Vacek_aka_Luschka Posted August 17, 2017 Share Posted August 17, 2017 (edited) As the title notes, does anyone see any value in installing Rippex in a VMWare image, as to opposed to my laptop? In the end, you need to be connected to the internet to do much ... so likely wouldn't matter ? Today, I have Rippex installed on my MacBook pro, and keep the file on a removable USB only. So if that is not plugged in, there is nothing to access. Just wondering if adding Rippex to an image, gives me anything additional security wise I have not thought of. Thanks EDIT: This image would be used (or only turned on) for nothing other than accessing the Rippex Wallet. Edited August 17, 2017 by Luschka Link to comment Share on other sites More sharing options...
Coinseeker Posted August 17, 2017 Share Posted August 17, 2017 (edited) I can't answer that but Rippex may be around to help you out. @Rippex Edited August 17, 2017 by Coinseeker Vacek_aka_Luschka 1 Link to comment Share on other sites More sharing options...
pucksterpete Posted August 17, 2017 Share Posted August 17, 2017 I have been using Rippex since early January 2017, been using it the same way as you, wallet file on usb key, I have had no problems. I do all my arbitrage trading using that prgm Vacek_aka_Luschka 1 Link to comment Share on other sites More sharing options...
g00p Posted August 17, 2017 Share Posted August 17, 2017 (edited) 1 hour ago, Luschka said: As the title notes, does anyone see any value in installing Rippex in a VMWare image, as to opposed to my laptop? In the end, you need to be connected to the internet to do much ... so likely wouldn't matter ? Today, I have Rippex installed on my MacBook pro, and keep the file on a removable USB only. So if that is not plugged in, there is nothing to access. Just wondering if adding Rippex to an image, gives me anything additional security wise I have not thought of. Thanks EDIT: This image would be used (or only turned on) for nothing other than accessing the Rippex Wallet. I think the only layer that adds, is that your host being infected by a system key logger, it wouldn't touch VMware image. If it were an old school key logger that was like a man in the middle from the keyboard, it would get the passwords/seeds anyway but those are pretty rare now. Even if your box was totally pwned, they would still need the key or seed for your wallet, and without a keylogger wouldn't be able to ascertain that. Edited August 17, 2017 by g00p Link to comment Share on other sites More sharing options...
Vacek_aka_Luschka Posted August 17, 2017 Author Share Posted August 17, 2017 2 minutes ago, g00p said: I think the only layer that adds, is that your host being infected by a system key logger, it wouldn't touch VMware image. If it were an old school key logger that was like a man in the middle from the keyboard, it would get the passwords/seeds anyway but those are pretty rare now. Even if your box was totally pwned, they would still need the key or seed for your wallet, and without a keylogger wouldn't be able to ascertain that. Good point. I do think however that with my VMWare image needing a password, and it is VERY complex, it might add just a little something extra. And note, this is a MacOS High Sierra image, on my Mac No windows for me .. Link to comment Share on other sites More sharing options...
g00p Posted August 17, 2017 Share Posted August 17, 2017 Yeah its definitely compartmentalized that way. Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now