bootstrap html templates

        


                                                         "The best bitcoin is the one you store yourself"

METHOD 4: Password protected pdf file, encrypted in TrueCrypt, and uploaded to your email account 

Security Level = MEDIUM TO HIGH


Amount of work to setup = Moderate
 
Advantages = You can access your bitcoin anywhere where you have an internet connection. You could be stranded in a developing country with no access to any of your other funds and will still be able to access bitcoin. All your assets may have been confiscated by the government and you are on the run from the law, and you will still be able to access your bitcoins. You could be in prison, with access to only a single phone call, and you will still be able to access your Bitcoins through a trusted outside person. The bottom line is you always have easy access to your bitcoins stored in this way, wherever and whatever situation you happen to be in. 
 
This method of storage is also a great and very secure way of sending Bitcoins anywhere in the world to someone you know, while still allowing both the sender and receiver the ability to spend the Bitcoins. Simply email them the drive encrypted password protected pdf file and then give them the password via a different channel such as encrypted text messaging (eg. Telegram secret chats); encrypted voice call (eg. Signal-open whisper systems), or via regular snail mail on a piece of paper that has had the password coded by Method 6 on this website. The sky is the limit. Without the password, it is irrelevant how many other people gain access to the pdf file; it CANNOT be opened. If you merely want to send Bitcoins to someone you know (and then lose that access), then simply get them to securely create a Bitcoin wallet which you then send the funds to via the Bitcoin blockchain.

Disadvantages = Being on an email account of yours or someone else’s, means it is more accessible to people who may gain access to these email accounts (through hacking or other means). This also means it is more prone to being stolen if someone finds out your password. Preventing the password from ever being stolen is the key. The other key is to never store more than a practical amount by this method (ie. the amount you would normally be comfortable carrying with you in the cash wallet you have your identification card in). This method is really meant to be used only as a last resort in an emergency when travelling. Other than this though, this method of storage is quite secure and quite convenient for the owner of the bitcoins.

BEFORE WE START


You might be asking, why we can’t simply upload to our email address the ‘email pdf file’ exactly as it is and then send it to all our email addresses. Surely the password protected pdf file is secure enough. Why do we need to layer the security with TrueCrypt 7.1a? The short answer to this question is: it is entirely up to you but we strongly recommend the additional TrueCrypt 7.1a layer.


Although we feel that the password protected pdf file is secure enough and is good enough to secure your information as is (even against nation state spy agencies), we also believe that you can never be too careful with bitcoin information, especially if that data is uploaded online. TrueCrypt 7.1a created volume drives do require more work to setup and use, but they secure your information in a way that is truly incomparable to all other researched methods. See the ‘TrueCrypt 7.1a Security’ page in the Security section for more details. If you wanted to and don’t mind the extra work, it is recommended you use it to secure your password protected pdf files created using Method 3 as well.

GUIDELINES



  • For Method 4, you will need the password protected pdf file you created using Method 3 which you plan to email yourself. In this tutorial we will call this the ‘email pdf file’. If you don’t have this yet then go to Method 3: steps 1 – 9 to create one.
 
  • For this method you will also need to use a laptop (like Method 3). This will eliminate the threat of hardware keyloggers and the danger of hardware data leaks via cables, monitors and other devices.


  • You will need to either print the instructions out beforehand or view the instructions on a different computer (such as a smart phone, tablet or laptop) for Steps 2 – Step 7.14 (of Method 4). Or you could copy and paste all these instructions onto a Microsoft word or other text document and view the instructions from there.

 

  • The computer needs to have at least 2 free usb ports before starting.

 

  • You will need 3 prepared usb drives with at least 2 gig data storage each when empty. We will name these Usb No. 3, Usb No. 4 and Usb X. In starting here now at Method 4 you should have just finished Method 3 Step 8. Usb No. 1 therefore now becomes Usb No. 3. Usb No. 2 becomes Usb No. 4. And Usb X remains as Usb X. Don’t use any new or different usb drives. Only change the names of the usb’s. 


  • Usb No. 3 contains the newly formatted and installed Zorin OS Core operating system (using method 3: steps 1.4 - 1.5 and steps 2.1 - 2.8). Usb No. 4 is the pre-formatted usb drive containing the ‘email pdf file’ or ‘password protected pdf file’ that is to be emailed. Usb X is the second newly formatted and installed Zorin OS Core operating system (created during method 3: step 2).

 

  • The ‘email pdf file’ that is to be emailed should not have ever been stored in any other location other than Usb No. 1, 2, 3 or 4, because then another exact copy of it may exist elsewhere in the less secure non TrueCrypt 7.1a encrypted version (thereby bypassing your Method 4 TrueCrypt 7.1a more secure version). 


  • You will need an internet connection.

 

  • The following steps are specifically for a Windows 7 operating system but you should be able to get it to work on most Windows operating systems as well as some other operating systems.


  • You will need 1 extra usb (named extra-Usb) that has been pre-formatted to serve as the final cold storage resting place of all your encrypted files. This makes a total of 4 usb’s.

**********************************************************************************************************************************************************************************

  • Alternatively, you can store the final encrypted file/s on a CD or DVD by burning them onto it while using the Linux operating system. The in-house burner program is called 'Brasero'. If you choose to do this (which is HIGHLY RECOMMENDED) then you will also need to have 1 (but ideally 2) CD/DVD writer drive/s connected to the computer. These CD/DVD drives can be either inbuilt into the laptop or connected externally via usb.

**********************************************************************************************************************************************************************************

HOW TO DO IT


Step 1: Download ‘TrueCrypt 7.1a’ installation files in your regular operating system (Windows 7 in our case)

 
         Step 1.1: Download the ‘TrueCrypt 7.1a’ installation package for Linux operating systems from https://www.grc.com/misc/truecrypt/truecrypt.htm using your regular operating system (in our case Windows 7). Only download this specific version (version 7.1a) and if you can’t find it from this website, do an online search-engine search to download it from another site. If you download from another site, check that the checksum of the file is correct (see our ‘Checksums’ page in our Security section for details). The name of the file is truecrypt-7.1a-linux-x64.tar.gz (for 64 bit machines) or truecrypt-7.1a-linux-x86.tar.gz (for 32 bit machines). Save the downloaded file onto your computer. Then copy and paste the downloaded file onto Usb X, and only Usb X. 
 

Step 2: Boot up your computer in the Zorin OS Core (Linux based) operating system using Usb No. 3. (See method 3: step 3 if you don’t remember how to do this)

**********************************************************************************************************************************************************************************

                            If you have a Zorin OS Core Live DVD then boot up from the Live DVD instead

**********************************************************************************************************************************************************************************


The following instructions are for the Zorin OS Core operating system as this is the same Linux operating system we used in Method 3. We should note however that we have found the Zorin OS Core operating system can freeze during this task ‘if’ our instructions are not followed exactly so uers need to follow these instructions exactly. 
 

Step 3: Install TrueCrypt 7.1a Linux installation package onto your Zorin OS Core usb operating system
 
         Step 3.1: Connect Usb X into your laptop usb port.
 
         Step 3.2: Copy and paste the TrueCrypt 7.1a program you downloaded in Step 1.1 onto your desktop (do not load the program from the usb- only do so from the desktop).
 
         Step 3.3: Right click the TrueCrypt program on your desktop, then click ‘Extract here’.
 
         Step 3.4: Double click the TrueCrypt extracted file that has just appeared on your desktop to load the program.
 
         Step 3.5: On the first screen that appears, click ‘Run’.
 
         Step 3.6: In the ‘Terminal’ black and white screen that appears, type ‘1’ on your keyboard, then press ‘Enter’. You may want to press the ‘NumLock’ key on your keyboard first to make it easier to enter numbers. 
 
         Step 3.7: Now press ‘Enter’ and then press ‘Enter’ again only this second time holding onto it until the text: ‘Do you accept and agree to be bound by the license terms? (yes/no):’ appears. 
 
         Step 3.8: Type ‘yes’ and then hit ‘Enter’. Press ‘Enter’ again to exit the screen.
 
Your TrueCrypt 7.1a file encryption program is now installed. To open it press the ‘Z’ button on the bottom left of your desktop screen, then type in ‘truecrypt’ into the search menu. The ‘TrueCrypt’ icon should appear on the top left of the menu. Press this to load the program.
 
 
Step 4: Create a TrueCrypt 7.1a password protected encrypted volume (or drive)
 
Note: The ‘TrueCrypt User Guide’ pdf document for the TrueCrypt program, which can be found online (just search ‘TrueCrypt User Guide pdf’ to download and view the document) also offers a guide on how to encrypt files using TrueCrypt. Read this if you like. 
         Step 4.1: Open the TrueCrypt program you installed in Step 3. Do this by pressing the ‘Z’ button on the bottom left of your desktop screen, then typing ‘truecrypt’ into the search menu, and then pressing the ‘TrueCrypt’ icon that appears.
 
         Step 4.2: In the TrueCrypt main menu, click ‘Create Volume’.
 
         Step 4.3: On the next screen leave it at the default selection ‘Create an encrypted file container’ and press ‘Next >’.
 
         Step 4.4: On the following screen leave it at the default selection ‘Standard TrueCrypt volume’ and press ‘Next >’.
 
         Step 4.5: In the ‘Volume Location’ screen that appears press ‘Select File...’, then find ‘Usb No. 4’ on the left hand side of the menu box and press that. In the ‘Name:’ field on the top of the menu screen, type in a name for your volume. We will name it ‘TrueCrypt-Drive’ for this tutorial. Now hit ‘Save’.
 
         Step 4.6: Press ‘Next >’, then in the ‘Encryption Options’ screen that appears leave everything in the default settings and press ‘Next >’ again.
 
         Step 4.7: Type in a volume size number that is about 1 megabyte larger than the ‘email pdf file’ you will be storing in it. Usually between 1 – 5 megabytes is appropriate. Then hit ‘Next >’.
 
         Step 4.8: Type in your password in the ‘Password:’ and ‘Confirm password:’ fields. 
 
This password should be the same password you used to password protect the ‘email pdf file’ and it should be 26-32 characters long. It may be necessary for you to re-open the ‘email pdf file’ in ‘Foxit Advanced PDF Editor 3.1.0.0’ and change the password before continuing if a shorter password length was used previously (see Method 5: step 1.15 Part 2 for instructions on how to do this- ‘Desktop’ means ‘Usb No. 4’ for this). 
 
You can also use the SHA512 hash of this 26-32 character password, as the password if you like (see Method 5: steps 1.2, steps 1.5 - 1.7 for instructions on how to do this- ignore usb number & TrueCrypt file version). Before you do this though, read the last italicized paragraph  of the ‘TrueCrypt Security’ article in the Security section of this website.
 
         Step 4.9: When done, press ‘Next >’. In the ‘Format Options’ screen that appears, leave it at the default settings and press ‘Next >’.
 
         Step 4.10: Now move your mouse around inside the screen for a while. The ‘TrueCrypt User Guide’ pdf recommends 30 seconds. When done, press ‘Format’.
 
         Step 4.11: Now click ‘OK’. Then click ‘Exit’ to close the screen.
 
You have now created a TrueCrypt password encrypted volume on Usb No. 4. 
 
 
Step 5: Open your TrueCrypt 7.1a password protected encrypted volume and store your ‘email pdf file’ in it
 
Note: It is in this section where your Zorin OS Core operating system is most likely to freeze. If you are using Zorin OS Core to open the TrueCrypt folder then follow these instructions carefully. If you make a mistake and it freezes, and you can’t get it to work again after trying for a while, reset the computer and repeat Method 4: steps 2 - 4.11. 
 
 
         Step 5.1: In the TrueCrypt main menu press ‘Select File...’. 
 
         Step 5.2: In the ‘Select a TrueCrypt Volume’ screen that appears search for ‘Usb No. 4’ on the left hand side of the menu box and press on it. In the center box under ‘Name’, find your TrueCrypt folder (in our case it is ‘TrueCrypt-Drive’), press it and then press ‘Open’ on the bottom right of your screen.
 
         Step 5.3: Click your mouse pointer on any of the ‘Slots’ (1-64) in the centre box. It makes no difference which one you choose.
 
         Step 5.4: Now press ‘Mount’.
 
         Step 5.5: Type in your password, then press ‘OK’.
 
Careful now…
 
         On your desktop screen, your new volume should appear. Its name will appear as ‘approximate size of the volume size chosen + Volume’, so in our example, if we chose a 1 megabyte TrueCrypt volume size the name will be ‘786 KB Volume’. Don’t ask us why the volume size is smaller than the selected 1 megabyte size cos we don’t know.
 
Now...
 
         Step 5.6: Right click the TrueCrypt volume that has just loaded onto your desktop. Then click ‘Open’. Only load the TrueCrypt drive (‘TrueCrypt-Drive’) from the desktop and not within the TrueCrypt main menu ’cos it will freeze if you do. 
 
         Step 5.7: Open your Usb No. 4 drive where your ‘email pdf file’ is stored by double clicking the ‘Usb No. 4’ drive on the desktop.
 
         Step 5.8: Copy and paste the ‘email pdf file’ in Usb No. 4 into the True Crypt volume ‘TrueCypt-Drive’. Then close the TrueCrypt volume folder by hitting the ‘x’ on the top right hand side of the folder screen.
 
         Step 5.9: Open the TrueCrypt main menu again and click ‘Dismount All’ on the bottom of the screen. Then click ‘Exit’ to close the program. Always completely close or exit the program after using and before shutting down your computer.
 
Congratulations, you have now encrypted your ‘email pdf file’ in TrueCrypt. The TrueCrypt file “TrueCrypt-Drive’ is this encrypted file. Test it out by opening the TrueCrypt 7.1a program, mounting the TrueCrypt file, entering the password, and then opening the ‘email pdf file’ within. Carefully check the pdf file’s contents. Once you are happy with all this and are sure everything has been setup correctly, close the TrueCrypt program, delete the original ‘email pdf file’ or ‘password protected pdf file’ that is on Usb No. 4, and then remove Usb No. 4 from the usb port. Although we have deleted the ‘email pdf file’, do not yet delete any of the unsecured work in progress ‘LibreOffice’ documents still on the Zorin OS desktop or on Usb no. 4, as we may need these later in Method 5. 
 
From now on, we will call the TrueCrypt password encrypted volume containing either the ‘email pdf file’ or any other password protected pdf file, a: ‘TrueCrypt pdf file’.

                                                                                                                               Important:

If you are planning to immediately (right now) store your password protected pdf file using Method 5 or 6 then skip the rest of Method 4 (steps 6.1 – 6.3 and steps 7.1 – 7.14) and go straight to the method you are using. 

Method 5 and 6 if done needs to be completed all in the same sitting or occasion. You cannot use previously made and stored Method 3 or Method 4 files created during a previous sitting or occasion. Only current password protected pdf files and TrueCrypt pdf files created from the beginning of Method 3: Step 1 can be used when proceeding to Step 5 or 6. You need to always do Method 4 immediately after Method 3. You need to always do Method 5 immediately after Method 4. You need to always do Method 6 immediately after Method 4 or 5. Doing it all on the one single occasion ensures fewer mistakes and less chances of security breaches or problems.

If you don’t plan to immediately (right now) store your password protected pdf file using Method 5 or 6 then continue onto Step 6.1 where we will upload your TrueCrypt pdf file to your email account, and then proceed to format all the usb drives, after backing up the files (with steps 7.1- 7.14).


Step 6: Upload to your email account your TrueCrypt pdf file
 
         Step 6.1: Insert Usb X into one of your usb drives and copy and paste the TrueCrypt pdf file that is to be emailed onto Usb X. If you like you can now rename your TrueCrypt pdf file on Usb X into something discrete such as ‘file backup’, or ‘______’, or into something that will make it easier for you to locate the file in the future and open it such as ‘BTC-SHA512-32 character password...’.

         Step 6.2: Turn on your computer in your normal computer operating system (in our case it is Windows 7), as we will now be connecting to the internet. Alternatively, you can create another Linux usb operating system using yet another unrelated usb drive and then use this to connect to the internet. Doing it this way offers slightly more security since your TrueCrypt pdf file cannot be exposed to malware that may be on your regular computer operating system when the usb containing the files are initially inserted. Do note that you absolutely cannot use the Zorin OS operating system on Usb No. 3 to connect to the internet as it contains sensitive data. Note that you are not advised use the Zorin OS operating system on Usb X to connect to the internet as we will be using it later (in method 4: steps 7.5 – 7.6) to format a usb drive and don’t want to possibly compromise it by connecting to the internet (although it is alot less risky than using Usb No. 3 and probably less risky than using your regular computer operating system – Windows 7 in our case). If you do use the Linux usb operating system to connect to the internet, then remember to format the usb drive afterwards (by following Method 4: steps 7.12 – 7.14 for the usb drive).

        To connect to the internet using the Zorin OS usb operating system, on the bottom right hand side of the screen select the icon that allows you to connect to the internet. Then read and follow the italicized and bold "Additional Information" notes at the end of Method 3 or Method 4 for a guide on how to securely connect to the internet). After this, select your connection and connect to the internet. 
 
         Step 6.3: Login to your email account, create a new email and upload the ‘TrueCrypt pdf file’. Carefully type in all the email addresses which you own and want to send it to; add whatever other information you want, and then click ‘Send’.

 
Step 7: Transfer TrueCrypt pdf files onto the final storage medium and format Usb No. 3, Usb No. 4 and Usb X

         Step 7.1: Re-boot your computer into the Linux usb operating system on Usb No. 3 (see method 3: step 3 if you don’t remember how to do this). Now transfer the TrueCrypt pdf file onto yet another usb drive that has been pre-formatted (the extra-Usb). You can use the Linux usb operating system to completely re-format the usb drive again if you like (see method 4: Step 7.3 for an example of how to do this). This usb drive will serve as the final resting place of the TrueCrypt pdf file. Alternatively, you can also transfer the file to an external hard drive as a second backup. Be very careful to ONLY transfer the TrueCrypt pdf file and be careful not to transfer them onto any of your main computer hard drive/s where your regular computer operating system is (Windows 7 in our case). Storing it on your main computer hard drive/s will make it more accessible to online hackers. If you accidently make a mistake and transfer any unsecured LibreOffice or other files then you need to restart this method from the beginning of Method 3: step 1.
**********************************************************************************************************************************************************************************
                                        OR STORE ON A DVD DISK (ALTERNATE STORAGE MEDIUM)

        Step 7.1.5: While still within the Linux operating system, transfer the password protected pdf file (and optionally the electrum wallet file/s if desired) onto a blank DVD disk by burning them onto the disk (see Method 3: Steps 3A.1 – 3A.6 for instructions). This DVD disk will serve as the final resting place of the TrueCrypt pdf file. Be very careful to ONLY transfer the TrueCrypt pdf file and be careful not to transfer them onto any of your main computer hard drive/s where your regular computer operating system is (Windows 7 in our case). Storing it on your main computer hard drive/s will make it more accessible to online hackers. If you accidently make a mistake and transfer any unsecured LibreOffice or other files then you need to restart this method from the beginning of step 1.

**********************************************************************************************************************************************************************************


        Step 7.2: OPTIONAL STEP: Carefully transfer the electrum wallet file/s you created in Method 3: Step 5 onto your main operating system’s (Windows 7 in our case) electrum wallet folders (if you don’t still have a copy of these then you can create new one/s using the seeds from the TrueCrypt pdf file). It is possible to transfer the wallet files from within the Linux usb operating system by first mounting the drive containing the electrum wallet folders (usually drive C). 

Zorin OS: Click ‘Z’ menu bar icon on bottom left hand side of desktop > select ‘Documents’ > scroll down to ‘+ Other Locations’ and click it > click on the drive containing the electrum wallet folders to mount the drive (usually drive C although the name of the drive will not be visible, only its size) > open the correct folder (usually C: \Users\ Name_of_your_computer\ AppData\ Roaming\ Electrum\ wallets) > copy and paste the wallet files into this folder.  

        Your main operating system’s (Windows 7 in our case) electrum wallet folders were created when and if you completed Method 2 (when we installed the electrum desktop program ‘electrum-2.7.18-setup.exe’ into the main operating system (Windows 7 in our case)). If you prefer instead to transfer the wallet files created in Method 3: Step 5 while using your regular computer operating system (in our case Windows 7), then see the instructions immediately before Method 2: Step 4 for details of how to do this. Bear in mind however that transferring the file using the main operating system (in our case Windows 7) has slightly more risk since the wallet files may be more exposed to malware on your regular operating system when the usb containing the files are initially inserted.

        Step 7.3: Completely format Usb No. 4 within Zorin OS by doing the following: 

        Insert Usb No. 4 into a free usb port. In the Zorin OS operating system desktop, take notice of the name of the new drive that appears. In our example case it is ‘2.1 GB Volume’. Click the ‘Z’ menu bar icon on bottom left hand side of desktop. Then click ‘Documents’. Now scroll down to the part that shows the usb drive you just inserted. The name should match the name of the drive on your desktop. In our example case it is ‘2.1 GB Volume’. The drive should have the mark that looks like an upwards facing arrow immediately on the right hand side of it which shows that the drive has been mounted. 

        You will first be doing a quick format and then later a full format of all the data on this usb drive. For the quick format, right click this drive ‘2.1 GB Volume’, then click ‘Format’. In the screen that appears leave everything at the default setting:

        Erase: Don’t overwrite existing data (Quick)
        Type: Compatible with all systems and devices (FAT)

        Then click ‘Format...’. On the next ‘Are you sure you want to format the volume?’ screen that appears, click ‘Format’. 

        Now for the full format, right click this drive ‘2.1 GB Volume’ again, and then click ‘Format’. In the screen that appears change the first part beside ‘Erase’ so you have the following settings:

        Erase: Overwrite existing data with zeroes (Slow)
        Type: Compatible with all systems and devices (FAT)

        Then click ‘Format...’. On the next ‘Are you sure you want to format the volume?’ screen that appears, click ‘Format’. 

        Now wait up to 10 minutes for your computer to completely format the usb drive. While it is doing this, no indication that this is happening will show on your screen but rest assured your computer is formatting the drive. Once the drive has been completely formatted, the usb will reappear on your screen (not the desktop). On our screen it shows ‘2.1 GB Volume’ again. This is how you will know the format has been completed.

        Step 7.4: This is a redundant step from an older version of this guide. Please disregard.
**********************************************************************************************************************************************************************************
           If you are currently running the Zorin OS operating system from the Live DVD then you can skip the next step, Method 4: Step 7.5

**********************************************************************************************************************************************************************************


        Step 7.5: Switch off your computer. Insert Usb X which is the second newly created Linux usb operating system that was prepared in Method 3: Step 2.8, and boot up your computer in the Zorin OS Core or Linux Mint (Linux based) usb operating system using Usb X.

        Step 7.6: Completely format Usb No. 3 within Zorin OS by doing the following: 

        Insert Usb No. 3 into a free usb port. In the Zorin OS operating system desktop, take notice of the name of the new drive that appears. In our example case it is ‘2.1 GB Volume’. Click the ‘Z’ menu bar icon on bottom left hand side of desktop. Then click ‘Documents’. Now scroll down to the part that shows the usb drive you just inserted. The name should match the name of the drive on your desktop. In our example case it is ‘2.1 GB Volume’. The drive should have the mark that looks like an upwards facing arrow immediately on the right hand side of it which shows that the drive has been mounted. 

        You will first be doing a quick format and then later a full format of all the data on this usb drive. For the quick format, right click this drive ‘2.1 GB Volume’, then click ‘Format’. In the screen that appears leave everything at the default setting:

        Erase: Don’t overwrite existing data (Quick)
        Type: Compatible with all systems and devices (FAT)

        Then click ‘Format...’. On the next ‘Are you sure you want to format the volume?’ screen that appears, click ‘Format’. 

        Now for the full format, right click this drive ‘2.1 GB Volume’ again, and then click ‘Format’. In the screen that appears change the first part beside ‘Erase’ so you have the following settings:

        Erase: Overwrite existing data with zeroes (Slow)
        Type: Compatible with all systems and devices (FAT)

        Then click ‘Format...’. On the next ‘Are you sure you want to format the volume?’ screen that appears, click ‘Format’. 

        Now wait up to 10 minutes for your computer to completely format the usb drive. While it is doing this, no indication that this is happening will show on your screen but rest assured your computer is formatting the drive. Once the drive has been completely formatted, the usb will reappear on your screen (not the desktop). On our screen it shows ‘2.1 GB Volume’ again. This is how you will know the format has been completed.

        Step 7.7: Boot up your computer in your regular operating system (in our case Windows 7). 

        Step 7.8: This is a redundant step from an older version of this guide. Please disregard.

        Step 7.9: This is a redundant step from an older version of this guide. Please disregard.

        Step 7.10: Do a quick format of Usb No. 3 (a quick format should be done and NOT a complete format). Windows 7: Insert Usb No. 3 into free usb port > right click usb drive > click ‘Format…’ > click ‘Start’ > click ‘OK’.

        Step 7.11: Do a complete ‘Eraser’ format of Usb No. 3. This process can take a while so be patient. Windows 7: Right click usb drive > select ‘Eraser’ > click ‘Erase Unused Space’.

        Step 7.12: Do a quick format of Usb X (a quick format should be done and NOT a complete format). Windows 7: Insert Usb X into free usb port > right click usb drive > click ‘Format…’ > click ‘Start’ > click ‘OK’.

        Step 7.13: Now do a complete format of Usb X (a complete format should be done now and not a quick format). Windows 7: Right click usb drive > click ‘Format…’ > Uncheck ‘Quick Format’ > click ‘Start’ > click ‘OK’.

        Step 7.14: Finally do a complete ‘Eraser’ format of Usb X. This process can take a while so be patient. Windows 7: Right click usb drive > select ‘Eraser’ > click ‘Erase Unused Space’.

ADDITIONAL INFORMATION


How to Access Your Bitcoins:


  • The only acceptable way to ACCESS your data stored in your TrueCrypt pdf file is using your personal computer/laptop and opening it in a newly created Linux usb operating system (either Zorin OS or Linux Mint). This is the same system used to create the pdf in Method 3 and Method 4. The reason this is the only acceptable way is because you can be 100% sure that there are no keyloggers or other malware on it. If you have used a 26-32 character password for this pdf file then this is the only acceptable way to access the file. Stay offline for the entire time you are accessing the file and never connect to the internet BEFORE, DURING or AFTER entering your pdf password into the Linux usb operating system (just incase the system has acquired a malware program or had one pre-installed). If you never connect to the internet, then there is no chance for any password or other data to be leaked even if it has been captured. Remember that Method 4 and Method 5 passwords must never be discovered by another person, and entering it in this way will prevent this discovery.  



How to Transact With Your Bitcoins:


  • The safest way to TRANSACT with your bitcoins is by alternating between using an online operating system (in this instance it can be either Zorin OS or your regular operating system) and a completely offline operating system (Zorin OS only) and basically creating the transaction in the online machine, before signing it in the offline machine, and then broadcasting it on the online machine. To do this using electrum: you would create a watching only electrum wallet on the online computer (using the public addresses or master public keys), and then go to the offline Linux operating system to sign the transaction from the ‘Raw transaction’ data, before loading the ‘Signed transaction’ again in the online operating system and then ‘Broadcasting’ it. If you do this, at no time will your private keys or passwords be used in the online session. Specific details on how to transact in this way can be found via online web searches. Do note that the Zorin OS 12 Core operating system cannot run the newest version of electrum, so your regular operating system needs to run the newest version of electrum for the online machine.


  • If you do not want to transact in this way, or are having difficulty with using your regular internet connected operating system together with electrum to transact with your bitcoins, then you can also transact with your bitcoins by using a website called www.coinb.in . This website allows you to transact with your bitcoins in an online-offline manner; using any internet browser on any operating system, phone or tablet. Transactions here are signed directly with the bitcoin private key so there is no need to use the electrum program.


  • To do this: go to the website www.coinb.in/#about on your online machine and then click the ‘download’ link at the very bottom on the page, which leads to: https://github.com/OutCast3k/coinbin/archive/master.zip . Then save this file named coinbin-master.zip onto a usb or dvd (see the Checksums page for the checksums of this file). This file will then be run on the offline machine by double left clicking the file named ‘index.html’. If possible, open it using a different browser to the default browser. Do an online websearch for speciifc instructions on how to perform the transactions in an online-offline manner.


  • Be very careful when transacting with the coinb.in method and make sure you test small amounts first to become familiar with the procedure. In particular, make sure you send the change back to one of your own bitcoin addresses and not leave it as part of the Transaction fee, which would instead be sent to the miners. There are famous examples of people having mistakenly sent huge amounts of bitcoins to miners this way.



Other Information:


  • If you choose to view websites while using the Zorin OS usb operating system, do not use or even open the default browser. Remove the default browser from the desktop by right clicking on it and then clicking "Remove from Favorites". After this, download a pre July 2022 version of the Firefox browser and install it into the Zorin operating system during a new session (after transferring the firefox file from the dvd or usb). Use the version built for 32 bit linux operating systems. The downloaded Firefox package file should end in ".tar.bz2". Firefox browser versions after approximately July 2022 don't work within the Zorin operating system and therefore only a pre July 2022 version of the software can be used. "firefox-94.0.2.tar.bz2" is the recommended version number to use. After installing it, and running it for the first time; while still offline, go to "Settings", then scroll down to the checkbox "Check for updates but let you choose to install them." and click it. Lastly, before you start using the Firefox browser online, always install the "Duckduckgo.com browser addon' by going directly to the duckduckgo.com website and following the prompts to install it. 


  • Additionally, to connect to the internet while using Zorin OS, use an internet 4G/LTE router device (not a mobile phone) that lets you connect to the internet using a mobile sim card. Only use the ethernet port and the ethernet cable and switch off the wifi option on the router. Set a strong password on the router to make it difficult for hackers to access remotely. If you access the internet using Zorin OS then it is absolutely essential for you to disconnect and then reconnect the battery and then RAM cards for 10 seconds every single time before switching on the computer. This will help reset the CMOS and help to wipe any bios level malware that may have infected your computer during the online session. And when you switch off the computer, do so by simply pressing and holding onto the power button until it switches off.


**********************************************************************************************************************************************************************************
    QR CODE Scanner / Generator programs:

The following 2 lightweight programs can be used on both your online and offline computer to read and/or generate QR codes used in transferring information from the online computer to offline computer and vice versa. They have been found to use minimal computer processing resources which make them suitable for use in the Zorin OS operating system. The QR Code reader program shown here can read image files of QR codes but cannot take the images, which means you will need to take a photo of the QR code first using the Zorin OS webcam program called ‘Cheese’ before loading the photo in the QR code reader program (search ‘cam’ or ‘cheese’ in the Zorin menu bar to find the ‘Cheese’ program). If your QR codes are too large to process, then you can break the characters used to create them into 2 or more sentences to make the QR codes smaller.

    QR CODE READER:

            OnBarcode QR Code Scanner : Name of file upon first download is ‘qrcode.zip’ . Version number 3.0.0. Downloadable from http://www.onbarcode.com/scanner/qrcode_download.php . Checksums of file upon first download: MD5 = 6B4711FF7E308ACA0F21048C8302930B SHA-1 = F5CD6E3BFBB9E23516023B943970930044C7C3F3 (see Checksums page for SHA256 and SHA512 checksums).

    QR CODE GENERATOR:

           
Update pending...

**********************************************************************************************************************************************************************************

***** 2024 UPDATE: CRITICAL UPDATE COMING SOON *****


To obtain the maximum level of security possible, a new section is currently being prepared that will show users how to use the above method on a newly purchased completely offline computer that will only be ever used to create your bitcoin keys and wallets and to sign your bitcoin transactions. This will be a dedicated offline computer used only for bitcoin purposes. Every single time, before the computer is switched on, users will need to open the computer up and disconnect and then put back in all the RAM cards to reset the system. The sound and network cards, as well as the microphone of this offline computer will be physically removed permanently (not just disabled), and the computer will never ever be connected to the internet. If possible, also remove the connected hard drive and also regularly replace the mouse and keyboard that is used with this computer to prevent compromised malware from hijacking your operating system. Additionally, this offline computer will never have any usb’s connected to it except during the initial installation or when retrieving stored bitcoin data from the dedicated storage usbs. All transfers of information (in the form of master public keys, raw transaction text and signed transaction text) from this offline computer to your online computer and vice versa will be via QR code images captured on the completely offline computer using an external webcam that is connected only when used. This new section will replace Windows 7 with Windows XP as the initial operating system. Zorin OS will remain the usb operating system however instructions on how to create a Zorin OS Live CD will be included for extra security and convenience. And so too will instructions on how to transfer the encrypted bitcoin files onto a CD/DVD for permanent, less alterable storage. These measures are designed to eliminate the ever present danger of malware infecting your computer and/or usb’s and compromising your bitcoin security. Click here for details...

     

**************************************************************************************************************************************************************

All Work-in-progress / Planned additions or Alternate steps to Method 4, which will be in this New section are currently shown in BLUE font on this ‘Method 4 (Cold storage) webpage.

**************************************************************************************************************************************************************