Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The method I’ve read about is to print “the request” onto a QR code, have the air-gapped machine scan it, sign it and print off the signed transaction QR to be scanned into the networked computer to propagate to the network.

A bit more to trust but a lot less to type.



And then you get hacked anyway because the QR code generator was compromised and switched around a few bytes before creating the QR code.


Ideally it’s a functionality of the wallet, but I think only bitcoin armory has this function.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: