html5 templates

        


                                                         "The best bitcoin is the one you store yourself"

METHOD 6 (Variation 2- Three Factor Authentication) 
DESCRIPTION

CAUTION: Only read if you are serious about bitcoin cold storage :-)


Method 6 (Variation 2- Three Factor Authentication) merges the best and most secure aspects of all long term storage methods, while minimizing the worst and most vulnerable aspects, and is the ultimate and only acceptable way to store a large number of bitcoins.
 
This method is basically usb + email + underground and it could be named: 
 
Method 6 (Variation 2- usb + email + underground) 
 
…but has been named ‘Three Factor Authentication’ because…
 
There can be seen to be three levels of authentication:
 
1. Knowledge access of the answers to the security questions in the bank safety deposit box.
2. Physical access to the location of the buried treasure and bank safety deposit box.
3. Internet access to one of the personal email accounts.
 
Method 6 (Variation 2- Three Factor Authentication) is where you have instructions with coded data in the safe deposit box, which when decoded reveals the password and ‘imprecise rough’ single location (via co-ordinates) of the buried master usb with all your bitcoin information. Anyone who has correctly decoded the safe deposit box usb document will be able to go to the main site where the master usb has been buried and try to randomly dig up every plot of earth to try to find the buried usb. They would also know the password to open the buried master usb. The only thing stopping them would be access to the location and the large amount of time and labour involved.
 
Which is where the third authentication of Method 6 (variation 2), the emailed ‘TrueCrypt pdf file’ comes in. As part of this variation, a TrueCrypt pdf file is also prepared which will be emailed to yourself and everyone else you may want to receive the bitcoins in the future. This emailed ‘TrueCrypt pdf file’ like the one produced and secured using Method 4, contains further coded data which will give the ‘exact’ location of the buried usb via co-ordinates. The coded data in the emailed ‘TrueCrypt pdf file’ can only be decoded using information that is in the safety deposit box usb document and is meaningless without it. If you have buried the usb in more than one location, then two or three locations can be revealed but apart from this information, no other information is revealed. The password to the emailed ‘TrueCrypt pdf file’ is obtained via the coded data in the safe deposit box usb. 
 
This is all a little complicated but rest assured that it has been thoroughly constructed.
 
You might be asking why we reveal the ‘imprecise rough’ location of the usb via the bank safety deposit box usb at all. Why not only reveal that information in the ‘email pdf file’? Or tell your family members where you have buried the master usb (you should also do this by the way)? The reason is information stored on email or stored in human memory is unreliable. It may get lost, deleted or forgotten. We simply cannot take the risk and make viewing the email pdf or remembering the location an essential step in the process because of these possibilities. We want the rightful inheritor of your bitcoins to be able to get it when you pass away even without having the ‘email pdf file’ or remembering where it was buried. Of course it would involve more work but the point is, it is possible. Another reason is that most people will probably bury at least one copy of the buried usb somewhere in their main or secondary place of residence anyway so it would not be hard for a thief or a government confiscation person to guess this. 
 
The requirement however for a thief who has somehow gained access to your safety deposit box and then worked out the password to the buried usb (very hard to do if good security questions have been used) to then have to actually gain access to the property the usb is buried in and to spend the needed time to try to dig up all the possible locations, is a fairly insurmountable requirement. If you or one of your family members or someone else you know is currently living at this address, then this would be difficult to do without someone noticing either at the time the digging up is taking place or sometime shortly afterwards (when parts of the backyard have been visibly dug up). 
 
The same restriction doesn’t necessarily apply to a government confiscation employee as they may be able to gather up the resources and permission to do this anyway. However, the goal in this case is not to prevent them from digging it up but to make the process take so long that one of your family members can dig it up first and delete it, or in the least to notify you that your bitcoins are being confiscated by the government, in which case you can quickly transfer all your bitcoins stored in this buried usb to other bitcoin addresses. Also, if all of your other assets have been confiscated or frozen by the government, then you may already be aware that the government is going to try to take your safe deposit box assets. If you for some reason are unable to immediately take up the task of transferring your bitcoins then you can ask another trusted person to do it for you. Just tell them the other location/s you have buried the master usb.
 
Method 6 (Variation 2- Three Factor Authentication) if used, should become the over-riding and over-arching method for at least half of all your Bitcoins (if not all). Additionally, numerous copies of the same bank safe pdf usb, email pdf file, and TrueCrypt buried master usbs should be stored at multiple safety deposit boxes, email accounts, and underground locations to eliminate the risk of any one place becoming inaccessible for whatever reason. The password for the ‘buried underground master usb’ should be based on the Method 5: step 1 process and the password for the ‘email pdf file’ should be based on the Method 6 (Variation 2): step 10 process. 

GUIDELINES


  • For Method 6 (Variation 2) you will need your laptop with at least 2 free usb ports, an internet connection, and a bank account with the bank you plan to rent the safe deposit box from.


  • If you have arrived here straight from Method 4: step 5, then you need to now go to back to Method 5: steps 1 – 7.6 and complete these steps before returning here to continue. You will be turning your TrueCrypt pdf file into a ‘Master usb’ for it to be ready to bury (it’s ok if you have already buried it). 


  • For the password used to encrypt the Master usb which will be buried (or possibly has already been buried), use Method 5: Step 1 to create the password. This means create and keep both TrueCrypt pdf files version A and version B. This way, you can be sure you will always know the password to the buried usb even if you somehow lose access to all your safe deposit boxes. 
 
  • For the password used to encrypt the TrueCrypt pdf file that is to be sent to the email addresses, do not think of a password yourself or use the 64 digit numbers-only password created in Method 5: Step 1 (this numbers-only password is for the Method 6 (Variation 2) buried Master usb only). Instead, use the dice method outlined in Method 6 (Variation 2): step 10 to come up with the password as it will be super secure, is super random, and has a tremendous number of possible combinations (at least 1x10^31). For the dice rolls, it doesn’t matter how many dice you use or which order you read the rolled dice as long as it’s read randomly. This means, you don’t re-arrange the dice from smallest to largest or into any other pattern. You simple grab them and put them in a straight line.
 
  • You will need to either print the instructions out beforehand or view the instructions on a different computer (such as a smart phone, tablet or laptop) for Steps 5.1 - Step 11.11 (of Method 6 -Variation 2). Or you could copy and paste all these instructions onto a Microsoft word or other text document and view the instructions from there. 
 
  • For Method 6 (Variation 2) you will also need 5 usb drives in total: 
 
  • You will need 3 prepared usb drives with at least 2 gig data storage each when empty. We will name these Usb No. 9, Usb No. 10 and Usb X. In starting here now at Method 6 (Variation 2) you should have just finished Method 5: step 7.6 or 8.7. Usb No. 5 therefore now becomes Usb No. 9. Usb No. 6 becomes Usb No. 10. And Usb X remains as Usb X. Don’t use any new or different usb drives. Only change the names of the usb’s.
 
  • Usb No. 9 contains the newly formatted and installed Zorin OS Core operating system (using method 3: steps 1.4 - 1.5 and steps 2.1 - 2.8). Usb No. 10 is a pre-formatted usb drive containing both TrueCrypt pdf file (version A) and TrueCrypt pdf file (Version B), that you plan to bury or have already buried. Usb X is the second newly formatted and installed Zorin OS Core operating system (created during method 3: step 2).


  • You will also need 1 usb drive with at least 4 gigabyte data storage when empty, which contains an exact copy of a ‘Master usb’ complete with the TrueCrypt pdf file (version A) and TrueCrypt pdf file (version B), all prepared according to the instructions in Method 5: steps 1 – 7.6. This usb drive can have been one you have already buried from Method 5. If you haven’t yet buried it then you will be doing so in this method. We will call this the buried Master usb. 
 
  • You lastly need 1 usb drive with at least 128 megabyte data storage when empty. This usb drive will contain the ‘Coded data’ document which we will create in this method and place in the bank safety deposit box. We will call this the bank safety deposit box usb.
 
  • Having the ‘What is the random 64 character password I included on my will to you?’ question in the coded data sheet is considered essential for anyone owning a large amount of bitcoins. Good security questions are no match for a 64 character random password on a Legal Will. If you haven’t prepared this, then you should do so beforehand. The random 64 numbers-only base password to include on your will should be created by using the dice method in Method 6 (Variation 2) step 10.1.

  • The following steps are specifically for a Windows 7 operating system but you should be able to get it to work on most Windows operating systems as well as some other operating systems.

HOW TO DO IT


Step 1: Study the following sample ‘Coded Data’ that will be stored in the usb that will be placed in the safe deposit box
 
         Step 1.1: Study the following text so you understand how this method works

                                                                SAMPLE ‘CODED DATA’ TO BE STORED ON USB IN BANK SAFE DEPOSIT BOX            
                                                                                                                                                                                                                                    
                                                                                                                     >>> Start of Doc <<<

NOTE TO READER

These pages give you the instructions to work out the passwords to the ‘TrueCrypt pdf files’ and ‘password protected pdf files’ which I have buried somewhere. Do not reveal these passwords to anyone. These pages also reveal the general co-ordinates of where I have buried the usb containing these files.

CODED DATA BELOW

INSTRUCTION 1: Answer the following questions.

                       1. What is the random 64 character password I included on my will to you?

 

                      2. What is the name of the street I lived in when I was 6 – 17 years old? (spell as ‘street’ not ‘st’)

 

                    3. What are the birthday’s of all 7 members of our immediate family from youngest to oldest in this format DDMMYYYY?

 

                    4. What is the first name of our first pet dog we ever had roughly starting around 2012? (official name not nickname)

 

                    5. What is the name of the primary school I studied at during grades 1-6? (first word only)

 

                    6. What is my full legal name as of 2017? 

 

                    7. What is my city of birth as shown on my passport?

INSTRUCTION 2: Put the answers together in the right order. Replace all capital letters by their lowercase equivalent (we don’t want any capital letters). Remove all spaces between the words (we don’t want any spaces). 

There should be 175 characters in total.

INSTRUCTION 3: Use the ‘QuickHash-Windows-v2.6.9.2’ program on this usb that came from https://quickhash-gui.org/download/quickhash-v2-6-9-2-for-windows/ and create a SHA512 hash of these characters. A SHA512 hash is a character string consisting of exactly 128 letters and numbers which is calculated by applying the SHA512 mathematical function to another character string. Only use the program on this usb to do this and not online SHA512 websites to do it. The reason is the online websites may record your answers or passwords. In Linux Mint 18.1: in main menu of ‘QuickHash-Windows-v2.6.9.2’, in the ‘Text’ tab under ‘Hash Algorithm’, select SHA512 > enter the characters into the ‘Text Hashing’ box > SHA512 hash result is displayed on the bottom of program.

 

INSTRUCTION 4: When this is complete, record the SHA-512 hash of your character string on a computer text document. We will call this the SHA512 hash (1).

 

INSTRUCTION 5: Now take this SHA512 hash (1) and create another SHA512 hash of the characters which we will then call SHA512 hash (2). Record this on the same computer text document as before. 

 

INSTRUCTION 6: Now put SHA512 hash (1) and SHA512 hash (2) side by side (SHA512 hash (1) goes first). Remove all the letters in these two SHA512 hashes to leave only the numbers. 

You should now be left with a number with 154 digits. The LAST 4 numbers should be 4661.


INSTRUCTION 7: Record the first 148 numbers into a straight line onto a piece of paper with large gaps between each of the numbers. You could also use a computer ‘Text File’ to record the numbers. Double check you have entered them correctly.

 

INSTRUCTION 8: Now do the following (or add the following) to each of the 148 numbers individually and write the answers down onto the piece of paper or into the computer ‘Text File’. Double check you have done the maths correctly.


-1 +1 -3 -1 -8 -4 -4 +4 -3 +2 +3 -4 -7 +3 -5 +1 +2 +0 -5 +2 +1 +0 +2 +9 +1 +0 -3 +1 +3 +0 -6 -3 +0 +1 -1 -4 +4 -6 -2 -3 -1 -7 -3 +4 -3 +2 -1 -7 +0 -2 +0 -1 -6 -7 -1 +1 +5 -2 -1 -3 -2 -1 -6 -2 +8 -2 -6 -6 +5 +2 +3 +6 +0 +2 -9 -8 -8 +8 -6 +4 -7 +1 +3 +4 +6 +0 +5 -6 -4 -3 +4 +1 -3 +0 -2 -1 +2 -6 +3 +1 +5 -2 +1 +0 -5 -5 -6 +4 -1 -5 -1 -6 -5 -2 -4 -1 -2 +4 -4 +4 +1 -8 -2 +1 +2 -5 +0 +3 -6 -1 +4 -3 -4 -1 -1 -1 -1 +3 +1 -4 +1 -2 +3 -3 -3 +0 +2 +0 

NOTE: A possible way to accurately perform these conversions is to enter (or copy and paste) the INSTRUCTION 7 numbers onto a ‘LibreOffice Calc’ document within Linux Mint (into cell A1, B1, C1, D1 and so on and so forth) and then below this copy and paste (select ‘Paste Special...’ then ‘Unformatted text’) the above INSTRUCTION 8 number codes into the row directly below the INSTRUCTION 7 numbers (into cell A2, B2, C2, D2 and so on and so forth). After this, create a Formula function in Cell A3 such that the number in Cell A1 is added to the number in Cell A2 (ie. type into Cell A3 ‘=A1+A2’). After this click and hold your mouse pointer on the bottom right hand corner of Cell A3 and drag it to the right hand side, passing by all the cells with numbers above them. This will calculate for you all the numbers. For your information, the number codes above in INSTRUCTION 8 have the [TAB] key pressed before each number to enable copy and paste into ‘LibreOffice Calc’, so if you want to copy and paste the INSTRUCTION 7 numbers into ‘LibreOffice Calc’ you will also need to add the [TAB] key before each number. 

 

INSTRUCTION 9: You now have the 148 numbers to the following pieces of information:

 

Numbers 1 to 64 = 64 numbers-only base password to allow you to open the ‘password protected pdf file’ inside the ‘TrueCrypt pdf file (version B)’ that is on a Usb that has been buried somewhere. The ‘password protected pdf file’ contains the electrum seeds, and public and private addresses to all my Bitcoins. 

 

  • To open the ‘TrueCrypt pdf file (version B)’ using the 64 digit numbers-only base password, use ‘QuickHash-Windows-v2.6.9.2’ to create a SHA512 hash (1) of this. Then create a SHA512 hash (2) from this SH512 (1) result. The second SHA512 hash (2) result is the TrueCrypt pdf file password.

 

  • The first SHA512 hash (1) result is password to the ‘password protected pdf file’ within the TrueCrypt pdf file volume.


Number 65 = Either a number eight (8) that is used to represent a ‘+’ sign (OR) a number nine (9) that is used to represent a ‘-’ sign. 

Numbers 66 – 83 = 18 numbers that (together with the + or – symbol from Number 65) are the ‘general’ co-ordinates of where I have buried the Usb containing the computer files which contain all my Bitcoin information. These are only general co-ordinates and not exact coordinates. They are represented in this format:


                                                                                             

                                                                        +/- _ _ . _ _ _ _ _ _ , +/- _ _ _ . _ _ _ _ _ _

The place where it says +/- above is represented by (8) for + and (9) for -. 

 

Simply do an internet search on these co-ordinates to find out where it is. For example, the co-ordinates below are the co-ordinates for the Opera House in Sydney.

 

33°51'24.6"S 151°12'54.0"E

-33.856831, +151.215005

 

For this example your INSTRUCTION 9 decoded co-ordinate numbers 65 - 83 would be: 

 

9338568318151215005

 

Number 84 = One number seven (7) that is used as a separator 

 

Numbers 85 – 148 = 64 numbers-only password to an email TrueCrypt pdf file I have emailed to the following email addresses:


                                        person1@emailaddress1.com

                                        person1dropbox@emailaddress1.com

                                        person1@emailaddress2.com

                                        person1dropbox@emailaddress2.com

                                        person2@emailaddress1.com

                                        person2dropbox@emailaddress1.com

                                        person2@emailaddress2.com

                                        person2dropbox@emailaddress2.com

                                        person3@emailaddress1.com

                                        person3dropbox@emailaddress1.com

                                        person3@emailaddress2.com

                                        person3dropbox@emailaddress2.com

                                        person4@emailaddress4.com

                                        person4dropbox@emailaddress4.com

                                        myemailaddress1@myemailddress1.com

                                        myemailaddress1dropbox@myemailadress1.com

                                        myemailaddress2@myemailddress2.com

                                        myemailaddress2dropbox@myemailadress2.com

                                        myemailaddress3@myemailddress3.com

                                        myemailaddress3dropbox@myemailadress3.com

I sent this email on the:

                                    31st of January 2017 

I sent this email from:

                                    myemailaddress1@myemailaddress1.com

The name of the TrueCrypt file attachment was:

                                    _____ 

The name of email subject was:

                                    ____

The text in the email says: 

                                    Please, please do not delete or save onto your computer. Please only open if allowed, using the password in my safe deposit box. The information on this usb is strictly for your viewing only and is strictly for storage here

This emailed ‘TrueCrypt pdf file’ contains a ‘password protected pdf file’ that contains the coded data revealing the ‘exact’ co-ordinates of where I buried the Usb containing all my Bitcoin information. 

 

  • To open the ‘TrueCrypt pdf file’ in the email using the 64 digit numbers-only base password, use ‘QuickHash-Windows-v2.6.9.2’ to create a SHA512 hash (1) of this. Then create a SHA512 hash (2) from this SH512 (1) result. The second SHA512 hash (2) result is the TrueCrypt pdf file volume password.

 

  • The first SHA512 hash (1) result is password to the ‘password protected pdf file’ within the TrueCrypt pdf file volume.



>>> End of Doc <<<

Note: The above sample values highlighted in green were derived from the following answers to the security questions: Question 1: 2641152251515664112664345515363152263421343412266535622421311645 Question 2: Kayak Alley Question 3: 18042007020920041010200215051999040919971705197227111970 Question 4: Pluto Question 5: Theodore Question 6: Giovanna Carson Galvin Question 7: San Francisco


        Step 1.2: Copy and paste the above ‘sample coded data’ onto a New Office Document (Microsoft word document, WPS writer document or any other document format that retains the correct formatting when copied onto). After this is done, save this file on Usb No. 10. You will be using this template to create your own ‘coded data’ bank safe deposit box document.



Step 2: Study the following sample ‘Coded Data’ that will be stored at the email addresses listed in the first bank safe deposit box coded data sheet


        Step 2.1: Study the following text so you understand how this method works


                                                                                                                     >>> Start of Doc <<<

NOTE TO READER

These pages give you the instructions to work out the ‘exact’ co-ordinates to the ‘TrueCrypt pdf files’ and ‘password protected pdf files’ which I have buried somewhere. Do not reveal these co-ordinates to anyone. 

CODED DATA BELOW

INSTRUCTION 1: Take the first 30 numbers that were written in INSTRUCTION 8 of the coded data sheet that was in the bank safe deposit box. Do not take the numbers you calculated that are part of the password to the buried usb files. Take the numbers recorded in INSTRUCTION 8 with the plus and minus signs. Take these numbers but ignore all the plus or minus (+/-) signs. Don’t include spaces or anything else. Save these 30 numbers in a computer text document.

 

INSTRUCTION 2: Take the first 2 email addresses recorded in INTRUCTION 9 of the coded data sheet that was in the bank safe deposit box. Put both email addresses side by side in the right order (first to last). Do not include spaces. Change all the capital letters to lower case letters. Save these two email addresses in the same computer text document as before.

 

INSTRUCTION 3: Take the answers to the first 4 security questions in INSTRUCTION 1 of the coded data sheet that was in the bank safety deposit box. Do not include spaces. Change all the capital letters to lower case letters. Save these answers in the same computer text document as before.

 

INSTRUCTION 4: Use the ‘QuickHash-Windows-v2.6.9.2’ program on this usb that came from https://quickhash-gui.org/download/quickhash-v2-6-9-2-for-windows/ and create a SHA512 hash of all the characters you saved in the computer text document in the exact right order (INSTRUCTION 1 first, INSTRUCTION 2 next, INSTRUCTION 3 last). A SHA512 hash is a character string consisting of exactly 128 letters and numbers which is calculated by applying the SHA512 mathematical function to another character string. Only use the program on this usb to do this and not online SHA512 websites to do it. The reason is the online websites may record your answers or passwords. In Linux Mint 18.1: in main menu of ‘QuickHash-Windows-v2.6.9.2’, in the ‘Text’ tab under ‘Hash Algorithm’, select SHA512 > enter characters into the ‘Text Hashing’ box > SHA512 hash result is displayed on the bottom of program.

INSTRUCTION 5: When this is complete, record the SHA-512 hash of your character string on a computer text document. We will call this the SHA512 (1) hash. 

 

INSTRUCTION 6: Remove all the letters in the SHA512 (1) hash to leave only the numbers. 

You should now be left with a number with 76 digits. The LAST 4 numbers should be 7935.

INSTRUCTION 7: Record the first 59 numbers into a straight line onto a piece of paper with large gaps between each of the numbers. You could also use a computer ‘Text File’ to record the numbers. Double check you have entered them correctly.

 

INSTRUCTION 8: Now do the following (or add the following) to each of the 59 numbers individually and write the answers down onto the piece of paper or into the computer ‘Text File’. Double check you have done the maths correctly. 

 

+3 -1 -7 -7 +3 +7 +3 -3 +2 +6 -2 -8 -1 +1 -1 +7 -5 +1 +3 -2 +3 +4 +0 +8 -3 +2 -7 +4 -1 +7 -2 -2 -6 -7 +5 +0 -4 +3 +3 -2 +5 +2 -4 +3 +1 -6 +6 +5 +7 +8 -7 -7 -4 -3 +4 +5 -3 +7 +6


NOTE: A possible way to accurately perform these conversions is to enter (or copy and paste) the INSTRUCTION 7 numbers onto a ‘LibreOffice Calc’ document within Linux Mint (into cell A1, B1, C1, D1 and so on and so forth) and then below this copy and paste (select ‘Paste Special...’ then ‘Unformatted text’) the above INSTRUCTION 8 number codes into the row directly below the INSTRUCTION 7 numbers (into cell A2, B2, C2, D2 and so on and so forth). After this, create a Formula function in Cell A3 such that the number in Cell A1 is added to the number in Cell A2 (ie. type into Cell A3 ‘=A1+A2’). After this click and hold your mouse pointer on the bottom right hand corner of Cell A3 and drag it to the right hand side, passing by all the cells with numbers above them. This will calculate for you all the numbers. For your information, the number codes above in INSTRUCTION 8 have the [TAB] key pressed before each number to enable copy and paste into ‘LibreOffice Calc’, so if you want to copy and paste the INSTRUCTION 7 numbers into ‘LibreOffice Calc’ you will also need to add the [TAB] key before each number. 

 

INSTRUCTION 9: You now have the 59 numbers to the following pieces of information:

 

Number 1 = Either a number eight (8) that is used to represent a ‘+’ sign (OR) a number nine (9) that is used to represent a ‘-’ sign.

 

Numbers 2 – 19 = 18 numbers that (together with the + or – symbol from Number 1) are the ‘exact’ co-ordinates of where I have buried the Usb containing the computer files which contain all my Bitcoin information. These are the exact coordinates. They are represented in this format:

 

                                                                        +/- _ _ . _ _ _ _ _ _ , +/- _ _ _ . _ _ _ _ _ _

 

The place where it says +/- above is represented by (8) for + and (9) for -. 

 

Simply do an internet search on these co-ordinates to find out where it is. For example, the co-ordinates below are the co-ordinates for the Opera House in Sydney.


33°51'24.6"S 151°12'54.0"E

-33.856831, +151.215005

 

For this example your INSTRUCTION 9 decoded co-ordinate numbers 1 - 19 would be: 

 

9338568318151215005


Number 20 = One number seven (7) that is used as a separator


Numbers 21 - 39 = a repeat of the information in Numbers 1 and Numbers 2 -19 for the second location I have buried the same copy of the usb drive with the bitcoin information.


Number 40 = One number seven (7) that is used as a separator


Numbers 41 - 59 = a repeat of the information in Numbers 1 and Numbers 2 -19 for the third location I have buried the same copy of the usb drive with the bitcoin information.


>>> End of Doc <<<

NOTE: The above sample values highlighted in green were derived from the following answers to INSTRUCTIONS 1 - 3: INSTRUCTION 1: 113184443234735120521029103130 INSTRUCTION 2: person1@emailaddress1.comperson1dropbox@emailaddress1.com INSTRUCTION 3: 2641152251515664112664345515363152263421343412266535622421311645kayakalley18042007020920041010200215051999040919971705197227111970pluto

        Step 2.2: Copy and paste the above ‘sample coded data’ onto a New Office Document (Microsoft word document, WPS writer document or any other document format that retains the correct formatting when copied onto). After this is done, save this file on Usb No. 10. You will be using this template to create your own ‘coded data’ emailed document.

 


Step 3: Download needed programs and save to Usb X

 

        Step 3.1 Download ‘QuickHash-Windows-v2.6.9.2’ from https://quickhash-gui.org/download/quickhash-v2-6-9-2-for-windows/ if you don’t already have a copy. Only download this specific version (Windows-v2.6.9.2) but if you can’t find it from this website, do an online search-engine search to download it from another site. If you download it from another site, check that the checksum of the file is correct (see our ‘Checksums’ page in our Security section for details). If you don’t want to use this particular program, then you can use a different SHA512 hashing software package but test it out first by comparing the results with those from other sources. Also, the result must contain capital and not lowercase letters. Copy and paste it onto Usb X.

 

        Step 3.2: Download the ‘TrueCrypt 7.1a’ installation package for Linux operating systems from https://www.grc.com/misc/truecrypt/truecrypt.htm if you haven’t already got a copy. Only download this specific version (version 7.1a) and if you can’t find it from this website, do an online search-engine search to download it from another site. If you download from another site, check that the checksum of the file is correct (see our ‘Checksums’ page in our Security section for details). The name of the file is truecrypt-7.1a-linux-x64.tar.gz (for 64 bit machines) or truecrypt-7.1a-linux-x86.tar.gz (for 32 bit machines). Copy and paste the downloaded file onto Usb X.

 

        Step 3.3: Download ‘Foxit Advanced PDF Editor 3.1.0.0’ from https://foxit-advanced-pdf-editor.en.softonic.com/ if you don’t already have a copy. Only use this specific version (version 3.1.0.0) and if you can’t find it from this website, do an online search-engine search and download it from another site. If you download it from another site, check that the checksum of the file is correct (see our ‘Checksums’ page in our Security section for details). Copy and paste the downloaded file onto Usb X.

 

 

Step 4: Completely format the ‘bank safety deposit box’ usb

 

         Step 4.1: Insert the bank safety deposit box usb in a free usb port. This is the usb that will contain the ‘IMPORTANT INSTRUCTIONS…’ document containing the coded instructions with the security questions (sample of the ‘coded data’ sheet is shown in Method 6 (Variation 2): step 1). This is the usb with the minimum 128 megabyte free space when empty.

 

        Step 4.2: Do a complete format of the bank safety deposit box usb (a complete format should be done and not a quick format). Windows 7: Right click usb drive > click ‘Format…’ > Uncheck ‘Quick Format’ > click ‘Start’ > click ‘OK’.

 

         Step 4.3: Do a complete ‘Eraser’ format of the bank safety deposit box usb. This process can take a while so be patient. Windows 7: Right click usb drive > select ‘Eraser’ > click ‘Erase Unused Space’.

 

 

Step 5: Boot up the Zorin OS Core usb operating system you used to create your Bitcoin addresses in the TrueCrypt pdf file. 

 

        Step 5.1: Boot up the Zorin OS Core usb operating system from Usb No. 9. This is the same operating system you used to create your Bitcoin addresses in the TrueCrypt pdf file. See Method 3: steps 3.1 to 3.4 if you don’t remember how to do this. 

 

From this step onwards, an internet connection is not needed and you should remain disconnected from the internet for the entire time you are using the Zorin OS Core operating system.

 

 

Step 6: Create a ‘Public-Addresses-Only’ pdf document of your TrueCrypt pdf file, if you don’t already have one

         Step 6.1: Open the ‘LibreOffice Writer’ document where you will be saving the bitcoin public addresses. Create a heading for the document with the name of the wallet file it came from such as ‘3 Jan 2017 Linux Wallet A’ and the words ‘Public Addresses Only’ directly underneath it.

 

         Step 6.2: Load up the Electrum portable program again from the usb and open the wallet file you want to extract the public addresses from. Zorin OS Core: Double click ‘electrum program’ > click ‘File’ > click ‘Open’ > search for ‘wallet file’ > press ‘Open’.

 

         Step 6.3: Now click ‘Wallet’ in the electrum program, move your mouse down to ‘Private keys’, then press ‘Export’. Enter your password, then click ‘OK’. 

 

Your wallets public and private keys (or addresses) will now be revealed.

 

         Step 6.4: Keeping the default ‘Format’ settings of ‘CSV’, click ‘on ‘File’, then change the folder location to ‘Desktop’ at the very top of the options, then click ‘Save’. After this click ‘Export’ and then ‘OK’.

 

         Step 6.5: Now search on your Desktop for the ‘electrum-private-keys.csv’ file you just created and double click on it to open with ‘LibreOffice Calc’.

 

         Step 6.6: Click ‘OK’ on the first screen. Then highlight all the ‘Public addresses’ under where it says ‘address’, then copy and paste these onto a newly opened ‘Text File’ before copying and pasting it again from the ‘Text File’ onto your ‘LibreOffice Writer’ document.

 

When this is all done your document should look something like this.

 



        Step 6.7: Save this LibreOffice document in Microsoft Word 97-2003 (.doc) format. 

 

If you would like to create more than one set of public addresses; in the Electrum program repeat this process (steps 4.2 – 4.7) for all your electrum wallets. When you are finally finished…

 

         Step 6.8: Select ‘File’ in the main menu on the top of LibreOffice Writer, then select ‘Export as PDF...’ and then press ‘Export’, then press ‘Save’. A new pdf file should now appear on your desktop. Close LibreOffice and all other unnecessary windows/folders. Then copy and paste the pdf document to the spare Usb (which is Usb No. 8 if you arrived here from Step 3 of this method). 

 

NOTE: You can include the ‘Master Public Key’ in this Public-Addresses-Only pdf document if you like. Including it will make it easier for you to track all the bitcoin addresses in the wallet if more than the default number have been used. There is however a known weak point where if both a single ‘private key’ is known and the ‘master public key’ is known, the seed can be calculated. For this reason, if you choose to go ahead and include the ‘Master Public Key’ then add a warning like:

 

WARNING: ANYONE WHO KNOWS A SINGLE PRIVATE kEY OF ONE OF THESE PUBLIC ADDRESSES + THIS MASTER PUBLIC KEY, CAN WORK OUT YOUR SEED FOR THIS WALLET

 

 

Step 7: Calculate or re-calculate the passwords to your buried Master usb containing the TrueCrypt pdf file (version B) with all your bitcoin information (seeds, public and private addresses). 

 

         Step 7.1: Following Method 5: steps 1.6 – step 1.12, calculate your 64 numbers-only base Master usb password so you know what it is as you will be needing it to create the coded data document with the security questions.

 


Step 8: Prepare the ‘coded data’ electronic text document with the security questions to be stored in the bank safe deposit box (see ‘Choosing security questions’ article in the Security section for more information on how to choose security questions). 

 

         Step 8.1: Create the 64 numbers-only dice generated base password to emailed TrueCrypt pdf files by following Method 6 (Variation 2): step 10.1. 


         Step 8.2: Following the template from Method 6 (Variation 2): step 1, prepare your Coded data sheet. The document template should be on Usb No. 10 when you saved it in Step 1.2. Load the document from Usb No. 10 using LibreOffice Writer.


         Step 8.3: To get a clearer idea on how it all works, see the info below for all the results of the sample data shown in Method 6 (Variation 2): Step 1.1. You can also use this info as a template to prepare your codes.

INSTRUCTION results for sample coded data shown in Method 6 (Variation 2): step 1.1


INSTRUCTION 3 = CHARACTER RESULT FROM SECURITY QUESTIONS

2641152251515664112664345515363152263421343412266535622421311645kayakalley18042007020920041010200215051999040919971705197227111970plutotheodoregiovannacarsongalvinsanfrancisco

INSTRUCTION 4 = SHA512 (1) HASH RESULT 

A6B49C6E98F4DD2C5068A83D861BC380590D0E22FFB5C44069F52B74B47D392ABAB94D43DF0F5EB818CCF3A16EA8814CD5ED5F52C5A9C8ACFCC07EF77A26FFC5

INSTRUCTION 5 = SHA512 (2) HASH RESULT

C1379FD8908D29DE023BD0F3F19E892AB06D25B718A13085566B806EB7C6DE89763415AF14A9B5F1FA465BCA3A8AF318C945E5F30F0905F26541F4044CE6A61D

INSTRUCTION 6 (PART 1) = SHA512 (1) HASH + SHA512 (2) HASH

A6B49C6E98F4DD2C5068A83D861BC380590D0E22FFB5C44069F52B74B47D392ABAB94D43DF0F5EB818CCF3A16EA8814CD5ED5F52C5A9C8ACFCC07EF77A26FFC5C1379FD8908D29DE023BD0F3F19E892AB06D25B718A13085566B806EB7C6DE89763415AF14A9B5F1FA465BCA3A8AF318C945E5F30F0905F26541F4044CE6A61D

INSTRUCTION 6 (PART 2) = NUMBERS OF SHA512 (1) HASH + SHA512 (2) HASH

6496984250688386138059002254406952744739294430581831688145552598077726513798908290230319892062571813085566806768976341514951465383189455300905265414044661

INSTRUCTION 7 = FIRST 148 NUMBERS OF SHA512 (1) HASH + SHA512 (2) HASH

6496984250688386138059002254406952744739294430581831688145552598077726513798908290230319892062571813085566806768976341514951465383189455300905265414

INSTRUCTION 8 = 148 NUMBERS AFTER CONVERSION

5565140622941637333269293225700653608116121802411630017293420436851178873900182621576363466132363244566511245252452225155132615622555344231513532434

INSTRUCTION 9 = NUMBERS 1 - 64 = 64 numbers-only base password to buried Master Usb files

5565140622941637333269293225700653608116121802411630017293420436

INSTRUCTION 9 = NUMBER 65 = + (8) or - (9) sign

8

INSTRUCTION 9 = NUMBERS 66 - 83 = general co-odinates to main location of buried Master Usb (obtained by pressing curser on location in google maps)

511788739001826215

INSTRUCTION 9 = NUMBER 84 = separator number 7 (no meaning)

7

INSTRUCTION 9 = NUMBERS 85 - 148 = 64 numbers-only dice generated base password to emailed TrueCrypt pdf files (created using Method 6 (Variation 2): step 10.1)

6363466132363244566511245252452225155132615622555344231513532434


        Step 8.4: To get a clearer idea of how to come up with the INSTRUCTION 8 codes, see below for another example of the first 64 digits of a SHA512 (1) hash values after the letters are removed (Row B), and the corresponding INSTRUCTION 8 +/- number codes (Row C), and corresponding 64 digit number-only passwords to the pfd files (Row D). Row E is shown for those interested but can be ignored:


Graph 1: 64 digit numbers-only password based on possible numbers (0-9)

        A = Place number of 64 digits

        B = First 64 numbers of SHA512 (1) hash value after letters have been removed
        C = +/- INSTRUCTION 8 number codes
        D = Password to 'password protected pdf file'
        E = Number of possible password numbers based on +/- INSTRUCTION 8 number code (minimum average = 5 though much likely higher)


Graph 2: 64 digit numbers-only password based on possible numbers (1-6)

        A = Place number of 64 digits

        B = First 64 numbers of SHA512 (1) hash value after letters have been removed
        C = +/- INSTRUCTION 8 number codes
        D = Password to 'password protected pdf file'
        E = Number of possible password numbers based on +/- INSTRUCTION 8 number code (minimum average = 3 though much likely higher)

As you can see, the way to come up with the number code in green is to see how you can turn the SHA512 (1) hash number into the 64 digit number-only password number. This simply requires you to subtract the SHA512 (1) hash number from the 64 digit number-only password number. Ignore all Row E numbers in red as these numbers are only added as extra information for those who are interested in it. Take note that it may be easier for you to prepare the number codes in Linux Mint using the ‘LibreOffice Calc’ program, by adding the [TAB] key between each number after first saving the numbers onto a new ‘Text File’; and then after this, copying and pasting (select ‘Paste Special...’ then ‘Unformatted text’) all of it from the new ‘Text File’ into ‘LibreOffice Calc’. 

 

         Step 8.5: Replace all the text highlighted in green with your own questions and number values. When creating the questions, mix up the order of the questions. The number codes for INSTRUCTION 8 should have the [TAB] key pressed before each number.

 

         Step 8.6: When complete, double check that all your values are correct by redoing it all from the beginning and pretending to be the person who will be viewing these files. Then save the document onto Usb No. 10.

 

 

Step 9: Add to ‘IMPORTANT INSTRUCTIONS FROM (your_name) – READ HERE’ document on Usb No. 10 and store it in the bank safety deposit box usb

 

You should have on Usb No. 10, an editable Microsoft word (or other format) document of the ‘IMPORTANT INSTRUCTIONS…’ text prepared in Method 5; but if you don’t you will need to create another one by following Method 5: step 4.1.

 

        Step 9.1: Open this ‘IMPORTANT INSTRUCTIONS…’ Microsoft word (or other format) document in LibreOffice Writer and copy and paste the entire ‘coded data’ sheet with the security questions, you prepared in Method 6 (Variation 2): step 7, to the last page of the IMPORTANT INSTRUCTIONS…’ document. Save the new ‘IMPORTANT INSTRUCTIONS…’ document and close LibreOffice Writer.

 

        Step 9.2: Now copy and paste from Usb No. 10 the new ‘IMPORTANT INSTRUCTIONS…’ Microsoft word (or other format) document which contains the coded data sheet from step 8, onto the Zorin OS Core desktop. 

 

        Step 9.3: Convert the ‘IMPORTANT INSTRUCTIONS…’ document you just copied to your desktop into pdf format, then save it on your desktop. Keep the non pdf version of the ‘IMPORTANT INSTRUCTIONS…’ document on the desktop. Zorin OS Core: Within LibreOffice Writer select ‘File’> select ‘Export as PDF...’> press ‘Export’ > press ‘Save’ > Then close ‘LibreOffice Writer’.

 

         Step 9.4: Insert the blank ‘safe deposit box usb’ into a free usb port.

 

         Step 9.5: Copy and paste both the ‘IMPORTANT INSTRUCTIONS FROM (your_name) – READ HERE’ pdf and non pdf documents (you just prepared and just saved to your desktop), onto the bank safe deposit box usb. Make sure the part of the file name above that says ‘(your_name)’ is actually your name (eg. David Bowen) and if it isn’t then rename it so it is.

 

        Step 9.6: Copy and paste the non password protected ‘Public-Addresses-Only’ pdf document you prepared in step 6 to this bank safe deposit box usb. When complete, remove the bank safe deposit usb from your computer.

 

Your bank safe deposit box usb is complete and almost ready to be put in the bank safe deposit box.

 

 

Step 10: Create a secure password using dice

 

        Step 10.1: Roll one physical dice 64 times; or roll 4 physical dice 16 times; or roll any other combination of dice to get 64 rolls. Enter these numbers into a new ‘Text file’ and save the ‘Text File’ to your free usb drive (which is Usb No. 10 if you arrived here from Step 9 of this method). 

 

These 64 numbers is your 64 numbers-only base password you will use to create the passwords to secure your ‘password protected pdf file’ and ‘TrueCrypt pdf file’ containing the ‘coded instructions’ from Method 6 (Variation 2): step 2 which you will email.

 

        Step 10.2: Copy and paste the ‘QuickHash-Windows-v2.6.9.2’ hashing program from Method 6 (Variation 2): step 3.1 onto the Zorin OS Core desktop and then open it from there. What this program will do is to convert any character string you enter into it, into another character string consisting of exactly 128 letters and numbers, and this new character string is called a SHA512 hash of the first character string.

 

        Step 10.3: Use this program and create a SHA512 hash of these 64 numbers. We will call this the SHA512 (1) hash. Only use the program you have downloaded and copied onto your computer to do this and not online SHA-512 websites to do it. The reason is the online websites may record your answers or passwords. Zorin OS Core: in main menu of ‘QuickHash-Windows-v2.6.9.2’, in the ‘Text’ tab under ‘Hash Algorithm’, select SHA512 > copy and paste 64 dice rolled numbers into the ‘Text Hashing’ box > copy and paste resulting SHA512 (1) hash result displayed on bottom of program into the new ‘Text File’.

 

This first SHA512 (1) of the 64 dice rolled numbers is now your secure password to the ‘password protected pdf file’ that will be in ‘TrueCrypt pdf file’ containing the ‘coded instructions’ from Method 6 (Variation 2): step 2 which you will email.

 

         Step 10.4: Take this SHA512 (1) hash of the 64 numbers-only base password and SHA512 hash it again. The result called SHA512 (2) hash will be used as the password to ‘TrueCrypt pdf file’ containing the ‘password protected pdf file’ and ‘coded instructions’ (from Method 6 (Variation 2): step 2) which you will email.

 

        Step 10.5: Type these passwords down onto a new ‘Text File’ on Usb No. 10 and add some notes after them (such as ‘64 digit numbers-only password’ or ‘email TrueCrypt password’ or ‘password protected pdf file password’) so you know what each is. As an example, see the table below to see the passwords created from the Sample coded data shown in Method 6 (Variation 2): step 1.1.

Now that you know all the correct password codes, you are ready to create the emailed ‘TrueCrypt pdf file’ containing the ‘password protected pdf file’ which reveals the exact location of your buried Master usb, and which will be emailed to the correct addresses written in the Method 6 (Variation 2): Step 1 document.

 

 

Step 11: Prepare the emailed ‘TrueCrypt pdf file’ containing the ‘password protected pdf file’ which reveals the exact location of your buried usb 

 

        Step 11.1: Following the template from Method 6 (Variation 2): step 2, prepare your Coded data sheet to be converted to an email ‘TrueCrypt pdf file’ and emailed to the chosen addresses. The document template should be on Usb No. 10 when you saved it in Step 2.2. Load the document from Usb No. 10 using LibreOffice Writer.

 

        Step 11.2: To get a clearer idea on how it all works, see the info below for all the results of the sample data shown in Method 6 (Variation 2): Step 2.1. You can also use this info as a template to prepare your codes.



INSTRUCTION results for sample coded data shown in Method 6 (Variation 2): step 2.1


INSTRUCTION 1 = FIRST 30 NUMBERS OF INSTRUCTION 8 CODED DATA IN BANK SAFE DEPOSIT BOX (without + or - signs)

113184443234735120521029103130

INSTRUCTION 2 = FIRST 2 EMAIL ADDRESSES OF INTRUCTION 9 CODED DATA IN BANK SAFE DEPOSIT BOX (without spaces and in lower case only)

person1@emailaddress1.comperson1dropbox@emailaddress1.com

INSTRUCTION 3 = FIRST 4 SECURITY QUESTION ANSWERS OF INSTRUCTION 1 CODED DATA IN BANK SAFE DEPOSIT BOX (without spaces and in lower case only)

2641152251515664112664345515363152263421343412266535622421311645kayakalley18042007020920041010200215051999040919971705197227111970pluto

INSTRUCTION 4 & 5 = SHA512 (1) HASH 

C568C841536FF3A282730550DA95B0808E6ADEE92A5122FCEFDEE894A4A8059327ECCDBC4182BD10EF0FDC7C8465A1703B596A77098DC387FEBB577AB9BDF35A

INSTRUCTION 6 = NUMBERS OF SHA512 (1) HASH 

5688415363282730550950808692512289448059327418210078465170359677098387577935

INSTRUCTION 7 = FIRST 59 NUMBERS OF SHA512 (1) HASH

56884153632827305509508086925122894480593274182100784651703

INSTRUCTION 8 = 59 NUMBERS AFTER CONVERSION

85117880890018270637848858264800229443878437228678010396479

INSTRUCTION 9 = NUMBER 1 = + (8) or - (9) sign

8

INSTRUCTION 9 = NUMBERS 2 - 19 = exact co-ordinates to main location buried Master Usb (obtained by pressing curser on location in google maps)

511788089001827063

INSTRUCTION 9 = NUMBER 20 = separator number 7 (no meaning)

7

INSTRUCTION 9 = NUMBERS 21 - 39 = exact co-ordinates to 2nd location of buried Master Usb (obtained by pressing curser on location in google maps)

8488582648002294438

INSTRUCTION 9 = NUMBER 40 = separator number 7 (no meaning)

7

INSTRUCTION 9 = NUMBERS 41 - 59 = exact co-ordinates to 3rd location of buried Master Usb (obtained by pressing curser on location in google maps)

8437228678010396479


        Step 11.3: Look at the examples given in Method 6 (Variation 2): step 8.4 if you don’t remember how to convert the number codes in INSTRUCTION 8 of the ‘coded data’ sheet. 

 

         Step 11.4: Replace all the text highlighted in green with your own questions and number values. 

 

         Step 11.5: When complete, double check that all your values are correct by redoing it all from the beginning and pretending to be the person who will be viewing these files. Then save the document onto Usb No. 10 into Microsoft word format.

 

        Step 11.6: Now copy and paste from Usb No. 10 the soon to be emailed ‘Coded data’ Microsoft word document you just created, onto the Zorin OS Core desktop. 

 

Step 11.7: Convert this soon to be emailed ‘Coded data’ Microsoft word document you just copied to your desktop into pdf format, then save it on your desktop, and then delete the non pdf version. Zorin OS Core: Within LibreOffice Writer select ‘File’> select ‘Export as PDF...’> press ‘Export’ > press ‘Save’ > Then close ‘LibreOffice Writer’ > then delete non pdf version of the ‘the soon to be emailed ‘Coded data’ Microsoft word document from the desktop.

 

Now that you have the ‘coded data’ in pdf format, you can add a password to it and turn it into a ‘password protected pdf file’

 

        Step 11.8: Add the appropriate password to your ‘coded data’ pdf file that will be emailed. See Method 3: steps 7.1 - step 8.6 if you don’t remember how to do this.

 

Now that you have the ‘coded data’ in a ‘password protected pdf file’, you can put it in a TrueCrypt volume/drive and turn it into a ‘TrueCrypt pdf file’

 

        Step 11.9: Place the password protected pdf file that will be emailed into a TrueCrypt volume/drive and turn it into a ‘TrueCrypt pdf file’ which will be emailed. See Method 4: steps 1.1 - step 5.9 if you don’t remember how to do this.

 

        Step 11.10: Copy and paste the completed email ‘TrueCrypt pdf file’ from the Zorin OS Core desktop onto Usb No. 10.

 

        Step 11.11: Create a new ‘Text File’ on Usb No. 10 and copy and paste everything you wrote under INSTRUCTION 9 of the safe deposit box coded data sheet (which you prepared in Method 6 (Variation 2): step 8). The most important thing to include is the list of email addresses you will be sending the file to and the notes below these stating the date the email is sent, sending address, email attachment name, email subject line and email text. Then save the new ‘Text File’. 

 

Your ‘TrueCrypt pdf file’ with the ‘password protected pdf file’ containing the ‘coded instructions’ from Method 6 (Variation 2): step 2 is complete and ready to be emailed to all the correct email addresses. Delete any work-in-progress files that may be in Usb No. 10. The following files should be the only files on Usb No. 10:

 

                                        ‘TrueCrypt pdf file (version B)’ 

                                        ‘QuickHash-Windows-v2.6.9.2’ 

                                        ‘TrueCrypt 7.1a’ installation package

                                        ‘Foxit Advanced PDF Editor 3.1.0.0’ 

                                        ‘Public-Addresses-Only’ pdf document 

                                        'emailed ‘TrueCrypt pdf file’ 

                                        ‘IMPORTANT INSTRUCTIONS FROM (your_name) – READ HERE’ pdf and non-pdf document 

                                        ‘new ‘Text File’ with INSTRUCTION 9 notes’

 

Step 12: Finalise and bury Master usb with the TrueCrypt pdf file (version B) - if this hasn’t already been done

 

        Step 12.1: Tell your family (or other inheritors) roughly or exactly where you have buried or will bury the Master usb. If you haven’t yet buried it you could even bury it while they watch you.

 

         Step 12.2: Finalize and bury your Master usb if this hasn’t already been done. To finalize it, follow ALL steps from Method 5: steps 8.1 – step 8.7. This is the actual burying part.

 

Congratulations, you have buried your Master Usb

 

 

Step 13: Finalise and email the email ‘TrueCrypt pdf file’

 

         Step 13.1: Insert Usb X into one of your usb drives and copy and paste the email ‘TrueCrypt pdf file’ that is to be emailed onto Usb X. Then rename your email ‘TrueCrypt pdf file’ into whatever you said you would name the file during ‘Method 6 (Variation 2): step 8.2. The sample file name from the example in Method 6 (Variation 2): step 1 is ‘_____’.

 

        Step 13.2: Turn on your computer in your normal computer operating system (in our case it is Windows 7), as we will now be connecting to the internet. Alternatively, you can create another Linux usb operating system using yet another unrelated usb drive and then use this to connect to the internet. Doing it this way offers slightly more security since your TrueCrypt pdf file cannot be exposed to malware that may be on your regular computer operating system when the usb containing the files are initially inserted. Do note that you absolutely cannot use the Zorin OS operating system on Usb No. 9 to connect to the internet as it contains sensitive data. Note that you are not advised use the Zorin OS operating system on Usb X to connect to the internet as we will be using it later (in method 6: variation 2: steps 15.5 – 15.6) to format a usb drive and don’t want to possibly compromise it by connecting to the internet (although it is alot less risky than using Usb No. 9 and probably less risky than using your regular computer operating system – Windows 7 in our case). If you do use the Linux usb operating system to connect to the internet, then remember to format the usb drive afterwards (by following Method 4: steps 15.12 – 15.14 for the usb drive).


        To connect to the internet using the Zorin OS usb operating system, on the bottom right hand side of the screen select the icon that allows you to connect to the internet. Then read and follow the italicized and bold "Additional Information" notes at the end of Method 3, 4 or 5 for a guide on how to securely connect to the internet). After this, select your connection and connect to the internet.

 

         Step 13.3: Login to your email account, create a new email and upload the email ‘TrueCrypt pdf file’. Carefully type in all the email addresses which you own and want to send it to (the list should be in the new Text File you created in Step 11.10); type in the subject line whatever you said you would type in Method 6 (Variation 2): step 8.2. The sample subject line text from the example in Method 6 (Variation 2): step 1 is ‘____’.  

 

         Step 13.4: Type in the email text whatever you said you would type in Method 6 (Variation 2): step 8.2. The sample text in the email from the example in Method 6 (Variation 2): step 1 is:

 

 ‘Please, please do not delete or save onto your computer. Please only open if allowed, using the password in my safe deposit box. The information on this usb is strictly for your viewing only and is strictly for storage here’.  

 

         Step 13.5: Double check all the details are correct and then hit send to send the emails.

 

Congratulations, your ‘TrueCrypt pdf file’ with the ‘password protected pdf file’ containing the ‘coded instructions’ from Method 6 (Variation 2): step 2 has been successfully emailed

 

 

Step 14: Finalise and store the safety deposit box usb in bank safe deposit box

 

        Step 14.1: Take your completed ‘safety deposit box usb’ and completely wrap it in several layers of plastic (food) wrap. Then completely wrap it in several layers of aluminum foil. This material will completely shield the usb from Electromagnetic pulses (EMP) which may damage or render the usb useless.

 

        Step 14.2: Now repeat step 14.1 to make it extra safe against EMP pulses.

 

        Step 14.3: Place your foil/plastic wrapped master usb into the hard usb case. 


        Step 14.4: Label the usb case or the outside of the usb with something like:


        “VERY IMPORTANT INFO INSIDE: PLEASE OPEN!”

       You can do this by printing it out onto paper and then attaching it to the usb or usb hard case with sticky tape.

 

         Step 14.5: Put your Master usb in the bank safety deposit box.

 

You should be aware that it is unknown how long your usb flash drive will accurately retain its data when not accessed in this way. No one can really know for sure as the technology was only invented sometime between the year 1995-2000. SanDisk quote 10 years data retention on their datasheets. We believe that this period is longer (in the vicinity of 100+ years) but recommend that you rewrite or replace the buried usb drive at least once every 10 – 15 years. SanDisk do however offer a product called ‘SanDisk Memory Vault’ that quotes a data retention period of 100 years, so you can use this as an additional backup to store also, if you prefer.

 

It is also recommended you create a duplicate safety deposit box usb and store it in another bank safety deposit box in case something happens to your first one. In this case you will need to prepare more master usb’s each from the beginning of Method 5: step 2; you cannot simply copy and paste all the files onto another usb drive. 

 

 

Congratulations, you have placed the safe deposit usb in the bank safety deposit box

 

 

Step 15: Delete all remaining ‘TrueCrypt pdf file’ copies from all storage mediums after ensuring you have a sufficient number of smaller TrueCrypt pdf files (see the italicized 7th and 8th points of Method 5 Guidelines for details), and then format all unnecessary usb drives

 

         Step 15.1: Re-boot your computer into the Linux usb operating system on Usb No. 9 (see method 3: step 3 if you don’t remember how to do this). Then create a sufficient number of smaller TrueCrypt pdf files (version A) so you can access and use the bitcoins stored in them without having to dig up your buried Master usb. See the italicized 7th and 8th points of Method 5 Guidelines for details. If you like, you can choose to not create these smaller TrueCrypt pdf files (version A) and just keep the single TrueCrypt pdf file (version A) and store this instead.


        Now transfer the TrueCrypt pdf file or files onto yet another usb drive that has been pre-formatted. You can use the Linux usb operating system to completely format the usb drive first if it hasn’t yet been pre-formatted (see method 6: variation 2: Step 15.3 for an example of how to do this). This usb drive will serve as the final resting place of the TrueCrypt pdf file/s. Alternatively, you can also transfer the file/s to an external hard drive as a second backup. Be very careful to ONLY transfer the TrueCrypt pdf file/s and be careful not to transfer them onto any of your main computer hard drive/s where your regular computer operating system is (Windows 7 in our case). Storing it on your main computer hard drive/s will make it more accessible to online hackers. If you accidently make a mistake and transfer any unsecured LibreOffice or other files then you need to restart this method from the beginning of Method 3: step 1.


        If you don’t have an extra usb drive available, then you can temporarily store the file on ‘Usb X’ by inserting ‘Usb X’ into a free usb port and copying and pasting the files over from your desktop. Do note though that doing it this way will require more work later on. Basically, at the next immediate opportunity in Method 6: variation 2: OPTIONAL STEP 15.4, once Usb No. 10 has been completely formatted in the Zorin OS usb operating system, you will need to load up your computer again in your regular operating system (Windows 7 in our case) and format Usb No. 10 using the ‘Eraser’ program before loading your computer in the Zorin OS operating system again and storing the password protected files in the final resting place of Usb No. 10 (Method 6: VARIATION 2: OPTIONAL STEP 15.4 gives exact instructions of how to do this).


        Step 15.2: OPTIONAL STEP: Carefully transfer the electrum wallet file/s you created in Method 3: Step 5 onto your main operating system’s (Windows 7 in our case) electrum wallet folders (if you don’t still have a copy of these then you can create new one/s using the seeds from the TrueCrypt pdf file). It is possible to transfer the wallet files from within the Linux usb operating system by first mounting the drive containing the electrum wallet folders (usually drive C). 


Zorin OS: Click ‘Z’ menu bar icon on bottom left hand side of desktop > select ‘Documents’ > scroll down to ‘+ Other Locations’ and click it > click on the drive containing the electrum wallet folders to mount the drive (usually drive C although the name of the drive will not be visible, only its size) > open the correct folder (usually C: \Users\ Name_of_your_computer\ AppData\ Roaming\ Electrum\ wallets) > copy and paste the wallet files into this folder.  


        Your main operating system’s (Windows 7 in our case) electrum wallet folders were created when and if you completed Method 2 (when we installed the electrum desktop program ‘electrum-2.7.18-setup.exe’ into the main operating system (Windows 7 in our case)). If you prefer instead to transfer the wallet files created in Method 3: Step 5 while using your regular computer operating system (in our case Windows 7), then see the instructions immediately before Method 2: Step 4 for details of how to do this. Bear in mind however that transferring the file using the main operating system (in our case Windows 7) has slightly more risk since the wallet files may be more exposed to malware on your regular operating system when the usb containing the files are initially inserted.


        Step 15.3: Completely format Usb No. 10 within Zorin OS by doing the following: 


        Insert Usb No. 10 into a free usb port. In the Zorin OS operating system desktop, take notice of the name of the new drive that appears. In our example case it is ‘2.1 GB Volume’. Click the ‘Z’ menu bar icon on bottom left hand side of desktop. Then click ‘Documents’. Now scroll down to the part that shows the usb drive you just inserted. The name should match the name of the drive on your desktop. In our example case it is ‘2.1 GB Volume’. The drive should have the mark that looks like an upwards facing arrow immediately on the right hand side of it which shows that the drive has been mounted. 


        You will first be doing a quick format and then later a full format of all the data on this usb drive. For the quick format, right click this drive ‘2.1 GB Volume’, then click ‘Format’. In the screen that appears leave everything at the default setting:


        Erase: Don’t overwrite existing data (Quick)

        Type: Compatible with all systems and devices (FAT)


        Then click ‘Format...’. On the next ‘Are you sure you want to format the volume?’ screen that appears, click ‘Format’. 


        Now for the full format, right click this drive ‘2.1 GB Volume’ again, and then click ‘Format’. In the screen that appears change the first part beside ‘Erase’ so you have the following settings:


        Erase: Overwrite existing data with zeroes (Slow)

        Type: Compatible with all systems and devices (FAT)


        Then click ‘Format...’. On the next ‘Are you sure you want to format the volume?’ screen that appears, click ‘Format’. 


        Now wait up to 10 minutes for your computer to completely format the usb drive. While it is doing this, no indication that this is happening will show on your screen but rest assured your computer is formatting the drive. Once the drive has been completely formatted, the usb will reappear on your screen (not the desktop). On our screen it shows ‘2.1 GB Volume’ again. This is how you will know the format has been completed.


        Step 15.4: OPTIONAL STEP: ONLY DO THIS STEP IF YOU HAVE TEMPORARILY STORED THE TRUECRYPT PDF FILE OR FILES ON USB X DURING STEP 15.1.


        Switch off your computer. Then boot up your computer in your regular operating system (Windows 7 in our case). After this insert Usb No. 10 into a free usb port and do a quick format of Usb No. 10 (a quick format should be done and NOT a complete format). Windows 7: Right click usb drive > click ‘Format…’ > click ‘Start’ > click ‘OK’. After this, do a complete ‘Eraser’ format of Usb No. 10. This process can take a while so be patient. Windows 7: Right click usb drive > select ‘Eraser’ > click ‘Erase Unused Space’. Switch off your computer, Insert Usb No. 9 which still contains the Linux usb operating system (Zorin OS or Linux Mint) and boot up your computer in this Linux usb operating system. Now insert Usb X into a free usb port and copy and paste the password protected files onto your Linux usb operating system desktop. Finally insert Usb No. 10 again and copy and paste these same password protected files from the desktop onto the final resting place which is Usb No. 10. Double check that the files have been transferred properly. 


        Step 15.5: Switch off your computer. Insert Usb X which is the second newly created Linux usb operating system that was prepared in Method 3: Step 2.8, and boot up your computer in the Zorin OS Core or Linux Mint (Linux based) usb operating system using Usb X.


        Step 15.6: Completely format Usb No. 9 within Zorin OS by doing the following: 


        Insert Usb No. 9 into a free usb port. In the Zorin OS operating system desktop, take notice of the name of the new drive that appears. In our example case it is ‘2.1 GB Volume’. Click the ‘Z’ menu bar icon on bottom left hand side of desktop. Then click ‘Documents’. Now scroll down to the part that shows the usb drive you just inserted. The name should match the name of the drive on your desktop. In our example case it is ‘2.1 GB Volume’. The drive should have the mark that looks like an upwards facing arrow immediately on the right hand side of it which shows that the drive has been mounted. 


        You will first be doing a quick format and then later a full format of all the data on this usb drive. For the quick format, right click this drive ‘2.1 GB Volume’, then click ‘Format’. In the screen that appears leave everything at the default setting:


        Erase: Don’t overwrite existing data (Quick)

        Type: Compatible with all systems and devices (FAT)


        Then click ‘Format...’. On the next ‘Are you sure you want to format the volume?’ screen that appears, click ‘Format’. 


        Now for the full format, right click this drive ‘2.1 GB Volume’ again, and then click ‘Format’. In the screen that appears change the first part beside ‘Erase’ so you have the following settings:


        Erase: Overwrite existing data with zeroes (Slow)

        Type: Compatible with all systems and devices (FAT)


        Then click ‘Format...’. On the next ‘Are you sure you want to format the volume?’ screen that appears, click ‘Format’. 


        Now wait up to 10 minutes for your computer to completely format the usb drive. While it is doing this, no indication that this is happening will show on your screen but rest assured your computer is formatting the drive. Once the drive has been completely formatted, the usb will reappear on your screen (not the desktop). On our screen it shows ‘2.1 GB Volume’ again. This is how you will know the format has been completed.


        Step 15.7: Boot up your computer in your regular operating system (in our case Windows 7). 


        Step 15.8: Do a quick format of Usb No. 10 (a quick format should be done and NOT a complete format). Windows 7: Insert Usb No. 10 into free usb port > right click usb drive > click ‘Format…’ > click ‘Start’ > click ‘OK’. (SKIP THIS STEP IF YOU HAVE ALREADY DONE METHOD 6: VARIATION 2: OPTIONAL STEP 15.4).


        Step 15.9: Do a complete ‘Eraser’ format of Usb No. 10. This process can take a while so be patient. Windows 7: Right click usb drive > select ‘Eraser’ > click ‘Erase Unused Space’. (SKIP THIS STEP IF YOU HAVE ALREADY DONE METHOD 6: VARIATION 2: OPTIONAL STEP 15.4). 


        Step 15.10: Do a quick format of Usb No. 9 (a quick format should be done and NOT a complete format). Windows 7: Insert Usb No. 9 into free usb port > right click usb drive > click ‘Format…’ > click ‘Start’ > click ‘OK’.


        Step 15.11: Do a complete ‘Eraser’ format of Usb No. 9. This process can take a while so be patient. Windows 7: Right click usb drive > select ‘Eraser’ > click ‘Erase Unused Space’.


        Step 15.12: Do a quick format of Usb X (a quick format should be done and NOT a complete format). Windows 7: Insert Usb X into free usb port > right click usb drive > click ‘Format…’ > click ‘Start’ > click ‘OK’.


        Step 15.13: Now do a complete format of Usb X (a complete format should be done now and not a quick format). Windows 7: Right click usb drive > click ‘Format…’ > Uncheck ‘Quick Format’ > click ‘Start’ > click ‘OK’.


        Step 15.14: Finally do a complete ‘Eraser’ format of Usb X. This process can take a while so be patient. Windows 7: Right click usb drive > select ‘Eraser’ > click ‘Erase Unused Space’.


 

Congratulations, you have completed Method 6 (Variation 2)

ADDITIONAL INFORMATION


  • The reason why we don’t simply want to use 64 numbers as the ‘password protected pdf file’ password is because pdf files formatted with version PDF1.6 or older (which is the format we are using) has an effective character limit of 32 characters. This means that the 64 numbers will only really be 32 numbers as the pdf reader program will only look at the first 32 characters and will grant access if these are correct. 6 to the power of 32 (in the case of the dice numbers) is only about 7 x 10^24 which could make this password susceptible to a brute force attack because of the ‘relatively’ small number of possible combinations. This 7 x 10^24 will become smaller still once we take into account the Method 6 (Variation 2) INSTRUCTION 8 conversion process of the coded data sheet (it possibly becomes as low as 3 to the power of 32 or about 1 x 10^15). 10 to the power of 32 (in the case of the SHA512 numbers base password from Method 5: step 1 where ‘0-9’ numbers instead of ‘1-6’ numbers have been used) is 1 x 10^32, which is secure in itself but not so after we take into account the Method 6 (Variation 2) INSTRUCTION 8 conversion process of the coded data sheet (it possibly becomes as low as 5 to the power of 32 or about 1 x 10^22). Only values above 1 x 10^30 do we regard as immune to a brute force attack on the password. For your reference, the strength of an AES128 bit encryption key’s brute force difficulty is about 2^128 which is about 3 x 10^38.  


  • You may have wondered then how using the SHA512 hash of the 64 numbers will make a difference. The answer is that it makes all the difference. When we use the SHA512 hash value, the first 32 characters of the SHA512 hash value will have approximately 62 to the power of 32 (or about 2 x 10^57) combinations, which means the SHA512 hash value will be at least as strong as the entire 64 numbers used to create it (not just the 32 numbers). The 64 dice numbers used to create it, have a brute force difficulty of about 6 to the power of 64 (or about 6 x 10^49) and at least 3 to the power of 64 (or about 3 x 10^30) after we take into account the INSTRUCTION 8 conversion process of the coded data sheet. All these values meet our difficulty requirement of being more than 1 x 10^30 in order to become immune to a brute force attack on the password.


  • It should be noted though that even if you do choose to use the 64 base numbers as both the ‘password protected pdf file’ password and the ‘TrueCrypt pdf file’ password this is actually not a problem. The reason is that in this situation, only the ‘password protected pdf file’ password can be brute forced and not the ‘TrueCrypt pdf file’ password. Seeing that anyone who wants to open the ‘password protected pdf file’ always has to open the ‘TrueCrypt pdf file’ first, your data is secure.


  • In regards to the electronic text document to be stored in the bank safety deposit box usb, it is not recommended that you print out a physical paper copy of the ‘IMPORTANT INSTRUCTIONS…’ sheet and include it in the safety deposit box. There is the benefit of secrecy if you don’t include this information. We don’t want a curious bank vault employee to take notice. Remember that it is also easier for the person reading the files to do the mathematical conversions if you have the electronic version (since they can copy and paste the INSTRUCTION 8 numbers over to a LibreOffice Calc spreadsheet).


  • If you do decide to print it out anyway and include it in the bank safety deposit box then you need to print it out without including the INSTRUCTION 8 +/- number codes (eg. -1, +8, +3, -7, +5 etc) of the coded data section, but still leaving enough blank space for you to hand write the numbers onto it afterwards. After printing out the entire ‘IMPORTANT INSTRUCTIONS…’ document, you are to then physically handwrite the codes for INSTRUCTION 8 onto the printout using a pen. The reason for doing it this way is to eliminate the possibility that your printer might store this data/information in its memory drives which could later be retrieved by computer specialists. After hand writing the codes, double check that you have not made any mistakes.


  • Variation 2 requires you to email the password protected email pdf file (with only the linking information) to all your family member’s personal emails as well as anyone else you may want to give the Bitcoins to in the future. Remember that the information in the email pdf is useless without the information in the safe deposit box and if viewed will pose no risk to your bitcoin information; so ensure that you send it to enough addresses for you to be confident at least one of the right people can access it. Most email servers store data permanently now if not in the inbox, then in their own corporate backup drives, which the owner of the information can probably request off them if needed. 


  • Also at least once a year, check that the emailed password protected pdf file is still in your email inbox and if it is not, resend it to yourself. If you have a copy in your email inbox, you can be sure that after you pass away, your relatives can at least contact your email provider and try to gain access that way (although access to this is not guaranteed).