Anyone holding a non-trivial quantity of bitcoin ought to take into account multisignature safety, together with the best way to mitigate potential assaults.
This is an opinion editorial by Anant Tapadia, a pc engineer and contributor to Bitcoin self-custody initiatives Bitcoin Keeper and Hexa Wallet.
Multisignature safety, or “multisig,” gives a special set of safety ensures than single-signature (singlesig) options can not. While I imagine that singlesig is a superb type of custody when one is simply getting began with bitcoin or managing small quantities, for my part, anybody holding a non-trivial quantity of bitcoin for the long run ought to consider a multisig possibility.
Defining Multisig

It is crucial to know what we imply by “wallet” earlier than I lay my case for one sort versus one other. A multisig pockets is known as a “vault” in apps like Bitcoin Keeper and Blue Wallet, whereas some additionally check with it because the “coordinator” or “coordinating software.” It is principally a pockets that may speak to a number of signing gadgets and coordinate between them for signing transactions (typically utilizing the PSBT format). In comparability, a singlesig pockets talks to at least one signer solely. The singlesig pockets can be usually the signer, which means the keys are sizzling.
So, the assault floor uncovered resulting from a singlesig pockets and vault is comparable as they each have related roles. Having a signing gadget in each instances provides to the safety and introduces new assault surfaces.
A multisig is sometimes called an “m-of-n,” the place you want “m keys out of n” to signal a transaction. An output descriptor or bitcoin safe multisig setup (BSMS) is a format that’s used to outline the configuration of a multisig. This can be utilized to recreate your setup on different coordinators or to register the multisig with the signing gadgets.
Considerations For Bitcoin Custody

Minimizing Trust
The apparent benefits of getting a number of signers are to cut back single factors of failure and enhance redundancy in your setup. With the assistance of the widespread examples of assaults on multisig included under, I’ll clarify why these assaults are relevant, even with singlesig custody. However, with multisig, you possibly can decrease belief in anyone entity as a number of entities are concerned.
Operational Effort
Setting up and utilizing multisig may be operationally extra time consuming and embrace extra pitfalls if not finished appropriately. Therefore, I like to recommend that customers solely take into account multisig for long-term HODLing, the place common transactions aren’t anticipated.
Setup Costs
A sturdy, multi-vendor multisig (reminiscent of one with three-of-five custody) may be achieved for wherever between $250 to $600. So, when you’ve got round 0.5 BTC (about $11,000 on the time of scripting this piece), spending lower than 10% on securing it’s not a foul thought, as a result of this bitcoin’s worth can respect in a short time.
The prices of signing gadgets are additionally lowering, e.g., Tapsigner from Coinkite. Plus, utilizing non-hardware-based gentle keys provides you zero-cost choices, however it’s not advisable that these are used for a couple of key in a multisig setup.
Mitigating Common Attacks
I’ll now have a look at some assaults that may occur if a custody key coordinator tries to behave maliciously. Then, I’ll clarify how that is no totally different from the threats in a singlesig setup and what multisig wallets can do to mitigate these dangers. The final accountability inevitably lies with the person to make sure that they take the correct steps, as steered under.
The Wrong Receive Address
The most direct assault I’ll define is one the place the person tries to obtain funds, and the coordinator app reveals an attacker’s tackle as an alternative. In such situations, the software program may nonetheless present that the funds had been obtained the place the person meant. This assault is theoretically attainable with any singlesig pockets as a result of the person is counting on the pockets to generate an tackle for them. There is not any solution to manually derive addresses out of your 12- or 24-word restoration phrase.

In the case of a multisig pockets, this may be mitigated by checking the tackle on the signing gadgets the place the multisig has been registered. You may additionally use one other coordinating software program, import the identical configuration and examine the tackle that method.
Send-To Address Replacement
Like within the earlier assault state of affairs, a multisig coordinator can change the tackle you are attempting to ship funds to whereas setting up the PSBT. The scenario can be no totally different within the case of a daily singlesig pockets.

To mitigate this threat, the person is all the time suggested to examine for the tackle on the signing gadgets. Since the signing gadgets signal the transaction containing the recipient’s tackle (in PSBT format), it is going to present the tackle it’s signing. Unless there may be some collusion between the coordinator app and the signing gadgets, this is a wonderful solution to decrease belief in any one in all them.
Changing The Change Address
A less-obvious assault is one the place a coordinator app replaces the change tackle in your transaction. This signifies that the change from the transaction will go to an attacker’s tackle. Unlike the send-to tackle, the person could not examine for the change tackle when sending funds, making this assault much less apparent. Again, there isn’t a distinction relating to a singlesig answer.

This is the place selecting a fully-verifying signing gadget is essential. Most signing gadgets supporting the usual won’t signal a transaction if they can not establish the change addresses.
Altering The Registration
As the coordinator additionally coordinates the registration step, a special multisig could also be registered such that the attacker controls “n” or extra keys. In this case, the signing gadget will be unable to establish the obtain tackle or change the tackle appropriately. The person will see the identical (the attacker’s) obtain tackle on the signing gadget as nicely, and the change tackle can be handed as appropriate by the signing gadget because it has no method of confirming if the opposite cosigners had been altered or not.

It is subsequently advisable that there are “n” registered gadgets in your setup. Moreover, you verify the setup particulars on all such gadgets throughout registration. Another solution to confirm correct registration is to arrange the identical multisig on different coordinator software program and examine if it reveals the precise particulars.
So, you might have a multisig with one register vault signing gadget and two blind signers. Repeat the identical course of with one other coordinator. Now, examine for the configuration on each the coordinators and the multisig-registering signing gadget. You can add extra coordinators to the combo to rule out collusion.
Ransom Attack
This sort of assault is much like the above one, however the attacker controls fewer than “n” keys, so it can not management the funds. But in a scenario the place you lose a number of the keys, the attacker can maintain you for ransom, as now you shouldn’t have the minimal quorum wanted. This assault can be carried out by key insertion, the place further cosigners are added to the setup. This has the identical impact as changing a number of the cosigners.

Again, checking the cosigner particulars on a number of registration-needing coordinators will cut back the probabilities of these assaults.
Utilizing Multisig Custody For Your Bitcoin
To repeat: Having a minimal quorum of multisig-registered signing gadgets and checking transaction particulars (when it’s important to make them) could be an excellent rule of thumb when utilizing multisig.
When checking for addresses or vault setup particulars, don’t simply examine the start and finish of the string, because the attacker could have a similar-looking string.
Checking if the custody app is open supply and reviewing its code (for those who can) can be a good suggestion for some. Support of widespread requirements like BSMS and PSBT ensures that the multisig setup or transaction may be ported to different apps for verification.
I additionally imagine one can by no means go unsuitable with testing the setup. Once you will have your multisig prepared, duplicate the setup on extra coordinators. Receive a small quantity on one app and ship part of it from one other. Check that the balances are appropriately mirrored throughout all of the coordinators after every step.

References and additional studying:
- “10x Security Bitcoin Guide”
- “How Nearly All Personal Hardware Wallet Multisig Setups Are Insecure”
This is a visitor publish by Anant Tapadia. Opinions expressed are solely their very own and don’t essentially replicate these of BTC Inc or Bitcoin Magazine.