Burn your blockclocks

Reply to this note

Please Login to reply.

Discussion

Never bought one. It's been burnt. 🤣

👏👏👏👏

🔥 🔥 🔥

Glad I didn’t give that asshole a dime. Fuck him.

Fucking grifter

What's y'alls chosen cold storage?

I’m a seedsigner maxi. I’ve build two and I only use the pi zero with no WiFi

I mean the coldcard is still solid though right?

Granted this grifting is off putting, the device isn't flawed?

Depends on who you ask. The secure elements on the CC have apparently been hacked. But I haven’t confirmed personally only read about it. And their software is no longer truly FOSS. You can only read the code.

Hacked as in; if my cc gets stolen my seed is comprised ?

Yes I'm not a fan of the Foss thing

Yes. The person would need physical access to your CC from what I read. Then they could deploy the hack to the secure element. So as long as that fits your risk model and it hasn’t been plugged into a computer (eg you’re using is truly air gaped) you’re probably fine.

There are ways to exfiltrate data through a QR or SD card airgap. SD card is easiest; write to hidden blocks.

QRs can be modulated in other ways such as delay time, intentional error faults, or other choices.

There is also the fact that anything that exists emits EMI, and the Coldcard is no exception. This can be abused to create signals that contain your seed + can be detected at quite a distance using a box the size of a Pi.

Thanks nostr:npub12262qa4uhw7u8gdwlgmntqtv7aye8vdcmvszkqwgs0zchel6mz7s6cgrkj 🙏

The secure elements in the products have had attacks done on them several times. The maker of the SE chips only released incremental updates that do not fix the fundamental flaw.

The original company that made the SE IC is long defunct too. It’s like maintaining an old codebase with no one around.

There are also several critical flaws in the design of the Coldcard that allow undetectable supply chain attacks.

Thanks for that. What's your preferred cold storage?

Currently, a Ledger Nano S with Sparrow. Not my preferred though.

I am working on mu own cold storage product that is built on a security-certified secure element with custom firmware on the SE.

There’s also the option to use an SS.

If you have any questions about SEs let me know.

I appreciate the info. In my case I am only capable of buying the best hardware. I'm not tech savy and not in a position to learn.

But thank you for the offer kind fren.

The SS is pretty intuitive. Certainly worth the time and effort if we are talking about retirement money and securing BTC. If you can raise a kid or follow a cooking recipe you got this!

Okay. nostr:nprofile1qqs9kuhw2rt0zx3dr45vddm25q0tj9jdg2wwmya8g7a36pzlcvc3sfs56demg I need a few weeks to a month. I don't even have a desk or power at the moment.

I accept your challenge. And will report back with questions when I am ready 👊

OK nostr:nprofile1qqs9kuhw2rt0zx3dr45vddm25q0tj9jdg2wwmya8g7a36pzlcvc3sfspzamhxue69uhkxun9v968ytnwdaehgu3wwa5kuegpp4mhxue69uhkummn9ekx7mq0wg87y new fren! I will give it a go in a month or so.

Need to set up some power and a desk here in the bush. Probably get starlink set up too.

I may have questions.

Thanks for the motivation. 👊

Feel free to reach out if you have questions. Followed back.

Awesome. Thank you!

How do you prevent the Dark Skippy attack with a seed signer?

https://darkskippy.com/

It’s not in my threat vector. I need to be aware that it exists, but I have physical access security measures to avoid this.

I am planning to move to FrostSnap once vetted.

https://frostsnap.com/

Interesting. Although I'm hesitant to connect my cold Storage to a phone

I like the innovation. But I refuse to connect my private seed to anything that touches the internet. Or use a device that has the capability of connecting to the internet

My thoughts exactly

I must be fair here, the risk is way lower than you think.

Buses like USB and NFC are pretty simple under the hood and aren’t the cause of attacks.

Usually, it is the OS’ fault for trusting any device what it is (like a keyboard), or trying to go too fast, using things like DMA which if misconfigured can be exploited.

On microcontrollers it is pretty easy to audit the entire stack.

It is impossible to execute an attack via USB/NFC/whatever alone and requires either a high attack surface by the firmware developer or a backdoor.

The Frostsnap device has no secure element and my interactions with the authors make me feel like that they do not fully understand security.

Their security model is the same as assuming a paper backup.

Did I miss something? How so?

Well, the latest of his charades is (I’ll say allegedly to avoid the highly unlikely potential it wasn’t him) buying domain names for competing products/projects and pointing them to FUD sights. But he got caught and now pointed them all to cia.gov

The list of shit is too long to post, but there’s a long history

Ahh I see

Holy fuck, nostr:nprofile1qqsw3znfr6vdnxrujezjrhlkqqjlvpcqx79ys7gcph9mkjjsy7zsgygpzpmhxue69uh5ummnw3ezuamfdejsz9thwden5te0v4jx2m3wdehhxarj9ekxzmnymlvvup going Elon unpopular.

Always has been?

What's the scoop?

Nvk is being a grifter again

…still.

Is it related to nostr:nprofile1qqst2yn6pr8nxctzwjqq5su83qdflx8qfwwrwytwjt09y5zfsc6uggspramhxue69uhhyetvv9ujumn0v3jhyatwdejhyuewdejhgam0wf4sz9nhwden5te0wfjkccte9ec8y6tdv9kzumn9wsq35amnwvaz7tmwdaehgu3wwdshg6r0v9exgetj9e3k7mg6xr2kr's btclock?

nostr:note1xg399dh44z6w7rqngfxw7u84989s5rg5nt05s96jhj6qs3q5wxcqugre4w

We have to be tough. We have to accept that domains, names, customers are not ours until they are ours. Blaming someone for doing what can be done is a weak position. If your sales are suffering it's because you are not calling your old customers and finding new ones.

My customers are only my customers if they are buying from me. If someone else sells them something or if my brand is easy to copy then my product and my sales are weak and need to get stronger.

That's free enterprise.

Yes

Anyone know what's up with data machine.ai (formerly unleashed.chat) by nostr:nprofile1qqsw3znfr6vdnxrujezjrhlkqqjlvpcqx79ys7gcph9mkjjsy7zsgygpz4mhxue69uhk2er9dchxummnw3ezumrpdejqzrthwden5te0dehhxtnvdakqzynhwden5te0danxvcmgv95kutnsw43qw98s96? It cannot connect to the LLMs for about two weeks now and when trying to add credit, it says "internal server error"