Explore a comprehensive analysis of security vulnerabilities in popular cryptocurrency hardware wallets in this conference talk from the 35th Chaos Communication Congress. Delve into architectural, physical, hardware, software, and firmware vulnerabilities that could potentially allow malicious attackers to access wallet funds. Examine various attack vectors, including breaking proprietary bootloader protection, exploiting web interfaces, and performing physical attacks like glitching to bypass security measures. Gain insights into recurring issues across multiple wallets and learn about necessary changes to build more resilient hardware wallets. Witness live demonstrations of some of the most intriguing vulnerabilities on stage. Cover different classes of vulnerabilities, including firmware, software, hardware, physical, and architectural issues, along with their potential for mitigation or long-term impact on wallet security. Understand the challenges of building secure hardware and the implications for cryptocurrency storage and trading.
Read more