Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Plausible deniability only works for extended keypairs? #91

Open
rkreutz opened this issue Oct 14, 2023 · 1 comment
Open

Plausible deniability only works for extended keypairs? #91

rkreutz opened this issue Oct 14, 2023 · 1 comment

Comments

@rkreutz
Copy link

rkreutz commented Oct 14, 2023

Hey @bitgamma

I was having a look at the plausible deniability PR and was wondering if the duress PIN actually worked as the main PIN in case the key pair is not an extended one?

From what I could understand from the codebase, the derived private key only difference between the alt and the main key is the chain code, where the alt chain code is a SHA256 digest of the main chain code, but this is only set if the main key is an extended one, so in case the card was loaded with a plain private key (that doesn't support derivation) would that mean that the duress PIN is effectively signing with the main PIN private key?

Thanks

@bitgamma
Copy link
Contributor

that's true. The reason why we use the same master key is because the keyUID (which is retrieved before pin authentication) depends on the master key so it must remain the same for both PINs to make it work transparently.

Support for non-extended keys is legacy behavior. We will document the incompatibility of non-extended keys with duress PIN and probably in the future support for non-extended keys will be removed altogether

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants