How about an air-gapped PC?
This. With the proviso that this means a dedicated machine which is never connected to a network, and has hardware capable of non-contact connections (such as wifi and bluetooth) physically removed. I state this explicitly, for I’ve observed that many people mistakenly believe that rebooting their network machines with a live CD/USB makes for an “airgap”.
Part of the advantage of an airgap machine is that the hardware can be purchased anonymously. For ordinary individuals, buying an inexpensive laptop (sufficient for Bitcoin, PGP, etc.) off the shelf for cash is the only practical means I know for precluding any chance of a targeted supply-chain attack. Wherefore this part of the
Ledger vulnerability disclosure blog post caught my attention (boldface is in the original):
In this disclosure, we will focus primarily on the case of supply chain attacks. That is: whether or not you can trust your hardware wallet when you purchase it from a reseller or third party. But, as I explain briefly at the beginning of this article, the methods described here can be applied to the other two attack vectors.
Well, that was always my biggest problem with hardware wallets! How do I get one?
A company garners my distrust when it not only fails to adequately address this question, but gives its customers advice so irresponsible as to verge on negligence (
archive.is link corrected to https):
Do they claim their hardware to be
unhackable!?The first rule of computer security is physical security. If an attacker comes into physical possession of your hardware, then you must thence permanently consider that hardware to be compromised.
My understanding of tamper-
resistant hardware wallets was always that they would
resist extraction of keymat already stored on the device—backward-looking protection of data at rest. Not that they would guarantee forward safety of the device after it had been in possession of an adversary.
An airgap PC with properly
0 encrypted disks will also protect your coins against thieves who steal the device—but with the difficulty that this only moves the key management problem from one place to another: How do you secure your disk encryption keys? Tamper-
resistant hardware could be quite helpful here; I’ve had some relevant thoughts, but of course, that would require obtaining uncompromised tamper-resistant hardware.
(Of course, an airgap PC which has been stolen and recovered must be treated as permanently compromised.)
0. Don’t get me started.