submitted by /u/Mafalzon [link] [comments] |
source https://www.reddit.com/r/btc/comments/sex5jk/been_such_a_pleasure_to_be_here_in_st_kitts_nevis/
This blog brings you the best Cryptocurrency & Blockchain, ICO & P2P and Exchange & Laws news. Also contains technology and research based post from all around the world every single day. Get informed! Think Future!
Jett and I discuss 1 year anniversary, Kim Dotcom failing to deliver K.im, Tesla accepting #Doge, surviving a bear market
Price: 1mBCH. Free in a week.
Contrary to popular belief, Trezor no longer has the oft-mentioned seed extraction vulnerability, which was discovered by Ledger and confirmed by Kraken. SatoshiLabs fixed it in mid 2021 (June for Model T in firmware version 2.4.0 and May for Model One in firmware version 1.10.0).
The seed phrase is encrypted before stored in Trezor. The encryption algorithm used is ChaCha20, which is known to be secure. Data encrypted with ChaCha20 is uncrackable if done right. ChaCha20, or any other secure encryption algorithm for that matter, can be breakable if the encryption key is too weak. It needs 128 bits of entropy to be absolutely unbreakable. With a weak key, decryption may be successfully performed in a bruteforce manner.
Trezor uses the PIN as the encryption key. Before mid 2021, the PIN was up to 9 digits. There is less than 30 bits of entropy in a 9-digit PIN. Because of the low entropy, the extracted encrypted data could be easily decrypted with bruteforce and the seed could be extracted.
For a PIN to be absolutely secure, namely it has 128 or more bits of entropy, it needs at least 39 digits. Trezor's firmwares released in mid 2021 increased the upper limit of the PIN length to 50. A randomly generated PIN of 39 or more digits can guarantee absolute security of the seed even if an adversary gains the physical access to the device and successfully performs the data extraction trick. The seed can no longer be extracted.