Why Nostr? What is Njump?
2024-09-14 04:28:29
in reply to

Dr. Hax on Nostr: It works by storing your passwords and any other data you put in there encrypted ...

It works by storing your passwords and any other data you put in there encrypted (aes256-cbc) on the persistent storage. The device does not contain the secret key and there is no secure element, by design.

The device password is used to generate the key to decrypt the storage. https://gitlab.hax0rbana.org/signet/signet-base/-/blob/trunk/firmware/commands.c#L411

The password is hashed by scrypt to generate the key. https://gitlab.hax0rbana.org/signet/signet-client/-/blob/trunk/client/signetapplication.cpp#L213

As for has it been audited, well, yes and no. If your definition of an audit is that someone who did not write the code reviewed it for security, and this reviewer was experienced in cryptographic audits, then yes. If you mean, were they paid for their work, and did they write up a report, then no.

Also, I am the person who did the audit, because I wasn't going to trust the device without doing a code review first. So there's some bias here in me saying it's audited, but I didn't design or implement the code. I'm merely the maintainer of all software and firmware and the builder of hardware.

By not having a secure element that stores some secret, it means there's no secure element that needs to be audited (which is good because they're difficult to audit and nearly impossible to get access to in order to do the audit). It also makes it easier to backup & restore the device. The trade off here is that it means offline attacks are possible. If you chose a weak password, it'd be possible to brute force if someone got a backup of your device. So, yeah, a 6 digit PIN isn't going to cut it here.
Author Public Key
npub16v82nr4xt62nlydtj0mtxr49r6enc5r0sl2f7cq2zwdw7q92j5gs8meqha