Avatar
Nosthor
ac17d85ea8e01a27a57304a893aefc3315b529fbc1b964ebcc6f31aff6f444a1
00:01 Moscow time ⚡️🔨 If you can't trust people with freedom how can you trust people with power?

#pocketbitcoin now supports ethereum. Just click on the set up button aaaaaaand.... 😉

https://pocketethereum.com/

Where did you take this? River's report (link below) at page 21 shows a slightly different image (e.g. Blixt in the "custodial wallets" section)

https://river.com/learn/files/river-lightning-report-2023.pdf

Replying to Avatar Gigi

#nostr

I solved the Sats vs Bits debate. Let's make "Feets" the standard⚡️😂

I'd love to see this but with subtitles talking about the rebranding of Twitter

Then please someone build a similar thing for WhatsApp and Twitter and Threads and every app you can imagine and get the whole world banned and leave apple with an empty AppStore with just their Messages and FaceTime apps on it 😂

Yeah, it's a remote possibility. But it's good to be aware it is possible.

An immediate, although not convenient solution, consists in using the 'vcgencmd otp_dump' command to print and check the OTP registers have not been modified. However it's only a partial solution because the command doesn't show the first 256 bits. I need to further investigate how to print the first 8 32-bits registers.

Not sure all 32-bit registers (they are 67) are one-time write. Modifying some of them could compromise the correct behaviour of the device, for example the 17th changes the boot mode (microSD/USB), but for sure a lot of them could be used to store keys and can be zeroed out without bricking the device.

There are some tools that allow writing a private key to the inbuilt One-Time Programmable memory of the Raspberry Pi. Is there a way to break or disable the OTP memory permanently in order to rule out the (even remote) possibility of a private key being written there when using a SeedSigner?

#[0]​ ​ #[1]​ #[2]​ #[3]​​

More info below...

OTP memory:

https://github.com/raspberrypi/documentation/blob/develop/documentation/asciidoc/computers/raspberry-pi/otp-bits.adoc

rpi-otp-private-key tool:

https://github.com/raspberrypi/usbboot/tree/master

rpi-derive-key tool:

https://lib.rs/crates/rpi-derive-key

There are some tools that allow writing a private key to the inbuilt One-Time Programmable memory of the Raspberry Pi. Is there a way to break or disable the OTP memory in order to rule out the (even remote) possibility of a private key being written there when using a SeedSigner?

#[1]​

More info below...

OTP memory:

https://github.com/raspberrypi/documentation/blob/develop/documentation/asciidoc/computers/raspberry-pi/otp-bits.adoc

rpi-otp-private-key tool:

https://github.com/raspberrypi/usbboot/tree/master

rpi-derive-key tool:

https://lib.rs/crates/rpi-derive-key

#[2]#[3]​

#[4]

"Too ignorant of technology" is not the point, the point is the biased and common human habit of passively accepting only one truth that is transmitted top-down by something or someone who is diffusely idealised and trusted. Instead of making the effort to think about a topic and make an independent decision. The ultimate outcome of this behaviour is centralisation. This applies to everything, not only the #Bitcoin consensus.