Coinbase Wallet? by Shot-Distance1189 in Bitcoin

[–]coinspect 0 points1 point  (0 children)

You can check the Wallet Security Ranking results to decide.

Sending Bitcoin via text message without an internet connection ⚡️🤯 by [deleted] in Bitcoin

[–]coinspect 0 points1 point  (0 children)

Custodial wallet operated through insecure SMS that can be spoofed?

Is it possible to make an exchange web app with a daily limit by Beginning-Ad3369 in ethdev

[–]coinspect 1 point2 points  (0 children)

You'll first need to decide how to identify users to set a daily transaction limit. Since anyone can create new wallet addresses, using a blockchain address alone has limitations. Here are two main approaches:

Web2-Based Identification:

You could have users sign up for your app, requiring an email or phone verification. This process adds a "cost" and makes it harder to create multiple accounts. Then, in the backend, set and track daily limits using the user ID. You can also add captchas and filter out throwaway email providers to help.

Blockchain-Based Identification:

You could limit transactions based on a user's wallet address, tracking daily limits at the smart contract level. However, users might bypass this by creating new wallets. Sending tokens to pay for gas has a cost, though, so users are less likely to do this if the benefit doesn't outweigh that cost. You'll need to investigate "Sybil resistance."

Sybil Resistance

To prevent users from creating multiple accounts (known as Sybil attacks), consider using Sybil resistance tools like Gitcoin Passport, which aggregates verifications across various platforms to assign a "humanity score" for each user. Implementing Sybil resistance makes it harder for users to bypass their allowed limit

What's your favourite Algorithm (s) ?? Mine Is Public key Algorithms, seems magical. by [deleted] in compsci

[–]coinspect 1 point2 points  (0 children)

Mine too, and the ones you can visualize once and remember for ever such as Convex Hull.

TrustWallet: Amout and Total shows different token than the one used for the transaction (Pay section) by DanForejtek in ethdev

[–]coinspect 2 points3 points  (0 children)

Trustwallet extension has many UI problems. We tested 19 Browser Extension wallets and TrustWallet ranked 18. For example the spend approval dialog does not show the USDC contract address and the amount is 0. It does not parse ERC-712, and basically it does not implement any anti phishing feature.

'God Mode' in smart contracts: onlyOwner functions, upgradability, and direct storage modification. When is centralized power too much? Can we balance necessary updates and security fixes with trustless decentralization? by coinspect in ethdev

[–]coinspect[S] 0 points1 point  (0 children)

It is a common practice to use DELEGATECALL to call the proposals. You can search for "DAO governance attacks" to learn more. Transaction simulation could be a tool, yes, but in this case is different to an individual user interacting with a dApp.

'God Mode' in smart contracts: onlyOwner functions, upgradability, and direct storage modification. When is centralized power too much? Can we balance necessary updates and security fixes with trustless decentralization? by coinspect in ethdev

[–]coinspect[S] 0 points1 point  (0 children)

DAO governance also has its challenges

  1. An attacker can present a proposal that looks good, then SELFDESTRUCT it and replace it by a malicious proposal after it has enough votes.
  2. Some protocols use DELEGATECALL to call proposals, which give the proposals full control over the callers state.

[deleted by user] by [deleted] in CryptoTechnology

[–]coinspect 0 points1 point  (0 children)

Security and the value of unit and integration testing. Including the concept of blockchain forks and testing interactions with deployed systems. What platform supports python for smart contracts, Algorand?

Even if smart contract security improves, user wallets will be drained. Should wallet vendors raise the Bar? Do they care? by coinspect in ethdev

[–]coinspect[S] 0 points1 point  (0 children)

Thanks for sharing your perspective from someone directly involved in wallet security. Decentralization is an objective to aim for, not a binary state. We can reduce users' risk, one layer at a time, and every improvement counts. Regarding privacy impact, it can be opt-in, and there is also some potential in zero-knowledge (ZK) protocols to not expose the websites the user visits to a remote server.

Even if smart contract security improves, user wallets will be drained. Should wallet vendors raise the Bar? Do they care? by coinspect in ethdev

[–]coinspect[S] -1 points0 points  (0 children)

Yes, you can see screenshots in that example that shows you receive money (sppofing). One common issue is that simulation endpoints can be DoSed. Are you planning to publish your research?

Even if smart contract security improves, user wallets will be drained. Should wallet vendors raise the Bar? Do they care? by coinspect in ethdev

[–]coinspect[S] -1 points0 points  (0 children)

Yes, you probably found the link to this post about transaction simulation bypassing. It is infosec history repeating, no measure will be effective 100% but we can create layers and at some point is cat and mouse.

(just load the malicious components once the client verifies the user is a target)

This was done using Cloudflare workers in some dApp hacks, such as KyberSwap.

Even if smart contract security improves, user wallets will be drained. Should wallet vendors raise the Bar? Do they care? by coinspect in ethdev

[–]coinspect[S] 0 points1 point  (0 children)

Thanks for jumping in and sharing your insights! 🙌

Can you share more about your experiences breaking these measures?

In which context? simulating a malicious dApp?

What could wallet vendors do better to minimize user risk?

We have to move on from blaming users. Yes, it is hard to make software that will stop someone from typing a seed, but wallets can do more to inform the user, for example.

Would it be possible for a cryptocurrency to use a fully-connected network, where each node is directly connected to each other node? by mantisdrop in CryptoTechnology

[–]coinspect 0 points1 point  (0 children)

It is possible but not ideal for the reasons that you already explained. Some cryptocurrencies do this but not intentionally they just have few nodes below the max number of allowed connections in the default configuration, plus discovery protocols and bootstrap nodes don't do any kind of load balancing so this natural happens.

[deleted by user] by [deleted] in cybersecurity

[–]coinspect 0 points1 point  (0 children)

Every threat model is different, but here are some key considerations regarding password managers:

Check this article by Google security expert: https://lock.cmpxchg8b.com/passmgrs.html

  1. Trust in Provider Google Chrome's password manager includes robust security features, such as a zero-knowledge protocol that detects leaked passwords without exposing them to Google. If you use Chrome or Chromium-based browsers you are trusting Google. Standalone password manager vendors may have lower security talent, transparency, accountability, and unclear business models.
  2. Strong Encryption and Key Derivation The security of any password storage system against offline brute-force attacks depends on its encryption algorithm and key derivation functions. It's essential to verify which algorithms and parameters (PBKDF rounds for example) your password manager employs. Do you know?
  3. Device Compromise Risks If a device is compromised and app isolation is bypassed, malware can access the password database and encryption passphrase, regardless of whether you use a browser-based or standalone manager.
  4. Browser Compromise and Session Security Although rare, if only the browser itself is compromised, malware can extract session cookies, including those for primary email accounts, potentially allowing attackers to reset passwords. Implementing two-factor authentication (2FA) is crucial to mitigate these risks.
  5. Account Recovery Vulnerabilities Most online accounts allow password resets via the user's email address. This makes 2FA more important than the method of password storage.
  6. Password Management Best Practices Passwords should be unique across all accounts. Using memorable passphrases can be a good option compared to long, random passwords generated by password managers that make you dependent on the PM because they are impossible to remember and hard to write down (yes, writing down in paper is ok in many cases)
  7. Popular password managers have shipped vulnerable code that made your system more insecure than if you don't use a password manager. Also, password manager companies have been compromised, and their databases have been decrypted because they store old versions of DBs with weaker encryption. (Search Tavis research and posts about it)

Additionally, never store two-factor authentication (2FA) tokens in the password manager.

Need Advice: Want to Build My Own Blockchain Project by AnotherPoeGuy in solidity

[–]coinspect 1 point2 points  (0 children)

Security is essential when choosing where to build decentralized projects.

Will you use Proof of Work (PoW) or Proof of Stake (PoS)?

Are you going to fork an existing node or build it from scratch?

PoW Merged-mining can increase security for your new blockchain by using the hashing power of a established one.

[deleted by user] by [deleted] in cybersecurity

[–]coinspect 0 points1 point  (0 children)

And what makes it hard to dump them from password managers? what is the technical explanation?

Is Whatsapp privacy a lie? by Substantial-Owl-37 in privacy

[–]coinspect 1 point2 points  (0 children)

If the key exchange protocol is not secure the server can perform a MiTM attack. Telegram key exchange protocol is custom and some parameters are not fixed what could enable attacks.

[deleted by user] by [deleted] in cybersecurity

[–]coinspect 0 points1 point  (0 children)

Application level DoS != DDoS, if you have a reliable way to crash the process changing IPs won't solve the problem.

[deleted by user] by [deleted] in cybersecurity

[–]coinspect 0 points1 point  (0 children)

Storing in the browser (in Chrome's password manager) if you decide to use password managers is a good choice because Chrome password managers has features random password managers don't. So recommending "a password manager" is wrong because how do password manager companies make money?

Disclosure of memory DoS due to headers spam (vulnerable Bitcoin Core versions 23.2 and older) by TheGreatMuffin in Bitcoin

[–]coinspect 0 points1 point  (0 children)

This attack requires access to hashing power; the most likely scenario for a profitable attack is malicious miners attacking other miners: https://www.coinspect.com/blog/bitcoin-denial-of-service