-
Notifications
You must be signed in to change notification settings - Fork 168
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Signer without secret storage #871
Comments
I guess this goes together with the banana split issue #872
If paper was as hard to get access to as the key stored on an encrypted device, I'd agree. The thing is it's much easier to hack a paper sheet. I def. use Signer as a cold storage. It doesn't mean it shouldn't be able to use an externally stored key, but expecting this flow to be the main one would be a mistake IMHO. |
It's unclear to me what it the workflow here. And current Signer provides stronger security guarantees than a piece of paper with a seed phrase: it's not enough to steal the Signer device physically, the attacker would also need to crack the encryption open (multiple levels even, both full-disk encryption and our seed/key protection). So all in all, I don't see this as a significant security improvement or a desired feature/subproject. |
Waait, you are forgetting about actually memorizing seed phrase! That's why they are proper words, 24 could be properly memorized (while backup is kept in safe or something like that). I'm pretty sure there are more use cases, let's just revisit this idea again when we have spare time; I'm only sure it won't happen it 5.0.* |
2cents, if this is for public releases I think we should
|
Not requested by users and not relevant to any item on roadmap |
This is a proposal of super-hardened Signer setup.
In essence, Signer is not a tool to store keys, it's a tool to use keys stored elsewhere (on paper). Let's use this feature!
There should be an optional mode of operation for Signer, where seeds are not stored at all; user has to manually input them every time for signing or address creation (pubkey generation) either manually or with the use of bananasplit-based tool.
This might benefit from another build/fork of Signer, so that we eliminate secure hardware chip altogether, move yet more logic to pure Rust and greatly extend hardware compatibility.
Depends on:
#872
#857
Discuss.
The text was updated successfully, but these errors were encountered: