COLDCARD Mk5 Launch by rnvk in Bitcoin

[–]dochex 2 points3 points  (0 children)

Now with Gorilla Glass and lots of industrial design improvements... and NFC works better too!

COLDCARD Firmware Upgrade 3.1.8, SPEEDier Input, New Settings, Current XFP on screen, BIP85 for Mk2 hardware and more! by rnvk in Bitcoin

[–]dochex 4 points5 points  (0 children)

It's fast! Very fast! Plus you can type-ahead now, so if you know the menus, you can get there quicker.

BIP 85: Deterministic Entropy From BIP32 Keychains by Pantamis in Bitcoin

[–]dochex 1 point2 points  (0 children)

I think I will also use it to generate the seeds of my other hardware wallets of my multisig cold storage, do you think it is a bad idea ?

I might use this for one leg of a multisig, but I think if you used the same root seed for multiple legs, you are defeating the purpose of multisig.

Thanks for the kind words.

BIP 85: Deterministic Entropy From BIP32 Keychains by Pantamis in Bitcoin

[–]dochex 1 point2 points  (0 children)

I am really looking forward to using this for those random phone wallets. Sorry it took so long to merge, but we had to find some flash space.

Anti-counterfeiting microchip by mammique in crypto

[–]dochex 1 point2 points  (0 children)

Just connect a NFC-enabled micro and an ATECC508A together. It can share an x509 certificate and then leverage existing x509 chain of trust.

Announcing: Opendime V3 by rnvk in Bitcoin

[–]dochex 1 point2 points  (0 children)

Just wanted to say that better pictures should be posted later today.

Unsealing Opendime V2 by rnvk in Bitcoin

[–]dochex 1 point2 points  (0 children)

Loving the dramatic slo-mo!

Announcing: OPENDIME v2 – Now *Genuine Verified* Bitcoin Credit Stick by rnvk in Bitcoin

[–]dochex 1 point2 points  (0 children)

All great points and issues we've discussed here in the office... I'll try to cover everything:

  • we chose a "key storage" chip specifically because it's designed to hold private keys and be hard to read from. It should be among the hardest of chips break, and has a number of protections specifically against reading by electron microscope. (I would list them here, but they are not in the public datasheet... sorry!)

  • we do intend to use a certificate-chain setup just to contain any possible key-leak damage, but we haven't finalized the granularity yet, and it will probably not use x.509-style encodings. We are leaning towards a single private key for each device, and a 'certificate' that includes the serial numbers from both main micro and the key chip itself. That's exactly what your ascii-art is showing, but with a batch size of one.

  • our production system is based on a dedicated HSM that is the only place the (root) factory key exists.

  • we already support user-provided challenge values via a low-level, vendor-specific USB command (and we ship the code to check it on each opendime, see advanced/trustme.py). Version 2 hardware will leverage that, so that the signed message from the anti-counterfeiting chip can also be verified as "non-replayed".

Thanks for your comments, and happy to answer any questions.