Just wondering if there is a risk of it being recoverable after the transaction has been completed. I figured it would be stored in RAM and thus unrecoverable after powering down, but I can’t seem to find anything on that.

  • @makeasnek
    link
    68 months ago

    Anybody with physical access to your machine has access to your crypto. Best case scenario the wallet is “locked” and they have to crack a password, which is many many many orders of magnitude easier than guessing your seed phrase.

    • @PopularUsername@lemmy.sdf.orgOP
      link
      fedilink
      18 months ago

      100% that’s why they call it a passphrase and not a password, it would be foolish to use something that can be brute forced. Anyways, my question is specifically about the storage of the key when unencrypted, would you happen to know if it ever touches the hard drive?

      • @makeasnek
        link
        38 months ago

        While I haven’t read the source code myself, convention is that it would just be stored in memory, there is no reason for it to be stored on the drive and it would present security risks.

        • @PopularUsername@lemmy.sdf.orgOP
          link
          fedilink
          18 months ago

          Okay thanks, that makes sense. I’m not highly technical so I’m just trying to run through every potential risk. That was the last thing bugging me.

          • @makeasnek
            link
            48 months ago

            Full-disk encryption with something like veracrypt can help mitigate any concerns about this. So long as an attacker does not have access to your computer while powered on (cold boot attacks/evil maid attacks etc), you are fine. For example, if a burglar absconds with your laptop encrypted w veracrypt and it’s powered off? They’re never getting the bitcoin wallet or anything else you had stored on there.