Damus
Dr. Bitcoin, MD · 106w
That’s very easy. Step 1) suppose the secure element is backdoored Step 2) stay air gapped forever Step 3) input your own entropy from dice rolls Step 4) after signing a transaction, verify the transaction signature on your own node before broadcasting (which I believe but am not certain is...
DETERMINISTIC OPTIMISM 🌞 · 106w
Our design takes that into consideration and simply do not trust any single chip alone. You could say the same about all chips in all devices.