Conversation

Replying to
Trezor Model T has open source firmware, passphrase protection based on a passphrase entered on the device and supports U2F, SSH and GPG in addition to being a Bitcoin wallet. Passphrases are dynamically mixed with the main seed protected by the hardware so there's deniability.
3
1
Replying to
Using a full blown Linux environment would be dramatically less secure from having far larger attack surface and wouldn't resolve hardware attacks based on physical access. This is an attack that needs to be hardened against at the hardware level and can't ever truly be solved.
2
4
Replying to and
Ledger doesn't meet your criteria of open source since it relies on a proprietary secure element. It still has a general purpose CPU just as vulnerable to hardware attacks, but the secrets aren't directly accessible to it. They've had their own more severe security issues anyway.
1
Replying to and
I think it's better to have a proprietary secure element than not having one, but I can understand why they prefer having open source firmware including the implementation of cryptographic primitives. Ideally, there would be hardware with tamper resistance *and* open firmware.
1
Replying to and
A Trezor is essentially a tiny general purpose computer with full verified boot and very small attack surface. The main defense against a physical attack is really the passphrase feature. The PIN and hardware security (tamper evident case, embedded SoC) are very basic obstacles.
1
Replying to and
A separate secure element for storing the seed would raise the complexity (cost) of extracting the seed with physical access, but it can still be done. The passphrase feature on the Trezor Model T where it can be entered on the device itself is a much more compelling feature.
1
Show replies