Cool (Internet restricted) environments for light wallets & dApps
- Cool environment basics
- What if I need both private key secure workflow and light wallets?
- First & only step for “cool” environment: Turn the Internet back on.
- Principal security recommendation: Avoid Internet search & login!
- Record commonly used references and data in the “scratch” file
Cool environment basics
If you have decided to go on with your Frankenwallet having restricted Internet access, rather than no Internet access at all, you will able able to use the applications in this section which depend somehow on Internet connectivity. Therefore we’re calling this the cool environment (since it’s not quite cold).
➤ Internet browsing should be prohibited on “cool” environments, just as you would not expect to browse on a “cold” environment.
However (and in case you have skipped to this section), you should still follow the instructions on this page (securing the browser) to curtail any automatic or institutionalised (“spyware”) activity from Firefox (the default and only browser which comes with Ubuntu).
It is against these recommendations to mix the security levels of both the “cool” and the “cold” environments… for instance:
➤ Do not keep unencrypted private key files on any machine that also runs any Internet dependent software like a UI node wallet (e.g. Daedalus on Cardano). The chances of losing the assets secured by those key(s) are too great.
that means…
Don’t assume your private key files are safe to keep & work with on the “cool” Frankenwallet… since these key files are “in the open” (as opposed to encrypted storage of LibreOffice or secure application space in a browser-based wallet), they pose a security risk anywhere outside of an air-gapped machine or “cold” Frankenwallet.
➤ Conversely, do not permit routine Internet access from any machine which stores those keys, or on which you enter the high security password for your most sensitive files (e.g. any that stores your wallet passphrases), at the risk of compromising either those keys or that password.
What if I need both private key secure workflow and light wallets?
Then you are an ideal candiate to create & use two Frankenwallets… just as the COSD pool has from the beginning, since this material was first proven from 2020 to 2021. Isolation between your extremely vulnerable cleartext private keys and your less vulnerable encrypted application data is exactly the purpose of this security model.
tip: if creating two Frankenwallets
You should still follow the cardinal rule of never entering your “cold” Frankenwallet password into any Internet connected machine… which includes the “cool” Frankenwallet. That means your “high security” Frankenwallet password should ideally be different between the 2 Frankenwallets.
First & only step for “cool” environment: Turn the Internet back on.
Assuming you have followed the Installation steps correctly, you will already have done the following procedures to restrict Internet access beyond what could would be achievable in typical desktop usage:
- set up a dedicated drive which you only use when you’re making a crypto transaction;
- isolated a separately booted Linux to reduce the otherwise constant exposure of your crypto wallets to both universal and targeted security intrusions;
- eliminated Internet dependent and closed source software which would otherwise “fingerprint” your usage of blockchain resources and web sites;
- hardened your Inernet brower so that visiting dApp / DeFi sites and installing browser wallet extensions will not expose these to privacy violations coming from the browser itself.
Therefore, from this point the “cool” configuration is simple:
➤ Allow your Frankenwallet to connect to the Internet again, and keep it connected going forward.
This means reversing whatever steps you may have taken to disconnect your new Frankenwallet from the Internet, including any or all of these:
- Turn off airplane mode.
- Reconnect your Internet cable.
- Attach, or reattach, to your WiFi network.
tip
Browsers (particularly the Google Chrome substitute Brave) and their software dependencies go out of date quickly: so any “cool” Frankenwallet should also permit software updates: but do not enable updates from closed source repositories unless you believe the disk is justifiable.
Principal security recommendation: Avoid Internet search & login!
All of your familiar messaging apps that store crypto references (e.g. Telegram, Discord) are forbidden in this security model: as containing black-box, closed-source components.
… If you feel compelled to install these software packages in the Frankenwallet, there is really no point going through any of these security / privacy isolation rigours and you might as well consider your bootable environment as any other persistent Linux USB drive.
All web sites in which you must log in to access email, messaging, and file sharing are forbidden in this privacy model.
… All web sites that offer messaging constantly scrape the browser, and when possible the system itself, for identifying information which will be tied your cryptocurrency activity if you access these sites in the Frankenwallet.
So as you go forward on your favourite blockchain to install browser-based wallets and use dApps, the key to avoid the above software & web site usage is to:
Record commonly used references and data in the “scratch” file
Problem
Crypto communities know well that download links for fake wallets and scam dApp URLs are propagated through malicious app store entries, videos, online groups, and fake pages & web sites promoted for search engine performance.
➤ Solution: Authenticate the correct links to wallets and dApps you routinely use — or plan to use — and record them in your “scratch” file.
Likely your pattern of ordinary desktop usage has determined the software and web sites you know to be correct: based on many confirmations from the crypto communities you are a part of. When you pair these wallet names and dApps with their official web sites, record them for use in the Frankenwallet.
Without habitually authenticating crypto links via Internet search (which you should avoid in the Frankenwallet anyway, as betraying your privacy through data-mining search engines), you won’tbe directed to installing a fake wallet or use a fake dApp that will drain your accounts.
- In fact, this method of keeping a list, table, or spreadsheet of authenticated links will likely even benefit your ordinary, unsecured (host computer) workflow.
tip
Over time your “scratch” file — encrypted in Libreoffice with your “low security” password for routine update on the host computer — will accumulate a list of trustworthy links that you can click into in the Frankenwallet for wallet downloads, software updates, dApp bookmarks, and anything you would otherwise risk a costly misdirection if you had to search for on the Internet.