Thank you for taking the time to respond 🙏
> - KEYS GENERATED BY USER USING ENTROPY FROM HARDWARE AND APP
This is unverifiable. Even if the code is open source (is it?) how do you know the device you hold is doing what it says it does? How can you verify?
(Note that every hardware wallet has this problem. The only way to validate the HWW’s process is to roll a seed yourself, then load it on multiple vendors’ devices to confirm they all yield the same XPUB and addresses.)
Whether the seed was printed at the factory, or printed by a closed source process, one cannot verify that it was done securely and that nobody else has the key.
IF you were going to use multiple of these “trust me” seeds together in a multisig quorum, then you could be reasonably sure you won’t get rugged. It’s unlikely they’re all vulnerable at the same time, exploitable by the same attacker.
Regarding backups: if you can’t extract/load the seed onto the device, then you can’t back it up. Making a copy of the Ballet private key and using Bitkey’s multisig backup seem to me to offer equivalent ways to recover the wallet following loss/destruction of the device.
Your other points are valid, particularly the point about address reuse.
BITKEY SOURCE AND DOCUMENTATION CAN BE FOUND HERE:
https://github.com/proto-at-block/bitkey
Nice!
It’s still not possible to verify that that code is what’s running on your device. Better than nothing.
I have the same critique of all firmware-pre-loaded devices (ColdCard, Trezor, etc.). Self-built SeedSigner is better in this regard.
Thread collapsed
Thread collapsed