Pages:
Author

Topic: Ledger Recovery - Send your (encrypted) recovery phrase to 3rd parties entities - page 19. (Read 4835 times)

hero member
Activity: 504
Merit: 625
Pizza Maker 2023 | Bitcoinbeer.events

An update is irrelevant. As I explained earlier in this thread and in the tweet just above, the whole point of Ledger's Secure Element was that the private keys could never leave the Secure Element. We now know that claim is a lie, and has therefore been a lie since day one. A simple piece of code is all that is required to extract your private keys. All Ledger devices are vulnerable whether or not you opt in to this or update to the latest firmware.

But at this point with Ledger's statement, all devices (even coldcards for example) that have the same secure element chip are vulnerable or am I wrong?  Because if it's true that until yesterday you couldn't extract the private key, today it seems that it can be done simply via software, and who can guarantee me that it can't be done with others as well?
hero member
Activity: 1344
Merit: 583
If anyone is wondering how can an entity destroy the concept of their own products - in this case by exporting the seed phrase to outside entities, even if it is encrypted - then wait no more because Ledger will launch their new service, Ledger Recover[1]:
Quote
Ledger is preparing to launch a new service called Ledger Recover that splits a wallet recovery phrase—basically, a human-readable form of the private key—into three encrypted shards and distributes them to three custodians: Ledger, crypto custody firm Coincover, and code escrow company EscrowTech.  If somebody loses their recovery phrase, two of the three shards can be combined—pending an ID check—to regain access to the locked funds. Essentially, Ledger Recover is an additional safety net; for the price of $9.99 a month, it takes the jeopardy out of crypto’s version of stuffing dollars under the mattress. It’ll be available in the UK, EU, US, and Canada and come to other territories later in the year.
(...)
Ledger Recover is a service, he says, not a feature—one that provides all the niceties and safety mechanisms regular people are looking for. The fragments of the recovery phase are encrypted and stored by each custodian on specially secured servers, and the balance of the user’s wallet is covered up to a value of €50,000 ($55,000) if something goes awry, a little like deposit insurance at a bank. It’s also being designed with a less technical user in mind.
I've tried to look upon any more news regarding this paid service, but so far I'm not able to find anything on Ledger website (release notes are currently on OS version 2.1.0). The only reference that I found was this[2] Reddit post where the concept appears in Ledger Nano X newest firmware update (2.2.1):

I believe most Ledger customers will see this as a service to subscribe to since this will be seen as a "safe heaven" in order to avoid the loss of their funds, or even an alternative that holds their hand and makes them feel safe regarding their funds. Sadly they aren't aware of what is actually happening in the background, but I don't think most people will care as long as they have another option to access their funds...

[1]https://www.wired.co.uk/article/ftx-crypto-investors-hardware-wallets
[2]https://safereddit.com/r/CryptoCurrency/comments/13im3bc/wtf_ledger_this_is_a_disaster_waiting_to_happen/

Hands down worst thing they could ever do, talk about shooting yourself in the foot. Did the company honestly think about how crypto users of their wallets would take this news? They thought they were moving a step in the right direction here I guess. Even with the best intentions this is putting people at even greater risks to malicious and bad actors
hero member
Activity: 868
Merit: 737
I have a few bitcoin savings in Ledger Nano s which I never open since 2 years ago, and I never connect with Live applications except only connect with Electrum. So, does my ledger have an impact or effect? I don't want to try it and don't intend to open it now, because I save it for the next 10-15 years, now, I have doubts if is it really safe to continue it or if I must move my balance to another hardware wallet, Please give me instruction what the best, I'm still young and only have bitcoin as my current investment for future.
sr. member
Activity: 616
Merit: 314
CONTEST ORGANIZER
I think Ledger want to be the first oficial """"""aproved hardware wallet"""""" by the goverments/stablishment, i cant find another idea about what are they doing.

Because this seem very very similar at how it works the payment system on shops online when you paid with credit/debit card. You never give to the local where you are buying you credit card info, you send that information to a third party who say its OK or not and make the payment in conection with the bank and the commerce.

So i think this its very similar, they are making some lobby and making some new units of business with someone to be the first and only """"LEGAL"""" hardware wallet.
Trusted by some XXX third party companie who the goverment aproves and they are all friend between them.

And yes before you say, they sell their soul to the devil.
legendary
Activity: 1148
Merit: 3117
Right. But approve what?
Does the person have to repeat the passphrase in order to be registered in this "recovery program"? Or is it just a mere question, which person answers "yes"?
From what I can comprehend from Ledger replies all over Twitter, it seems that a prompt will appear on the device screen asking you if you want to subscrive to the service (or a similar message). If you decide to approve by means of physically pressing the button on your Ledger then this circus happens[1]:
Quote
If a user decides to subscribe to Ledger Recover, then his/her SRP will be encrypted, fragmented into three parts, and each part will be sent end-to-end encrypted between your Ledger product and the backup providers' secure Hardware Security Models (HSMs – not in the cloud).
Basically they are, once again, saying that a copy of your Secret Recovery Phrase will be encrypted and then sent over to 3 entities by E2E encryption channels. What they keep claiming is that without a user concept, Ledger isn't able to proactively access their users SRP[2]:
Quote
Ledger acts as backup provider for only one encrypted fragment, and a single fragment doesn't allow the SRP to be recovered.
Ledger cannot access any user’s SRPs, nor will it be able to do so at any point in the future.
Remember o_e_l_e_o previously linked tweet[3]? I'll like you to introduce you to the following statement[4] by Ledger about 4h ago:

Someone correct me if I'm wrong, but isn't Ledger openly admitting that enabling this feature was always possible from the beginning? Isn't this mocking their userbase?

EDIT: Look at this Twitter user[5] - When faced with the decision to evaluate what is worse - either a company accessing their SRP within the secure chip or having the user to type the seed so that Ledger could send it over to their partners - they would prefer to have the last option being implemented which is shocking as both of them goes against the core principles of the products being sold by Ledger. What's even worse is that Ledger comes up and actually says "No, you're wrong, we don't need that, that would go against our motto ( Roll Eyes ), we just need your consent and we can syphon away a copy of your SRP and send them over to our partners".

EDIT 2: Ledger just keeps giving wood[6][7] to a fire that keeps on growing:


[1]https://nitter.it/Ledger_Support/status/1658828387807264772
[2]https://nitter.it/Ledger_Support/status/1658824425192521728
[3]https://bitcointalksearch.org/topic/m.62258795
[4]https://nitter.it/Ledger_Support/status/1658910942405566485
[5]https://nitter.it/Ledger_Support/status/1658978163047776257
[6]https://nitter.it/Ledger_Support/status/1658892462440456192
[7]https://nitter.it/Ledger_Support/status/1658970979417088000
hero member
Activity: 3024
Merit: 745
Top Crypto Casino
Say that even if we've got the old nano s but they can still try to do something and update and force an update for its firmware, is that right?
An update is irrelevant. As I explained earlier in this thread and in the tweet just above, the whole point of Ledger's Secure Element was that the private keys could never leave the Secure Element. We now know that claim is a lie, and has therefore been a lie since day one. A simple piece of code is all that is required to extract your private keys. All Ledger devices are vulnerable whether or not you opt in to this or update to the latest firmware.
Right on, that's my worry and that's why even I've got the old one I know that if I try to connect and they forcefully require an update then I have no choice. Thanks, I've missed the tweet part as it's just a milliseconds after I've posted and still got to go through with everything, I'm overwhelmed with the info and technicals that's in here.




This kinda give me some biggest concern, as the process everytime we use our Ledgers in doing a transaction, we have to approve it through our devices and this requirement is kind of sick, those that will avail the service should review this first.
legendary
Activity: 1722
Merit: 4711
**In BTC since 2013**

Right. But approve what?
Does the person have to repeat the passphrase in order to be registered in this "recovery program"? Or is it just a mere question, which person answers "yes"?
hero member
Activity: 714
Merit: 1298
~~

I still haven't been able to figure out one aspect (and maybe no one has figured it out yet):
Is the key automatically collected by Ledger for the person paying for this service, or does the user need to provide the key?

According to their statement


legendary
Activity: 1722
Merit: 4711
**In BTC since 2013**
~~

I still haven't been able to figure out one aspect (and maybe no one has figured it out yet):
Is the key automatically collected by Ledger for the person paying for this service, or does the user need to provide the key?
legendary
Activity: 1148
Merit: 3117
Hi - your private keys never leave the Secure Element chip, which has never been hacked. The Secure Element is 3rd party certified, and is the same technology as used in passports and credit cards. A firmware update cannot extract the private keys from the Secure Element.
That statement is still true today. The keys can't leave the secure element unless you pay $9.99 a month for the pleasure of sharing your keys. It's not a time to joke around, but this is as silly as it gets.
I've seen some reports of users on Reddit and Twitter that actually stand besides Ledger in saying that their keys are still safe if they don't opt-in for this program. This baffles me and I can't honestly understand what's the reasoning for such actions. Not only did they lied, as per the information shared by o_e_l_e_o, but they are gaslighting their audience in saying that their keys a copy of their keys ( Cheesy ) are only shareable if the user decides to which totally goes against the concept of all their products. And they keep saying this over[1], and over[2] and over[3] again[4], which is ridiculous. They never answer the real question - Why is this feature even possible to be activated by either party?

And here's another article where Ledger tries to make sense of this service[5] where, once again, they explain that the original Ledger device isn't needed to "unlock" the original recovery phrase, which is mind-blowing :
Quote
If you choose to pay for a subscription, you're still the only one with access to your Secret Recovery Phrase, and you will also have a backup that will be created and accessible only to you. You remain the only one able to pass the identity verification check that is required to fetch back the encrypted fragments and rebuild your Secret Recovery Phrase into another Ledger device—should you need to do so in the future.

[1]https://nitter.it/Ledger_Support/status/1658905804307669008
[2]https://nitter.it/Ledger_Support/status/1658908657482973184
[3]https://nitter.it/Ledger_Support/status/1658905447783440401
[4]https://nitter.it/Ledger_Support/status/1658902661360492553
[5]https://support.ledger.com/hc/en-us/articles/11022833583261
legendary
Activity: 1722
Merit: 4711
**In BTC since 2013**
An update is irrelevant. As I explained earlier in this thread and in the tweet just above, the whole point of Ledger's Secure Element was that the private keys could never leave the Secure Element. We now know that claim is a lie, and has therefore been a lie since day one. A simple piece of code is all that is required to extract your private keys. All Ledger devices are vulnerable whether or not you opt in to this or update to the latest firmware.

Honestly, more and more I have the feeling that there was a big miscommunication about how everything was going to work and the sentence still cannot be removed. But, the problem is already done and they will hardly be able to go back.

Once doubts are generated at this level, it will be difficult for anyone to go back to believing that portfolios do not have a back door - especially those that are updated in the future.
hero member
Activity: 714
Merit: 1298
Say that even if we've got the old nano s but they can still try to do something and update and force an update for its firmware, is that right?
An update is irrelevant. As I explained earlier in this thread and in the tweet just above, the whole point of Ledger's Secure Element was that the private keys could never leave the Secure Element. We now know that claim is a lie, and has therefore been a lie since day one. A simple piece of code is all that is required to extract your private keys. All Ledger devices are vulnerable whether or not you opt in to this or update to the latest firmware.

According to ANSSI  their devices where always vulnerable  in this respect:




The question remains whether their Secure Channel is able to countermeasure that vulnerability



Regardless, two days ago I have moved the whole of my stash to Passport 2.

 
legendary
Activity: 2730
Merit: 7065
"Here, the point which is important to remember is that you stay in control…there’s no backdoor, nothing will happen without your consent on the device…in the future, the whole protocol will be open, so you’ll be able to verify how the whole protocol works." - @BTChip
This sounds good on paper, and is apparently supposed to calm down the voices screaming everything is closed-source, but the type of code means nothing in this scenario. The problem is not that we can inspect the code to see that the seed will be divided into 3 parts, encrypted, and then shared with 3 different custodians. The problem is that there is a way for them to do that, and it's a huge security risk combined with a privacy risk since they also require KYC.

Does it mean we can't verify that they have no access to the decryption key used to reconstruct the initial seed?
They claim Ledger Recover will be open-source and you can verify the code. So what? What prevents them or anyone else to still get access to the shards by working with those custodians behind everyone's back. Not to mention that a serious hack could result in shards landing in the wrong hands.

Hi - your private keys never leave the Secure Element chip, which has never been hacked. The Secure Element is 3rd party certified, and is the same technology as used in passports and credit cards. A firmware update cannot extract the private keys from the Secure Element.
That statement is still true today. The keys can't leave the secure element unless you pay $9.99 a month for the pleasure of sharing your keys. It's not a time to joke around, but this is as silly as it gets.
legendary
Activity: 2268
Merit: 18711
Say that even if we've got the old nano s but they can still try to do something and update and force an update for its firmware, is that right?
An update is irrelevant. As I explained earlier in this thread and in the tweet just above, the whole point of Ledger's Secure Element was that the private keys could never leave the Secure Element. We now know that claim is a lie, and has therefore been a lie since day one. A simple piece of code is all that is required to extract your private keys. All Ledger devices are vulnerable whether or not you opt in to this or update to the latest firmware.
hero member
Activity: 3024
Merit: 745
Top Crypto Casino
No thanks Ledger. I've got my old nano s and good to see that it's not affected by this unimpressive upgrade of theirs. I'm still trying to absorb all of these questions on my mind while reading the entire thread backreading interesting questions that would do concern everybody's worry on this feature they've just made. I hope that there's a bigger company that would poke them and give them a shake on Ledger's head that this is full of bs update and defeat's the purpose of their own product. Say that even if we've got the old nano s but they can still try to do something and do a force update for its firmware, is that right?
legendary
Activity: 2268
Merit: 18711
Tweet by Ledger from 6 months ago:

Hi - your private keys never leave the Secure Element chip, which has never been hacked. The Secure Element is 3rd party certified, and is the same technology as used in passports and credit cards. A firmware update cannot extract the private keys from the Secure Element.

Lol.
legendary
Activity: 2366
Merit: 1408
To answer to your second question, if you had to type your recovery phrases to use this service, it would be even worse than the current solution that they are proposing as you were violating one of the core rules of your funds safety - never share/type your recovery phrases anywhere, not even with your device manufacturer or the Pope.

At this point I believe the worst thing would be to find out that there is a way to extract the seed from the hard wallet, at least in my opinion.
The fact of making a user enter the seed would only be done according to the user and would not be a design flaw, but a "social" flaw, but for me it's still hard to believe that they actually already have this tool to extract the seed.
The Ledger I own is a nano S, which apparently will not be compatible with this technology, so theoretically I am protected
But I'm afraid of how things might escalate from here on out

Yesterday I saw this tweet:

Source

The user claims that Ledger reportedly wrote a tweet saying that Ledger would create another backup phrase, and that no one would have access to seed, but that tweet was deleted.

legendary
Activity: 1162
Merit: 2025
Leading Crypto Sports Betting & Casino Platform
Well. This is something I would have never expected a hardware wallet provider to come up with...
I am not that much into conspiracy theories but this is rather very fitting to the concept of inteligency agencies of being able to move, freeze or seize people's money if they find any "reasonable" excuse to do so.

It is very likely the encryption process of the seed means nothing, there must be some master key so the seed is read and recovered for God knows who.

The fact Ledger is the biggest provider of HW devices in the market only makes this to feel worse. Time to go to the isolated PC and paper. I guess.
legendary
Activity: 3122
Merit: 2178
Playgram - The Telegram Casino
We are also discussing the Ledger issue in the German board and found a tweet claiming that the Nano Ledger S may not be affected because the device is too old for the the current Ledger Recover firmware update?

Regardless of the fact that you should still look for another hardware wallet company, can anyone with a more technical background comment on whether this information is correct?
I'm not a technical fan, but is this thought true?
If the Nano S can "dodge" the 2.2.1 update. then it may be able to dodge another update later, then it will eventually be devices with outdated systems that are increasingly vulnerable while at any later higher update it won't exclude all the new features of 2.2.1.

It's anyone's guess since part of their code is closed source, but it might very well be that this backdoor can't be integrated into the Nano Ledger S for whatever reason -- why else would they want to miss out on that sweet sweet subscription money? On the other hand they might also just want to entice people to upgrade to their latest hardware wallets, because obviously everyone (and their moms, as we have learned) wants this feature.

Either way, at that point the 2.2.1 update is the vulnerability. If you can live without the GUI features even outdated hardware wallets can stay secure for a very long time (with few exceptions that involve physical access).
hero member
Activity: 510
Merit: 574
Too Little, Too Late.
Pages:
Jump to: