From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from sog-mx-4.v43.ch3.sourceforge.com ([172.29.43.194] helo=mx.sourceforge.net) by sfs-ml-4.v29.ch3.sourceforge.com with esmtp (Exim 4.76) (envelope-from ) id 1XAYUb-00014h-5B for bitcoin-development@lists.sourceforge.net; Fri, 25 Jul 2014 05:56:33 +0000 Received-SPF: pass (sog-mx-4.v43.ch3.sourceforge.com: domain of gmail.com designates 209.85.218.47 as permitted sender) client-ip=209.85.218.47; envelope-from=voisine@gmail.com; helo=mail-oi0-f47.google.com; Received: from mail-oi0-f47.google.com ([209.85.218.47]) by sog-mx-4.v43.ch3.sourceforge.com with esmtps (TLSv1:RC4-SHA:128) (Exim 4.76) id 1XAYUa-0004oE-Ad for bitcoin-development@lists.sourceforge.net; Fri, 25 Jul 2014 05:56:33 +0000 Received: by mail-oi0-f47.google.com with SMTP id x69so2956408oia.34 for ; Thu, 24 Jul 2014 22:56:26 -0700 (PDT) MIME-Version: 1.0 X-Received: by 10.60.161.136 with SMTP id xs8mr19480177oeb.42.1406267786694; Thu, 24 Jul 2014 22:56:26 -0700 (PDT) Received: by 10.60.98.204 with HTTP; Thu, 24 Jul 2014 22:56:26 -0700 (PDT) In-Reply-To: References: <53D1AF6C.7010802@gmail.com> Date: Thu, 24 Jul 2014 22:56:26 -0700 Message-ID: From: Aaron Voisine To: William Yager Content-Type: text/plain; charset=UTF-8 X-Spam-Score: -1.6 (-) X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. See http://spamassassin.org/tag/ for more details. -1.5 SPF_CHECK_PASS SPF reports sender host as permitted sender for sender-domain 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (voisine[at]gmail.com) -0.0 SPF_PASS SPF: sender matches SPF record -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature X-Headers-End: 1XAYUa-0004oE-Ad Cc: "bitcoin-development@lists.sourceforge.net" Subject: Re: [Bitcoin-development] Time X-BeenThere: bitcoin-development@lists.sourceforge.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 25 Jul 2014 05:56:33 -0000 It's based on the block height, not the block's timestamp. If you have access to the device and the phone itself is not pin locked, then you can jailbreak it and get access to the wallet seed that way. A pin locked device however is reasonably secure as the filesystem is hardware aes encrypted to a combination of pin+uuid. This was just an easy way to prevent multiple pin guesses by changing system time in settings, so that isn't the weakest part of the security model. Aaron Voisine breadwallet.com On Thu, Jul 24, 2014 at 8:21 PM, William Yager wrote: > On Thu, Jul 24, 2014 at 10:39 PM, Gregory Maxwell > wrote: >> >> >> Is breadwallet tamper resistant & zero on tamper hardware? otherwise >> this sounds like security theater.... I attach a debugger to the >> process (or modify the program) and ignore the block sourced time. >> > > It's an iOS application. I would imagine it is substantially more difficult > to attach to a process (which, at the very least, requires root, and perhaps > other things on iOS) than to convince the device to change its system time. > > That said, the security benefits might not be too substantial. > > ------------------------------------------------------------------------------ > Want fast and easy access to all the code in your enterprise? Index and > search up to 200,000 lines of code with a free copy of Black Duck > Code Sight - the same software that powers the world's largest code > search on Ohloh, the Black Duck Open Hub! Try it now. > http://p.sf.net/sfu/bds > _______________________________________________ > Bitcoin-development mailing list > Bitcoin-development@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/bitcoin-development >