Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> All Trezor devices are distributed without firmware installed - you will need to install it during setup. This setup process will check if firmware is already installed on the device. If firmware is detected then the device should not be used. [...] The bootloader verifies the firmware signature each time you connect your Trezor to a computer. Trezor Suite will only accept the device if the installed firmware is correctly signed by SatoshiLabs.

This is an absurd security model. Where's the root of trust here? How do I know I am initially talking to an authentic "blank" device, and not a malicious one pretending to be one?

> If unofficial firmware has been installed, your device will flash a warning sign on its screen upon being connected to a computer.

Hopefully, malicious firmware won't meddle with this feature in any way...

The vendor here is either completely clueless, or is trying to paint a better picture for prospective customers despite knowing better.



>Trezor Suite will only accept the device if the installed firmware is correctly signed by SatoshiLabs.

...?

Although I'll concede that I'm now wondering what's preventing compromised hardware from faking this part too. A complex malware could even receive firmware updates, dump them in an unused partition, and report to the connected host that it promises that it's definitely running that firmware, right? Hmmm.


Yes, it could absolutely do that.

The only way around that would be for Trezor to ship their devices with some sort of attestation function (e.g. a private signing key to which they publish the public key, or sign it via a PKI and include a certificate) and validating that, not just the statement "I promise to be running the authentic firmware", a hash over the firmware, a complete firmware dump or anything else not involving a challenge-response or uncloneable function of some sort.


Similar problem to Trusted Platform Module / Secure Boot, right?

In that case the golden keys can leak, but it's better than nothing.


leaked key seems worse in that people will think they have this security measure working for them while they don't. Without this measure there is no illusion at least




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: