Coauthored byLixin LiuandPatrick Kim
刘立新和帕特里克·金合着
This article was written before the launch of oursecond-generation hardware wallets, which we are striving to make as open source as possible for the mass market. Our first-generation Cobo Vault Ultimate had a more specialized design targeted at institutional investors, who have an interest in using closed source hardware under service agreements with liability insurance. For our first generation, we believed the risks of opening the door to hackers outweighed the potential benefits of attracting developers to contribute to making our product more robust.
本文是在第二代硬件钱包发布之前撰写的他们对根据责任保险与服务协议使用封闭源硬件感兴趣。 对于我们的第一代人来说我们相信向黑客敞开大门的风险远胜于吸引开发人员为使我们的产品更强大做出贡献的潜在好处。
As passionate advocates of open source software, we have deep respect for pioneering developers who made their work available to the world, and it goes without saying that we in the cryptocurrency field owe much to the originators of blockchain technology. It is because Satoshi Nakamoto and other great trailblazers made their work open source that we are all able to share in the benefits brought by amazing innovations such as Linux, Bitcoin, and the booming cryptocurrency market.
作为开源软件的热情拥护者不用说我们所有人都能分享Linux比特币和蓬勃发展的加密货币市场等惊人创新所带来的收益。
However, when it comes to the question of whether making source code available is beneficial for the security of hardware wallets, we enter into a wholly new discussion. This article explains our reasons why we believe the nature of open source does not represent an upgrade for hardware wallets, but rather a significant security compromise.
但是我们进入了一个全新的讨论。 本文解释了我们为什么认为开放源代码的本质并不代表硬件钱包的升级而是重大的安全性折衷的原因。
In traditional fields of computing, supporters of open source have consistently emphasized one point — open source is safer because it enables the public to inspect source code and contribute to security by helping fix potential loopholes. Linus’s law is clearly illustrated by the statistic that a zero-day attack on Safari, a closed source, takes an average 9 days to fix, while a zero-day attack on Firefox, an open source, on average only takes a single day to fix.
在传统的计算领域中因为它使公众能够检查源代码并通过帮助修复潜在漏洞来为安全做出贡献。 统计数据清楚地说明了Linus的定律(“给了足够多的眼球对Safari的零日攻击(封闭源)平均需要9天的修复时间一个开放源代码平均只需要一天的时间就可以解决。
However, Linus’s law must be understood in context, namely that of traditional computing fields. When discussing the advantages of open source software in terms of hardware wallets, we must be mindful of the fact that the traditional computing development community is immense compared to that of hardware wallets.
但是即传统计算领域的定律。 在讨论开源软件在硬件钱包方面的优势时即与硬件钱包相比传统的计算开发社区规模巨大。
GitHub, the world’s largest host of source code, indicates that there are only around 180 contributors to the open source code of the oldest hardware wallet brand, Trezor. This statistic stands in sharp contrast with the communities of other hardware products such as the Raspberry Pi, whose contributors to its open source firmware number around 9,500.
GitHub是全球最大的源代码托管者Raspberry Pi为其开源固件数量大约为9,500做出了贡献。
No project, no matter how big, is entirely immune to the potential dangers of exposing its code. Take for example Linux Mint, which washacked in 2016. Although that backdoor issue was fixed within a day, the rapid response time was in no small part due to the size of the Linux open source community.
无论项目多大它在2016年被黑客入侵。 尽管该后门问题在一天内得到解决快速响应时间在很大程度上不容小small。
In the context of our relatively small development community, we need to be especially wary of the fact that sharing source code is a double-edged sword. For hardware wallets, the unfortunate truth is that releasing source code makes it easier for hackers to detect loopholes and carry out attacks. Open source code can even open the door for cybercriminals to produce counterfeit hardware wallets capable of deceiving consumers — a security threat Trezor has alreadybeen the victim of.
在我们的开发社区相对较小的情况下不幸的事实是以生产能够欺骗消费者的假冒硬件钱包-Trezor已经成为安全威胁。
An aspect of security hardware wallet owners need to be keenly aware of iszero-day attacks. In zero-day attacks, the period of time between when a previously unknown vulnerability is exposed or announced and when it is fixed presents a perfect window of opportunity for a hacker to carry out an attack. Because vulnerabilities in hardware wallets are often resolved through firmware upgrades, it usually takes a while after official security patches have been released for users to actually install them and fix the issue. With some users who, after having set up their hardware wallet, don’t open it for months or even years, exposure to zero-day attacks is dramatically increased. Perhaps counterintuitively for those experienced with open source software development, a black box, or device with a closed source code, is more secure than a white box with an open source code.
安全硬件钱包所有者需要敏锐地意识到零日攻击。 在零日攻击中因此通常需要一段时间才能发布正式的安全补丁遭受零日攻击的风险急剧增加。 对于具有开放源代码软件开发经验的人来说黑匣子或具有封闭源代码的设备比具有开放源代码的白箱更安全。
While it is tempting to fall back on our knowledge and appreciation of Bitcoin as a prime example of the security offered by open source code, to assume that all blockchain projects should follow suit and become open source is a logical leap. The security Bitcoin enjoys from its open source development community is a direct result of the scale of its community involvement. Whether it is source code or mining functions, the Bitcoin community has gotten involved in maintaining and protecting the project, with larger numbers of involvement correlating to more secure functionality. However, because there are comparatively so few developers currently involved in hardware wallet security, we can make no assumptions about the benefits of sharing source code carrying over to this space.
虽然倾向于依靠我们对比特币的了解和欣赏作为开放源代码提供的安全性的主要示例比特币社区都已参与维护和保护项目由于目前涉及硬件钱包安全性的开发人员相对较少因此我们无法假设共享源代码到此空间的好处。
Apart from vastly increasing the number of reviewers inspecting code, another benefit of open source development in traditional computing fields is enabling anyone to download, install, burn, debug, or even remove certain aspects of the source code themselves.
除了大量增加检查代码的审阅者之外任何人都可以自己下载刻录调试甚至删除源代码的某些方面。
The security that comes with this level of autonomy is reliant on a foundation of specific technologies. However, even with a solid technological base, there is always the potential for security measures to be outdone. Those in computing fields will be familiar with how theKen Thompson Hack (KTH)created a backdoor in the C compiler than can conceivably monitor or place controls on any software program in the world. You would have to write your own compiler using binary code or use tools compiled before KTH was installed in order to overcome this security compromise. KTH demonstrates that any system compiled from a source code is always going to be vulnerable to attack.
这种自治级别带来的安全性取决于特定技术的基础。 但是安全措施也总是有可能被淘汰。 计算领域的技术人员会熟悉Ken Thompson Hack(KTH)如何在C编译器中创建后门或者使用在安装KTH之前已编译的工具从源代码编译的任何系统始终容易受到攻击。
What OGs like Ken Thompson teach us is that unless you are able to write your own compiler , you’re going to have to put your trust in a third-party. In-depth issues such as having to write your own compiler aside, the majority of hardware wallet users won’t even get their feet wet burning or debugging source code. For this cohort of users, knowing their hardware wallet is open source is more of a psychological comfort than a condition that actually amounts to a measurable improvement in their wallet’s security.
In traditional fields of computing, it helps to think of the security brought by open source software as enabling a kind of “audit” on the source code. While the same is not yet true of cold storage cryptocurrency security, what can instead be substituted as a reliable source of “audit” for hardware wallets?
在传统的计算领域但是可以替代什么作为硬件钱包“可靠”的可靠来源
Fortunately, signed transaction outputs are not nearly as complicated as the outputs of other types of software. If making source code available is not the most secure option of providing ways to audit hardware wallets, we can instead consider scrutinizing their transaction signing outputs.
幸运的是我们可以考虑仔细检查其交易签名输出。
People purchase hardware wallets because they know the most secure way to store their private keys is to take them offline into cold storage. All hardware wallet services need a means of communicating between offline storage and online terminals. While the cold end is responsible for storing private keys and signing transactions, a hot end is needed to obtain data from the blockchain, construct transactions for the cold storage end to sign, and broadcast signed transactions to the blockchain.
人们购买硬件钱包是因为他们知道存储私钥最安全的方法是将其离线放入冷存储器。 所有硬件钱包服务都需要一种在离线存储和在线终端之间进行通信的方式。 冷端(离线存储)负责存储私钥和签署交易构造用于冷存储端进行签名的交易并将签名的交易广播到区块链
In transmitting signature outputs, the majority of cold storage hardware uses data cables, Bluetooth, or even NFC. Because of the opacity of their data transmission, these methods make signature outputs extremely difficult to audit. An overlooked means of cold storage hardware communication is the QR code, a “what you see is what you get” solution. We believe the QR code is the ideal means of data transmission between cold ends and hot ends because data output by QR codes is transparent. This enables users to easily ensure each unsigned transaction that is transmitted to the cold storage device is valid, as well as ensure signature outputs from the cold end do not reveal private keys or sensitive information in any way.
在传输签名输出时蓝牙甚至NFC。 由于其数据传输的不透明性这是一种“所见即所得”的解决方案。 我们认为QR码是在冷端和热端之间进行数据传输的理想方式并确保来自冷端的签名输出不会以任何方式泄露私钥或敏感信息。
Our article onCobo Vault inputs and outputsoffers detailed instructions on how QR code signature transmissions can be “audited.”
我们有关Cobo Vault输入和输出的文章提供了有关如何“审核” QR码签名传输的详细说明。
While Cobo Vault believes that open source does not have much meaning for enhancing the security of hardware wallets, we have still released thefirmware codefor the Cobo Vault’s Secure Element. In doing so, we enable our users to see that random numbers are generated by a true random number generator and not by a pseudorandom number generator . For a detailed explanation of the importance of random numbers, refer to ourarticleon difference between true random numbers and pseudorandom numbers.
尽管Cobo Vault认为开放源代码对于增强硬件钱包的安全性没有多大意义但我们仍然发布了Cobo Vault安全元素的固件代码。 这样而不是由伪随机数生成器生成的。 有关随机数重要性的详细说明请参阅有关真正随机数和伪随机数之间差异的文章。
宋晓峰:没想到来了这么多诗词爱好者,没问题,啊,锄禾日当午,农民工好辛苦,手拿大铁锹,一挖一身土。哎呀,哎呀我去,这是谁的钱包呢?这里边钱不少呢,我现在正愁我女儿上幼儿园没有学费呢,不行啊,要做一个拾金不昧的人,我还是在这等失主吧,哎呀,不由得诗兴大发呀,我还想。宋晓峰:啊,别看哥们没上过学,但是哥们素质高,等着失主领钱包,彰显农民工的高尚情操。唉我的妈呀,肚子还疼了呢,我得上趟卫生间,不行啊,你说我要是上卫生间了,失主来找钱包,找不着可咋整,放这吧,还是不行啊,你说这钱包要是让别人捡去那可咋整啊,哎呦,
众所周知,目前手机已经成了我们生活中不可或缺的一部分,日常通信、社交、娱乐、支付都离不开它。但这些功能,并不是自然而然实现的,而是众多手机厂商、APP共同努力的结果。下面我们就以OPPO手机为例,来了解一下手机是如何变成公交卡、门禁卡以及钱包的。据了解,OPPO手机之所以有如此多的功能,主要得益于“OPPO钱包”这一APP,它是由OPPO与欢太数科合作运营。依托于欢太数科先进的手机终端及NFC技术,OPPO钱包已支持OPPO Pay、手机公交卡、手机门禁卡、手机车钥匙、eID等功能。
不能提现。据饿了么官网得知,饿了么钱包充值100送18的现金在钱包里不能提现,只能通过点外卖花掉。“饿了么”是2008年创立的本地生活平台,主营在线外卖、新零售、即时配送和餐饮供应链等业务。饿了么充值100送18怎么用 再加上是合租的形式厨房基本没办法用,乱七八糟的,所以懒得出去的时候就会掉眼泪,饿了么上面还有一个充值的优惠活动,就是充100块钱送18块钱。
我昨晚做了一个梦,梦见和朋友开车去旅行,然后车顶没了,车子里的东西都被风吹走了,然后进了山洞,出来之后,发现自己身上的包包也不见了,还找不到路了,这是什么意思呢?1、梦见自己丢了东西 :比如钱包、工具、甚至身份证、银行卡、钥匙……有的时候是害怕一种精神上的损失 ,比如说失恋,这也是失。有个姑娘经常梦见的包包找不见了,找不到了。原来是她之前的两次恋爱都是被男人抛弃,她在现在的爱情中,非常担心现任会提出分手的要求,她怕被分手、怕失去这段感情,就经常梦见丢失包包。因为包包是女人的最爱,而且是抓在手中的东西,找不
步骤27:拿一张2*10厘米的长方形纸宽度对折好。大家好,今天我教大家折一个非常好用的大容量夹层钱包。而且还可以随身携带非常方便好用。这个钱包美观大气是女孩们的最爱,有了它你就再也不用花钱去买了。 现在就让我们一起来学习夹层钱包的详细步骤教程图解吧。步骤1:我们先拿一张15厘米的正方形纸左右四等分折出虚线。四等分的方法是非常简单的,一看应该就会。
钱包的地位如此重要,那么如何选择聚财钱包,并且什么颜色的钱包才好,您知道吗?不管是通过纳音计算,还是三元命理,如同五行生克关系一样,要让钱包生自己最好。您总看我们发的每日穿衣指南,不知道您看出点门道没有?其实那很简单,只要看看黄历,知道今天是什么日子,就立马明白应该穿什么颜色的衣服。比如说,今天黄历是丁亥,亥为水,水为黑色,那么五行中水生什么呢?水生木,木是什么颜色?木是绿色,那么您穿绿色的就最为吉祥,办事成功率就高,同样穿黑色的叫比和,也可以;但绝对不能穿白色的,因为白色为金,金克木。选择钱包也是一样,
在这个看“脸”的时代,优良的门头招牌设计,能为店铺吸引来不少顾客,而且可以为店铺的形象塑造一个完善的形象,提升店铺的档次。很喜欢一句话:我们城市的每块招牌,都在为街道写诗。店招不仅仅是作为装饰,更像是城市中的一道建筑。城市各色的招牌形成了一道靓丽的风景线,为这个城市增添了新的活力,成为了城市的新景观。
十字绣是用绣线和十字格布,利用经纬交织的搭十字方法,对照专用的坐标图案进行刺绣的方法。一般我们玩十字绣都是绣一些漂亮的图案,而下面这个教程要带我们做一个可爱的长方形钱包~第一步:按图纸画出钱包各部分的尺寸。6、一个简单的十字绣钱包就做好了!第二步:剪裁面料,按照图纸分别绣出来。按照下面图纸裁剪面料:面料有方向性,请注意裁剪及绣的时候方向要统一,按照格子裁剪(建议按照本图裁剪,以免造成面料不足或者方向不对,面料的格子有时难免不正,可用手拉正后再缝合)。
今天就来和大家一起画包……要说一个女人有多少包。逛街时的时尚包、化妆包、钱包。大包、小包、夹包、箱包。赶快拿起笔画一画吧!一般会有上班时的工作包。双肩包、单肩包、斜挎包、手提包等等 每换一套衣服搭配一个包。需要时买包,不需要时逛着看包。那真的是得细细数来。完成!不要光看不动手哦。
步骤1:我们先拿一张15厘米的正方形纸左右四等分折出虚线。四等分的方法是非常简单的,一看应该就会。大家好,今天我教大家折一个非常好用的大容量夹层钱包。而且还可以随身携带非常方便好用。这个钱包美观大气是女孩们的最爱,有了它你就再也不用花钱去买了。 现在就让我们一起来学习夹层钱包的详细步骤教程图解吧。步骤27:拿一张2*10厘米的长方形纸宽度对折好。
1. 云南公投网点办理的:请到各网点充值,面额必须是100的倍数。可现金或者刷卡。 2. 建设银行办理的:到各网点充值,面额必须是100的倍数,现金或者刷卡。与银行信用卡绑... 1. 云南公投网点办理的:请到各网点充值,面额必须是100的倍数。可现金或者刷卡。 2. 建设银行办理的:到各网点充值,面额必须是100的倍数,现金或者刷卡。
gopay钱包在中国合法吗?首先,我们需要明确的是,gopay钱包在中国是依法合规运营的。早在2017年,中国人民银行就发布了《关于依法合规开展第三方支付业务的通知》,明确规定了第三方支付机构需要经过严格审批和监管,获得合法牌照方可开展业务。gopay钱包是一家经过审批,并取得支付业务许可证的第三方支付机构,因此在中国是合法合规运营的。
可以通过OPPO钱包APP存储公交卡。因为OPPO R17内置自带的NFC芯片,可以支持NFC快速支付,而OPPO钱包APP支持存储各种类型的公交卡。只需打开APP,选择“添加公交卡”,根据... 可以通过OPPO钱包APP存储公交卡。因为OPPO R17内置自带的NFC芯片,可以支持NFC快速支付,而OPPO钱包APP支持存储各种类型的公交卡。
送钱包的祝福语简短 9.祝你钱包里财运旺,福禄两旺幸福家;10.祝你钱包里财源滚滚,财运亨通,福禄寿全。1.祝你新钱包里一路发,财源滚滚进你家;2.祝你钱包里财源滚滚,红红财运进你家;3.祝你钱包里财源滚滚,财运亨通永不断;4.祝你钱包里财源滚滚,家里财源滚滚来;5.祝你钱包里钞票滚滚,家庭财源永不断;