Bitcoin Forum
May 03, 2024, 06:40:48 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Poll
Question: [10-Sep-14] Should sigsafe turn into a real product?
No, it was a good proof-of-concept but NFC is not ubiquitous enough to create a market.
Yes, if you can get a commitment for integration with a popular Android wallet.
Yes, it's already a useable product on its own (assuming you publish a communication protocol and a command-line interface program).  
None of the above.

Pages: « 1 2 3 [4] 5 6 7 8 »  All
  Print  
Author Topic: Sigsafe: A NFC key tag for signing bitcoin transactions  (Read 23159 times)
Peter R (OP)
Legendary
*
Offline Offline

Activity: 1162
Merit: 1007



View Profile
July 09, 2014, 07:48:40 AM
Last edit: July 09, 2014, 08:36:09 AM by Peter R
 #61

The Sigsafe communicates with an interface device over NFC using the ISO 7816 APDU command structure for exchanging binary data.  To facilitate debugging and easier integration by developers, I've implemented a serial communication interface that is accessible via the edge connector when the Sigsafe PCB is removed from its enclosure.  This allows the Sigsafe to communicate with a computer over USB (as a virtual COM port).  Over this serial interface, the Sigsafe supports:

   - binary APDU commands
   - HEX encoded APDU commands
   - text-based abstractions of APDU commands

The text-based commands are the easiest to understand, so I'll only cover some of those with this post today.  

For this experiment, I have Sigsafe firmware running on a board (that I designed for a different project) with a 16-bit Texas Instruments microcontroller with 16 kilobytes of RAM.  The first step is to fire-up HyperTerminal (I love how bitcoin makes retro text-based tools cool again).  I typed "?" and the Sigsafe responds with an intro screen (all computed on the microcontroller and simply echoed by Hyperterminal), and then I asked the Sigsafe to hash an insecure brain wallet:




To demonstrate that the Sigsafe can perform the necessary cryptographic operations, let's turn this into a bitcoin address.  The next step is to instruct the Sigsafe to multiply this 256-bit number with the base point G for secp256k1 to determine the corresponding public key.  We do this with the priv2pubkey command.  The "%" symbol tells the Sigsafe to use the last output as the current input.




Next hash the public key with sha256:




And then hash it again with ripemd160:




And lastly apply bitcoin's custom base58check encoding to the resulting hash to get the bitcoin address "1Pq3SXz94SCnQVGxNUqUe7g2sqxjH8g72E."




Now, if a wallet developer wanted to provide support for Sigsafe they wouldn't need to know all those details.  For example, we could have converted the original text string to a bitcoin address in a single step:




Comparing these results to those generated by the site brainwallet.org results in an identical match:





In normal use cases, the Sigsafe wouldn't be hashing or computing brainwallets at all.  It is designed to store private keys and produce signatures.  So let's give that a try.  Today I'll only cover bitcoin-signed messages, as there is a lot to talk about with bitcoin transactions that I'll save for future posts.  

First let's hash our pass phrase again to get the private key into RAM (the Sigsafe can of course also generate random keys internally but that too is a topic for another day).  We then use the "store_key" command to tell the device to burn this key into flash memory.  (Once the key is burned into flash, the Sigsafe will never allow the key to be erased or read in clear-text form again.)  The Sigsafe responds with the key index (which is 1 since this is the first key we've loaded):  




Next we ask the device to produce a bitcoin signed message of a certain string using Key #1:




Verifying this signature at brainwallet.org shows that it was indeed produced with the private key associated with bitcoin address 1Pq3SXz94SCnQVGxNUqUe7g2sqxjH8g72E.





A bitcoin-signed message via a text-based terminal prompt all running on a $2 processor using less than 16K of RAM.  In later posts I'll cover APDU commands in more detail, bitcoin transaction signing, and Sigsafe signing rules.

Run Bitcoin Unlimited (www.bitcoinunlimited.info)
1714718448
Hero Member
*
Offline Offline

Posts: 1714718448

View Profile Personal Message (Offline)

Ignore
1714718448
Reply with quote  #2

1714718448
Report to moderator
1714718448
Hero Member
*
Offline Offline

Posts: 1714718448

View Profile Personal Message (Offline)

Ignore
1714718448
Reply with quote  #2

1714718448
Report to moderator
1714718448
Hero Member
*
Offline Offline

Posts: 1714718448

View Profile Personal Message (Offline)

Ignore
1714718448
Reply with quote  #2

1714718448
Report to moderator
Each block is stacked on top of the previous one. Adding another block to the top makes all lower blocks more difficult to remove: there is more "weight" above each block. A transaction in a block 6 blocks deep (6 confirmations) will be very difficult to remove.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714718448
Hero Member
*
Offline Offline

Posts: 1714718448

View Profile Personal Message (Offline)

Ignore
1714718448
Reply with quote  #2

1714718448
Report to moderator
RVienz
Member
**
Offline Offline

Activity: 70
Merit: 10


View Profile WWW
July 09, 2014, 10:36:57 AM
 #62

Totally Good but i need this Machine is released in Indonesia

so the country will accept the new currency = Bitcoin

How much you estimate for a card,tag,EDC

DeathAndTaxes
Donator
Legendary
*
Offline Offline

Activity: 1218
Merit: 1079


Gerald Davis


View Profile
July 09, 2014, 02:30:07 PM
 #63

Very cool.  I see you used an uncompressed PubKey.  Is there any reason you need to use uncompressed keys over compressed ones?  The later would be preferred for blockchain efficiency.
Peter R (OP)
Legendary
*
Offline Offline

Activity: 1162
Merit: 1007



View Profile
July 09, 2014, 03:28:57 PM
 #64

Very cool.  I see you used an uncompressed PubKey.  Is there any reason you need to use uncompressed keys over compressed ones?  The later would be preferred for blockchain efficiency.

Probably because I'm just learning about compressed vs uncompressed now  Smiley.  With respect to the bitcoin address I generated above, it looks like I could have hashed the compressed pubkey:

   03b0224956cdd07b883e0ed06837c6f62680be3a1e3b351ed2c3adcd09ff45aecf

and got the bitcoin address:

   1BNLp3roCQws6SvC53QuYStShFJNWyh7FG   (instead of 1Pq3SXz94SCnQVGxNUqUe7g2sqxjH8g72E)

I suppose when I sign the transaction, I would include only the compressed pubkey rather than the full pubkey, and when a node applies "OP_HASH160," it will hash the compressed pubkey resulting in the (non-b58encoded) second address rather than the first.  Do I understand correctly?  There are always two P2PkH addresses for each private key (corresponding to uncompressed and compressed pubkeys)?

I've been somewhat modelling the Sigsafe text-based terminal commands off of Vitalik Buterin's pybtctool (which has come in very handy for me so my respect to Vitalik), yet I don't see a way to generate a compressed pubkey from a privkey with this tool either.  

Run Bitcoin Unlimited (www.bitcoinunlimited.info)
DeathAndTaxes
Donator
Legendary
*
Offline Offline

Activity: 1218
Merit: 1079


Gerald Davis


View Profile
July 09, 2014, 05:35:10 PM
 #65

Quote
robably because I'm just learning about compressed vs uncompressed now  Smiley.  With respect to the bitcoin address I generated above, it looks like I could have hashed the compressed pubkey:

   03b0224956cdd07b883e0ed06837c6f62680be3a1e3b351ed2c3adcd09ff45aecf

and got the bitcoin address:

   1BNLp3roCQws6SvC53QuYStShFJNWyh7FG   (instead of 1Pq3SXz94SCnQVGxNUqUe7g2sqxjH8g72E)

I suppose when I sign the transaction, I would include only the compressed pubkey rather than the full pubkey, and when a node applies "OP_HASH160," it will hash the compressed pubkey resulting in the (non-b58encoded) second address rather than the first.  Do I understand correctly? 

Yes that is all correct (it is a 0x03 prefix because the x value is odd otherwise it would be 0x02).  Although either one will work there is no advantage to using an uncompressed key and it does mean that inputs are ~25% larger when redeeming P2PkH outputs.  It just adds extra space to the blockchain.  If Satoshi had been aware of compressed pubkeys it would have made sense to simply limit all Bitcoin pubkeys to compressed format.

Quote
There are always two P2PkH addresses for each private key (corresponding to uncompressed and compressed pubkeys)?

Yea "kinda".  It depends on what format the private key is in.  A private key is just a 256 bit number so as raw hex then yes there are two possible pubkeys.  In WIF format a trailing 0x01 is added to indicate the produced pubkey should be compressed.

So raw bytes = 2 possible pubkeys for every private key
WIF format = 1 possible pubkey based on the presence of the trailing 0x01.

Quote
I've been somewhat modelling the Sigsafe text-based terminal commands off of Vitalik Buterin's pybtctool (which has come in very handy for me so my respect to Vitalik), yet I don't see a way to generate a compressed pubkey from a privkey with this tool either. 

Python really isn't my language I am sure someone can help more but it looks around line 241 that either compressed or uncompressed.  I am not sure what it is expecting for an input however.  The dynamic types in python always make me a little crazy.  Still if you want your device to always produce compressed keys then you could simply remove that switch statement.  Note there is also a function at line 227 which will take an uncompressed pubkey and returned the corresponding compressed pubkey.
DeathAndTaxes
Donator
Legendary
*
Offline Offline

Activity: 1218
Merit: 1079


Gerald Davis


View Profile
July 09, 2014, 05:38:57 PM
 #66

Ah figured it out. 

Code:
def get_privkey_format(priv):
    if isinstance(priv,(int,long)): return 'decimal'
    elif len(priv) == 32: return 'bin'
    elif len(priv) == 33: return 'bin_compressed'
    elif len(priv) == 64: return 'hex'
    elif len(priv) == 66: return 'hex_compressed'
    else:
        bin_p = b58check_to_bin(priv)
        if len(bin_p) == 32: return 'wif'
        elif len(bin_p) == 33: return 'wif_compressed'
        else: raise Exception("WIF does not represent privkey")

So to use the priv2pubkey as is you would just need to append a 0x01 to the privatekey.  Maybe this is common for Python but that seems unnecessarily confusing as the private key doesn't actually include the 0x01.  The actual privatekey will still be 32 bytes.

Peter R (OP)
Legendary
*
Offline Offline

Activity: 1162
Merit: 1007



View Profile
July 10, 2014, 06:34:42 AM
Last edit: July 10, 2014, 06:48:49 AM by Peter R
 #67

I've been adding support for compressed pubkeys in order to minimize the size of the transactions produced by Sigsafe and help reduce blockchain bloat.  For example, in the image below, the Sigsafe determines the other bitcoin address for this sha256 hash:



Although the same private key (in byte form) was used, the resulting bitcoin address is now different than the one calculated earlier:

1BNLp3roCQws6SvC53QuYStShFJNWyh7FG  (bitcoin address for compressed form)

1Pq3SXz94SCnQVGxNUqUe7g2sqxjH8g72E  (bitcoin address for uncompressed form)

This affects bitcoin-signed messages too.  The signature for a bitcoin-signed message does not contain the public key, as a key-recovery algorithm is used.  How then does a verifier determine which of the two addresses to verify the signature too?  The answer is that this bit of information gets encoded in the first byte of the signature.  (I should write a more detailed post describing how to manually sign bitcoin messages, as it does not appear to be nearly as well documented as for signing bitcoin transactions themselves.)  It seems that the rule is:

if bitcoin address corresponds to an uncompressed key
    
        then   first_byte_of_sig = 27 + (y%2)

        else   first_byte_of_sig = 31 + (y%2)

where y is the y-coordinate of the curve point k*G found part way through the ECDSA signing operation.  

I didn't read this documented anywhere, however.  I got the "27" from pybtctool and I got the 31 by inspecting the binary data of signatures produced by brainwallet.org for compressed pubkeys.  Nevertheless, here's the signature produced by Sigsafe for a compressed key:



Brainwallet uses the first byte of the signature to know to hash the recovered pubkey in compressed from to the correct address (1BNLp3roCQws6SvC53QuYStShFJNWyh7FG):



Here's what pybtctool says about the same input:


Notices that it recovers the same uncompressed public key for the bitcoin message signed by the key to 1Pq3SXz94SCnQVGxNUqUe7g2sqxjH8g72E as it does for the message signed by the key to 1BNLp3roCQws6SvC53QuYStShFJNWyh7FG.  In my opinion, it should recover the compressed public key in the second case.

I also noticed that the popular web services:
  
   - bitaddress.og
   - brainwallet.org
   - blockchain.info

all default to using uncompressed pubkeys.  Now that I understand the issue more clearly, I think that by default developers should have their software use compressed pubkeys.  I think the reason this is not done now is that it's simply not on many people's radar.  
    

Run Bitcoin Unlimited (www.bitcoinunlimited.info)
DeathAndTaxes
Donator
Legendary
*
Offline Offline

Activity: 1218
Merit: 1079


Gerald Davis


View Profile
July 10, 2014, 04:28:22 PM
Last edit: July 10, 2014, 04:51:41 PM by DeathAndTaxes
 #68

Although the same private key (in byte form) was used, the resulting bitcoin address is now different than the one calculated earlier:
1BNLp3roCQws6SvC53QuYStShFJNWyh7FG  (bitcoin address for compressed form)
1Pq3SXz94SCnQVGxNUqUe7g2sqxjH8g72E  (bitcoin address for uncompressed form)

I am too lazy busy (yeah that is it) to copy the private key from the screenshot but if you include it in another post I will verify I am getting the same outputs.

This is how it should be.  The wording is unclear so I am not sure if you are just walking through the process or if it seemed unexpected to you.  The Address is the encoded pubKeyHash and the pubkeyhash is different because the pubkeys formats are "different" (although they represent the same value).  As a side note I don't think any wallet supports this but if you have a wallet which has 1,000 uncompressed pubkeys (and thus 1,0000 addresses) with the same raw private key you can generate 1,000 new compressed addresses.

Quote
The answer is that this bit of information gets encoded in the first byte of the signature.  (I should write a more detailed post describing how to manually sign bitcoin messages, as it does not appear to be nearly as well documented as for signing bitcoin transactions themselves.)  It seems that the rule is:

if bitcoin address corresponds to an uncompressed key
         then   first_byte_of_sig = 27 + (y%2)

        else   first_byte_of_sig = 31 + (y%2)

where y is the y-coordinate of the curve point k*G found part way through the ECDSA signing operation.  

I didn't read this documented anywhere, however.  I got the "27" from pybtctool and I got the 31 by inspecting the binary data of signatures produced by brainwallet.org for compressed pubkeys.

Agreed it is rather poorly documented.  My understand is the 27 is just a "magic number" designed to prevent collision with other prefixes.  It could have just as easily been:
1 = uncompressed & odd
2 = uncompressed & even
3 = compressed & odd
4 = compressed & even

I think I have some notes I saved when I reverse engineered it a while back.  I will see what I can find.


As a side note the distinction of compressed vs uncompressed is a bitcoin specific requirement.  By the ECDSA standard there is only one pubkey for a private key it just can have multiple forms.  The reason why the Bitcoin message signature needs to encode if the key is compressed is because Bitcoin addresses (which are what will be recognized by the user) are the hash of the pubkey not the pubkey.  Also secp256k1 makes it pretty easy there are only two possible y values for a given x value.  Some curves have more (4 or even Cool.  For this reason it really isn't necessary for the even/odd to be encoded.  It can be determined by brute force (if you can call a check even and then check odd to be "brute force").  The encoding of even/odd saves on average 0.5 verifications per signature (at the cost of a marginally larger signature).


Quote
Here's what pybtctool says about the same input:

<snip>

Notices that it recovers the same uncompressed public key for the bitcoin message signed by the key to 1Pq3SXz94SCnQVGxNUqUe7g2sqxjH8g72E as it does for the message signed by the key to 1BNLp3roCQws6SvC53QuYStShFJNWyh7FG.  In my opinion, it should recover the compressed public key in the second case.

That may be a bug in the implementation.  I would point out however the message signing protocol is rather loosely defined (especially the output).  If you take a look at Bitcoin-core for example you must provide the address in the verification screen and it separates out the address, signature, and message.

Quote
I also noticed that the popular web services:
  
   - bitaddress.og
   - brainwallet.org
   - blockchain.info

all default to using uncompressed pubkeys.  Now that I understand the issue more clearly, I think that by default developers should have their software use compressed pubkeys.  I think the reason this is not done now is that it's simply not on many people's radar.  

You're right there is no reason to default to uncompressed keys certainly not in 2014.  I wouldn't say it is something not on their radar,  pointed it out to bc.i more than two years ago.  I just don't think they care enough to make the change.  Obviously uncompressed keys need to still be supported for backwards compatibility but not only should uncompressed keys not be the default it shouldn't even be possible for users to create them (baring some advanced options).  Case in point if you call getnewaddress in Bitcoin core it will always return an address produced from a compressed key.  The only way to add "new" uncompressed keys is to import a private key in WIF format which lacks the IsCompressed flag.  I can't see a reason other than apathy which has prevented developers from switching over.

A good chance to get on my soapbox, developers make it easier for other developers to adopt good practices.  If you are writing a library or tool it should default to compressed keys.

Example (C# - NBitcoin)
Code:
public Key() : this(true)
{
}

public Key(bool fCompressedIn)
{
   ...
   SetBytes(data, data.Length, fCompressedIn);
   ...
}

"var k = new Key()" produces a compressed key, to create an uncompressed one requires an explicit declaration "var k = new Key(false)".
DeathAndTaxes
Donator
Legendary
*
Offline Offline

Activity: 1218
Merit: 1079


Gerald Davis


View Profile
July 10, 2014, 05:00:39 PM
 #69

I would also recommend supporting RFC6979 (deterministic signatures).  It provides a level of confidence for users (they can verify your device produces the same signature for the same key and message as any other RFC6979 compatible software/device).  This can be important as it is possible for a hardware device to intentionally produce signatures which are valid but are cryptographically weak under certain conditions. The good news is there are some python libraries which have implemented RFC6979 (or at least a Bitcoin specific subset of it). 

If you are a proponent of Test Driven Development, RFC6979 makes unit test verification of signature generation easier.  For a given message digest and private key there is only one correct RFC6979 signature.
Peter R (OP)
Legendary
*
Offline Offline

Activity: 1162
Merit: 1007



View Profile
July 10, 2014, 06:36:37 PM
Last edit: July 10, 2014, 06:47:51 PM by Peter R
 #70

This is how it should be.  The wording is unclear so I am not sure if you are just walking through the process or if it seemed unexpected to you.  

Yes, I was just walking through the process for posterity.  

Quote
...not only should uncompressed keys not be the default it shouldn't even be possible for users to create them (baring some advanced options).

My thoughts as well.  Sigsafe will create compressed keys by default and make it difficult for the user to do otherwise.  The only exception is when a user manually loads a non-compressed key in WIF format.
 
I would also recommend supporting RFC6979 (deterministic signatures).  

Yes, this is my intention, I just haven't got that far yet.  Presently, I am determining k by applying sha256 to the privkey concatenated with the message digest, simply because I haven't got the HMAC hash function working yet.

The micro I'm presently using has 16-bit "ints" and so far all of the open-source C code I've integrated has required some rework in order to get it to work--but that's a topic for another post too.  If I'm not too lazy busy Smiley I should make some pull requests to integrate these changes which improve portability (for example for the Trezor Crypto library).  

Quote
If you are a proponent of Test Driven Development, RFC6979 makes unit test verification of signature generation easier.  For a given message digest and private key there is only one correct RFC6979 signature.

Yes, I think Test Driven Development is very important with Bitcoin.  One reason I'm making all of my cryptographic primitives accessible via the text (and APDU) interface is so the device can be plugged into a computer and unit tests can be executed over a serial connection.  

Run Bitcoin Unlimited (www.bitcoinunlimited.info)
DeathAndTaxes
Donator
Legendary
*
Offline Offline

Activity: 1218
Merit: 1079


Gerald Davis


View Profile
July 10, 2014, 06:56:34 PM
 #71

Yes, this is my intention, I just haven't got that far yet.  Presently, I am determining k by applying sha256 to the privkey concatenated with the message digest, simply because I haven't got the HMAC hash function working yet.

Solid.  If due to the limits of the architecture you didn't get RFC6979 implemented I personally would still prefer a simple deterministic function like k=SHA256(key|mdigest) over the open ended risk of a random k.  Using a random k in my opinion is just bad practice and that goes beyond just Bitcoin specific uses (just ask Sony).
marcus_of_augustus
Legendary
*
Offline Offline

Activity: 3920
Merit: 2348


Eadem mutata resurgo


View Profile
July 15, 2014, 06:07:35 AM
 #72

Looks like some interesting kit.

So all open source? Which license?

Peter R (OP)
Legendary
*
Offline Offline

Activity: 1162
Merit: 1007



View Profile
July 16, 2014, 05:01:56 PM
Last edit: September 14, 2014, 05:57:52 PM by Peter R
 #73

Looks like some interesting kit.

So all open source? Which license?

The communication protocol will certainly be open.  I've been talking with other people working on related projects and there is a definite interest to create some sort of "industry standard" OpenNFC bitcoin interface protocol.  The idea is that a NFC reader at a brick-and-mortar store could send a payment request to a Sigsafe tag or to an Android phone using the exact same protocol.  And then the Android phone could turn around and act as the reader and request a payment from another phone or from a tag like Sigsafe!  Various levels or security can be enabled by authenticating the reader or the tag (or both) using cryptographic techniques.  Lots of interesting stuff becomes possible...

Hopefully we can make some serious progress on the OpenNFC interface starting mid August - October.  I'd like to work towards a standard set of APDU commands structured according to ISO/IEC 7816, as described earlier in this thread.  This way, the application layer for our protocol would be the same as that used by traditional contact and contactless smart cards.

Regarding the design itself, it is not completely clear yet what aspects will be open and what aspects will be closed.  This really becomes a business decision and one I can't make without consultation to (current and potential) stakeholders.  In general with bitcoin, I think you want to make a design open enough so that people are free to take what you've done and apply it in ways that you never thought of--so they need an open platform to do that.  But there still needs to be some mechanism that cements your business as one that remains needed (providing a useful product or service).  What is critical is that people trust you and your business, and that you have some provable reason for why they should trust you.  Fully open designs are one method, but partially closed designs where the closed portion is auditable by running unit tests is probably another.  The "proof-of-intent" bond I described in the white paper is potentially useful here too, as it allows a device manufacturer to place his funds at risk on the same device used by the customer.  

What's helpful about Sigsafe when it comes to bitcoin security is that it is only one side of the bitcoin-transaction equation.  Since it doesn't assemble the bitcoin TX, and it is not physically capable of broadcasting a TX, there is no method that rouge firmware could steal a users coins.  The most significant firmware risk is a faulty k-value during ECDSA operations.  But since Sigsafe uses deterministic signatures, this behaviour is fully auditable, whether the firmware is open-source of closed source.    

But this all does bring up interesting questions: how should bitcoin businesses earn a profit?  What is the best balance between "open-enough" to allow people to build upon your work, and "closed-enough" to (hopefully) retain some sort of advantage for your efforts?  



Run Bitcoin Unlimited (www.bitcoinunlimited.info)
Carlton Banks
Legendary
*
Offline Offline

Activity: 3430
Merit: 3071



View Profile
July 16, 2014, 09:32:11 PM
 #74

But this all does bring up interesting questions: how should bitcoin businesses earn a profit?  What is the best balance between "open-enough" to allow people to build upon your work, and "closed-enough" to (hopefully) retain some sort of advantage for your efforts?

Trust is a valuable asset IMO. Even when two devices conform to the same standards, and pass all the same tests, whose device would you pick if it was a choice between a dominant corporate vendor and a smaller independent vendor? I'd go with the smaller independent. The majority would trust the dominant corporation, but I think we need to move away from that culture.

Another aspect when considering the trust factor is the progress in 3D printing. It would surprise me if it weren't possible for a user to assemble their own hardware-based crypto key device by the end of this decade (that's probably too conservative). It would be more expensive to do compared to a mass produced device, especially when you add in the time it takes to research the project and any failed attempts. But personally, I'll be doing just that once the cost becomes low enough, hardware wallet would be a very desirable use of home-fab technology that could handle it.

So, to look at it another way, where's your revenue coming from once literally all you can sell is open designs?

Vires in numeris
Peter R (OP)
Legendary
*
Offline Offline

Activity: 1162
Merit: 1007



View Profile
July 17, 2014, 06:52:10 PM
 #75

But this all does bring up interesting questions: how should bitcoin businesses earn a profit?  What is the best balance between "open-enough" to allow people to build upon your work, and "closed-enough" to (hopefully) retain some sort of advantage for your efforts?

Trust is a valuable asset IMO. Even when two devices conform to the same standards, and pass all the same tests, whose device would you pick if it was a choice between a dominant corporate vendor and a smaller independent vendor? I'd go with the smaller independent. The majority would trust the dominant corporation, but I think we need to move away from that culture.

Another aspect when considering the trust factor is the progress in 3D printing. It would surprise me if it weren't possible for a user to assemble their own hardware-based crypto key device by the end of this decade (that's probably too conservative). It would be more expensive to do compared to a mass produced device, especially when you add in the time it takes to research the project and any failed attempts. But personally, I'll be doing just that once the cost becomes low enough, hardware wallet would be a very desirable use of home-fab technology that could handle it.

So, to look at it another way, where's your revenue coming from once literally all you can sell is open designs?

I think you touched on two interesting topics here: the importance of trust in our future decentralized economy, and the inevitability of open designs.  Both topics deserve thoughtful essays, but I'll just talk about "open designs" right now.  I'll start with an anecdote:

======
I have a fancy Miele espresso maker. The kind that is permanently mounted in a cabinet, has water lines, grinds beans fresh for each cup, etc.  Anyways, it broke one day and I called Miele to fix it for me.  

The women on the other end said, "Our service technicians aren't very familiar with those machines so we can't guarantee that they'd be able to fix it."  

I said, "But you'll still charge me for the service call anyways, right?"

She said, "Yup."   <it would have been several hundred dollars>

I said, "Give me the straight goods, do you think your guy will fix it?"

She said, "…..<long preamble>……probably not."

I took the machine apart and eventually identified the little plastic gear that was broken.  But I couldn't buy just that gear--I had to buy an entire "motor drive unit" for $450. Anyways, I got it working, but if you look at the time I spent plus the cost of the unnecessary parts, this little plastic gear ended up taking about $1,000 of energy to fix!  
======

Now imagine if this design was fully open.  I wouldn't even call Miele.  I would call my local "fixer guy," he'd take the machine apart, identify what was broken by cross-referencing the exploded-view engineering drawings, go online to download the STL file, print it on his 3-D printer, and install it for me.  This would give someone local a job, save me a huge amount of money and time (instead of spending a day fixing a coffee maker I can work on bitcoin), and reduce the impact on the environment (we would only print the part we needed--not the entire "brew drive unit").  

If we look at the whole world as a single system, then I think it is obvious that open-designs lead to better allocation of resources the closed designs.  So society, at least in aggregate, seems to come out ahead with open-designs.  The question is how do we get here in a way that investors who pay for development can still recoup their investments and earn a profit for the risk they took.  I have several ideas (many related to trust like you point out, as well as leveraging network effects) that I'll save for a future post.


Run Bitcoin Unlimited (www.bitcoinunlimited.info)
2112
Legendary
*
Offline Offline

Activity: 2128
Merit: 1065



View Profile
July 17, 2014, 07:38:45 PM
 #76

I took the machine apart and eventually identified the little plastic gear that was broken.  But I couldn't buy just that gear--I had to buy an entire "motor drive unit" for $450. Anyways, I got it working, but if you look at the time I spent plus the cost of the unnecessary parts, this little plastic gear ended up taking about $1,000 of energy to fix!  
======

Now imagine if this design was fully open.  I wouldn't even call Miele.  I would call my local "fixer guy," he'd take the machine apart, identify what was broken by cross-referencing the exploded-view engineering drawings, go online to download the STL file, print it on his 3-D printer, and install it for me.  This would give someone local a job, save me a huge amount of money and time (instead of spending a day fixing a coffee maker I can work on bitcoin), and reduce the impact on the environment (we would only print the part we needed--not the entire "brew drive unit").  
I just quoted this for posterity: height of a naiveté about 3D printing a "plastic gear". Yeah, you could print it and it would probably last couple of days as a replacement for a properly molded/machined gear. 3D printed stuff is most often about order of magnitude weaker than the part manufactured using classic methods. Geared transmissions are the prime example of that problem.

I understand that this is a side-argument to the primary of "open source" or "blueprints available" argument.

But with the introduction of 3D printing you've seriously weakened your reasoning and completely messed up your cost comparison.

Basically I'm typing this in in this thread to highlight that references to 3D printing usually mean that the proponent has no idea what he's doing and the effort will be delayed and over budget. For a recent example hop over to the Trezor thread. They 3D printed a prototype that is very expensive/nearly impossible to properly manufacture by injection molding and other conventional methods. It was basically painting a bulls-eye on themselves that says: vendor, rip me off, I'm out of my engineering expertise area and easily fall for bullshit sales techniques.

Please comment, critique, criticize or ridicule BIP 2112: https://bitcointalk.org/index.php?topic=54382.0
Long-term mining prognosis: https://bitcointalk.org/index.php?topic=91101.0
Adrian-x
Legendary
*
Offline Offline

Activity: 1372
Merit: 1000



View Profile
July 17, 2014, 09:57:03 PM
 #77

@2112 I run a 3D printing bureau, while I agree with your sentiment generally you are correct but SLS nylon printing would render a functional replacement gear for under $100, and for a similar cost we could CNC one from acetal, still cheaper than replacing the drive unit limited by today's tech and economics of scale.

But the fact the design is not open is the problem.

Peter is moving in the correct direction his idea is consistent with Chris Anderson's Free ideas. Peter just needs time to lock on to the value proposition, then everything can be open.

Thank me in Bits 12MwnzxtprG2mHm3rKdgi7NmJKCypsMMQw
2112
Legendary
*
Offline Offline

Activity: 2128
Merit: 1065



View Profile
July 18, 2014, 01:12:40 AM
 #78

@2112 I run a 3D printing bureau, while I agree with your sentiment generally you are correct but SLS nylon printing would render a functional replacement gear for under $100, and for a similar cost we could CNC one from acetal, still cheaper than replacing the drive unit limited by today's tech and economics of scale.

But the fact the design is not open is the problem.
You could produce a single gear that would work temporarily in an emergency. But replacing a single gear in a gear transmission causes radically faster wear of the both gears. So the failures cascade. This is the reason why the "gear drives" are sold as "matching sets".

From school days I remember workshop making a replacement gears from the obsolete soft plastic called "textolite" and replacing this "waste" gear frequently just so they can save the other gear, of much higher diameter, which they couldn't produce using available tools.

Anyway, if you guys don't have a genuine mechanical engineer involved in the project, then don't use the crutch of 3D printing. I understand that you aren't working on a "gear" but on a small, pocketable, (or purse-able, if there are any women using Bitcoin) "widget".

See if you could fit your electronics in a known, sturdy, small package, like a NIVEA creme 1oz tins: "classic" for a shielding metal case and "soft" for the EMF-transparent plastic case. Those things are nothing fancy, they may even look ridiculous, unless you call them "camouflage case" or "steganographic case".

Since this is mostly a software & electronic thread, I'm going to make another comparison: 3D printing is to mechanical engineering like Microsoft Visual Basic (classic, not .NET) is to software engineering. You can slap something together that may be able to impress inexperienced people. But you are highly unlikely to produce something durable. And you may push your overall project to a near failure (like Trezor) with endless delays and cost overruns. I tried to convince slush and stick in their thread to avoid trying to get fancy and trendy, you could search their thread for "eyelet". They didn't listen. Maybe someone here will listen.


Please comment, critique, criticize or ridicule BIP 2112: https://bitcointalk.org/index.php?topic=54382.0
Long-term mining prognosis: https://bitcointalk.org/index.php?topic=91101.0
Adrian-x
Legendary
*
Offline Offline

Activity: 1372
Merit: 1000



View Profile
July 18, 2014, 07:02:06 AM
 #79

@2112 I appreciate bringing attention to some of pitfalls of product development. I can't agree more that many overlook the what may be the basics for some. On the topic of 3D printing I can't but wonder if I am as ignorant of economics as Joe Blog is of 3D printing, I think we are nearing peek 3D printing.

I am no strange to product design and development with over 25 years of experience in the industry. It appears Peter is still in early concept development stages. I believe Peter will have access to experienced talent and advisers through this project.

I take it you're excited about the product and keen to see it succeeded, me too.



Thank me in Bits 12MwnzxtprG2mHm3rKdgi7NmJKCypsMMQw
Peter R (OP)
Legendary
*
Offline Offline

Activity: 1162
Merit: 1007



View Profile
July 18, 2014, 04:36:01 PM
 #80

I took the machine apart and eventually identified the little plastic gear that was broken.  But I couldn't buy just that gear--I had to buy an entire "motor drive unit" for $450. Anyways, I got it working, but if you look at the time I spent plus the cost of the unnecessary parts, this little plastic gear ended up taking about $1,000 of energy to fix!  
======

Now imagine if this design was fully open.  I wouldn't even call Miele.  I would call my local "fixer guy," he'd take the machine apart, identify what was broken by cross-referencing the exploded-view engineering drawings, go online to download the STL file, print it on his 3-D printer, and install it for me.  This would give someone local a job, save me a huge amount of money and time (instead of spending a day fixing a coffee maker I can work on bitcoin), and reduce the impact on the environment (we would only print the part we needed--not the entire "brew drive unit").  

I just quoted this for posterity: height of a naiveté about 3D printing a "plastic gear". Yeah, you could print it and it would probably last couple of days as a replacement for a properly molded/machined gear. 3D printed stuff is most often about order of magnitude weaker than the part manufactured using classic methods. Geared transmissions are the prime example of that problem.



3-D printing is no longer limited to low-quality plastics.  For example, with direct metal laser sintering, it's possible to produce decent metal parts that would be suitable for low-quality gears.  Remember, this is a plastic gear for a coffee maker that we're talking about replacing--not a steel helical gear for a vehicle transmission.  Also, and although it's not 3-D printing, there are services like Protomold's "First Cut" that CNC machine your part based on your STL files out of the material of your specification--entirely automated.

Like Adrian pointed out, the point that the design is open and that an experienced individual can choose to fix the problem using the technique he deems most suitable (3D print metal + enamel coating, CNC machine from delrin, or just get by for another few months with a 3D plastic gear) is the bigger picture here I think.  

Run Bitcoin Unlimited (www.bitcoinunlimited.info)
Pages: « 1 2 3 [4] 5 6 7 8 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!