Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert & block trade
Convert crypto with one click and zero fees
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
OneKey responds to Milk Sad incident, confirms vulnerability does not affect the security of its software and hardware wallets

OneKey responds to Milk Sad incident, confirms vulnerability does not affect the security of its software and hardware wallets

ChaincatcherChaincatcher2025/10/17 14:34
Show original

According to ChainCatcher, OneKey's Chinese Twitter stated that regarding the recent "Milk Sad incident" involving a random number vulnerability, the OneKey team clarified that this vulnerability does not affect the security of mnemonic phrases and private keys in OneKey's software or hardware wallets.

The vulnerability originates from the pseudo-random number generator in Libbitcoin Explorer (bx) version 3.x, which uses system time and the Mersenne Twister-32 algorithm, with a seed space of only 2³² bits. Attackers can deduce private keys through prediction or brute-force enumeration. The affected scope includes some old versions of Trust Wallet and all products using bx 3.x or old versions of Trust Wallet Core. OneKey stated that its hardware wallets use EAL6+ secure chips with built-in TRNG true random number generators; older devices have also passed SP800-22 and FIPS140-2 entropy tests; software wallets use system-level CSPRNG entropy sources to generate random numbers, meeting cryptographic standards. The team emphasized that users are advised to manage assets with hardware wallets and should not import mnemonic phrases generated by software wallets into hardware wallets to ensure the highest level of security.

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Earn new token airdrops
Lock your assets and earn 10%+ APR
Lock now!