2

I'd like to print many paper wallets which have bitcoins in them. Are there any tools for it?

There are many paper wallet tools which can create and print one paper wallet.

2 Answers2

3

If you use bitaddress.org, click on paper wallets, you can hide art and generate and print 7 per page on standard paper or 3 per page with art - up to the amount you need. You would then need to xfer btc to these new accounts AFTER printing though. For extra security, you could also use this bitaddress.org solution on a computer with no internet. Just save the entire webpage to a thumbdrive and run it from the non-connected computer. Hope this helps.

user54258
  • 54
  • 1
0

I would never use a online-computer to create a paper wallet. Also, I would never use a browser to generate a seed.

Have a look at: http://cryptographi.com

That looks like a neat project.

Murch
  • 75,206
  • 34
  • 186
  • 622
Jonas Schnelli
  • 6,052
  • 1
  • 21
  • 34
  • You should substantiate that a bit further. window.crypto.getRandomValues() is not Math.random, and is a cryptographically secure way of fetching randoms from /dev/urandom / CryptGenRandom(). I concur with your statement on using a computer that is online. – Riaan Swart May 23 '16 at 21:12
  • 1
    I'm not saying that javascript can't return a proper seed, but browsers had been an entrance for all types of malware during the last years. Why would you use a browser to generate a seed? – Jonas Schnelli May 24 '16 at 13:41
  • Are you being serious? I'm seriously shocked that a Bitcoin Core developer is incapable of understanding why this is a good idea, given the adversarial landscape we're in. Being able to check both the hash of the downloaded file, as well as visually look through the JavaScript for weirdness, puts it one step above even Gitian-signed binaries (which is effectively trusting a small group of hopefully-trustworthy-individuals). – Riaan Swart May 24 '16 at 18:38
  • Which means we're left looking at the attack surface a browser represents. Yes, attacks like XSS exist, but they are trivial to defend against in this instance, and always require you to have the malicious tab / window open. If the machine is offline what other possible vectors are there? Bitaddress and similar don't require Flash or anything like that, and they pass the RNG work straight to the OS. – Riaan Swart May 24 '16 at 18:42
  • No offense. But if you really think the browser is the right environment to create a seed that could be "responsible" for a couple of ten thousands of dollars, then go ahead. – Jonas Schnelli May 24 '16 at 18:59
  • I absolutely do think it's fine for 99% of people's use-cases. The ultra paranoid, or those requiring greater security, would use diceware and not a computer program, regardless of the execution environment. – Riaan Swart May 24 '16 at 19:12
  • 1
    Stuff like this: http://landing2.trusteer.com/sites/default/files/Temporary_User_Tracking_in_Major_Browsers.pdf and this: https://dl.packetstormsecurity.net/papers/general/Google_Chrome_3.0_Beta_Math.random_vulnerability.pdf make me think that you are wrong. I could imaging that there are serval attack vectors where a tab or browser window in the background could attack/read the PRNG. Maybe even a app (Chrome app) in the background. – Jonas Schnelli May 24 '16 at 19:29
  • Why would you have another tab or browser window open in the background? That seems highly illogical; if someone has the presence of mind to generate their keys on an airgapped machine they will most definitely have the presence of mind to do so on a fresh boot with no other programs running. Thus the attack surface is EXACTLY THE SAME as not using a browser: the computer may already have been infected by malware, which is a possibility regardless of the presence of a web browser. – Riaan Swart May 25 '16 at 02:26
  • @RiaanSwart: You're making a lot of assumptions about the reader's knowledge-level and security practices. I don't think it's valid to do so for the broad mass of this site's visitors. – Murch Jun 13 '16 at 15:24