Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
49 changes: 42 additions & 7 deletions template.md
Original file line number Diff line number Diff line change
@@ -1,21 +1,56 @@
# Title
# Counter Wrench-Attack Protocol (CWAP)
a simple method to safely hodl Private-Keys

 — one of Bitcoin’s first mnemonic seed-word management protocols

// read full article here - https://medium.com/@summerstarlight321/counter-wrench-attacks-83c75bfbb3de

## Introduction

Provide an introduction to the purpose or subject being covered in this tutorial
from Jameson Loop's article,
"Satoshi Roundtable V Recap"
9 FEB 2019
https://medium.com/@lopp/satoshi-roundtable-v-recap-151dab7548bb

"We also agreed that it would be extremely helpful
if a standard was formed for securely splitting seed phrases." and

"this could be a pretty big win if someone were to put in the time to develop a proposal."


Irony
It’s ironic that, as a whole, our community relishes the importance of decentralization for our network’s security, yet as individuals, we centralize upon ourselves all of the personal danger of a Wrench-Attack by holding ALL our own seed-words.

It’s even more ironic considering that it’s only now, with Bitcoin, that we can eliminate this most dangerous of attack vectors.

## Background

Provide some background as to what problem will be addressed or what motivated writing this tutorial.
Recently
With recent price increases and kidnappings becoming more common, many people are concerned with the security of their BTC, and more specifically, their private-keys. Unfortunately, recommending hardware wallets, firearms, and pass-phrases seem to be the only solutions offered.

However, we need not expose ourselves as a single-point-of-failure.

I am proud to present — one of Bitcoin’s first mnemonic seed-word management protocols.


## Let's get started

Here is a free flow of task oriented information which runs through the steps required.
Aims
The aims of the protocol are:

first, to preemptively discourage attacks from happening
second, to quickly resolve them
third, to prolong the time-length of the attack — thus preserving your health; and
lastly, to minimize your BTC losses

// 10 Steps Main Protocol

## Conclusion

In conclusion, we review the goals and purpose of the tutorial.
Wrench Attacks are bloody and scary and we are all targets! And I’m sad to say that, as a community, we have not prepared… Here in meat-space, we still don’t have simple, widely-known solutions to safely hodl our private-keys.

## Reference
We need to develop strategies, make resources, and spread this information so that every OG Hodler and every normie-noobie is as safe as possible. If we eliminate this single-point-of-failure, the safer and stronger we are, both individually, and as a community.

Provide any references related to this tutorial.
## Reference
all my writings are here--
https://medium.com/@summerstarlight321