It doesn't include any proprietary software and the whole thing is an open design that other people are able to build (and have successfully done so in practice). The primary purpose is for cryptocurrency wallets but it works well for U2F, GPG, SSH and various other purposes too.
Conversation
There are definitely options beyond proprietary ones, including options with much different approaches than a traditional HSM storing the keys with / without encryption (ideally with a passphrase entered onto the device). I really like the approach pioneered for Bitcoin wallets.
1
1
Since that lets you generate keys on the hardware wallet, back up the high entropy recovery seed as a phrase, verify you backed it up correctly and then if you need to recover on a new device you can enter it directly onto a new hardware wallet without exposing it to a computer.
1
The traditional approach is good if you have existing SSH and GPG keys that need to be moved onto an HSM. I'll definitely prefer the deterministic wallet approach for new keys though. It's not that bad to migrate to new SSH keys but GPG tends to make rotating keys very painful.
1
Signing keys for firmware usually can't be rotated at all since they're burned into fuses so that's another case where a more traditional HSM is the best option since existing keys need to be migrated. Android app signing keys were similar, but they've finally added key rotation.
1
I really like the - code has been audited by so that is a huge plus in my book, and there's tons of eyes on the code as maintainers use them as well. Nothing against - they are an incredible company and I use their devices for btc
2
Entering a password on device (like you mention) is a big plus for Trezor though, as is their open CPU. (What smart card does nitrokey use?)
1
1
I find the recovery model to be the biggest advantage of the approach based on deterministic wallet design. The hardware wallet generates a high entropy seed, displays it as a recovery phrase and you can write it down, store it and recover without exposing it to the computer.
1
1
1
This Tweet was deleted by the Tweet author. Learn more
It's the approach to the security model including recovery, passphrases and on-device input / confirmations that I like rather than the hardware though. I don't want to import keys generated on my computer or expose them to it from cold storage if I need to do recovery, etc.
2
1
The Trezor hardware isn't what's compelling about it. It's just a standard embedded computer with secure boot and a tamper evident case. I'd like to see more implementations that are fully compatible with not just the cryptocurrency wallet aspect but also SSH, GPG, U2F, etc.
I think they have by far the best approach to this on the Trezor Model T and I'd really like to see alternate implementations with different trade-offs like having a secure element for storing the seed and doing cryptographic operations at the expense of openness and flexibility.
1
1
Ideally, there would be a much more tamper resistant general purpose SoC available so it wouldn't need to be a compromise. They do have basic tamper resistance already but it would be good to have lower-level support from the SoC like memory encrypted with a hardware key, etc.
1
1

