Avatar
nick
91dbab9f62660e95258480d2f2cff6dcfdb513f28a85fa4fb55ee993a5b46809
peer-to-peer cash security

In that case the attack could simply exfiltrate the master xpriv

Today we disclose Dark Skippy - a powerful new method for a malicious signing device to leak secret keys.

With a modified signing function, a device can efficiently and covertly exfiltrate a master secret seed by embedding it within transaction signatures

https://darkskippy.com/demo.mp4

If an attacker manages to corrupt a signing device, Dark Skippy can deliberately use weak & low entropy secret nonces to embed chunks of the seed words into transaction signatures.

It takes just two input signatures to leak a 12 word seedphrase onto the Bitcoin blockchain.

The attacker can watch on-chain until they spot an affected transaction, unblind and invert the low entropy nonces using an algorithm like Pollard's Kangaroo algorithm to learn the master secret seed.

Then the attacker can wait and steal the funds whenever they decide best.

Despite this attack vector not being new, we believe that Dark Skippy is now the best-in-class attack for malicious signing devices.

- The attack is impractical to detect

- Requires no additional communication channels

- Effective on stateless devices

- Exfils master secret

Beyond ensuring your device firmware is genuine and honest (opensource), mitigations include anti-exfil signing protocols and we present some new ideas for additions to PSBT specifications to disrupt this attack.

We encourage mitigation discussion and implementation exploration.

This attack highlights the importance of verifying and securing your device's firmware, and the danger of sharing stateless signing devices with other people.

We will be publicly releasing our code later this year.

Authors: nostr:npub1xh897wvhn93tda0zws94mdyc7eagc8qm0798clp7x48zh6kjwazq29gst6 (follow him so he gets onto nostr), Robin Linus, and myself.

If you have any concerns or questions we recommend checking out the FAQ page on our website:

https://darkskippy.com

Check out our latest prototypes for the next generation of Bitcoin self-custody!

https://frostsnap.com

Why shouldn't I eat a complimentary biscuit?

toxic trait: adding target="_blank" to absolutely every link on a website

First zap.stream:

Tried to get my zaps working again, realized channels were dead

Tried to abandon channels, funds disappear from wallet

Tried to reset wallet transactions, exposed RPC secrets

Tried to export node seed, LND doesnt let you

100k sats vanished into the ether, reckless.

Job for tomorrow.

zap.stream is good though, no note spam

nostr:note1u2x7zj3h8k208kvkrn6gkj5p2dalg9gzwtwseaxxy38sjpa49tzqsugy58

testing reckless nostr apps goodluck to my npub

cool post from nostr:npub1l6uy9chxyn943cmylrmukd3uqdq8h623nt2gxfh4rruhdv64zpvsx6zvtg

https://conduition.io/coding/ticketmaster/

My friend sent to me,

"Wait I know this person, they wrote some incredible FROST posts and are on nostr!"

I scored 0 in the snake game! #snakegame

true but need some proof if someone is putting an existing identity on nostr. Would be very easy scam to make fake account and ask for donations nostr:npub17xvf49kht23cddxgw92rvfktkd3vqvjgkgsdexh9847wl0927tqsrhc9as 🤨

all accounts are fake unless NIP05d or otherwise attested

Update your bitcoin nodes!

sudo apt update && sudo apt upgrade

A recently disclosed SSH exploit is actively being attempted!

https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server