Avatar
semisol
52b4a076bcbbbdc3a1aefa3735816cf74993b1b8db202b01c883c58be7fad8bd
👨‍💻 software developer 🔒 secure element firmware dev 📨 nostr.land relay all opinions are my own.

sadly regardless of what has been said, if the functionality that the customer needs are not met, they will always go somewhere else that can fulfill this. The value of one's product or services are always based from what the customers are willing to pay according to their needs. nostr:nprofile1qqsglv2qkn5dmmuhee9cy8fywfu2rfp4xd3xy0myqg2gfvmjl9yqqrqppamhxue69uhk2tnwdaejumr0dsq3qamnwvaz7tmwdaehgu3wd3skueqpz3mhxue69uhhyetvv9ujuerpd46hxtnfduekf372 - we truly appreciate what you said here and it is not a judgement but rather a constructive feedback. This is because people truly care about your product. Hence, people go their way to take their time of their day to reach out to you and ask the possibilities. It is ok too to say that it is not on your priorities list! All the best!✌️☺️

I think not being burnt out is more important

There’s moderation work, and clients also want features, then you need to make sure it runs stably, etc.

to be able to have AI scan vulnerabilities means that it needs to be able to build a map of the application logic, how every small detail interacts and how these may combine into an exploit chain

that is not possible with a text predictor

Plug it in, authorize the client, then you can manually approve from the app or auto approve certain kinds.

A hardware screen is not necessary for this use case. Manually verifying for every AUTH event or reaction is going to make the UX shit.

yes, the only case it could work with unnecessary complexity is where you use a remote signer, each client maintains state locally, and you remove a client

in this case you can also do the following which is easier: rotate the secret used for encryption

NIP-04 and the likes work (not that they are good, especially gift wraps) but they have no post compromise security

both of them are IoT grade shit (and at least one lacks any CC certification) that don’t have the same basic protections as any credit card within the last 15 years

both of them have viable laser fault injection attacks meaning you only need the expensive (probably $300k max) equipment, but that’s nothing as you can reuse it for as many wallets as you prefer

The idea that an HWW’s security hinges on the secure element only is insane

the devs say “go make a better one yourself” because they are too incompetent to do that themselves

they are too busy making the 37th ecash wallet that looks like it was named by an immature idiot to fix real issues nostr:note1wzxcmgtmcwegr6dfqlc9kkydmnxvlumzz0qy0dmw0r0r6v8e2ysqktspmg

Shredding a credit card does not make it unusable