Event JSON
{
"id": "444e62403f44ddc9671c4d94036d1c8d199eef78b960c87c719987b31016dbdb",
"pubkey": "fcf70a45cfa817eaa813b9ba8a375d713d3169f4a27f3dcac3d49112df67d37e",
"created_at": 1742632563,
"kind": 1,
"tags": [
[
"e",
"b8aa84d7f6a5cfcaf523652f0be2f9a1ed33a7581b6def451315f5ad3717f7e4",
"ws://192.168.18.7:7777",
"root",
"fcf70a45cfa817eaa813b9ba8a375d713d3169f4a27f3dcac3d49112df67d37e"
],
[
"e",
"830737f7fb13551ca93bdf56908ada6d4eb4e6441582210f4cc0e88c8d8b1965",
"ws://192.168.18.7:7777",
"reply"
],
[
"p",
"fcf70a45cfa817eaa813b9ba8a375d713d3169f4a27f3dcac3d49112df67d37e",
"ws://192.168.18.7:7777"
],
[
"p",
"39b58086b0000b260bff58995c32349926b0ad7ccc7b5aecf4c98f9e040a4b8c"
],
[
"r",
"wss://purplepag.es/"
],
[
"r",
"wss://nos.lol/"
],
[
"r",
"wss://nostr.mom/"
],
[
"r",
"wss://nostr.bitcoiner.social/"
],
[
"r",
"wss://nostr.oxtr.dev/"
],
[
"r",
"wss://nostr-pub.wellorder.net/"
],
[
"r",
"wss://offchain.pub/"
],
[
"r",
"wss://premium.primal.net/"
],
[
"r",
"wss://relay.damus.io/"
],
[
"r",
"wss://relay.mostr.pub/"
],
[
"r",
"wss://relay.nostr.band/"
],
[
"r",
"wss://relay.nostr.net/"
],
[
"r",
"wss://relay.primal.net/"
],
[
"r",
"wss://relay.snort.social/"
],
[
"r",
"wss://purplerelay.com/"
]
],
"content": "Trezor being an open architecture, at least until Trezor T, has a “bug” that allows you to extract the seed and once extracted you can brute force attack the pin.\n\nThis was solved with the secure SD function where the seed encryption key is the pin + key on the SD card (256 bits).\n\nThe attacker needs to have both (pin + sd) or it is technically impossible to brute force decrypt the seed given the length of the key.\n\n\n",
"sig": "59cb16c1d75ddfee8727504163a8cef89154b176a58a812e93ac3405160fdff056c141f44028f6665e63f4056302b1570209d81bae6dce8281e73def2d6edae4"
}