• ryannathans
      link
      fedilink
      arrow-up
      3
      ·
      8 months ago

      If you set a small pin, perhaps. Most people set a password

          • jet@hackertalks.com
            link
            fedilink
            English
            arrow-up
            1
            ·
            8 months ago

            For the people who really care, they can disable The pin. I believe the client will generate a BIP 38 password randomly, and use that for the data encrypted in the SVR. But all the data is still uploaded to the cloud. So if there’s a problem with the SVR encoding, the BIP 38 password generation etc the data is still exploited

            Not only do you have to care, everyone you talk to has to do the same thing, because if your counterparty has their key in the cloud, the conversation is at risk.

              • jet@hackertalks.com
                link
                fedilink
                English
                arrow-up
                1
                ·
                edit-2
                8 months ago

                All the bits to reconstruct the master key minus the pin code are uploaded. So it’s equivalent to uploading to the cloud The master key itself.

                Very few people are using BIP 38 level passwords. So the vast majority of people have their key constructively uploaded fully in the cloud