How to acquire BTC
One simple way to acquire Bitcoin is to open a public account, connect it with your bank account and move some money. However, public exchanged that hold your Bitcoin seem to be risky. Setting up a peer node is still the recommended way to get into Bitcoin trading.
The downside of setting up a public node is it uses electricity and internet bandwidth. For a small investment it might not be worth it, unless you are always running your computer and have unlimited bandwith.
Summary
- Get yourself a sofware wallet. That will give you the bitcoin address that you need to acquire BTC.
- Move to a cold storage wallet for safe keeping.
- Purchase a hardware wallet when you holdings get large. (Ledger nano $200)
Online purchase - non custodial account
non custodial Offers transfer from bank using etransfer no fee for loading - though there is hidden fee on purchase price no fee for moving to storage fees seem to be around payment - does offer lightening network
what about KYC?
OTC purchases
Bitcoin units can be purchased from other people or companies by means of a bilateral transaction. These purchases are called over-the-counter (OTC) transactions and can be settled in a face-to-face meeting or via any type of communication channel. Naturally, the appropriate precautionary measures have to be taken in both cases.
It is crucial that you:
. check the current exchange rate. Moreover, insist that the transaction
. includes an acceptable transaction fee and
. wait for at least one confirmation to reduce the risk of a double spend.
. For larger amounts, it is advisable to wait for several confirmations. Three to six confirmations are generally considered sufficient to ensure that the transaction is irreversible. This takes on average between thirty and sixty minutes. For small amounts, one confirmation is perfectly fine.
For purchases that do not involve a face-to-face meeting, it is strongly recommended to use a trusted platform. A trusted platform offers a reputation system and fulfills a fiduciary role.
Face-to-face meetings can be arranged for cash payments, or transactions can be carried out using wire transfers. In the case of a wire transfer, one should take account of the fact that some commercial banks will block payments with a reference mentioning “Bitcoin” or “crypto” for no apparent reason. This problem is so deep-rooted that some banks even refuse to offer accounts to officially regulated Bitcoin companies.
Normally, you will be able to purchase smaller amounts of Bitcoin units without proving your identity. However, for larger amounts, the seller is obliged to satisfy the so-called know-your-customer (KYC) regulation, which requires, among other things, that the customer must be identified.
Caution: Never Purchase a Private Key
Never purchase a private key from another person. The person may have copies of this key and would therefore be in the position to control the associated Bitcoin units. A legitimate OTC purchase must therefore always be carried out using a Bitcoin blockchain transaction that credits the Bitcoin units to one of your Bitcoin addresses.
To ensure that you have exclusive control over the corresponding private key, you must personally generate the key/address pair. Private keys that are communicated or transferred to you via other people are unsafe.
If a person wishes to offer you help when installing a wallet or your client, you must prevent this person from seeing your key or your mnemonic seed. The disclosure of this information can lead to the total loss of your Bitcoin units.
Centralized Exchange Platforms
The most common way to obtain Bitcoin units is to buy them at one of the many centralized Bitcoin exchanges. A user can simply open an account and then transfer fiat currency to it. The account holder can then use these funds to buy Bitcoin units or one of the many other cryptoassets. The pricing on large exchanges is competitive with relatively small bid-ask spreads. Most exchanges provide cryptocurrency order books and relatively sophisticated financial tools that make the trading process transparent.
However, it is still recommended to compare the various fee structures and to do your research on the business practices and reputation of a particular exchange. In particular, when selecting a centralized exchange, one should also consider the trading volumes, the offered services, and security.
Most importantly, users of centralized exchanges must be aware that they do not control the private keys to their assets. This can lead to substantial security issues. It is therefore recommended that the user transfers his cryptoassets as quickly as possible to one of the addresses for which he is in exclusive possession of the private key.
Some centralized exchanges have a registration process that is fully compliant and comparable to the KYC requirements for opening an account with commercial banks. These requirements include domicile and passport checks as well as the respective anti-money laundering rules. A few cryptocurrency exchanges implement none of these requirements and operate in a legal vacuum. We strongly recommend not to use exchanges that are both centralized and nonregulated.
Before you can trade, you must deposit either cryptoassets or government-issued fiat currency to the exchange. For a Bitcoin transaction, the exchange provides you with a Bitcoin address. Currencies can generally be transferred to the exchange’s bank account and normally will be credited within a few days.
A faster alternative is to use a credit card payment. Since credit card payments can be reversed, centralized exchanges who offer credit card payments face a high level of risk. Consequently, only exchanges that verify their customers’ identities offer this option. Moreover, a surcharge is imposed to cover the credit card fees and chargeback risk.
https://www.savvynewcanadians.com/coinsmart-referral-code/
Bitcoin ATM
Bitcoin ATMs are appearing to be similar to standard banking ATMs. With regard to the spectrum of functions that they provide, however, these machines have little in common with traditional cash dispensers. They allow users to buy Bitcoin units in exchange for fiat currency – and some models function as two-way currency converters.
The counterparty is normally the ATM’s operating company. In order to buy Bitcoin units, the customer feeds the desired banknote into the Bitcoin ATM. The Bitcoin units are then credited to a Bitcoin address that the customer has previously generated. To execute the Bitcoin payment, the customer must present a QR code containing the beneficiary Bitcoin address in front of the machine’s integrated camera. Fees are typically 10% which is pretty high.
Some machines generate new addresses and issue a paper receipt on which the public address and the corresponding private key are printed. This method again poses the threat that the private key might remain in the machine’s memory and thus can be copied by the provider or a malicious third party.
What is a Crypto Wallet?
Cryptocurrency wallets store users’ public and private keys while providing an easy-to-use interface to manage crypto balances. They also support cryptocurrency transfers through the blockchain. Some wallets even allow users to perform certain actions with their crypto assets such as buying and selling or interacting with decentralised applications (dapps).
It is important to remember that cryptocurrency transactions do not represent a ‘sending’ of crypto tokens from your mobile phone to someone else’s mobile phone. When you are sending tokens, you are actually using your private key to sign the transaction and broadcast it to the blockchain network. The network will then include your transaction to reflect the updated balance in your address and the recipient’s address.
So, the term ‘wallet’ is actually somewhat of a misnomer as crypto wallets don’t really store cryptocurrency in the same way physical wallets hold cash. Instead, they read the public ledger to show you the balances in your addresses and also hold the private keys that enable you to make transactions.
Your cryptocurrency is only as safe as the method you use to store it. While you can technically store crypto directly on the exchange, it is not advisable to do so unless in small amounts or if you plan to trade them frequently.
For larger amounts, it’s recommended that you withdraw (perform a transfer to another address that you also hold) the majority to a crypto wallet, whether that be a hot wallet or a cold one. This way, you retain ownership of your private keys and have full power and control over your own finances.
Bitcoin Storage
As we shall see below, private keys can be stored in many ways. Irrespective of the method of safekeeping, there are two important principles to follow. First, private keys must be stored in such a way that they will not get lost. The loss of a private key means the irrecoverable loss of the associated Bitcoin units. Second, no other person should ever be given access to your private key because, if a person has possession of a private key, he or she also gains unrestricted control over the assets on the corresponding address.
All storage options have specific advantages and disadvantages. In particular, there is an unavoidable trade-off between convenience and security. Wallets of the category hot storage are directly linked to the internet and have the capacity to initiate transactions. Wallets of the category cold storage consist of wallets that do not have a network connection.
Selecting a Private Key
If you wish to store your Bitcoin units independently, you will need at least one Bitcoin address and the corresponding private key. A basic functionality of practically all software wallets is the generation of new addresses. The wallet generates the private key in the background and, in most cases, displays a mnemonic seed that you can use to restore your Bitcoin units. This convenient way of generating a key is adequate for most applications.
As an alternative, there are websites that can be used to generate private keys. Extreme caution is required when using such services. Websites that have fraudulent motives will generate a private key and keep a copy of it to access your funds later on. It is important that you only use websites whose codebase is disclosed so that you can ensure they use a cryptographically secure random number generator. Further, the process employed for selecting the private key must only be performed on your personal computer. Ideally, you should download the whole website and open it on a computer that has no internet connection. In this way, you will prevent any third party from accessing your data.
Hot Storage
When private keys are stored on devices that are directly or indirectly connected to the internet, the term hot storage is used. This type of storage offers convenience of access, but wallets of this kind are more vulnerable to attacks than the cold storage alternatives, which will be dealt with in section.
Software Wallets
Software wallets are usually very user-friendly and, when connected to the internet, can be used not only for storage purposes but also to transfer Bitcoin units. We distinguish between desktop wallets for computers and mobile wallets for mobile devices such as smart phones or tablets.
Owing to the network connection, software wallets are vulnerable to a variety of attacks. Most smartphones and tablets isolate individual apps and thereby provide better protection against malware. In contrast, desktop computers are vulnerable in this respect because applications are usually deeply anchored within the system and interact with each other without any significant restrictions; as well, there are substantial differences between the various operating systems.
It is always advisable to encrypt the private keys in the software wallet. Almost all popular software wallets offer this option. However, even encryption only provides partial protection. If a computer has been infected with a key logger—that is, a program that reads and registers all keystrokes—the wallet’s encryption will be ineffective.
In addition, there is a considerable risk of losing the private keys. This might occur, for example, as a result of hard drive failure. Backups of the key (mnemonic phrase) can partially counteract this problem, but they should never be stored in digital form.
Software wallets are generally unsuitable for the long-term storage of larger Bitcoin holdings. They should be used instead as a kind of everyday wallet to access smaller Bitcoin holdings quickly and conveniently. A software wallet can be operated either as a full node client, as a simplified payment verification (SPV) client, or on the basis of a centralized subnetwork.
Full nodes are able to autonomously validate transactions but require a continuous internet connection. In addition, it initially takes a few days on average for the complete blockchain to be downloaded and processed. SPV clients and centralized subnetworks have substantially shorter loading times and fewer system requirements but have to rely on third-party information to validate transactions. For many applications, SPV clients are sufficient. Wallets based in centralized subnetworks should be used with caution. Many standard software wallets leave their users in full control of their private keys. This is a welcome development, but it also means that you alone, without exception, are responsible for backups and the safekeeping of your Bitcoin units. An alternative approach consists in splitting the control so that outbound transactions have to be signed by both the user and the wallet operator’s centralized service. These services are usually based on multisig, where the second signature is triggered by the two-factor authentication (2FA) of the user. Normally, systems of this kind provide an alternative method which would allow you to continue using your assets if the service provider were to disappear.
Storage on Centralized Exchanges
Bitcoin units can be stored on centralized exchanges. This is usually very convenient. Nevertheless, we must strongly urge you not to use this type of service for storing your Bitcoin units. The major problem with centralized exchanges is the fact that the user is not in possession of the private keys and therefore has no control over his or her Bitcoin units. If the centralized exchange is unable to or does not wish to sign a transaction, the user cannot regain control over his or her funds. Further, centralized exchanges present a lucrative target for hacker attacks.
Cold Storage
Cold storage wallets consist of wallets that do not have a network connection. The storage of your private keys in strict isolation from the internet prevents hacker attacks and is the best option for long-term safekeeping. The objective of cold storage is to ensure the safety of your Bitcoin units. This comes at the cost of convenience. To initiate a transaction, either a pre-signed transaction or the private keys need to be imported into a hot storage wallet. In the following, we will discuss the main cold storage solutions, such as hardware wallets, paper wallets, and brain wallets.
Hardware Wallet
Hardware wallets are devices that are exclusively intended for storing private keys. For simple hardware wallets without additional functionalities, a secure digital (SD) card, an external hard drive, or a USB stick is sufficient. Private keys can be stored on these media and kept somewhere away from the computer. If you want to store your Bitcoin units in this way for a longer period, it is worthwhile finding out how long the respective medium’s expected life-span is. It is, in any case, advisable to keep copies on another medium.
So-called offline wallets are computers without internet access, which are set up exclusively as a software wallet. The great advantage of these offline wallets, compared with simple storage media, is that you can independently generate new private keys and addresses. In addition, transactions can be generated and signed offline. The signed transaction then only has to be exported to an online wallet to be propagated. The signed transaction contains no information that would allow inferences to be drawn about the private key. It corresponds exactly to the transaction message that will be propagated in the network anyway.
When Bitcoin became more popular, specialized hardware wallets emerged. These devices combine high security standards with simple and convenient handling. The devices can be connected to a computer to trigger the transactions. They only allow the exchange of transaction data but ensure that private keys always remain in the secure module of the hardware wallet.
When you buy such a device, it is crucial to ensure that you order it directly from the manufacturer or from a trusted retailer and that you receive it in its original packaging— sealed, that is. If you buy a used hardware wallet, it is advisable to reset the device prior to first use and to reinstall the official firmware from the manufacturer’s website.
Paper Wallet
Paper wallets are paper-based notes that contain private keys. Alternatively, paper notes can also contain the mnemonic seed that can be used to derive several private keys. Paper wallets offer such advantages that they are easy to store and are the most economical cold storage option.
The notes can be either written by hand or printed. In both cases, it is advisable to write the private key several times on the same paper so that, in the case of partial damage, the complete key can still be restored. Often, the corresponding QR codes are also printed in addition to the private key.
Storing private keys in a physical form protects them from hacker attacks. At the same time, you carry the responsibility for ensuring that no one can view your private keys. If a third party managed to gain access to your paper wallet, this person would obtain control over all your assets. In particular, it is advisable to print only encrypted private keys and store the password in another location. In addition, you should ensure that your paper wallet does not get lost or destroyed. Elemental forces such as fire or water could destroy your note and cause you to lose all your Bitcoin units.
Protecting Private Keys from Loss
Time and again, warnings appear in the press about hacker attacks and Bitcoin thieves. However, most users who lose their Bitcoin units do so through the loss of the private key. One possible way to solve this problem would be, for example, to generate several copies of the private key. The same private key could then be kept in several places. But as the number of copies increase, so do the number of potential attack vectors; this creates a certain trade-off between availability and security against third-party access.
A sophisticated approach for creating availability without compromising security is to split the key. For example, consider a setting where two out of three paper wallets are required to access the assets. If one note is lost, the assets could still be restored without a problem by using the other two notes. At the same time, if a third party has gained physical access to one of the three paper wallets, the attacker will still not be able to gain control over the assets.
Key systems of this kind can be structured by using multisig or a procedure called Shamir’s Secret Sharing. The difference between these two procedures is only technical.
With multisig, several keys exist, a subset of which are necessary to satisfy the unlocking condition. In contrast, Shamir’s Secret Sharing uses traditional Bitcoin addresses with a single private key but splits this private key into several fragments. Here again, at least two fragments are necessary to derive the private key.
Brain Wallet
Private keys do not need to be written down anywhere. It may be sufficient to memorize the private key to ensure that you will remember it in the future. This type of safekeeping is called a brain wallet—a wallet that exists in your memory.
Only a few people will have the capacity to remember a 256-digit binary number. A much more practical procedure is to choose any combination of words and use a hash function (for example, SHA256) to generate a private key. This deterministic procedure is replicable, so you only have to remember the original combination of words. It is crucial that the sentence or the combination of words is produced randomly. Sentences from publicly accessible media, such as books, films, or songs, are a bad choice and will very likely lead to the loss of the Bitcoin units. Alternatively, you can also memorize the mnemonic seed to derive your key.
A further aspect that should be considered in connection with brain wallets is estate planning. If you want your Bitcoin units to pass to someone else in the event of your death, you should plan accordingly. Obviously, the use of brain wallets is highly problematic in this case.
Paying with Bitcoin Units
Technically, it is easy to pay with Bitcoin. However, because the number of shops that accept Bitcoin units is still limited, you have to do some research and adapt your shopping to the limited options available. There are curated lists that record the available points of acceptance.
While real-world locations are limited, you can easily find a large variety of online shops that accept Bitcoin for many goods and services. An interesting starting point is OpenBazaar, a decentralized e-commerce platform that uses Bitcoin units as its main currency.
The precise sequence of the payment process depends on the type of wallet that has been installed. The general process is always the same.
After you have selected your goods and/or services, inform the retailer that you wish to start the payment process
(1). The retailer then gives you a request for payment (2). This contains a Bitcoin address and a description or invoice number as well as the amount that you owe in Bitcoin units. The bill can be sent to your wallet either via Bluetooth, near-field communication (NFC), or a similar technology, or it can be alternatively displayed in the form of a QR code for scanning. In any case, your wallet will show the information on-screen and ask you for your confirmation (3). When you authorize the payment (4), a transaction message is generated, signed, and broadcasted to the Bitcoin network (5). As soon as the retailer receives the transaction message, he will send you an acknowledgement of your payment (6). The time that it takes until you receive the final confirmation (7). will depend on the network connection and on the retailer’s specific acceptance criteria and the transaction fee. Usually, a confirmation takes between three seconds and one hour.
As a client, you do not have to do anything other than scan a QR code and confirm the payment request. All the other processes are performed automatically. The technical details from the previous sections are essential for understanding specific features of the Bitcoin system, but an end user does not need to know these details.
Acceptance of Bitcoin Payments
Accepting Bitcoin payments gives retailers numerous advantages. First, the transaction fees are low in comparison with credit card payments—especially when using second layer solutions like the Lightning Network. Second, customers cannot reverse their payments once they have received the goods or services. Third, acceptance of Bitcoin payments provides an opportunity to attract a new segment of customers.
There are various methods for accepting Bitcoin payments, and these can be split roughly into two categories: acceptance via a self-managed system or via the intermediation of a payment service provider.
Self-Managed Systems
In analogy to cash, Bitcoin units can be accepted without the need for an intermediary. You can simply generate a Bitcoin address and forward it with a request for payment to your customer.
Simple requests for payment are valid as soon as they contain (at the very least) the Bitcoin address. The payment request is usually formatted as follows: bitcoin:<Bitcoin_Adresse>?. Many wallets also recognize QR codes without the Bitcoin prefix.
The standardization according to proposal BIP0021 offers the possibility to specify further parameters such as the payment amount, the retailer’s name, or the payment purpose description. The encoding is done using predefined meta-tags where the Bitcoin address is followed by a “?”, and further parameters are separated from each other using “&”.
The following example of a payment request references the Bitcoin address that was generated on the basis of the private key. The invoiced amount was set at 0.0005 Bitcoin units. In addition, the transaction message contains the owner information “Book” and the payment purpose description “Test payment.”
bitcoin:1E8jc2eRXmjF2FKebTZwAsxwaRWeDvEwDj?amount=0.0005&label=Book %20Address&message=Test%20Payment
The information can also be presented as a QR code so that the customer only has to scan the code.
Try to scan this code using your wallet, and you will see how simple it is to pay with Bitcoin units.
If you wish to implement the payment request yourself, you should follow BIP0071 or BIP0072.
Payment requests are usually straightforward to manage, and there are no additional fees. This method is particularly attractive for smaller companies. However, further business requirements, such as accounting, online shop implementations, or point-of-sale systems, can make independent management considerably more complex. In addition, it is advisable to thoroughly evaluate the security risks. You should, for example, wait for at least one confirmation (on average, ten minutes) before you consider a payment to be valid. With larger payments, you should wait for several confirmations. So-called block explorers are good tools for evaluating the safety of a transaction. In particular, many block explorers offer early warning systems that are able to quickly identify any double spending attempts made by your customers.
A further point that you should consider is the volatility of the Bitcoin price. In addition, take care to ensure that you generate a new, unique payment address for each of your customers. Although it is possible to have all your customers’ payments credited to the same Bitcoin address, this has two major disadvantages. First, it will become increasingly difficult to distinguish among your customers’ transactions.
This is true in particular if you deal with many similar transactions. Analogous to the reference numbers on payment slips, Bitcoin addresses can be assigned to individual customers. Second, you must be aware of the fact that the Bitcoin transactions, although not identifiable by name, can be publicly observed. If you always use the same Bitcoin address, people who know this address (i.e., all your customers) will be able to monitor all your incoming payments.
Self-managed systems are primarily suitable for small companies that do not expect to have large sales volumes and are looking for the most economical system. For such cases, a simple wallet without any additional functions will be sufficient. However, if you expect to receive many Bitcoin payments, it may be worthwhile engaging a payment service provider.
The Use of xpub
If you want to store your private keys in cold storage but at the same time want to be able to generate new Bitcoin addresses directly at a point-of-sale terminal or on the server of the online shop, the process offered by BIP0044 is an option. This proposal describes the standard that is used to derive hierarchical deterministic wallets and to generate new addresses without the corresponding private key.
The hardware wallet Trezor or the software wallet Armory are both very user-friendly and facilitate the simple export of the xpub data file that is necessary for a user to independently derive new Bitcoin addresses. In addition, both wallets have integrated functions that enable addresses to be generated in the absence of the private key.
Payment Service Providers
Payment service providers offer a large number of tools that substantially simplify the implementation of Bitcoin payments at point-of-sale terminals and in online shops. These tools usually include all features needed throughout the payment life cycle—from the issue of the payment request to its receipt and temporary custody of the Bitcoin units.
In addition, the retailer has the possibility to immediately convert a Bitcoin payment into the local currency and thereby protect himself against Bitcoin’s price volatility.
Further, many payment service providers will assume liability for any malfunctions.
If, for example, a double spending attack is successful after the payment service provider has accepted the payment, the retailer will be reimbursed in most cases.
Even though the fees are usually much lower than for credit cards, these services are not free. It is worthwhile to compare the offers, as the fees may depend on the scope of the services desired.
references
https://bitcoin.org/en/full-node#initial-block-downloadibd
https://www.weusecoins.com/full-bitcoin-node-on-a-raspberry-pi-3-with-or-without-a-pidrive/
https://bitnodes.io runs a service that enables the network to scan for active nodes.
https://www.forbes.com/advisor/investing/how-to-buy-bitcoin/
https://www.forbes.com/advisor/investing/coinbase-review/
privacy with bitcoin get btc from non kyc p2p exchange conjoin use TOR lightning network Schnorr signatures + taproot
creating an exchange account
Had to provide my mailing address and telephone. They seem to want verification which involves scanning government id.
coinbase
kraken
uphold
Peer Node
A new network node is created when a user installs a Bitcoin client on his computer and begins to exchange information with other network participants. Most clients are open source, and users are free to choose from a range of software packages. Theoretically, a user could also develop his own client and let it communicate with the network. As long as the software packages are compliant with Bitcoin’s communication protocol, they can be used to create new peer nodes and exchange information with other existing nodes.
Bitcoin Core
The most popular client is known as Bitcoin Core. Bitcoin Core contains the full range of functions. The software creates a full node and can be controlled via a graphical user interface or via the command line.
Bitcoin Core keeps a local copy of the Bitcoin blockchain. The client verifies and relays the transactions and blocks. In addition, Bitcoin Core includes a wallet and a simple mining application. It therefore provides all three functions.
Verification function
The verification function covers all the activities that are necessary so that network participants can participate in the network on their own and verify all transactions independently. In particular, participants verify transaction messages, store these messages locally, and forward them to other network participants. The verification function requires a participant to maintain a copy of the Bitcoin blockchain and to verify the validity of all the blocks of the chain. The verification function also facilitates the exchange of blocks. Network nodes who have a verification function are known as full nodes.
Wallet function
A wallet provides safe storage for private keys and monitors and manages a node’s personal Bitcoin balance. Wallets are developed for end users and normally provide a graphical user interface that enables Bitcoin units to be received and sent easily. In addition, many wallets offer optional security mechanisms to improve the protection of the private keys.
Mining function
Nodes that have a mining function participate actively in generating new blocks and contribute to the extension of the Bitcoin blockchain.
References
https://galoy.io/praia-bitcoin-deploying-galoy-open-source-banking-in-self-hosted-environment/
https://bitcoin.org/en/full-node#initial-block-downloadibd
https://developer.bitcoin.org/devguide/wallets.html
Knowledgable sources
@1Mark Moss - just seems to be a Carny Barker https://www.youtube.com/c/MarkMoss/videos
https://twitter.com/1markmossi https://twitter.com/1MarkMoss
Jimmy Song is the best resource I have found so far - lots of links
Terminology
DEX
CoinJoin
Lightening
layer to settle a transaction faster. I can transact with you peer to peer over lightening and it would be completely transparent
https://www.lynalden.com/lightning-network/ https://coingate.com/blog/post/pay-using-lightning-network https://github.com/ACINQ/eclair https://github.com/lightningnetwork/lnd https://github.com/ElementsProject/lightning
strike sphinx bitrefill
Atomic Swap
: layering to hide the transaction
MultiSig
multi signature setup
Unchained Capital
requires that you provide 2 of three keys to sign transaction. Can call UC to sign but they only have 1 of the keys so they can't do anything.
Taproot
KYC
Know Your Client is part of the identity tracking to meet govt requirements
Hardware wallet -
order from Amazon nano S $89
ATM
https://coinatmradar.com/blog/how-to-buy-bitcoins-at-atm-directly-to-hardware-wallet/
Ubuntu wallet
https://linuxhint.com/best-bitcoin-wallets-for-ubuntu/
Armory (opensource) has cold storage Bitcoin Core Copay Electrum Coin Wallet https://snapcraft.io/install/coin/ubuntu
Definitions
https://geti2p.net/en/blog/post/2021/09/18/i2p-bitcoin?utm_source=substack&utm_medium=email
Electrum
https://electrum.org/#download
Armory
Prune mode
https://coinguides.org/bitcoin-blockchain-pruning/
Pruning mode will not lessen your wallet security. It is same as running a full node wallet.
Running a wallet in pruned mode is incompatible with -rescan and -txindex
Cold storage
To ensure your paper wallet's private and public keys have never touched the Internet, you'll need to save the webpage that generates the keys, disconnect your device from the Internet, open the saved webpage on your desktop, then generate the keys.
https://paperwallet.bitcoin.com/cashwallet.html
exchange fees
https://www.blocknative.com/gas-estimator
bitinfocharts.com/comparison/bitcoin-transactionfees.html
lightning wallets
https://bitcoiner.guide/wallet/lightning/
Lightning network login
https://lightninglogin.live/learn https://github.com/lnurl/luds/blob/luds/04.md https://github.com/chill117/passport-lnurl-auth
non-custodial wallet
Custodial wallets transfer your private keys and asset protection to a third party while providing convenience and accessibility. Non-custodial wallets give you complete control over your keys and are arguably safer. Therefore, it comes down to your preferences, how much control you want over your assets, and what features you need.
https://dyor.net/#home-pricing https://dyortools.io/
Ethereum
catch airdrops
https://twitter.com/milesdeutscher/status/1639030835478409216 https://twitter.com/milesdeutscher/status/1639030846979194880 https://twitter.com/ardizor/status/1638148008888901632
https://www.orbiter.finance/?source=Ethereum&dest=Arbitrum
- Lightening - layer to settle a transaction faster. I can transact with you peer to peer over lightening and it would be completely transparent↩
Bullbitcoin
https://www.bullbitcoin.com/ https://bitcoinsupport.com/ https://preview.mailerlite.com/i3d6g0i8y2/2211035778102860715/c1l5/
Shakepay
Bluewallet
wasabi wallet
https://github.com/zkSNACKs/WalletWasabi
https://docs.wasabiwallet.io/using-wasabi/InstallPackage.html#debian-and-ubuntu