Of course it is legit, I stand behind every single claim made on our website
https://asicvault.ioAsicVault can be called a true hardware wallet since we have designed all key components in hardware, not in software.
We have written over 77,000 lines of Verilog/VHDL code (hardware design), together with testbenches over 550,000 lines.
This is more than Bitcoin Core client code size - all in hardware.
Now, some people have questioned what 1,000 stronger security means? I will explain.
When you initialize your hardware wallet, a very big random number is generated, forming your 24 seed words.
As a standard, other hardware wallets are doing just 2,000 rounds of PBKDF2 SHA-512 to derive private keys from these seed words.
During the same time we can and are performing 2,000,000 rounds! This is 1,000 times more!
When using the same length passphrases, AsicVault is always 1,000x more expensive and time-consuming to crack. For example:
If it takes 10 days to crack an ordinary hardware wallet, it would take 10,000 days ie 27 years to crack AsicVault.
If it costs $10,000 to crack an ordinary hardware wallet, it would cost $10,000,000 to crack AsicVault.
Well, of course assuming that you can even extract the seed phrases from the device in the first place.
While others have said that there is no point of encrypting the seed phrase and it is totally fine to hold it in RAM, we think the opposite.
The main reason given for not encrypting seed phases has been that the encryption key has to be stored in Flash and it is as easy to extract.
This has already led to successful hacks and more will come in the future.
This is true for non-secure microcontrollers that lack the sophisticated hardware required for proper key storage, like SRAM-PUF.
Physically Uncloneable Function does not store the encryption keys in non-volatile memory, they are invisible when the device is powered down.
https://en.wikipedia.org/wiki/Physical_unclonable_functionAsicVault does not rely just on PUF, we are using multiple layers of encryption everywhere.
We have a very fine unique 75nm mesh around the electronic components protecting them actively from outside intrusions.
If you destroy the mesh, your encryption key will be broken as well.
And your paper backup inherits exactly the same security benefits described above!