There is no 100% safe hardware wallet, comment on the Ledger and Trezor wallet mutual incident

avatar
巴比特
6 years ago
This article is approximately 952 words,and reading the entire article takes about 2 minutes
Trezor Wallet Responds to Ledger Wallet Vulnerability Allegations.

Editors Note: This article comes fromBabbitt InformationEditors Note: This article comes fromblog.trezorBabbitt Information

There is no 100% safe hardware wallet, comment on the Ledger and Trezor wallet mutual incident

, translated by Free and Easy; The original text comes from

, author SatoshiLabs, reprinted with authorization by Odaily.At this years MIT Bitcoin World Expo, hardware wallet manufacturer Ledger demonstrated five attack methods against its counterpart Trezor at the conference. After that, the company also announced specific vulnerability details on its official website. Its to be expected that many users who buy a Trezor or its imitation hardware wont sit still.

Readers who dont know about this matter can first read this article reported by Miss Babbitt Wendy:

The hardware wallet security team has repeatedly made strange moves, and Ledger started with its peer Trezor

Of course, we cant make a conclusion so simply, we have to listen to the other partys explanation. According to the response given by Trezor, the vulnerabilities mentioned by Ledger all require physical access, some of which have been solved by Trezor, some of which belong to the problems of all hardware devices, and the rest are all currently based on ST microchips. Problems with the equipment, which also includes the Ledger itself.

Through this incident, we can understand that no hardware wallet can be 100% safe, and it is important for users to raise their security awareness.

The following is Trezors response:

We would like to take this opportunity to address, clarify, and respond to Ledgers statement made against Trezor at the MIT Bitcoin Expo.

  • secondary title

  • Simple response:

  • Supply chain attacks: out of scope, affecting all hardware in transit, no 100% solution, all companies have different ways to mitigate this;

  • Software vulnerability attack: not exploitable, has been fixed;

  • Side channel PIN attack: fixed;

  • Side channel attack scalar multiplication: not exploitable, requires PIN;

Surprise Concluding Attack: Not fully disclosed, it affects all hardware devices based on ST microchips, and can be mitigated through passwords;

All of the demonstrated attack vectors require physical access to the device, the attacker needs to use specialized equipment and master specialized attack techniques, and finally it takes time.

There is no 100% safe hardware wallet, comment on the Ledger and Trezor wallet mutual incident

This is why we believe these issues are of low importance to the vast majority of hardware wallet users. A recent study conducted in partnership with Binance confirms this, with only 5.93% of respondents citing physical attacks as the greatest threat to cryptocurrencies, while 66% of respondents cite remote attacks as the main threat. This 5.93% can be protected by using a passphrase, which overrides the physical security of the device and recovery seed.

Binance Security Survey Results, Sample 14,471 Respondents

There is no 100% safe hardware wallet, comment on the Ledger and Trezor wallet mutual incident

The primary purpose of hardware wallets has always been to protect funds from malware attacks, computer viruses, and various other remote threats such as stealing all funds from the ledger by secretly changing addresses. While achieving perfect physical security is a noble goal, it is ultimately unattainable because of the $5 wrench attack. Furthermore, if one has the money, time, and resources, there is no hardware barrier against their attacks. If we take into account accidental theft, the chances of him finding your hardware wallet and accidentally having the equipment needed to break into these devices are relatively small.

image description

We designed the Trezor device with the threat model explained above in mind - our main focus is protecting users from remote attacks. That said, combined with strong cryptography and at least basic operational security principles, even a physical attack on Ledger would not affect Trezor users.

Knowing this, lets look at the issues Ledger addressed on Sunday.

secondary title

Supply chain attacks are an eternal problem with all hardware devices (not just wallets), no matter how well protected they are. A piece of hardware cannot check itself and verify its integrity. Hardware authentication is not a solution, since hardware modifications can be added that cause the device to confirm that it is genuine.

There is no 100% safe hardware wallet, comment on the Ledger and Trezor wallet mutual incident

image description

Demonstrate injecting arbitrary recovery words into the Ledger hardware wallet, presented by Saleem Rashid

Problem 2- Software Vulnerabilities Attacks

During testing of the Trezor codebase, Ledger researchers discovered two issues, and they also confirmed that our code is highly resistant to malicious actors. Although these bugs were not exploitable, we fixed them anyway. We would like to take this opportunity to thank Ledger for reaffirming that the Trezor source code is written with high quality.

Issue 3 - Side channel attack on PIN

The side-channel attack on the PIN on the Trezor One wallet is indeed impressive and we applaud Ledger for their efforts. At the same time, we would like to thank Ledger for responsibly disclosing this issue to us. This attack vector can be solved by backporting the data storage method on the Trezor T model to the Trezor One.

Question 4-Scalar Multiplication of Side Channel Attacks

This vulnerability assumes that the attacker has the users PIN and has physical access to the device, and ultimately the passphrase. With all of the above in hand, the attacker has full control over all funds held by the hardware wallet.

secondary title

Question 5+6 Surprise Concluding Attack

The two questions are practically the same, but 6 sounds better than 5. Still, we are surprised that Ledger announced this issue, especially after Ledger explicitly asked not to announce it, as this could affect the entire microchip industry, not just hardware wallets (such as the medical and automotive industries). Since Ledger is currently negotiating with the chip manufacturer (ST), we will also avoid leaking any critical information, except that this attack vector is also resource intensive, requiring lab-grade equipment to operate the microchip as well as in-depth expertise.

Ledger, we are still discussing with ST, please dont mention the details of the attack, okay?

If you are a Trezor wallet user and fear physical attacks on the device, we recommend setting up a password-protected wallet. In the best case, multiple passwords can be used for combined protection. Passwords will completely mitigate this attack vector.

secondary title

in conclusion

There is no 100% safe hardware wallet, comment on the Ledger and Trezor wallet mutual incident

in conclusion

image description

This article is from a submission and does not represent the Daily position. If reprinted, please indicate the source.

ODAILY reminds readers to establish correct monetary and investment concepts, rationally view blockchain, and effectively improve risk awareness; We can actively report and report any illegal or criminal clues discovered to relevant departments.

Recommended Reading
Editor’s Picks