Settings

Theme

Multisig Vault

coinbase.com

102 points by blazamos 11 years ago · 39 comments

Reader

vijayboyapati 11 years ago

The most powerful part of multi-sig is not that you can have arbitrarily many M of N, but that you can outsource complex policy in a trusted way. E.g., create policy that lower level employees can control a small percentage of a company's holdings, while higher level employees can control a higher percent. It allows you to implement flexibility that exists in the credit system, without giving up the trust/control that comes from the blockchain system. This is a very valuable upgrade to Coinbase's feature set. Great work guys!

  • IkmoIkmo 11 years ago

    Yeah it's pretty cool. At some point we'll see more enterprise software to take on some of the responsibilities to manage bitcoin funds like that. I think one or two such companies have already been VC funded.

    The idea is that you can say create a fund with say 3 keys. One is given to the middle-manager, one is given to a senior manager, and one is given to a computer. The middle manager can go on and use up to 80% of the budget. He simply creates a transaction, signs it with his key, then sends it off. The computer sees it, and then does various fraud-type checks. It checks if the receiving address is a whitelisted partner address (e.g. a supplier) and if the amount falls within reason given payment history for example, and if the transaction doesn't use up more than 80% of the budget. It then co-signs it and the bitcoin is released.

    For anything more, the computer simply won't sign it according to its programming. So the middle manager must go to the senior one to request permission to release earmarked funds.

    It's just a simple example but you could move lots of the finance to a completely digital system, do immediate software-based accounting and program governance rules into the software, and spit out periodic transparency reports. Will be interesting to see when something like this gets integrated into existing ERP packages someday.

    • andrewljohnson 11 years ago

      I don't get why you need BitCoin/multisig for this. As long as you are "giving a key" to a computer, this is no different than programming a computer to oversee the middle-manager's spending from a bank account.

      I get that multi-sig and bitcoin can be good, but as long as you already have the decision-making and power setup of a corporation, this is a marginal benefit. I would see this technology being more useful for trust-type situations where you might want to give a lawyer, a beneficiary, and a guardian a key. Or any sort of situation where power is actually split between multiple entities - seems like the boss still has all the power in the situation described.

sillysaurus3 11 years ago

Keys are created and encrypted in the browser

Key hijack in 5... 4... 3...

Browser crypto isn't secure. One way to offset the risk is to use a browser plugin to perform the crypto operations, and even that isn't really a security guarantee.

When you combine an incentive to break crypto (money) with a straightforward route to breaking it (browser crypto), you get a pretty dangerous situation.

  • drcode 11 years ago

    Though I agree with you this leads to risky security issues, the mere fact that a major Bitcoin exchange is allowing users to hold their own private keys really puts a smile on my face today.

    It is completely unheard of in the financial industry (and usually technically impossible before cryptocurrencies) to have a bank give away their "middle man" access of people's money and empowering their customers with complete control over their finances.

    • jerguismi 11 years ago

      Which makes me wonder... The keys are generated in-browser. What if the users computer is compromised, and a malware succeeds in capturing the keys + bip38 passphrase? I don't know if this product will be pain in the ass for coinbase, if the user funds start disappearing from these multisig addresses.

      All the best luck for this product, though.

  • adrianmacneil 11 years ago

    The only argument here is that crypto on internet connected (and potentially compromised) devices is insecure. There's nothing inherently more insecure about browser crypto.

    Our multisig vault relies on BitcoinJS, which we had audited by an external consulting firm. We also don't allow multisig vault creation on browsers which don't support crypto.getRandomValues()

    • sillysaurus3 11 years ago

      The only argument here is that crypto on internet connected (and potentially compromised) devices is insecure.

      Actually, that's pretty far from the standard arguments: http://matasano.com/articles/javascript-cryptography/

      That's pretty much the seminal work of why browser crypto is insecure.

      The issue isn't whether the primitives you're using are secure. It's that the security of your primitives can be hijacked by any third-party javscript you load into the page. Any attacker that can gain a foothold into your javascript execution environment can trivially subvert your security.

      • firepacket 11 years ago

        Assuming your are using SSL, what exactly is the attack vector for getting a "foothold into your javascript execution" besides hacking Coinbase itself?

        Also, any attacker who gains a foothold of your operating system execution environment can trivially subvert your security as well. Does that mean crypto is broken on PCs?

        • sillysaurus3 11 years ago

          any attacker who gains a foothold of your operating system execution environment can trivially subvert your security as well. Does that mean crypto is broken on PCs?

          Yes, of course your crypto is broken if an attacker has malware running on your device. The difference between that scenario and Coinbase is that your device only affects you. A break in Coinbase's security will affect hundreds of thousands of people.

          Assuming your are using SSL, what exactly is the attack vector for getting a "foothold into your javascript execution" besides hacking Coinbase itself?

          There are at least three vectors. First, XSS. If Coinbase ever has an XSS vuln which allows JS to execute in the same context as their crypto key generation, then that attacker can silently siphon keys as they're being generated. Once enough keys are under their control, they can transfer the BTC of every account they control to the attackers' own wallet.

          Second attack vector: Third-party JS libraries. If Coinbase is loading JS from any external source, any rogue employee from that source can launch the above attack. This attack may seem unlikely, but greed makes people do strange things, and the amount of money able to be stolen from a successful attack on Coinbase will be in the range of millions, if enough users start using multisig vault.

          The third attack vector, which a sibling comment mentioned, is a rogue browser extension. Several extensions request permissions on "all websites," and users happily approve them. Now, you can say "Those people deserve what they get," but that's unproductive victim blaming. The fact is that users already behave this way, and letting them lose thousands of dollars for approving some silly extension like "Cloud To Butt" isn't a good thing.

          Banks do a pretty good job of defending people's money. If they lose people's money because they're attacked, the bank will still credit the money. Would Coinbase?

        • wmf 11 years ago

          what exactly is the attack vector for getting a "foothold into your javascript execution"?

          Browser extensions? Those have been stealing BTC for a while.

peter_l_downs 11 years ago

    > COINBASE KEY: The only key that Coinbase stores.
    > SHARED KEY: Encrypted with your password and stored
    >             both by you and Coinbase.
Are these the same key, or is there an inconsistency with the language here? How many keys does Coinbase store?
  • coinbase-craig 11 years ago

    Coinbase stores one private key that we can access, and one private key that is encrypted with the user's vault password on the front-end and sent to us encrypted for storage. The third key is the user's and we never see that.

    We have no ability to access multisig vault funds without the user passphrase, which never touches our server.

    • STRML 11 years ago

      Is there a way to sign a transaction offline but still run it through Coinbase? When it comes to decrypting private keys in the browser, unless the user inspects the javascript each and every time they use the site, there is no guarantee that it hasn't been silently replaced by code that steals keys.

  • jerguismi 11 years ago

    Different key. The other key is encrypted with BIP38 with your chosen password. I don't know how the actual interface works, if it is encrypted client-side or server-side. Anyway, on paper it sounds fantastic.

    • adrianmacneil 11 years ago

      Yes, the shared key is generated and encrypted with your passphrase client-side, then sent to Coinbase. We never see the raw private key.

adrianmacneil 11 years ago

TL;DR: Store your bitcoin on Coinbase, without giving up control of your private keys.

wslh 11 years ago

coinbase-graig: is it possible with your current API to connect a third party service outside Coinbase to sign the transaction? say I want to do a retinal scan before the transaction is approved.

yason 11 years ago

I wouldn't trust any third party to keep my bitcoins except for the money in transit. I have my local client and local wallet, and that's where I do my transactions from.

  • exo762 11 years ago

    The whole point in multi-signature scheme is to remove need to trust Coinbase.

    Your local client and local wallet are fine, until your keys are stolen by malware. Multisig scheme also attempts to fix that flaw.

    EDIT: multisig scheme with user's key on Trezor. This way you are also protected fully from viruses stealing your local key.

ukd1 11 years ago

Does this mean we'll be able to see balance on the blockchain in one place?

  • jerguismi 11 years ago

    At the same time they use deterministic hierarchical keys. Means that you get series of different keys. I guess you can use only a single key, or number of different ones if you want to.

  • mihar 11 years ago

    Yep.

jastanton 11 years ago

Sorry if this is off topic. But I wonder how many websites like these the US government creates in an attempt to control their environment. Maybe I'm paranoid but what if (as an example) companies like Popcorn Time were shutdown and replaced with a government version? All the more reason open source is important.

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection