Hacking the most popular cryptocurrency hardware wallets
In this presentation we will take a look at how to break the most popular cryptocurrency hardware wallets. We will uncover architectural, physical, hardware, software and firmware vulnerabilities we found including issues that could allow a malicious attacker to gain access to the funds of the wallet. The attacks that we perform against the hardware wallets range from breaking the proprietary bootloader protection, to breaking the web interfaces used to interact with wallets, up to physical attacks including glitching to bypass the security implemented in the IC of the wallet. Our broad look into several wallets demonstrates systemic and recurring issues. We provide some insight into what needs to change to build more resilient hardware wallets.
Hardware wallets are becoming increasingly popular and are used to store a significant percentage of the world’s cryptocurrency. Many traders, he
1 view
4207
1733
3 years ago 01:01:58 1
35C3 -
6 years ago 00:41:07 14
35C3 - Introduction to Deep Learning
6 years ago 02:15:02 1
35C3 - Jahresrückblick des CCC 2018
6 years ago 01:01:48 8
35C3 - Verhalten bei Hausdurchsuchungen
6 years ago 01:11:33 1
35C3 - Security Nightmares 0x13
6 years ago 00:41:32 4
35C3 - Archäologische Studien im Datenmüll
5 years ago 01:00:45 1
35C3 - Die verborgene Seite des Mobilfunks
6 years ago 00:39:58 3
35C3 - Venenerkennung hacken - english translation
6 years ago 01:04:47 1
35C3 - It Always Feels Like the Five Eyes Are Watching You
5 years ago 01:07:18 3
35C3 - Freude ist nur ein Mangel an Information
6 years ago 00:58:49 2
35C3 - Funkzellenabfrage: Die alltägliche Rasterfahndung unserer Handydaten
3 years ago 00:41:07 1
35C3 2018 Introduction to Deep Learning
6 years ago 00:49:57 1
35C3 - Kosmische Teilchenbeschleuniger und ihre Spuren in der Antarktis
6 years ago 02:05:43 1
35C3 - Martin Sonneborn: “Meine Abenteuer im EU Parlament“
6 years ago 00:57:06 1
35C3 - Du kannst alles hacken – du darfst dich nur nicht erwischen lassen.