Trezor is so aware that secure elements are an element of trust that it has kept the secure sd function in its Trezor 5 model with secure element.

When someone doesn't talk about this transparently it just comes across to me as a scammer.

There are also many critics of Jade because they call their virtual protection secure element mocking that it does not have secure element when it is one of the most elegant solutions in the industry for this problem.

Jade simply uses a multi-signature model to protect the seed (Local + remote server), thus avoiding having to use a secure element.

I never listen to this discussion on podcast.

nostr:nevent1qvzqqqqqqypzpl8hpfzul2qha25p8wd63gm46ufax95lfgnl8h9v84y3zt0k05m7qy88wumn8ghj7mn0wvhxcmmv9uq3xamnwvaz7tmsw4e8qmr9wpskwtn9wvhsqg9c42zd0a49el902gm99u9797dpa5e6wkqmdhh52yc47kknw9lhusu2uaaq

Reply to this note

Please Login to reply.

Discussion

nostr:nprofile1qqsw3znfr6vdnxrujezjrhlkqqjlvpcqx79ys7gcph9mkjjsy7zsgygpr9mhxue69uhhqatjv9mxjerp9ehx7um5wghxcctwvsq3samnwvaz7tmjv4kxz7fwdehhxarjd93kztnrdaksz9thwden5te0wfjkccte9ekk7um5wgh8qatz7tvu4p

This is for all jade models or just the plus?

Imagine the Nazis with their enigma machine, and the cryptographer tells you, look, you have to trust this black box that is inside, it was given to me by a third party and I don't know how it works, I have to trust its specifications, our encryption security depends on it.

In cryptography you cannot depend on the trust of a third party, otherwise what is the point of cryptography?

You can spin it as much as you want to try to sell your crappy product but no security agency would trust these security schemes, in fact these security schemes are used to attack the enemy through backdoors (bugs), you have many examples like TPM, Intel ME, PSP, Dual_EC_DRBG, Apple T2, Google Titan, Qualcomm TrustZone, etc, do you think that your cheap chip (secure element) of your hardware wallet protects you?

nostr:nevent1qvzqqqqqqypzpl8hpfzul2qha25p8wd63gm46ufax95lfgnl8h9v84y3zt0k05m7qyfhwumn8ghj7ur4wfcxcetsv9njuetn9uqsuamnwvaz7tmwdaejumr0dshsqgp4qhmd32yhnxz6uy9rf5sr8z2cchtv64sgswwyhfud3n3vs44n55hjqjkq

What does "secure element" mean?

💯 Jade give a elegant solution but I don’t know why nobody don’t talks about it… They only praise coldcard when their security model could be more compromised…..

SOLUTION TO ALL PHONE HACKING ISSUES, PROGRAMMING AND ONLINE TRAINING

* Email: conleyjbeespy606@gmail.com

* Telegram : +44 7456 058620

* Instagram: JBEE SPY TEAM

CERTIFIED ONLINE PRIVATE INVESTIGATOR AND CYBER SOLUTION EXPERT

- Full access hack into all types of mobile phones/devices

* Unnoticeable hack into all social media account

* Fixing of credit score

* Fixing of public record

* Recovery and multiplying of BITCOIN

* Cloud and email data extraction

* Location tracking

* Being blackmailed-we will trace the source and the person behind it-

CONTACT On

* EMAIL: conleyjbeespy606@gmail.com

* Telegram - +44 7456 058620

* Instagram- JBEE SPY TEAM

Explain what you want and go straight to the point. Make available TARGETS DETAILS.

And simplv start monitorina the device.