Bitcoin Forum
May 14, 2026, 12:12:24 PM *
News: Latest Bitcoin Core release: 31.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Comprehensive TRNG anti-scanner tool in development (for Bitcoin)  (Read 69 times)
dk14 (OP)
Newbie
*
Offline

Activity: 6
Merit: 0


View Profile
May 10, 2026, 02:49:37 PM
 #1

The approach is to outrun the scanners, and report risk to users based on estimations and deterministic partial evaluations(!) of risk.
So user could send funds to a new wallet.
Reports will be public (stored in IPFS or alike), since reporting privately would require trust.

It could become a distributed (aka de-centralized) "Security Explorer" eventually.

README: https://github.com/dk14/crypto/blob/main/chats/btc-audit/README.md

(path is a bit hidden, to partially hide from webcrawlers and heist-seekers)

----
How to contribute:

- I outlined simple bidding-based system for coin contributions to the project - send bids or micro-payments to BTC address and send more if u see progress, features implemented.
- Rewards are possible - since paid "public service" features are possible (see README)
- PR-contributions can be rewarded as well (from bidding fund and paid features).
- PRs will be reviewed strictly, since there is a paradigm (also public service would require strict external audits).
- can simply donate too. Significant ones will be attributed.
- can promote to a grant, but I think they bro-based
- reddit gossip?

This is long-term project, that is only a simple btc-audit toy right now.
There are some differentiators, comparing to other security projects (independence from vendors and corporate, stricter approach to Computer Science, accessible Node.js, flexible funding, no DeFi tokens, transparency, no academic overhead)

----

P.S. if you lurk around my disorganized 'crypto' repo - you might discover the importance of building independent audit tools with automatic feedback to users and vendors, since issues with cryptography are only accumulating, it's not getting any better. Buy a little time lol.

Some wisdom: there is no government conspiracy (not in FED/NIST, not in corporate/Blackberry) - everything is just degrading. Almost everyone thinks they'll die and go to better place. They won't.
dk14 (OP)
Newbie
*
Offline

Activity: 6
Merit: 0


View Profile
May 11, 2026, 04:34:57 AM
 #2

P.S. I picked this category, rather than projects, to emphasize wallet security topic. So code in repo can be discussed here, together with potential features.
Can discuss "profit sharing" fund as code, but investment etc does not belong here (there is contact in README).
dk14 (OP)
Newbie
*
Offline

Activity: 6
Merit: 0


View Profile
May 13, 2026, 11:10:28 AM
 #3

Just to make it more interesting for non-technical people.

AI models, as soso as they are, often summarize lots of technical data and quickly uncover misteries of internals of hardware wallets like Ledger Wallet, if you polite enough.
They analyze and explain Ledger Wallet firmware code, they still remember even deleted/edited documentation.
They suggest guesses on how laws and regulations can shape undocumented factory hardware (eg chips generating Ledger DUN).

Unwind whole obscurity of hardware wallet internals for potential hackers.

Moreover, thermal noise that hardware wallets are using is a weak random generator, spectra can be enumerated (brute-forced).
And I'm not the only one who knows that.

This means, more and more scanners will be written, they will get to your wallets and funds eventually. Cold storage or online does not really matter.

This project is a remedy.
internetional
Legendary
*
Offline

Activity: 2184
Merit: 3258



View Profile
May 13, 2026, 11:59:37 AM
 #4

I agree that there have been cases of catastrophically bad RNG implementations leading to wallet compromises. And I also agree that analysis of hardware wallet firmware is advancing rapidly.

But the claim that thermal noise can be brute-forced in modern hardware wallets sounds highly questionable. Are there any concrete examples of such a vulnerability being exploited? Or at least any projects specifically targeting this?

 
 b1exch.to 
  ETH      DAI   
  BTC      LTC   
  USDT     XMR    
.███████████▄▀▄▀
█████████▄█▄▀
███████████
███████▄█▀
█▀█
▄▄▀░░██▄▄
▄▀██▄▀█████▄
██▄▀░▄██████
███████░█████
█░████░█████████
█░█░█░████░█████
█░█░█░██░█████
▀▀▀▄█▄████▀▀▀
dk14 (OP)
Newbie
*
Offline

Activity: 6
Merit: 0


View Profile
May 13, 2026, 09:32:38 PM
 #5

Good comment, something I wanted to be asked. Thermal noise as mysterious (and awesome to play with) as it is - is not secure in its pure version.

ADC can only sample limited spectra resolution.

Let's say at 48000Hz with amplitude of 12 bit - only limited amount of frequencies (eg complex ones - freq and phase) can be distinguished from one another by ADC. So spectra is not dense.
Plus analog filters reduce that amount too.

GPT-OSS obviously gives bullsh*t estimate of millions of variations to enumerate. It could be (likely) more, could be even less. Depends on a quality of "replica".
Implementation it wrote is super-naive obviously. It's too enthusiastic. I just take it as basis, to keep fixing.


But the human intuition is simple - if ADC was precise enough to sample super-high entropy, it would be a quantum computer already Smiley.

Low-kilowatt energy device cannot generate anything complex, that is why it is enhanced with whitening and PRNGs.

------

To answer the implied question as of why it is not hacked yet, no one simply pays enough attention -

1) literature on hardware overwhelms students (most hackers), and they're not disciplined to implement.


2) Illusion of social security overwhelms more disciplined engineers Smiley. I'm lazy to even calculate the precise amount of frequencies that 12bit 48kHz ADC can distinguish, even though it was part of my uni program and I was good at it, like in 2009 or something. Financial industry dumbed me down.

We are not as smart as we think.

Thanks God (nature!), I still know that white noise is superposition of frequencies (+phases) with even amplitudes - it is literally not that many (and all freq must be present, no need to permute - I'm already overdoing it on my github).

And their lcm is small (especially for modern computers) - so the chunk of non-repetitive white noise is small.

At least I remember that. And it's enough. Every other alteration (spectra drift, small variation of amplitude, modulations) is some known transformer that can be guessed - I kinda agree with OSS here. But it is much more work than naive academic (GPT-OSS) would expect.

3) Plus don't forget - we say "defect" of resistor, but in reality - it is more like proper tune for the noise it generates. (match between resistor  noise and ADC). So flaws are found every day, but the process is not organized - and feedback to regular users is limited (blogs instead of numbers).

As unfortunate as it is - security of obscurity works here temporarily, eg entropy pool of Ledger starts with DUK - it is undocumented (still bound to use low-entropy source).
But those are purely psychological defenses.

Speaking of psychology: GPT-OSS is either too critical or too eager to suggest a model, literature either overcomplicates or oversimplifies.

-----

I'm not claiming that it can be modeled easily, it is a long-term project, but officially all those noises are known to be low-entropy. So it is a matter of work.
One of the reasons I made project open and introduced a fund (with like profit sharing etc) to support it long-term hopefully.

-----

What I can guarantee - is:

- that acedemia and govs will be sliding down slowly and permanently (maybe with few ups and downs, reason: limited food simply), so eventually randomness based on naive "cannot tell from noise" will be refuted in favor of randomness based on energy, physical one. Just to fit reality.
- TRNG crash-down will happen within my lifetime.
- my approach will allow to compensate the issue with already existing TRNGs: if there is a powerful cluster of public scanners - they will warn you in advance, since they'll come close to hacking your key faster than students (in reality it is a bit more complex - you have to look-up Public Service improvements aka Explorer in README). So even in apocalyptic scenario - you can just jump between secrets once a month or so.

Even now - it would be a very interesting explorer to show how unequal private keys, actually are, in terms of security, contrary to statistical claims. It has educational value in the present already.

And it makes much more sense than protecting against quantum nonsesnse and other pseudo-scientific stuff that keeps creeping in.
Plus it is more fun to model Ledger precisely, it's like writing a gaming console simulator Smiley.

P.S. Obviously modeling low-entropy source as superposition of waves is no the only approach. There are more interesting ones, but this one is most straightforward to understand.

----

I tried to make this "white noise is something that iPhone generates for you to help you sleep (Nyquist aka thermal is approx white)", "super quality noise has computational power of brute-force" (it's an analog version of a digital counter) , "replay noise attack is the easiest attack possible on crypto, covering both symmetric (good one) and asymmetric (on the edge of pseudo-science) versions" insight as clear as possible, but hard to find "one size fits all" explanation.

You have to look at naive code while it's still is, there is also plot generator visualize.js in the repo, and ask questions maybe. The issue is obvious after you invest some time and work in DYR, but maybe someone will explain the issue better or nicer than me.

On the other hand, if it feels like too much explanation - I'm just trying to cover larger audience, since funds are critical for bypassing "psychological tricks" in favor of Computer Physiocracy. This is my goal here.
dk14 (OP)
Newbie
*
Offline

Activity: 6
Merit: 0


View Profile
Today at 07:51:12 AM
 #6

In case I run out of time/funds for posts and publishing.

Note for technical people:

The Explorer Protocol I described in README (where known numbers are published) is True TRNG.

From physical definition of random number "amount of energy investing in creating it", one can arrive at logical one:

"Number, so far unknown within locality" (or network).

This is holy grail, many of you can recognize. I cannot just implement it quietly - p2p network required.

-------

P.S.

1) There is no Satoshi, but unlike "Satoshi" I don't have Microsoft behind me, maybe for the best. Can fund truly p2p.

2) I know about freq envelopes, drifts etc. I know actual universal search as alternative (not the nonsense one that widely published). I know how hard is to optimize such searches (reachability/coverage).

note: I also used to briefly work and experiment with heuristic solvers (eg Z3, sledgehammers) - they useless.

It's all cool and all, but the first necessary steps have to be taken to not hurry any of it.

3) For non-technical people: "AI" loves my protocols and ideas a lot. It just does not mean that much to me, since it does not guarantee a working tool, protocol and service.
dk14 (OP)
Newbie
*
Offline

Activity: 6
Merit: 0


View Profile
Today at 11:33:22 AM
 #7

Small note for non-technical users: (proper) universal search I mentioned, as well as "AI" (and heuristics) can cover your hidden passphrases and whatever obscurity framework you built: eg use Apple Enclave to generate password (thermal noise and IO events), add something from yourself (low-entropy: usually combo of names and birthdates, government hardwired through repetition, special symbols come from convenience of typing on keyboard), add input from gyro (low-frequency band thermal noise), compress your family picture, quantum "random" numbers (this is thermal noise from lasers etc).

It only creates illusion of security - human imagination is limited. You can see already that naive "AI" (GPT, Torry) gives you good fiction by gluing phrases together arbitrarily. So it outruns you. Algorithms I mentioned would outrun faster and better than "AI" (and more energy-efficient). Sooner or later misconceptions about halting problem and universal search will be wiped out from academia and engineering - that will open up some new possibilities.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!