Author

Topic: I am panicking (Read 285 times)

hero member
Activity: 714
Merit: 1010
Crypto Swap Exchange
July 03, 2022, 08:33:28 AM
#30
What about running a big magnet over the hard drive? Wouldn't that irreversibly delete everything on it and even break the whole disk?
There is no way you could do this unless you are using really old hard drives or magnetic tapes for storing data, and if you use several strong industrial grade magnets for this purpose.
I don't think that modern SSD are affected by magnets, but you can use metal shredders or anything else that recycles electronics.
There are professional data erasure degaussers which are certified for proper and permanent data erasure, but you don't want to pay for those. As far as I see it, they work also well for current technology hard drives and other magnetic storage media.

An example (I have no affiliation with them): https://www.pro-device.com/en/degaussers/


Modern hard drives with coated glass platters (check hardware specs!) are even easier to destroy. Just use a nail gun or hammer and a few nails. Very unlikely to be able to reconstruct the glass shards/splinters afterwards. I doubt even that from significantly deformed aluminum platters enough data could be extracted.
legendary
Activity: 2212
Merit: 7064
Cashback 15%
July 02, 2022, 05:21:45 PM
#29
What about running a big magnet over the hard drive? Wouldn't that irreversibly delete everything on it and even break the whole disk?
There is no way you could do this unless you are using really old hard drives or magnetic tapes for storing data, and if you use several strong industrial grade magnets for this purpose.
I don't think that modern SSD are affected by magnets, but you can use metal shredders or anything else that recycles electronics.

Now that's scary.  Assuming the device wasn't compromised along the supply chain, one would still need physical access to the device to attack it this way, correct?
They don't need physical access to your device if they have control over servers that distribute firmware, that all devices need to download and install.
Speaking about that, everyone should know that ledger is doing something similar with ledger live app having no signatures to verify.
ledger co-founder aka reddit moderator btchip is aware of this problem, and they are migrating to new github repo:
https://www.reddit.com/r/ledgerwallet/comments/voodkd/ledger_live_2431_and_no_signatures_to_verify/
hero member
Activity: 882
Merit: 5818
not your keys, not your coins!
July 02, 2022, 02:56:40 PM
#28
There's a hardware difference between volatile memory and non-volatile memory. You can't really make something that has the properties of non-volatile memory, but if chosen can lose the data like a piece of volatile memory does.
That's what I thought, but I would only be making assumptions about the hardware configuration, not my area of expertise.  I guess from a manufacturing perspective it wouldn't make sense to use non-volatile storage when volatile storage would do what you want without having to bother programming piece of code to get it done.  Not to mention that any difference in price between the two is likely negligible considering how little capacity is needed.
There's no way around non-volatile memory if you want the wallet to be more than a pure 'signer' which requires the user to input the seed every time they start it up.

Even worse, if you own a device whose firmware source code is closed, someone could gain access to the code by bribing a developer or reverse engineering a firmware file; use it for evil and nobody would be notified about it.
Now that's scary.  Assuming the device wasn't compromised along the supply chain, one would still need physical access to the device to attack it this way, correct?
The firmware file (compiled binary) can be downloaded from the manufacturer's website wherever you find your firmware upgrades.
Attacks don't have to be physical. Leaked or reversed source code can help you find bugs that can be exploited with or without hardware access. But generally it's easier to attack these devices if you do have hardware access; that's what they're ultimately made for.
copper member
Activity: 2142
Merit: 4219
Join the world-leading crypto sportsbook NOW!
July 02, 2022, 02:53:04 PM
#27
There's a hardware difference between volatile memory and non-volatile memory. You can't really make something that has the properties of non-volatile memory, but if chosen can lose the data like a piece of volatile memory does.

That's what I thought, but I would only be making assumptions about the hardware configuration, not my area of expertise.  I guess from a manufacturing perspective it wouldn't make sense to use non-volatile storage when volatile storage would do what you want without having to bother programming piece of code to get it done.  Not to mention that any difference in price between the two is likely negligible considering how little capacity is needed.


As for BitcoinGirl.Club's panic attack; The Trezor and it's clones have open source hardware, which is partially why they are vulnerable to this attack vector
From what I can tell from the video, that's not what makes the wallet vulnerable. Kingpin did use the firmware source code (software!) to identify a flaw. To identify that there's a point in time where the secure memory is transferred to secure memory.
He then introduced a voltage glitch with a variety of offsets from the device boot, and let it run until it 'hit' the right spot and could freeze it in just the right moment & read out the seed.
Being open-source hardware didn't really make this attack easier, since such a 'brute-force' approach will work with other wallets too, if they have such a flaw in the source code.

Open source software, thanks for the correction.


Even worse, if you own a device whose firmware source code is closed, someone could gain access to the code by bribing a developer or reverse engineering a firmware file; use it for evil and nobody would be notified about it.

Now that's scary.  Assuming the device wasn't compromised along the supply chain, one would still need physical access to the device to attack it this way, correct?
hero member
Activity: 882
Merit: 5818
not your keys, not your coins!
July 02, 2022, 08:53:19 AM
#26
Being open-source hardware didn't really make this attack easier, since such a 'brute-force' approach will work with other wallets too, if they have such a flaw in the source code.
Not the hardware part, but the open-source software made the attack easier. If you remember the video, Joe mentions that the seed appeared on the screen at one point, but he didn't pay attention to it because he didn't believe it was right. He was trying to do something else at the time. He then tried to recreate it and have the seed pop up again, but he couldn't. He then started going through the source code and found the part where it explains how the seed and PIN are moved to RAM on power up. Without the open nature of the software code, who knows if he would ever have made that discovery or find it by accident. 
He could have reverse engineered the code and found that part, especially when comparing various different firmware versions. It stood out because it was removed in the very next update, so he would have noticed it when bindiffing those versions, as well. Definitely harder than just reading plaintext code, but noticeable especially in the binary diff.
In general, open source just makes it so much easier to spot something like that even from static code analysis and to fix it early. As evidenced by this very case, where the vulnerability was fixed many years ago. It's possible that other wallets which are not open-source do still have such vulnerabilities, because people are less likely to go through binary firmware updates and check those than to just read the code alterations on GitHub (except if they're paid a lot of money by a legitimate or illegitimate customer).
legendary
Activity: 2268
Merit: 18509
July 02, 2022, 07:22:02 AM
#25
What about running a big magnet over the hard drive? Wouldn't that irreversibly delete everything on it and even break the whole disk?
Three problems with this approach. First, most modern hard drives are well protected against magnetic fields. You can't just grab a magnet off your fridge and wave it around. You would need particularly strong magnets which most people don't have access to, and even then, you probably need to disassemble the drive first. Second, you don't know if it's worked. Maybe you manage to corrupt enough of the hard drive that it seems dead when you connect it up, but someone with more advanced hardware than you could still recover data from it. Third, things like flash drives and SSDs do not store data magnetically at all, and most people probably don't know the difference. Such drives would be unaffected by a magnetic field unless you were also to move the drive or the magnetic field fast enough to induce a powerful enough electrical current to wipe the data.

In short, you'd be safer physically destroying the drive.
legendary
Activity: 2730
Merit: 7065
Farewell, Leo. You will be missed!
July 02, 2022, 04:24:12 AM
#24
Instead of a hammer, I'd use an angle grinder. But even then it's theoretically still possible to find back some bits. It just became a lot harder.
What about running a big magnet over the hard drive? Wouldn't that irreversibly delete everything on it and even break the whole disk?

Being open-source hardware didn't really make this attack easier, since such a 'brute-force' approach will work with other wallets too, if they have such a flaw in the source code.
Not the hardware part, but the open-source software made the attack easier. If you remember the video, Joe mentions that the seed appeared on the screen at one point, but he didn't pay attention to it because he didn't believe it was right. He was trying to do something else at the time. He then tried to recreate it and have the seed pop up again, but he couldn't. He then started going through the source code and found the part where it explains how the seed and PIN are moved to RAM on power up. Without the open nature of the software code, who knows if he would ever have made that discovery or find it by accident. 
legendary
Activity: 2212
Merit: 7064
Cashback 15%
June 30, 2022, 03:50:13 PM
#23
In general, if your hardware wallet falls into a thief's hands, you should just consider the seed compromised and quickly move the funds. Any security measures like secure element and PIN are simply ways to buy time.
Except in the case when those devices are using non-persistent storage like it's the case with SeedSigner and Krux, nothing is stored on devices and you can't extract anything once you turn power off from device.
Downside is that you have to import seed each time you power on your device, but that is quick enough with QR code scanning.
As for passphrases, I would argue that you shouldn't keep them in the exact same place with your seed words, because that would make them almost pointless, but keeping them in different safe location is very important.
hero member
Activity: 882
Merit: 5818
not your keys, not your coins!
June 29, 2022, 05:18:12 PM
#22
This topic is closely related to something that's been occupying my mind lately.  I recently bought a ColdCard, and I've spent a few hours tinkering with it before I christen it "The Hardware Wallet."  One of the things about the ColdCard that I like (it's a Mk4, btw,) is that it has a small amount of storage that can be mounted when plugged into a computer's USB port.  The storage can be used to transfer wallet files to the PC after generating them in the cold card.  When the ColdCard is unplugged all the data that was stored in said mount is automatically erased.

What I'm wondering, is if the data is just merely erased, or is completely purged?  I doubt it's overwritten, but since it appears to be RAM is it completely unrecoverable when it loses power?  The device also erases any Bip39 passphrase that's been entered when it's logged off or disconnected from power.  I wonder how secure the device's memory features are.
There's a hardware difference between volatile memory and non-volatile memory. You can't really make something that has the properties of non-volatile memory, but if chosen can lose the data like a piece of volatile memory does.

As for BitcoinGirl.Club's panic attack; The Trezor and it's clones have open source hardware, which is partially why they are vulnerable to this attack vector
From what I can tell from the video, that's not what makes the wallet vulnerable. Kingpin did use the firmware source code (software!) to identify a flaw. To identify that there's a point in time where the secure memory is transferred to secure memory.
He then introduced a voltage glitch with a variety of offsets from the device boot, and let it run until it 'hit' the right spot and could freeze it in just the right moment & read out the seed.
Being open-source hardware didn't really make this attack easier, since such a 'brute-force' approach will work with other wallets too, if they have such a flaw in the source code.

Even worse, if you own a device whose firmware source code is closed, someone could gain access to the code by bribing a developer or reverse engineering a firmware file; use it for evil and nobody would be notified about it.

The risk can largely be mitigated by adding a Bip39 passphrase to your hardware wallet.  This is especially important for the Trezor wallets, and any that use their source code.  Even if the hacker is able to steal your hardware, and break into it to extract your seed phrase, there's no way for him to get to your funds if they are locked behind a strong passphrase.  I certainly wouldn't consider this a cure, more like buying you a little bit of extra time to create a new seed and transfer all the funds.

I use passphrases on all my hardware wallets now, even if they are not vulnerable to the attack vector demonstrated in that video.
Passphrases are a whole new topic we can discuss somewhere else, but they have their downsides. For example, if not backed up with your seed, there could be all sorts of issues when you (or someone else) will need to restore the seed.
In general, if your hardware wallet falls into a thief's hands, you should just consider the seed compromised and quickly move the funds. Any security measures like secure element and PIN are simply ways to buy time.
legendary
Activity: 2212
Merit: 7064
Cashback 15%
June 29, 2022, 04:06:43 PM
#21
Instead of a hammer, I'd use an angle grinder. But even then it's theoretically still possible to find back some bits. It just became a lot harder.
Than just throw it in volcano, melted lava, or metal factory if you live near one of those, or use good old fire to destroy it, but I don't think we need to be that much paranoid, unless you are holding Satoshi's coins.
This just reminded me on something we all saw in movie Terminator 2 ending scene  Cheesy
Here available in 4K 3D Remastered video:


https://www.youtube.com/watch?v=cmmbBo8RYoE
 
What I'm wondering, is if the data is just merely erased, or is completely purged?  I doubt it's overwritten, but since it appears to be RAM is it completely unrecoverable when it loses power?  The device also erases any Bip39 passphrase that's been entered when it's logged off or disconnected from power.  I wonder how secure the device's memory features are.
RAM should be deleted when power is turned off, so in theory you should be fine, unless there are some flaws in memory design.
Bigger problem with Coldcard and other hardware wallets is their main microchip that many times showed issues in past, and you don't know what's happening inside that little thing.
After they added two closed source secure elements they only made things more complicated, not safer in my opinion.
copper member
Activity: 2142
Merit: 4219
Join the world-leading crypto sportsbook NOW!
June 29, 2022, 10:20:16 AM
#20
This topic is closely related to something that's been occupying my mind lately.  I recently bought a ColdCard, and I've spent a few hours tinkering with it before I christen it "The Hardware Wallet."  One of the things about the ColdCard that I like (it's a Mk4, btw,) is that it has a small amount of storage that can be mounted when plugged into a computer's USB port.  The storage can be used to transfer wallet files to the PC after generating them in the cold card.  When the ColdCard is unplugged all the data that was stored in said mount is automatically erased.

What I'm wondering, is if the data is just merely erased, or is completely purged?  I doubt it's overwritten, but since it appears to be RAM is it completely unrecoverable when it loses power?  The device also erases any Bip39 passphrase that's been entered when it's logged off or disconnected from power.  I wonder how secure the device's memory features are.


As for BitcoinGirl.Club's panic attack; The Trezor and it's clones have open source hardware, which is partially why they are vulnerable to this attack vector, but the risk can largely be mitigated by adding a Bip39 passphrase to your hardware wallet.  This is especially important for the Trezor wallets, and any that use their source code.  Even if the hacker is able to steal your hardware, and break into it to extract your seed phrase, there's no way for him to get to your funds if they are locked behind a strong passphrase.  I certainly wouldn't consider this a cure, more like buying you a little bit of extra time to create a new seed and transfer all the funds.

I use passphrases on all my hardware wallets now, even if they are not vulnerable to the attack vector demonstrated in that video.
hero member
Activity: 1643
Merit: 683
LoyceV on the road. Or couch.
June 29, 2022, 09:59:12 AM
#19
Instead of a hammer, I'd use an angle grinder. But even then it's theoretically still possible to find back some bits. It just became a lot harder.

Even with full disk encryption, I still wouldn't send it for warranty.
legendary
Activity: 1792
Merit: 1296
keep walking, Johnnie
June 29, 2022, 09:49:34 AM
#18
Returning your hard drive to the manufacturer (even after formatting the disk) under warranty with your seed-pharse is the last thing.
Usually, when a drive breaks, format isn't possible anymore.
For more paranoid confidence and peace of mind, you can "format" a broken hdd with a regular hammer, as already suggested above. It is desirable to "format" the physical disk itself (a metal plate inside the hdd), because even from broken hhd, in some cases (when the disk is not damaged), it is theoretically possible to recover information.

After that, you can safely throw such a hdd into the trash without fear that someone will find it and restore your data from it.

If it still works I'd overwrite it a few times.
How about installing encrypted version linux/ubuntu on hdd, which will also make it impossible to restore the old data?
hero member
Activity: 1643
Merit: 683
LoyceV on the road. Or couch.
June 29, 2022, 09:19:46 AM
#17
Returning your hard drive to the manufacturer (even after formatting the disk) under warranty with your seed-pharse is the last thing.
Usually, when a drive breaks, format isn't possible anymore. If it still works I'd overwrite it a few times.
legendary
Activity: 1792
Merit: 1296
keep walking, Johnnie
June 28, 2022, 10:23:28 AM
#16
Situation 1. My desktop has broken and I can no longer use it. Which part of the device I need to burn to destroy all information from it or keep for safety.
Anything that stores data. This is the reason I don't claim warranty on hard drives.
Returning your hard drive to the manufacturer (even after formatting the disk) under warranty with your seed-pharse is the last thing. Therefore, when choosing a hard drive to work with crypto, it is preferable to buy more reliable devices, despite the fact that they will be more expensive. So it will be possible to at least reduce the likelihood of a hard drive disk failure, and in this case it is better to forget about the warranty.

Situation 1: The hardware device is not functional anymore. Should I panic and burn it to destroy the data completely?
Why not just keep it in a drawer? You never know when it comes in handy.
Precisely, it can be used as spare parts in the event of a breakdown of the same device model. For some manufacturers, hardware device breakdowns have already become normal.
hero member
Activity: 882
Merit: 5818
not your keys, not your coins!
June 28, 2022, 09:50:13 AM
#15
The video of the Trezor seed extraction doesn't really have anything to do with the questions you asked.
That hack was only possible because the owner of the Trezor still had an old firmware installed on his device. That old firmware had a vulnerability where the PIN and seed were loaded into the RAM. What Joe did was find a way to access this information to get to the seed. Since that loading of sensitive information into RAM does no longer happen with the newer firmware versions, the same type of attack would no longer work. But the chip could potentially be vulnerable to other manipulations. Kraken and Ledger hacked the Trezor as well.   

It took a hardware hacker 3 months to extract the seed. It's safe to say, that it isn't something that too many people could do. I would still not be interested in giving away or selling my used hardware wallet. 
It's also worth mentioning this is a device without secure chip and one of the world's best hardware hackers still spent 3 months on it. I don't think anyone should 'panic' because of that. Especially if you're in physical control of your hardware wallet.
legendary
Activity: 2730
Merit: 7065
Farewell, Leo. You will be missed!
June 28, 2022, 05:27:43 AM
#14
The video of the Trezor seed extraction doesn't really have anything to do with the questions you asked.
That hack was only possible because the owner of the Trezor still had an old firmware installed on his device. That old firmware had a vulnerability where the PIN and seed were loaded into the RAM. What Joe did was find a way to access this information to get to the seed. Since that loading of sensitive information into RAM does no longer happen with the newer firmware versions, the same type of attack would no longer work. But the chip could potentially be vulnerable to other manipulations. Kraken and Ledger hacked the Trezor as well.  

It took a hardware hacker 3 months to extract the seed. It's safe to say, that it isn't something that too many people could do. I would still not be interested in giving away or selling my used hardware wallet.  
hero member
Activity: 882
Merit: 5818
not your keys, not your coins!
June 27, 2022, 07:52:26 PM
#13
How safe it is to hand out a used and reset hardware wallet to someone else who does not know the seed I had for it?
It's not safe to give anyone used hardware wallet, but you can do simple thing again, send all your coins to different wallet/device  and reset your hardware wallet.
Never again use seed words from previous hardware wallet.
In theory, if the device does get hacked though and memory is restored, the privacy of the previous owner would be broken. For sure regarding previous transactions and potentially for future transactions, for instance if the user didn't mix their coins in the transfer from the old to the new wallet.
legendary
Activity: 2212
Merit: 7064
Cashback 15%
June 27, 2022, 01:59:41 PM
#12
I just saw this video. He hacked the hardware wallet and restored the seed. Goosebumps experience for me.
It's (very) old news and we talked about it before, and I honestly don't understand why would you panic about something that was fixed long time ago.
I guess this is how sensation video marketing works... getting you with your emotions.

I have reset my windows to remove all files. Is it safe to sell it or give it away to someone to use?
Simple. Just sell it without hard drive, and you can do whatever you want with it.
You can do secure SSD deletion (encryption is created) of hard drive letter, that makes it almost impossible to recover data after that.

How safe it is to hand out a used and reset hardware wallet to someone else who does not know the seed I had for it?
It's not safe to give anyone used hardware wallet, but you can do simple thing again, send all your coins to different wallet/device  and reset your hardware wallet.
Never again use seed words from previous hardware wallet.
If you want to be sure burn your seed words, use hammer to destroy your hardware wallet, and use hypnosis to forget everything.

Wouldn't it be easier to just send the coins to a new wallet so that you don't have to worry about the old seed?
Not if you watched that video like he did  Cheesy
He made everything look so complicated, along with self-advertisement.

hero member
Activity: 882
Merit: 5818
not your keys, not your coins!
June 26, 2022, 07:50:08 PM
#11
Wouldn't it be easier to just send the coins to a new wallet so that you don't have to worry about the old seed?
I would absolutely do that. There's no real point importing an old device's seed, in my opinion. Especially if you're worried about the integrity and secrecy of the old seed.
legendary
Activity: 3654
Merit: 8909
https://bpip.org
June 26, 2022, 07:43:56 PM
#10
Wouldn't it be easier to just send the coins to a new wallet so that you don't have to worry about the old seed?
hero member
Activity: 882
Merit: 5818
not your keys, not your coins!
June 26, 2022, 07:10:34 PM
#9
I just saw this video. He hacked the hardware wallet and restored the seed. Goosebumps experience for me.
First of all, I'd like to point out that the video (and the attack) are very old and discussed on this forum already.

Situation 2: How safe it is to hand out a used and reset hardware wallet to someone else who does not know the seed I had for it?

How the fuck I never considered to think of these before?
Since you can't pull the storage chip off the wallet, in my opinion you should never sell a hardware wallet (reset or not, doesn't matter). It's simply unsafe. Always assume that a 'wiped drive' can be at least partly restored, in most cases.
The only reason where I'd say it should be fine is if you overwrite a HDD with a few passes.

That's because SSD controllers are smart and don't allow us to e.g. overwrite specific cells (unlike a HDD that goes from start to finish), and a lot of consumer hardware, like smartphones doesn't even allow to unmount the main drive and mount it on another machine / OS to fully wipe it.

Hence I say: unless we're speaking of a HDD in an off-the-shelf PC or laptop, that you can wipe with multiple passes, don't rely on the device's data being permanently deleted.



Honorable mention: if you have some sort of full disk encryption going on (like many Apple devices), in theory tossing the keys (which is what happens when hitting 'wipe' on those) should suffice. But since I can't check how they do their encryption, I wouldn't trust sensible data to that mechanism.

Certainly don't trust Bitcoin seeds to a 'wiped' storage medium that is not a HDD which you know you wiped (overwrote) fully from start to finish multiple times.
hero member
Activity: 1643
Merit: 683
LoyceV on the road. Or couch.
June 26, 2022, 09:47:30 AM
#8
Situation 1. My desktop has broken and I can no longer use it. Which part of the device I need to burn to destroy all information from it or keep for safety.
Anything that stores data. This is the reason I don't claim warranty on hard drives.

Formatting the entire drive means wiping out everything in it or still it is possible to recover data using proper data recovery tools?
Formatting is like replacing the index page in a book. The rest of the data is still there.
legendary
Activity: 2268
Merit: 18509
June 26, 2022, 09:44:41 AM
#7
If I want to recycle a laptop then I can just take the SSD the storage component and sell the device or throw away without any worry.
Pretty much.

In my imagination I was expecting a huge box connected to the motherboard but when I saw the size of it I was surprised, it's even smaller that those RAMs back in 2000s
Yeah, they are small. Usually just a screw or two and pop it out. Just make sure you don't have more than one drive!

He does not have much knowledge about hardware wallets but in general according to him there should be a storage and I need to destroy it for safety if the device is not in use.
Which would obviously destroy the hardware wallet, since you won't be able to insert a fresh storage chip.

On the video the wallet device was not destroyed then?
Obviously not if they managed to recover it. I was assuming in your hypothetical situation you had the seed phrase and could recover the coins to another wallet. If your broken hardware wallet is your only link to your coins then obviously don't destroy it in case someone can figure out a way to recover your data.

Formatting the entire drive means wiping out everything in it or still it is possible to recover data using proper data recovery tools?
It is still possible to recover the data. As I said above, you need to write over the whole drive with junk data.
legendary
Activity: 2702
Merit: 2645
Farewell LEO: o_e_l_e_o
June 26, 2022, 09:32:38 AM
#6
Probably not. Wiping a drive doesn't actually delete the data on it, it just tells the OS that the data is unneeded and it can be written over whenever needed. Unless you actually write over the data though, then it still exists after being deleted. There are pieces of software out there which will write junk data to your hard drive to make it safe, but the best option is simply to remove and keep/destroy the hard drive and sell the laptop without it.
I went to a hardware shop to consult with an expert to understand basics and suggestions. According to him there are no reason for me to panic. If I want to recycle a laptop then I can just take the SSD the storage component and sell the device or throw away without any worry. In my imagination I was expecting a huge box connected to the motherboard but when I saw the size of it I was surprised, it's even smaller that those RAMs back in 2000s 😂

He does not have much knowledge about hardware wallets but in general according to him there should be a storage and I need to destroy it for safety if the device is not in use.

If it doesn't work anymore, then what do you have to lose by destroying it?
On the video the wallet device was not destroyed then?

In the case of PC wiping, you can simply use any software that wipes the entire hard disk with a Gutmann 35-pass algorithm, so that tere is no chane for the data to be read except for possibly a very powerful electromagnetic reader that is only available at data recovery labs, and are most likely very expensive. The average user isn't going to bother with that hassle right after bying a used PC.
Formatting the entire drive means wiping out everything in it or still it is possible to recover data using proper data recovery tools?
legendary
Activity: 2268
Merit: 18509
June 26, 2022, 04:01:16 AM
#5
I think for giving away a hardware wallet to someone you might not trust to try to find your funds, just find a way to encrypt the data so they can't decrypt any that's left and then wipe the device and put new data on it.
For the vast majority of hardware wallets, there will be no way for the average user to access its storage directly and encrypt whatever you have stored on it. Further, resetting the device and putting a new seed phrase on it does not guarantee that the old one is permanently erased.

Since the hardware wallets technicaly use a linux-like operating system, you could theoretically send commands to it using some library such as libusb that executes a wipe of the hardware wallet storage devices.
Any good hardware wallet will prevent the average user executing arbitrary code on it.

For either of these approaches, you are looking at stripping down the wallet to access the necessary hardware directly. Once you've done that, you can't really give it to someone else, and no one else should want to accept it.

legendary
Activity: 1568
Merit: 6660
bitcoincleanup.com / bitmixlist.org
June 26, 2022, 03:10:31 AM
#4
In the case of PC wiping, you can simply use any software that wipes the entire hard disk with a Gutmann 35-pass algorithm, so that tere is no chane for the data to be read except for possibly a very powerful electromagnetic reader that is only available at data recovery labs, and are most likely very expensive. The average user isn't going to bother with that hassle right after bying a used PC.

Since the hardware wallets technicaly use a linux-like operating system, you could theoretically send commands to it using some library such as libusb that executes a wipe of the hardware wallet storage devices.
copper member
Activity: 2856
Merit: 3071
https://bit.ly/387FXHi lightning theory
June 25, 2022, 03:15:23 PM
#3
I think for giving away a hardware wallet to someone you might not trust to try to find your funds, just find a way to encrypt the data so they can't decrypt any that's left and then wipe the device and put new data on it. (you can put something like a randomly generated private key in the passphrase box as you normally don't need the passphrase to erase a device and you've got proof it should be secure then too - mnemonics are hard to use as passphrases have length limits).

If you burn an entire device (hardware wallet or computer) you might not be sure you've actually destroyed the data. If you instead just remove solid state drives, hard drives and sd cards from the device that no longer works and burn/keep safe/destroy that, you'll be a lot safer and won't be burning things that work and can be used again/recycled.
legendary
Activity: 2268
Merit: 18509
June 25, 2022, 03:03:18 PM
#2
Situation 1. My desktop has broken and I can no longer use it. Which part of the device I need to burn to destroy all information from it or keep for safety.
Any permanent storage devices, which will usually be HDDs or SSDs. However, just because the desktop doesn't work doesn't necessarily mean your storage drives have failed. You can probably strip them out and use them in another machine instead.

Situation 2. I am not going to use the laptop anymore, I have reset my windows to remove all files. Is it safe to sell it or give it away to someone to use?
Probably not. Wiping a drive doesn't actually delete the data on it, it just tells the OS that the data is unneeded and it can be written over whenever needed. Unless you actually write over the data though, then it still exists after being deleted. There are pieces of software out there which will write junk data to your hard drive to make it safe, but the best option is simply to remove and keep/destroy the hard drive and sell the laptop without it.

Situation 1: The hardware device is not functional anymore. Should I panic and burn it to destroy the data completely?
If it doesn't work anymore, then what do you have to lose by destroying it?

Situation 2: How safe it is to hand out a used and reset hardware wallet to someone else who does not know the seed I had for it?
Impossible to answer because it depends entirely on the hardware wallet, and most probably haven't been audited or examined thoroughly for such an attack vector. Safer not to, just as its safer not to use a hardware wallet given to you by someone else.
legendary
Activity: 2702
Merit: 2645
Farewell LEO: o_e_l_e_o
June 25, 2022, 02:40:12 PM
#1
I just saw this video. He hacked the hardware wallet and restored the seed. Goosebumps experience for me.

Consider, I created a bitcoin wallet. I have back up seed stored in physical form.
Situation 1. My desktop has broken and I can no longer use it. Which part of the device I need to burn to destroy all information from it or keep for safety.
Situation 2. I am not going to use the laptop anymore, I have reset my windows to remove all files. Is it safe to sell it or give it away to someone to use?

Consider, I have a hardware wallet and seed is backed up safely in physical form.
Situation 1: The hardware device is not functional anymore. Should I panic and burn it to destroy the data completely?
Situation 2: How safe it is to hand out a used and reset hardware wallet to someone else who does not know the seed I had for it?

How the fuck I never considered to think of these before?
Jump to: