Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
Scoundreller
on May 15, 2023
|
parent
|
context
|
favorite
| on:
Case study: fake hardware cryptowallet
The method I’ve read about is to print “the request” onto a QR code, have the air-gapped machine scan it, sign it and print off the signed transaction QR to be scanned into the networked computer to propagate to the network.
A bit more to trust but a lot less to type.
polygamous_bat
on May 15, 2023
[–]
And then you get hacked anyway because the QR code generator was compromised and switched around a few bytes before creating the QR code.
Scoundreller
on May 15, 2023
|
parent
[–]
Ideally it’s a functionality of the wallet, but I think only bitcoin armory has this function.
Consider applying for YC's Summer 2026 batch! Applications are open till May 4
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search:
A bit more to trust but a lot less to type.