Search content
Sort by

Showing 20 of 41 results by BobbysTransactions
Post
Topic
Board Hardware wallets
Merits 1 from 1 user
Re: Secure Element in Hardware Wallets
by
BobbysTransactions
on 21/07/2025, 11:10:13 UTC
⭐ Merited by satscraper (1)
Can we all agree a definition for "open source" when referring to SEs?
Open Source in my table means that firmware for specific secure element is released with open source code.
I won't nitpick and get into details with that, but there is a cleat difference between open source, closed source, and source verified.

Yes, but the clear message here is that it is the firmware that is open source, not the SE itself. I think that talk of "open source SEs" and the like is very misleading.
Post
Topic
Board Hardware wallets
Merits 1 from 1 user
Re: Secure Element in Hardware Wallets
by
BobbysTransactions
on 16/07/2025, 13:00:35 UTC
⭐ Merited by vapourminer (1)
Can we all agree a definition for "closed source"?

|Party||Closed Source Trust Required||Open Source Trust Required|
1. Chip Hardware Description Language DeveloperYesYes
2. Design Automation Software DeveloperYesYes
2. Chip FoundryYesYes
3. SE VendorsYesYes
4. Firmware DevelopersYesNo
5. Certification BodiesYesYes

Post
Topic
Board Hardware wallets
Re: Critical vulnerability discovered in ESP32 chip
by
BobbysTransactions
on 02/07/2025, 08:53:13 UTC
All chips can have vulnerabilities, that is why I am supporting open source chips like Tropic01.
That doesn't mean they are perfect, but they are more open and they are not hiding bugs.

The Tropic01 chip is not open source as, unlike software, you cannot simply compile your own binary (hardware). Using "open source" in the context of hardware is misleading imo. Tropic Square claims to be auditable but looking at their FAQ there are obvious limits:

Quote
What about the TROPIC01 chip makes it auditable?
Tropic Square owns the chip design and is able to provide the documentation and source-code for auditability– without the need of signing an NDA. We also provide development kits and chip samples for evaluation and security testing. We encourage developers to:

Validate and pentest TROPIC01
Prototype secure embedded systems with TROPIC01
Share feedback and testing result with us

Note: Publication and sharing of the design and implementation details have no adverse effect on the system's security. We however, do not disclose critical design details like the position of laser or EM (electromagnetic field) detectors.

Unless they allow anyone who asks to physically audit the various stages of the chip design and physical production then the audit is very limited in scope.
Post
Topic
Board Hardware wallets
Re: Bitcoin Threat Model - State Actors and HW Security - Chip Supply Chain Attacks
by
BobbysTransactions
on 16/06/2025, 14:59:59 UTC
I think the best way to protect from this is two-fold. 1) Cybersecurity, and specifically the art of finding bugs, needs to be made an essential part of Bitcoin education. 2) The community needs to start producing its own chips. Whether by 3D printing or some other way.

Yes, some kind of hardware that can sign transactions that can be built and verified at home using more standardized building blocks rather than a fully integrated Secure Element. I haven't looked into the details but something *like* this betrusted.io device that incorporates a user-coded FPGA  in lieu of a microprocessor.

https://betrusted.io/

"Transparency is the bedrock of trust. Understanding what makes a thing tick gives us an evidence-based reason to trust that it works as intended. Betrusted is unique in that, instead of a black-box CPU chip, it uses reconfigurable hardware – an FPGA – for computation. This means you can compile our reference processor design from source, instead of simply having to accept on faith that this black epoxy rectangle contains precisely the circuits it advertises. "
Post
Topic
Board Hardware wallets
Re: Bitcoin Threat Model - State Actors and HW Security - Chip Supply Chain Attacks
by
BobbysTransactions
on 16/06/2025, 14:53:52 UTC
Your concern can be addressed by using the multisig wallet where HWs act as cosigners. The most secure setup involves the quorum of devices from different manufacturers, so that each one serves as a safeguard against potential compromise of the others.

True, but this doesn't help if every SE vendor is compromised and the kind of threat model I'm envisioning this is a credible scenario.
Post
Topic
Board Hardware wallets
Re: Bitcoin Threat Model - State Actors and HW Security - Chip Supply Chain Attacks
by
BobbysTransactions
on 16/06/2025, 14:50:44 UTC
I have the uncanny feeling that the only "state actor" that would try to attack Bitcoin itself is not Russia or the USA, but North Korea. They are exactly the kind of people who would attempt something like this.

If this attack were to be realised it is almost certainly would be a joint operation of the western intelligence services (CIA, MI6, DSGE, Mossad etc.).
Post
Topic
Board Hardware wallets
Re: Help needed: my BTC and ETH disappeared from Ledger Nano S wallet (1 BTC + 0.3 E
by
BobbysTransactions
on 29/04/2025, 09:02:42 UTC
Closed source code cannot be trusted, because closed source code cannot be verified.  Anyone who says otherwise is someone you should not trust, if you value the security of your Bitcoin.

But you're happy to trust the "closed source" hardware no matter what?
Post
Topic
Board Hardware wallets
Re: Bitcoin Threat Model - State Actors and HW Security - Chip Supply Chain Attacks
by
BobbysTransactions
on 28/03/2025, 17:44:28 UTC
Either way it's the same.
If you want to get to a certain persons BTC / crypto there are much easier ways to get to a certain person or a small group then to have a chip maker install a back door that you hope they don't find.
I'm not sure this is true. The fact that a key can be leaked means that a government can drain your wallet covertly and with impunity. It is not possible to do this with the current financial system where bank transfers and thefts can be traced to an individual or organisation or government. This gives them immense power over individuals to directly interfere in their financial affairs in a way that can be covered up as an op-sec failure on their behalf. Other ways to get at an individual involves trails of evidence and potential witnesses.

“Hope you don’t find” implies that it’s relatively straightforward for 3rd parties to verify back doors etched onto the wafer when it isn’t. Government agencies can and do keep secrets when they want to.

A small percentage of people use crypto, a smaller number use hardware wallets, an even smaller number use a wallet with a chip made by manufacturer X.
Correct, but I believe that Bitcoin is going to become a rival to the existing monetary system. Its use will expand and HW are presented as the most secure and optimal solution. The fact that people use software wallets strengthens my case as it’s much easier to leak keys with SW.

It's just not worth the effort either way.
Governments have the budget and resources and time to disrupt crypto in general and the same to do a targeted trap for any particular user or small group of users.

I think it really is worth it for the reasons given. Again, the objective is not to disrupt the Bitcoin monetary systems as a whole – quite the opposite. The aim is to grow it but have the ability to covertly target individuals as an when required.

Even if 1 in a 1000 individuals had their BTC drained, I doubt that would be enough to cause general alarm, as its very difficult to pinpoint how a key was leaked.

I agree that this is all very theoretical and amounts to a bit of storytelling. AFAIK there is zero evidence this is happening. However, it’s not for me to prove it. The onus is on the "Don't Trust, Verify" BTC proponents to justify that what I’m hypothesising is false.
Post
Topic
Board Hardware wallets
Re: Secure Element in Hardware Wallets
by
BobbysTransactions
on 11/03/2025, 09:37:14 UTC
If you say it isn't fully open, then maybe specify in more detail what's not open?

The open elements are*:

  •     The digital logic that processes the user’s data
  •     The whole data path from the interface (The CPU to the hardware cryptographic accelerators and encryption engine)
  •     SDK software
  •     Embedded firmware (planned to be open, practicalities still in discussion)

‍The closed aspects (the remaining parts):

  •     The infrastructure and technology required to produce the chip
  •     The standard cells, power supplies, and blocks required for security that don't exist as open source IP blocks like TRNG, PUF, flash and OTP memory

*Our SDK has been published on github and can be found here. It is provided under an Apache License.

The TROPIC01 embedded firmware, digital logic, and chip resources have not yet been published on github. That is a work in progress. Engineers, open-source developers, pen-testers, and anyone else interested in access to these components should contact Tropic Square at support@tropicsquare.com


It's not open in the sense that I cannot independently verify that the functions actually installed on the device are what are claimed, and that there aren't hidden functions installed on it that are not.

Open source software means you can compile a binary yourself and run it - this is not possible with hardware.

If I told you my software was open source but only part of it - you would treat the entire thing as closed.  To me, the words, open and closed have very little meaning with harddware chips.
Post
Topic
Board Hardware wallets
Re: Secure Element in Hardware Wallets
by
BobbysTransactions
on 09/03/2025, 16:28:17 UTC
Now it is confirmed that Tropic01 is open source with with open architecture, and it has transparent auditability.
It isn't fully open. Therefore it is closed (as any closed elements can poison the open ones).

I'm not sure what is meant by "transparent audibility". From their website they claim:
Quote
What sets TROPIC01 further apart from other chips is transparent auditability. TROPIC01 testing is led by experts, customers, and the open-source community to ensure verifiable trust and reliability, with public disclosure of results so that anyone can verify for themselves.
I'm not sure what this means in practice.
Post
Topic
Board Hardware wallets
Re: Bitcoin Threat Model - State Actors and HW Security - Chip Supply Chain Attacks
by
BobbysTransactions
on 05/03/2025, 04:17:57 UTC
In the real cost of running a government if any of them truly wanted to disrupt crypto and make people loose faith and money in it till is disappeared there are dozens of cheaper / faster / easier ways to do it then having James Bond sneak into an engineers lab and change chip design to implement a vulnerability that may or may not wind up in a device that people use to secure BTC / crypto.
You're assuming that the objective is to destroy confidence in the network, rather than targeted attacks.

Given that Oracle was literally founded out of a CIA project called "Project Oracle", Facebook was created out of DARPA's LifeLog, and the UK government's Investigatory Powers Act (2016) etc. demands manufacturers to insert backdoors in encryption etc., then I don't think it's particularly schizo to think that they have the ability to secretly insert certain hardware functions in a few key chip manufacturers.

Post
Topic
Board Hardware wallets
Merits 4 from 3 users
Re: Secure Element in Hardware Wallets
by
BobbysTransactions
on 27/02/2025, 15:58:31 UTC
⭐ Merited by Pmalek (2) ,JayJuanGee (1) ,Cricktor (1)
I don't really care about EAL numbers so much since nobody can verify this for closed source secure elements.
Hardware wallet can have highest possible EAL rating and it can still be total crap.

Exactly this. I had a look at ISO/IEC 15408 which defines the EALs and I wasn’t very impressed. Here are my observations:

1. The standard is full of acronyms and jargon. For example: the standard says that an Evaluation Assurance Level (EAL) is assigned to a Target of Evaluation (TOE) based on the Security Target (ST). The TOE implements TOE Security Functions (TSF) to meet the security requirements specified in the ST. Got that? Excessive use of such things is generally a sign that it’s intended to dissemble.

2. The EAL is meaningless without the Security Target (ST). The ST is basically a specification that lists the security properties of the TOE (the secure element to be assured in this case). From the standard:
 “A ST is a document that describes a specific TOE, the conformance claims applicable to the evaluation of the TOE, the security problem to be addressed, the security objectives for the TOE and its operational environment, the security requirements applicable to solving the stated security problem, and additional material necessary to describe the TOE sufficiently for evaluation. STs are generally based upon PPs or PP-Configurations that describe a security problem and security requirements for a TOE type that is relevant to the specific TOE.”

3. The assurance requirements are very vague, non-specific and of a functional nature. AFAICT there a no prescriptive methods identified to check for specific vulnerabilities.[/li][/list]


Given the above I am confident that that if a SE manufacturer claims an EAL level, but does not publish their Security Target (ST) specification in the public domain, then such claims are meaningless.
Post
Topic
Board Hardware wallets
Re: Bitcoin Threat Model - State Actors and HW Security - Chip Supply Chain Attacks
by
BobbysTransactions
on 21/02/2025, 13:29:20 UTC
The coordinator app generates a QR code from the unsigned transaction for the hardware wallet to sign.  The hardware wallet generates another QR code with the signature.

If the hardware wallet has been hacked to change the data in any way, the coordinator app won't accept the signature, because the signature won't be mathematically correct for the transaction on the coordinator app.

That's a really important concept to understand.
The Bitcoin blockchain is susceptible to key leakage via the OP RETURN field and a narrowband subliminal channel based on brute-forcing the random factor of the signature scheme.

That's a really important concept to understand.

https://www.annessi.net/data/2018-subliminalblockchain_preprint.pdf
Post
Topic
Board Hardware wallets
Re: Bitcoin Threat Model - State Actors and HW Security - Chip Supply Chain Attacks
by
BobbysTransactions
on 21/02/2025, 13:14:17 UTC


The K210 hardware Krux runs on has no wifi.
It has no bluetooth.
And the device is not connected to a computer or phone.
This is completely irrelevant to the discussion.

The only ability the device has to reach the outside world is via QRs displayed on the screen, such as Bitcoin signatures.  And Bitcoin signatures are math.  If anything on a hardware wallet attempts to change any detail in a transaction, the signature will fail.
Again, irrelevant; Bitcoin signatures are not subliminal-free.
Post
Topic
Board Hardware wallets
Re: Bitcoin Threat Model - State Actors and HW Security - Chip Supply Chain Attacks
by
BobbysTransactions
on 20/02/2025, 13:32:54 UTC

Here's what BobbysTransactions said:

Quote
This is all irrelevant if the Kendryte K210 chip on your device is hard-coded with a back door to leak your private key subliminally in a signed transaction.

He's not familiar with this stuff at all.

First, K210 devices aren't hardware wallets.  They're primarily used to make DIY toy robots and old school 1980s style handheld video games.  The devs at Krux realized some K210 devices have a camera and a large screen, which makes the ones with no radios perfect for DIY airgapped hardware wallets.  Remember, we're talking about devices that cost as little as $35 (though I don't recommend the $35 ones.  They're tiny and don't have a touchscreen - they're more like a Jade).

Did you even read the whole thread? 

Okay, it's arguably better if the K210 chips are used for generic devices but the material point still stands: you cannot verify the hardware and backdoors can be inserted without your knowledge.

Second, unlike some hardware wallets, not only is every line of code open source...  the device also shows you everything on a large screen, and the output is plaintext converted into a QR code.

The point is that the hardware is NOT open source.

Don't trust the QR code?  No worries.  Turn it into text and check it.  As the saying goes: "Don't trust. Verify."

Also, Krux isn't an app.  It's the OS, which means it's not being run on top of some other OS.  That's a benefit too.

Trusting any closed source code is a no for me.  Bitcoin is open source.  The code I use to secure it is open source, including both my hardware wallet and also the watch-only companion apps (BlueWallet, Sparrow, and occasionally Electrum).


But you are trusting close source - just in hardware form.

Post
Topic
Board Hardware wallets
Re: Bitcoin Threat Model - State Actors and HW Security - Chip Supply Chain Attacks
by
BobbysTransactions
on 13/02/2025, 10:02:52 UTC
What do you suggest that we as end-users and Bitcoin enthusiasts do about it? Or anyone else for that matter. Is the solution to create and run our own companies to build chips and components that go into hardware wallets?

No, we need a way of building hardware from scratch using simpler components that is very difficult to insert usable back doors into. And we need subliminal-free signed transactions.
Post
Topic
Board Hardware wallets
Re: Bitcoin Threat Model - State Actors and HW Security - Chip Supply Chain Attacks
by
BobbysTransactions
on 13/02/2025, 10:00:00 UTC
Airgapped - hackers can't reach it over the internet, or even via a hacked computer or phone.

Stateless - my seed & wallet get wiped out every time the device shuts down or reboots.  If the device gets stolen, there's nothing on it.


This is all irrelevant if the Kendryte K210 chip on your device is hard-coded with a back door to leak your private key subliminally in a signed transaction.
Post
Topic
Board Hardware wallets
Re: Bitcoin Threat Model - State Actors and HW Security - Chip Supply Chain Attacks
by
BobbysTransactions
on 12/02/2025, 11:39:40 UTC
As well as distributed ledgers, cryptography and the consensus mechanism, the Bitcoin security chain includes key generation and management for storing keys and signing transactions.

If security is dependent on the weakest link, then why does "Verify, Don't Trust" for the monetary protocol not apply equally to the hardware used for key management? It seems that when it comes to HW, "Trust Me, Bro" is the prevailing ethos.
Post
Topic
Board Bitcoin Technical Support
Re: How do I identify the valid checksums for bip39 if I generate 11/12 of the word?
by
BobbysTransactions
on 10/01/2025, 14:40:10 UTC
If you select 12 words, there's a big probability that your seed phrase doesn't pass the checksum.
Instead, you can select 11 words and then try to find a word which lead to a valid BIP39 seed phrase. By valid, I mean it passes the checksum
This is completely feasible, but it's not a common method for generating a seed phrase.
If you insist on generating your seed phrase in this way, you should make sure that the words are picked 100% random.

Why is this not a more common way for generating 12 words? 

I intend to flip a coin 121 times, convert to BIP39 words and then enter them into my HW with a random 12th word until it accepts the mnemonic as valid (passing checksum). This way I'm not relying on the HW RNG.

This seems to me to be much better than tyting to use tools like SeedSigner and https://iancoleman.io/bip39/.

Post
Topic
Board Economics
Re: World moving towards we gona see first trillionaires
by
BobbysTransactions
on 08/01/2025, 09:02:43 UTC
So trillionaires are coming

Serious question: What makes you think that trillionaires don't already exist?  If there were people with unimaginable concentrations of inter-generational wealth, why would they make themselves public?