HCP
Legendary
Offline
Activity: 2086
Merit: 4361
<insert witty quote here>
|
I think the point is... that once you use a BC Vault, you are essentially "locked in" to the BC Vault. As the OP asked and BC Vault confirmed, the backups can only be used by another BC Vault device.
There is (currently) no way to be able to recover your funds without a BC Vault device as BC Vault are not willing to release their recovery software at this time. This means, should your device be lost/damaged/stolen... you have no access to your funds, until you are able to get your hands on another device. In event that "the company stops trading", they have promised to release the recovery software.
Compared with other BIP39 compatible hardware wallets that can be recovered using any other BIP39 compatible hardware or software wallet.
As BC Vault have mentioned, users are free to make their own choices, but they should know all the facts so they can make an informed choice.
|
|
|
|
o_e_l_e_o
In memoriam
Legendary
Offline
Activity: 2268
Merit: 18747
|
|
October 03, 2019, 10:15:26 AM |
|
but I feel this additional hard wallet is fine to be added to existing ones, and I encourage others to make further hardwallets. I would also encourage a user to have more than one hardware wallet, particularly from different companies in case there is a critical bug or vulnerability in one which makes it unsafe to use. There is little point, however, in having hardware wallets which are completely incompatible with each other. BC Vault can't be used as a back up for another hardware wallet, and other hardware wallets can't be used to back up a BC Vault. I don't see the benefit at all of having two BC Vaults over one Ledger and one Trezor, for example. I have no issues with encrypted back ups, but the whole point of a back up is that you can access it when you need to in an emergency. Currently, the only way to access your BC Vault back up is to by another device and wait several days for delivery, which is far less optimal than near instant access of BIP39 back ups, as HCP has pointed out. We also have no idea if their recovery software works, is safe, is secure, or even exists, because they refuse to release it. As I said above, one of the founding principles of bitcoin is to be trustless. This wallet, currently, requires a lot more trust than any other major hardware wallet. If they released their recovery software so it could be reviewed, audited, and tested, and it worked as advertised, then it would be a different story. You could now extract your private keys and import them in to another wallet as required, and would no longer be trusting a third party's promise to let you have access to your private keys.
|
|
|
|
alien2108
Copper Member
Newbie
Offline
Activity: 27
Merit: 1
|
|
October 03, 2019, 10:25:43 AM |
|
If they released their recovery software so it could be reviewed, audited, and tested, and it worked as advertised, then it would be a different story. You could now extract your private keys and import them in to another wallet as required, and would no longer be trusting a third party's promise to let you have access to your private keys.
Quick response: What you are saying makes no sense at all. How do you think we sign the actual transactions, but with decrypted private keys?! Obviously it works. The rest of your claim "reviewed, audited, and tested" does not make any sense for any non open source software. I explained our reasons for not open sourcing up to this point. You might agree with them or not, but let's not repeat same thing over and over again.
|
|
|
|
o_e_l_e_o
In memoriam
Legendary
Offline
Activity: 2268
Merit: 18747
|
|
October 03, 2019, 10:34:01 AM |
|
What you are saying makes no sense at all. How do you think we sign the actual transactions, but with decrypted private keys?! Obviously it works. We are not talking about your hardware wallet here, but about your recovery software. You have said that if you go out of business, nobody can access their keys without your recovery software. At this point, nobody except you can even say if this software exists or not. How do we know it will decrypt and display the keys safely, and not accidentally store them in plain text in a file somewhere on our system, for example? How do we know it won't email all of our keys off to your email address? After all, by this point you will already have gone out of business, so what do you have to lose? All we can go on is your word. Hence, trust. I can sense we will never see eye to eye on this, so we are going to have to agree to disagree, but you will never convince me to trust my private key back up to the promise of some future software being released by an internet stranger.
|
|
|
|
alien2108
Copper Member
Newbie
Offline
Activity: 27
Merit: 1
|
|
October 03, 2019, 04:10:36 PM |
|
Finally had a time (we just released major upgrade for BC Vault - EOS, TRX, BNB, GRS...)...
HCP stands correct. One needs another BC Vault device to restore the BC Vault backup. Contrary to BIP39, the backup includes many other things BIP39 just does not cater to, so it is not a closed-circuit system with the sole intention of protecting tradecraft, but rather to enable features other cryptocurrency hardware wallets on the market today do not offer. It is the basic principle of security, which usually does not go hand in hand with commodity. Going back to the HSM analogy: one cannot simply mix-up data from the highest level of security-enabled devices among each other. In case of losing/destroying/fault of the device, one will also have to buy a new HW device with Trezor, Ledger… since importing the 24 words into any software wallet renders the sole purpose of using HW wallet worthless, as one risks exposing all private keys to a perhaps “insecure” device or service. Safely storing the seed recovery phrase entails additional cost as these usually cost more than the hardware wallets themselves. With BC Vault, the private keys are stored in FRAM, which is less likely to break down compared to Flash used in benchmark devices. Firmware upgrades are always done on a non-active partition to protect the device from faults during any upgrade procedures so one can rest assured not being stuck with “update” screen. We have just released an update that includes: - Support for Binance BNB on the new Binance chain (BNB as the ERC-20 token was supported by from the initial release) - Support for EOS with stake/unstake capabilities and new account creation from within the app - support for Tron TRX - A previous update saw the addition of the Stellar XLM and Ripple XRP As of now BC Vault still does not allow the export of private keys but we are considering all options and if we so decide, we will get back to you. »It is better to debate a question without settling it than to settle a question without debating it.«
|
|
|
|
o_e_l_e_o
In memoriam
Legendary
Offline
Activity: 2268
Merit: 18747
|
|
October 03, 2019, 04:48:31 PM |
|
One could always send from one to the other across the blockchain ledger. You can't do that if your hardware wallet is lost and you can't access your keys because they haven't released their back up software. In case of losing/destroying/fault of the device, one will also have to buy a new HW device with Trezor, Ledger… since importing the 24 words into any software wallet renders the sole purpose of using HW wallet worthless, as one risks exposing all private keys to a perhaps “insecure” device or service. With BIP39 I can very securely restore without having to buy a new hardware wallet by using an air gapped machine and using that to sign transactions generated on a live watch only wallet. As of now BC Vault still does not allow the export of private keys but we are considering all options and if we so decide, we will get back to you. Therein lies my issue. Why should you get to decide if I can extract my private keys?.
|
|
|
|
alien2108
Copper Member
Newbie
Offline
Activity: 27
Merit: 1
|
|
October 04, 2019, 06:50:35 AM |
|
As of now BC Vault still does not allow the export of private keys but we are considering all options and if we so decide, we will get back to you. Therein lies my issue. Why should you get to decide if I can extract my private keys?. [/quote] Actually we do not prevent you. You CAN extract your private keys, but in encrypted form (encrypted with your passwords+pins) -> backup. As mentioned this is due to security reasons and we might add functionality to extract raw private keys in the future with a lot of warnings etc. so even the most basic user will truly understand what are security implications of such operation.
|
|
|
|
o_e_l_e_o
In memoriam
Legendary
Offline
Activity: 2268
Merit: 18747
|
|
October 04, 2019, 11:27:28 AM |
|
You CAN extract your private keys, but in encrypted form (encrypted with your passwords+pins) -> backup. But am I correct in saying I cannot decrypt my encrypted keys without your software which you refuse to release? If so, then you are arguing semantics. The whole point of a back up is that it is accessible by me when I need it to be.
|
|
|
|
o_e_l_e_o
In memoriam
Legendary
Offline
Activity: 2268
Merit: 18747
|
|
October 05, 2019, 10:20:37 AM |
|
what if someone got a hold of the encrypted data? It shouldn't matter. If the data is encrypted properly, then an attacker shouldn't be able to do anything with it. The only way that this would be a problem is if they are using a weak encryption protocol. the less info that idiot has, the safer the rest of us can be, from such stupidity. Then why have your data backed up electronically at all? Just use BIP39, back up your words on paper, and be done with it.
|
|
|
|
alien2108
Copper Member
Newbie
Offline
Activity: 27
Merit: 1
|
|
October 05, 2019, 01:59:35 PM |
|
No worries, once we rethink how and when we will release private key export as I said! We do not want to rush such sensitive operation!
|
|
|
|
mocacinno
Legendary
Offline
Activity: 3584
Merit: 5243
https://merel.mobi => buy facemasks with BTC/LTC
|
|
October 05, 2019, 07:35:28 PM |
|
I don't want to get dragged into this discussion, but the direction it's taking more or less forces me to post...
You tell us you might not release the decryption tool because it would allow somebody with access to a lot of resources to reverse engineer your tool and use the knowledge to decrypt somebody's backup. This is a valid concern, but this kind of tought pattern comes at a price: if you don't release the source code of a working decryption tool, how will we ever be sure our backups are safe? For all we know, you might be encrypting the backupset using Des or rc4, or, God forbid, an algorithm you yourself created...
Delivering no, or a back box, decryption tool requires a lot of trust from the crypto community... Trust you have not yet earned...
If you are so worried about releasing a decryption tool, it makes me wonder how those backups are encrypted... If you messed up, a 3 letter agency won't need any tools released by you, they'll be able to decrypt our backups just fine... The only way for you and the community to be certain about the security of the backup encryption is if we can look into the tool's source code... Only if we see the code and it's inspected by some trusted devs will I put any trust in the tool and your product... Open source decryption tools will make your backup safer. If weaknesses are found, the odds are much bigger they're going to be reported for a bug bounty so you can at least fix them
|
|
|
|
alien2108
Copper Member
Newbie
Offline
Activity: 27
Merit: 1
|
|
October 06, 2019, 07:30:31 AM |
|
We use standard crypto algorithms considered most secure by todays standards, so no worries here. You can NOT decrypt backups without global pin, password pin, wallet pin, wallet password! So again no worries here! You run up the wrong alley...we did not “invent” some uber encryption algorithm and just use it. Those things are tricky and we are not playing with fire.
It is just a couple of really good ideas on how to make life of potential attacker really hard that we do not want to divulge straight away.
All this put aside, every single BC Vault includes Bounty Wallet with more than 1 BTC. You can somehow crack it, it’s yours. Up to today, money is still there. So we dare to put money where our mouth is.
|
|
|
|
mocacinno
Legendary
Offline
Activity: 3584
Merit: 5243
https://merel.mobi => buy facemasks with BTC/LTC
|
|
October 06, 2019, 09:15:38 AM Last edit: October 06, 2019, 09:59:57 AM by mocacinno |
|
I'm going to leave a quote from Satoshi (can't find the exact source tough): don’t trust, verify.
It's not even about trusting the fact that you did a good job... I don't know you, but you're probably a lot smarter than me (I must honestly say I wouldn't have a clue as to where I should start when creating a hw wallet). It's all about the fact we should not have to trust your word when you tell us you created a propriatory algo to derive keys, or when you tell us you used community standards to encrypt backups.... Bitcoin's community is trustless, we want to verify (or at least have a Dev we know verify the code). But, I feel we'll never agree, so I wish you the best of luck with your company, and j hope you take the feedback you received to heart when you make decisions for your future products.... But in the end, it's between you and your customers. I just hope you'll stick to your word and release your decryption tool if you ever go bankrupt...
|
|
|
|
alien2108
Copper Member
Newbie
Offline
Activity: 27
Merit: 1
|
|
October 06, 2019, 10:24:21 AM |
|
Thank you for your thoughts.
As I said, you will not have to wait for us to go bankrupt for access to your private keys! Once we find a proper way we feel comfortable with in regards to all aspect of security, we will allow private key export!
|
|
|
|
alien2108
Copper Member
Newbie
Offline
Activity: 27
Merit: 1
|
|
October 06, 2019, 08:39:28 PM |
|
As an aside, not wanting to be neglected here, but don't sell yourself short. Do you think you could write a better encryption for example, say google authenticator?
We do not try to evolve new encryption algorithms, nor do we have a plan to do so This is really very very very complex stuff that is more in the field of mathematics than IT. Google Authenticator is not really about encryption, it's more about TOTP (Time-based One-time Password Algorithm) - it's time based authentication process, but I am really glad you mentioned it. Millions use it for sensitive stuff as 2FA for crypto exchange logins and similar, but did you know Google Authenticator is NOT open source (it was sometimes)? (Source: https://lwn.net/Articles/581086/).
|
|
|
|
alien2108
Copper Member
Newbie
Offline
Activity: 27
Merit: 1
|
|
October 07, 2019, 11:42:30 AM |
|
I had a lengthy discussion with out team and I do think we came to a very good solution for possible export of private keys in a way, where user will not be compromised even if procedure is initialised on a compromised desktop. Such wallets will also be marked as insecure - we already mark all imported wallets as such!
BTW!!!! TI forgot to mention, that if you want to use known private key wallets on BC Vault right now, you CAN! Simply generate private keys somewhere safe (well actually you need 64 chars, x2 for EOS) and use "Import wallet". This way, you will have all the wallets on BC Vault, which private keys you have. You just have to be extra carefull on where you generated them.
Stay tuned for more soon!
|
|
|
|
alien2108
Copper Member
Newbie
Offline
Activity: 27
Merit: 1
|
|
October 16, 2019, 07:57:52 AM |
|
If you are going to add that feature, they standardly use WIF format on those.
We considered that, but we will not do WIF. Why? - WIF is only usable for BTC, EOS (and for EOS you can not include both private keys) - It is case sensitive which is not "cool" for manual operations If you get raw private key, you can always do whatever you want to it...Like convert to WIF if you want to.
|
|
|
|
nc50lc
Legendary
Offline
Activity: 2604
Merit: 6416
Self-proclaimed Genius
|
|
October 16, 2019, 12:01:13 PM |
|
That wont do, most users don't know how to convert private key to WIF, some don't want to use converters or tools to convert it to WIF. Lastly, almost all (Bitcoin) clients do not support non-WIF private keys. [1] It is case sensitive which is not "cool" for manual operations [2] If you get raw private key, you can always do whatever you want to it...Like convert to WIF if you want to.
1. It's shorter and the identical characters are omitted, so it's still " cool". 2. Why don't you just add an option/default option to convert prv key to WIF for coins like BTC? The conversion isn't that complicated.
|
|
|
|
alien2108
Copper Member
Newbie
Offline
Activity: 27
Merit: 1
|
|
October 16, 2019, 12:08:08 PM |
|
That wont do, most users don't know how to convert private key to WIF, some don't want to use converters or tools to convert it to WIF. Lastly, almost all (Bitcoin) clients do not support non-WIF private keys.
Those users will not be exporting private key anyway If you come in situation where you really need "barebones" private key, best way is to export it raw. WIF might become WIFv2 or exWif or whatever standard the future will bring, but raw private key stays the same forever. So to be able to be future proof, raw is the way to go in my opinion. We might add WIF as option for BTC as you suggested, but this will not be implemented right away.
|
|
|
|
alien2108
Copper Member
Newbie
Offline
Activity: 27
Merit: 1
|
|
October 17, 2019, 07:42:11 AM |
|
They could covert WIF back to raw and import that.
But we will support WIF import in next release (it actually is supported already in libraries, but GUI is filtering out the "invalid" chars).
|
|
|
|
|