Just wondering if there is a risk of it being recoverable after the transaction has been completed. I figured it would be stored in RAM and thus unrecoverable after powering down, but I can’t seem to find anything on that.

  • @PopularUsernameOP
    link
    19 months ago

    100% that’s why they call it a passphrase and not a password, it would be foolish to use something that can be brute forced. Anyways, my question is specifically about the storage of the key when unencrypted, would you happen to know if it ever touches the hard drive?

    • @makeasnek@lemmy.ml
      link
      fedilink
      39 months ago

      While I haven’t read the source code myself, convention is that it would just be stored in memory, there is no reason for it to be stored on the drive and it would present security risks.

      • @PopularUsernameOP
        link
        19 months ago

        Okay thanks, that makes sense. I’m not highly technical so I’m just trying to run through every potential risk. That was the last thing bugging me.

        • @makeasnek@lemmy.ml
          link
          fedilink
          49 months ago

          Full-disk encryption with something like veracrypt can help mitigate any concerns about this. So long as an attacker does not have access to your computer while powered on (cold boot attacks/evil maid attacks etc), you are fine. For example, if a burglar absconds with your laptop encrypted w veracrypt and it’s powered off? They’re never getting the bitcoin wallet or anything else you had stored on there.