I’d love to see a video of the process when using. I previously had the chance to inspect the physical device and it felt very premium in the hand.
I will need to re-read this to fully digest. My first thoughts are:
(1) Could this be “hacked” between the server and end user in a similar fashion as you outlined with other methods.
(2) What risks are there to the end user if the server itself is hacked?
Login to reply
Replies (1)
Great questions.
On (1): the phone can't modify information signed by the hardware, it just forwards it to the server. Bitkey hardware ships with a key (not the one used for signing transactions) that can be used to sign messages and which Bitkey servers can verify. If a compromised phone attempts to modify what the hardware has signed, the server would know they've been tampered with and would be able to surface that to the user via a channel like email.
On (2): if the Bitkey servers that communicate the addresses or transaction details to you in the proposed solution were compromised, what they show/send you wouldn't match your phone's screen.