keystone-se-firmware
keystone3-firmware
keystone-se-firmware | keystone3-firmware | |
---|---|---|
8 | 3 | |
21 | 56 | |
- | - | |
1.4 | 9.9 | |
6 months ago | 4 days ago | |
C | C | |
GNU General Public License v3.0 only | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
keystone-se-firmware
- Firmware Update 1.2.0&Open Source Announcement
-
Security concerns. Another Ledger?
Keystone's firmware of gen2 is already open source, and gen3 I think is being released as 100% open source soon. So you can check everything, and build it yourself. Otherwise you can double-check the checksum of the downloaded binary before you put it into your Keystone.
-
Does Ledger "persist" the passphrase if you set it to a pin?
that's because it's verifiably not true - the chip they're using isn't documented (huge red flag when mentioning using a SE) and their "source code" still contain binaries blob for critical functionalities such as https://github.com/KeystoneHQ/keystone-se-firmware/blob/bitcoin/source/driver/ecdsa_v2.lib
- Keystone will be working on adding monero support soon
-
Q&A on Keystone‘s firmware - Week of 6/2/2023
A: The answer is NO. To make sure there's no access of the firmware, we have made our firmware open-sourced for the whole community to examine that we didn’t have any backdoors or misconduct from ourselves. The firmwares are released by Keystone official to ensure that no malicious third party can get into your device. We also use QR code data transmission which is transparent and verifiable to prove that there’s no secrets inside the data.
-
Secure element chip make/model ?
We use a EAL 5+ bank-grade Secure Element. We cannot reveal the secure element to public because of the IP of the manufacturer. But to be as transparent as possible, we have open-sourced the Secure Element firmware and the datasheet (We are the first hardware wallet company who did so). If you are hoping to further verify the operations of the Secure Element, we can send you a development board under NDA. You can find more infos in this blog.
-
A few questions about using a passphrase with a Keystone wallet
The signature nonce generation is closed-source in Keystone: https://github.com/KeystoneHQ/keystone-se-firmware/issues/8
-
Daily General Discussion - May 16, 2023
open source firmware
keystone3-firmware
-
The latest firmware appears to be "source available", not "open source".
Looking at the license for the 1.2.0 firmware, it looks like it doesn't permit non-commercial use. Thoughts?
-
Firmware Update 1.2.0&Open Source Announcement
Here's the file it links to. It's concerning: https://github.com/KeystoneHQ/keystone3-firmware/blob/release/v1.2.0/COPYING-KEYSTONE
What are some alternatives?
x1_wallet_firmware - Cypherock X1 Wallet firmware
trusteeWallet - you can build your own trustee wallet from full source code
Keystone-developer-hub - Keystone developer hub
ledgerjs - ⛔️ MOVED to monorepo "ledger-live"
trezor-firmware - :lock: Trezor Firmware Monorepo
firedancer - Firedancer is Jump Crypto's Solana consensus node implementation.
trezor-hardware - :wrench: Hardware design of Trezor
app-monorepo - Secure, open source and community driven crypto wallet runs on all platforms and trusted by millions.
Keystone-developer-documents - Keystone developer hub [Moved to: https://github.com/KeystoneHQ/Keystone-developer-hub]
NewFinance - Multi Party Secured Mobile Bitcoin Wallet
frame - System-wide Web3 for macOS, Windows and Linux
trezor-suite - :candy: Trezor Suite Monorepo