Wallet Logo

AT.Wallet

🔍 Last analysed 3rd December 2021 . Leaks Keys

Jump to verdict 

Help spread awareness for build reproducibility

Please help us spread the word discussing build reproducibility with AT.Wallet  via their Twitter!

Do your own research!

Try out searching for "lost bitcoins", "stole my money" or "scammers" together with the wallet's name, even if you think the wallet is generally trustworthy. For all the bigger wallets you will find accusations. Make sure you understand why they were made and if you are comfortable with the provider's reaction.

If you find something we should include, you can create an issue or edit this analysis yourself and create a merge request for your changes.

The Analysis 

AT.Wallet describes itself as

One of The World’s First Fingerprint Credit Card Sized Cold Wallet.

(Video showcasing this wallet.)

You can set up this wallet with bluetooth or USB.

Its companion app is AT.Wallet Few Users

Private keys can be created offline and are not shared

In the FAQ, this wallet states that it stores private keys offline.

If you keep your virtual assets on an exchange, you are entrusting your private keys to a third party and authorizing them as security. The cold wallet is unloaded so that hackers have a harder time accessing your stored coins for improved security. The private key is always offline and stores inside SE (Secure Element), all paths are encrypted.

Once paired to the mobile app, the user can create a new wallet. The user will be provided with the 12/24-word mnemonic in the app and is asked to write them down offline, in a safe place.

For better security, you can assign “Passphrase” for those “Mnemonic words” for recovery, so that when you do “recover wallet base on Mnemonic words”, it requires you to type correct “Passphrase” to recover.

Device displays receive address for confirmation

The user can verify and approve transactions on the device.

The card has a built-in fingerprint sensor to sign transactions:

Patented Standalone Mode adds convenience for fingerprint verification and fast transaction signing.

Fingerprint verification is necessary for sending assets, but not for receiving.

You can view the QR code on the card’s screen to confirm a receiving address.

Interface

AT.Wallet, like it claims in the earlier description, is about the size of a credit card. It lists some of its security features on its product page.

  • Designed with Infineon Secure Element (SLE97, EAL 5+SE), that generates private key inside SE for security transactions.
  • Matching-on-card fingerprint sensor, making fingerprint templates not disclose outside the card and only send out public key.

Reproducibility

ATWallet has a Github profile, although there is no mention of its product being open-source. None of these repositories appear to be relevant in determining the reproducibility of the device’s firmware.

This product is thus not verifiable.

(ml, dg)

Verdict Explained

This product requires sharing private key material!

As part of our Methodology, we ask:

Does the device hide your keys from other devices? If not, we tag it Leaks Keys!

Some people claim their paper wallet is a hardware wallet. Others use RFID chips with the private keys on them. A very crucial drawback of those systems is that in order to send a transaction, the private key has to be brought onto a different system that doesn’t necessarily share all the desired aspects of a hardware wallet.

Paper wallets need to be printed, exposing the keys to the PC and the printer even before sending funds to it.

Simple RFID based devices can’t sign transactions - they share the keys with whoever asked to use them for whatever they please.

There are even products that are perfectly capable of working in an air-gapped fashion but they still expose the keys to connected devices.

This verdict is reserved for key leakage under normal operation and does not apply to devices where a hack is known to be possible with special hardware.

The product cannot be independently verified. If the provider puts your funds at risk on purpose or by accident, you will probably not know about the issue before people start losing money. If the provider is more criminally inclined he might have collected all the backups of all the wallets, ready to be emptied at the press of a button. The product might have a formidable track record but out of distress or change in management turns out to be evil from some point on, with nobody outside ever knowing before it is too late.