Digital Wallet Industry Security Report - tokeninsight.com Feb 2019
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
Digital Wallet Industry Security Report tokeninsight.com bd@tokeninsight.com Feb 2019
s i h t n In s ig g e n s i k nI Digital Wallet Security Report To In ke e n To To k h t Preface i g h t In s ig h t n n s ig k e nI n s To k e e nI To k To At this current stage, about 340 digital wallets have come to exist in the market. Due to differences in product form, private key storage mechanism, and data retention integrity, they may exhibit different features in different use-cases. These features may become vulnerabilities in certain circumstances t and cause digital wallets to be attacked. Once a security issue arises, the possibility of users' digital h si g h t property might be stolen, and because of the particularities associated with the structure of digital ig t currencies, stolen assets become very difficult to recover; this is why wallet security is so important. In s h en n In n s ig k e TokenInsight Inc. has conducted research and analysis on the overall developments of the wallet nI To industry, the structural characteristics of different wallet projects, and identified user security by k e researching, testing, and reviewing the data of nearly 120 wallet projects. From December 2018, our To organization has set out to build a complete system and framework of industry-wide security risk classifications and performance evaluation models. We hope this report will provide useful To k suggestions for wallet users and project developers. h t t g ig h t n s ig h TokenInsight pays close attention to the development of the wallet industry. At present, we have nI completed the evaluation of nearly 120 wallet companies on an international scale. Our organization n s nI has already covered the list of leading projects for different types of wallets such as hardware wallets k e and software wallets. This wallet security report data comes from our TokenInsight database, the To k e projects themselves, and publicly availible data, providing solid support for the empirical research of e n the wallet industry . To To k h t t ig h ns GLOBAL TOKEN & RATING AGENCY ig 2
s i h t n In s ig g e n s i k nI Digital Wallet Security Report To e n In k e To To k Table of Contents h t i g h t In s 1. Executive Summary i g 4 h t n 2. Industry Overviewn I s ig k e n n s o e nI 2.1 Wallet Overview T k 5 o ke 2.2 Overview of the Wallet Security Industry T 6 3. Technical Risks 3.1 Carrier Risks To 8 ht 3.2 Private Key Storage Risk 10 si g 3.4 Trading Risks h t 3.3 Network Protocol and Login Risks 12 In s ig 3.5 Asset Transfer Risks ht 13 en In i g 15 e n 4. Artificial Risks In s k 4.1 Supply Chain Risks n To k e 4.2 Privilege Chain Risks 17 5. Security Industry Outlook To k 19 5.1 Expansion of the Security Auditing Business To 5.2 The Rise of Compatibility Wallets t 21 h ht 5.3 A Stumbling Block to the Asset Management 23 g g ht Business s i g 25 In 6. Appendix n s i 27 ke n In To k e e n To To k h t t ig h ns GLOBAL TOKEN & RATING AGENCY ig
s i h t n In s ig g e 数字钱包安全性报告 k In s i T o e n n In k Ⅰ. Executive Summary e To 1. As of December 2018, there are now more than 340 wallet projects, which increased by To k approximately 30% compared with 2017, while the number of wallet users exceeded 34 million. As t of the second quarter of 2018, user growth rates were over 10%, but the growth rates in the third h ig t quarter of 2018 fell to 7%. According to Google Trends, global attention towards the digital industry h n s ig peaked in January 2018, but then fell rapidly after February and remained steady through the year. h t nI n s ig nI 2. In terms of security incidents, hardware wallets have seen many problems in dealing with remote k e n s nI transaction attacks, supply chain security and preventing brute-force attacks; while software To k e wallets were more affected by phishing attacks of access page and private key leaks. In 2018, the To k e loss caused by wallet security problems totaled about $1.2 billion. By risk classification, the main To problems seen in the wallet security field can be classified into technical risks and artificial risks. 3. Technical security issues involve the following aspects: carrier risk, private key storage risk, t webpage hijacking risk, login risk, transaction risk, asset transfer risk, etc. The risk of webpage h si g t hijacking includes HTTPS man-in-the-middle hijacking and DNS hijacking. This problem requires h In ig t the user and the project side to work together to solve. At present, the two-factor defense set by s h en n ig the project party has different defense capabilities due to different technical specifications, and the n I transaction risk is still an urgent problem to be solved. s k e nIn 4. In the security risks faced by digital wallets, in addition to the security threats caused by To k e technology, it also includes the risks brought by the manual operations of different wallets due to To business needs, including supply chain risks and privilege chain risks. At present, the industry has had effective control of supply chain risks; and the privilege chain risk is caused by the centralized To k storage of the wallet, which points to the operational risk of internal staff. At present, there is no ht effective control method for the privilege chain risks caused by problems such as private key g control and manual transfer. h t s ig h t ig 5. In terms of development prospects in the security field, the demand and depth of the wallet nIn s security review business will further increase due to the increase of the wallet project in 2019 and e nIn the unsound security review framework; as new users will increase in 2019 and the security k To e requirements of the wallet are different at different stages, it is estimated that the wallet supporting k e n To k the centralized storage & decentralized storage architecture will be favored by the market; with the rapid growth of the wallet asset management business, the reliance of the underlying centralized private key storage architecture on the manual management system will be further increased. If To such artificial risks cannot be effectively controlled, the security risks of the digital assets stored in h t the centralized wallet will be amplified and eventually hinder the development of the digital asset t ig management business. h ns GLOBAL TOKEN & RATING AGENCY ig 4
s i h t n In s g ig e 数字钱包安全性报告 k In s i T o e n n In Ⅱ. Industry Overview o k k e T More than 80 new projects were established in 2018, which o Tincreased by about 30% compared to 2017. In the field of wallet security, the t billion. The security incidents were relatively loss caused by security vulnerabilities in the use of wallets in 2018 was abouth$1.2 i g in the leading projects withh t users and digital asset In s concentrated i g large h t storage. n In s i g k e 2.1 Wallet Overview n In s To k e ‣ Graph 2-1 Global digital wallet growth n To Source:TokenInsight k e 100 To 新增项⽬目数量量(个) 80 h t 60 s i g 40 h t In s i g 20 h t en n g 0 n I 2014 s i 2015 2016 2017 2018 k e In In 2018, the number of wallet projects increased by about 80, and the total number of projects n To e reached about 340. The increase was lower than in 2017 but still higher than in 2016 and before. k Wallet global search trend 工作表 1 Source:TokenInsight,Google Trends To ‣ Graph 2-2 Geographical distribution statistics of T o k cryptocurrency wallet: ( Null t 2 3 h t 4 g h 6 7 s i g h t 9 10 15 In s i g 16 17 18 e n In 19 20 k n 24 25 To e 27 k e n 28 32 To 34 o k 36 39 T 40 41 42 43 48 51 53 From the perspective of the global distribution of wallet search trend, most of the countries with high t 56 59 i g h attention to the wallet are located in Africa, Oceania and North America. Singapore has also entered h t 62 69 80 ns the top 10 of attention. 82 ig 84 86 GLOBAL TOKEN & RATING AGENCY 5 87 基于 经度(生成) 和 纬度(生成) 的地图。 颜色显示有关 cryptocurrency wallet: (2018) 总和 的详细信息。 为 Country 显示了详细信息。 90
s i h t n In s ig g 数字钱包安全性报告 e n s i T o k e nI n In 2.2 Overview of the Wallet SecuritykField e To To k The chart below shows several serious security attacks on the wallet recently (since the focus is on the security analysis of the wallet's technical architecture, the following incidents do not include the t theft caused by the attack on the exchange). h ig h t ‣ Graph 2-3 Statistics of wallet projects suffered from security attack s Source:TokenInsight n ig h t nI n s ig k e nI n s e nI 2017 Nov Ethereum wallet Parity has a system bug, the To k developer starts the emergency mechanism, users' To assets are frozen k e To Dec Bitcoin hardware wallet Trezor exposed security vulnerabilities, developers launched emergency mechanisms to upgrade wallet firmware 2018 Jan Intel chip vulnerability incident continued to ferment, h t triggering mass panic of software wallet si g t Cryptocurrency hardware wallets Ledger which got 75 h Feb million dollars in the B round financing was exposed to In s igvulnerabilities h t en In ig Apr Myetherwallet wallet had a security incident and e n s hackers stole at least $13,000 in two hours n k nI Aug Bitcoin wallet developed by John McAfee, Bitfi hard To e wallet project was broken k To Bitpay wallet had problems when using third-party Nov services, the project side recommended users to o k Dec transfer assets A group at the Chaos Communications Congress claimed to master the method of cracking most T t hardware wallets and demonstrate it h ht 2019 Jan Hackers stole $750,000 worth of bitcoin using g i g Electrum wallet vulnerabilities t n s ig h n I n s Since the beginning of 2017, the security attacks and doubts of wallets have two characteristics: real- k e nI time and wide-ranging. Whether it is a hardware wallet or a light wallet, security holes are inevitable. e To k Some wallet projects were attacked just after they entered the market, reflecting that the digital wallet e n To market is currently in the initial stage of technology or management in the security field. The architectures of various security audits and parameter standardization have not been established. To k h t t ig h ns GLOBAL TOKEN & RATING AGENCY ig 6
s i h t n In s ig g 数字钱包安全性报告 e n s i To k nI In ke ‣ Graph 2-4 Comparison between wallet vulnerability loss and exchange e n To k vulnerability loss To Source:TokenInsight 钱包漏漏洞洞损失 交易易所漏漏洞洞损失 12 损失⾦金金额(亿元) 10 h t 7 ig h t n s ig h t nI s 5 n ig k e 2 nI n s To 0 k e e nI To 2013 2014 2015 2016 2017 2018 k To Due to their different internal architectures, wallet projects have large differences in storage methods and business modules. Regardless of the type of wallet, there are different levels of security risks in terms of private key storage and transaction security. The loss caused by wallet vulnerabilities in h t 2018 was about $1.2 billion, 1.4 times the loss of the exchange in 2018. si g h t ig t ‣ Graph 2-5 Classification of wallet risk vulnerability In Source:TokenInsight s h en n In n s ig k e Carrier Risk nI To Private Key k e Storage Risk Network To Supply Chain To k Protocol Risk Risk t Technical Risks Artificial Risks h ht Authority Chain Login Risk g i g t Risk n s Trading Risk ig h n I n s k e Asset Transfer e nI To Risk k e n To After conducting data research on nearly 120 projects in the wallet industry, TokenInsight found that To the security problems that arise in the use of wallets mainly include technical risks and artificial risks. k The technical risks can be divided into carrier risk, private key risk, network risk, trading risk, login risk h t and asset transfer risk, the artificial risks include supply chain risk and privilege chain risk. t ig h ns GLOBAL TOKEN & RATING AGENCY ig 7
s i h t n In s ig g 数字钱包安全性报告 k e In s i To e n n In o k Ⅲ. Technical TRisk k e To According to the time of storage and transaction of digital assets, t technical risks involve the following aspects: carrier risk, private key h ig h t storage risk, network protocol risk, login risk, transaction risk, asset s transfer risk, etc. n I Carrier Risk ig h t n n s ig nI s 3.1 ke e nIn To k By product form, wallets can be classified into hardware wallets and software wallets. The carrier of To k e the hardware wallet is a physical device with a dedicated encryption chip, and the private key is stored To in a protected area within the device. Taking Ledger as an example, its structure is composed of a security encryption chip, a display screen, a push button, etc. In addition to the basic private key storage and transaction functions, the wallet has detailed functions such as PIN verification, seed t repair, and transaction initiation confirmation. The hardware wallets account for about 24% of the h si g h t wallet projects in the market, the rest is the software wallets. Generally, the security level of the ig hardware wallet security encryption chip is required to reach CC EAL4 (that is, the financial encryption In s h t chip standard). According to TokenInsight statistics, projects that meet CC EAL4 and above account en In ig for about 65% of the total project. The failure of the security encryption is one of the reasons for the n n s k e security problems in the use of the wallet. nI To e ‣ Graph 3-1 Comparison of the number of wallets k To k Source:TokenInsight 硬件钱包 24% To h t t g ig h t n s 软件钱包 76% ig h nI s ‣ Graph 3-2 Comparison of the security e level of hardware wallet encryption chip k nIn To Source:TokenInsight k e e n 未达到⾦金金融加密芯⽚片标准 35% To To k h t 达到⾦金金融加密芯⽚片标准 t ig 65% h ns GLOBAL TOKEN & RATING AGENCY ig 8
s i h t n In s ig g 数字钱包安全性报告 e n s i To k nI In ke e n To k ‣ Graph 3-3 Statistics of chip implementation standard for To wallets with eligible secure encryption levels Source:TokenInsight 9 数量量 7 h t ig 5 h t n s ig h t nI s 4 n ig e nI s 2 k e nIn To 0 CC EAL4+ k CC EAL5 CC EAL5 + CC EAL5+ CC EAL6 e To k To Note: CC (Common Criteria) is the result of the unification of various existing standards by the International Organization for Standardization and is the most comprehensive evaluation criterion at present. CC divides the evaluation process into two parts: function and guarantee. The evaluation t level is divided into EAL1, EAL2, EAL3, EAL4, EAL5, EAL6 and EAL7 in seven levels. h si g h t According to TokenInsight's 2018 Most Valuable Wallet - Hardware Wallet List (see Appendix for ig details) Top10 samples, the processing chip security level is up to 70%. Trezor's Model T, One and In s h t KeepKey do not use financial-grade security encryption chips, the rest are all up to standard. This en n In s ig reflects that in the digital wallet market, especially in the hardware wallet market, there is currently no n e nI agreement on industry standards, and parameter normalization is still one of the problems that the k To e digital wallet industry needs to solve. k To k ‣ Graph 3-4 Software wallet forms Source:TokenInsight PC To g ht Forms ht Software Wallet Mobile s i g h t n In Web s ig k e nIn The other type is the software wallet, which basically has three forms: PC, Mobile, and Web. Since To k e computers and mobile phones are not professional encryption devices, it is generally considered that e n To the carrier security of the PC wallet and the mobile wallet is lower than that of hardware wallet; the Web wallet is considered to be less secure due to the need of frequent connection with the network To k during operation. h t Therefore, it is generally considered that the security of the carrier is: hardware wallet > PC / Mobile t ig wallet > Web wallet h ns GLOBAL TOKEN & RATING AGENCY ig 9
s i h t n In s ig g 数字钱包安全性报告 e n s i To k nI In ke n 3.2 Private Key Storage Risk To k e To Wallet private key management is the core of digital asset security. The essence of the wallet is to help users manage and use the private key conveniently and securely. Wallets can be classified into two types according to the storage method of the private key: centralization and decentralization. In the decentralized wallet, the private key is kept by users and will not be uploaded to the database of t the wallet project party. The centralized wallet means that the private key is centrally managed by the h t project party. The latter's financial risk will be more concentrated in the wallet project side, and its ig h centralized server becomes the target of being attacked more than the decentralized wallet. s t n ig Therefore, from this perspective, it is generally considered that the wallet private key is safer for h nI s ig decentralized storage. nIn s ke ‣ Graph 3-5 Centralized wallet private key e nIn To management mode k e To Source:TokenInsight Private key of user 1 k Upload to project side server for unified Private key of user 2 To management h t si g h t Private key of user 3 In ‣ Graph 3-6 Decentralized wallet private key s ig h t en management mode Source:TokenInsight n In s ig k e Local storage Private key of user 1 nIn To k e Local storage To Private key of user 2 To k Local storage Private key of user 3 h t ‣ Graph 3-7 Comparison of the number t g ig h of wallets with different storage t methods of private key 来源:TokenInsight n s ig h nI 中⼼心化钱包 n s nI 21% k e To k e e n To 去中⼼心化钱包 To k 79% At present, the proportion of decentralized wallets is higher than that of centralized wallets, and about h t 79% of wallets are decentralized wallets. It reflects the consensus that digital wallet users have t ig higher security in decentralized wallets. h ns GLOBAL TOKEN & RATING AGENCY ig 10
s i h t n In s ig g 数字钱包安全性报告 e n s i To k nI In ‣ Graph3-8 Comparison of ke e n To k numbers of open-sourced To wallets Source:TokenInsight 未开源钱包 40% h t ig h t n s ig 开源钱包 h t nI s ig 60% e nIn s k e nIn To ‣ Graph 3-9 2018 Most Valuable Wallet - Light Wallet - China list of partial evaluation data k e Source:TokeInsight To k China-SPV/centralized To ht Cobo Qbao Kcash MEET.O Secry imToken Token Math Name BitKeep Bitpie Wallet Network Wallet NE pto Wallet Pocket Wallet si g h t In Open source × × s× ig× × × √ × ht √ √ en nIn n s i g k e n I In addition, the user's private key generation operations and transactions may be recorded and To k e obtained by other users, and the core code of the wallet may be reverse broken to trigger such an To k attack. In order to facilitate the users' trust and accelerate the algorithm upgrade of the product, some project parties choose to open source the program, upload the code to Github or other communities to publicize. To ht Except the potential risk of being attack due to the program vulnerabilities and the failure of upgrade g h t in time, the open-sourced code of this project is beneficial for the secure storage of users' digital s ig h t assets in the long term. According to TokenInsight's 2018 Most Valuable Wallet-Light Wallet-China's nIn s ig List (see Appendix for details), 30% project in Top10 is open-sourced, while in the statistics of nearly e nIn 120 wallet projects at home and abroad, the open source ratio is 60%, and the web-side wallet k To accounts for the majority. k e e n To k Note: The open source program here refers to the core code and related programs that constitute the wallet architecture. It is considered as partially open source when the publicity program is not compilable. To h t t ig h ns GLOBAL TOKEN & RATING AGENCY ig 11
s i h t n In s ig g 数字钱包安全性报告 e n s i T o k e nI n In 3.3 Web Hijacking Risk and Login k e To Risk Most of the digital asset transactions require network connection. Users may suffer from phishing To k attacks due to HTTPS hijacking and DNS hijacking. 1It is not uncommon for users in centralized exchanges to suffer losses due to HTTPS hijacking and DNS hijacking. There are two precautions against this: h t ig t 1) Collect and safekeep the link address of the wallet to reduce the possibility of entering the fake h s website n ig h t nI n s 2) A professional firewall can be used to intercept and filter phishing websites on the network. ig k e nI n s To e nI ‣ Graph 3-10 Reasons analysis for users' webpage hijacking Source:TokenInsight k e To Browser problem k Analysis of the Unverified domain To User's reason name reasons for i g ht webpage hijacking Unverified server certificate t n s ig h Expired server Project side reason t I s h en n ig certificate n I s verification login k e ‣ Graph 3-11 Comparison of the number of wallets with or without two-factor nIn To e Source:TokenInsight 没有双因⼦子验证 k 42% To To k 具有双因⼦子验证 h t t 58% g h Two-factor verification proves the identity of the visitor through two independent and irrelevant ig t n ig h evidences. Using this technology in the login phase can improve the security of the user's digital s assets. Currently, the wallet with this function accounts for about 42% of the industry projects. Most of nI s the project parties use the dynamic password provided by Google plus the user's original login n e nI password as the two-factor verification architecture. However, this technology may fail in the face of k e To sender ID spoofing attacks, so users should develop good security awareness to deal with such k e n To attacks. 2 1. The webpage hijacking risk refers to the attack the user might suffer from during interaction with the data o k T network when using the wallet if the user does not verify the certificate of access address or the certificate has expired. In the process, hijackers will be stealing access data and can ultimately cause the user's digital assets to be at risk of loss. h t 2. In the Sender ID spoofing attack, the attacker uses the official identity of fake Google to send emails to the user t to obtain other private information such as the dynamic password, and finally log in as the user. This type of attack ig is extremely harmful for some wallets with low security defense capabilities. h ns GLOBAL TOKEN & RATING AGENCY ig 12
s i h t n In s ig g 数字钱包安全性报告 e n s i T o k nI In ke e n 3.4 Trading Risk To The transaction requires a private key signature for authorization, including multiple signatures and To k single signatures. Single signature means that only one user has a private key and has full autonomous trading rights. h t t The multi-signature mode is that a digital asset is managed by multiple people, and the private key ig h holder who needs to meet the lower threshold signs with the private key. For client wallets that are s t n ig less encrypted than hardware wallets, the multi-signature mode has the advantage of reducing h nI n s individual risk and improving the security of digital asset transactions. According to statistics, wallets ig k e nI that support multi-signatures in the client wallet account for 31%. n s To k e ‣ Graph 3-12 Comparison of the number of wallets with or e nI To k without multi-signature To Source:TokenInsight ⽀支持多签名 31% h t si g h t In s ig 不不⽀支持多签名 h t en n ig 69% n I s k e ‣ Graph 3-13 2018 Most Valuable Wallet - Light Wallet - Overseas nIn To list of Top10 evaluation data Source:TokenInsight k e Overseas-SPV/centralized To To k Freewallet HB Coinbase Copay Bitcoin Trust Green Bread Edge Citowise Uphold t Name Series Wallet Wallet Wallet Wallet Address Wallet g h h t ig ht Multi- √ × × √ √ × × × √ × signature n s i g nI In s ke n According to the Top10 (see Appendix) projects in the 2018 Most Valuable Wallet - Light Wallet - e To k Overseas list published by TokenInsight, the proportion of projects supporting multiple signatures is e n To low. Although the multi-signature mechanism is currently more secure than single-signature, it is more widely used for large-scale managed projects or enterprise-level customization, and the technology is To k not yet popular for individual users. h t t ig h ns GLOBAL TOKEN & RATING AGENCY ig 13
s i h t n In s ig g 数字钱包安全性报告 e n s i To k nI In ke e n To ‣ Graph 3-14 Wallet multi-signature usage scenario analysis k Source:TokenInsight large-scale managed projects asset management To ht Multi-signature Enterprise Digital Asset i g usage scenario h t Management In s ig Centralized exchange asset h t n n s management ig k e nI n s To k e nI For individuals troubled by high cost when using the multi-signature mechanism, "private key + e To k transaction password" mode offers an alternative solution to reduce the trading risk. In addition to the To private key, users also need to input password to confirm and complete the transaction of digital asset. BitKeep Wallet has adopted the DESM algorithm based on SHA256 + AES256 + cloud authentication encryption system to double encrypt user's single-signature wallet. The method of h t using single-signature mechanism with private key and double confirmation with password can greatly si g reduce the trading risk. h t In s ig h t en n ig ‣ Figure 3-15 Wallet transaction secondary n I confirmation password usage specification s Source:TokenInsight k e nIn To k e PIN(Fixed string) Transaction secondary confirmation To Dynamic instruction (one-time password) To k password usage User-specific information h t t (fingerprint, etc.) g ig h t n s ig h In terms of usage specifications, the current secondary confirmation mechanism adopted by the nI n s wallet industry uses fixed strings, dynamic passwords, and user-specific attribute verification. From k e nI the perspective of cryptography, it is generally considered that user-specific attribute verification has e To k a higher security level. For example, Math Wallet uses biometric security authentication technologies e n To such as fingerprints and face recognition for large-value transfers. T According to TokenInsight's incomplete statistics, the wallet industry has a large number of projectso k using fixed strings in the transaction secondary confirmation password usage specification, and the h t number of projects using the user-specific attribute verification method is the least. The technical t ig specifications adopted by the wallet industry to reduce transaction risk remain to be unified. h ns GLOBAL TOKEN & RATING AGENCY ig 14
s i h t n In s ig g 数字钱包安全性报告 e n s i T o k nI In ke e n 3.5 Asset Transfer Risk To To k When a mobile device or hardware wallet carrying a client wallet is lost, it may result in the loss of digital assets. Since the general mobile device does not have a professional encryption function, the probability of theft of digital assets is large. The hardware wallet generally has the function of brute h t force cracking. For extreme situations, some hardware wallets have a violent disassembly and self- ig h t destruction module, that is, the data is destroyed before the illegal visitor obtains the private key. This n s ig kind of the wallets accounts for about 9% of the hardware wallet, the current popularity is not high. h t nI n s ig nI s ‣ Graph 3-16 Number of hardware wallets ke that support self-destruction e ⽀支持暴暴⼒力力破解⾃自毁 nIn To 9% k Source:TokenInsight To k e To ht 不不⽀支持暴暴⼒力力破解⾃自毁 t 91% si g h In s ig h t en n ig ‣ Graph 3-17 Number of wallets that support n different BIP protocol standards I s Source:TokenInsight k e nIn To k e⽀支持BIP-44 To k 86% To ⽀支持BIP-39 h t 14% t g ig h t s h Another way to safely transfer digital assets after the terminal is lost is to use the HD (Hierarchical n ig nI s Deterministic) wallet mentioned above. The specific implementation standard is the BIP protocol e nIn series. The complicated technical operation can be simplified by the BIP protocol. BIP protocols for k To mainstream wallets include BIP-39 and BIP-44. k e e n To Simply speaking, the protocol can turn a complex private key into a mnemonic, basically in the form of 24 (or at least 12) words + passphrases (null or no), and the user will back up the generated To k mnemonics. If the wallet is lost, the digital asset can be safely transferred using the same standard BIP wallet. h t t ig h ns GLOBAL TOKEN & RATING AGENCY ig 15
s i h t n In s ig g 数字钱包安全性报告 e n s i To k nI In ‣ Graph 3-18 Private key anti-brute force ke e n To k architecture supported by mainstream wallets To Source:TokenInsight Hardware wallet biometric confirmation ht Mobile transaction Private key+PIN i g h t secondary password In s ig Web transaction h t n n ssecondary password ig k e nI n s e nI In addition to using the HD (Hierarchical Deterministic) wallet to secure the transfer of assets when To k losing a wallet, the wallet will also include a secondary transaction confirmation password in the e To k program. Generally, it is a PIN or a user-specific information attribute (such as a fingerprint). This To module can delay the speed at which the private key is cracked when the wallet is lost, and strive for time for the security transfer of users' digital assets. Once the wallet's anti-brute force module is broken and the user's private key is stolen, the digital asset is considered to be lost. h t ‣ Graph 3-19 Comparison of wallet features using si g ordinary and contract addresses Source:TokenInsight h t In s ig h t en n ig HD wallet + Ordinary I = Simplified + Safe transfer of architecture e n address storage trading process assets n s HD wallet architecture +To k Contract address storage = Simplified trading process +ke nI Reduced risk of theft + Safe transfer of assets To To k In order to solve the problem that the broken login PIN of wallets without secondary protection can h t t easily cause security issues, it is also possible to use the blockchain's own framework technology to g ig h t perform secondary asset encryption, so that the user can control the digital assets more strongly. For s ig h example, if the ETH is stored by using the smart contract address instead of the ordinary address, the n nI s transaction will be successful only after both the private key signature and a separate password are n k e required to invoke the contract each time the ETH is transferred out, e nI To k The scheme is currently in use at the EtherSafer wallet project, which features low cost and a high e n the risk of theft of the users' digital assets. To level of security. The secure storage of ETH wallets using the contract address can effectively reduce To k h t t ig h ns GLOBAL TOKEN & RATING AGENCY ig 16
s i h t n In s ig g 数字钱包安全性报告 k e In s i To e n n In k e To IV. Artificial Risks To k Among the security risks of digital asset storage and transaction, in t addition to the security threats caused by technology, there are also h ig h t risks brought by the manual operation of different wallets due to s ig business needs, including supply chain risk, authority chain risk, etc. n I Supply Chain Risk h t n In s ig k e4.1 n n s To k e nI Supply chain risk is particularly evident in the security threat of hardware wallets. As a physical e To k product, from the production of the enterprise to the use of the user, the hardware wallet may To experience problems such as product damage and firmware tampering caused by the above process. The supply chain risk management methods currently used by project sides engaged in hardware wallet production generally are: 'logistics security guarantee' + 'initial verification'. h t t Note: Usually the meaning of supply chain risk refers to materials flowing through the supply chain si g h from production and distribution enterprises to users, generating different flows such as business, In s ig h t logistics and information flow, involving many processes such as distribution processing, storage, en In ig packaging, transportation, loading and unloading, distribution and information processing. Any risk n caused by problems in these links is called supply chain risk. e n s To k ‣ Graph 4-1 Number of wallets that support logistics security guarantee e nI Source:TokenInsight k 不不⽀支持物流安全保证 20% To To k h t t g ig h t n s ig h nI s ⽀支持物流安全保证 k e nIn 80% To k e We can see from Graph 4-1 and 4-2 that 80% of the hardware wallet projects support logistics e n To security guarantee in response to supply chain risks. The main approach is to monitor its own product links and coordinate with the logistics chain. 90% of the hardware wallet projects support initial o k verification, and most project parties are already taking measures to control the risks. The project parties who are pursuing the user experience have also adopted some special methods, such as T h t peer-to-peer logistics, which can reduce the supply chain risk again. Overall, the digital wallet industry t ig has achieved initial success in supply chain risk management and control. h ns GLOBAL TOKEN & RATING AGENCY ig 17
s i h t n In s ig g 数字钱包安全性报告 e n s i To k nI In ke e n To k ‣ Graph 4-2 Number of wallets that To support initial verification Source:TokenInsight 不不⽀支持初始化验证 10% h t ig h t n s ig h t nI n s ig k e ⽀支持初始化验证 nI n s To 90% k e e nI To k ‣ Graph4-3 Hardware wallet comprehensive ranking Top10 list Source:TokenInsight To h t si g h t Hardware Wallet In Name Blue Model T Nano S s KeepKey ig ONE BEPAL Q Digital Bitbox Bepal Pro S h BiPal t Keywallet Touch en In s ig en Overall 11.7 9.8 9.7 9.5 9.4 9.3 9.1 9 8.7 8.3 Rating k In Ranking 1 To 2 3 4 5 6 k 7 en 8 9 10 To o k T ht In TokenInsight's 2018 Most Valuable Wallet - Hardware Wallet List (see Appendix for details), there g h t are 22 wallets from 16 companies at home and abroad, including(Ledger)Blue with a s ig h t comprehensive ranking of 11.7 points at the top of the list and BEPAL-Q ranking top in China with a nIn score of 9.4 points, ranking sixth overall. s ig k e nIn To k e e n To To k h t t ig h ns GLOBAL TOKEN & RATING AGENCY ig 18
s i h t n In s ig g 数字钱包安全性报告 e n s i To k nI In ke n 4.2 Privilege Chain To k e In many centralized wallets, in addition to physical chains (usually hardware wallets or full-node To wallets) that can implement asymmetric encryption algorithms, there are also privilege chains (usually management systems composed of staff) that control transactions, time, amount, etc. as shown in the following graph of the managed system designed by InVauIt: the off-net storage room can be t regarded as the physical chain, and the network storage room can be regarded as the privilege chain, h t general centralized exchanges and trustee institutions engaged in large-scale custody services use ig such structures for digital asset management. s h t n ig h nI s ig ‣ Graph 4-4 Centralized wallet physical chain + e privilege chain schematic nIn s k Source:TokenInsight e nIn To k e To Privilege chain Use the physical contacts chain for k physical chain operation To i g ht Authorize the privilege chain t Confirm the transaction, n s for transfer ig h withdraw the privilege chain t I s h en n In n s ig k e ‣ Graph 4-5 Centralized wallet physical chain + authority chain structure example nI To e Source:InVault k To To k h t t g ig h t n s ig h nI n s k e e nI To k e n To To k h t t ig h ns GLOBAL TOKEN & RATING AGENCY ig 19
s i h t n In s ig g 数字钱包安全性报告 e n s i To k nI In ke n The physical chain and the privilege chain are isolated from each other in the architecture design. To k e After being authorized, both sides can contact and operate. When the transaction is over, the two To sides are again isolated. However, it can be found that the privilege chain actually has absolute control over the physical chain. Once a problem occurs in any dimension such as the time, object or amount of the transaction, the users' digital assets may be potentially threatened or damaged. h t ig ‣ Graph 4-6 Privilege chain risk incidents as a h t s percentage of centralized wallet security incidents n ig h t nI n s ig k e 涉及权限链⻛风险 nI n s To e nI 40% k e To k To 不不涉及权限链⻛风险 60% h t t In addition to physical chain risks, the asset security of a centralized wallet is also subject to the si g h artificial risks of privilege chain. This is particularly evident in the asset losses suffered by the In s ig h t centralized exchanges. According to statistics, about 40% of the centralized wallet losses in 2018 are en In ig related to privilege chain risks. In February 2019, the founder of the QuadrigaCX Exchange was n n s e nI missing (currently the Indian government has provided a death certificate), resulting in the loss of k To e $195 million digital assets of the exchange, which pushed the risk of privilege chains to the forefront of k To the digital wallet hosting security problems. Because the privilege chain risk is uncontrollable, it has become a difficult problem for asset security in the industry. o k T h t t g ig h t n s ig h nI n s k e e nI To k e n To To k h t t ig h ns GLOBAL TOKEN & RATING AGENCY ig 20
s i h t n In s igg e 数字钱包安全性报告 k In s i T o e n n In 5. Security Field o k Outlook k e T To In view of the industry development trend and the above-mentioned problems, it is currently believed that the hotspots in the security field of the wallet industry in 2019 will focus on the improvement of the h t security audit system, the development of wallets based on the ig h t security architecture, and the management of artificial risks of wallet n s asset management businesses. ig h t e nI In s s ig n k 5.1 Expansion of the Securitye Audit Business n To o k e nI T k To With the development of the wallet industry, the market will further expand. According to statistics, the creation time of existing wallets was initially concentrated in 2013. As of December 2018, the number of digital wallet projects has accumulated to more than 340, an increase of about 30% compared with 2017. h t si g ‣ Graph 5-1 Number of global digital h t In wallet projects s ig h t en n Source:Statista n I s ig 400 e nIn 项⽬目数量量(个) k To e 320 k To 240 o k T 160 80 ht 0 g 2013 2014 h t 2015 2016 2017 2018 s ig h t ig In terms of the growth rate of wallets, 2017 increased by about 62% compared with 2016, which was nIn higher than ever before. Although the growth rate in 2018 s slipped down, it is still much higher than e nIn the year before 2017. This reflects that the digital currency market is currently of a certain size. It is k To e expected that the mainstream wallet projects will increase by at least 20 in the global market in 2019. k e n To The original wallets are also actively expanding and adding new services. For example, Legder、 Xapo and other wallet companies focusing on secure storage have begun to deploy emerging To k businesses such as digital asset custody and asset management. Both the depth and breadth of the wallet industry itself are growing rapidly. h t t ig h ns GLOBAL TOKEN & RATING AGENCY ig 21
s i h t n In s ig g 数字钱包安全性报告 e n s i To k nI In ke n At present, all security reviews of wallet projects on the market have the following categories: To k e The first category is the technical risk security review. The current security review is based on the To following: carrier risk review (system vulnerability scanning, new user registration security, carrier environment detection, client integrity detection), private key storage risk review (mnemonic creation security, mnemonic storage security, private key generation security, private key storage security, locally stored data sensitivity detection), network protocol risk review (network proxy detection, h t certificate verification in https communication), login risk review (user information security, private key ig h t import security, transaction password security), transaction risk review (transaction creation security, n s ig transfer address security detection, transaction signature security, transaction confirmation, balance h t nI inquiry accuracy) etc. n s ig k e nI n s To e nI ‣ Graph 5-2 Various wallet security audit businesses Source:TokenInsight k e To k Hardware wallet security audit Chip security detection To h t si g h t Private key storage In s ig detection h t en n ig PC wallet n I security audit Network security detection s k e nIn To e Carrier detection k To Carrier detection To k ht Private key storage g h t detection s ig Mobile wallet Network security h t nIn security audit detection s ig k e nIn Login security detection To k e e n To Transaction security detection o k However, the above-mentioned security auditing business only audits part of the technical risks of mobile terminals, there are fewer technical risk auditing for hardware wallets and PC wallets. Overall, T h t the digital wallet security audit services need to be expanded. Therefore, based on the continuous t increase of wallet projects and services and the incompleteness of the existing security review ig h framework, the demand for wallet security audit business will further increase in 2019. ns GLOBAL TOKEN & RATING AGENCY ig 22
s i h t n In s ig g e 数字钱包安全性报告 kRise of Compatibility Wallets nIn s i T o 5.2 The e n In k e To k According to statistics, as of the Q4 quarter of 2018, the number of global digital asset wallets users To was 31.914 million, an increase of 10.4% from the previous quarter and an increase of 48.3% from the previous year. If the number of Internet users is the development target of the number of digital currency users, the total amount of users has 100 times expansion space. This means that it has great development potential and huge market space. With the development of blockchain technology, h t the market will usher in more diversified development in 2019, and more people will access and flood ig into the blockchain and digital currency industry. h t n s ig h t nI s ‣ Graph 5-3 Global digital currency user size n ig nI Source:Statista ke s 全球数字钱包⽤用户规模 n To 4,000 k e e nI 数字钱包⽤用户数(万) 3,200 To k 2,400 1,600 To h t 800 si g 0 h t ig 1 2 3 4 1 2 3 4 1 2 3 4 1 2 3 4 t Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q n 15 15 15 15 16 16 16 16 17 17 17 17 18 18 18 18 I s h 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 en ‣ Graph 5-4 Development of wallet user n In n s ig selection intention k e nI To e Source:TokenInsight k Early user selection To Late user selection To k ht Practicality Practicality Security g h t ig Due to the lack of understanding of asymmetric cryptographic algorithms and the unskilled use of s h t ig decentralized wallets, This part of emerging users will choose a centralized wallet as a storage tool to nIn reduce the security risks of their digital assets. s e After a period of time, as professional knowledge increases, users will seek to use a decentralized k nIn To k e wallet to pass on the security risks of digital assets from the wallet project to themselves. At this time, e n To the user has a certain stickiness to the original centralized wallet. If the wallet project party can provide another private key decentralized storage solution at this time, o k the user can satisfy the upgrade requirement of the user's private key security storage and can retain the user's original operating environment, and the project party can reduce the user loss and increase T the attractiveness of new users. h t t ig In summary, based on security and market development considerations, wallets that support h ns decentralized storage & centralized storage in 2019 will be a popular choice for users. GLOBAL TOKEN & RATING AGENCY ig 23
s i h t n In s ig g 数字钱包安全性报告 e n s i To k nI In ke e n To k ‣ Graph 5-5 2018 Most Valuable Wallet - Light Wallet - To China's List Evaluation Data Source:TokenInsight h t China-SPV/centralized s Name ig Cobo Qbao BitKeep Token imToken ht Kcash Bitpie MEET. Math t Secrypto sig Wallet Network Pocket Wallet Wallet ONE Wallet nIn ig h n Overall I 9.0 8.6 8.2 8.1 7.7 7.2 6.6 6.0 6.0 5.9 k e Rating n n s To Ranking 1 2 3 ke 4 5 6 7 e 8 nI 9 10 To k To Among the Top10 wallet projects in the Most Valuable Wallet - Light Wallet - China's List (see Appendix for details), Math Wallet、Cobo Wallet have begun to try compatibility services. According to t the development of the market, the wallet that supports the centralized and decentralized dual storage h si g t function will be more and more favored by users, and the new security issues brought about by the h In architecture upgrade are also worth noting. s ig h t en n In n s ig k e nI To k e To To k h t t g ig h t n s ig h nI n s k e e nI To k e n To To k h t t ig h ns GLOBAL TOKEN & RATING AGENCY ig 24
s i h t n In s g ig 数字钱包安全性报告 k e In s i T e n 5.3 AoStumbling Block to the Asset Management Business n In o k k e In terms of project functions, the wallet industry is not limited to the storage and transaction solutions T To to digital currency assets. The functions added on this basis include information service, asset management, lending, and DApp access. With the development of public chains and the involvement of traditional financial institutions, projects such as project docking, asset management and lending are rapidly emerging. More than 40 wallet project parties have launched digital asset management services. h t ig ‣ Graph 5-6 Wallet function overview h t n s Source:TokenInsight ig h t nI n s Storage and ig e nI s transaction k e nIn To k Information e To service k Wallet function overview Asset management To ht Lending si g h t In s ig DApp access h t en n I ‣ Graph 5-7 Wallet financial functionn n s ig overview k e nI To Source:TokenInsight Financial product k e To To k Fixed term Intellige Current h t t financial manage nt mining financial manage g ig h ment ment t n s ig h nI n s e nI ‣ Graph 5-8 Number of wallets with and k without asset management businesses e To Source:TokenInsight k e n ⽀支持资管业务 32% To To k h t 不不⽀支持资管业务 t ig 68% h ns GLOBAL TOKEN & RATING AGENCY ig 25
s i h t n In s ig g 数字钱包安全性报告 e n s i To k nI In ke e n To k ‣ Graph 5-9 2018 Most Valuable Wallet - Light Wallet - To China List Top10 Source:TokenInsight h t China-SPV/centralized ig h t n s Name Cobo Wallet Qbao Network BitKeep Kcash Wallet MEET. ig ONE Secryp to imToken Wallet Bitpie Token Pocket Math h Wallet t nI n s ig ke Financial √ √ e √ nI √ √ × × × I √ n s × To products k e n To k To Most of the organizations that have launched digital asset management services use a centralized approach to manage digital assets in the form of 'physical chain' + 'privilege chain'. With the rapid expansion of this business, the security risks are also increasing. Especially due to the uncontrollable h t nature of the 'privilege chain' risk, the fully managed wallets are very likely to face similar security si g vulnerabilities as of the centralized exchanges. h t In s ig The custody and asset management services in the wallet business are developing rapidly. Among h t en In ig the Top 10 of the most valuable wallet - light wallet - China list released by TokenInsight (see n n s e nI Appendix for details), Cobo Wallet、BitKeep、Token Pocket and 3 other wallets have launched k To financial management services, and digital assets stored in the centralized wallets will grow rapidly. k e For the asset management services that are about to develop rapidly, the artificial risks such as To private key control and manual transfer brought by digital asset centralized storage will be an urgent problem to be solved. If it is impossible to find a solution that reduces the artificial risks, the security of To k digital assets will be plagued by artificial risks. h t t g ig h t n s ig h nI n s k e e nI To k e n To To k h t t ig h ns GLOBAL TOKEN & RATING AGENCY ig 26
s i h t n In s ig g 数字钱包安全性报告 e n s i To k nI In ke e n Appendix To To k h t ig Hardware Wallet h t n s ig h t nI Number Operatio Hardwar Chip Operatio Product Name Price Target of Major n s Quantity n e User- Security n ig Overall e nI s Rating Groups Currenci Rating Standar friendlin Level Perform Ratings k n es d Rating ess Rating ance To Blue 6 k e Enterpri 16 10 0 2 e 8 nI 10 11.7 To se k To Individu Model T 6 al 6 6 0 0 10 10 9.8 Individu Nano S 6 al 16 10 0 0 8 10 9.7 h t t Individu si gKeepKey 6 al 3 h 4 -1 2 10 10 9.5 In ONE 10 Individu s 5 ig 6 -1 0 10 10 ht 9.4 en al nIn Individu s i g BEPAL Q 8 k e al 6 6 0 2 n In 6 6 9.3 To ke Individu Digital Bitbox 10 al 2 4 0 0 10 10 9.1 Bepal Pro S 6 Enterpri se 6 6 0 To 2 6 6 9.0 To k Individu BiPal 6 9 8 0 0 10 6 8.7 t al g h Keywallet Touch 10 h Individu t 6 6 0 0 8 6 8.3 s ig al h t n ig Swiss Bank in Individu I 7.4 8 4 4 0 0 10 6 Your Pocket al s 链盾 k en 0 Individu al 4 4 0 nIn2 6 4 7.1 To k e e n To Individu 7.0 k LUBANSO X1 6 6 6 0 0 6 6 al KASSE HK-1000 10 Individu al 6 6 0 0 7 6 To 7.0 Individu CoolWallet 8 h t al 3 4 0 0 t 8 6 6.7 ig h ns GLOBAL TOKEN & RATING AGENCY ig 27
s i h t n In s ig g 数字钱包安全性报告 e n s i T o k nI In ke e n Wallet List To To k Nu Hie Op Mul Tw Pri Num mb Sta Sta Tra Mar Fin DA Soc Ov h t rar chi en So ti- sig o- ste vat e ber of er of rs rs - nsa ctio ket Info anc ial pp Acc ial Fun eral l t cal urc nat p Key Com Co Rat n rma Too ess ctio Rat ig Name h Det e ure veri Sto ment mm ing Ser tion ls n ing s t erm fica rag s ent vic s n inis tion e s- ig e h nI s tic Loc Rat ig atio ing e n nIn China-SPV/centralized s k nIn To Cobo Wallet 1 0 1 1 ke 1 2,531 10 5 10 1 0 e 1 0 1 9.0 To k 8.6 To Qbao Network 1 0 0 0 1 373 8 4 8 1 1 1 1 1 BitKeep 1 0 0 0 1 77 4 4 8 1 1 1 1 1 8.2 Token Pocket 0 1 0 1 1 58 2 4.0 8 1 1 1 1 1 8.1 i g ht imToken Wallet 1 1 0 0 1 286 t 8 4.5 9 1 1 0 1 0 7.7 n s Kcash Wallet 0 0 1 1 1 ig h 160 4 4 8 1 0 1 1 t 0 7.2 I s h en n ig Bitpie 1 0 0 0 1 403 8 4 8 1 1 0 1 0 6.6 I s en 6.0 n MEET.ONE 0 0 0 0 1 6 0 5 10 1 1 1 1 0 k I o en Math Wallet 0 1 0 0 1 24 2 4 8 1 1 0 1 0 6.0 Secrypto T 0 1 0 0 1 76 2 3.5 o k 7 1 0 0 1 1 5.9 T o k Freewallet Series 1 0 1 1 Overseas-SPV/centralized 0 504 8 4.5 9 1 1 0 1 0 7.7 T ht t HB Wallet 1 0 0 1 1 377 8 4 8 1 0 0 0 1 6.6 g Edge 1 1 ig 0 h 1 1 66 2 4.5 9 1 0 t 0 0 0 6.1 Coinbase Wallet 0 n 0 s 1 1 0 201 4 4 8 1 ig 1 h 0 0 0 5.2 I s en n Copay Bitcoin nI 1 1 1 0 1 95 4 3.5 7 0 0 0 0 0 5.1 Wallet k o ke 5.0 n Citowise 1 0 0 0 1 622 10 5 10 1 0 0 0 0 T e To k Uphold 0 0 0 1 0 2,638 10 5 10 1 0 1 0 0 5.0 Trust Wallet 1 0 0 0 1 1,793 10 4.5 9 0 0 0 1 0 To 4.9 Green Address 1 1 1 1 0 27 2 3 6 0 0 0 0 0 4.8 ht Bread Wallet 1 1 0 0 1 989 10 3.5 7 0 0 0 0 0 4.7 i g h t n s GLOBAL TOKEN & RATING AGENCY ig 28
s i h t n In s ig g 数字钱包安全性报告 e n s i To k nI In ke e n To Wallet Lists,samples are divided into SPV and centralized wallets. The output is divided into domestic development wallet and foreign wallet. To k Hierarchical certainty - whether multiple addresses can be controlled by a private key h t ig Whether the wallet is open sourced h t In s ig Yes: +1 point; No: 0 point h t A total of nine s ig en Whether the wallet has dual verification? dimensions are Boolean values. nIn s o k Multi-signature - a dimension mostly owned by the e enterprise-level wallet nIn T k One of the indicators for measuring safety e To k To User experience: transaction services; market information; Yes: +1 point; No: 0 point financial tools; DApp access; social functions Private key storage User retention, wallet retention, third party retention +1 point, 0 point, -1 point t location i g h t Take the quartiles of the number h of comments(10 points, 8 s The first data source of comments is the App store, the US ig points, 4 points, 2 points, 0 In Popularity account; s The second source is google play; the rating stars are in the points) h t en n ig same order. n I Stars *2 as star rating s k e Hardware Wallet nIn To ke 100: 6 points 10: 10 points g h Executive standard i g ht The higher the standard, the higher the score, which is an additional subtraction BIP44: 0 point; t BIP39: 1 point n s There are different forms such as tablets, U shields, cards, ig h Tablet: 2 points; Type n I etc. Score according to friendliness. n s Others: 0 point ke Chip security level The higher the security level, the higher the score e nI CCELA 4+ 6;CCELA 5+ 8 To Excellent k e n To k The company received more than $10 million financing, has o leading technology and feasible profit methods; T Good The company received less than $10 million but more than Operating conditions of Excellent 10 points;Good 6 $1 million financing; the technical level is in the upper manufacturers points;General 4 points reaches of the industry and profit methods are feasible; General h t The company received less than $1 million financing, the technical level is in the middle reaches of the industry, and t igthe profitability has bottlenecks. h ns GLOBAL TOKEN & RATING AGENCY ig 29
TokenInsight Inc. Global Token Data & Rating Agency 获取最新区块链⾏行行业数据研究报告 ⽹网站链接 www.tokeninsight.com INSIGHT 合作邮箱 bd@tokeninsight.com TOKEN 其他联系⽅方式 官⽅方微信公众号 | Tokenin 官⽅方Twitter | TokenInsight 官⽅方新浪微博 | TokenInsight 官⽅方Telegram中⽂文电报群 http://t.me/TokenInsightChinese 官⽅方微信联系⼈人⼆二维码 ⼩小程序⼆二维码
You can also read