Anybody point me to doc on how to reliably dump the firmware from @nitrokey devices? They claim 3rd party verifiability...
-
-
Replying to @rootkovska
@rootkovska For#Nitrokey Pro+HSM firmware is read-protected but it can be overwritten with a verified image.1 reply 0 retweets 0 likes -
Replying to @rootkovska
@rootkovska Later we want to fill the free program flash with random. If MicroSD is removed, there won't be space to hide malicious function1 reply 0 retweets 0 likes -
-
Replying to @nitrokey
@nitrokey I'm looking for schematics more like these:https://github.com/inversepath/usbarmory/blob/master/hardware/mark-one/armory.pdf …2 replies 0 retweets 2 likes -
Replying to @rootkovska
@rootkovska Here are the schematics for Nitrokey Storagehttps://github.com/Nitrokey/nitrokey-storage-hardware/blob/master/V1.3/Plots/NitrokeyV13%20-%20Schema.pdf …1 reply 0 retweets 2 likes -
Replying to @rootkovska
@rootkovska Also not sure if USB Armory supports one-time passwords, secure key storage for GnuPG, PKCS#11, hidden encrypted volumes.1 reply 0 retweets 0 likes
@nitrokey @rootkovska of course it does, given that we can ran an arbitrary software stack, anyway the two products are obviously different
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.