@crashfoxcrypto since you seem to know more than all the researchers telling you and @Bitfi6 that this device is in fact hackable, you should go to @DefCon or @DerbyCon and give a session on your research. I Guarantee they'd love to have someone of your caliber
-
-
Replying to @DotNetRussell @Ug_0Security and
When somebody starts writing me a check maybe we'll talk. I'm honestly surprised at all of the fuss. Surely you all have weighed the hardware wallet options? The only static variable is that everything is dynamic. We should all be critical, yet objective & concise, should we not?
3 replies 0 retweets 0 likes -
Replying to @crashfoxcrypto @Ug_0Security and
"When someone writes a check I'll support the community" What a scrub answer. I assume you learned everything you know about infosec 100% on your own without any help from anyone. Never attended a conference. Never watched a session video... Please
3 replies 0 retweets 3 likes -
Replying to @DotNetRussell @Ug_0Security and
How about this. If that is a hack to you ... sure. I don't think everyone who roots their phone is a hacker though. If you steal a F1 racecar that doesn't mean you could drive it. It's not encompassing to me. Again, you should see that I get your point. I wonder if you get mine?
3 replies 0 retweets 0 likes -
Replying to @crashfoxcrypto @DotNetRussell and
Hey CrashFox, if root means “hack”, then why on earth isn’t anyone coming forward to claim this money especially after we politely asked the infosek community for help to determine if this is indeed possible: https://bitfi.com/bounty2
6 replies 2 retweets 3 likes -
I agree. Evidence over lies. If you have proof show it...
3 replies 0 retweets 1 like -
-
Replying to @buffermet @TruthRaiderHQ and
If it’s taking that much time, even if they succeed the attack vector becomes unrealistic. What, some hacker is going to grab a bunch of wallets off a UPS truck and modify them in 10 minutes when it’s taking them weeks? This is just becoming a dog and pony show now.
5 replies 5 retweets 9 likes -
Once the attack is finalised and automated, the phone will just need to be connected over usb for maybe a minute.
2 replies 1 retweet 4 likes -
Replying to @David3141593 @TruthRaiderHQ and
We have a patch for this and it will render this useless within 5 minutes of its discovery
2 replies 0 retweets 2 likes
So you acknowledge this is an issue? Hacked devices will not recive updates.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.