Home Foren Trezor Wallet Unpopuläre Meinung: Hören Sie auf, die Passphrase-Funktion in den Kommentaren zu empfehlen.

Ansicht von 12 Antwort-Themen
  • Autor
    Beiträge
    • #2485173
      root_s2yse8vt
      Administrator
      Up
      0
      Down
      ::

      Ich sehe hier viele Kommentatoren, die neuen Nutzern empfehlen, die Passphrase-Funktion zu verwenden, um physische Seed-Extraktion und $5-Wrench-Angriffe zu entschärfen. Ich persönlich glaube, dass das Risiko, dass neue Benutzer (und sogar sehr erfahrene Benutzer) sich selbst aus ihren Passphrase-Wallets aussperren, das Risiko der physischen Seed-Extraktion und $5-Wrench-Angriffe bei weitem übersteigt.

      Ich denke, dass die Passphrase-Funktion nur in extremen Fällen verwendet werden sollte, oder?

    • #2485174
      Ganderstan
      Gast
      Up
      0
      Down
      ::

      I think it is important for new people to know what possibilities they have and then they can decide how hard they want to go. Everyone is going to weigh security and convenience differently. For me using the passphrase doesn’t really create enough inconvenience not to use it and does add some extra peace of mind. Also if you memorize your passphrase and also store it in a different location than your seed you should have nothing to worry about.

    • #2485175
      brianddk
      Gast
      Up
      0
      Down
      ::

      > thoughts?

      Totally agree on all counts, but all I can control is me. Reasons why I endorse your thoughts on this.

      ## Difficulty of the decrypt

      First off, the NAND (memory) is no longer ***EASY*** to decrypt. Truth is, it never was. All the demos on this are very selective in the approach. NONE use firmware from 2023, and they all base the attacks on 4 digit PINs. And none of them account for users enabling more advanced NAND encryption with the SD-card.

      ## PINs neutralize the attack

      Longer PINs also neutralizes this attack. And NO, cracking a 10 digit PIN is NOT trivial (*sigh*). The NAND uses ChaCha encryption making it VERY slow to decrypt and test. There is no way to test a brute-force attempt without decrypting the entire 1.5 MB of memory. Even when run in parallel the cost in hardware and memory to crack a 10 digit PIN in a few months is much more substantial than people make it out to be. If you want to be particularly evil put a sticker on the back with a PIN “3141” on the back. Link that PIN to your NAND wipe PIN. Problem solved, most attackers would enter the PIN, thinking you an idiot and wipe the device.

      ## SD-card neutralizes the attack

      Why every Trezor-T user is not enabling `sd-protect` frankly astounds me. It is far and away the simplest measure that offers the greatest protection. Once enabled, the SD-card serves as a 2FA keyfile. Only the SD can unlock the device. If you remove the SD the device is completely useless. There is nothing an attacker could do, even if they completely copy the encrypted NAND. If you want to be particularly evil, swap your SD-protect card with your [SD-flash card](https://www.reddit.com/r/TREZOR/comments/13umfly/hyper_paranoid_trezort_autowipe_method/) so that anyone powering it up will automatically wipe the device.

      ## Difficulty of the glitch

      The original attack used the firmware flash fingerprint check screen as the area where they tried to glitch STM32. The glitch requires an extremely narrow window, and complete walkthroughs I’ve seen (all using old firmware) took months to hit it. MONTHS!! Most click-bait writeups talk about the simplicity if the decrypt, and gloss over how LONG it took them to glitch the part. Later firmware removed the fingerprint verification so attackers would be lucky to be able to hit this in mere months.

      ## Conclusion

      I get it, it’s scary and people just want to know that everything is safe. Yes, passphrase can help, so can multisig, as well as exotic custom spend scripts. Problem is each of these layers make it harder for the authorized user to touch the coins as well. The odds of getting your Trezor stolen are low. The odds of it getting stolen by an embedded firmware hacker are lower. The odds of it getting stolen by an embedded firmware hacker who cracks the nand before you notice it is missing are… frankly, astronomical. And if that doesn’t quell your paranoia, consider countermeasures, but passphrase would be the LAST of my countermeasures, not the first.

    • #2485176
      GiorgioVe
      Gast
      Up
      0
      Down
      ::

      To make it short;

      Hm, no, you are wrong, passphrases are extremely important and remove much much much more risk than the risk it creates to only keep a seed, especially a 12 words seed only.

      Anyone understanding the importance to keep the same seed written on paper at separate places, is smart enough to understand the importance of a passphrase, and how easy it is to create one, remember it forever, and understand that it creates a new set of keys.

      My 70yo parents understood in 5 minutes the importance of a seed, and that a “last long enough word protects the 12/24 words in case somebody finds the paper sheet”.

      A passphrase unfortunately doesn’t prevent from 5$ wrench attacks, but multisig & shamir do.

    • #2485177
      DefiantAbalone1
      Gast
      Up
      0
      Down
      ::

      Hard disagree on this one.

      Passphrase wallets are hidden, you can have endless dummy wallets if you insist on living a flashy life flaunting your coins and worry about wrench attacks, and if you have poor memory, there’s endless ways to save your passphrases in a chain linked hint format (in a way only you will understand) in the event you forget it.

      If you just have your keys w/ no passwords, you’re fucked with a catastrophic total loss if someone gets those keys. The bitcoin ceo has no sympathy for incompetent self custody and won’t refund your money, it’s up to the holder to take ownership responsibility on how he custodies.

    • #2485178
      GooglephonicStereo
      Gast
      Up
      0
      Down
      ::

      OP, I 100% understand what you’re saying and why. I know people of all ages who I would not trust to maintatain their keys for any length of time if you added the tiniest bit of complexity to a system they probably already don’t understand.

      However, expect the online BTC community to downvote us to oblivion.

    • #2485179
      comfyggs
      Gast
      Up
      0
      Down
      ::

      Disagree fully. If you can manage a seed and manage basic security for your email and online accounts this should be of no concern. If you can not manage the basics do not invest or dabble in crypto. Simple

    • #2485180
      Maximum-Proposal7511
      Gast
      Up
      0
      Down
      ::

      Why, care to expand your thoughts a bit?

    • #2485181
      blaze1234
      Gast
      Up
      0
      Down
      ::

      100% ABSOLUTELY WRONG

      I very strongly feel EVERYONE should use very secure passphrases

      Really, they should not be optional.

      Never digitise your Seed Recovery information, except to a trusted hardware wallet or other dedicated airgapped device. Certainly **never on anything capable of** connecting to the internet.

      Etched onto steel plates, stored in multiple secure locations far from home, secure passphrase separately from 24-word mnemonic.

    • #2485182
      Tarskin_Tarscales
      Gast
      Up
      0
      Down
      ::

      This is not only an onpopulair but also a stupid opinion… People need to record and store their seedphrase securely already anyhow, adding the passphrase to this (record and store, ideally in a different location) is trivial, but adds a significant boost in security.

      Your next of kin can be given the location of both, in a will (or a timed email) so that if something happens to you, they can still access it.

      If you truly want to go the extra step, ensure that there is also a decoy wallet without a passphrase with a few hundred bucks.

    • #2485183
      Demyan666
      Gast
      Up
      0
      Down
      ::

      there are plenty of examples here and elsewhere of people losing money because of passphrase . is worth just a howl. banal reason – forgotten or lost. if you have a paranoia , then yes, this is your way. be hygienic online and use a complex pin. All

    • #2485184
      streamer85
      Gast
      Up
      0
      Down
      ::

      Absolutwlly wrong, lol…
      I can sleeo well with strong passphrase

    • #2485185
      walterpadick78
      Gast
      Up
      0
      Down
      ::

      I get your point, but I disagree. I set a passphrase so that even if someone finds my seed phrase, they can’t do anything. My passphrase is not stored or written anywhere, it’s like a password that only I know, and it’s something I won’t ever forget.

Ansicht von 12 Antwort-Themen
  • Du musst angemeldet sein, um auf dieses Thema antworten zu können.