Vergrößert die „Ledger Recovery“ die Angriffsfläche?
Home › Foren › Ledger Wallet › Vergrößert die „Ledger Recovery“ die Angriffsfläche?
- Dieses Thema hat 12 Antworten sowie 1 Teilnehmer und wurde zuletzt vor vor 1 Jahr, 8 Monaten von
mcc011ins aktualisiert.
-
AutorBeiträge
-
-
20. Juni 2023 um 00:04 Uhr #2502871
root_s2yse8vt
Administrator::Ich zweifle nicht an Ledgers Fachkenntnis, aber Schwachstellen können von jedem, auch von den besten Programmierern, produziert werden, und ich bin sicher, Ledger weiß das.
Ich kann Ledger bis zu einem gewissen Grad vertrauen, aber ich frage mich, ob diese neue Funktion „Ledger Recover“ mögliche Risiken durch menschliche Fehler, Bugs oder Implementierungsprobleme auf dem Gerät erhöht, wenn es mit dem Internet verbunden ist?
Mit anderen Worten: Vergrößert sich dadurch die Angriffsfläche, wenn wir diese Funktion nicht abonniert haben?
Ich danke Ihnen für Ihr Interesse.
-
20. Juni 2023 um 00:04 Uhr #2502872
jlevy1126
Gast::The ledger device itself doesn’t go online.
I’d say you’re right to not trust any 3rd party 100%, that said if you want a HW wallet you have to have some trust in the manufacturer of the HW and the developers of the software. In that context I still trust Ledger and don’t think this new service introduces a new attack vector for malicious actors.
-
20. Juni 2023 um 00:04 Uhr #2502873
TheQuantumPhysicist
Gast::Yes, it does, by definition, given how software works: [https://www.reddit.com/r/CryptoCurrency/comments/13nnlbe/the_software_security_argument_why_ledger_recover/](https://www.reddit.com/r/CryptoCurrency/comments/13nnlbe/the_software_security_argument_why_ledger_recover/)
-
20. Juni 2023 um 00:04 Uhr #2502874
-
20. Juni 2023 um 00:04 Uhr #2502875
-
20. Juni 2023 um 00:04 Uhr #2502876
-
20. Juni 2023 um 00:04 Uhr #2502877
Spy008
Gast::The thing that worries me and dont know how likely this is. But before I would imagine (with ledger being closed source) that if they were sending seeds externally people would be able to catch that via internet traffic/connections. Now i imagine it becomes more difficult to determine if something was compromised vs. the recover transmission.
-
20. Juni 2023 um 00:04 Uhr #2502878
-
20. Juni 2023 um 00:04 Uhr #2502879
-
20. Juni 2023 um 00:04 Uhr #2502880
-
20. Juni 2023 um 00:04 Uhr #2502881
CorneliusFudgem
Gast::If u dont know how crypto works or how to handle ur own recovery phrase, recover is a p nice option tbh. i got friends and family who were praying for this product lol.
im not gonna use it myself (i know how ledger work) but if it means onboarding future people to self-custody i have no problem).
only people who seem to have issue w it are people who don’t know how firmware works, never used an hd hw wallet b4, or they just ignorant and think that life is a disney movie with magic and they can make 100x overnight with PEPE (and if they don’t it must be ledger fault).
-
20. Juni 2023 um 00:04 Uhr #2502882
loupiote2
Gast -
20. Juni 2023 um 00:04 Uhr #2502883
mcc011ins
Gast::Yes any modification to extract the private key from the device increases the attack surface.
However, the private key is encrypted already within the SE and split in 3 (which is good) before it goes out according to [this post](https://www.reddit.com/r/CryptoCurrency/comments/13okszr/this_is_what_joe_grand_the_guy_who_hacked_a/?utm_source=share&utm_medium=android_app&utm_name=androidcss&utm_term=1&utm_content=share_button)
What is the key for encrypting the key we don’t know, and they will not reveal this top secret info.
Is this a good secure architecture for recover feature? Probably yes. Does it increase or decrease the end user security? Depends how much you trust your own individual seed backup strategy.
-
-
AutorBeiträge
- Du musst angemeldet sein, um auf dieses Thema antworten zu können.