Assumption is invalid. Flaws are widely documented (e.g. fixed supply). Probably wrong list, also.
Thanks, -- Raul On Wed, Nov 15, 2017 at 8:46 AM, James <jamex1...@gmail.com> wrote: > While a little off topic it is security related so I hope you don't mind. > > This is the misc list, right? > > Assumption 1. > bitcoin is a secure protocol without flaws. > > quote from > https://github.com/bitcoinbook/bitcoinbook/blob/second_edition/ch01.asciidoc > > With these keys they can sign transactions to unlock the value and > spend it by transferring it to a new owner. Keys are often stored in a > digital wallet on each user’s computer or smartphone. Possession of > the key that can sign a transaction is the only prerequisite to > spending bitcoin, putting the control entirely in the hands of each > user. > > > Is the security of a bitcoin wallet ultimately determined by it's password? > The way I see it If an attacker had access to my computer, the only > thing protecting access to the wallet would be a password or some > iteration of a password scheme, if not mine than a centralized server > of trust somewhere, but eventually someone has a password that is used > to, unlock a bitcoin. Is that correct reasoning or are there > alternatives? > > Thanks, > James >