Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesCopyBotsEarn
Solana Dismisses CertiK Report On Saga Phone Vulnerability

Solana Dismisses CertiK Report On Saga Phone Vulnerability

CryptodailyCryptodaily2023/11/16 10:48
By:Amara Khatri

Table of Contents

  • The CertiK Video
  • Solana Calls CertiK Claims Inaccurate
  • The Saga Phone

Solana Labs has dismissed a recent video by CertiK, stating that the blockchain security firm made several inaccurate claims about a potential security vulnerability in Solana’s Saga phone. 

Saga is Solana’s crypto-enabled Android phone and was released in April. The phone is designed to pair Web3 with smartphones. 

The CertiK Video 

CertiK, in a post on X (formerly Twitter) on the 15th of November, claimed that the Saga phone contained a critical vulnerability known as a “bootloader unlock” vulnerability. The vulnerability could give malicious actors a backdoor entry into the phone and compromise the initial software responsible for the starting of the device to be compromised. CertiK also claimed the bootloader vulnerability would allow any attacker with physical access to a phone to load custom firmware that contains a root backdoor. CertiK stated, 

“We demonstrate that this can compromise the most sensitive data stored on the phone, including cryptocurrency private keys. The boot loader is unlocked, and software integrity cannot be guaranteed. Any data stored on the device may be available to attackers. Do not store any sensitive data on the device.”

The message from CertiK indicates that the phone could be hacked. However, it isn’t yet clear if the vulnerability is unique to the Saga phone or if it could impact other Android devices. 

Solana Calls CertiK Claims Inaccurate 

However, Solana has dismissed CertiK’s concerns about any potential vulnerability in the Saga phone. Lead software engineer of mobile at Solana Labs, Steven Laver, stated that the CertiK video did not reveal any known vulnerability or security threat to Saga users. Instead, the video only demonstrates the user unlocking the bootloader, which Laver stated could be done on any Android device. 

“The CertiK video does not reveal any known vulnerability or security threat to Saga holders. The video shows the user unlocking the bootloader, which is something that can be done on many Android devices.”

Android’s internal Open Source Project documentation also shows that unlocking a bootloader is an action that can be performed across several Android devices. Laver further added, 

“Unlocking the bootloader is an advanced feature of Saga and is disabled by default. We believe in allowing users the choice of how they use their phone. However, unlocking the bootloader is not a security vulnerability – a user must explicitly allow such changes to be made to their device, and those changes can only be made by an authorized user of the phone.”

However, if the user or attacker proceeds to unlock the bootloader, they not only go through multiple warnings but their device is wiped, along with their private keys. Laver added that this process could not be done without the user’s awareness or active participation. The video then showed how the attacker could drain BTC from the wallet attached to the phone. However, it did not show Seed Vault in the video. Seed Vault protects supported digital assets and seeds. 

Seed Vault was announced in 2022 and can access the highest privileged security environment available on a device. This includes secure operating modes of the processor to dedicated Secure Elements, which ensure a secure transaction signing experience through UI components built into Android. 

The Saga Phone 

Saga was launched in April and was designed to pair the Web3 ecosystem with smartphones. Apart from traditional app stores, Solana also offers a separate app store. The phone allows users to have self-custody of their assets and keep them with them on the go. A few months after its launch, Solana slashed the price of Saga by 40%, from $1000 to $599.

At the time, the head of business operations for Solana Mobile, Emmett Hollyer, stated that price reduction was a common strategy employed in the consumer electronics business, particularly when it came to smartphones. 

Disclaimer: This article is provided for informational purposes only. It is not offered or intended to be used as legal, tax, investment, financial, or other advice.

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Locked for new tokens.
APR up to 10%. Always on, always get airdrop.
Lock now!

You may also like

241126: Ether Favored in Crypto Rotation as Bitcoin Recoils Off $100K Sell Wall

After a prolonged downtrend relative to bitcoin (BTC), Ethereum's ether (ETH) is showing signs of a resurgence. ETH, the second-largest cryptocurrency on the market, gained over 4% in the past 24 hours, while BTC lost 1.5% during the same time, dipping below $95,000 during the Monday session. The o

Bitget Academy2024/11/26 04:47