Cypherock
  • Introduction
  • Design Decisions
    • The balance between security and convenience
    • Cypherock X1 Hardware architecture
      • Using ultrasonic welding for the X1 Vault enclosure
      • Encrypted NFC communication for X1 cards
      • Using Javacards instead of MicroSD
      • Choosing USB vs QR Code
      • Why the X1 cards are not upgradeable
    • Cypherock is BIP39 compliant
    • Private keys should be near to impossible to extract
    • Conflict between trusted parties should not result in unauthorized access
    • Using Shamir Secret Sharing vs. Multi-sig
      • How is Shamir Secret Sharing implemented within Cypherock X1
      • Why Cypherock has a default 2/5 threshold scheme
      • Rejected Key Schemes
    • PIN Protection on Cypherock X1
      • Difference between backing up your PIN vs. Seed Phrase
  • Security Overview
    • Introduction
    • Keylabs - Third Party Security Audit
    • Remote Attacks
    • Physical Attacks
      • $5 Wrench Attack
      • PIN Brute Force Attack
      • Evil Maid Attack
      • Flashing Malicious Firmware
      • Side Channel Attack
      • Supply Chain Attack
  • Cypherock X1 Features
    • Eliminate messy paper backups
    • Open source with secure elements
    • Use Cypherock as a seed phrase vault
    • All-in-one Portfolio Manager
  • Getting Started
    • Download cySync
    • Import Seed Phrase from existing BIP39 compatible wallet
    • Generate a new wallet with Cypherock X1
    • How Cypherock generates your 24-word seed phrase
    • Best practices in keeping your X1 cards secure
      • Use the protective card sleeves
      • Geographical Seperation
      • Choosing your guardians
    • How do I know I am not locked-in to using only Cypherock X1
    • How do I know my Cypherock X1 is genuine?
      • Email 2FA for Product Authentication
    • How to recover your Crypto assets in the case of loss or theft
    • What happens to my Cypherock X1 if Cypherock goes out of business?
Powered by GitBook
On this page

Was this helpful?

  1. Security Overview
  2. Physical Attacks

$5 Wrench Attack

A $5 wrench attack occurs when an attacker physically threatens you using a deadly weapon to hand over your private keys or send over the funds.

Here are the steps that Cypherock has taken to protect users from this:

  1. Leveraging geographical separation of X1 cards to maximize security: For maximum security, it is recommended to store X1 card at different locations. This increases the time required to get access to the keys and in turn increases the risk for the attacker to attack you.

  2. Creating multiple wallets within Cypherock X1: Cypherock X1 has the ability to create and manage 4 independent wallets. A user may choose to create a wallet without pin protection which could be compromised, however, any other wallet with pin protection will not be able to compromise due to the difficulty of guessing an alphanumeric pin, and an exponential time function which has been implemented on the pin, in the case a user guesses the wrong pin.

  3. Create a passphrase to protect your crypto wallet: Passphrases add a layer of security to your crypto wallet by requiring an extra phrase to be entered on top of the PIN protection that you may currently have set on your Cypherock X1. The passphrase combines with the existing seed phrase of your wallet to generate a brand new wallet.

PreviousPhysical AttacksNextPIN Brute Force Attack

Last updated 1 year ago

Was this helpful?