Pages:
Author

Topic: Foundation Passport Official Thread - page 9. (Read 6619 times)

legendary
Activity: 1148
Merit: 3117
February 13, 2024, 07:00:16 AM
@foundationdvcs, as it was stated  the v.2.2.0 release has brought the option of importing "a SeedQR directly into Passport when restoring from seed.".

However, when passing through my Passport 2 (v 2.2.0) menu I failed to find the opt to create such SeedQR.

Does it mean there is a  need for  some 3rdparty soft to create that  SeedQR from my SEED?
I may have understood in a wrong way your question, but are you asking if Foundation is able to create a SeedQR directly on the device (from your seed words)? If so, that is not the case I believe. When they said in the v.2.20 that you can now "directly import a SeedQR" they were referring to the fact that you are able to scan an existing QR code (based on the SeedQR format specification). This assumes that you need a QR code first. You can see it better explained in their guide[1]:
Quote
Restoring From an Existing Seed

To restore from an existing seed, click Restore From Seed. You'll then have the option to restore via:

    12 words
    24 words
    Compact SeedQR
    SeedQR

To restore via either the Compact or SeedQR options, simply scan your existing QR backup when prompted and confirm the seed words displayed on the following page.

When restoring via seed word input, Passport uses predictive text entry to make this process as fast as possible.

For instance, to enter car, simply type 2-2-7. Passport will display all words associated with that key combination.

Video tutorial for restoring via seed words.
If you are interested in creating one, I have found an open sourced repository that provides the ability to generate a compact SeedQR[2] but as I never used it I can't vouch for it. Or, considering that the method of creating a SeedQR is openly described[3] you can try to create one by yourself and only rely on an open source tool to generate QR codes (in offline mode) such as this[4].

[1]https://docs.foundationdevices.com/en/passport/setup
[2]https://github.com/renkasiyas/seedQR-generator
[3]https://github.com/SeedSigner/seedsigner/blob/dev/docs/seed_qr/README.md
[4]https://github.com/nayuki/QR-Code-generator
hero member
Activity: 714
Merit: 1298
February 13, 2024, 06:29:09 AM
@foundationdvcs, as it was stated  the v.2.2.0 release has brought the option of importing "a SeedQR directly into Passport when restoring from seed.".

However, when passing through my Passport 2 (v 2.2.0) menu I failed to find the opt to create such SeedQR.

Does it mean there is a  need for  some 3rdparty soft to create that  SeedQR from my SEED?
legendary
Activity: 1148
Merit: 3117
February 10, 2024, 08:52:10 AM
The (soonish) Passport version 2.3.0 release sure brings up a set of interesting features per BitcoinQ_A (Head of Customer Service[1]) recent tweet[2]:
Quote
Passport 2.3.0 QA time. Some cool stuff coming in this one!

Taproot receives 📥
Address explorer 🧭
12 word seed generation option 🌱
Final word checksum calculation 🧮
New address formatting ℹ️

Considering that the release is now on QA, I suppose Passport users will end February with a new set of cool features?  Cool

[1]https://foundationdevices.com/about/
[2]https://n.opnxng.com/BitcoinQ_A/status/1755507422771228854
hero member
Activity: 714
Merit: 1298
February 05, 2024, 06:46:36 AM
Yesterday, I sent  a transaction with 30 inputs and three outputs (excluding that  one relevant to commission).

I chose to sign it via QR code. After analyzing this code, Passport 2 (v2.2.0) warned that this transaction was large and suggested to continue the signing by using the PSBT file.

But I decided to continue the signing  via QR code.

Passport 2 did the job well. It took less than a minute to scan the dynamic code generated by Sparrow and then sign the transaction.
legendary
Activity: 1148
Merit: 3117
January 06, 2024, 05:53:28 PM
@foundationdvcs : I just saw that in the latest Envoy release[1], Spanish is listed as a new language to select. Are you planning on adding other languages during 2024?

[1]https://foundationdevices.com/2024/01/envoy-version-1-5-1-is-now-live/
hero member
Activity: 924
Merit: 5943
not your keys, not your coins!
January 05, 2024, 09:32:15 AM
I think that granting to other HW the ability to be paired  with Envoy  would require incorporation of the  third-party connectivity libraries  into app's code. Those libraries may have the flaws and thus, be vulnerable to malware or hacking attempts . Consequently , the security of HW + Envoy tandem would be  liquefied.
In my opinion, if other hardware wallet devs are able to add support for their device to Envoy without additional libraries or security concerns, Foundation could always merge it into their main branch.

But then you run into all these issues like a buggy implementation being blamed on Foundation. Would be totally understandable from a business perspective if Foundation Devices never merged third-party wallet support into the official version of their application.
hero member
Activity: 714
Merit: 1298
January 04, 2024, 04:07:26 AM
Update today directly from Envoy, our mobile app in just a few taps, and read the full changelog in our release notes blog post below
Is there a way for Envoy app to have support for other aigrapped hardware wallets, other than Passport?
Or maybe you have the tools available for other developers to help and work on that, since everything is open source code.

We plan on focusing only on Passport (and future devices) in Envoy as that allows the tightest UX pairing possible, and there are other fantastic multi-hardware wallet solutions out there like Sparrow Wallet.


Wise commitment.

I think that granting to other HW the ability to be paired  with Envoy  would require incorporation of the  third-party connectivity libraries  into app's code. Those libraries may have the flaws and thus, be vulnerable to malware or hacking attempts . Consequently , the security of HW + Envoy tandem would be  liquefied.

copper member
Activity: 101
Merit: 255
January 03, 2024, 11:48:16 AM
Update today directly from Envoy, our mobile app in just a few taps, and read the full changelog in our release notes blog post below
Is there a way for Envoy app to have support for other aigrapped hardware wallets, other than Passport?
Or maybe you have the tools available for other developers to help and work on that, since everything is open source code.

We plan on focusing only on Passport (and future devices) in Envoy as that allows the tightest UX pairing possible, and there are other fantastic multi-hardware wallet solutions out there like Sparrow Wallet.

As you mentioned, Envoy is 100% open source so anyone could fork it and make it work with other air-gapped hardware wallets, with those supporting the same UR/animated QR standards being the easiest to implement.
legendary
Activity: 2212
Merit: 7064
January 03, 2024, 10:46:58 AM
Update today directly from Envoy, our mobile app in just a few taps, and read the full changelog in our release notes blog post below
Is there a way for Envoy app to have support for other aigrapped hardware wallets, other than Passport?
Or maybe you have the tools available for other developers to help and work on that, since everything is open source code.
copper member
Activity: 101
Merit: 255
January 03, 2024, 08:48:58 AM

📷  Seamlessly switch back and forth between signing via QR and microSD



I should say that this is the most noticeable feature  which empowers  device to handle large transaction effectively. I have encountered in the real practice the difficulty to sign via QR the big transactions which made itself evident in the fact that the time required to complete the signing process was unbearably long (up to 10 minutes). Now, having the preliminary warning on the large transaction and opt to switch  on-the-fly from QR  to SD card  simplifies the signing process. Tested this myself with  2.2.0 beta a few days ago.

Love to hear that! We've done a lot of work to increase the size of transaction you can reasonably use QR codes for, but there is still a practical limit where it just makes more sense to use microSD, so I'm glad to hear this is already being an effective UX improvement.

Even more QR improvements and transaction signing speed-ups coming in 2.3.0 as well as we've rewritten the transaction parsing from scratch to go along with Taproot.
hero member
Activity: 714
Merit: 1298
January 03, 2024, 02:34:54 AM

📷  Seamlessly switch back and forth between signing via QR and microSD



I should say that this is the most noticeable feature  which empowers  device to handle large transaction effectively. I have encountered in the real practice the difficulty to sign via QR the big transactions which made itself evident in the fact that the time required to complete the signing process was unbearably long (up to 10 minutes). Now, having the preliminary warning on the large transaction and opt to switch  on-the-fly from QR  to SD card  simplifies the signing process. Tested this myself with  2.2.0 beta a few days ago.
copper member
Activity: 101
Merit: 255
January 02, 2024, 07:43:20 PM
We're thrilled to get Passport v2.2.0 in your hands today 🎊

With this latest version, you can:

📷  Seamlessly switch back and forth between signing via QR and microSD
🌱  Restore from SeedQR

We've also improved the user interface on Founder’s Edition and added many quality of life improvements across the board. With the number of new features we included in 2.1.0, we took this release to focus on refining our unified firmware between Founder’s Edition and Batch 2, as well as paving the way for full Taproot support in 2.3.0.

Update today directly from Envoy, our mobile app in just a few taps, and read the full changelog in our release notes blog post below:

https://foundationdevices.com/2024/01/passport-version-2-2-0-is-now-live/

If this is your first time updating Passport or you'd like a refresher, we have docs and videos that walk you through every step of the process:

https://docs.foundationdevices.com/firmware-update
legendary
Activity: 2212
Merit: 7064
December 06, 2023, 01:15:20 PM
I didn't saw this posted here, but looks like guys from Passport Foundation are a bit scared about recent changes in US, so they are dropping plans for Whirlpool support in their Envoy app.
Only way to use Whirlpool is going to be with Sparrow and Samurai wallet, or by forking their open source Envoy app.
New version of Envoy app was released few days ago:
https://github.com/Foundation-Devices/envoy/releases

legendary
Activity: 882
Merit: 1873
Crypto Swap Exchange
November 29, 2023, 11:30:22 AM
I fell in love so much with this Passport thing.

Is there any plan for official Monero support?  Passport would be the PERFECT Hardware Wallet for a combination of these two Currencies and I am pretty convinced that most of your customers are or end up being Monero users too.  Like, how many Bitcoin users are paranoid enough to move further from preaching to ACTUALLY using Airgapped Hardware Wallets?  For the most part only some paranoid weird people like me would!

Anyway.  The last version of Passport looks amazing.  You have done a beautiful job at designing the Hardware Wallet AND creating the perfect Wallet for the paranoid.

-----

Edit.  Do you have a plan for an uglier but more affordable version of this?  Maybe a chunky plastic Wallet that is focused on affordability while offering the exact same more important components such as quality buttons, quality screen et cetera?
hero member
Activity: 714
Merit: 1298
November 24, 2023, 09:50:01 AM
so that the back up code could be secured in places that might not be 100% secure because the code has to be matched up with the SD card,
Can not get this at all. Could you elaborate a bit more his frame of thought. In the current implementation the backup code (consisting of 20 digits) can be copied to any quantity of SD cards. Pegging code solely to the  specific card is not a wise approach, IMHO.

As to me, I prefer to backup SEED phrase rather then digital code.

I might have had been confused about what I had heard Zach say on the podcast, and since i don't currently have a Passport device, my ideas of how it works are not as much experiential - and I had not really understood very well how the SD card back-up works.  

Nonetheless your suggestion of not pegging the code to any specific SD card seems helpful, but then that could be problematic if the code would be totally open.   I was presuming that there might be a way to have a back up code and then perhaps to have it pegged to 3 SD cards that use the same code, so it is like having 2 back ups of the SD card in case the primary SD card gets lost, stolen or broken.  

Well, probably by card he meant a paper one rather than SD card. 20-digits-long code is used to encrypt zip file which holds SEED and Passport's settings. They advise to write down that code on the  paper card that accompanies Passport.



Probably now they are thinking of splitting somehow that code into a few parts to hold them on different paper cards.
legendary
Activity: 3948
Merit: 11416
Self-Custody is a right. Say no to"Non-custodial"
November 24, 2023, 08:36:59 AM
so that the back up code could be secured in places that might not be 100% secure because the code has to be matched up with the SD card,
Can not get this at all. Could you elaborate a bit more his frame of thought. In the current implementation the backup code (consisting of 20 digits) can be copied to any quantity of SD cards. Pegging code solely to the  specific card is not a wise approach, IMHO.

As to me, I prefer to backup SEED phrase rather then digital code.

I might have had been confused about what I had heard Zach say on the podcast, and since i don't currently have a Passport device, my ideas of how it works are not as much experiential - and I had not really understood very well how the SD card back-up works.   

Nonetheless your suggestion of not pegging the code to any specific SD card seems helpful, but then that could be problematic if the code would be totally open.   I was presuming that there might be a way to have a back up code and then perhaps to have it pegged to 3 SD cards that use the same code, so it is like having 2 back ups of the SD card in case the primary SD card gets lost, stolen or broken.   
hero member
Activity: 714
Merit: 1298
November 24, 2023, 01:54:39 AM
so that the back up code could be secured in places that might not be 100% secure because the code has to be matched up with the SD card,

Can not get this at all. Could you elaborate a bit more his frame of thought. In the current implementation the backup code (consisting of 20 digits) can be copied to any quantity of SD cards. Pegging code solely to the  specific card is not a wise approach, IMHO.


As to me, I prefer to backup SEED phrase rather then digital code.
legendary
Activity: 3948
Merit: 11416
Self-Custody is a right. Say no to"Non-custodial"
November 23, 2023, 11:19:34 AM
A few hours ago, I listened to Zach being interviewed on the Simply Bitcoin podcast that just came out today (Zach participates in most of the podcast, yet their discussion of Passport and/or hardware (self-custody) user-friendliness ideas is mostly in the second half of it).

They were largely talking about user-friendliness, and even talking about how many users are likely intimidated from various kinds of user-friendliness aspects of various kinds of wallets.

They may have also mentioned that sometimes there is a certain reluctancy that individuals have in terms of changing from their current practices into different practices, or maybe not even recognizing and/or appreciating various vulnerabilities that might exist in their own ways of custodying their coins.

At one point zach mentioned the physicality of the SD card, so that the back up code could be secured in places that might not be 100% secure because the code has to be matched up with the SD card, and so I probably still would prefer to camloflage the code and even to divide it up, but then I also started to consider whether there might need to be 2-3 SD cards, and how such a process would work.

So my point is that I hate to merely rely on one back up, and I understand the potential complications of having back-ups stored in too many places and/or even complications (and confusion) that might come from that, and I am pretty sure that my current process is ideally having three back ups, even though sometimes when in the process of getting some new private key or password or other kind of private security information, I may well only have one or two back ups until that information gets put into a more systematic longer term system in which there are 3 back ups..

oh and by the way, I frequently will just suggest 2 back ups, so I might even be overly doing my own self.. while at the same time I get nervous when people tell me that they ONLY have 1 back up.. which is surely better than no back ups, which is also a pretty common practice for real world and non-technical normies. they frequently have no back ups at all and they look at you as if you were an alien if you are asking them about how they back up their information (whether value related information, such as bitcoin, or any other information for that matter).
legendary
Activity: 3472
Merit: 10611
November 16, 2023, 09:00:33 AM
Thanks, I know this. However I was asking about the presence of the "hidden"  opt in the wallet settings (I have perused all available menu's opts , but didn't find it )that would allow to override that default response and sign transaction with any SIGHASH flag.  In fact,  I doubt whether I would ever need the other response, thus, that was just a thought-provoking  question (to officials, which still holds on).
Although I haven't gone through the whole code but from what I've checked I don't think they have ever implemented that part of the code responsible for computing the sig-hash (digest) for other sighash flags. You can see that elsewhere too. For example in the below link you can see the method that is computing sig-hash for SegWit outputs according to BIP-143, it is clear that this is not a full implementation of the BIP as it skips other sighash types and only supports SIGHASH_ALL (no _NONE no _SINGLE and no _ANYONECANPAY).

https://github.com/Foundation-Devices/passport2/blob/3d570fba50b40d65a04087127138426c2570e5a0/ports/stm32/boards/Passport/modules/psbt.py#L1588
hero member
Activity: 714
Merit: 1298
November 16, 2023, 03:29:52 AM
Anyway, just of my curiosity. Is there menu's opt that makes possible for device to sign transactions with  SIGHASH flags other than SIGHASH_ALL?
If you are importing a PSBT file for signing, the code rejects any sighash types that is not SIGHASH_ALL and there is no option to override that as far as I can tell from the source code:
https://github.com/Foundation-Devices/passport2/blob/3d570fba50b40d65a04087127138426c2570e5a0/ports/stm32/boards/Passport/modules/psbt.py#L512-L514

Thanks, I know this. However I was asking about the presence of the "hidden"  opt in the wallet settings (I have perused all available menu's opts , but didn't find it )that would allow to override that default response and sign transaction with any SIGHASH flag.  In fact,  I doubt whether I would ever need the other response, thus, that was just a thought-provoking  question (to officials, which still holds on).
Pages:
Jump to: