Bitcoin Forum
May 10, 2024, 02:03:52 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2] 3 4 5 »  All
  Print  
Author Topic: Trezor hacked (again)  (Read 1466 times)
dkbit98 (OP)
Legendary
*
Offline Offline

Activity: 2226
Merit: 7147



View Profile WWW
January 30, 2022, 12:38:19 PM
 #21

I am so fed up with hardware wallets at the moment, that I'm pretty much exclusively using airgapped encrypted devices and paper wallets for my non-hot wallets.
I am not going to recommend anyone to use paper wallets that can create much bigger problems for general population than hardware wallets ever would.
But I agree with you that hardware wallets are a mess now and most of them are living in their closed ecosystem just trying to make some profit from this devices.
DIY might be the best option that is flexible and you will be able to adjust accordingly if something changes in future.
Whatever you choose, best thing is to keep everything simple and don't complicate to much.

You were probably referring to the PIN code, not a password. The guy in the video forgot his PIN. More precisely, his friend, the professional poker player who has a photographic memory, forgot a 5-digit PIN code
Pin code is the password in this case that only contain numbers, and it's tied to specific device.
I was not talking about passphrase that is something totally different from password or pin.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
1715306632
Hero Member
*
Offline Offline

Posts: 1715306632

View Profile Personal Message (Offline)

Ignore
1715306632
Reply with quote  #2

1715306632
Report to moderator
1715306632
Hero Member
*
Offline Offline

Posts: 1715306632

View Profile Personal Message (Offline)

Ignore
1715306632
Reply with quote  #2

1715306632
Report to moderator
1715306632
Hero Member
*
Offline Offline

Posts: 1715306632

View Profile Personal Message (Offline)

Ignore
1715306632
Reply with quote  #2

1715306632
Report to moderator
Transactions must be included in a block to be properly completed. When you send a transaction, it is broadcast to miners. Miners can then optionally include it in their next blocks. Miners will be more inclined to include your transaction if it has a higher transaction fee.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715306632
Hero Member
*
Offline Offline

Posts: 1715306632

View Profile Personal Message (Offline)

Ignore
1715306632
Reply with quote  #2

1715306632
Report to moderator
1715306632
Hero Member
*
Offline Offline

Posts: 1715306632

View Profile Personal Message (Offline)

Ignore
1715306632
Reply with quote  #2

1715306632
Report to moderator
1715306632
Hero Member
*
Offline Offline

Posts: 1715306632

View Profile Personal Message (Offline)

Ignore
1715306632
Reply with quote  #2

1715306632
Report to moderator
n0nce
Hero Member
*****
Offline Offline

Activity: 882
Merit: 5828


not your keys, not your coins!


View Profile WWW
February 01, 2022, 02:36:29 AM
Last edit: February 01, 2022, 12:22:58 PM by n0nce
Merited by vapourminer (2), JayJuanGee (1)
 #22

Wasn't the issue even fixed already, but possible due to outdated firmware? Like at the time of attack, he mentions about firmware v1.6.0 and that the attack wasn't gonna be possible in v1.6.1 etc., so he was exploiting the fact that the device was running old software in a way.
He was sort of doing this, but video was recorded somewhere in 2017 I think, and owner couldn't update the device even if he wanted to do it, because he didn't know the password.
Posting this video on Youtube now in 2022 is just a free marketing campaign for Kingpin more than anything else, but it sure hurt Trezor so they even had to comment on that video with explantion.


Goddamn, this sneaky dude got me as well! It appeared to me that this happened recently - which would mean the firmware would have been seriously outdated - but I reckon it would have been possible: get a ton of coins, forget it for almost 10 years, find it again and need to look for a hacker since you forgot the PIN.

Makes me think: in a pinch, you could even just wipe a HW wallet that you have around (of which you have a seed backup handy) and load the stolen wallet's seed onto it. When you're done transferring the funds, reset it again and put in 'its' seed again.
Or just use Seedsigner/Krux that works exactly like that, but it's much more easier to import seed words again (with QR codes) than it is on trezor, ledger and other hardware wallets.
You don't even need secure element or secret NDA's and permission with this.
Correct! On this topic, today I read this tweet by SeedSigner guys.
Periodic reminder for people having trouble sourcing a Raspberry Pi Zero 1.3, it is a relatively simple process to physically disable wireless communication for both the Pi Zero W and Pi Zero 2W. More information here:
Which leads to a GitHub made just about disabling the WiFi / BT combo chip.
https://github.com/DesobedienteTecnologico/rpi_disable_wifi_and_bt_by_hardware

They're not just cutting the antenna, they're removing the chip's power source, so it just can't turn on again.



Some extra thoughts since I saw this mentioned a few times:
1) 'they just want to make money' - of course, that's what companies do. They have to pay their employees, their researchers and pay for security audits, for the whole infrastructure and much more. They need to make a profit to survive.
2) 'if they add feature X, I need a new wallet' / FOSS solutions keep working the same for years to come - Obviously, you can choose not to update if you don't like a feature. Further, many criticized features are only in the software suite on the host. Good wallets should support usage with Electrum or Sparrow, so by just not using the wallet's 'original' software, you completely avoid the issue.
3) 'DIY is more secure' - I love DIY and FOSS myself, and do believe it can be more secure in many cases, just due to more eyes looking at the code. It's also great that you can remove a feature and recompile without that, for instance. However this is not limited to DIY wallets, but it's also the case for any other open-source wallet.

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
m2017
Legendary
*
Offline Offline

Activity: 1806
Merit: 1307


keep walking, Johnnie


View Profile
February 01, 2022, 01:41:57 PM
 #23

It might be a good idea to UPDATE your Trezor firmware now.
Latest version for Trezor One is 1.10.5.


I would not immediately update in this case, since the new firmware update may contain fresh critical bugs or vulnerabilities. This problem creates a danger only with physical access to the device. Online, Trezor is still safe, isn't it. Can wait a while, and then update the device.

.BEST..CHANGE.███████████████
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
███████████████
..BUY/ SELL CRYPTO..
o_e_l_e_o
In memoriam
Legendary
*
Offline Offline

Activity: 2268
Merit: 18510


View Profile
February 01, 2022, 02:12:50 PM
 #24

1) 'they just want to make money' - of course, that's what companies do. They have to pay their employees, their researchers and pay for security audits, for the whole infrastructure and much more. They need to make a profit to survive.
There's a big difference between selling devices to make money and selling out their principles of being in control of your own keys and coins.

2) 'if they add feature X, I need a new wallet' / FOSS solutions keep working the same for years to come - Obviously, you can choose not to update if you don't like a feature. Further, many criticized features are only in the software suite on the host. Good wallets should support usage with Electrum or Sparrow, so by just not using the wallet's 'original' software, you completely avoid the issue.
Choosing not to update leaves you open to security vulnerabilities, and often you have to use the manufacturer's software to update, so there is no avoiding it. And there are plenty of features I can think of being pushed to hardware wallet firmware which I absolutely wouldn't want on my hardware wallet, such as support for various useless altcoins, games, ability to take screenshots, etc.
n0nce
Hero Member
*****
Offline Offline

Activity: 882
Merit: 5828


not your keys, not your coins!


View Profile WWW
February 01, 2022, 02:23:01 PM
 #25

1) 'they just want to make money' - of course, that's what companies do. They have to pay their employees, their researchers and pay for security audits, for the whole infrastructure and much more. They need to make a profit to survive.
There's a big difference between selling devices to make money and selling out their principles of being in control of your own keys and coins.
That's true, indeed.

2) 'if they add feature X, I need a new wallet' / FOSS solutions keep working the same for years to come - Obviously, you can choose not to update if you don't like a feature. Further, many criticized features are only in the software suite on the host. Good wallets should support usage with Electrum or Sparrow, so by just not using the wallet's 'original' software, you completely avoid the issue.
Choosing not to update leaves you open to security vulnerabilities, and often you have to use the manufacturer's software to update, so there is no avoiding it. And there are plenty of features I can think of being pushed to hardware wallet firmware which I absolutely wouldn't want on my hardware wallet, such as support for various useless altcoins, games, ability to take screenshots, etc.
I guess then we have to make sure when buying new hardware wallets, that both the firmware and the software used for updating are open source, easy to read and modify. For instance, there could be a community-made script that fetches the latest Foundation Passport source, removes the games and compiles it.

Of course, also pressure on the manufacturers helps. For example, Shift Crypto offers a 'Bitcoin only' firmware that I believe can also be flashed to the 'Multi' edition (irreversibly).

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
dkbit98 (OP)
Legendary
*
Offline Offline

Activity: 2226
Merit: 7147



View Profile WWW
February 01, 2022, 04:00:00 PM
 #26

Goddamn, this sneaky dude got me as well! It appeared to me that this happened recently - which would mean the firmware would have been seriously outdated - but I reckon it would have been possible: get a ton of coins, forget it for almost 10 years, find it again and need to look for a hacker since you forgot the PIN.
He is smart guy and I will give him a credit, but correct way would be to mention the years when this happened, if not in video than in descriptions.
Most of the people are now thinking that Trezor is still affected by this old bug, they are not doing any research and social media is full with this youtube video  Cheesy

They're not just cutting the antenna, they're removing the chip's power source, so it just can't turn on again.
Yeah I saw that link and procedure is fairly simple for anyone who did some soldering in his life.
No chip = No wi-fi/bt, and this could even make raspberry a bit faster also (version 2.0 is faster than v1.3 even with wifi/bt).

I love DIY and FOSS myself, and do believe it can be more secure in many cases, just due to more eyes looking at the code. It's also great that you can remove a feature and recompile without that, for instance. However this is not limited to DIY wallets, but it's also the case for any other open-source wallet.
Except for coldacrd wallet, because if you fork their code and try to compile it yourself and change some things, you will get a lawsuit from NVK for license violation...
That means their website is lying and misleading people intentionally.
Ask NVK about this and you will get banned, but all his channels... pathetic.  Roll Eyes

Of course, also pressure on the manufacturers helps. For example, Shift Crypto offers a 'Bitcoin only' firmware that I believe can also be flashed to the 'Multi' edition (irreversibly).
You know that Keystone wallet also has this feature?
It's possible to install Bitcoin only firmware and after that it's impossible to switch back to multi-coin edition, so it's permanent and good for security.

I would not immediately update in this case, since the new firmware update may contain fresh critical bugs or vulnerabilities. This problem creates a danger only with physical access to the device. Online, Trezor is still safe, isn't it. Can wait a while, and then update the device.
Hello and wtf?!
I would... It's been more than 3 years since this bug in Trezor and it would be BIG mistake if you don't update now if you have old firmware like that.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
Pmalek
Legendary
*
Offline Offline

Activity: 2758
Merit: 7136



View Profile
February 02, 2022, 02:27:14 PM
 #27

He is smart guy and I will give him a credit, but correct way would be to mention the years when this happened, if not in video than in descriptions.
I agree with you that he could have mentioned the years. But he does mention at 13:20 in the video that he was going through Trezor's source code and that he found an exploitable vulnerability in firmware version 1.6.0. He then says that line of code was removed in 1.6.1. In some way, he does acknowledge that this particular vulnerability is not there anymore if your firmware is up-to date. 

Most of the people are now thinking that Trezor is still affected by this old bug...
Well it is if you are still using an outdated firmware. And if you forgot your PIN, like the guy in the video, and you can't unlock your device to upgrade the firmware, you are stuck with the old and vulnerable one.

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
dkbit98 (OP)
Legendary
*
Offline Offline

Activity: 2226
Merit: 7147



View Profile WWW
February 03, 2022, 03:56:37 PM
Merited by JayJuanGee (1), SFR10 (1)
 #28

I was thinking there is something suspicious with the way how this video was released and especially the timing (after years of waiting), so let me elaborate more on this.
Maybe this is just a coincidence, but Joe Grand (Kingpin) released his video on January 24 (over 2,2M views so far), and he even has dedicated website offspec.io registered in 2021.

On almost exact same day Ledger and their Donjon team started to release similar hacking videos on their channel that are also focused on this event of hacking Trezor device.
Side-channel attacks | Enter the Donjon video was released on January 21 just few days before Joe Grand video.
Coincidence or maybe Joe Grand is paid and working for ledger team, I don't know... but it sure looks like negative campaign against Trezor for something that was fixed years ago.

On January 31 Donjon released new short video for hacking old Coldcard wallet with Laser fault attacks.

PS
This is just my speculation and I am not accusing anyone for anything here.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
SFR10
Legendary
*
Offline Offline

Activity: 2996
Merit: 3426


Crypto Swap Exchange


View Profile WWW
February 04, 2022, 06:09:35 PM
 #29

but it sure looks like negative campaign against Trezor for something that was fixed years ago.
You're probably right... If Ledger would've exerted the same amount of effort into improving all of those unreliable hardware wallets that they've been selling in the past year or so, they could've restored a portion of their damaged reputation but instead of doing that, they're trying to pull-down their competitors in an unethical way [I do know Trezor isn't perfect by any means, but I've never seen them do such a thing]...


█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
o_e_l_e_o
In memoriam
Legendary
*
Offline Offline

Activity: 2268
Merit: 18510


View Profile
February 05, 2022, 08:45:46 AM
Merited by PrivacyG (1)
 #30

For instance, there could be a community-made script that fetches the latest Foundation Passport source, removes the games and compiles it.
Even more risk then, since you are trusting the Passport developers not to introduce a vulnerability with their stupid games, and then trusting the community not to introduce a vulnerability with their code to remove said stupid games. And the community driven version won't be pen tested to the same degree as the native version.

It's such a pointless edition, I cannot understand why they implemented it in the first place. It makes them seem very amateurish.

For example, Shift Crypto offers a 'Bitcoin only' firmware that I believe can also be flashed to the 'Multi' edition (irreversibly).
True, but Shift Crypto also developed AOPP, so they are off the table as far as I'm concerned.
Pmalek
Legendary
*
Offline Offline

Activity: 2758
Merit: 7136



View Profile
February 05, 2022, 09:11:00 AM
 #31

I was thinking there is something suspicious with the way how this video was released and especially the timing (after years of waiting), so let me elaborate more on this.
Maybe this is just a coincidence, but Joe Grand (Kingpin) released his video on January 24 (over 2,2M views so far), and he even has dedicated website offspec.io registered in 2021.

On almost exact same day Ledger and their Donjon team started to release similar hacking videos on their channel that are also focused on this event of hacking Trezor device.
Aside from the two videos released by Ledger that shows their Donjon team attacking Trezor and ColdCard wallets, why do you think that Kingpin's video was released after years of waiting? I don't think there is anything in the video that could point to the fact that it was filmed years ago. Is there a specific scene that caught your eye and made you think that? 

It's possible that the guy didn't know who to turn to for help. And that 3 months ago, he came across Kingpin and that other group in Switzerland that was mentioned in the video.

Take a look at the comments under the video on Youtube. Kingpin pinned Trezor's reply in which they wrote that the vulnerability that was found was fixed in 2017. I don't think he would do that if he wanted to throw dirt on Trezor.

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
dkbit98 (OP)
Legendary
*
Offline Offline

Activity: 2226
Merit: 7147



View Profile WWW
February 05, 2022, 11:15:17 PM
 #32

You're probably right... If Ledger would've exerted the same amount of effort into improving all of those unreliable hardware wallets that they've been selling in the past year or so, they could've restored a portion of their damaged reputation but instead of doing that, they're trying to pull-down their competitors in an unethical way
I like what ledger Donjon team is doing, something similar is done by Kraken team in more neutral way, but so much energy is spent from ledger on saying how all other wallets are unsecure, except their product.
They have better marketing and they sold millions of devices, but I think that quantity doesn't always mean quality.

It's possible that the guy didn't know who to turn to for help. And that 3 months ago, he came across Kingpin and that other group in Switzerland that was mentioned in the video.
It's possible but he never mentioned exact days in his video and waste majority of viewers are thinking that trezor devices still have this flaw.
I am seeing people posting on reddit and twitter every day asking the same question, that could mean that something was intentially done in this way.
Even I was not sure about dates when all this happened exactly, and at first I was thinking this is some fresh trezor bug...

Take a look at the comments under the video on Youtube. Kingpin pinned Trezor's reply in which they wrote that the vulnerability that was found was fixed in 2017. I don't think he would do that if he wanted to throw dirt on Trezor.
You don't have to tell me to look at the comments because I posted that image from trezor reply in my first post in this topic.
Why do oyu think Trezor had to do that?
Because they received huge amount of questions...that is why.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
Pmalek
Legendary
*
Offline Offline

Activity: 2758
Merit: 7136



View Profile
February 06, 2022, 07:38:53 AM
 #33

It's possible but he never mentioned exact days in his video and waste majority of viewers are thinking that trezor devices still have this flaw.
I am seeing people posting on reddit and twitter every day asking the same question, that could mean that something was intentially done in this way.
It could also mean that the majority of people asking those questions don't have the mental capacity or willingness to watch a video and understand the content shown in it. Like the fact that Kingpin mentions that he found a vulnerable piece of code that allowed him to retrieve sensitive data from RAM in firmware version 1.6.0, and he also says that line of code was removed in newer versions making that attack scenario unrepeatable. That's just people being people and looking at things in a hasty way without any understanding of the material.   

Even I was not sure about dates when all this happened exactly, and at first I was thinking this is some fresh trezor bug...
Yes, and then you watched the video and you understood it. Those who are crying on Reddit didn't. That's no one's fault but their own. 

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
Coin-Keeper
Hero Member
*****
Offline Offline

Activity: 758
Merit: 606



View Profile
February 08, 2022, 10:28:11 PM
 #34

Old news for sure.

I have had my SEED encrypted on my Trezors for well over a year now.  I leave dummy SD's around for decoys.  That combined with very long passphrases is a virtual certainty that I can sleep well every night!  Most won't put in the time to learn how but SEED encryption on a Trezor is solid and the little SD can be kept in a separate location providing "two location" security of sorts.

BTC: 1PYSBbuKM3kW19xe9TXJQfq64rPhd8XorF
Staked and Verified: https://bitcointalk.org/index.php?topic=996318.msg17102755#msg17102755
Psycopyro
Newbie
*
Offline Offline

Activity: 21
Merit: 34


View Profile
February 17, 2022, 08:35:48 PM
Last edit: February 18, 2022, 10:14:21 PM by Mr. Big
 #35

I enjoyed watch this video!

Tension was real with the faulty ground  Shocked



That is why I think that having multiple solution is the best thing you can do, own multiple hardware wallets, own DIY signers like Seesigner or Krux, and own a laptop with sole purpose of being a secure cold storage.
I am so fed up with hardware wallets at the moment, that I'm pretty much exclusively using airgapped encrypted devices and paper wallets for my non-hot wallets. Adding in KYC linked debit cards, supporting KYC and AML requirements from privacy invading centralized exchanges, adding unnecessary features (and therefore vulnerabilities) such as games to the firmware, adding support (and therefore vulnerabilities) for hundreds of useless shitcoins, the list goes on. I don't want to spend money on yet another new hardware wallet for the company to announce in few weeks' time that they are now implementing *stupid feature* and I have yet another device that I don't want to store my coins on. At least with a DIY solution I know it will still work exactly as I want it to in 1, 5, 10 years' time.

Posting this video on Youtube now in 2022 is just a free marketing campaign for Kingpin more than anything else, but it sure hurt Trezor so they even had to comment on that video with explantion.
Lol. People are dumb. They just read the headline about Trezor being hacked and start to panic. No one bothers to actually read the story to see this is a non-issue.

I didn't even check DIY solutions before buying one, I should... I don't like the changing address of Ledger, don't know if it's a rule for all hardware wallets but I don't really understand the goal.
PrivacyG
Hero Member
*****
Offline Offline

Activity: 784
Merit: 1735


Crypto Swap Exchange


View Profile
February 17, 2022, 09:29:16 PM
 #36

I didn't even check DIY solutions before buying one, I should... I don't like the changing address of Ledger, don't know if it's a rule for all hardware wallets but I don't really understand the goal.
If by changing address you mean you get a new receiving address every time you want to receive coins, this is called Change Address and it exists for privacy reasons.  If I had your address and you never generate new addresses, I would know that all your incoming and outgoing transactions are received and broadcasted by you.  If you have Change addresses, tracing coins to your identity is getting harder.  Add Coin Control to all of this and you will have significantly increased the privacy of your Bitcoins.

Also, Change Addresses exist on all wallets.  Even on Do It Yourself solutions you still have them.  This does not stop you from using a single address all the time though, but it is at the expense of your privacy.

-
Regards,
PrivacyG

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
witcher_sense
Legendary
*
Offline Offline

Activity: 2338
Merit: 4334

🔐BitcoinMessage.Tools🔑


View Profile WWW
February 18, 2022, 06:53:07 AM
Merited by PrivacyG (3), JayJuanGee (2), Pmalek (1)
 #37

I didn't even check DIY solutions before buying one, I should... I don't like the changing address of Ledger, don't know if it's a rule for all hardware wallets but I don't really understand the goal.
If by changing address you mean you get a new receiving address every time you want to receive coins, this is called Change Address and it exists for privacy reasons.  If I had your address and you never generate new addresses, I would know that all your incoming and outgoing transactions are received and broadcasted by you.  If you have Change addresses, tracing coins to your identity is getting harder.  Add Coin Control to all of this and you will have significantly increased the privacy of your Bitcoins.

Also, Change Addresses exist on all wallets.  Even on Do It Yourself solutions you still have them.  This does not stop you from using a single address all the time though, but it is at the expense of your privacy.

-
Regards,
PrivacyG

That sounds a bit confusing. The receive address is the address you generate every time you want to receive a payment. Once payment is received, a wallet usually hides that address to protect your privacy and discourage you from reusing it. However, you can reuse it if you want: it is just not advisable but well doable. There is another type of address - change addresses - which more often than not are not visible to the user. These addresses are used to receive a so-called "change." A change is created in case the value of UTXOs you're sending is higher than the payment. The main peculiarity of an UTXO (unspent transaction output) is that it can only be sent in its entirety, that is, it is like a dollar bill that cannot be divided. For example, if your wallet has only one output of 5 btc and you send a payment of 1 btc, you will receive a change of 4 btc (minus transaction fees). A wallet usually generates change addresses automatically, but if you want, you can send a change back to the address you made a payment from. However, it is a bad practice since sending back to the same address exposes which output was a payment and which was a change.

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
dkbit98 (OP)
Legendary
*
Offline Offline

Activity: 2226
Merit: 7147



View Profile WWW
May 23, 2022, 01:39:16 PM
Merited by vapourminer (2), JayJuanGee (2), witcher_sense (2), SFR10 (1), Pmalek (1), DdmrDdmr (1), n0nce (1)
 #38

Warning for everyone that new fake Trezor devices showed up recently in Russian marketplaces, and they should be considered as malicious!
Scammers are probably using current situation that Trezor is not shipping their devices to Russia and Ukraine at the moment. 

Few days ago Trezor released one interesting blog article with recommendations for purchasing hardware wallets, with well known things like detecting tampering, tamper evident seals, firmware checks, device cases inspection, packaging improvements, software improvements, hardware component bonding. etc.
One thing that got my attention was part of the article that mentions new fake and modified Trezor devices appeared recently and they are mostly sold in Russian marketplaces.
This devices had a bootloader that was not released, vendor was unofficial and many devices sold on this marketplaces displayed a message when trying to sign a transaction:
Code:
-26: non-mandatory-script-verify-flag (Signature must be zero for failed CHECK(MULTI)SIG operation)

Firmware updated would show success message, but malicious firmware would remain on device, some functions like Shamir backup were not functioning on this devices, seed words generated by fake devices were predictable or predefined, passphrase function was also modified!
Trezor Model T was mostly affected by this, with some internal components had been replaced by malicious actors.
https://blog.trezor.io/stay-safe-shopping-for-hardware-wallets-543f144e3d24

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
SFR10
Legendary
*
Offline Offline

Activity: 2996
Merit: 3426


Crypto Swap Exchange


View Profile WWW
May 23, 2022, 04:08:15 PM
Merited by JayJuanGee (1)
 #39

Scammers are probably using current situation that Trezor is not shipping their devices to Russia and Ukraine at the moment. 
~Snipped~
Trezor Model T was mostly affected by this, with some internal components had been replaced by malicious actors.
If the price of Model T continues to go up [like it has in the past couple of years due to chip shortages, inflation and etc...], I wouldn't be surprised to see a sudden rise of fake Trezor devices in other markets with no shipping problems and the scammers would probably use an excuse like, the device they're selling belongs to the last batch that they purchased at lower prices!


█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
witcher_sense
Legendary
*
Offline Offline

Activity: 2338
Merit: 4334

🔐BitcoinMessage.Tools🔑


View Profile WWW
June 02, 2022, 01:37:09 PM
Merited by o_e_l_e_o (4), JayJuanGee (1), Pmalek (1)
 #40

seed words generated by fake devices were predictable or predefined, passphrase function was also modified!

Interestingly, predictable or predefined seed phrases could theoretically have been "strengthened" by users by adding very complex passphrases so that a hacker couldn't get access to funds. However, considering that the passphrase function had also been altered, compromised seed phrases with added passphrases remained vulnerable to attack. The "alteration" consisted of the following: you insert a very long passphrase into your wallet (e.g. "nKa&8k2#49%7^N4w4YJanN"), but the malicious wallet take into account only the very first symbol of the inserted passphrase, which is "n" in our case. Therefore, all addresses (private keys) were derived not from a combination of malicious seed+long passphrase (which is relatively safe) but from malicious seed+malicious passphrase ("n"). Needless to say that passphrases containing only one symbol are easily bruteforceable.

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
Pages: « 1 [2] 3 4 5 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!