Trezor news-Page 2
Trezor removes controversial address verification protocol, other wallets follow suit
Since 2019, Swiss financial crypto intermediaries have required proof of ownership of an external wallet's address for Bitcoin withdrawals and deposits to their customers' non-custodial wallets. One automated mechanism used for this is the Address Ownership Proof Protocol, or AOPP. The Trezor hardware wallet introduced AOPP singing as part of its latest January update last week, allowing users to generate signatures that conform to the AOPP standard used in certain jurisdictions. Today, Trezor announced that it will remove this protocol in the next Trezor Suite update "after careful consideration of recent feedback." Recent feedback refers to Reddit and Twitter users …
Bitcoin / Jan. 28, 2022
Engineer hacks Trezor wallet, recovers $2M in 'lost' crypto
A computer engineer and hardware hacker has revealed how he managed to crack a Trezor One hardware wallet containing more than $2 million in funds. Joe Grand — who is based in Portland also known by his hacker alias “Kingpin" — uploaded a Youtube video explaining how he pulled off the ingenious hack. After deciding to cash out an original investment of roughly $50,000 in Theta in 2018, Dan Reich, a NYC based entrepreneur, and his friend, realized that they had lost the security PIN to the Trezor One the tokens were stored on. After unsuccessfully trying to guess the …
Blockchain / Jan. 26, 2022
With its own public offering, wallet maker focuses on easy-to-use stock sales
JP Richardson’s favorite phrase is “easy to use.” Well, maybe not, but the Exodus CEO certainly used it enough during a live ask-me-anything session that the cryptocurrency wallet maker held on Cointelegraph’s YouTube page. While the focus of the livestream was the $75 million public offering of stock that Exodus Movement has hosted — and nearly completed — inside its own Exodus Wallet, Richardson reinforced this idea regularly throughout the broadcast. “I think what a lot of people, first of all, really love about Exodus is the ease of use and how beautiful it is,” Richardson said when asked what …
Technology / May 5, 2021
iPhone user blames Apple for $600K Bitcoin theft via fake app
A scam cryptocurrency app on Apple’s app distribution service App Store has reportedly stolen $600,000 Bitcoin (BTC) from one iOS user. Cryptocurrency holder Phillipe Christodoulou fell victim to a scam app on the App Store, losing nearly all his life savings to a fake crypto wallet application, The Washington Post reports Tuesday. Christodoulou went on the App Store last month to search for a mobile Trezor app to check his Bitcoin balance via phone. Unaware that Trezor does not currently provide an iOS app, Christodoulou downloaded a doppelgänger Trezor application that boasted close to five stars, giving the impression that …
Bitcoin / March 31, 2021
How to get Bitcoin in under five minutes… and actually own it
Two Trezor executives have taken part in a live ask-me-anything session on Cointelegraph — revealing how their suite of crypto hardware wallets are set to evolve in the future. Head of development Tomas Susanka and head of product Matej Zak said one of their biggest priorities is ensuring that technical hurdles are removed for Bitcoin beginners — meaning that it’s never been easier to keep digital assets safe. During the broadcast, they proudly showed off the Model T, which supports more than 1,000 cryptocurrencies. An intuitive touch screen offers an interface that’s not dissimilar to a mobile phone — offering …
Adoption / March 30, 2021
How to protect your crypto for generations to come
With the value of major cryptocurrencies surging in recent months, knowing how to keep private keys safe has never been more important. We’ve all seen the horror stories that arise when all-important recovery seeds are lost, destroyed or inaccessible — or worse, stolen by a malicious actor. The consequences can be devastating, with life savings lost in the blink of an eye. But Trezor says it doesn’t have to be this way, and has come up with a novel way of protecting crypto for years to come… with safeguards in place that reduce the likelihood of security being compromised by …
Blockchain / March 4, 2021
Simple in practice: Crypto education is key to curbing phishing scams
As the global crypto economy continues to prosper, with Bitcoin (BTC) currently occupying the $15,500 region, questions regarding the overall safety and security of digital assets continue to persist, especially in the wake of a new scam whereby hackers made use of a phishing email to direct users to a fake Ledger website. According to various reports, victims were scammed to the tune of 1,150,000 XRP, worth approximately $290,000. Dave Jevans, CEO of blockchain intelligence firm CipherTrace and chairman of Anti-Phishing Working Group, told Cointelegraph, “Ledger should clearly have a more aggressive defensive domain acquisition strategy, as look-alike domains were …
Technology / Nov. 11, 2020
Trezor claims new “phishing proof” desktop wallet
Crypto wallet provider Trezor has launched a new desktop app called Trezor Suite for its hardware wallet. According to an Oct. 14 blog post, Trezor's parent company Satoshi Labs claimed its desktop app provides “more robust protection” than its browser-based wallet, and said they have eliminated the risk of phishing attacks that often target crypto users. “People have the right to privacy and security online but few know how to achieve it,” stated the Trezor blog. “Using Trezor Suite should help everyone take full advantage of Bitcoin more easily and open the door to a more privacy-aware, crypto-competent, and self-sovereign …
Business / Oct. 14, 2020
It’s been 4 months & KeepKey’s hardware is still vulnerable to remote ransom attacks
A Shift Crypto employee successfully deployed a ransom attack on Trezor and KeepKey hardware wallets last May. While Trezor released a fix on September 2, KeepKey has yet to fix the issue. According to a blog post published on September 2, the vulnerability affected all cryptocurrencies on affected devices. The exploit, which was first spotted on April 15 by developers Shift Crypto, also affected KeepKey wallets — which were originally based on a fork of Trezor’s code and likely operate on similar foundations. When asked about the vulnerability, a KeepKey representative apparently commented that a fix had not yet been …
Technology / Sept. 3, 2020
Trezor Takes a Shot at Ledger After the Hack
Following Ledger's confirmed data breach on June 17, competing hardware wallet manufacturer Trezor cheekily made their followers aware that they frequently purge their systems of all customer order data, including email addresses — apparently every 90 days. Trezor also added a coupon in its tweet that offers 10% discount in its shop, and the code is “DATAPRIVACY.” However, despite the measures announced in the tweet, people asked the company if their “database backups and logs” will be included in the sensitive data purge every 90 days. No response has been provided by Trezor as of press time. Ledger already notified …
Technology / July 29, 2020
An Inside Look Into the Surprisingly Friendly Rivalry Between Ledger and Trezor
Trezor and Ledger, two of the most prominent hardware wallet manufacturers, have long been locked in a rivalry. As part of Cointelegraph’s interview with Charles Guillemet, the CTO of Ledger, he revealed that the relationship is more complex than it may seem at first. Despite the rhetoric, cooperation and respect can be found as well. A collaborative rivalry Guillemet said that he doesn’t know who started the rivalry, as it goes back to the “very beginning of the Ledger and Trezor companies.” “I think things got more serious when I created the Donjon, which is our internal security team,” he …
Blockchain / June 2, 2020
Ledger, Trezor and Others: Hack Allegations Are Baseless, Lack Proof
According to a report by an online monitoring web portal, Under the Breach, a hacker was able to penetrate the privacy protocols of major firms such as Trezor, Ledger and Bnktothefuture on May 24 and walk away with a host of sensitive customer data, including email addresses, home addresses and phone numbers. The documents posted by Under the Breach claimed that the hacker was in possession of three large databases that allegedly contained the details of more than 80,000 customers. In this regard, it was also rumored that the hacker was able to procure the above-stated information via an exploit …
Technology / May 27, 2020