Why did hardware wallet Ledger launch the Ledger Recover service, which has sparked criticism from the Web3 community?

Why did hardware wallet Ledger launch its controversial Ledger Recover service?

Author | Sethforprivacy, Content Manager of Bitcoin Tool Development Company Foundation

Translation | PANews

On May 16, Ledger released the Nano X cold wallet 2.2.1 firmware update, which introduces a key mnemonic recovery feature called “Ledger Recover” as an ID-based key recovery service. The feature will back up the user’s private key recovery phrase and requires a subscription ($9.99 per month) to activate. Currently, a passport/ID card issued by the EU, UK, Canada or the US is required to subscribe to this service, but in the coming months, more countries will be covered and support for more documents will be added.

However, this feature has raised concerns among many Web3 users about privacy and security, especially when it comes to storing private key mnemonic phrases and associating them with passports or ID cards, which clearly violates the privacy values of the crypto community. The content manager of Bitcoin tool development company Foundation has pointed out the “danger” of Ledger’s latest cryptocurrency custody solution in a post.

It is said that the core of Ledger’s new product is to fragment the user’s mnemonic phrase, divide it into three parts, and then encrypt it, while also requiring the user to provide their ID and a selfie. Then, trust three trustees to protect these fragmentary information for you.

However, there are problems with what Ledger is doing.

First, in order to use this “mnemonic phrase recovery” system, you must associate and bind your ID identity information with the Ledger account, which creates a KYC pain point and raises issues such as data leakage, hacker attacks, and scrutiny and surveillance.

Secondly, you also need to trust third parties and give them your ID information and information related to encrypted currencies. In this case, data leaks or hacker attacks are likely to occur, after all, Ledger user data is very valuable (both now and in the future), and any “authorized third party” may decide at any time to use your data as a source of income.

More importantly, the Ledger Recovery service also compromises user privacy. Currently, most Ledger users choose to use the Ledger Live software service, which uses Ledger nodes to synchronize all wallets, including all details of cryptocurrency activity within the wallet. Compared to binding one’s own ID with the Ledger account, users who use Ledger Live are at higher risk.

According to disclosed information, all KYC data is collected by a company called “Onfido”, which will handle KYC information verification, etc. When a Ledger user uploads/verifies their identity, they will retain the user’s ID, images/videos/sounds in the selfie video, and overall images of the user’s device and current activity.

This means that Onfido will have full access to your ID and the fact that you are a Ledger user. Of course, they definitely know that you hold cryptocurrency. Onfido will also have full access to your device information used for identity verification, so now you not only trust Ledger and “authorized third parties” to use your identity data, but also trust Onfido to have more information about your device and other information.

All of these operations are easy to trigger new threats. Next, let’s further analyze from a technical perspective.

From a technical perspective, users must “100%” trust Ledger, because the entire process code is closed and cannot be verified. Although Ledger co-founder Nicolas Bacca said that his team plans to open up its code in the future to let users see how Ledger’s recovery service encrypts user data securely and runs securely at the bottom, and Ledger is also making its recovery service fully optional and transparent about its cooperation with third-party hosting institutions, at least at the time of writing this article, Ledger has not open-sourced the relevant code, which means that no one can verify what actually happened/security except for Ledger itself.

If everything is as stated above, theoretically, the user’s mnemonic words will never leave the device unencrypted. However, we cannot verify this and ensure that these mnemonic words have been securely completed or correctly encrypted. But one thing can be confirmed, that is: the code is running on your Ledger now, and your mnemonic words can be sent via USB/BT. From another perspective, at this time, your wallet will no longer be a so-called “cold wallet”, but a “cold-to-hot” wallet. Moreover, if your wallet can be turned “hot” with a few keystrokes, it will also open up a large number of new attack media for phishing and malware on the network, and hackers may unknowingly gain access to your mnemonic words.

At present, we cannot confirm whether Ledger has built-in security measures to prevent someone from sending all the encrypted fragments of the mnemonic phrase to one person or sending them to three different custodians, nor can we determine whether the mnemonic phrase fragments can only be decrypted by the user themselves.

Here’s another issue – you can’t know how the recovery process, or decryption process works. Users must log in to Ledger and verify their identity, but if decryption can only be done on their own device, how can a new device obtain the decryption key?

In an end-to-end encryption (E2EE) scheme, there is usually a method to approve a new device and send it the decryption key, but in the case of a lost Ledger, the user cannot do this, so someone else must have a copy of the Ledger decryption key they sent you in order to recover the mnemonic phrase.

In this case, who has these decryption keys? Is it Ledger? Or is it encrypted and stored somewhere after logging in to Ledger Recover and verifying your identity? If so, how are the decryption keys stored, what technology is used to encrypt them, and how are they verified?

One more thing, if someone knows that you are using Ledger Recover and has obtained your ID, theoretically they can steal all your encrypted currency, even if your Ledger is safely stored in a drawer somewhere.

It is worth mentioning that Ledger Recover’s custodian CoinCover, as well as Onfido mentioned above, are located in the UK. The other custodian has not been disclosed in the official documentation, but it is rumored to be EscrowTech in the United States. If the rumors are true, it means that your information will be within the jurisdiction of the “Five Eyes Alliance”.

Summary

It may not be a good idea for Ledger to introduce the Recover service because it breaks all the principles of using hardware wallets (cold storage) and introduces KYC into it, while the “non-open source” mechanism also makes it difficult for many Web3 users to trust its claims.

We will continue to update Blocking; if you have any questions or suggestions, please contact us!

Share:

Was this article helpful?

93 out of 132 found this helpful

Discover more

Blockchain

Learn about Telegram's TON network and GRAM tokens

On May 30, 2019, Telegram launched a simplified version of the platform. Earlier, the news said that if the TON (Tele...

Blockchain

Bitcoin is the first to adopt bitcoin, and GMO, the largest Internet company in Japan, pays more than 4,700 employees in bitcoin.

GMO Internet Group, Japan's largest Internet company, has introduced a payroll system that allows more than 4,70...

Blockchain

The king of money returns to $10,000, what makes it stand still?

There is a paradox in the issue of reforming things. In this case, there is a specific system or law; in the face of ...

Blockchain

Bakkt won't bring a bull market, but it doesn't stop there.

On September 23, Bakkt launched a bitcoin futures contract for physical settlement. Prior to this, many people though...

Blockchain

Is ransomware causing bitcoin to skyrocket? Seems to be really related

Original author | Chris Stokel-Walker Translator | Moni Produced | Odaily Planet Daily (ID: o-daily) Flagstaff, Arizo...

Blockchain

Nearly 100% growth in half a year, lightning network breaks down rumors

The latest research shows that the lightning network as a bitcoin expansion solution is booming, and its number and c...