Our great sponsors
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
As you might know, most forensic experts can check OS logs and know which devices were connected to it recently. There is even a list of known VID/PID combinations and hardware wallet vendor names here: https://github.com/INTERPOL-Innovation-Centre/HardwareWallets_DF_List
As you can see, the default firmware of Coldcard is hardcoded with values d13e and cc10. We are going to change it to make it look like a benign USB device, more on it later. First, clone the original firmware from Github: https://github.com/Coldcard/firmware We now need to edit the file called ./stm32/COLDCARD/shared/usb.py: COINKITE_VID = 0xd13e CKCC_PID = 0xcc10
Related posts
- Github repo
- I can't find some components in this schematic.
- Hardware/Software wallets and backdoors implemented by different nations?
- Multisig 2 of 3 for a single person, with all cold wallets as Tails + Electrum? Is it a good idea for safer security? Or just an unnecessary overkill?
- Hardware wallet security