<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://osintcommons.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=CelindaLabonte</id>
	<title>OSINT Commons - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://osintcommons.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=CelindaLabonte"/>
	<link rel="alternate" type="text/html" href="https://osintcommons.org/index.php?title=Special:Contributions/CelindaLabonte"/>
	<updated>2026-05-08T07:35:15Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.44.0</generator>
	<entry>
		<id>https://osintcommons.org/index.php?title=User:CelindaLabonte&amp;diff=65855</id>
		<title>User:CelindaLabonte</title>
		<link rel="alternate" type="text/html" href="https://osintcommons.org/index.php?title=User:CelindaLabonte&amp;diff=65855"/>
		<updated>2026-05-07T11:13:58Z</updated>

		<summary type="html">&lt;p&gt;CelindaLabonte: Created page with &amp;quot;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;img  width: 750px;  iframe.movie  width: 750px; height: 450px; &amp;lt;br&amp;gt;Core wallet security best practices&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Core Wallet Security&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Store your seed phrase on fireproof titanium plates, not paper or digital files. A metal engraving resists water, fire, and physical decay, ensuring your recovery phrase survives disasters that would destroy a home or cloud backup. Without this hardened backup, even strong passwords cannot recover funds if your devi...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;img  width: 750px;  iframe.movie  width: 750px; height: 450px; &amp;lt;br&amp;gt;Core wallet security best practices&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Core Wallet Security&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Store your seed phrase on fireproof titanium plates, not paper or digital files. A metal engraving resists water, fire, and physical decay, ensuring your recovery phrase survives disasters that would destroy a home or cloud backup. Without this hardened backup, even strong passwords cannot recover funds if your device fails.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Generate your password with at least 20 characters including uppercase, numbers, and symbols, and never reuse it across other platforms. A unique, high-entropy password blocks brute-force attacks on your local encrypted vault. Pair this with a hardware signing device to authorize every send crypto request, isolating private keys from internet-connected systems.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Enable a second factor on your exchange accounts and computer login, but never use SMS–use a hardware security key or authenticator app. This prevents remote attackers from intercepting sign transaction prompts even if they compromise your main password. For nodes earning staking rewards, run dedicated validator software on a separate machine without browsing or email access, reducing attack surfaces.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Core Wallet Security Best Practices&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Always verify every character of the destination address before you sign transaction, as clipboard malware can replace your intended recipient with an attacker’s address after you copy and paste it. Use a hardware signing device to keep your private key offline during every operation where you send crypto, ensuring that the key material never touches an internet-connected machine. Protect your seed phrase by stamping it into fireproof steel plates–paper backups degrade over time or in floods–and store duplicate plates in separate, geographically distant safe deposit boxes. For daily use, never rely on a single password; instead, implement a strong, unique password for the application itself combined with a separate encryption password for the data file, both generated via a password manager with at least 128 bits of entropy. Regularly audit the app logs for unauthorized attempts to load your recovery phrase, and isolate the main node on a dedicated machine that runs no other software, reducing the attack surface significantly.You must never enter your recovery phrase into any website, browser extension, or smart contract interface–only ever type it directly into the wallet application when restoring from scratch on a clean, secure operating system. Before you sign transaction outputs, confirm the exact amount and fee structure on the separate screen of your hardware device; a compromised computer can display false transaction data while broadcasting a different payload that drains your funds. Periodically rotate the application password and schedule monthly checks that your private key remains encrypted–test this by verifying that the encrypted file cannot be opened with the wrong passphrase. Encrypt your node’s RPC communication using TLS certificates and ban IP addresses that attempt multiple failed authentication attempts, as automated bots constantly scan for exposed ports to steal your seed phrase. Finally, when you send crypto to a new address, always first send a tiny test amount, confirm the transaction confirms correctly, and then proceed with the full sum; this one-minute precaution prevents catastrophic losses from address mistypes or compromised output scripts.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;How to Verify Your Seed Phrase Backup Without Exposing It to Malware&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Use an air-gapped device, such as a cheap, factory-reset laptop that never connects to the internet, to verify your recovery phrase. Write down each word from your backup, boot the device from a read-only Linux live USB (like Tails OS), and enter the seed phrase into a trusted open-source tool like the Ian Coleman BIP39 generator. Since this machine has zero network access, any keyloggers or trojans on your primary system cannot exfiltrate the private key data.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Never type your seed phrase into any website, software, or hardware connected to the internet–malware can capture keyboard input and send crypto to attackers within seconds. Instead, perform a &amp;quot;dry-run&amp;quot; recovery using a hardware signing device that has been factory reset. Enter your recovery phrase directly on the device’s touchscreen or buttons, verify that the derived addresses match your original public keys, and then sign a tiny transaction to confirm the backup works. This test proves your private key is intact without ever exposing the seed phrase to your computer’s operating system.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;For maximum isolation, print your seed phrase on fireproof paper using a laser printer that lacks Wi-Fi capabilities. To verify, scan the printed words with a dedicated camera module connected to a microcontroller (like an ESP32-S3) that runs a hardened firmware–no storage access, no radio transmission. The device displays a single checksum word on its OLED screen; match that against your original backup to confirm correctness without any digital trace of the full seed.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;If you must verify on a connected machine, use a split-key verification method: break your 12 or 24-word seed into two halves, enter each half on separate, clean virtual machines (VMs) that are never both online simultaneously. Each VM derives only partial addresses; you cross-reference those partial outputs against your master public key to validate integrity. This prevents any single malware instance from reconstructing the entire private key.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Adopt a multi-location verification protocol: store your recovery phrase in three tamper-evident, opaque envelopes at different physical locations. To verify without opening all three, open only two envelopes at a time, check the words against a password-protected encrypted file on an offline phone (e.g., using “Offline Verification” feature in a cold storage app), then immediately destroy or reseal those envelopes. This method limits exposure window–if a keylogger captured one envelope’s contents, the attacker still lacks the third fragment needed to restore the seed.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Use a Shamir’s Secret Sharing (SLIP-39) scheme where your seed phrase is split into five shares, requiring three to recover. To verify a backup, reconstruct only one share on a temporary, disposable offline computer running a minimalist OS (e.g., Alpine Linux from RAM). Compare the derived xpub from that single share against your recorded xpub; a mismatch indicates corruption without ever assembling the full private key. This technique is especially useful for multisig setups where multiple parties must confirm their share independently.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;For high-value holdings, implement a &amp;quot;geometric verification&amp;quot; where you derive a unique &amp;quot;verification address&amp;quot; from your seed phrase using a deterministic derivation path (e.g., m/84&#039;/0&#039;/0&#039;/1/0). Instead of entering the full seed, type only the first 4 letters of each word (truncated to minimize exposure) into a offline script that hashes the partial inputs and compares the result to a precomputed fingerprint. If the fingerprint matches, your backup is valid–malware capturing keystrokes gets only fragments that are cryptographically useless for generating the private key.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;After verifying, immediately destroy any temporary files, power off the air-gapped device for 60 seconds to clear RAM, and physically remove the storage media. Never reuse that device for any other purpose; treat it as a single-use verification tool. Even if your machine was previously infected, this workflow ensures that no malware can extract the recovery phrase–because the seed phrase never touches a persistent drive, never traverses a network, and never interacts with your primary operating system’s processes where trojans lurk to sign transaction requests.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Q&amp;amp;A:  &amp;lt;br&amp;gt;I keep hearing about &amp;quot;hot&amp;quot; and &amp;quot;cold&amp;quot; wallets. I use the Core app on my phone for small transactions. Is it safe to keep a large Bitcoin balance in the mobile app?&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;No, it is not a good idea to keep large balances in a mobile wallet like Core’s app over the long term. Mobile wallets are considered &amp;quot;hot&amp;quot; because they are connected to the internet. This makes them convenient for small, daily spending, but it also exposes your private keys to online threats like malware, phishing apps, or network vulnerabilities. For any amount you are not actively spending—savings or long-term holds—you should move those funds to a &amp;quot;cold&amp;quot; storage solution. This could be a hardware wallet (like a Ledger or Trezor) that signs transactions offline, or a properly generated paper wallet. Even using Core’s desktop wallet in a dedicated, offline computer environment is safer than keeping everything on a phone. Treat your mobile wallet like your physical pocket: you carry enough cash for the day, not your life savings.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;I downloaded Core and it asked me to create a &amp;quot;passphrase&amp;quot; (the 13th or 25th word). I already have a 12-word seed phrase. What is the passphrase for, and do I really need it?&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;The passphrase is a powerful extra layer of security, often called the &amp;quot;13th&amp;quot; or &amp;quot;25th&amp;quot; word (depending on whether your seed is 12 or 24 words). It is not the same as your recovery seed. The passphrase is a word or phrase you choose yourself and combine with your seed phrase to generate a completely new set of wallets. If someone steals your seed phrase, they still cannot access your funds without the passphrase. However, this comes with a serious risk: if you forget the passphrase or die without telling your heirs, the funds are gone forever—Core cannot recover it for you. Whether you need it depends on your threat model. If you are worried about physical theft of your seed backup (e.g., someone breaking into your safe), then yes, a passphrase is recommended. If you are just starting out and are likely to lose a piece of paper, skip it until you understand the responsibility. Test it first: restore a wallet with a tiny amount of Bitcoin using both the seed and the passphrase to confirm you have it correct.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;My old laptop crashed and I lost my Core app. I have my 24-word seed phrase written on a piece of paper. Can I just enter those words into any wallet app to get my Bitcoin back?&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Yes, you can, but you must be careful. Your 24-word seed phrase is the master key to your Bitcoin, and it uses a standard format called BIP39. This means you can import it into many different wallets (like Electrum, BlueWallet, or a hardware wallet). However, you have to ensure you select the correct *derivation path* and *account index* that Core originally used. If you just type the words into a new app and it shows a zero balance, you might be looking at a different account path. Core typically uses a specific path like `m/44&#039;/0&#039;/0&#039;` for legacy addresses or `m/84&#039;/0&#039;/0&#039;` for SegWit. When restoring, choose the correct address type (Native SegWit is standard now) and let the wallet scan the blockchain for your transactions. Also, be aware that typing a seed phrase into a random, closed-source wallet app on your phone could expose your keys to malware. Use a reputable, open-source wallet, or better yet, get a hardware device and restore the seed onto that for maximum safety.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;I want to make a backup of my Core wallet data folder (the .bitcoin folder). Is copying the whole folder to a USB drive a safe way to backup my wallet?&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Copying the entire `.bitcoin` folder is a valid backup for your transaction history and wallet configuration, but it is not the primary backup for your Bitcoin. The critical file inside that folder is `wallet.dat` (or the SQLite database in newer versions), which contains your private keys. However, this method has two problems. First, if you copy the folder while Core is running, the `wallet.dat` file might be in use and become corrupted. You must shut down [https://extension-start.io/core-recovery-guide.php Core Wallet extension crashed] completely before copying. Second, and more importantly, the `.bitcoin` backup is tied to that specific Core version and operating system. If you lose your computer and try to restore the folder onto a different machine, it might not work correctly if the version numbers differ. A 24-word seed phrase is a universal, version-independent backup. It allows you to restore your coins to *any* BIP39-compatible wallet. My advice: do not rely on a `.bitcoin` folder copy as your sole backup. Use the seed phrase written on fireproof paper and stored in a safe location. The folder copy is only useful if you want to avoid re-downloading the blockchain.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;I read that I should encrypt my Core wallet with a password. But what happens if I forget that password? Is it the same as the passphrase?&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;No, it is not the same. The wallet encryption password is a local password that locks the `wallet.dat` file on your computer. If you forget this password, you will lose access to that specific wallet file—you cannot reset it. However, if you have your 24-word seed phrase, you can throw away the encrypted wallet.dat file, create a new Core wallet, and restore your coins using the seed phrase. The encryption password only protects the file while it sits on your hard drive. It does not protect the seed phrase itself. So, if you forget the encryption password but still have the seed phrase, you are safe. But if you lose both the encryption password *and* the seed phrase, your Bitcoin is gone. My recommendation: do not encrypt the wallet unless you are sharing a computer with other people. The encryption can sometimes cause issues with repeated &amp;quot;unlock wallet&amp;quot; prompts during staking or signing. Instead, focus on protecting your seed phrase with a passphrase (the 25th word) and a steel backup. That is a stronger overall security model than relying on a local file password.&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>CelindaLabonte</name></author>
	</entry>
</feed>