Further, users can generate the private keys to their addresses on offline computers which they will never connect to the Internet. The extra-paranoid can even generate their addresses and private keys on offline computers which are then immediately destroyed. Coins stored on these virtual private keys will survive any kind of attack on the network.