UPDATE: After further review, another firmware update (v5.1.1) was necessary for all devices to work with this fix.   KeepKey was notified of a potential security vulnerability on March 18, 2018, by Satoshi Labs. An undocumented flaw was discovered in all STMicroelectronics STM32F205 chips that integrate and drive the entire KeepKey experience.  A mandatory firmware update (v5.1.0)…

A beta (rc) client application update has been published (v 5.0.2). The update address two minor transaction fixes. The fixes include: Transaction history: In some cases, users experienced missing transactions from the transaction page on the client. With this fix, transaction histories should be complete and up to date. Transaction signing: Other users have experienced an error…

On February 9, 2018, researchers Dusha Igor and Andrey Lovyannikov of ASP Labs responsibly disclosed a format string attack vulnerability on KeepKey devices. The KeepKey development team immediately responded to the disclosure and patched the vulnerable code. A mandatory firmware update was made available to all devices on February 21, 2018, that eliminated this vulnerability…

Firmware v5.0.1, KeepKey client v5.0.1, Device client v5.0.0-beta.1 KeepKey is pleased to announce updates to our current beta release. This release includes the following fixes:   All correct PIN’s are recognized. In rare situations, the device previously would not detect that the user had entered the correct PIN. API services will return accurate amounts. Under…

KeepKey

The first version of ERC-20 token support is now available in the beta client (v5.0). This first stage of token support includes SALT, Aragon, Augur, BAT, Civic, Golem, Gnosis, OmiseGO, District0x and FunFair. As an early-stage beta, this client is recommended for advanced users who are willing to work with our support team at a…

Older Posts