Conversation

Replying to and
I wrote a thread reviewing it and explaining how the security model works here: twitter.com/DanielMicay/st It doesn't store keys at all, but rather derives them dynamically from the stored high entropy seed (which has a great recovery mechanism), the passphrase and the identity.
Quote Tweet
Trezor Model T is a great product. I bought it for hardware-based Bitcoin wallets but it's working well for SSH via trezor-agent (ed25519) and U2F. It has per-identity keys for SSH and requires auth to use U2F or an SSH identity via the touchscreen just like Bitcoin payments.
Show this thread
1
1
Replying to and
To recover on a new device, you enter the recovery phrase that was written down to restore the same seed and then entering the proper passphrase and requesting the same identity will produce the same key as before. There's never a need to expose it on a general purpose computer.
1
Replying to
Using a full blown Linux environment would be dramatically less secure from having far larger attack surface and wouldn't resolve hardware attacks based on physical access. This is an attack that needs to be hardened against at the hardware level and can't ever truly be solved.
2
4
Show replies