Trezor Fault Injection Whitehack: Revision history

Jump to navigation Jump to search

Diff selection: Mark the radio buttons of the revisions to compare and hit enter or the button at the bottom.
Legend: (cur) = difference with latest revision, (prev) = difference with preceding revision, m = minor edit.

18 July 2023

7 May 2023

28 February 2023

28 January 2023

  • curprev 10:4010:40, 28 January 2023Azoundria talk contribs 11,290 bytes +11,290 Created page with "{{Imported Case Study|source=https://www.quadrigainitiative.com/casestudy/trezorfaultinjectionwhitehack.php}} thumb|TrezorEarly model Trezor hardware wallets were vulnerable to a fault injection attack, since they would put the PIN and key into RAM during the firmware update process. These wallets could be exploited if an adversary gained physical access to the wallet, since they could potentially trigger a firmware update and read the private key of..."