Damus
RealJohnDoe · 107w
How do y'all rationalize the closed source secure elements vulnerability. Because I would like one..😐
Dr. Bitcoin, MD profile picture
That’s very easy.

Step 1) suppose the secure element is backdoored

Step 2) stay air gapped forever

Step 3) input your own entropy from dice rolls

Step 4) after signing a transaction, verify the transaction signature on your own node before broadcasting (which I believe but am not certain is done anyway)…just in case the signature is invalid and merely an attempt to disclose private key or seed or something else nefarious.

Step 5) recognize that after the above, a back doored chip can do nothing nefarious other than sign incorrectly, in which case you need a new signing device/hardware wallet.
🍻1
nostrich · 107w
Step 1: Don't rely on a secure element in the first place as most use cases are fine with a stateless device. Step 2: Save a truck load of money. The end.