Bitcoin Forum
May 02, 2024, 02:10:56 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 [81] 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 ... 265 »
  Print  
Author Topic: [ESHOP launched] Trezor: Bitcoin hardware wallet  (Read 965790 times)
kkurtmann
Sr. Member
****
Offline Offline

Activity: 475
Merit: 250



View Profile WWW
July 19, 2014, 09:06:05 PM
 #1601

good job, I was hoping for the (beer-proof) black one though

https://www.buytrezor.com?a=55c37b866c11   well sir, I like it!
1714659056
Hero Member
*
Offline Offline

Posts: 1714659056

View Profile Personal Message (Offline)

Ignore
1714659056
Reply with quote  #2

1714659056
Report to moderator
1714659056
Hero Member
*
Offline Offline

Posts: 1714659056

View Profile Personal Message (Offline)

Ignore
1714659056
Reply with quote  #2

1714659056
Report to moderator
1714659056
Hero Member
*
Offline Offline

Posts: 1714659056

View Profile Personal Message (Offline)

Ignore
1714659056
Reply with quote  #2

1714659056
Report to moderator
"With e-currency based on cryptographic proof, without the need to trust a third party middleman, money can be secure and transactions effortless." -- Satoshi
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714659056
Hero Member
*
Offline Offline

Posts: 1714659056

View Profile Personal Message (Offline)

Ignore
1714659056
Reply with quote  #2

1714659056
Report to moderator
stick
Sr. Member
****
Offline Offline

Activity: 441
Merit: 266



View Profile
July 20, 2014, 10:04:57 AM
 #1602

good job, I was hoping for the (beer-proof) black one though

The "First Edition" engraving looks SO much better on white one.

AussieHash
Hero Member
*****
Offline Offline

Activity: 692
Merit: 500



View Profile
July 20, 2014, 11:13:30 AM
 #1603

good job, I was hoping for the (beer-proof) black one though

It would be awesome if we could choose black or white
dnaleor
Legendary
*
Offline Offline

Activity: 1470
Merit: 1000


Want privacy? Use Monero!


View Profile
July 20, 2014, 11:17:02 AM
 #1604

The thing is... I like the white 'clean' look, problem is that white can easily become dirty grey...

But really, I want to use my Trezor Smiley The color doesn't matter
Kprawn
Legendary
*
Offline Offline

Activity: 1904
Merit: 1073


View Profile
July 20, 2014, 11:52:10 AM
 #1605

Hope there are talks with Dell to incorporate the Trezor in the next version of their notebooks, seeing that they joined the Bitcoin wave now.

I would like to something like this, be part of hardware, we use every day.  Grin Once it's built in, a sticker must say, "Bitcoin enabled" 

That is my vision for Trezor.

THE FIRST DECENTRALIZED & PLAYER-OWNED CASINO
.EARNBET..EARN BITCOIN: DIVIDENDS
FOR-LIFETIME & MUCH MORE.
. BET WITH: BTCETHEOSLTCBCHWAXXRPBNB
.JOIN US: GITLABTWITTERTELEGRAM
ghgr
Newbie
*
Offline Offline

Activity: 59
Merit: 0



View Profile WWW
July 20, 2014, 01:15:35 PM
 #1606

Good job! I hope to get one one day, too  Smiley

What I couldn't find is the answer to the following two questions (or maybe it is buried somewhere in these 84 pages), not even in their official site:

1) What happens if someone steals the device, dumps its memory and bruteforce the 10000 PINs offline? Is the memory protected, like in a Smart Card? Is the encryption key hardened (like after 100,000 rounds of sha256? Or is it a race between the attacker and the owner to move the funds?

2) How is the interface Trezor-Computer? There must be bidirectional communication (to receive the unsigned transaction and send the signed back). How is it carried out? Is like a network interface? Does it simulate a keyboard, like the Yubikey? In this last case, how does Trezor receive the transaction from the computer? What is the worst that a compromised driver can do to the wallet?


I would love to see these questions answered in the main site (since probably I am not the only one wondering this). For the rest, kudos to you two and keep up the good work!
hibr3d
Full Member
***
Offline Offline

Activity: 271
Merit: 100



View Profile
July 20, 2014, 02:09:55 PM
 #1607

Very nice project right there! I am going to order one soon. This should stop BTC stealling from other's people' wallets. Smiley

klokan
Full Member
***
Offline Offline

Activity: 120
Merit: 100


View Profile
July 20, 2014, 06:26:15 PM
 #1608

Good job! I hope to get one one day, too  Smiley

What I couldn't find is the answer to the following two questions (or maybe it is buried somewhere in these 84 pages), not even in their official site:

1) What happens if someone steals the device, dumps its memory and bruteforce the 10000 PINs offline? Is the memory protected, like in a Smart Card? Is the encryption key hardened (like after 100,000 rounds of sha256? Or is it a race between the attacker and the owner to move the funds?

2) How is the interface Trezor-Computer? There must be bidirectional communication (to receive the unsigned transaction and send the signed back). How is it carried out? Is like a network interface? Does it simulate a keyboard, like the Yubikey? In this last case, how does Trezor receive the transaction from the computer? What is the worst that a compromised driver can do to the wallet?


I would love to see these questions answered in the main site (since probably I am not the only one wondering this). For the rest, kudos to you two and keep up the good work!

1/ To "dump this device memory" you need expensive laboratory equipment and time. I'm not sure how much time you have, but it should be enough to transfer the BTC if the device is lost/stolen. One more comment on this topic: You should still take care of the physical security yourself. But if you do, then with this device you can safely send/receive BTC what was not possible pre-Trezor, because you used (potentially) unsecure PCs.

2/ Thezor connects as Human Interface Device (HID) and sends Google protocol buffers over the USB wire. It does not need driver on PC. When it received data over USB, it parses and validates protobufs and invalid data are rejected. Interface does not allow private keys to leave the device so any valid reqest that is answered by the device cannot leak the keys. The worst what "malitious driver" can do is getting your public keys and btc adresses and it can send various requests to the device that will prompt you for pin entry and confirmation. These include: signing transactions or wiping the device.
stick
Sr. Member
****
Offline Offline

Activity: 441
Merit: 266



View Profile
July 20, 2014, 07:22:07 PM
 #1609

Hope there are talks with Dell to incorporate the Trezor in the next version of their notebooks, seeing that they joined the Bitcoin wave now.

We have not been approached yet, but Dell already mentions TREZOR in a couple of their SecureWorks documents, e.g.:

http://www.secureworks.com/cyber-threat-intelligence/threats/cryptocurrency-stealing-malware-landscape/

http://www.secureworks.com/resources/articles/featured_articles/enterprise-best-practices-for-cryptocurrency-adoption (PDF, page 6)

ghgr
Newbie
*
Offline Offline

Activity: 59
Merit: 0



View Profile WWW
July 20, 2014, 08:06:34 PM
 #1610

1/ To "dump this device memory" you need expensive laboratory equipment and time. I'm not sure how much time you have, but it should be enough to transfer the BTC if the device is lost/stolen. One more comment on this topic: You should still take care of the physical security yourself. But if you do, then with this device you can safely send/receive BTC what was not possible pre-Trezor, because you used (potentially) unsecure PCs.

Good to know that imaging the device is not as simple as plugging the internal memory (SD Card for example) into a PC and bruteforcing the PIN in seconds. I think that should be stated more clearly in the website. You say that the attacker would need expensive laboratory equipment, can you please be more specific, or point me to the doc where they describe this point? It would be important to discard this attack surface.
In any case it would be a good idea to have another Trezor at home ready to send all the funds to a paper wallet, just in case the main one 'disappears'.

2/ Thezor connects as Human Interface Device (HID) and sends Google protocol buffers over the USB wire. It does not need driver on PC. When it received data over USB, it parses and validates protobufs and invalid data are rejected. Interface does not allow private keys to leave the device so any valid reqest that is answered by the device cannot leak the keys. The worst what "malitious driver" can do is getting your public keys and btc adresses and it can send various requests to the device that will prompt you for pin entry and confirmation. These include: signing transactions or wiping the device.

If the first point is solved, and considering that the integrity of the device can be verified by providing a test seed and checking the generated addresses, the only attack surface I can think of is the validation of the data sent by the computer to the device. I'll take a look at how Google's protobuf works.


Is there any reason why they went with BIP 0032 instead of simply SHA256(SEED+idx) or similar? The added complexity of BIP 0032 is justified when we need 'watch only' wallets for example, but in the use case of Trezor, where there is a single user and the privates keys are not supposed to be leaked I don't understand the reason. Maybe they plan to allow Trezor to only receive payments, but not send them? (for example, for waiters in a restaurant).


I find some points unclear in their FAQ. For example, how does the passphrase work? They only say that it sits "on top of the PIN". So am I supposed to write it in the computer's keyboard? Also, in their sentence "[...] we have implemented a safe way of entering PIN, so no keylogger can be used to spy on your PIN" there is no information. I finally found in reddit a video showing how the PIN input works (but not yet the passphrase).

Anon136
Legendary
*
Offline Offline

Activity: 1722
Merit: 1217



View Profile
July 20, 2014, 10:48:06 PM
 #1611


any plans to adapt them to this utility as well? i suppose the imputes would be more on software developers to adapt their software to work with trezors, but none the less there could be some collaboration.

Perhaps I should have phrased this differently.

Its great that you guys are making it imposable for hackers to steal bitcoins, but could this also be applied to make it possible to tie a facebook account to a single trezor so only the person with that trezor could ever access that facebook account? or insert any internet service that requires a login. If this is possible than would they need assistance from your end or could they just build software to meet this need around the hardware that you have designed?

Rep Thread: https://bitcointalk.org/index.php?topic=381041
If one can not confer upon another a right which he does not himself first possess, by what means does the state derive the right to engage in behaviors from which the public is prohibited?
klokan
Full Member
***
Offline Offline

Activity: 120
Merit: 100


View Profile
July 20, 2014, 11:10:57 PM
 #1612


Good to know that imaging the device is not as simple as plugging the internal memory (SD Card for example) into a PC and bruteforcing the PIN in seconds. I think that should be stated more clearly in the website. You say that the attacker would need expensive laboratory equipment, can you please be more specific, or point me to the doc where they describe this point? It would be important to discard this attack surface.
In any case it would be a good idea to have another Trezor at home ready to send all the funds to a paper wallet, just in case the main one 'disappears'.


If the first point is solved, and considering that the integrity of the device can be verified by providing a test seed and checking the generated addresses, the only attack surface I can think of is the validation of the data sent by the computer to the device. I'll take a look at how Google's protobuf works.


Is there any reason why they went with BIP 0032 instead of simply SHA256(SEED+idx) or similar? The added complexity of BIP 0032 is justified when we need 'watch only' wallets for example, but in the use case of Trezor, where there is a single user and the privates keys are not supposed to be leaked I don't understand the reason. Maybe they plan to allow Trezor to only receive payments, but not send them? (for example, for waiters in a restaurant).


I find some points unclear in their FAQ. For example, how does the passphrase work? They only say that it sits "on top of the PIN". So am I supposed to write it in the computer's keyboard? Also, in their sentence "[...] we have implemented a safe way of entering PIN, so no keylogger can be used to spy on your PIN" there is no information. I finally found in reddit a video showing how the PIN input works (but not yet the passphrase).

1/ To read flash of MCU, you need to open it and read it under the microscope. This article is quite old, but gives an idea what needs to be done: http://www.bunniestudios.com/blog/?page_id=40 . Trezor uses STM32F205RE MCU but I did not find anything specific for it online.
2/ https://code.google.com/p/nanopb/
3/ BIP32 allows you to do a lot of cool stuff with a single device. You can have unlimited number of accounts for various crypto-currencies and those don't share the same addresses. You can support message signing, secure login and more. Also, BIP44 provides extensible, secure and standardized way of doing things right instead of doing single-purpose hack to make things work. These standards for example promote no-reuse of addresses, something many multi-sig approaches don't have. Also, this allows offline account discovery. I.e. once your account public BIP32 node is stored in your PC, you don't need your Trezor connected to see the balance.
4/ I agree that the passphrase functionality should be better documented.
Anon136
Legendary
*
Offline Offline

Activity: 1722
Merit: 1217



View Profile
July 20, 2014, 11:21:07 PM
 #1613

You can support message signing, secure login and more.

that would appear to have answered my question. thanks.

Rep Thread: https://bitcointalk.org/index.php?topic=381041
If one can not confer upon another a right which he does not himself first possess, by what means does the state derive the right to engage in behaviors from which the public is prohibited?
klokan
Full Member
***
Offline Offline

Activity: 120
Merit: 100


View Profile
July 20, 2014, 11:35:30 PM
Last edit: July 21, 2014, 06:02:51 AM by klokan
 #1614

You can support message signing, secure login and more.

that would appear to have answered my question. thanks.

I guess this is planned and is being worked on. You should watch this for more details to appear:
http://doc.satoshilabs.com/slips/slip-0013.html

Edit: and it works: https://twitter.com/GreenAddress/status/479939415088062464
Edit2: if you are wondering why Trezor does not have "bit" nor "coin" nor "wallet" in its name then this might be the reason.
cor
Full Member
***
Offline Offline

Activity: 121
Merit: 100



View Profile WWW
July 21, 2014, 08:02:49 PM
 #1615


I find some points unclear in their FAQ. For example, how does the passphrase work? They only say that it sits "on top of the PIN". So am I supposed to write it in the computer's keyboard? Also, in their sentence "[...] we have implemented a safe way of entering PIN, so no keylogger can be used to spy on your PIN" there is no information. I finally found in reddit a video showing how the PIN input works (but not yet the passphrase).



We are working on a better documentation for the users, so here you go:


Multi-passphrase encryption (hidden volumes)

Security researchers have a habit of coming up with spicy names for simple attacks. One such attack is referred to as the $5 wrench attack.



If you have your passphrase memorized and you haven’t written it down anywhere, attackers with physical access to your TREZOR may still be able to extract the passphrase with a $5 wrench. In order to mitigate this risk it is possible to set up your TREZOR multiple times with multiple passphrases. The goal is to have one “spoof” setup that only holds a few bitcoins or bitcents and one “real” setup that holds your fortune.

In order to do this all you need to do is setup your TREZOR with a passphrase, then unplug and replug your TREZOR and enter a different passphrase. Here’s an example:

I setup my TREZOR with the passphrase “lonelypumpkins” and load a large number of bitcoins onto my device. I unplug/replug my TREZOR and enter the passphrase “funnyspirit”. I then send a few bitcents to the “funnyspirit” account. When the thugs come and steal my TREZOR, I can now safely tell them that my passphrase is “funnyspirit”. They will be able to steel a few bitcents from me, but they won’t be able to get at my fortune or even determine that a second passphrase exists.


PIN entry in TREZOR will be explained as well. Meanwhile to get an idea you can watch a video done by molecular https://www.youtube.com/watch?v=vMUfDKfsMFI

molecular
Donator
Legendary
*
Offline Offline

Activity: 2772
Merit: 1019



View Profile
July 21, 2014, 08:06:12 PM
 #1616

The thing is... I like the white 'clean' look, problem is that white can easily become dirty grey...

don't you love the aged beige of old IBM pcs?

PGP key molecular F9B70769 fingerprint 9CDD C0D3 20F8 279F 6BE0  3F39 FC49 2362 F9B7 0769
molecular
Donator
Legendary
*
Offline Offline

Activity: 2772
Merit: 1019



View Profile
July 21, 2014, 08:09:41 PM
 #1617

Good job! I hope to get one one day, too  Smiley

What I couldn't find is the answer to the following two questions (or maybe it is buried somewhere in these 84 pages), not even in their official site:

1) What happens if someone steals the device, dumps its memory and bruteforce the 10000 PINs offline? Is the memory protected, like in a Smart Card? Is the encryption key hardened (like after 100,000 rounds of sha256? Or is it a race between the attacker and the owner to move the funds?

pro tip regarding this: it is possible to setup a passphrase that is "added" to the seed (you have to enter this on the wallet host). That way the passphrase has to be brute-forced, too (or key-logged beforehand). That passphrase is not stored on trezor. You can even use multiple different ones (resulting in different wallets) for plausible deniability.

PGP key molecular F9B70769 fingerprint 9CDD C0D3 20F8 279F 6BE0  3F39 FC49 2362 F9B7 0769
xeroc
Sr. Member
****
Offline Offline

Activity: 345
Merit: 250



View Profile
July 21, 2014, 08:13:14 PM
 #1618

pro tip regarding this: it is possible to setup a passphrase that is "added" to the seed (you have to enter this on the wallet host). That way the passphrase has to be brute-forced, too (or key-logged beforehand). That passphrase is not stored on trezor. You can even use multiple different ones (resulting in different wallets) for plausible deniability.
AWESOME!!!!
cor
Full Member
***
Offline Offline

Activity: 121
Merit: 100



View Profile WWW
July 21, 2014, 08:22:52 PM
 #1619

The thing is... I like the white 'clean' look, problem is that white can easily become dirty grey...

don't you love the aged beige of old IBM pcs?



The plastic material we use for trezor is of a good quality and should be color-stable so I hope (and we were promised) white won't turn beige.


Anyway
I have a black notebook and it's getting light-grey dirty all the time.
I also have a white phone and it looks ehmm lets say not white after few months.
But that's something i throw in my bags with a lot of ladies' stuff.
Most Trezor users will be very organized and will keep their devices in a nice clean and safe place Smiley

Just kidding... Simply, use a PC cleaning wipe if trezor gets dirty.


molecular
Donator
Legendary
*
Offline Offline

Activity: 2772
Merit: 1019



View Profile
July 21, 2014, 08:29:39 PM
 #1620

In order to mitigate this risk it is possible to set up your TREZOR multiple times with multiple passphrases.
 The goal is to have one “spoof” setup that only holds a few bitcoins or bitcents and one “real” setup that holds your fortune.

better make that 2 spoof setups. ;-)

PGP key molecular F9B70769 fingerprint 9CDD C0D3 20F8 279F 6BE0  3F39 FC49 2362 F9B7 0769
Pages: « 1 ... 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 [81] 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 ... 265 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!