Verus CLI Guide 1: Getting Started Running a Verus Node/Wallet

The Verus CLI (Command Line Interface) Wallet is used for scripting and automation, as an interface to applications utilizing or providing services relating to Verus, and by power-users who want maximum control over their wallets or want to run Verus on headless systems. This series of posts is written for the Linux environment, and may have details specific to the Bash shell, but the principles should translate well to other environments. If you’re new to the Linux command line you might want to look up some intros to get some foundational principles down (directory navigation and piping in particular) so you’ll have an easier time following along.

Continue reading “Verus CLI Guide 1: Getting Started Running a Verus Node/Wallet”

Creating Highly Anonymous Verus IDs

Verus IDs are pseudonymous just like normal crypto addresses, but there are several ways the owner of a Verus ID may be identified, and ways to mitigate those risks for people choosing to be as anonymous as possible.

Here we’ll look at the proper use of referrers, best strategies for funding a Verus ID registration, good options for maximally private Verus ID names, considerations for the transparent and private addresses associated with the ID, and considerations regarding revocation and recovery authority assignments.

Continue reading “Creating Highly Anonymous Verus IDs”

Seriously Paranoid Cryptocurrency Key Generation

This is a guide for creating highly secure keys to use for cold storage, or more specifically in my case, to assign as the recovery authorities to Verus IDs. The goal is to generate a bulk batch of keys that have never been in a system that’s been online and come away with a copy of those keys and addresses on a pair of thumb drives (for redundancy) and the addresses (without keys) on another drive for monitoring and for reference to use those secure keys (to send to or for Verus ID authority assignments).

You will need: 4 USB drives, a computer running Linux (doable without, but that’s what these instructions are for), and optionally another computer. If you don’t have a Linux system handy but want to follow these directions, you can start by creating the boot media for the Linux live distribution, then booting into that environment, connecting to the internet, and following all of the instructions – just make sure to shut down and perform a cold boot to get back into the fresh environment (without internet) when it’s time for the secure system.

While I’ve tried to be as comprehensive as possible in my directions, it is assumed that you are somewhat familiar with the Linux command line.

Continue reading “Seriously Paranoid Cryptocurrency Key Generation”