guessing the rest. ๐—˜๐˜ƒ๐—ฒ๐—ฟ๐˜† ๐˜„๐—ผ๐—ฟ๐—ฑ ๐˜๐—ต๐—ฒ๐˜† ๐—ต๐—ฎ๐˜ƒ๐—ฒ ๐—ผ๐—ณ ๐˜†๐—ผ๐˜‚๐—ฟ ๐˜€๐—ฒ๐—ฒ๐—ฑ ๐—ฝ๐—ต๐—ฟ๐—ฎ๐˜€๐—ฒ ๐—บ๐—ฎ๐—ธ๐—ฒ๐˜€ ๐—ถ๐˜ ๐—ฒ๐˜…๐—ฝ๐—ผ๐—ป๐—ฒ๐—ป๐˜๐—ถ๐—ฎ๐—น๐—น๐˜† ๐—ฒ๐—ฎ๐˜€๐—ถ๐—ฒ๐—ฟ ๐˜๐—ผ ๐—ด๐˜‚๐—ฒ๐˜€๐˜€ ๐˜๐—ต๐—ฒ ๐—ฟ๐—ฒ๐—บ๐—ฎ๐—ถ๐—ป๐—ถ๐—ป๐—ด ๐˜„๐—ผ๐—ฟ๐—ฑ๐˜€, but that is not the case with multisig.

It's important to note that multisig can be implemented at different levels, such as at the blockchain or consensus level โ€” which provides the highest level of security โ€” or by a particular application, which is far less secure. If the number of signers or authorization keys can be changed without a publicly-visible transaction on the blockchain, ๐˜†๐—ผ๐˜‚'๐—ฟ๐—ฒ ๐˜‚๐˜€๐—ถ๐—ป๐—ด ๐—ฎ ๐—น๐—ฒ๐˜€๐˜€ ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ฒ ๐—ฎ๐—ฝ๐—ฝ๐—น๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป-๐—ฝ๐—ผ๐—น๐—ถ๐—ฐ๐˜†-๐—ฏ๐—ฎ๐˜€๐—ฒ๐—ฑ ๐˜€๐—ฒ๐—ฟ๐˜ƒ๐—ถ๐—ฐ๐—ฒ, where the authors of the application ultimately control the asset.

Multisig offers several benefits, including increased security, as it requires multiple signatures to create a transaction, making it much more difficult for an attacker to compromise your wallet. Additionally, ๐—ฒ๐—ฎ๐—ฐ๐—ต ๐—ฝ๐—ฒ๐—ฟ๐˜€๐—ผ๐—ป ๐—ถ๐—ป๐˜ƒ๐—ผ๐—น๐˜ƒ๐—ฒ๐—ฑ ๐—ถ๐—ป ๐˜๐—ต๐—ฒ ๐—บ๐˜‚๐—น๐˜๐—ถ๐˜€๐—ถ๐—ด ๐—ฐ๐—ผ๐—ป๐—ณ๐—ถ๐—ด๐˜‚๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ต๐—ฎ๐˜€ ๐˜๐—ต๐—ฒ๐—ถ๐—ฟ ๐—ผ๐˜„๐—ป ๐—ฏ๐—ฎ๐—ฐ๐—ธ๐˜‚๐—ฝ, so if a key is lost or stolen, a new multisignature wallet can be created, and the other key holders can move the funds into the new wallet.



Remember to give this a ๐—Ÿ๐—ถ๐—ธ๐—ฒ๐Ÿค™, ๐—ฆ๐—ต๐—ฎ๐—ฟ๐—ฒ๐Ÿ”„ it with others, and ๐—•๐—ผ๐—ผ๐—ธ๐—บ๐—ฎ๐—ฟ๐—ธ๐Ÿ”– it for later.
Author Public Key
npub1693220pmp0a4c04a0p7hkz874vsxkyfrvtk2yk4zjyj3e4c0ugjs3r4j0c