How can you mitigate a 5$ wrench attack ? (Select all that apply)
How can you deny the "hacker" attack factor ?
Who should use a multi-sig wallet ? (Select all that apply)
Your friend Amaro is setting up a multi-sig wallet using his only 3 trezor hardware wallets, he stored 1 wallet in his basement, 1 in his room and 1 at his girlfriend’s house. As a security expert, what could you advice Amaroto to do ?
An inheritance plan is useful in which of the following scenario ? (Select all that apply)
Why is security a moving target in Bitcoin ?
How many wallets can 1 hardware device create ?
When picking which wallet to use, what are the 3 rules that should never be broken ? (Open question)
Is it possible to create a 45/76 multi-sig wallet ?