- The dilemmas of phone security
- What is the Secure Enclave?
- What is Biometric Authentication: FaceID?
- What about Security and Android Phones?
- Future uses of StrongBox
- Introducing Hot Storage Vault powered by Secure Enclave
- Hot Storage in Action:
- I. Open Vault
- II. Input Asset
- III. Lock Asset
- IV. Instantly retrieve asset
New Instant Access Hot Storage enables secure local storage of digital assets such as crypto and NFTs with immediate on-device retrieval, and safeguards them from loss by backing them up in your digital Vault.
Have you ever wanted to access your digital assets instantly, but also be sure that they are protected to the fullest extent?
Do you ever think about what happens to your digital assets if your phone is stolen or lost?
Do you want to reduce the time it takes to access assets in your digital Vault?
The dilemmas of phone security
When we started Vault12 in 2014, mobile phones were pretty insecure: all one needed was a USB cable to download the contents of any phone. Internal phone storage was not a secure location for high-value digital assets, so we designed Vault12 from the ground up to implement robust storage security for these early insecure phones.
Since then phone security has dramatically improved - first thanks to pioneering work from Apple on iPhone and iOS, and more recently in Google Android phones.
The two biggest innovations that have enabled robust security on phones are:
- The Secure Enclave - cutting-edge technology with its own separate tamper-proof processing unit, memory, and operating system making it extremely hard to get unauthorized access to native cryptographic keys stored inside.
- Biometric Authentication - Apple also pioneered FaceID that is fully controlled by the Secure Enclave at the hardware level, which means even if iOS itself is compromised on your phone, it doesn't give attackers any ability to trick FaceID and unlock the security enclave.
The Secure Enclave approach has been extended across all of Apple's devices, and Cloud vendors have also started implementing the same security architecture to protect sensitive data in the cloud.
With these capabilities setting new standards for device security in both Apple and Google ecosystems, Vault12 can now leverage these hardware innovations to provide simple instant access to locally-stored digital assets - all while providing a robust, distributed, decentralized social recovery backup that is the hallmark of the Vault12 Cryptostorage platform.
What is the Secure Enclave?
The Secure Enclave is a dedicated secure subsystem integrated into Apple systems on chip (SoCs). The Secure Enclave is isolated from the main processor to provide an extra layer of security and is designed to keep sensitive user data secure even when the Application Processor kernel becomes compromised.
The Secure Enclave makes it close to impossible for hackers to decrypt sensitive information remotely, and also extremely hard even if they illegitimately gain full physical access to your device (loss or theft case). Because the Secure Enclave is a separate system, and because your primary operating system never actually sees the decryption keys, it's incredibly difficult to decrypt your data without knowing your PIN code.
The risk factor for the Secure Enclave is PIN codes - if your pin code is easy to guess or too short to brute force, losing your phone might eventually lead to other parties getting access to your data on the phone days or months later - keep that in mind while deciding what assets should be included or excluded from "hot storage" access. Vault12 does not use the PIN capability of Secure Enclave to prevent such risks from affecting you.
Third-party apps, such as Vault12, can also create and store strong cryptographic keys in the enclave to lock down data, but the apps never have access to the keys themselves. Instead, apps make requests for the Secure Enclave to encrypt and decrypt data. This means any information encrypted using the Secure Enclave is incredibly difficult to decrypt on any other device.
When you store a private key in the Secure Enclave, you never actually handle the key, making it difficult for the key to become compromised. Instead, you instruct the Secure Enclave to create the key, securely store it, and perform operations with it. You receive only the output of these operations, such as encrypted data or a cryptographic signature verification outcome.
Many attempts have been made to hack the Secure Enclave, however, none have succeeded in remotely retrieving anyone's keys.
In 2017 a hacker was able to decrypt the Secure Enclave firmware. However he was unable to gain access to any private keys, so there was no actual exploit.
In 2020 a well-known group of Chinese hackers discovered an "unpatchable" exploit on the Secure Enclave chip used by older Apple devices. While it is unclear what was possible with this specific vulnerability, direct access to the physical phone was required to conduct a hack. Apple has already fixed the security breach in A12, A13 and M1 chips.
More details on Apple's Security architecture is available in its annual Platform Security Guide.
What is Biometric Authentication: FaceID?
Biometric authentication relies on technical sensors that allow you to prove that you are who you say you are using attributes that are unique to each human being. Examples include retina scanning, fingerprint scanning, and facial recognition. Apple has been at the forefront of research and implementation of facial authentication known as FaceID.
Security & Privacy Features:
- Face ID data is encrypted with a key that is only available to the Secure Enclave. This data is continuously updated to record changes in your appearance. This data is used to train a neural network in order to enhance the effectiveness of your authentication experience.
- Face ID data does not leave your device and is not backed up to the iCloud. Supported applications that use Face ID for authentication are only notified about whether the login was successful. Apps can not access the Face ID data associated with your enrolled face.
Since your FaceID data never leaves your phone and is natively stored inside your phones hardware, it means that hackers cannot "spoof" your face by hacking into some cloud biometric data server and pretend to be you to unlock your keys.
What about Security and Android Phones?
Security on Android smartphones has historically been below the standard set by iPhones. Even when top Android manufacturers started introducing secure hardware in their devices, the lack of Android platform standards led to a highly-variable array of software, secure architecture approaches, and, eventually, to many bugs.
After years of evolution and in response to market needs, Google introduced a tamper-resistant hardware enclave called Titan M which enables tamper-resistant key storage for Android apps, using StrongBox.
StrongBox is an implementation of Android Keymaster API, which resides in a hardware security module of an Android device. With this security enhancement standard, Google paved the way for Android devices with secure elements to reach a unified security level across the industry, and to implement features that were previously impossible, like secure applets and functions made available across the Android ecosystem - not just to a single manufacturer.
The downside, however, is that these capabilities are new, and at the time of writing there are still only 8 models of Android smartphones that support this highest level of security. You can check them here.
Google Pixel 4 and newer, and Samsung Galaxy Series 20 are on the list. Hopefully, the list will be populated soon with many more devices by a variety of major Android manufacturers, thanks to Google's initiatives.
However, Biometrics (Touch/FaceID) on Android phones still varies by manufacturer, and it is challenging to judge the security of those varying implementations across the industry in a consistent way.
Future uses of StrongBox
StrongBox and tamper-resistant hardware are becoming important requirements for emerging user features, including:
- Digital keys (car, home, office)
- Mobile Driver's License (mDL), National ID, ePassports
- eMoney solutions (for example, Wallet)
All of these features must be run on tamper-resistant hardware in order to protect the integrity of sensitive resources like application executables, user data, and encryption keys.
In order to accelerate the adoption of these new Android use cases, Google has formed the Android Ready SE Alliance. SE vendors are collaborating with Google to create a set of open-source, validated, and ready-to-use SE Applets. StrongBox for SE is now qualified and ready for use by Google's OEM partners and currently available from Giesecke+Devrient, Kigen, NXP, STMicroelectronics, and Thales.
You can visit the Android Security and Privacy developer site for more info.
Introducing Hot Storage Vault powered by Secure Enclave
As security on Apple's phone has improved and evolved, Vault12 has combined these innovations with its Cryptostorage platform and the Vault12 app to ensure that any files that you want to have readily available locally are encrypted by the Secure Enclave chip, and can only be decrypted with FaceID.
The best part is that these files that you select for secure local storage are still backed up to your Vault, so it becomes much, much simpler for you to access the files that you need often, and you are not at risk even if you lose your phone.
Hot Storage is the latest capability for Vault owners for making the storage of digital assets more convenient whilst secure. It enables you to designate specific assets to be encrypted with an extremely secure cryptographic key generated inside the Secure Enclave locally on your iPhone.
The asset is always available when needed without the need to contact your Guardians - however, it is also backed up in your Vault just like your other assets, so if your phone is lost or stolen, a full Vault recovery is still possible by contacting your Guardians
Existing assets that are already in your Vault can also be made available via Hot Storage by temporarily unlocking them. Should you want your assets to only be available via your distributed Guardians, you can also remove the asset from Hot Storage at any time.
This new capability is super-convenient for frequently-used assets like a BitClout seed phrase (which is frequently required when logging in or logging out), or seed phrases for wallets that you log into from many devices.
Hot Storage is available in the latest release of the iOS version of Vault12.
Equivalent functionality is being developed for the latest Android devices and will be made available after undergoing Beta Testing in the future.
Hot Storage in Action:
I. Open Vault
1. Open your Vault12 app to view your Vault and digital assets.
2. Select "Add an Asset" - for this example we will choose the File option to select a piece of NFT art on my filesystem.
II. Input Asset
3. Select the asset to store.
4. To utilize hot storage for instant access to the asset in the future, tick the "Hot Storage" option.
III. Lock Asset
5. The digital asset will now be encrypted and then distributed to your Guardians.
During this process encrypted shards of your asset are sent to your Guardians. Feel free to contact your Guardians to ensure that they receive the back up shards. This will ensure that your assets and Vault are protected in the case of loss or theft.
IV. Instantly retrieve asset
6. Once your assets have been synchronized with your Guardians, you can click to view. For regular assets, your Guardians will need to confirm.
7. For assets tagged for Hot Storage you can instantly view the asset after biometric authentication with FaceID.
8. When you click "View Asset" - FaceID is activated and the asset is unlocked immediately.
9. Your asset is displayed instantly.
You can download Vault at https://vault12.com/download.
Next Up From Vault 12
Inheritance and long term storage for CryptocurrencyVault12 Explainer
Vault12 Product Demo
Vault12 Digital Inheritance is the first solution to offer a simple, direct, and secure way to ensure cryptocurrency, NFTs and other Web3 digital assets can be inherited by future generations.
Digital Inheritance enables investors to designate an individual or a mobile device as a guardian that will inherit their entire portfolio of digital assets stored in a secure digital Vault once the time comes, eliminating undue risk and the need to continually update an inventory or issue updated instructions which result in privacy leakage.
Designed to be used alongside traditional hardware, software, and online wallets, Vault12 helps cryptocurrency owners, professional crypto traders, and high net worth investors safeguard their digital assets without storing anything in the cloud or in fact any one single location. This increases the protection and decreases the risks of loss.
The Vault12 app helps you recover, back up, and provide legacy inheritance for all your digital assets, including Bitcoin, Ethereum, NFTs, other cryptocurrencies, secrets like keys, seed phrases, PIN codes, DAO project keys, digital art, and of course, your crypto wallets.
Whether your digital art is suitable for a phone, or represents much higher resolution multimedia, make sure that you have backed up a copy in case the resource link is disrupted in the future. Digital art can easily be added to the Vault either via the mobile app or via the desktop utility. Once you have stored your artwork in your Vault, it will also benefit from inheritance once you activate that in your app.
As a creator you can use Vault12 to safeguard not just your NFT and crypto wallets, but also original digital artwork. Project creators will always have to deal with multiple wallets - inventory, treasury as well as future royalty wallets.
Vault12 safeguards your project assets, increasing protection and decreasing the risks of loss, whilst ensuring that everything is ready to go to be passed onto future generations, when the need arises.