Hacking the most popular cryptocurrency hardware wallets
In this presentation we will take a look at how to break the most popular cryptocurrency hardware wallets. We will uncover architectural, physical, hardware, software and firmware vulnerabilities we found including issues that could allow a malicious attacker to gain access to the funds of the wallet. The attacks that we perform against the hardware wallets range from breaking the proprietary bootloader protection, to breaking the web interfaces used to interact with wallets, up to physical attacks including glitching to bypass the security implemented in the IC of the wallet. Our broad look into several wallets demonstrates systemic and recurring issues. We provide some insight into what needs to change to build more resilient hardware wallets.
Hardware wallets are becoming increasingly popular and are used to store a significant percentage of the world’s cryptocurrency. Many traders, he
1 view
3400
1471
8 months ago 00:04:06 2
Ado - 逆光 Bass Cover 弾いてみた TAB 【ウタ from ONE PIECE FILM RED】
1 year ago 00:58:49 1
35C3 - Funkzellenabfrage: Die alltägliche Rasterfahndung unserer Handydaten
1 year ago 00:24:42 1
★★★ The Best Of Italo Disco Vol. 6 (Disc 2/2 Side A) ★★★