The Trezor Hardware Wallet Vulnerabilities

Published: March 16, 2019, 5:04 p.m.

In this episode we have a chat with Alan Salamun the CTO of Real Security a company specialising in cyber-security. Alan is not only a cyber security expert for over 20 years but is also part of the team behind the BC Vault, one of the best Hardware Wallets currently in the market for storing your Cryptocurrencies. So as an expert in the field of cyber security and Cryptocurrency Hardware wallets, we had a chat on the latest security vulnerabilities in the Trezor Hardware wallets, revealed by Ledger a few days ago. So do you need to worry? Is your Crypto safe on a Trezor Hardware Wallet?

\n


\n

0:00 - Ledger reveals the Vulnerabilities of the Trezor Hardware Wallet 

\n


\n

1:20 - Were Ledger and Trezor working together in identifying these vulnerabilities?

\n


\n

2:30 - Vulnerability Supply Chain Attack

\n


\n

3:45 - Cloned Trezor Hardware Wallets from China

\n


\n

4:45 - Vulnerability Software Crappy Attack

\n


\n

8:15 - Vulnerability Side Channel Attack Pin

\n


\n

12:50 - Vulnerability Side Channel Attack Scalar Multiplication

\n


\n

14:50 - Vulnerability Surprise Concluding Attack

\n


\n

21:40 - Ledger's Chrome Plugin Vulnerability

\n


\n

23:30 - Trezor Reciprocates Ledger's Love?

\n


\n

24:40 - Ledger Nano X, Bluetooth and it's Vulnerabilities

\n


\n

You can listen to our Podcast Show on any major Podcast platform including Apple Podcasts & Spotify. If you want to support the channel, just click 'Subscribe,' that way we can grow and bring you even better content in the future!
\n

\n


\n

BC Vault: www.bc-vault.com
\nOur Site: www.cryptoauthority.co.uk
\nOur Twitter: twitter.com/cryptoauthorit
\nBC Vault Twitter: https://twitter.com/bc_vault

\n