UK seized new powers starting today [including destroying Monero]

–Police will no longer be required to make an arrest before seizing crypto from a suspect.

–seize anything, such as written passwords, flash drives, or memory sticks

–destroy crypto assets, such as privacy coins, for the “public good”, like Monero

–goes into effect today

This has the text copy-pasted from the official UK website, but without having to have your IP address literally connect to the official cybercrime division website, (ironically, we seized their text)

https://rebelnet.me/news/0x02fcc902af8d6cedd9

  • VolunTerry
    link
    fedilink
    English
    arrow-up
    4
    ·
    8 months ago

    Good kick in the butt to memorize passwords and seedphrases I guess.

    • shortwavesurfer
      link
      fedilink
      arrow-up
      2
      ·
      8 months ago

      I honestly don’t know if I would ever be able to remember an entire seed phrase. Just straight out. But I can remember a 30 character or more passphrase with special symbols. I just put my seed phrase in my key pass database and my key pass database stays off any cloud services.

      • mister_monster
        link
        fedilink
        English
        arrow-up
        3
        ·
        8 months ago

        What part of “do not store digitally” did you miss? Don’t. Do. That.

        • shortwavesurfer
          link
          fedilink
          arrow-up
          1
          ·
          8 months ago

          I know its not the best idea, but good luck cracking a Keepass DB with over 20 characters including symbols.

          • mister_monster
            link
            fedilink
            English
            arrow-up
            2
            ·
            8 months ago

            You type that password to that file on your machine daily. Nobody has to crack it. You get malware on your machine, they have the file and the passphrase. Your encryption scheme is no more secure against remote malware attacks than storing it in plain text.

            • shortwavesurfer
              link
              fedilink
              arrow-up
              1
              ·
              8 months ago

              I primarily use it on my phone so fingerprint. I rarely have to type it out. Plus i run DNS level malware and ad blockers, linux, and as much FOSS software as possible. I have no doubt it would be possible to get it, but its not a huge concern.

      • g2devi@feddit.nl
        link
        fedilink
        arrow-up
        3
        ·
        8 months ago

        An old school method is to write a note with every fifth word being a seed word. Keep that note among 20 others so you cannot know what is relevant.

      • VolunTerry
        link
        fedilink
        English
        arrow-up
        1
        ·
        8 months ago

        Smart way to do it. But if you need to travel and take your data with you, the device itself is at risk of seizure or destruction. Alternately you could reload your needed data backups at your destination when you arrive, say after crossing unfriendly borders, but then you’d want to find the safest most secure way to transfer the data. There are plenty of solutions, but with more and more news like this, most people will need to think a bit more than they have been about their threat model opsec and procedures.

        • g2devi@feddit.nl
          link
          fedilink
          arrow-up
          3
          ·
          8 months ago

          It doesn’t need to be on a device. You can create a “book” at the local binding store containing 200 samples of “Vogon poetry” ( http://spaceinvaders.epizy.com/vogon.html?i=1 ) . Your seed phrase can be scattered in a memorised pattern within the book. You can bring that book with you anywhere and have multiple copies in different locations.

        • mister_monster
          link
          fedilink
          English
          arrow-up
          2
          ·
          8 months ago

          There’s nothing smart about storing seeds digitally on a networked device.

          • VolunTerry
            link
            fedilink
            English
            arrow-up
            1
            ·
            8 months ago

            Fair enough perspective. What do you favor? Paper wallet? Something like cryptosteel? Hardware wallet? Memorization? Other airgapped digital device solutions? Shamir secret sharing? Something else?

            It’s always good for others to hear and gather approaches and try to choose amongst them for what may work best.

            • mister_monster
              link
              fedilink
              English
              arrow-up
              3
              ·
              8 months ago

              Just write it down. Paper, steel, whatever, just don’t store it digitally. If you’re storing something worth more than a hardware wallet, the seed with a good hardware wallet is a good idea. Memorize it if you can, but have it written down somewhere. If you can rip wireless networking out of a device, airgapped notebook or cell phone is fine. If you have a bunch of different people that will need access in the event you can’t give them access, and you’re concerned about one of them potentially stealing it from you, and they know how to do this kind of stuff, shamir backup is great.