Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> when the Trezor is powered on, its firmware (basically, the Trezor’s operating system) copies its PIN and 24 seed words into the Trezor’s SRAM [...] in an unencrypted form.

> If you do what is called a “soft reset” on the device—accomplished by delicately shorting two pins on its printed circuit board—you can then install the exploit firmware without wiping the SRAM’s memory. This allows you to see your PIN and seed numbers.

There's the primary vulnerability.

I fear there are other vulnerabilities that could defeat the anti-PIN cracking delays...

Old-school pay-tv hackers (Chris Tarnovsky anyone?) would probably have a field-day with micro-probers and more invasive recovery techniques on these hardware wallets. At $100 and in small volumes (plus the cost of flashy UIs and marketing), who knows how secure the silicon is.

The more I think about it, the more I think PIN-enabled wallets are the wrong way to go for long-term storage. Print your recovery words, store them appropriately (not all with one person and/or in one place, etc.) and then crush the generation device. Hopefully its random numbers can't be predicted.



I cant be bothered to check the vendor of Arm M3 this dongle uses, but most cheap non hardened microcontrollers are trivial to bypass read protection

for example budget M0 STM32F0 ttps://www.aisec.fraunhofer.de/en/FirmwareProtection.html


Treat the hardware wallet as securely as the seed words. The advantage is being able to sign and spend from the addresses on the hardware wallet without exposing to an untrusted computer each time you spend.


You're assuming the hardware wallet to be a trusted computer...


serious question. is a handful of 16 sided dice a safe generation method?


Nothing is perfect, but I'd trust it after doing a small trial, and maybe my own conversion mapping (e.g. 1=16, 2=14, 3=15, etc.) just to satisfy some amount of paranoia.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: