以“Kinpin”闻名于黑客界、并受人尊敬的硬件黑客Joe Grand,是极具影响力L0pht Heavy Industies黑客团体成员,2008在共同主持Discovery探索频道的《Prototype This!》节目后更掳获了一大群死忠纷丝。在收到来自欧洲不幸加密货币持有者(化名Michael)的求助后,Grand成功破解了这个钱包的密码。
Joe Grand, a hardware hacker known as “Kinpin” and respected by the hacker community, is a member of a highly influential group of Lepht Heavy Industries hackers, and, after co-chairing the Discovery Exploration Channel's Prototype This! program in 2008, has captured a large group of dead loyalists. Following a call from an unfortunate European cryptographic currency holder, known as Michael, Grand succeeded in deciphering the password to the wallet.
10岁时Grand就开始破解计算机硬件,如今他是一家复杂数字系统供应商的反黑客入侵顾问。2022年他曾使用复杂的硬件技术破解了Trezor钱包(USBU盘形式),成功帮助该钱包主人找回他以为永远遗失的200万美元Theta加密货币。自此以后,即使不少人寻求他帮忙,但都以各种原因加以回绝。
When he was 10 years old, Grand started cracking computer hardware, and he is now an anti-hacker hacking consultant to a complex digital system provider. In 2022, he used sophisticated hardware technology to crack the Trezor wallet (USBU disk form) and succeeded in helping the owner to recover the $2 million Theta encrypted currency that he thought would be lost forever.
不愿透露真实姓名化名Michael的比特币(BTC)持有者,将比特币存储在受密码保护的数字钱包中。他使用RoboForm密码管理器生成密码,并将该密码存储在使用TrueCrypt工具加密的文件中。结果某天突然发现该文件损毁,导致他再也无法访问RoboForm生成的数字钱包密码。
He uses the RoboForm password manager to generate a password and store it in a file encrypted by the TrueCrypt tool. One day, the document was discovered to have been destroyed, making it impossible for him to access the digital wallet code generated by RoboForm.
两年前,Michael曾联系Grand帮忙,但遭到婉拒。去年6月,他再次请求Grand助他一臂之力,这次Grand同意一试,并与他的朋友Bruno一起合作破解,Bruno是德国数字钱包黑客。
Two years ago, Michael contacted Grand for help, but was declined. Last June, he again asked Grand to help him, and this time Grand agreed to try and work with his friend Bruno, a German digital wallet hacker.
这回Grand要破解回复的是RoboForm软件所生成的密码,由于是软件钱包,比他两年前破解的Trezor硬件钱包更为复杂,许多加密货币破解专家莫不认为取回这些比特币是不可能的任务。
This time, Grand would like to decipher the password generated by RoboForm, which is more complex than the Trezor hardware wallet that he broke two years ago, and many cryptographic currency crackers do not believe that it is impossible to retrieve the bitcoins.
Grand和Bruno花了几个月的时间对他们最终判定是Michael在2013年所使用的RoboForm程序版本进行逆向工程,结果发现该版程序存在一个重大漏洞,也即这个随机密码生成器并非全然随机,以致会生成可预测的密码。如果知道该密码生成的确切日期、时间和相关参数,便可计算出确切的密码,然而事与愿违的是Michael完全不记得创建密码的时间。
Grand and Bruno spent several months working backwards on the version of the RoboForm program that Michael ultimately used in 2013 and found that there was a major gap in the version, namely that the random password generator was not entirely random and would produce a predictable password. If you knew the exact date, time, and relevant parameters of the password generation, you could calculate the exact password, but it was against Michael’s wishes that he did not remember the time when the password was created.
几经尝试,Grand和Bruno幸运地找对了参数和时间范围,并最终找到正确密码解开被加密的数字钱包和其中的比特币。Grand和Bruno并将整个破解过程与技术细节详解制成视频发布到YouTube上。
During several attempts, Grand and Bruno were fortunate to find the right parameters and time frames, and eventually found the right password to decode the encrypted digital wallet and the bitcoin contained therein. Grand and Bruno released the entire decomposition process and the technical detail into a video on YouTube.
任务完成后,Grand和Bruno获得部分比特币作为酬劳。随后,Michael也在比特币价格升到每枚62,000美元时卖掉一些比特币。如今手上还保留30枚价值300万美元的比特币。看样子密码丢失反而让Michael因祸得福,如果密码未曾丢失,他很有可能会在每枚4,0000美元的时候卖掉比特币,反而错失狂赚一大笔财富的机会,因为大家莫不认为今年比特币势将冲破10万美元大关。
After the mission was completed, Grand and Bruno received some bitcoin as a reward. Then Michael also sold some bitcoin when the price of bitcoin rose to $62,000 apiece.
(首图来源:YouTube)
(Initiative source: YouTube)
注册有任何问题请添加 微信:MVIP619 拉你进入群
打开微信扫一扫
添加客服
进入交流群
发表评论