Casa App: Bitcoin Walletlatest release: 3.6.5 ( 20th October 2021 ) last analysed 22nd May 2021 No source for current release found
Help spread awareness for build reproducibility
Please help us spread the word discussing transparency with Casa App: Bitcoin Wallet via their Twitter!
Do your own research!
Try out searching for "lost bitcoins", "stole my money" or "scammers" together with the wallet's name, even if you think the wallet is generally trustworthy. For all the bigger wallets you will find accusations. Make sure you understand why they were made and if you are comfortable with the provider's reaction.
The Analysis ¶
The following is the review of their Play Store app which equally applies to the App Store version:
Update 2020-12-03: This app is not obfuscated. Anybody can decompile at
2.27.10 and inspect the code or modify it to compile it back
into an app. Clearly licensing stops honest people from publishing the result to
any users but we don’t see any argument left to not publish the code under a
Update 2019-12-20: This app and its review here were also discussed in a great episode of the Unhashed Podcast.
This app follows an interesting concept with a multi-signature setup.
The app contains a single-signature wallet like most wallets discussed here but it also allows to use 2-of-3, 3-of-5 and maybe other configurations.
So the client software is a wallet on its own but can we audit it? Neither on Google Play nor on their website nor on GitHub can we find a link to the source code.
Yeah. I mean, this is something that we’ve talked about, you know, ever since we started the company the various trade offs between what you can accomplish with free open source software versus, you know, a for profit company that may not open source all of the software that it’s writing. And when you’re looking at the multisig product that we’ve built, that is actually a very well diversified product because you end up using open source software, your firmware and hardware from a variety of different companies, which helps you both increase your level of security from a variety of different threats and decrease the likelihood that, you know, all of those different actors out there have been compromised and willing to coordinate, to work against you. It gets a little bit trickier, you know, when we’re talking about a closed source, single sig hot wallet, I mean, this is a riskier threat model.
fair points but … there is a single signature part to the wallet which they recommend to use like a checking account and as they recommend their multi-signature “gold” product for wallets starting at $1000, we assume this wallet is still meant for amounts up to $1000. And regardless of recommendations, users tend to forget they have $700 in their wallet and next time they check, Bitcion went up x20 …
Lopp goes on to say:
Now, when we’re talking about open source versus closed source in the context of mobile apps, then it gets even trickier because it is difficult if not impossible. And in fact, we have not yet really found a way to verify the build of a mobile app that is on the Apple store or the Google Play Store.
which is a direct hint to what we are doing at WalletScrutiny. Is he claiming we are promoting something that cannot exist? Or that he has not yet figured out, which given he is a professional in the space since before Bitcoin would be hard to believe? He explains:
The way that these mobile App Stores work is that they require the applications to be cryptographically signed by the developers in order to get pushed out to the store, but the actual build process for the app, the actual you know, attestation of what the code that’s that’s being run on the app is not really a part of the experience that Apple and Google provide.
What does he mean by that? Yes, the apps are signed. So what? For Reproducible Builds, a missing signature on part of the re-builder is perfectly fine to proof a match of the underlying code. Strip the signature from the Google Play version and compare.
He further claims:
The only real option, if you wanted to be sure of what the actual code was running as would end up having to build the mobile app yourself and load it onto your phone.
This is, theoretically possible, at least with Android, but it requires a fair amount of technical experience. It’s really not, the people who have the ability to do that. We are not really targeting them for this experience.
Reproducible Builds matter precisely so you can take advantage from public code audits without having to compile or audit the code for yourself. It is a complicated and technical topic and it is our mission to educate users and providers on the possibilities and limitations so users will demand reproducibility for peace of mind while professionals call out those who don’t follow best security practice thanks to relevant projects being subject to public scrutiny.
You know, this is meant to be for nontechnical people who are very early in their Bitcoin life cycle. So it really seems like from a free open source software security side of things, that it’s more of a feel good idea of having open source mobile apps, if you can’t actually verify.
Pardon? “open source software” is a “feel good idea”? This part of the interview is really getting hard to read without jumping up from the chair!
I mean, we are all familiar with the mantra of don’t trust verify, and if people could, you know, verify that the code we open sourced was the code that was out there on these stores. Then I think it would make a stronger argument for us to be open sourcing it.
Jameson Lopp we challenge you to show how WalletScrutiny is pointless. We close shop if you can show that our work is futile.
WalletScrutiny.com is not perfect but for now provides an important building block towards making wallets more secure by ensuring Build Reproducibility.
The missing parts of
- Actual code audits
- Release deceleration
depend on users and providers caring enough to appreciate the security implications of rushed releases and incentives bug bounties to audit code.
Build Reproducibility is important and possible and you claiming the exact opposite is an affront to those who hold up these pillars of transparency.
The other downside is that, like I said, these apps require a cryptographic signatures from the developers to be on the store. There’s also various functionality that we’re using such as some of the pieces of the seed backup that also require that. So even if you built the app on your own, you would not have a fully functioning Casa wallet, you know the user experience that we really intended. So there’s trade offs Yup.
With Build Reproducibility, the signature of the Google Play app can be applied to the self-built app. Sure, modifications are not possible but our fight is for transparency for the sake of security, not for the freedom to do modifications.
In defense of Lopp, he is talking about “Open Source”, not “public source”, so some statements apply to Open Source that would just not make sense for public source but let’s take
The Devil’s Advocate’s Perspective
Interestingly the FAQ section on their website states:
Can Casa ever access my Bitcoin?
Casa can never access your funds - even if we wanted to. With multisig, multiple keys are required to spend your Bitcoin, and Casa only ever has access to 1 key (for use in emergencies only). This also means that it’s impossible for Casa to ever stop you from accessing your Bitcoin. And that even if Casa were under attack, your funds would still be 100% safe from thieves or hackers. Casa was architected with a ‘Can’t Be Evil’ principle.
How does the setup process work?
For Gold memberships, you can bring your own hardware device(s), download the Keymaster app, and get started immediately. For Platinum and Diamond, Casa’s team walks you through a simple, curated setup process:
- Receive your hardware devices in the mail
- Includes everything you need in one discreet package.
- Book your Key Ceremony and graduate to multisig
- Your Client Advisor walks you through a personalized onboarding and OpSec review.
- Ongoing security and service
- We’ll keep you up to speed on all the security developments you need to know about.
- Message us any time you have a question, need a free device replacement, or just want to chat.
So if our assumption is correct that the client software is responsible for one of the keys in each setup, the above information leads us to grim conclusions.
Casa makes sure to always have control over the majority of your keys:
- They obviously have control over the key they promote as being under their control.
- They avoid scrutiny of the software wallet that holds a second key. In this configuration they invite you to “bring your own hardware device”. It’s only one of three after all.
- Should you want to use more than one hardware wallets, they ask you to accept shipment through them, making you vulnerable to supply chain attacks.
Combined with this quote from the above interview:
You know, this is meant to be for nontechnical people who are very early in their Bitcoin life cycle.
and this quote from their website:
How much Bitcoin can I store in Casa?
Gold is built to secure $1,000 - $50,000 worth of Bitcoin. We recommend Platinum if you are protecting $50,000 - $500,000 in BTC. Diamond has no upper limit, and is optimized for $100,000 and above.
it gives the impression Casa targets rich, non-technical users and lures them into using their products that are not auditable and thus leave room for backdoors capable of emptying all clients’ wallets at once.
We don’t assume that Casa is out to steal your keys but we stand by the mantra “Don’t Trust. Verify!” and consider this wallet with or without multi-signature setup to be not verifiable.
Without public source of the reviewed release available, this product cannot be verified!
As part of our Methodology, we ask:Is the source code publicly available? If not, we tag it No Source!
A wallet that claims to not give the provider the means to steal the users’ funds might actually be lying. In the spirit of “Don’t trust - verify!” you don’t want to take the provider at his word, but trust that people hunting for fame and bug bounties could actually find flaws and back-doors in the wallet so the provider doesn’t dare to put these in.
Back-doors and flaws are frequently found in closed source products but some remain hidden for years. And even in open source security software there might be catastrophic flaws undiscovered for years.
An evil wallet provider would certainly prefer not to publish the code, as hiding it makes audits orders of magnitude harder.
For your security, you thus want the code to be available for review.
If the wallet provider doesn’t share up to date code, our analysis stops there as the wallet could steal your funds at any time, and there is no protection except the provider’s word.
“Up to date” strictly means that any instance of the product being updated without the source code being updated counts as closed source. This puts the burden on the provider to always first release the source code before releasing the product’s update. This paragraph is a clarification to our rules following a little poll.
We are not concerned about the license as long as it allows us to perform our analysis. For a security audit, it is not necessary that the provider allows others to use their code for a competing wallet.
Share onTwitter Facebook LinkedIn
Or embed a widget in your website
<iframe src="https://walletscrutiny.com/widget/#appId=iphone/com.casa.vault&theme=auto&style=short" name="_ts" style="min-width:180px;border:0;border-radius:10px;max-width:280px;min-height:30px;"> </iframe>
<iframe src="https://walletscrutiny.com/widget/#appId=iphone/com.casa.vault&theme=auto&style=long" style="max-width:100%;width:342px;border:0;border-radius:10px;min-height:290px;"> </iframe>