The following case studies discuss how a variety of hardware and software wallets address Blockchain Commons' principles for self-sovereign wallet design and how they respond to a variety of adversaries identified by #SmartCustody risk-modeling.
Airgapped Wallets:
- Blockchain Commons Seed Tool
- Foundation Devices Passport
- Keystone Pro (TBD)
Software Wallets:
The Gordian Principles are independence, privacy, resilience, and openness. They together outline a self-sovereign methodology for the management of cryptocurrency, where a user stays in control of their digital assets and can easily transfer them, but simultaneously has good protections from the loss of funds that can otherwise arise from personal oversight of funds.
Each Case Study measures how the device advances the four Gordian Principles (or fails to do so).
Blockchain Commons has advanced an architectural model that we support as a best practice to advance the Gordian Principles. It supports the Gordian Principles by suggesting a partitioned architecture where data and services are isolated from each other, only connected by airgaps or torgaps. One of the preferred architectures for wallet design has seed holders physically isolated from the network, using QR codes transmitted by cameras to grant a networked transaction coordinators pubkeys to create a wallet and then signing PSBTs using that same method. We consider this the second generation of wallet design, succeeding the first generation of connected hardware wallets such as Ledger and Trezor.
The airgapped wallets studied here can work in this configuration, while the software wallets can act as networked transaction coordinators for the airgapped wallets.
Blockchain Commons' #SmartCustody model is a risk-modeling system where users assess vulnerabilities in their custody scenario, map those vulnerabilities to adversaries, then assess which adversaries. Each adversary is an anthropomorphized threat that typically could cause a loss of funds (or other damage).
The case studies to date suggest that the following adversaries are defeated (or at least impaired) by the various wallets. The wallets to the left are airgapped wallets being used as seed holders, those to the right are software wallets being used as transaction coordinators. Adversaries that are irrelevent to a role are not noted.
Seed Holders | Coordinators | ||||
Adversary | Keystone | Passport | Seed Tool | + | Sparrow (T.C.) |
Bitrot | Yes | Yes | |||
Censorship | Yes | ||||
Convenience | No | Partial | Partial | ||
Correlation | Yes | ||||
Disaster | Partial | No | |||
Institutional Theft | Yes | Yes | |||
Key Fragility | Yes | Yes | |||
Network Attack | Yes | Yes | Mostly | ||
Physical Theft | Yes | Yes | Mostly | ||
Supply-Chain Attack | Yes | No | No | ||
System Key Compromise | No | Optional | |||
Transaction Error | Yes |
We would love to have more case studies to exemplify how second-generation wallets (and beyond) apply the Gordian Principles and foil the #SmartCustody Adversaries.
If you would like to write your own self-assessment of your product, please feel free to enter a PR. We will edit any case studies supplied to us, and may request a copy of any hardware wallet if we need to verify or re-assess any points. Please try to produce a well-written, organized, and balanced case study, without superlatives, as we (hopefully) did when looking at our own Gordian Seed Tool.
If you would like to contract us to assess a wallet and produce a case study for publication here, contact us directly at [email protected].
We may continue to proactively produce other case studies ourselves. Our prime criteria for doing so is whether a wallet has strong interoperability, primarily through adoption of URs, SSKR, and other Blockchain Commons specifications.