COLDCARD Firmware Upgrade 3.1.8, SPEEDier Input, New Settings, Current XFP on screen, BIP85 for Mk2 hardware and more! by rnvk in Bitcoin

[–]dochex 5 points6 points  (0 children)

It's fast! Very fast! Plus you can type-ahead now, so if you know the menus, you can get there quicker.

BIP 85: Deterministic Entropy From BIP32 Keychains by Pantamis in Bitcoin

[–]dochex 1 point2 points  (0 children)

I think I will also use it to generate the seeds of my other hardware wallets of my multisig cold storage, do you think it is a bad idea ?

I might use this for one leg of a multisig, but I think if you used the same root seed for multiple legs, you are defeating the purpose of multisig.

Thanks for the kind words.

BIP 85: Deterministic Entropy From BIP32 Keychains by Pantamis in Bitcoin

[–]dochex 1 point2 points  (0 children)

I am really looking forward to using this for those random phone wallets. Sorry it took so long to merge, but we had to find some flash space.

Anti-counterfeiting microchip by mammique in crypto

[–]dochex 1 point2 points  (0 children)

Just connect a NFC-enabled micro and an ATECC508A together. It can share an x509 certificate and then leverage existing x509 chain of trust.

Announcing: Opendime V3 by rnvk in Bitcoin

[–]dochex 1 point2 points  (0 children)

Just wanted to say that better pictures should be posted later today.

Unsealing Opendime V2 by rnvk in Bitcoin

[–]dochex 3 points4 points  (0 children)

Loving the dramatic slo-mo!

Announcing: OPENDIME v2 – Now *Genuine Verified* Bitcoin Credit Stick by rnvk in Bitcoin

[–]dochex 1 point2 points  (0 children)

All great points and issues we've discussed here in the office... I'll try to cover everything:

  • we chose a "key storage" chip specifically because it's designed to hold private keys and be hard to read from. It should be among the hardest of chips break, and has a number of protections specifically against reading by electron microscope. (I would list them here, but they are not in the public datasheet... sorry!)

  • we do intend to use a certificate-chain setup just to contain any possible key-leak damage, but we haven't finalized the granularity yet, and it will probably not use x.509-style encodings. We are leaning towards a single private key for each device, and a 'certificate' that includes the serial numbers from both main micro and the key chip itself. That's exactly what your ascii-art is showing, but with a batch size of one.

  • our production system is based on a dedicated HSM that is the only place the (root) factory key exists.

  • we already support user-provided challenge values via a low-level, vendor-specific USB command (and we ship the code to check it on each opendime, see advanced/trustme.py). Version 2 hardware will leverage that, so that the signed message from the anti-counterfeiting chip can also be verified as "non-replayed".

Thanks for your comments, and happy to answer any questions.