Bitcoin Forum
May 02, 2024, 03:53:48 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: USB armory - open hardware platform, can be used as hardware wallet  (Read 1682 times)
aldous (OP)
Newbie
*
Offline Offline

Activity: 3
Merit: 0


View Profile
October 23, 2014, 10:48:24 AM
 #1

Project page: http://inversepath.com/usbarmory

The documentation wiki at https://github.com/inversepath/usbarmory/wiki/Applications refers to Electrum being tested running on the device.

http://inversepath.com/images/usbarmory_coin_web.jpg

From the press release:

Inverse Path is proud to announce the USB armory project, an open source hardware design, implementing a flash drive sized computer for security applications.

The USB armory is a compact USB powered device that provides a platform for developing and running a variety of applications.

The security features of the USB armory System on a Chip (SoC), combined with the openness of the board design, empower developers and users with a fully customizable USB trusted device for open and innovative personal security applications.

The USB armory hardware is supported by standard software environments and requires very little customization effort. In fact vanilla Linux kernels and standard distributions run seamlessly on the tiny USB armory board.

The capability of emulating arbitrary USB devices in combination with the SoC speed, the security features and the flexible and fully customizable operating environment, makes the USB armory the ideal platform for all kinds of personal security applications.

The Inverse Path team, with the help of the open source community, will develop applications that fully explore the potential of the USB armory board.

The USB armory will be available for pre-order soon. Delivery of the device before the end of 2014 is planned.

Target applications:

- mass storage device with advanced features such as automatic encryption, virus scanning, host authentication and data self-destruct
- OpenSSH client and agent for untrusted hosts (kiosk)
- router for end-to-end VPN tunnelling, Tor
- password manager with integrated web server
- electronic wallet (e.g. pocket Bitcoin wallet)
- authentication token
- portable penetration testing platform
- low level USB security testing
1714622028
Hero Member
*
Offline Offline

Posts: 1714622028

View Profile Personal Message (Offline)

Ignore
1714622028
Reply with quote  #2

1714622028
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714622028
Hero Member
*
Offline Offline

Posts: 1714622028

View Profile Personal Message (Offline)

Ignore
1714622028
Reply with quote  #2

1714622028
Report to moderator
Snail2
Legendary
*
Offline Offline

Activity: 1512
Merit: 1000



View Profile
October 23, 2014, 01:03:31 PM
 #2

WOW! Impressive. Will these machines work through a powered USB hub attached to let's say a Raspberry?
aldous (OP)
Newbie
*
Offline Offline

Activity: 3
Merit: 0


View Profile
October 23, 2014, 01:17:35 PM
 #3

Yes, quoting the project page "USB host powered (<500 mA) device with compact form factor (65 x 19 x 6 mm)".
intron
Sr. Member
****
Offline Offline

Activity: 427
Merit: 251


- electronics design|embedded software|verilog -


View Profile
October 23, 2014, 02:02:07 PM
 #4

...watching...
wobber
Legendary
*
Offline Offline

Activity: 1064
Merit: 1001


View Profile
October 23, 2014, 02:14:03 PM
 #5

And what about BadUSB exploitation?

If you hate me, you can spam me here: 19wdQNKjnATkgXvpzmSrkSYhJtuJWb8mKs
btchip
Hero Member
*****
Offline Offline

Activity: 623
Merit: 500

CTO, Ledger


View Profile WWW
October 23, 2014, 03:42:30 PM
 #6

And what about BadUSB exploitation?

BadUSB is just a case of "insecure devices with firmware flashing capabilities are insecure" which is utterly obvious and does not apply here.
Moreover the same thing was already done in 2009, in a more scary version.

This development platforms looks interesting - I'm eager to see public and open source use cases of TrustZone in the wild. Do you already have some pointers regarding that ?

aldous (OP)
Newbie
*
Offline Offline

Activity: 3
Merit: 0


View Profile
October 23, 2014, 03:54:53 PM
 #7

The Genode framework implements TZ for the same processor (http://genode.org/documentation/articles/trustzone).
btchip
Hero Member
*****
Offline Offline

Activity: 623
Merit: 500

CTO, Ledger


View Profile WWW
October 23, 2014, 04:43:58 PM
 #8

The Genode framework implements TZ for the same processor (http://genode.org/documentation/articles/trustzone).

Thanks, should have read your page better Smiley

HeroCat
Hero Member
*****
Offline Offline

Activity: 658
Merit: 500


View Profile
October 23, 2014, 07:32:40 PM
 #9

It sounds good - but what will say your os about that ? Grin
btchip
Hero Member
*****
Offline Offline

Activity: 623
Merit: 500

CTO, Ledger


View Profile WWW
October 24, 2014, 05:54:07 AM
 #10

Is there a full public datasheet of the i.MX53 available somewhere ?

SCCv2 seems nice for a wallet

Quote
Security controller, version 2 (SCCv2)—Improved SCC with AES engine, secure/non-secure
RAM and support for multiple keys as well as TZ/non-TZ separation

Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!