pull down to refresh

We recently celebrated the 10 year anniversary of the first BitBox and just launched the BitBox02 Nova, which finally makes it possible to use our open source hardware wallet on your iPhone and iPad.
Almost the entire team is here answering questions, so whether you have questions for anyone in particular, the engineering department or the entire team, just drop them in the comments and we will answer them starting at 4 CEST.
Picture of @Stadicus and @douglas as proof:
this territory is moderated
102 sats \ 9 replies \ @aljaz 19h
what do you think is the biggest issue with current state of self custody?
reply
224 sats \ 7 replies \ @Stadicus 16h
A big problem with self-custody is that there always remains one thing (like the backup) that gives full and immediate access to all your coins. This piece of information must be kept secure, but should also be easy to recover.
It's hard to keep the backup secure, and as long as users at home have immediate access to all their funds, that can make them targets for the $5-dollar-wrench-attack.
A few options that try to fix this:
  • Encrypting the backup --> not a good idea, as then you need a backup for your backup password. Makes inheritance hard, and basically creates a 2of2 scheme, where you lose either backup or password, your backup is useless. (The BitBox01 had an encrypted mSD).
  • Multisig --> still quite technical for normies and needs multiple signing devices and backup locations. Powerful, but UX should improve. Backup complexity (preserve xpubs etc) is quite high).
  • Bitcoin script solutions --> I have high hopes that we will see more "intelligent" bitcoin wallets soon, e.g. degrading multisig, timelocked backups, or other "not-instant" recovery paths that preserve full user sovereignty.
Not having instant access to your full stash should be normalized, so thieves can no longer assume that a "friendly visit" at home will pay off.
reply
What about Shamir Secret Sharing? It’s getting some tractions since we don’t expect to see covenants in the near future.
reply
10 sats \ 0 replies \ @Stadicus 11h
SSS is an interesting approach, and even a weaker redundant seed split (aka "poor man's" SSS) can help secure the backup.
A downside (e.g., compared to multisig) is, that it only secures your backup at rest. You still need to bring the full backup together and input it into the hww, creating a single point of failure. I'm more bullish on a simple multisig implementation, as this allows to sign a PSBT sequentially, geographically distributed, never all less in one place.
Probably more of an apples/oranges comparison, though... : -)
reply
0 sats \ 3 replies \ @aljaz 16h
Lack of encrypted backups is one of the biggest problems I have with BB02, I understand your reasoning for the default but you should have an option for advanced users because there are very legit use cases for it
reply
I appreciate your stance and understand that it can make sense in certain cases. For this, the optional passphrase can act as an indirect encryption, as it's never stored on the device itself or the microSD card backup. Or you just skip the microSD card backup and roll your own manual backup solution based on the recovery words.
Just an option being available might create doubt in users' minds that they should use it "just to be sure". We've seen that with the optional passphrase, which is horribel UX-wise and was our support issue #1 for a long time (now fixed by forcing users through a mini-education to make sure the concept is clear).
In the end, if you build a product for everyone, you build it for noone. We decided to focus on simplicity, and that involves not encrypting the microSD backup.
reply
0 sats \ 1 reply \ @aljaz 15h
the problem with passphrase is that its a permanent solution to a temporary problem like transporting the sd cards
the recovery words solution is even worse because its even more horrible for any kind of travel scenario
reply
I see, yes, for travelling with the backup (not just the hardware wallet) of a regular wallet, temporary encryption might be helpful.
The general lack of motivation to self custody. 90% of people get onboarded to bitcoin exchanges without ever taking self custody of their coins.
It's unfortunate but exchanges have an incentive to discourage self custody.
/Joko
reply
This looks like the most promising hardware signer to date, but I'm still suspicious of anything tailored for these purposes.
If a manufacturer is sophisticated enough to address the concerns of paranoid people like myself, then surely they're sophisticated enough to implement some kind of exfiltration? (Your address of klepto is excellent, but should also give people pause to think about the attacks they don't know about)
IIUC, there are still closed source chips on the board and the mitigation for that is published xrays and an industry certification? Have any 3rd parties done an EMC test?
How would you overcome the objection that obscurity is a last line of defense and that HWW's cary an inherent targeting risk?
Why do you suppose there's not a more general, industry-scale HSM, that supports Bitcoin transactions? Like if YubiKeys supported Bitcoin curves...
reply
117 sats \ 2 replies \ @Stadicus 15h
I think the gist of this question is a general mistrust in hww. This is totally fine, and we do a lot to address these questions. There are many different aspects to this.
A blog post of mine goes into the details of how we combine a secure chip (which we don't trust) with open-source firmware. It's more important to build a robust security architecture that can handle untrusted components (for example, they never learn any secrets) and avoid singe-points of failures.
Unfortunately, verifying hardware is much more complicated than verifying software. You can't run a checksum over hardware, and there's no "reproducible build" process. All you can do as a verifyer is physical spot checks.
This is why open-source firmware is so important. You can verify the "logic" of the device, how it works, what it does, and what it does not do. It also keeps us as a manufacturer accountable.
EMC tests are part of the FCC certifaction process, and of course the BitBox underwent these checks. But these are not security checks, and no amount of them will give assurance for every BitBox, as these are just spot-checks.
Again, open-source firmware helps. The best a malicious hardware chip that is not supposed to be there can do is try a side-channel attack, for example listening in on a wire, as there's provably no code or logic that would actively use this chip. So if the chips never learn any secrets, that's the best guarantee.
For ultimate protection, to completely eliminate any trust in a specific manufacturer, there's multi-vendor multi-sig. As multiple signers from multiple vendors are involved, all of them would need to collude to pull of a targeted attack. With open-source, that can't be done in secret, so it would be a "burn all bridges and run" attack. As publicly listed companies, this is not feasible.
reply
Thanks.
It seems to be an impossible challenge to obviate multi-vendor setups with the hardware supply chains that are currently available, but you're definitely raising the bar with these mitigations.
Keep up the good work.
reply
17 sats \ 0 replies \ @Stadicus 15h
Thanks, appreciate this! :)
reply
We always aim to reduce trust, however there is always some level of trust needed in the hardware wallet manufacturer. If you want to significantly reduce the trust needed in a particular company, then it is probably best to set up a multisig using hardware wallets from different companies. /Jad
reply
I'll leave the very specific questions to my colleagues, but to your question about 3rd party chips on the PCB:
Even though we have a closed source secure element and now a bluetooth chip, we do not trust these chips. The secure element does not store the private keys, it only stores one of the three secrets to decrypt the seed stored on the MCU. Of course the bluetooth chip never gets access to private key information and is only used for communication purposes.
/Joko
reply
28 sats \ 1 reply \ @Scoresby 21h
I love that BitBox supports miniscript. Do you have plans to expand to support MuSig2 or FROST?
reply
130 sats \ 0 replies \ @bitbox OP 16h
Right now there are no concrete plans to implement MuSig2 or FROST, but we are watching the space closely. Since we're a small team, we have to manage resources to work on features that a lot of our customers are asking for. If we see a lot of demand for MuSig2 or FROST - we will definitely prioritize it.
/Joko
reply
What was the need you created a Multi Edition (which includes shitcoins) for Bitbox?
reply
102 sats \ 0 replies \ @bitbox OP 16h
I and nearly everyone I know first bought a Ledger as our first hardware wallet. A lot of beginners don't feel comfortable buying a hardware wallet that's strictly limited to Bitcoin and we want to give them the opportunity to get an open source, easy to use hardware wallet.
The Multi supports only a handful of coins compared to our competitors. We haven't added new coins in a long time and are not planning more support right now. We only actively market the Bitcoin-Only edition and the share of Multi to Bitcoin-Only is continuously dropping over the years.
/Joko
reply
Hi! Our goal is to empower as many people as possible to get into the Bitcoin space by equipping them with tools that make it easy, safe, and comfortable. However, new people to the space usually haven't learned about what makes Bitcoin special and unique, and they like having "options". The Multi is thus kinda like a gateway drug into Bitcoin. Then we provide a lot of educational content through newsletters and our blog posts about what makes Bitcoin special. We're happy to often hear from original Multi customers, that they come back to us in a year or so and order a Bitcoin-only version.
reply
Nice job, guys! The stackers are in the loop, we’ve been sharing your blogs around here. 👀 #1011011
reply
Thank you!
reply
Appreciate it! :)
reply
0 sats \ 2 replies \ @OT 20h
When are you leaving Europe?
reply
57 sats \ 0 replies \ @Stadicus 16h
We're quite happy in Switzerland, which is a beautiful place in geographical Europe, but not part of the European Union. :)
reply
Considering that most of our employees are distributed all over Europe.. it will probably be a while lol
/Joko
reply
Shift Cryptosecurity AG filed for bankruptcy in 2020, yet BitBox branding and IP quickly re-emerged under Shift Crypto AG. Could you outline how the key assets were transferred, who set the valuation and how creditors were consulted or compensated during that process?
reply
100 sats \ 2 replies \ @bitbox OP 14h
Honey badger don't care
reply
0 sats \ 0 replies \ @anon 11h
A lame answer and could be one more post towards a "my trust in you is broken" moment :-/
reply
Honey badger’s cute, but 🦡 who paid the bill when the honey badger cave was emptied out?
same crew, new shell, old debts buried — did creditors ever see a single sat back?
reply
7 sats \ 5 replies \ @klk 19h
Why a BitBox instead of a SeedSigner?
reply
reply
7 sats \ 2 replies \ @klk 18h
Nice article! But the biggest advantage of a SeedSigner is not the airgapdpness (?) but the supply chain attack cost.
The problem with hardware wallets is that there is a required amount of trust in the supply chain and the tamper proof methods of the manufacturer. But how the hell can I know that you haven't gotten some tempered hardware yourselves on the first place or that an old employee hasn't kept some tamper proof bags for later use.
It's about trust and probability. But having a device built from generic hardware and without any possible way (storage, cable, wireless) of communicating the stolen keys in case of malicious code or hardware, gives you peace of mind.
What you give up is having your seed protected behind a security chip. But for HODL wallets that's fine. And allows you to create key QRs for you and loved ones for free.
reply
113 sats \ 0 replies \ @bitbox OP 17h
There are good ways to protect against malicious supply chains, like cryptographic tamper protection as we use: https://blog.bitbox.swiss/en/supply-chain-attacks/
For the issue that the BitBox could be compromised by a rogue employee, we have implemented Anti-Klepto, which prevents your seed from secretly being exfiltrated via signature nonces (also known as Dark-Skippy): https://blog.bitbox.swiss/en/how-almost-all-hardware-wallets-can-steal-your-seed/
With generic hardware, you're not solving this problem, but only moving it. Suddenly you don't have to worry about the hardware being malicious, but the code that you're flashing. Hardware wallets are made so you don't have to trust your host device, but if you're flashing your firmware from the host device to the generic hardware, that's where you're exposed to a potential attack surface.
/Joko
reply
Agreed, on all counts. I'm not associated with BitBox, I just remembered they had already posted their take on airgap and figured I'd share with you. Let's see what they have to tell you later on this too! Cheers.
reply
If you live in an oppressive state that surveils your entire purchase history, using a SeedSigner is probably a better choice than ordering a commercial hardware wallet.
In nearly all other cases, I think it's preferable to use a commercial hardware wallet like the BitBox02. You don't have to worry about a potentially tampered device, the user experience is far easier, you have physical protection and you get potentially better access to features like miniscript.
One other issue I see with singlesig seedsigner usage is that you have to store the seed somewhere and keep it accessible at the same time. So most users I've talked to keep the seed very close and not really in a secure location. You can easily keep a BitBox on your desk and not worry about anyone getting access to it, as it comes with a secure element.
/joko
reply
How long do you retain customer data, such as shipping information, after selling a device?
reply
Our blog post "How Shift Crypto protects your personal information" goes into more details, as data protection is quite a complex topic with many moving parts.
The most important duration in my view is the 30 days, after which we completely anonymize user data in our (self-hosted) online shop, actually overwriting the database fields.
reply
I could be wrong but I believe they retain such information data for ~30 days after order has been placed should there be any issues with shipping, to have it at hand and troubleshoot with carriers if necessary. After that, it gets encrypted and stored safely for however long the national laws in Switzerland specify. That's my understanding, not associated with BitBox myself, just vague recollections from similar questions (and answers.)
reply
This is correct. Swiss law requires holding accounting info (e.g. invoices) for 10 years. This is done in encrypted archive storage that is not accessible by third-parties.
reply
Pre-Nova Bitbox devices ie BitBox02 will not work with iOS, is that correct? Were any security or privacy compromises made in Nova in order to support it?
reply
We really tried to make this possible. Unfortunately Apples restrictive USB policy does not allow BitBox02 users to connect to their iPhones. The new hardware of the Nova was needed to circumvent these USB policies from Apple.
Submitting to the policies of the "Made For iPhone" program would have resulted in potential security and privacy compromises that we were not willing to make. With Bluetooth in the form of Whisper, we have found a secure and private way to make the BitBox02 Nova usable on iPhone without compromising our values.
Using twice encrypted Bluetooth also has the benefit of being able to keep supporting security measures like the Anti-Klepto protocol or authenticity check - something that is much harder to do with other ways to circumvent the USB policies of Apple.
/Joko
reply
Correct. Nova has the new isolated bluetooth chip that makes it work with iOS and iPad, as Apple is restrictive of the gadgets you can physically connect to your phone or tablet and work with, bluetooth via the whisper implementation was the way, so you'd need a Nova to have it working on Apple products. No compromises as the new bluetooth chip is isolated from the secure element and double-chip set up within the BitBox02. Find out more on this here.
reply
7 sats \ 2 replies \ @ek 21h
What was the most surprisingly hard problem you encountered while building BitBox?
reply
From a product management perspective (not the actual chip-level programming), it's important to always get user feedback and build something that is really easy to use.
Making secure hardware simple might be the real challenge.
reply
It is probably different for different people, but the hardest problems for me have been picking a name! There are no right answers :)
Technically for the BitBox02, it was actually figuring out the cardboard packaging - more than expected design considerations & iterations and production times.
reply
Time pass rapidly and evolution are still increasing gradually congrats!
reply
Thanks, glad to hear! While the BitBox02 has come out in 2019, it is still going strong and the hardware is basically unchanged. The new BitBox02 Nova is an evolution, especially for iPhone users and we'll keep building out both version in parallel.
0 sats \ 1 reply \ @anon 12h
If I add a passphrase on top of seed phrase does my xpub change as well? Is there any chance that someone can access my wallet knowing the public key for example brut force it?
reply
If you use a passphrase, you get into a completely new wallet. So yes, your xpubs will change.
No, you can't access someone's wallet by knowing their public key!
reply
Is it possible to import or sweep private keys? From old paperwallets for example.
reply
Not currently possible unfortunately as this would require manually entering a private key on the device (which is not good UX and would require a firmware update to support such a feature). For now, users will need to sweep with a software wallet (like Bluewallet, Sparrow etc.) for and then send to their BitBox wallet, but of course you need to trust the software wallet. But something that would be interesting to look into in the future. /Jad
reply
Are you proud of Libbtc library and does it feel good to have created another product in the Bitcoin space?
reply
0 sats \ 1 reply \ @Stadicus 16h
We are proud to contribute to the Bitcoin open-source infrastructure in general, and have done so many times over the years contributing to BIPs or cryptographic libraries (eg. with anti-klepto).
The LIBBTC library I actually had to look up... :) It was created by our original co-founder Jonas Schnelli 10 years ago, and I think we used it in the BitBox01. Not quite sure yet, as that was before my time.
reply
0 sats \ 0 replies \ @anon 10h
Is Jonas Schnelli still affiliated with Bitbox? What happend that he steped down as a Bitcoin Core maintainer, mentioning legal risks. Did this lead to the bankruptcy of your predecessor company Shift Cryptosecurity AG?
reply
When airgapped signatures for txs?
reply
I know this is still an unpopular opinion, but airgap in itself does not really add to security. On the contrary: more secure protection protocols (like "anti-klepto") are so complicated on airgap wallets, that they are simply ignored and downplayed. In this sense, "airgap" is mostly a marketing term, without much substanse. We wrote an extensive blog post (fact-based, with sources) on this for further reading: https://blog.bitbox.swiss/en/does-airgap-make-bitcoin-hardware-wallets-more-secure/
For easy integration into 3rd-party wallets, however, "airgap" communication like QR codes, PSBTs via microSD cards or NFC is great. We currently don't have any plans for this with the current BitBox02, however. Although the microSD card would be a natural fit to "load" a PSBT, we fear that users would mix up their backup mSD card and put it into an online device.
I'm curious to hear more about the motivation behind the question: security, wallet integration, or something else?
As @Stadicus already answered on the security aspects, I would like to add that I feel like air gapping adds unnecessary friction to self custody.
Passing back and forth microSD cards or even scanning QR codes, charging batteries and focusing most of the user experience on a low performance, hard to use device makes self custody tougher to use for the average person, in my opinion.
/Joko
reply
Not for everybody, but having this extra feature would be nice for some users.
reply
What is something that gives Bitbox an upper edge over other HWW products?
reply
0 sats \ 1 reply \ @Stadicus 16h
I assume that all reputable HWW (e.g., long trackk record, have a screen, fully interoperable for recovery) are secure and better choice than relying on a third party.
What we at BitBox heavily focus on is ease-of-use. I don't think that security has to be complicated, on the contrary: simplicity is part of security, as it helps avoid human errors.
The BitBox is the simples hardware wallet that "just works" with all devices (now also on iPhone/iPads) that you can give to friends and family. We build products for the next million newcomers to the space, while still making sure essential expert functions (full node support, Tor connectivity, 3rd-party wallet integrations, coin control) are available for those that need them.
reply
In addition, a lot of people also like how discrete it is, i.e. "stealth by design" to avoid unnecessary attention. There are no labels except a small graphical logo and no visible buttons or screen (until you plug it in) such that it looks like a simple flash drive.
Fully open-source and Swiss-made are other important factors.
reply
Is it possible to chek if my bitbox has been manipulated? How can i trust a hww in times of suppy chain attacks?
reply
Yes! We have a blog post on this topic:
Besides tamper-evident packaging, the better way is via the device authenticity check. Briefly, each BitBox02 has a unique key on its secure chip, that is generated and signed during factory installation.
The BitBox App automatically verifies authenticity using a challenge-response process to this key. If the device fails to prove it's genuine, a clear warning is shown to the user.
reply
It is. They come in vacuum sealed, tamper-proof like transparent plastic bags, you'd know 100% if it's been ripped apart or looks different from original, as it has some watermarked logos across and well, it's vacuum sealed, if you open it somehow in transit, recipient will be able to tell, unless scammer comes up with a replica and repacks. Visit their threat model section on site, click on Supply chain attacks in the table of contents. Further information on there!
reply
0 sats \ 1 reply \ @tuma 20h
What are the next steps you are planning as a company? Any details you would like to share?
reply
We just launched the BitBox02 Nova with iOS support and updated hardware just two weeks ago and currently it's all hands on deck to ship the first devices. In the beginning, quality assurance is much more effort, and we're looking up to scale up production as soon as possible.
Maybe we'll need to recover a bit after that, before we start working on the next big thing... :)
reply
Lol ama don't answer anyone 🤣🤣🤣
reply
"we will answer them starting at 4 CEST."
reply
0 sats \ 1 reply \ @anon 20h
Ist ein Passwortschutz für die BitBox Desktop Software vorgesehen? LG Corrado
reply
The BitBoxApp already has password or PIN protection on mobile devices, as we can use the system libraries. Implementing password protection on desktop systems (Windows, macOS, Linux) needs more groundwork and also involves encrypting all data-at-rest. It's on our todo list, but not not actively worked on just yet.
reply
Do you have a hardware wallet where I can safely store my Paper Bitcoin from all these fine new Bitcoin treasury cos? Asking for my diversified imaginary portfolio.
reply
The path we usually recommend is to start your own Bitcoin Treasury, get one (or more) BitBox hardware wallets to to keep your valuable stack safe, and then make a big media splash for what is basically common sense. Maybe also get a nice steelwallet, just to be sure? :)
reply
Have you considered going seedless like Bitkey, why or why not?
0 sats \ 1 reply \ @ek 21h
Any opcode you're looking forward to?
reply
We're not actively pushing for any specific opcodes, but are open to use new scripting techniques when this involves improving the user experience, e.g. with better backup security, degrading multisig setups, etc.
The BitBox firmware is very restrictive, however, and opcodes need to be enabled when we deem them secure. Blind signing can be a problem (where the device itself is not able to sanitized the data).
reply
Love builders
reply
We build even in bull markets! :)
reply