Discussion about this post

User's avatar
Minibits dev's avatar

Thank you for the post. Minibits wallet is open source software and thus open for fixes and improvements. It is my fault I have not yet published comprehensive process for reporting security or privacy related incidents in private and publish them after they are addressed - I'll put it on my work stack.

Regarding the findings, here is my quick feedback:

1. Key rotation to own nostr keypair

- you are right, device token should not be exposed in the profile data, this is now fixed

- bug in profile read endpoint is now fixed as well

- if you'd like to keep max ecash related privacy with your own nostr keypair, import your keypair to freshly installed wallet, walletId is fully opaque

- to be precise, Minibits allows to rotate both nostr keys and seed using different processes

2. Censorship

I believe the finding starts from different assumptions how claiming ecash works, then it is the case in real implementation. There is no lock to pubkey involved in the process.

Censorship issue is of course real in general - and here we should separate the ecash protocol and its privacy guarantees and specific, unrelated functionality of Minibits lightning addresses, that is basically fully custodial lightning service, bridging to ecash. Here the privacy to the operator of such service is very limited by design. That's why it should - and is - used mostly for zaps, that are by nature public.

3. NFC surveillance

Mint icon is cached in the on device wallet state, so correlating on this is not possible. However there might be other cases where unwanted correlation is material. If so, please report privately and feel free to published once I'll fix those.

Thank you for making Minibits better.

Minibits dev

No posts

Ready for more?