Bitcoin investigation and wallet seizure

DFIRScience
15 Dec 202112:15

Summary

TLDRThis video script delves into cryptocurrency wallets, contrasting custodial wallets used by exchanges like Coinbase with local wallets like Electrum. It explains how exchanges reduce fees by internal ledger accounting and how local wallets function as nodes in the network, allowing users to generate multiple addresses for transactions. The script also covers wallet security, encryption, and the process of seizing a wallet by obtaining the seed, master private key, or private keys for addresses. It concludes with a practical challenge for viewers to seize Bitcoin from hidden wallet IDs and a teaser for future videos on advanced blockchain analysis.

Takeaways

  • 💼 Exchanges like Coinbase use custodial wallets, which means they hold the user's cryptocurrency and allow users to trade without making transactions on the blockchain, reducing fees.
  • 🔑 Wallets can be analyzed by joining the respective blockchain network as a node, which allows for downloading and monitoring transactions.
  • 📱 Local wallets, such as Electrum, are used by serious cryptocurrency users and act as nodes in the network, enabling them to send and receive funds directly on the blockchain.
  • 🏠 Local wallets can generate multiple addresses, allowing users to have different addresses for different transactions and purposes.
  • 🌐 Blockchain explorers like blockchain.com provide a simple interface for analyzing transactions and wallet addresses.
  • 🔐 Wallets can be secured with encryption and passwords, making it more difficult to seize funds without the proper keys or seed values.
  • 🔑 The seed value, master private key, and bitcoin address private key are crucial for seizing a wallet, as they allow access to make transactions and control the wallet.
  • 🔍 Investigating a wallet involves looking for the wallet's configuration files, transaction history, and key stores, which may contain the seed or private keys in plain text or encrypted form.
  • 🔒 Encrypted wallets require finding the encryption keys or seed values, which can be in a password manager or backed up elsewhere by the user.
  • 🔄 If a wallet is open, one can export private keys directly, which allows for seizing the associated bitcoin addresses.
  • 🕵️‍♂️ For complex investigations, especially in cases of money laundering, more advanced tools like Chainalysis may be necessary to handle the vast amount of transaction data.

Q & A

  • What is the primary function of a cryptocurrency wallet?

    -A cryptocurrency wallet serves as a user interface to interact with the blockchain ledger system, allowing users to send, receive, and store cryptocurrencies.

  • What type of wallet does an exchange like Coinbase typically use?

    -Exchanges like Coinbase typically use a custodial wallet, where they hold the actual cryptocurrency and manage the transactions on their own ledger system, reducing the need for on-chain transactions.

  • How does a custodial wallet reduce transaction fees for users?

    -A custodial wallet reduces transaction fees by not requiring every buy or sell action to be recorded on the blockchain. Instead, the exchange manages the assets internally and updates user balances accordingly.

  • What is a non-mining node in the context of cryptocurrency wallets?

    -A non-mining node is a participant in the cryptocurrency network that can see and verify transactions but does not participate in the mining process to create new blocks.

  • Why would someone choose a local wallet over a custodial wallet provided by an exchange?

    -A local wallet provides more control and security over one's funds, as it is not managed by a third party. It allows the user to directly interact with the blockchain and is often preferred by those who are more serious about cryptocurrency.

  • What is a multi-signature wallet and how does it work?

    -A multi-signature wallet requires multiple keys to authorize a transaction. It adds an extra layer of security by ensuring that a transaction can only be executed when a certain number of approved parties agree.

  • What is a seed in the context of cryptocurrency wallets?

    -A seed is a group of words that can be used to regenerate a wallet's private keys. It serves as a backup mechanism to recover access to the wallet in case the original keys are lost.

  • Why is it important to encrypt a cryptocurrency wallet?

    -Encrypting a cryptocurrency wallet adds an extra layer of security, making it difficult for unauthorized individuals to access and potentially seize the funds within the wallet.

  • How can a user find out if their wallet is encrypted and how to access it?

    -A user can check if their wallet is encrypted by looking for an encrypted file or by attempting to open the wallet without a password. If the wallet is encrypted, a password will be required to access the wallet's contents.

  • What is the purpose of a blockchain explorer tool like blockchain.com?

    -A blockchain explorer tool allows users to view transaction histories, track the flow of funds, and analyze the activity associated with specific cryptocurrency addresses.

  • How can an investigator seize a cryptocurrency wallet during an investigation?

    -An investigator can seize a cryptocurrency wallet by obtaining the wallet's seed value, master private key, or the private keys associated with the wallet's addresses, which would grant them access to make transactions and potentially seize the funds.

Outlines

00:00

💼 Understanding Wallet Systems and Exchanges

This paragraph introduces the concept of cryptocurrency wallets, focusing on exchange-based custodial wallets like those found on coinbase.com. It explains how exchanges manage transactions internally to reduce blockchain fees, and how they automatically create wallets for users. The speaker also touches on the use of blockchain explorers for analyzing transactions and the importance of joining specific networks like Bitcoin or Ethereum to analyze their respective ledger systems. A distinction is made between simple transaction analysis using online tools and the need for more complex analysis for larger cases, suggesting the use of blockchain access or commercial products like Chainalysis.

05:00

🔐 Seizing Cryptocurrency Wallets and Encryption

The second paragraph delves into the process of seizing cryptocurrency wallets by obtaining a wallet's seed value, master private key, or bitcoin address private key. It discusses the creation of new seeds and the use of custom words to enhance security against brute force attacks. The speaker explains how encrypted wallet files can complicate investigations, emphasizing the importance of finding passwords or backup seeds. The paragraph also covers how to access and interpret wallet files, including the significance of the master public and private keys, and the process of exporting private keys for seizure. It concludes with a brief mention of the challenges of large-scale investigations and the tools available for such purposes.

10:01

🕵️‍♂️ Analyzing Transactions and Investigative Techniques

The final paragraph discusses the investigative process of analyzing cryptocurrency transactions, starting with identifying and examining the transactions associated with a suspect's wallet addresses. It explains how to use a transaction ID to trace the flow of funds and determine the origin and destination of transactions. The speaker suggests using blockchain.com for basic transaction analysis but highlights the limitations when dealing with complex cases involving money laundering. The paragraph concludes with an invitation for viewers to practice seizing bitcoins from hidden wallet IDs and a teaser for future videos on more advanced blockchain analysis techniques.

Mindmap

Keywords

💡Custodial Wallet

A custodial wallet is a type of wallet service where the provider holds the user's cryptocurrency on their behalf. This is typically offered by exchanges such as Coinbase, where the user does not have direct control over the private keys. In the video, it's mentioned that exchanges use custodial wallets to reduce transaction fees on the blockchain by maintaining an internal ledger of users' holdings.

💡Exchange

An exchange in the context of cryptocurrency is a platform where users can trade various cryptocurrencies for other assets, including fiat currency. The video script discusses exchanges as websites that offer custodial wallets, allowing users to buy and sell cryptocurrencies without making transactions directly on the blockchain.

💡Ledger System

A ledger system in the video refers to the record-keeping mechanism used by exchanges to track the ownership and transactions of cryptocurrencies. It's an essential part of the custodial wallet model, where the exchange maintains the ledger instead of the users having to interact with the blockchain for each transaction.

💡Local Wallet

A local wallet is a type of cryptocurrency wallet that is stored on the user's own device, such as a computer or smartphone. The video script explains that serious cryptocurrency users often opt for local wallets for greater control and security over their assets, as opposed to custodial wallets provided by exchanges.

💡Node

In the context of blockchain technology, a node is any computer that is part of the blockchain network and participates in the validation of transactions. The script mentions joining a blockchain network as a node to analyze transactions, which is a way to interact directly with the blockchain and monitor its activity.

💡Blockchain Explorer

A blockchain explorer is a search engine that allows users to explore the blockchain for transactions, addresses, and other block-related data. The video script mentions using blockchain explorers like blockchain.com to analyze transactions and wallet addresses, providing a way to track and understand the movement of cryptocurrencies.

💡Transaction ID

A transaction ID, also known as a hash, is a unique identifier for each transaction on the blockchain. The script uses the transaction ID to demonstrate how to track and analyze specific transactions involving a particular wallet address.

💡Seed Value

The seed value, often a set of words or a phrase, is used to generate the private keys for a cryptocurrency wallet. The video script explains that knowing the seed value allows one to regenerate the private keys and potentially take control of the wallet, which is crucial for wallet seizure in forensic investigations.

💡Master Private Key

The master private key is the primary key in a cryptocurrency wallet that can be used to derive all other private keys. The script discusses the importance of the master private key in seizing a wallet, as it provides full control over the wallet's funds.

💡Wallet Encryption

Wallet encryption is the process of securing a cryptocurrency wallet with a password or other encryption methods to protect the private keys. The script mentions that most users encrypt their wallets to prevent unauthorized access, which adds a layer of complexity to the wallet seizure process.

💡Hardware Device

In the context of cryptocurrency wallets, a hardware device refers to a physical piece of hardware that securely stores the user's private keys separate from their computer. The script mentions using hardware devices as a way to enhance wallet security by storing the wallet off the user's computer.

Highlights

Introduction to two types of wallet systems: exchange wallets and local wallets.

Exchanges like Coinbase use custodial wallets, which reduce fees by not requiring transactions on the blockchain for every purchase.

Local wallets, such as Electrum, act as nodes in the network and allow users to make transactions directly on the blockchain.

Explanation of how exchanges create wallets for users automatically and record transactions within their system.

Different tools for analyzing various cryptocurrency ledger systems due to their unique network structures.

Demonstration of using blockchain explorer tools to analyze wallet addresses and transactions.

The importance of understanding different networks for effective cryptocurrency transaction analysis.

How serious cryptocurrency users tend to move to local wallets for more control and security.

Local wallets' ability to generate multiple addresses for enhanced privacy and security.

Process of creating a new wallet in Electrum, including options for security features like two-factor authentication and multi-signature wallets.

The significance of seed phrases in wallet security and the ability to regenerate private keys.

How to locate wallet files on a user's system and the information they contain, such as addresses and transaction history.

The risks of unencrypted wallet files and the importance of securing them with passwords.

Methods for seizing a wallet by obtaining the seed value, master private key, or bitcoin address private key.

How to export private keys from a wallet for forensic analysis and potential seizure of cryptocurrency.

Using transaction IDs to trace the flow of funds through blockchain explorers and identify relevant addresses.

The limitations of basic tools for large-scale investigations and the need for more advanced blockchain analysis software or services.

An invitation for viewers to practice seizing bitcoin by finding wallet IDs hidden in a challenge.

A preview of upcoming videos covering more complex technical analysis of blockchain systems.

Transcripts

play00:00

we're continuing on with cryptocurrency

play00:01

investigation and last time we talked

play00:02

about blockchain and i specifically said

play00:05

that wallets are a user interface to

play00:07

interact with the ledger system so today

play00:09

we're going to look at two different

play00:10

types of wallet systems and the first is

play00:12

an exchange which is usually a website

play00:15

here i'm looking at coinbase.com but

play00:16

there's lots of other types of exchanges

play00:18

as well you can see if i'm trading i

play00:20

have the option to buy for example

play00:22

bitcoin ethereum tether usd coin and a

play00:24

lot of other coins so exchanges tend to

play00:26

use what's called a custodial wallet

play00:28

where they actually have access to the

play00:29

wallet and whenever you buy something

play00:31

actually buy a share of whatever value

play00:33

they're holding what that lets them do

play00:34

is hold a large amount of money and then

play00:36

say that you own a piece of it and keep

play00:37

accounting that way that greatly reduces

play00:40

fees because you don't actually have to

play00:41

make transactions on the blockchain

play00:43

every time you're trying to buy a

play00:44

cryptocurrency you're just keeping it in

play00:46

their own ledger system which they don't

play00:48

charge you for or don't charge you as

play00:49

much for any cryptocurrency that's

play00:51

available they automatically create a

play00:52

wallet for you you can see that i bought

play00:54

bitcoin the amount that i bought and the

play00:56

price that it was and then i also sent

play00:59

bitcoin so you can see that there is

play01:01

transactions recorded in the exchange

play01:04

whenever you buy and you send or you

play01:06

sell whatever you're doing there if i

play01:07

look at the transactions i can see the

play01:08

date i can see bitcoin was sent and the

play01:11

address that bitcoin was sent to so i'm

play01:13

specifically looking at bitcoin here you

play01:15

saw that there were a lot of different

play01:16

coins each coin will have its own ledger

play01:19

system or might be writing on the back

play01:20

of another coins ledger system so the

play01:22

tools that you use to analyze each of

play01:24

the letter systems will be slightly

play01:26

different because they're different

play01:27

networks so if i want to analyze for

play01:29

example the bitcoin blockchain i need to

play01:31

join as a node on the bitcoin blockchain

play01:34

and then i can download all of those

play01:36

transactions and monitor them as they

play01:38

come in if i'm looking at something like

play01:39

ethereum it's a different network so i'm

play01:41

going to have to join as a node on that

play01:43

network and then process transactions

play01:45

from that network if we're just

play01:47

analyzing some simple transactions then

play01:49

i can use a couple different free tools

play01:51

online so for example blockchain

play01:53

explorer from blockchain.com that's an

play01:55

easy one to use you just put in the

play01:57

address you want to analyze here but the

play01:58

block stream explorer and the bitcoin

play02:00

explored the tool that they have you

play02:02

just put in either the hash or the

play02:04

wallet address that you want to analyze

play02:07

but i'll come back to these so we were

play02:08

talking about a custodial wallet which

play02:10

is usually at an exchange or a website

play02:13

that's holding your cryptocurrency for

play02:15

you but what most people who are really

play02:17

serious about cryptocurrency end up

play02:19

doing is getting a local wallet either a

play02:21

local wallet on their phone or on their

play02:23

on their computer so i'm going to be

play02:24

looking at the electrum bitcoin wallet

play02:26

today you can download this and install

play02:28

it on your local computer and then that

play02:30

wallet becomes a node in the network

play02:33

most likely a non-mining node it can see

play02:35

the transactions and it can also make

play02:37

new transactions on the blockchain and

play02:39

then this is what it looks like i have

play02:41

four different wallets open here each of

play02:44

those wallets has a bitcoin address that

play02:47

can send and receive funds in each

play02:50

wallet so for example we go to our first

play02:52

wallet you can see that i have two

play02:53

transactions already made here i have

play02:55

the option to send or i receive and then

play02:58

i can generate an address so for example

play03:00

if i click new address then i have a new

play03:03

bitcoin address where i can actually

play03:05

receive funds and now i can send that

play03:06

address to my colleague i can request

play03:08

them to send me bitcoin and then they

play03:10

can send the bitcoin directly to that

play03:11

address and it will end up in this

play03:13

individual wallet and not these other

play03:15

wallets so i can have multiple wallets

play03:17

on my system each of those wallets have

play03:19

different bitcoin addresses associated

play03:22

with them and that's really an important

play03:23

point i can generate as many bitcoin

play03:25

addresses as i want for each wallet so

play03:27

one wallet could have one address

play03:29

another wallet could have a hundred

play03:30

addresses and i can just keep generating

play03:32

these addresses as much as i want to

play03:34

make things a little bit more clear

play03:35

let's go ahead and create a new wallet

play03:37

so you can see the process so if i go to

play03:39

file if i go to new and restore then i

play03:42

can call the wallet new test wallet

play03:45

click next and then i have a couple

play03:46

different options either a standard

play03:48

wallet a wallet with two-factor

play03:50

authentication this uses a two-factor

play03:52

authentication service the wallet can be

play03:55

opened with two keys the key that we

play03:57

hold and then a key that the two-factor

play03:59

authentication service holds we

play04:01

authenticate with the two-factor

play04:02

authentication service and then they use

play04:04

their key to unlock our wallet we also

play04:06

have a multi-signature wallet and this

play04:08

lets multiple people unlock the wallet

play04:10

so for example though we have here four

play04:13

different keys that are available let's

play04:14

say four different people that are

play04:15

coming together and out of those four

play04:17

people two people need to agree to

play04:19

unlock the funds in that wallet and then

play04:22

we have import bitcoin address or

play04:24

private keys and this is interesting

play04:26

because if we import a bitcoin address

play04:28

we don't actually get access to make

play04:30

transactions under that bitcoin address

play04:33

we can just monitor it so it's kind of

play04:34

like read-only access to that address

play04:36

but if we import the private key now we

play04:38

have the ability to make transactions on

play04:41

the blockchain getting those private

play04:42

keys or getting a seed we'll see in a

play04:44

second is basically how you're going to

play04:46

seize wallets so we have a standard

play04:48

wallet click next and then i was talking

play04:51

about seeds so create new seed i already

play04:53

have a seed use a master key or use a

play04:55

hardware device a lot of people are

play04:56

using hardware devices and their their

play04:58

wallet is essentially stored off of

play05:00

their computer on that hardware device

play05:02

using a master key whenever you have a

play05:04

wallet you have a private and public

play05:06

master key if you input the public key

play05:08

here you'll get read-only access to all

play05:10

of the wallet if you import the private

play05:12

key you'll get right access to the

play05:14

ledger system so basically you'll get

play05:15

full control if you know the suspect

play05:17

seed value then that lets you regenerate

play05:19

the private keys and then you can also

play05:20

take over the wallet that way or you

play05:23

have a new seed so let's go ahead and

play05:24

click next and create a new seed the

play05:26

seed looks like several different words

play05:28

put together we also have options here

play05:30

that lets us extend this seed with

play05:32

custom words so these words are already

play05:34

known the library or the dictionary of

play05:36

words that are used are already known

play05:38

and then they just make them random but

play05:40

a lot of people also extend the seed

play05:42

with custom words and then you can put

play05:44

in any words you want so

play05:46

just brute forcing this becomes a little

play05:48

bit more difficult but a lot of people

play05:50

don't do custom seeds so maybe brute

play05:52

forcing is possible click next and then

play05:54

this asks for a password if i put a

play05:56

password in then i can encrypt the

play05:57

wallet file i won't encrypt the wallet

play05:59

file for now but we'll take a look at

play06:00

that in a second now i have my new

play06:02

wallet if i click information then we

play06:04

can see our master public key but they

play06:06

can't see my private key and that's the

play06:07

important part whenever we want to seize

play06:09

a wallet those are three things we

play06:10

really want to look for is the seed

play06:12

value the master private key or the

play06:14

bitcoin address private key if we get

play06:16

any of those three things that we can

play06:17

get access to make transactions using

play06:19

those keys so where can you find some of

play06:21

these things if you're looking at a

play06:22

suspect's computer and they already have

play06:23

a wallet installed you can go into where

play06:25

the wallets are held so for example i am

play06:27

in my user directory and then a hidden

play06:30

folder electrum and i do ls i'm on linux

play06:32

but it also works for windows the only

play06:34

thing really interesting in this

play06:36

electrum folder is for example this

play06:38

config file possibly recent servers and

play06:41

then also wallets so we have for example

play06:43

in the config information about wallets

play06:46

and their locations so that could be

play06:48

interesting the last wallet that was

play06:50

used information about all of the

play06:51

wallets in the system and their

play06:52

locations so let's go into wallets and

play06:55

then you can see that i have my four

play06:57

wallets that were displayed and then i

play06:59

also have our new test wallet so let's

play07:01

go ahead and look at the investigation

play07:03

test zero one so if i do cat

play07:06

investigation test zero one and then i'm

play07:08

going to pipe that into more first we

play07:10

have the address history and this is

play07:12

basically different addresses that are

play07:14

inside that wallet transactions or other

play07:16

information that's taken place invoices

play07:18

here we have transactions and we also

play07:20

have the local message this message

play07:21

isn't on the blockchain that's just

play07:23

locally held address that we've sent

play07:25

some some balance to and then i believe

play07:28

this is the balance next we have the key

play07:29

store which has information about our

play07:31

different hashes the seed for this

play07:33

individual wallet you can see that it's

play07:34

in plain text here we have the private

play07:36

master key here we have the public

play07:38

master key if we're able to get this

play07:39

wallet file in plain text then we're

play07:41

able to see the seed we're able to see

play07:43

the master private key we can take over

play07:46

this wallet and then potentially seize

play07:47

all of the cryptocurrency that's

play07:49

available there then we also have our

play07:50

payment requests and this is basically

play07:52

just our

play07:53

transactions that have gone through that

play07:55

was our investigation test01 but most

play07:57

people are going to set a password and

play07:59

use encryption so whenever you do

play08:01

encrypt your wallets what it looks like

play08:03

is cat investigation 2 encrypted so we

play08:05

get something that looks like this this

play08:07

is just encrypted text so most of the

play08:09

time these days you're going to come

play08:10

across an encrypted wallet because

play08:12

keeping it in plain text is just too

play08:14

dangerous just expect that the wallet

play08:16

will be encrypted there's a couple

play08:17

different ways to go about the

play08:19

encryption we already have access to the

play08:20

suspect system look for passwords look

play08:22

for a password manager around the

play08:24

suspect's device look for anything that

play08:26

might look like a seed value people will

play08:28

definitely want to back up that seed

play08:30

value in case they're losing everything

play08:32

if we're lucky the wallet will be

play08:33

unencrypted and then we can just see the

play08:35

seed value we can see the private key

play08:37

and then we can just seize the entire

play08:40

value of whatever's in that wallet if

play08:42

the wallet is already open i can go to

play08:43

for example wallet private keys and then

play08:45

export private keys it will show me the

play08:48

bitcoin address plus the private key

play08:49

associated with those wallets then i can

play08:51

just click export and then it will

play08:53

export it as a csv file i want to try to

play08:55

get that as quickly as possible because

play08:57

those private keys will let me seize

play08:58

that bitcoin address so i have my

play09:00

wallet that i want to investigate but we

play09:02

kind of know how the wallets work and

play09:04

how you would seize wallets let's go

play09:05

ahead and look at the transactions so i

play09:08

have a transaction coming in and i have

play09:09

this transaction id right so i'm going

play09:12

to go ahead and copy that transaction id

play09:14

i can see all the bitcoin addresses that

play09:15

bitcoin was sent to including the

play09:17

address that we're currently

play09:18

investigating i can take this

play09:20

transaction id go to the block stream

play09:22

explorer and then just type in the

play09:24

transaction id so i can use transaction

play09:27

id i can use the hash i can use the

play09:29

bitcoin address so i have the bitcoin

play09:31

address that the money was sent from and

play09:33

then i have all of the addresses that it

play09:34

was sent to so on the left hand side is

play09:37

where it's coming from on the right hand

play09:38

side are all of the addresses that it's

play09:39

sent to so if we go all the way to the

play09:40

bottom number 63 is actually the address

play09:43

that we're interested in is everything

play09:44

else related to this address no so we

play09:47

sent the money for example from coinbase

play09:49

it will take all of the transactions

play09:51

that were requested on coinbase from all

play09:53

of the different users at that time it

play09:55

will group them together and then send

play09:57

them all as one transaction on the

play09:59

blockchain all of these other addresses

play10:01

are probably unrelated to us we're not

play10:03

interested in them if we go up and we

play10:04

see where the money was sent from this

play10:06

is the address that it was sent from and

play10:08

we have our

play10:09

our address that we're looking at number

play10:11

63 here if we click on it we can see

play10:12

that there are two transactions this is

play10:14

where we received the money that was

play10:16

from coinbase so that's our coinbase

play10:17

address sent to four different bitcoin

play10:20

addresses each of these wallets if i

play10:22

click on one of the wallets then i only

play10:23

have one transaction coming in but from

play10:25

this wallet we can see where the money

play10:27

came from coinbase we can see where the

play10:29

money went four other bitcoin addresses

play10:32

that could be in either four wallets or

play10:34

one wallet or two wallets or three

play10:36

wallets we don't know what does that

play10:37

actually look like whenever i'm looking

play10:39

at the wallets the wallet with the

play10:41

transactions so the first transaction

play10:43

coming in and this is the money coming

play10:45

in from coinbase and then we have the

play10:46

wallets transactions going out we have

play10:49

the four bitcoin addresses that it went

play10:50

out to i can see for example that we

play10:52

have one transaction to each of these

play10:54

addresses so from a forensics

play10:56

perspective the first thing you do is

play10:58

find out what addresses are actually

play10:59

associated with that suspect find all

play11:01

the transactions with those addresses

play11:03

and then take those transactions and

play11:05

then use that in your interrogation to

play11:07

find out who it's associated with if

play11:09

you're doing big cases of money

play11:10

laundering just using something like

play11:12

blockchain.com is not going to be

play11:13

powerful enough he saw that we only had

play11:15

three or four transactions and it

play11:16

already started to get a little bit

play11:18

complicated and confusing because

play11:19

there's so much information instead you

play11:22

can either get access to the blockchain

play11:24

yourself and then write statistics

play11:25

software that will analyze whatever it

play11:28

is you're trying to analyze or you can

play11:29

use commercial products like chainalysis

play11:32

to do these bigger investigations so in

play11:33

later videos we will talk about more

play11:35

complicated technical analysis of a

play11:36

blockchain but from this video you

play11:38

should at least have a basic

play11:39

understanding of how to seize a wallet

play11:43

using the seed a master private key or a

play11:46

bitcoin address private key you should

play11:47

also have an idea of how to get at least

play11:49

basic transaction information if not

play11:51

from the wallet directly from a website

play11:53

like blockchain.com so as a practice i'm

play11:55

going to hide some wallet ids around and

play11:57

i want you to try to seize the bitcoin

play11:59

inside those wallets so that should get

play12:00

you started next week we'll talk about

play12:01

more technical analysis of ledger

play12:03

systems thank you very much

play12:14

you

Rate This

5.0 / 5 (0 votes)

Related Tags
CryptocurrencyBlockchainWallet SystemsDigital ForensicsExchange PlatformsCustodial WalletsLocal WalletsTransaction AnalysisBitcoin AddressesSecurity Practices