Wealth Security Protocol
Go to Casa Home
  • 🗺️Overview
  • 💜Casa vs. Alternatives
    • Introduction
    • Option #1: Do-it-yourself
    • Option #2: Custodial Storage
    • Option #3: Commercial Systems
  • 🔑System Design Principles
    • Introduction
    • Minimal Knowledge
    • High Security
    • Usability is Security
    • Expert Support
    • Redundancy
    • Sovereignty
    • Incentive Alignment
  • 🚨Threat Overview
    • Introduction
    • Data and Credential Loss
    • Phishing
    • SIM Hijacking
    • Network Attacks
    • Malware
    • Supply Chain Attack
    • Physical Coercion
    • Child/Pet Attack
    • Internal Service Provider Attack
    • Platform / Hosting Provider Attack
    • Code Dependency Attack
    • Official Seizure
    • Inheritance Failure
  • 🔐Chosen Features
    • Introduction
    • Hardware Wallet Signing
    • Multi-signature
    • Multi-location
    • Heterogeneous Hardware and Software
    • Seedless Hardware Wallets
    • Emergency Recovery Key
    • PIN or Biometrics for Mobile Key only
    • PIN for every device
    • Sovereign Recovery Instructions
    • Emergency Lockdown Button
    • Health Check
    • Identity Verification for Account Recovery
    • Inheritance
  • ✅Chosen Key Schemes
    • 5-Key Vault
    • 3-Key Vault
    • Pay Wallet
  • ❌Rejected Key Schemes
    • Shamir's Secret Sharing
    • 2-of-2
    • 1-of-2
  • ❌Rejected Features
    • Biometrics General Usage
    • Brain Wallet -- Memory Based Solutions
  • 🔧Remaining Attack Vectors
    • Address Spoofing
    • Malicious Insider Key Theft
    • Extreme disaster scenarios
    • Extortion
  • 👨‍🚀Future Improvements
    • Taproot/MAST
    • Schnorr Signatures
Powered by GitBook
On this page

Was this helpful?

  1. 🔧Remaining Attack Vectors

Extortion

PreviousExtreme disaster scenariosNextTaproot/MAST

Last updated 1 year ago

Was this helpful?

The possibility of a loved one being kidnapped and held for ransom is not directly protected against by our systems. However, this isn’t a unique danger to users of cryptocurrency. Anyone who is known to be wealthy is subject to the same risk. We attempt to mitigate this risk on our end by collecting as little user data as possible and allowing users to be pseudonymous. We expect that most wealthy individuals in the world will own crypto assets within 5-10 years time, so keeping your ownership secret may not even be an option if your general wealth is commonly known in your social circle or city. Any clients with significant wealth should consider hiring physical security to protect themselves and their loved ones.

Mitigation:

  • Keep your crypto wealth secret for as long as possible.

  • Read our .

  • Hire a security consultant to help you improve your home and travel security, and to educate your family about kidnapping risk and mitigation strategies.

  • Hire physical security to directly protect you.

home defense primer