nostr:npub12r0yjt8723ey2r035qtklhmdj90f0j6an7xnan8005jl7z5gw80qat9qrx nostr:npub12gu8c6uee3p243gez6cgk76362admlqe72aq3kp2fppjsjwmm7eqj9fle6 nostr:npub1mrechz2tgtmspqc9e6l30dyfy4j57g43srzcvxupzs0cpn8h9pyqwms0g5 - please pass onto other coldcard owners! ๐Ÿ™

nostr:note1mj9phf40h4q9rsu8vkz84jtdhcmy3m2asvv5hze4xgrap5fxxwxqzz5j7n

Reply to this note

Please Login to reply.

Discussion

I read and need to re-read to understand more, but a quick question: This post was written in May 2020. Are you saying that to date they have not patched this vulnerability?

The Coldcard blog post link in the article goes to a 404 page. Do you know if thereโ€™s a new link for that?

Sorry I don't ๐Ÿ˜• I'll be on the lookout for it though.

Found this on archive.. *hopefully helps?*

https://web.archive.org/web/20200612192118/https://blog.coinkite.com/supply-chain-trust-minimized/

Always load fresh firmware on a new one. Good to go after that