Anyone know which hardware wallets use this chip?

nostr:npub1jg552aulj07skd6e7y2hu0vl5g8nl5jvfw8jhn6jpjk0vjd0waksvl6n8n Jade ?

nostr:npub1s0vtkgej33n7ec4d7ycxmwt78up8hpfa30d0yfksrshq7t82mchqynpq6j Passport/Prime ?

nostr:npub1az9xj85cmxv8e9j9y80lvqp97crsqdu2fpu3srwthd99qfu9qsgstam8y8 ColdcardQ ?

Any others?

nostr:note1gxspmttnwxy7vdd5vm2exzd34dxcpdqjfyazz5ryghdjs4jmd4fs8eypxm

Reply to this note

Please Login to reply.

Discussion

Only Jade

NVK’s Satslink device which they never actually released, even though they had preorders planned to use this

Any ideas what secure element is inside bitkey?

none lol

1)what

And the ones in the Coldcard/Passport are known to be weak

The Jade security model is broken if Blockstream servers are hacked and someone gets physical access to your device

nostr:atnevent1qqsxh0s82qh5xykyska44l2un0ykl65nmf2cwymd94880h8xv3jnf8qpzpmhxue69uhkummnw3ezumrpdejqzrthwden5te0dehhxtnvdakqz9thwden5te0dp5hxapwdehhxarj9ekxzmnyqyv8wumn8ghj7un9d3shjtnwdaehw6r9wfjjucm0d5vv2k6q

bitkey uses a silicon labs efr32mg24 secure mcu rather than a traditional secure element. we chose this for better transparency & open source while maintaining strong security features like puf-encrypted key storage and side-channel attack protections. as nostr:nprofile1qyx8wumn8ghj7cnjvghxjmcpz4mhxue69uhk2er9dchxummnw3ezumrpdejqqg8zp79rswk9u9fkvyquzcywunenl29j67f9pn4jkk52h2jrjjnw0sg43a9l mentioned more information are here: https://bitkey.build/processing-our-processor-choice/

The side channel attack countermeasures only apply to hardware accelerated encryption. The Bitkey does not use these blocks

The used cryptography libraries lack DFA, DPA or other SCA and fault countermeasures

Certain product types of the MCU the Bitkey uses have reduced fault countermeasures

It also does not appear that there is any sort of countermeasures against LFI, or probing attacks, allowing extraction of keys in memory

Thanks for sharing. BRB. Reading the article

Air gap all the way !

nerdminers :-E

Nope. COLDCARD uses secure elements and a much different design. https://blog.coinkite.com/understanding-mk4-security-model/

Thanks so are you saying the MK4 and Q use the same security architecture?

And while on the topic, where can I read about your thoughts on Dark Skippy and anti-exfil. Is there a reason you don’t use it?

Worth reading the article.

I did, and I appreciate the detailed explanation, yet from my limited technical understanding of dark skippy and cryptography/code in general, I cannot decipher whether the security architecture of the MK4 mitigates for it or not, albeit it is clear that there is incredible security built in to the device.

That said, I also don’t see anything in the article referencing the security architecture of the Coldcard Q, which is why I asked if it shares the same architecture as the MK4? Is there an article about the Q, and/or specifically about your thoughts on dark skippy/anti exfil?

I checked the website again and don’t see mention of Bluetooth so assume Q doesn’t use it, which I am happy about given this latest article 😅

Q&Mk4 share the same design, they are sufficiently secured against darkskippy exfill type of attacks

Been a fan of COLDCARD since the OG days

Foundation passport and prime use a secure element: microchip 608b & 608c

Does that somehow mitigate the Bluetooth issue? Says on their site that Prime has QuantumLink Bluetooth whatever that is