Conversation

Replying to
The primary attack vector for a hardware wallet is an online attack. Linux has drastically more attack surface for either an online attack or physical attack vector when powered on. Trezor's passphrase feature doesn't store it so it's deniable with any number of hidden keys.
1
3
Replying to and
Using Linux for this, especially with the typical userspace, is drastically less secure than running a tiny hardened crypto application in a minimal embedded environment. I don't understand why you would want that. Linux has garbage security even for a general purpose OS...
1
1
Replying to and
... and this is a bad use case for a general purpose OS. It also doesn't store data but rather a seed used to generate keys to access data. The passphrase is appended to the seed phrase before deriving the main key from it. Encrypting it with the passphrase would be a downgrade.
1
Replying to and
You linked to a post about a physical attack vector on an SoC which is entirely applicable to a Linux installation. The post is also dishonest and pushing misinformation, but you're misunderstanding it if you think Linux is better. Linux is far more vulnerable to the same attack.
1
Replying to and
The mitigations implemented in the Trezor firmware against the attack wouldn't be present, and there would be drastically more attack surface. An attacker could much more easily gain code execution. An air gap doesn't remove online attack vectors at all.
1
Replying to and
It still needs to be kept updated too, and there would be massive attack surface simply for that. Simple update verification, full verified boot and downgrade protection with minimal state are important. The entire point is not having the attack surface of a general purpose OS.
1
1
Replying to and
I think you're just misinterpreting that post and drawing the wrong conclusions. It's about a hardware attack, and a general purpose computer running Linux is far more vulnerable to the same kind of attacks. It ignores the passphrase feature and is unnecessarily dishonest too.
2
1
Replying to and
1) Aside from technical comparisons guys. The main drawback of the hype is in its real-world-usage. In the non-tech attack surface. While "shitty linux" computer is multipurpose tool, a low-value-target, the Trezor is a single purpose HVT. Your home address and payment..
1
2) ..details lead to your RL persona, giving the attacker answer on who, when, where, what and how. Once you are reasonably interesting, 5$ wrench technique can be applied by an attacker. The "shitty linux" user is not visible, and remains happily shitty 🤔
1
It can be purchased with Bitcoin using a pseudonym and you aren't forced to send it to your home address. It has a strong mitigation against attacks based on coercion via the passphrase feature. Every passphrase is valid and leads to a different key (i.e. different wallets).
2
The passphrase feature allows for completely deniable keys (wallets) because it doesn't store anything. It only stores the base seed phase that the passphrase is appended to. Every passphrase is valid and there's no persistent state on the device tied to which ones were used.
1
Show replies
Replying to and
Single purpose tool (even technically advanced), with high potential of valuable intel can be targeted much more easily than the multipurpose, free, anonymous, linux tool. It simply makes more sense to attack one publicly known HVT vendor and its infrastructs.
1
Supply chain attacks on laptops with a complex list of trusted parts are far more likely and don't have less of a reward for the attacker. I'm not sure how buying a computer with Linux is supposed to be free or anonymous or how Linux is even relevant to your proposed attack.
2
Show replies
Replying to and
It all depends on your threat model, trust model and adversary you calculate with. For me the best security tech solution, doesnt mean the best security solution. This is the main drawback of things like Trezor and hype around it. It can create false magic sec feeling.
1
It does depend on your threat model, and the one you're trying to come up with hasn't made much sense. There's definitely a false magic security feeling in this thread about Linux and laptops. I'm unsure what hype you're talking about or how using a decent tool is a bad thing.
1
Show replies