Trezor Hardware Wallet

From Whonix
Jump to navigation Jump to search


Documentation for this is incomplete. Contributions are happily considered! See this for potential alternatives.

Installation[edit]

  • Non-Qubes-Whonix: In Whonix-Workstation.
  • Qubes-Whonix: In whonix-workstation-17 Template.

sudo adduser user plugdev

[1]

Install package(s) trezor python3-hid.

A. Update the package lists and upgrade the systemarchive.org.

sudo apt update && sudo apt full-upgrade

B. Install the trezor python3-hid package(s).

Using apt command line parameter --no-install-recommendsarchive.org is in most cases optional.

sudo apt install --no-install-recommends trezor python3-hid

C. Done.

The procedure of installing package(s) trezor python3-hid is complete.

Signing Key Download[edit]

In Whonix-Workstation. (Qubes-Whonix: anon-whonix)

  • Digital signatures: A tool enhancing download security. Commonly used across the internet.
  • Learn more: Curious? Learn more about digital software signatures.
  • Optional: Digital signatures are optional. If you've never used them before, there might be no need to start now.
  • No worries: New to digital software signatures? It's okay, no need to worry.
  • Not a requirement: Not mandatory for using Whonix, but an extra security measure for advanced users.

Securely download the signing key.

scurl-download https://trezor.io/security/satoshilabs-2021-signing-key.asc

Display the key's fingerprint.

gpg --keyid-format long --import --import-options show-only --with-fingerprint satoshilabs-2021-signing-key.asc

Verify the fingerprint. It should show.

Note: Key fingerprints provided on the Whonix website are for convenience only. The Whonix project does not have the authorization or the resources to function as a certificate authority, and therefore cannot verify the identity or authenticity of key fingerprints. The ultimate responsibility for verifying the authenticity of the key fingerprint and correctness of the verification instructions rests with the user.

Key fingerprint = EB48 3B26 B078 A4AA 1B6F 425E E21B 6950 A2EC B65C

The most important check is confirming the key fingerprint exactly matches the output above. [2]

warning Warning:

Do not continue if the fingerprint does not match! This risks using infected or erroneous files! The whole point of verification is to confirm file integrity.

Add the signing key.

gpg --import satoshilabs-2021-signing-key.asc

Download[edit]

In Whonix-Workstation. (Qubes-Whonix: anon-whonix)

Check the latest version number and read the release notes herearchive.org.

Download bisq.

scurl-download https://suite.trezor.io/web/static/desktop/Trezor-Suite-21.10.2-linux-x86_64.AppImage

Download OpenPGP signature.

scurl-download https://suite.trezor.io/web/static/desktop/Trezor-Suite-21.10.2-linux-x86_64.AppImage.asc

Digital Software Signature Verification[edit]

In Whonix-Workstation. (Qubes-Whonix: anon-whonix)

Verify OpenPGP signature.

gpg --verify Trezor-Suite-21.10.2-linux-x86_64.AppImage.asc

If the file is verified successfully, the output will include Good signature, which is the most important thing to check.

gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.

This message does not alter the validity of the signature related to the downloaded key. Rather, this warning refers to the level of trust placed in the Whonix signing key and the web of trust. To remove this warning, the Whonix signing key must be personally signed with your own key.

Make Executable[edit]

In Whonix-Workstation. (Qubes-Whonix: anon-whonix)

Make file Trezor-Suite-21.10.2-linux-x86_64.AppImage executable.

chmod +x Trezor-Suite-21.10.2-linux-x86_64.AppImage

Usage[edit]

In Whonix-Workstation. (Qubes-Whonix: anon-whonix)

Run the following command to start the Trezor Suite.

./Trezor-Suite-21.10.2-linux-x86_64.AppImage

Qubes Issues[edit]

Symptom:

kernel: vhci_hcd: vhci_device speed not set
kernel: usb usb1-port1: Cannot enable. Maybe the USB cable is bad

The official instructions by Trezor for Qubes OS https://wiki.trezor.io/Qubes_OSarchive.org lead to a security degradation because of running third party software inside the USBVM.

Ideas:

  • A) Create another sys-usb with a USB controller exclusively attached to that App Qubes. A HVM App Qubes with PCI pass-trough. And/or
  • B) switch off sys-usb altogether for example, if the system has only one USB controller and switch between using USBVM and not using USBVM. -> security issue https://github.com/QubesOS/qubes-issues/issues/6368archive.org

Footnotes[edit]

  1. Required, otherwise Trezor Suite will show would show error "Trezor Bridge is not running". Maybe python3-hid is superfluous in some use cases. Package trezor Recommends: it.
  2. Minor changes in the output such as new uids (email addresses) or newer expiration dates are inconsequential.

We believe security software like Whonix needs to remain open source and independent. Would you help sustain and grow the project? Learn more about our 12 year success story and maybe DONATE!