CoinPlus Solo🔍 Last analysed 23rd March 2022 . Provided private keys
Help spread awareness for build reproducibility
Please help us spread the word discussing build reproducibility with CoinPlus Solo via their Twitter!
Do your own research!
Try out searching for "lost bitcoins", "stole my money" or "scammers" together with the wallet's name, even if you think the wallet is generally trustworthy. For all the bigger wallets you will find accusations. Make sure you understand why they were made and if you are comfortable with the provider's reaction.
The Analysis ¶
Here is a video showing how to redeem the private key on CoinPlus Solo.
CoinPlus also has a mobile app that combines the two secrets to compute the private key.
The two secrets are two printed strings printed on the same card by two different entities. These are initially covered and ideally, can only be known by the user when he is in possession of the card. The two are then entered into a program which then converts the two into a private key.
CoinPlus involves two different companies to engrave two secrets on the product ensuring that only the buyer will have access to the private key.
CoinPlus website has a page explaining how the wallet is supposed to keep your private key secure.
Each company generates a secret using a secure random number generator and derives an asymmetric key pair (public and private) from which it stores only the public key. Then each company engraves its secret on the bar and covers it with a holographic security labels ensuring its safety.
By adding their two ECC public key, the companies can compute a common public key that will be used to generate the BTC/ETH/XRP/LTC/XTZ/BCH address or a PEM/GPG public key of the product. The private key corresponding to the common public key is unknown to both companies and only the end user using the two secrets engraved on the product is able to regenerate this private key.
CoinPlus published the source code for the re-computation of the private key on github under the MIT license. The flaws of process-based solution is easier to identify and to migitage compare to an electronic solution.
Currently, the process works with two companies that create 2 different secrets. But to make it even stronger, other actors could very well get involved in the creation process. We deliver trust because our solution is based on mathematics and not on proprietary technology, which means that everyone can verify the algorithms.
SOLO Card Pro
The SOLO Card Pro is a more sophisticated solution in that it employs multiple cards thereby creating a 2 out of 3, multi-sig solution.
From its description on eBay:
The CoinPlus SOLO PRO Card BTC is a set of 3 laser engraved plastic cards for short and medium term use.
These affordable and secure cards are designed for professionals and individuals, resistant to water and hackers. The SOLO PRO card comes in the form of 3 credit cards.
The 6 different secrets are engraved on the back of the 3 cards and hidden by 2 security labels for each card marked “secret 1” or “secret 2”.
The cards contain an NFC chip and a QR Code that allow two things, the storage of the SOLO’s public address, and the redirection to any url that is encoded at the beginning of the cards. Secrets are not present in the NFC chip or QR Code.
These functions do not allow you to make withdrawals or payments from the SOLO, but allow you to share the SOLO public address quickly and easily.https://www.coinplus.com/en/17-solo-bar
On how to “calculate the private key:”
Only 2 of the 3 cards are required to calculate the private key. The cardholder discovers Secret 1 and 2 of at least 2 cards, then recalculates the private key. The private key can be redialed using the CoinPlus application offline or on gituhub/coinplus.sa.
The Solo Bar is quite similar to the CoinPlus Solo with the exception that the keys are on a bar. Its description:
SOLO Bars made of non-precious metal are bars imported from China with the only elements present being the boundaries of the areas in which secrets 1 and 2 will be engraved, the public address and the serial number of the bar. Once received, the bars are checked and stored.
Your SOLO Bar is an elegant ingot presented in its luxury case. Your SOLO Bar comes with its certificate of authenticity. Your public address is present on the ingot and on the certificate by scanning the QR code. Your SOLO Bar will be valid for a hundred years. Place it safely in a safe
The manufacturing process is described:
Once the product has been manufactured and delivered to Coinplus. The registration process for cryptographic codes remains to be followed. This process is described in the ‘patent’ section.
The patent was registered in Luxembourg, however it was taken off the page of CoinPlus.
CoinPlus’ GitHub page has a repository titled “CoinPlus Solo Redeem”
The GitHub description states that it is:
Python code to retrieve the private key from your Coinplus Solo
As quoted above, the provider states that since “CoinPlus involves two different companies to engrave two secrets on the product that ensures only the buyer will have access to the private key.” However
- the user still has to trust that the two companies behind it do not collude to combine the keys they respectively generate.
- Tamper-evident stickers are not a big challenge for motivated hackers. The company second to print on the cards could probably get around destroying the sticker to gain knowledge of the firstly printed keys.
- Judging by photos provided, both companies use the same type of stickers, so removing and re-applying sticker is trivial.
- Peeking below the sticker is a problem for the entire supply chain after the second key was printed.
The device gets delivered with private keys as defined by the provider!
As part of our Methodology, we ask:Are the keys never shared with the provider? If not, we tag it Provided Keys!
The best hardware wallet cannot guarantee that the provider deleted the keys if the private keys were put onto the device by them in the first place.
There is no way of knowing if the provider took a copy in the process. If they did, all funds controlled by those devices are potentially also under the control of the provider and could be moved out of the client’s control at any time at the provider’s discretion.
Share onTwitter Facebook LinkedIn
Or embed a widget in your website
<iframe src="https://walletscrutiny.com/widget/#appId=hardware/coinplussolo&theme=auto&style=short" name="_ts" style="min-width:180px;border:0;border-radius:10px;max-width:280px;min-height:30px;"> </iframe>
<iframe src="https://walletscrutiny.com/widget/#appId=hardware/coinplussolo&theme=auto&style=long" style="max-width:100%;width:342px;border:0;border-radius:10px;min-height:290px;"> </iframe>