unamis76
Legendary
Offline
Activity: 1512
Merit: 1012
|
|
April 25, 2015, 06:13:37 PM |
|
I always feel uneasy to connect a device with private key directly to an untrusted online computer I hope something like a audio modem could be implemented but seems it's too slow to be practically used? https://bitcointalk.org/index.php?topic=135423.0It is already implemented in Electrum, just not easy to setup and use... Be it slow or fast it seems a nice and secure idea, I think...
|
|
|
|
|
gmaxwell
Moderator
Legendary
Offline
Activity: 4270
Merit: 8805
|
|
May 02, 2015, 07:50:44 PM |
|
You are spamming; advertising your product is off-topic for this thread, doubly so since its already been spamvertised once here; but since you've been so bold-- I inquired and found out that your product is based off the same weak, barely tested/reviewed, and slow as heck naive cryptographic code used in the product being discussed here. The information leak here is so severe that I am very doubtful that your (quite laudable) improved hardware isolation can prevent-- e.g. the code in question leaks several bits of information about the key from just the time it takes. Furthermore, Your "directly in silicon" is an FPGA with a loading procedure 'under the seal', this is potentially yet another back door vector, it sinks a lot of power, and really seems to be of dubious value. I would have preferably seen all the external interfaces over simple low-ish-speed serial interfaces with good electrical isolation, rather than a huge power sucking FPGA under the secure-area can. Use of a BGA probably also means you need a 4 layer board for signals routing and thus probably can't use an extra layer as a separate ground to complete the shield can. The FPGA just seems like a costly gimmick to me, and that you're misrepresenting this as a solution to bad cryptographic code (which you have made a similar failure by selecting to use it) doesn't bode well for the security of your product.
|
|
|
|
virtualx
|
|
May 03, 2015, 11:17:20 AM |
|
I always feel uneasy to connect a device with private key directly to an untrusted online computer I hope something like a audio modem could be implemented but seems it's too slow to be practically used? https://bitcointalk.org/index.php?topic=135423.0It is already implemented in Electrum, just not easy to setup and use... Be it slow or fast it seems a nice and secure idea, I think... It should be pretty easy to use because Electrum supports plugins, does it come as a patch for the source code
|
...loteo...
DIGITAL ERA LOTTERY | ║ ║ ║ | | r | ▄▄███████████▄▄ ▄███████████████████▄ ▄███████████████████████▄ ▄██████████████████████████▄ ▄██ ███████▌ ▐██████████████▄ ▐██▌ ▐█▀ ▀█ ▐█▀ ▀██▀ ▀██▌ ▐██ █▌ █▌ ██ ██▌ ██▌ █▌ █▌ ██▌ ▐█▌ ▐█ ▐█ ▐█▌ ▐██ ▄▄▄██ ▐█ ▐██▌ ▐█ ██▄ ▄██ █▄ ██▄ ▄███▌ ▀████████████████████████████▀ ▀██████████████████████████▀ ▀███████████████████████▀ ▀███████████████████▀ ▀▀███████████▀▀
| r | | ║ ║ ║ | RPLAY NOWR
BE A MOON VISITOR! |
[/center]
|
|
|
EliptiBox
Newbie
Offline
Activity: 22
Merit: 0
|
|
May 05, 2015, 09:13:27 PM |
|
You are spamming; advertising your product is off-topic for this thread, doubly so since its already been spamvertised once here; but since you've been so bold-- I inquired and found out that your product is based off the same weak, barely tested/reviewed, and slow as heck naive cryptographic code used in the product being discussed here. The information leak here is so severe that I am very doubtful that your (quite laudable) improved hardware isolation can prevent-- e.g. the code in question leaks several bits of information about the key from just the time it takes. Furthermore, Your "directly in silicon" is an FPGA with a loading procedure 'under the seal', this is potentially yet another back door vector, it sinks a lot of power, and really seems to be of dubious value. I would have preferably seen all the external interfaces over simple low-ish-speed serial interfaces with good electrical isolation, rather than a huge power sucking FPGA under the secure-area can. Use of a BGA probably also means you need a 4 layer board for signals routing and thus probably can't use an extra layer as a separate ground to complete the shield can. The FPGA just seems like a costly gimmick to me, and that you're misrepresenting this as a solution to bad cryptographic code (which you have made a similar failure by selecting to use it) doesn't bode well for the security of your product. Thank you for raising important issues. To refrain from spamming, the following prior link discusses the technical points raised here: https://bitcointalk.org/index.php?topic=970998.msg11295854#msg11295854EliptiBox Team
|
|
|
|
lay785
|
|
May 07, 2015, 11:18:15 AM |
|
Wow much respect for johoe.
He should be hired as a professional tester by BTC hardware wallet companies.
Just curious what Johoe himself uses to store his bitcoins? Hardware wallet? Air-gapped machine? Multisig?
|
|
|
|
btchip
|
|
May 07, 2015, 12:20:19 PM |
|
Wow much respect for johoe.
He should be hired as a professional tester by BTC hardware wallet companies.
Hired could make him less independent,donating to pay for testing equipment upgrade makes more sense iMHO. At least that's what I plan to do.
|
|
|
|
Newar
Legendary
Offline
Activity: 1358
Merit: 1001
https://gliph.me/hUF
|
|
May 31, 2015, 02:02:55 AM |
|
I always feel uneasy to connect a device with private key directly to an untrusted online computer I hope something like a audio modem could be implemented but seems it's too slow to be practically used? https://bitcointalk.org/index.php?topic=135423.0It is already implemented in Electrum, just not easy to setup and use... Be it slow or fast it seems a nice and secure idea, I think... Any wallet software that has offline signing functionality will work using software like minimodem. An example using Armory: https://bitcointalk.org/index.php?topic=735111.0How fast it works depends on your tx size. I agree slow don't matter much in this case, as security should be our main concern.
|
|
|
|
Newar
Legendary
Offline
Activity: 1358
Merit: 1001
https://gliph.me/hUF
|
|
May 31, 2015, 02:06:31 AM |
|
Wow much respect for johoe.
He should be hired as a professional tester by BTC hardware wallet companies.
Just curious what Johoe himself uses to store his bitcoins? Hardware wallet? Air-gapped machine? Multisig?
He mentions it at the bottom of his report: I own two TREZORs myself (one for storing my savings and one for hacks like this) and I am still thinking hardware wallets are the best way to protect against most attack vectors.
|
|
|
|
dasource
|
|
June 02, 2015, 12:01:13 PM |
|
<snip>
My next project is analysing the Ledger. This has no filtering caps worth mentioning. It is just the secure element with a USB connector. The oscilloscope shows much more details. However, some of it is noise the device is producing deliberately to make these kinds of analysis more difficulty. It also randomizes the timing. I will probably report more of this, once the analysis is finished. Still, even with the secure elements, you can see a lot of details of the executed code on the power line. The producers of the Ledger are aware of this and use constant time code to compute the public from the private key. We will see, whether they did this right.
Keep up the great work and looking forward to seeing your analysis of Ledger Wallet once ready.
|
^ I am with STUPID!
|
|
|
ed_teech
|
|
June 02, 2015, 01:41:10 PM |
|
This was very cool, how do they make this immune to the side channel attack ?
|
|
|
|
dasource
|
|
June 02, 2015, 03:29:39 PM Last edit: June 02, 2015, 05:19:08 PM by dasource |
|
This was very cool, how do they make this immune to the side channel attack ?
Best option would be to use multi-sig across multiple devices ... It could be a couple of years before you can trust a single device with your "stash"
|
^ I am with STUPID!
|
|
|
michinzx
|
|
June 02, 2015, 05:10:24 PM |
|
great read, crazy what people can do with technology these days. even though a trezor might be considered incredibly safe, its clear there are always workarounds for anything.
|
|
|
|
Newar
Legendary
Offline
Activity: 1358
Merit: 1001
https://gliph.me/hUF
|
|
August 04, 2018, 12:48:26 PM |
|
I get a malware warning from WOT on this website. Are there other (more established) sites who published this article also. Otherwise could someone summarize the main points? The one in the first post? https://web.archive.org/web/*/http://johoe.mooo.com/trezor-power-analysis/ http://archive.is/WhLkl
|
|
|
|
Kprawn
Legendary
Offline
Activity: 1904
Merit: 1074
|
|
August 08, 2018, 07:40:58 PM |
|
You obviously have to be in possession of the physical device to use the Oscilloscope, so by the time the owner of the device picked up that his Trezor was stolen, he or she could have used the seed to access the coins and to move it to another Bitcoin address. This is not a massive threat, because this is very difficult to pull off and you need specialized tools. To protect you from this, make sure you know where your device is and do not store your device with your seed.
|
|
|
|
|