{"id":53813,"date":"2021-11-30T16:01:11","date_gmt":"2021-11-30T14:01:11","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=53813"},"modified":"2025-09-03T17:04:33","modified_gmt":"2025-09-03T14:04:33","slug":"databases-ciphers-and-secrets-a-guide-to-securely-storing-cake-wallet-private-keys","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/databases-ciphers-and-secrets-a-guide-to-securely-storing-cake-wallet-private-keys\/","title":{"rendered":"Databases, Ciphers and Secrets: A Guide to Securely Storing Cake Wallet Private Keys"},"content":{"rendered":"<p>Almost any cryptocurrency wallet allows a backup \u2014 saving the private key in a special file to restore access in case of loss or device failure. But this creates new problems: the file could be stolen by attackers.<\/p>\n<p><!--more--><\/p>\n<p>The developers of the <a class=\\\"tracking_link\\\" href=\\\"http:\/\/cakewallet.com\\\" target=\\\"_blank\\\" rel=\\\"noopener noreferrer\\\">Cake Wallet<\/a> cryptocurrency wallet discuss open-source software for secure storage and encryption of private keys.<\/p>\n<h2 class=\\\"wp-block-heading\\\">Cracking a wallet in three minutes<\/h2>\n<p>Desktop, mobile and browser wallets store private keys on the user&#8217;s device. For example, the Exodus crypto wallet stores them in the AppRoaming folder on Windows and in Application Support on macOS. <\/p>\n<p>The most important files are seed.seco and passphrase.json. The former contains the private key, and the latter the phrase to decrypt it.<\/p>\n<figure class=\\\"wp-block-image size-full\\\"><img loading=\\\"lazy\\\" decoding=\\\"async\\\" width=\\\"704\\\" height=\\\"465\\\" src=\\\"https:\/\/forklog.com\/wp-content\/uploads\/1-596.png\\\" alt=\\\"\u0411\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445, \u0448\u0438\u0444\u0440\u044b \u0438 \u0441\u0435\u043a\u0440\u0435\u0442\u044b: \u0433\u0430\u0439\u0434 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u043c\u0443 \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0430\u0442\u043d\u044b\u0445 \u043a\u043b\u044e\u0447\u0435\u0439 \u043e\u0442 Cake Wallet\\\" class=\\\"wp-image-157537\\\" srcset=\\\"https:\/\/forklog.com\/wp-content\/uploads\/1-596.png 704w, https:\/\/forklog.com\/wp-content\/uploads\/1-596-300x198.png 300w\\\" sizes=\\\"auto, (max-width: 704px) 100vw, 704px\\\" \/><figcaption>Contents of the exodus.wallet folder in Application Support. Access requires revealing hidden folders.<\/figcaption><\/figure>\n<p>If a hacker copies the files to their computer, they gain access to the wallet. We performed such steps in the example below.<\/p>\n<figure class=\\\"wp-block-image size-large\\\"><img loading=\\\"lazy\\\" decoding=\\\"async\\\" width=\\\"1024\\\" height=\\\"543\\\" src=\\\"https:\/\/forklog.com\/wp-content\/uploads\/2-501-1024x543.png\\\" alt=\\\"\u0411\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445, \u0448\u0438\u0444\u0440\u044b \u0438 \u0441\u0435\u043a\u0440\u0435\u0442\u044b: \u0433\u0430\u0439\u0434 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u043c\u0443 \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0430\u0442\u043d\u044b\u0445 \u043a\u043b\u044e\u0447\u0435\u0439 \u043e\u0442 Cake Wallet\\\" class=\\\"wp-image-157538\\\" srcset=\\\"https:\/\/forklog.com\/wp-content\/uploads\/2-501-1024x543.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/2-501-300x159.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/2-501-768x407.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/2-501.png 1248w\\\" sizes=\\\"auto, (max-width: 1024px) 100vw, 1024px\\\" \/><figcaption>Transferring files to another computer. Bitcoin addresses match.<\/figcaption><\/figure>\n<p>This does not mean Exodus and other desktop wallets are unreliable. We deliberately did not use passwords, encryption or 2FA to illustrate the theft mechanism.<\/p>\n<p>Most wallets offer to encrypt key files with a password. But even then they will remain in obvious places and be vulnerable to brute-force attacks.<\/p>\n<p>Spoiling the files on a smartphone is harder: iOS and Android do not provide full access to the file system. We installed Cake Wallet, MyEtherWallet and TON Surf on a smartphone but could not locate key folders without root access.<\/p>\n<p>However, a phone can be lost or damaged, and thus cryptocurrency can be lost. In that case, back up the wallet: store the private key or mnemonic phrase on a separate device, and then encrypt them.\u00a0<\/p>\n<p>Additionally, backups let you safely use desktop wallets. To do this, turn them into non-custodial: manually import the private key each time, and after finishing, wipe the folders.<\/p>\n<h2 class=\\\"wp-block-heading\\\">How to Back Up Properly<\/h2>\n<p>Access to the wallet requires either the private key or the seed phrase\u2014one will suffice.<\/p>\n<p>It is better to choose the seed phrase. It consists of English words, and therefore reduces the likelihood of errors when creating a backup.<\/p>\n<p>Seed phrases and private keys are roughly equally resistant to brute-force attacks\u2014 the method of guessing possible combinations.<\/p>\n<p>The data can be secured in four ways:<\/p>\n<ul class=\\\"wp-block-list\\\">\n<li>store in a password manager;<\/li>\n<li>save to a file and encrypt it;<\/li>\n<li>upload to encrypted cloud storage;<\/li>\n<li>split into shares using the <a href=\\\"https:\/\/ru.wikipedia.org\/wiki\/%D0%A1%D1%85%D0%B5%D0%BC%D0%B0_%D1%80%D0%B0%D0%B7%D0%B4%D0%B5%D0%BB%D0%B5%D0%BD%D0%B8%D1%8F_%D1%81%D0%B5%D0%BA%D1%80%D0%B5%D1%82%D0%B0_%D0%A8%D0%B0%D0%BC%D0%B8%D1%80%D0%B0\\\" title=\\\"https:\/\/ru.wikipedia.org\/wiki\/%D0%A1%D1%85%D0%B5%D0%BC%D0%B0_%D1%80%D0%B0%D0%B7%D0%B4%D0%B5%D0%BB%D0%B5%D0%BD%D0%B8%D1%8F_%D1%81%D0%B5%D0%BA%D1%80%D0%B5%D1%82%D0%B0_%D0%A8%D0%B0%D0%BC%D0%B8%D1%80%D0%B0\\\">\u0441\u0435\u043a\u0440\u0435\u0442\u0430 \u0428\u0430\u043c\u0438\u0440\u0430<\/a>.<\/li>\n<\/ul>\n<p>We illustrate them using open-source tools: KeePassXC, PGPTool, Cryptomator and ASecuritysite.<\/p>\n<p>Remember that there is no absolutely secure method for storing keys. But cracking a protected wallet would take months, whereas cracking an unprotected one would take minutes.<\/p>\n<h2 class=\\\"wp-block-heading\\\">KeePassXC Password Manager<\/h2>\n<p>A password manager is an application for storing numerous key-value pairs. Essentially, it&#8217;s an encrypted database that can be opened only with a master key. <\/p>\n<p>We illustrate the password manager using <a href=\\\"https:\/\/keepassxc.org\\\">KeePassXC<\/a> \u2014 a free open-source application for Windows, Linux and macOS.<\/p>\n<p>On first run KeePassXC will offer to create a database. Enter its name in the <strong>Database Name<\/strong> field.<\/p>\n<figure class=\\\"wp-block-image size-full\\\"><img loading=\\\"lazy\\\" decoding=\\\"async\\\" width=\\\"792\\\" height=\\\"523\\\" src=\\\"https:\/\/forklog.com\/wp-content\/uploads\/3-303.png\\\" alt=\\\"\u0411\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445, \u0448\u0438\u0444\u0440\u044b \u0438 \u0441\u0435\u043a\u0440\u0435\u0442\u044b: \u0433\u0430\u0439\u0434 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u043c\u0443 \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0430\u0442\u043d\u044b\u0445 \u043a\u043b\u044e\u0447\u0435\u0439 \u043e\u0442 Cake Wallet\\\" class=\\\"wp-image-157539\\\" srcset=\\\"https:\/\/forklog.com\/wp-content\/uploads\/3-303.png 792w, https:\/\/forklog.com\/wp-content\/uploads\/3-303-300x198.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/3-303-768x507.png 768w\\\" sizes=\\\"auto, (max-width: 792px) 100vw, 792px\\\" \/><figcaption>The description field can be left blank. You will only see it in the settings.<\/figcaption><\/figure>\n<p>In the second step configure the time needed for each brute-force attempt (<strong>Decryption Time<\/strong>). The default is 1 second; the recommended value is 5 seconds.<\/p>\n<figure class=\\\"wp-block-image size-full\\\"><img loading=\\\"lazy\\\" decoding=\\\"async\\\" width=\\\"790\\\" height=\\\"497\\\" src=\\\"https:\/\/forklog.com\/wp-content\/uploads\/4-189.png\\\" alt=\\\"\u0411\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445, \u0448\u0438\u0444\u0440\u044b \u0438 \u0441\u0435\u043a\u0440\u0435\u0442\u044b: \u0433\u0430\u0439\u0434 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u043c\u0443 \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0430\u0442\u043d\u044b\u0445 \u043a\u043b\u044e\u0447\u0435\u0439 \u043e\u0442 Cake Wallet\\\" class=\\\"wp-image-157540\\\" srcset=\\\"https:\/\/forklog.com\/wp-content\/uploads\/4-189.png 790w, https:\/\/forklog.com\/wp-content\/uploads\/4-189-300x189.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/4-189-768x483.png 768w\\\" sizes=\\\"auto, (max-width: 790px) 100vw, 790px\\\" \/><figcaption>The ideal decryption time is five seconds. In this case a hacker will test 20-30 passwords per minute.<\/figcaption><\/figure>\n<p>Next, enter and confirm the master key. It should be unique \u2014 do not reuse existing or similar passwords. Note that KeePassXC supports characters such as \u00a9, \u2713 or \u2300, which are not found in standard keyboard layouts and brute-force dictionaries. <\/p>\n<p>Then name the database file and choose where to save it.<\/p>\n<figure class=\\\"wp-block-image size-full\\\"><img loading=\\\"lazy\\\" decoding=\\\"async\\\" width=\\\"793\\\" height=\\\"621\\\" src=\\\"https:\/\/forklog.com\/wp-content\/uploads\/5-112.png\\\" alt=\\\"\u0411\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445, \u0448\u0438\u0444\u0440\u044b \u0438 \u0441\u0435\u043a\u0440\u0435\u0442\u044b: \u0433\u0430\u0439\u0434 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u043c\u0443 \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0430\u0442\u043d\u044b\u0445 \u043a\u043b\u044e\u0447\u0435\u0439 \u043e\u0442 Cake Wallet\\\" class=\\\"wp-image-157541\\\" srcset=\\\"https:\/\/forklog.com\/wp-content\/uploads\/5-112.png 793w, https:\/\/forklog.com\/wp-content\/uploads\/5-112-300x235.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/5-112-768x601.png 768w\\\" sizes=\\\"auto, (max-width: 793px) 100vw, 793px\\\" \/><figcaption>Select the folder or device you are sure you won\u2019t lose the database file on.<\/figcaption><\/figure>\n<p>To create a backup, click the plus on the top toolbar. Name the entry, for example seed phrase. If you don\u2019t want to leave a hint for hackers, leave the field blank. <\/p>\n<p>Enter the seed phrase or private key in any field and press <strong>OK<\/strong>. We recommend using the <strong>Password<\/strong> field: KeePassXC hides its contents when viewing the database.<\/p>\n<figure class=\\\"wp-block-image size-full\\\"><img loading=\\\"lazy\\\" decoding=\\\"async\\\" width=\\\"876\\\" height=\\\"726\\\" src=\\\"https:\/\/forklog.com\/wp-content\/uploads\/6-83.png\\\" alt=\\\"\u0411\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445, \u0448\u0438\u0444\u0440\u044b \u0438 \u0441\u0435\u043a\u0440\u0435\u0442\u044b: \u0433\u0430\u0439\u0434 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u043c\u0443 \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0430\u0442\u043d\u044b\u0445 \u043a\u043b\u044e\u0447\u0435\u0439 \u043e\u0442 Cake Wallet\\\" class=\\\"wp-image-157542\\\" srcset=\\\"https:\/\/forklog.com\/wp-content\/uploads\/6-83.png 876w, https:\/\/forklog.com\/wp-content\/uploads\/6-83-300x249.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/6-83-768x636.png 768w\\\" sizes=\\\"auto, (max-width: 876px) 100vw, 876px\\\" \/><figcaption>Fields Title, Username, URL and Notes can be left blank. They help orientate oneself in the database contents.<\/figcaption><\/figure>\n<p>To copy a key or seed phrase, right-click the entry and choose <strong>Copy Password <\/strong>from the dropdown.<\/p>\n<figure class=\\\"wp-block-image size-full\\\"><img loading=\\\"lazy\\\" decoding=\\\"async\\\" width=\\\"794\\\" height=\\\"618\\\" src=\\\"https:\/\/forklog.com\/wp-content\/uploads\/7-47.png\\\" alt=\\\"\u0411\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445, \u0448\u0438\u0444\u0440\u044b \u0438 \u0441\u0435\u043a\u0440\u0435\u0442\u044b: \u0433\u0430\u0439\u0434 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u043c\u0443 \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0430\u0442\u043d\u044b\u0445 \u043a\u043b\u044e\u0447\u0435\u0439 \u043e\u0442 Cake Wallet\\\" class=\\\"wp-image-157543\\\" srcset=\\\"https:\/\/forklog.com\/wp-content\/uploads\/7-47.png 794w, https:\/\/forklog.com\/wp-content\/uploads\/7-47-300x234.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/7-47-768x598.png 768w\\\" sizes=\\\"auto, (max-width: 794px) 100vw, 794px\\\" \/><figcaption>KeePassXC hides the password length, so dots appear in the Password field instead of characters.<\/figcaption><\/figure>\n<p>The database should be copied to a USB drive or uploaded to the cloud in case the hard drive fails.<\/p>\n<h2 class=\\\"wp-block-heading\\\">PGPTool Encryptor<\/h2>\n<p>PGP (Pretty Good Privacy) \u2014 the name of a library of functions for data encryption and the applications built on it.<\/p>\n<p>PGP encryption protects the contents of emails, hard drives and individual files. PGP applications operate like crypto wallets: they encrypt information with public keys and decrypt with private keys.<\/p>\n<p>We will back up a text file containing the seed phrase using <a href=\\\"https:\/\/pgptool.github.io\\\">PGPTool<\/a> \u2014 a desktop PGP client with open source. To run it, you need any operating system that supports Java Runtime Environment.<\/p>\n<p>Write the private key or seed phrase to a text file and save it on your computer. Install and run PGPTool.<\/p>\n<p>Click the <strong>Key ring<\/strong> button to create a new pair of public and private keys.<\/p>\n<p>PGP is used to encrypt emails, so many apps ask for a name, password and email. It is not necessary to provide real data: in our case this is the name of the key pair.<\/p>\n<p>After filling in the main information, set a password and click <strong>Create<\/strong>.<\/p>\n<figure class=\\\"wp-block-image size-full\\\"><img loading=\\\"lazy\\\" decoding=\\\"async\\\" width=\\\"905\\\" height=\\\"484\\\" src=\\\"https:\/\/forklog.com\/wp-content\/uploads\/8-38.png\\\" alt=\\\"\u0411\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445, \u0448\u0438\u0444\u0440\u044b \u0438 \u0441\u0435\u043a\u0440\u0435\u0442\u044b: \u0433\u0430\u0439\u0434 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u043c\u0443 \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0430\u0442\u043d\u044b\u0445 \u043a\u043b\u044e\u0447\u0435\u0439 \u043e\u0442 Cake Wallet\\\" class=\\\"wp-image-157545\\\" srcset=\\\"https:\/\/forklog.com\/wp-content\/uploads\/8-38.png 905w, https:\/\/forklog.com\/wp-content\/uploads\/8-38-300x160.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/8-38-768x411.png 768w\\\" sizes=\\\"auto, (max-width: 905px) 100vw, 905px\\\" \/><figcaption>If you don\u2019t want to provide your real email address, enter any string of letters with @gmail.com.<\/figcaption><\/figure>\n<p>Create a backup: click Encrypt File and select the file containing the seed phrase.<\/p>\n<p>Uncheck the <strong>Use same folder<\/strong> and specify where to save. Otherwise PGPTool will place the backup in the folder with the source file.<\/p>\n<p>Click Encrypt.<\/p>\n<figure class=\\\"wp-block-image size-full\\\"><img loading=\\\"lazy\\\" decoding=\\\"async\\\" width=\\\"907\\\" height=\\\"555\\\" src=\\\"https:\/\/forklog.com\/wp-content\/uploads\/9-34.png\\\" alt=\\\"\u0411\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445, \u0448\u0438\u0444\u0440\u044b \u0438 \u0441\u0435\u043a\u0440\u0435\u0442\u044b: \u0433\u0430\u0439\u0434 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u043c\u0443 \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0430\u0442\u043d\u044b\u0445 \u043a\u043b\u044e\u0447\u0435\u0439 \u043e\u0442 Cake Wallet\\\" class=\\\"wp-image-157546\\\" srcset=\\\"https:\/\/forklog.com\/wp-content\/uploads\/9-34.png 907w, https:\/\/forklog.com\/wp-content\/uploads\/9-34-300x184.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/9-34-768x470.png 768w\\\" sizes=\\\"auto, (max-width: 907px) 100vw, 907px\\\" \/><figcaption>If you enable the Delete source file checkbox, the client will delete the original file after encryption.<\/figcaption><\/figure>\n<p>Upon completion, PGPTool will display the message \u201cFile was encrypted successfully\u201d. The backup is ready. Make a copy of this file in case of loss or damage to the main device. <\/p>\n<p>To decrypt the backup and read the seed phrase, click the <strong>Decrypt file <\/strong>button and select the encrypted file. Enter the password you set when creating the key pair.<\/p>\n<figure class=\\\"wp-block-image size-full\\\"><img loading=\\\"lazy\\\" decoding=\\\"async\\\" width=\\\"900\\\" height=\\\"485\\\" src=\\\"https:\/\/forklog.com\/wp-content\/uploads\/10-24.png\\\" alt=\\\"\u0411\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445, \u0448\u0438\u0444\u0440\u044b \u0438 \u0441\u0435\u043a\u0440\u0435\u0442\u044b: \u0433\u0430\u0439\u0434 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u043c\u0443 \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0430\u0442\u043d\u044b\u0445 \u043a\u043b\u044e\u0447\u0435\u0439 \u043e\u0442 Cake Wallet\\\" class=\\\"wp-image-157547\\\" srcset=\\\"https:\/\/forklog.com\/wp-content\/uploads\/10-24.png 900w, https:\/\/forklog.com\/wp-content\/uploads\/10-24-300x162.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/10-24-768x414.png 768w\\\" sizes=\\\"auto, (max-width: 900px) 100vw, 900px\\\" \/><figcaption>In the Key field, the name and email address appear, not the key.<\/figcaption><\/figure>\n<p>Choose a folder to save the decrypted file and click Decrypt.<\/p>\n<figure class=\\\"wp-block-image size-full\\\"><img loading=\\\"lazy\\\" decoding=\\\"async\\\" width=\\\"909\\\" height=\\\"488\\\" src=\\\"https:\/\/forklog.com\/wp-content\/uploads\/11-51.png\\\" alt=\\\"\u0411\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445, \u0448\u0438\u0444\u0440\u044b \u0438 \u0441\u0435\u043a\u0440\u0435\u0442\u044b: \u0433\u0430\u0439\u0434 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u043c\u0443 \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0430\u0442\u043d\u044b\u0445 \u043a\u043b\u044e\u0447\u0435\u0439 \u043e\u0442 Cake Wallet\\\" class=\\\"wp-image-157548\\\" srcset=\\\"https:\/\/forklog.com\/wp-content\/uploads\/11-51.png 909w, https:\/\/forklog.com\/wp-content\/uploads\/11-51-300x161.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/11-51-768x412.png 768w\\\" sizes=\\\"auto, (max-width: 909px) 100vw, 909px\\\" \/><figcaption>Be sure to save the PGP key to an external drive so you do not lose access to your backups.<\/figcaption><\/figure>\n<p>Click the <strong>Key ring<\/strong>, right-click the key and select <strong>Export private key<\/strong> in the dropdown. Specify a folder for storing the key file and click <strong>Save<\/strong>.<\/p>\n<figure class=\\\"wp-block-image size-full\\\"><img loading=\\\"lazy\\\" decoding=\\\"async\\\" width=\\\"902\\\" height=\\\"575\\\" src=\\\"https:\/\/forklog.com\/wp-content\/uploads\/12-15.png\\\" alt=\\\"\u0411\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445, \u0448\u0438\u0444\u0440\u044b \u0438 \u0441\u0435\u043a\u0440\u0435\u0442\u044b: \u0433\u0430\u0439\u0434 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u043c\u0443 \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0430\u0442\u043d\u044b\u0445 \u043a\u043b\u044e\u0447\u0435\u0439 \u043e\u0442 Cake Wallet\\\" class=\\\"wp-image-157549\\\" srcset=\\\"https:\/\/forklog.com\/wp-content\/uploads\/12-15.png 902w, https:\/\/forklog.com\/wp-content\/uploads\/12-15-300x191.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/12-15-768x490.png 768w\\\" sizes=\\\"auto, (max-width: 902px) 100vw, 902px\\\" \/><figcaption>PGP key will be saved in asc format.<\/figcaption><\/figure>\n<p>After that, remove the private key from the client by selecting Remove key from the list. If a hacker still gains access to the computer, they will not be able to decrypt the file.<\/p>\n<h2 class=\\\"wp-block-heading\\\">Cryptomator Cloud Storage<\/h2>\n<p><a href=\\\"https:\/\/cryptomator.org\/\\\">Cryptomator<\/a> \u2014 a free tool for creating encrypted cloud storages in OneDrive, Google Drive, iCloud and on the device&#8217;s hard drive.<\/p>\n<p>To back up, <a href=\\\"https:\/\/cryptomator.org\/downloads\/\\\">install<\/a> a version of Cryptomator for your operating system. The app runs on Windows, macOS, Linux, Android and iOS.<\/p>\n<p>Launch Cryptomator, press Add Vault and enter the storage name.<\/p>\n<figure class=\\\"wp-block-image size-full\\\"><img loading=\\\"lazy\\\" decoding=\\\"async\\\" width=\\\"651\\\" height=\\\"490\\\" src=\\\"https:\/\/forklog.com\/wp-content\/uploads\/13-29.png\\\" alt=\\\"\u0411\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445, \u0448\u0438\u0444\u0440\u044b \u0438 \u0441\u0435\u043a\u0440\u0435\u0442\u044b: \u0433\u0430\u0439\u0434 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u043c\u0443 \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0430\u0442\u043d\u044b\u0445 \u043a\u043b\u044e\u0447\u0435\u0439 \u043e\u0442 Cake Wallet\\\" class=\\\"wp-image-157550\\\" srcset=\\\"https:\/\/forklog.com\/wp-content\/uploads\/13-29.png 651w, https:\/\/forklog.com\/wp-content\/uploads\/13-29-300x226.png 300w\\\" sizes=\\\"auto, (max-width: 651px) 100vw, 651px\\\" \/><figcaption>On the left, available vaults are shown.<\/figcaption><\/figure>\n<p>Choose where to store the files \u2014 cloud or a folder. Cryptomator will offer cloud services whose apps are installed on the device. We created storage in iCloud.<\/p>\n<figure class=\\\"wp-block-image size-full\\\"><img loading=\\\"lazy\\\" decoding=\\\"async\\\" width=\\\"650\\\" height=\\\"489\\\" src=\\\"https:\/\/forklog.com\/wp-content\/uploads\/14-16.png\\\" alt=\\\"\u0411\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445, \u0448\u0438\u0444\u0440\u044b \u0438 \u0441\u0435\u043a\u0440\u0435\u0442\u044b: \u0433\u0430\u0439\u0434 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u043c\u0443 \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0430\u0442\u043d\u044b\u0445 \u043a\u043b\u044e\u0447\u0435\u0439 \u043e\u0442 Cake Wallet\\\" class=\\\"wp-image-157551\\\" srcset=\\\"https:\/\/forklog.com\/wp-content\/uploads\/14-16.png 650w, https:\/\/forklog.com\/wp-content\/uploads\/14-16-300x226.png 300w\\\" sizes=\\\"auto, (max-width: 650px) 100vw, 650px\\\" \/><figcaption>Cryptomator stores files in the folder used by the cloud client for synchronization.<\/figcaption><\/figure>\n<p>Set a password and tick the <strong>Yes<\/strong> checkbox to obtain the recovery phrase.<\/p>\n<figure class=\\\"wp-block-image size-full\\\"><img loading=\\\"lazy\\\" decoding=\\\"async\\\" width=\\\"650\\\" height=\\\"492\\\" src=\\\"https:\/\/forklog.com\/wp-content\/uploads\/15-16.png\\\" alt=\\\"\u0411\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445, \u0448\u0438\u0444\u0440\u044b \u0438 \u0441\u0435\u043a\u0440\u0435\u0442\u044b: \u0433\u0430\u0439\u0434 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u043c\u0443 \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0430\u0442\u043d\u044b\u0445 \u043a\u043b\u044e\u0447\u0435\u0439 \u043e\u0442 Cake Wallet\\\" class=\\\"wp-image-157552\\\" srcset=\\\"https:\/\/forklog.com\/wp-content\/uploads\/15-16.png 650w, https:\/\/forklog.com\/wp-content\/uploads\/15-16-300x227.png 300w\\\" sizes=\\\"auto, (max-width: 650px) 100vw, 650px\\\" \/><figcaption>Record the recovery phrase in a text file or in a notepad.<\/figcaption><\/figure>\n<p>Before transferring the file to storage, gain access: click <strong>Unlock Now<\/strong> and enter the password.<\/p>\n<figure class=\\\"wp-block-image size-full\\\"><img loading=\\\"lazy\\\" decoding=\\\"async\\\" width=\\\"646\\\" height=\\\"488\\\" src=\\\"https:\/\/forklog.com\/wp-content\/uploads\/16-20.png\\\" alt=\\\"\u0411\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445, \u0448\u0438\u0444\u0440\u044b \u0438 \u0441\u0435\u043a\u0440\u0435\u0442\u044b: \u0433\u0430\u0439\u0434 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u043c\u0443 \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0430\u0442\u043d\u044b\u0445 \u043a\u043b\u044e\u0447\u0435\u0439 \u043e\u0442 Cake Wallet\\\" class=\\\"wp-image-157553\\\" srcset=\\\"https:\/\/forklog.com\/wp-content\/uploads\/16-20.png 646w, https:\/\/forklog.com\/wp-content\/uploads\/16-20-300x227.png 300w\\\" sizes=\\\"auto, (max-width: 646px) 100vw, 646px\\\" \/><figcaption>The icon on the left shows the vault status: closed lock \u2014 encrypted, open \u2014 decrypted.<\/figcaption><\/figure>\n<p>Cryptomator will open a virtual vault in the Explorer. Place the seed phrase file into it. The app will immediately push it to the cloud.<\/p>\n<figure class=\\\"wp-block-image size-full\\\"><img loading=\\\"lazy\\\" decoding=\\\"async\\\" width=\\\"915\\\" height=\\\"427\\\" src=\\\"https:\/\/forklog.com\/wp-content\/uploads\/17-14.png\\\" alt=\\\"\u0411\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445, \u0448\u0438\u0444\u0440\u044b \u0438 \u0441\u0435\u043a\u0440\u0435\u0442\u044b: \u0433\u0430\u0439\u0434 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u043c\u0443 \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0430\u0442\u043d\u044b\u0445 \u043a\u043b\u044e\u0447\u0435\u0439 \u043e\u0442 Cake Wallet\\\" class=\\\"wp-image-157554\\\" srcset=\\\"https:\/\/forklog.com\/wp-content\/uploads\/17-14.png 915w, https:\/\/forklog.com\/wp-content\/uploads\/17-14-300x140.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/17-14-768x358.png 768w\\\" sizes=\\\"auto, (max-width: 915px) 100vw, 915px\\\" \/><figcaption>Cryptomator displays the vault as a virtual localhost drive.<\/figcaption><\/figure>\n<p>After that, close the vault: select it in Cryptomator and click <strong>Lock<\/strong>. <\/p>\n<p>If you close the app or shut down the computer, Cryptomator automatically re-encrypts open vaults: copies the contents of the vault to the cloud and removes the virtual drive from the system.<\/p>\n<figure class=\\\"wp-block-image size-full\\\"><img loading=\\\"lazy\\\" decoding=\\\"async\\\" width=\\\"650\\\" height=\\\"486\\\" src=\\\"https:\/\/forklog.com\/wp-content\/uploads\/18-29.png\\\" alt=\\\"\u0411\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445, \u0448\u0438\u0444\u0440\u044b \u0438 \u0441\u0435\u043a\u0440\u0435\u0442\u044b: \u0433\u0430\u0439\u0434 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u043c\u0443 \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0430\u0442\u043d\u044b\u0445 \u043a\u043b\u044e\u0447\u0435\u0439 \u043e\u0442 Cake Wallet\\\" class=\\\"wp-image-157555\\\" srcset=\\\"https:\/\/forklog.com\/wp-content\/uploads\/18-29.png 650w, https:\/\/forklog.com\/wp-content\/uploads\/18-29-300x224.png 300w\\\" sizes=\\\"auto, (max-width: 650px) 100vw, 650px\\\" \/><\/figure>\n<p>Back up the storage to avoid losing access if the device fails. Go to the Cryptomator folder and locate the vault folder.<\/p>\n<figure class=\\\"wp-block-image size-full\\\"><img loading=\\\"lazy\\\" decoding=\\\"async\\\" width=\\\"914\\\" height=\\\"428\\\" src=\\\"https:\/\/forklog.com\/wp-content\/uploads\/19-6.png\\\" alt=\\\"\u0411\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445, \u0448\u0438\u0444\u0440\u044b \u0438 \u0441\u0435\u043a\u0440\u0435\u0442\u044b: \u0433\u0430\u0439\u0434 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u043c\u0443 \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0430\u0442\u043d\u044b\u0445 \u043a\u043b\u044e\u0447\u0435\u0439 \u043e\u0442 Cake Wallet\\\" class=\\\"wp-image-157556\\\" srcset=\\\"https:\/\/forklog.com\/wp-content\/uploads\/19-6.png 914w, https:\/\/forklog.com\/wp-content\/uploads\/19-6-300x140.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/19-6-768x360.png 768w\\\" sizes=\\\"auto, (max-width: 914px) 100vw, 914px\\\" \/><figcaption>In the d folder are encrypted files that will later be placed in storage. Do not manually add anything to it: breaking the structure will render the storage unreadable.<\/figcaption><\/figure>\n<p>Copy all files to an external drive. If the computer fails, install Cryptomator on a new device and import the vault. To do this, click Add Vault, then Existing Vault. In the dialog, specify the path to the masterkey and vault.<\/p>\n<figure class=\\\"wp-block-image size-full\\\"><img loading=\\\"lazy\\\" decoding=\\\"async\\\" width=\\\"649\\\" height=\\\"489\\\" src=\\\"https:\/\/forklog.com\/wp-content\/uploads\/20-4.png\\\" alt=\\\"\u0411\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445, \u0448\u0438\u0444\u0440\u044b \u0438 \u0441\u0435\u043a\u0440\u0435\u0442\u044b: \u0433\u0430\u0439\u0434 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u043c\u0443 \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0430\u0442\u043d\u044b\u0445 \u043a\u043b\u044e\u0447\u0435\u0439 \u043e\u0442 Cake Wallet\\\" class=\\\"wp-image-157557\\\" srcset=\\\"https:\/\/forklog.com\/wp-content\/uploads\/20-4.png 649w, https:\/\/forklog.com\/wp-content\/uploads\/20-4-300x226.png 300w\\\" sizes=\\\"auto, (max-width: 649px) 100vw, 649px\\\" \/><figcaption>To open the backup in Cryptomator, the masterkey and vault folder must include a d folder with encrypted files.<\/figcaption><\/figure>\n<p>When importing the vault, Cryptomator will require a password. If a hacker steals the backup, they will gain access to your backups only after a brute-force attack.<\/p>\n<h2 class=\\\"wp-block-heading\\\">Shamir&#8217;s Scheme on ASecuritysite<\/h2>\n<p>Shamir&#8217;s scheme (Shamir&#8217;s secret) is an algorithm that splits information into encrypted fragments. To restore the original data, several fragments are required. Their number is called the threshold.<\/p>\n<p>The algorithm can be explained with a curve-building task. Suppose Alice specifies five points through which only one curve passes. Bob can take the coordinates of any three of Alice&#8217;s points (the threshold) and construct that curve.<\/p>\n<p>Backups using Shamir&#8217;s scheme can be created on open-source online converters. We used the first site in search results \u2014 <a href=\\\"https:\/\/asecuritysite.com\/\\\">ASecuritysite<\/a>.<\/p>\n<p>Go to the Shamir encryption page. Paste the private key or seed phrase into the Secret Message field. <\/p>\n<p>Enter the number of shares in No of shares and the threshold in Threshold. Press Determine.<\/p>\n<figure class=\\\"wp-block-image size-large\\\"><img loading=\\\"lazy\\\" decoding=\\\"async\\\" width=\\\"1024\\\" height=\\\"563\\\" src=\\\"https:\/\/forklog.com\/wp-content\/uploads\/21_-1024x563.png\\\" alt=\\\"\u0411\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445, \u0448\u0438\u0444\u0440\u044b \u0438 \u0441\u0435\u043a\u0440\u0435\u0442\u044b: \u0433\u0430\u0439\u0434 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u043c\u0443 \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0430\u0442\u043d\u044b\u0445 \u043a\u043b\u044e\u0447\u0435\u0439 \u043e\u0442 Cake Wallet\\\" class=\\\"wp-image-157558\\\" srcset=\\\"https:\/\/forklog.com\/wp-content\/uploads\/21_-1024x563.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/21_-300x165.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/21_-768x422.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/21_.png 1375w\\\" sizes=\\\"auto, (max-width: 1024px) 100vw, 1024px\\\" \/><figcaption>Threshold should be more than 50% of the number of shares. If there are seven shares, set the threshold to four; if eight \u2014 to five.<\/figcaption><\/figure>\n<p>The converter will write encrypted fragments into the <strong>Shares <\/strong>field and separate them with the &#8216;=&#8217; sign.<\/p>\n<figure class=\\\"wp-block-image size-large\\\"><img loading=\\\"lazy\\\" decoding=\\\"async\\\" width=\\\"1024\\\" height=\\\"575\\\" src=\\\"https:\/\/forklog.com\/wp-content\/uploads\/22-21-1024x575.png\\\" alt=\\\"\u0411\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445, \u0448\u0438\u0444\u0440\u044b \u0438 \u0441\u0435\u043a\u0440\u0435\u0442\u044b: \u0433\u0430\u0439\u0434 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u043c\u0443 \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0430\u0442\u043d\u044b\u0445 \u043a\u043b\u044e\u0447\u0435\u0439 \u043e\u0442 Cake Wallet\\\" class=\\\"wp-image-157559\\\" srcset=\\\"https:\/\/forklog.com\/wp-content\/uploads\/22-21-1024x575.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/22-21-300x168.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/22-21-768x431.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/22-21.png 1359w\\\" sizes=\\\"auto, (max-width: 1024px) 100vw, 1024px\\\" \/><figcaption>The converter places the decrypted message into the Reconstructed field to demonstrate the algorithm&#8217;s correct operation.<\/figcaption><\/figure>\n<p>Save the fragments on different media: one in a notebook, another in the cloud, a third in a password manager, and so on. <\/p>\n<p>A hacker cannot recover the data from a single fragment. But if you lose one fragment, you will still be able to decrypt the data for wallet access.<\/p>\n<p>To read the information in the backup, go to the decoding page. Paste several fragments into the Secret shares field and click Determine.<\/p>\n<figure class=\\\"wp-block-image size-large\\\"><img loading=\\\"lazy\\\" decoding=\\\"async\\\" width=\\\"1024\\\" height=\\\"384\\\" src=\\\"https:\/\/forklog.com\/wp-content\/uploads\/23-4-1024x384.png\\\" alt=\\\"\u0411\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445, \u0448\u0438\u0444\u0440\u044b \u0438 \u0441\u0435\u043a\u0440\u0435\u0442\u044b: \u0433\u0430\u0439\u0434 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u043c\u0443 \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0430\u0442\u043d\u044b\u0445 \u043a\u043b\u044e\u0447\u0435\u0439 \u043e\u0442 Cake Wallet\\\" class=\\\"wp-image-157560\\\" srcset=\\\"https:\/\/forklog.com\/wp-content\/uploads\/23-4-1024x384.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/23-4-300x112.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/23-4-768x288.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/23-4.png 1375w\\\" sizes=\\\"auto, (max-width: 1024px) 100vw, 1024px\\\" \/><figcaption>Don\u2019t forget to separate fragments with line breaks so the decoder treats them as separate lines.<\/figcaption><\/figure>\n<p>Initial decoding attempts will look like random bit sequences. This is normal: the decoder tries to restore the original from the first fragment, then adds new ones and repeats. It will yield the original message when the threshold is met.<\/p>\n<h2 class=\\\"wp-block-heading\\\">Conclusion<\/h2>\n<p>There is no perfect method for storing information, but encryption can complicate a hacker&#8217;s work and shield against device failure.<\/p>\n<p>The private key and seed phrase can be stored in a password manager, encrypted with PGP, placed in a secure vault, or split using Shamir&#8217;s scheme. These methods can be combined, for example by storing the password-manager database in the cloud or applying Shamir&#8217;s scheme to the key for PGP encryption.<\/p>\n<p>For storing cryptocurrency, it is better to use mobile wallets such as <a class=\\\"tracking_link\\\" href=\\\"http:\/\/cakewallet.com\\\" target=\\\"_blank\\\" rel=\\\"noopener noreferrer\\\">Cake Wallet<\/a>: they do not store key files in obvious places.<\/p>\n<p><span style=\\\"font-weight: 400;\\\">If you prefer desktop applications, create an encrypted backup and import the private key at every wallet startup, and after finishing remove the contents of the AppRoaming (Windows) and Application Support (macOS) folders.<\/span><\/p>\n<p>Follow ForkLog on YouTube!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Cake Wallet developers discuss open-source software for secure storage and encryption of private keys.<\/p>\n","protected":false},"author":1,"featured_media":53814,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"2","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[1144],"tags":[1142],"class_list":["post-53813","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-longreads","tag-cryptography"],"aioseo_notices":[],"amp_enabled":true,"views":"103","promo_type":"2","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/53813","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=53813"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/53813\/revisions"}],"predecessor-version":[{"id":53815,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/53813\/revisions\/53815"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/53814"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=53813"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=53813"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=53813"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}