Post
Topic
Board Hardware wallets
Re: [ESHOP launched] Trezor: Bitcoin hardware wallet
by
randomguy7
on 10/08/2014, 11:48:57 UTC
However: should you make a mistake and have to enter re-do the whole process, the random words will be known to a keylogger, because trezor chooses different random words every time. So the words identical between the 2 restore-processes (1 failed, 1 succeeded) will be the seed words.

With a 12 word seed theres only 12! = 479,001,600 combinations. So better not "try again" after a failed restore from seed on the same machine if you have a short seed like that... or just just 24 word seed to be safe.


Definitely needs that offline recovery tool

Or a 36 seed recovery.

Another possibility would be that a certain TREZOR has hardware specific "random words" in the seed recovery. So even if you recover twice on the same trezor, the attacker wouldn't know what the wrong words were.

The random words could probably be derived from the seed (hash("some data, no matter what, but always the same" + + ) and repeat a gazillion times or something like that) so that they stay the same for every recovery of a specific seed.

edit: Just rethought that. This wouldn't work as the new trezor doesn't know the seed yet and can't calculate the random words.