Mooltipass Project Repositoryon our Tindie store.
What is the Mooltipass Project?
With time, logins and passwords have become critical elements we need to remember to access the different websites and services we use daily. If we want to achieve good security, each of these credential sets should be unique.
We therefore created the Mooltipass, a physical password keeper that remembers and encrypts your credentials so you don't have to. With this device, you can generate and safely store long and complex passwords. A personal PIN locked smartcard allows the decryption of your credentials and ensures that only you have access to them. Simply visit a website and the device will ask for your confirmation to enter your credentials when login is required.
The Mooltipass is a standalone device connected through USB, is completely driver-less and is compatible with all major operating systems on PCs, Macs and Smartphones. It therefore is extremely simple to use our device:
- Plug the Mooltipass to your computer/tablet/phone, no driver installation required.
- Insert your smartcard, unlock it with your PIN. Without the PIN, the card is useless.
- Visit the website that needs a login. If using our browser plugin the Mooltipass asks your permission to send the stored name and password, or asks you to save/generate new credentials if you are logging in for the first time.
- If you are not using the browser plugin or logging in to something other than a web browser, you can manually tell MP to send the correct name and password. It will type it in for you, just like a keyboard. In this way it can be used anywhere.
Advantages over software-based solutions
A software-based password keeper uses a passphrase to decrypt a credentials database located inside a device (computer, smartphone...). As at a given moment your passphrase and your database are stored inside your device's memory, a malicious program with access to both elements could compromise all your passwords at once. In some cases, security flaws of software-based solutions can also lead to entire unencrypted databases beeing extracted by visiting a simple website.
We therefore offer the following advantages:
- Stronger security: we reduce the number of attack vectors by basically having our device type your passwords for you.
- A non-proprietary device: as our product is open anyone can develop new tools for it. There will never be fees for the services we offer.
- An open-source platform: all our source code can be viewed, allowing you to check that your credentials are only kept inside the device and not leaked to the outside
- A trusted platform: as only our tested source code is running on the Mooltipass, there can't be any viruses or malicious programs compromising your stored credentials
The Mooltipass is composed of the main device shown above and a smartcard.
On the device are stored your AES-256 encrypted credentials. The smartcard is a read protected memory that needs a PIN code to unlock its contents (AES-256 key + a few websites credentials). As with your chip and pin card, too many tries will permanently lock the smart card.
We want the device to be as simple as possible. Ideally, the end user shouldn't have to spend more than a few seconds to use its basic functionalities.
A browser extension runs on the user's computer and sends the current website to the Mooltipass. When the user has to login, the Mooltipass will light up and ask for confirmation to enter the credentials.
Safety is a primary concern for the Mooltipass development team, which is why we offer several secure ways to backup your credentials.
The smart card containing the AES key used for encrypting the passwords can be cloned using the Mooltipass, copying its PIN code as well. The encrypted credentials stored in the Mooltipass internal flash can be exported to the official Mooltipass website or simply somewhere on your local computer.
A Brief History of Security Flaws and Breaches
We often think that the devices and websites we use are exempt of security flaws.
You may see if one of your accounts has already been compromised by visiting this website.
We also compiled a brief list of major security breaches and vulnerabilities found during the last few months:
- 01/2018 Lenovo's Fingerprint Scanner Can Be Bypassed via a Hardcoded Password
- 12/2017 Windows 10 Bundled a Password Manager with a Security Flaw
- 09/2017 Billions of devices imperiled by new clickless Bluetooth attack
- 09/2017 Equifax data leak involves 143 million consumers
- 08/2017 Vulnerabilities in High Assurance Boot of NXP i.MX microprocessors
- 08/2017 Hackers Can Turn Amazon Echo Into a Covert Listening Device
- 07/2017 Flaw In IoT Security Cameras Leaves Millions of Devices Open To Hackers
- 07/2017 1 billion smartphones can be compromised due to a flaw in BCM43XX chipsets
- 07/2017 Severe Systemd Bug Allowed Remote Code Execution For Two Years
- 06/2017 Researcher Finds Critical OpenVPN Bug Using Fuzzing
- 06/2017 WikiLeaks Doc Dump Reveals CIA Tools For Hacking Air-Gapped PCs
- 06/2017 Zero-day Skype flaw causes crashes, remote code execution
- 06/2017 Advanced CIA firmware has been infecting Wi-Fi routers for years
- 06/2017 Password manager OneLogin hacked, exposing sensitive customer data
- 05/2017 2017 biggest hacks: Bell Canada, Edmodo, HipChat, Wonga, DaFont, PoliceOne hacked
- 05/2017 Kodi and VLC users at risk of viruses hidden in subtitles
- 05/2017 Intel AMT bug that allows hackers to remotely gain administrative control over huge fleets of computers without entering a password
- 03/2017 Edge, VMWare, Safari, And Ubuntu Linux Hacked at Pwn2Own 2017
- 03/2017 Vault 7: CIA Hacking Tools Revealed : "These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the "smart" phones that they run on and collecting audio and message traffic before encryption is applied."
- 03/2017 Huge Database Leak Reveals 1.37 Billion Email Addresses and Exposes Illegal Spam Operation
- 02/2017 Cloudflare Leaks Sensitive User Data Across the Web
- 01/2017 Cryptkeeper Bug: the single-character decryption key "p" decrypts everything
- 01/2017 Netgear Exploit Found in 31 Models Lets Hackers Turn Your Router Into a Botnet
- 01/2017 Google plugs severe Android bootmode vuln that exposed devices to spying
- 12/2016 Zero-Days Hitting Fedora and Ubuntu Open Desktops To a World of Hurt
- 12/2016 Yahoo discloses hack of 1 billion accounts
- 12/2016 Malware Found In the Firmware of 26 Low-Cost Android Models
- 11/2016 More Than 1 Million Android Devices Rooted By Gooligan Malware
- 11/2016 Second Chinese Firm In a Week Found Hiding a Backdoor In Android Firmware
- 10/2016 Rowhammer Attack Can Now Root Android Devices
- 10/2016 China Electronics Firm To Recall Some US Products After Hacking Attack
- 10/2016 Android Devices That Contain Foxconn Firmware May Have a Secret Backdoor
- 09/2016 As We Speak, Teen Social Site Is Leaking Millions Of Plaintext Passwords
- 09/2016 Yahoo Confirms Massive Data Breach, 500 Million Users Impacted
- 09/2016 97% of the Top Companies Have Leaked Credentials Online
- 09/2016 As We Speak, Teen Social Site Is Leaking Millions Of Plaintext Passwords
- 06/2016 iOS bug allows attackers to gain full remote access to an iPhone by sending a simple iMesssage
- 06/2016 Teamviewer hacked, users' Paypal account drained
- 06/2016 GitHub Presses Big Red Password Reset Button After Third-Party Breach
- 05/2016 Hackers Claim to Have 427 Million Myspace Passwords
- 05/2016 Hackers Stole 65 Million Passwords From Tumblr
- 06/2016 Passwords for 32M Twitter accounts may have been hacked and leaked
- 06/2016 Android Full Disk Encryption Can Be Broken
- 07/2016 New Backdoor Allows Full Access to Mac Systems
- 08/2016 Qualcomm security flaw allows a malicious app to gain root access
- 06/2016 New Cache Attack Can Monitor Keystrokes On Android Phones
- 03/2016 MitM Attack against KeePass 2’s Update Check
- 07/2016 Rumors Claim 40M iCloud Accounts Hacked; Apple-Related Forums Compromised
- 06/2016 Lastpass: remote 'complete account compromise' possible
- 08/2016 iPhone malware that steals your data is a reminder no platform is ever safe
Frequently Asked Questions
Is your solution better than a piece of paper?
A piece of paper contains passwords that can easily be read when you are not paying attention to it. The Mooltipass stores encrypted passwords that can only be read when providing your PIN code.
If I only need to remember a PIN code, does it mean the Mooltipass is not safe?
Not at all, as the Mooltipass system is exactly like your chip and pin card: 3 false tries will permanently block the smart card and make credential decryption impossible.
Why do I need different passwords for different websites?
Websites are compromised on a daily basis. If you are using the same password for different websites, one attacker could use a password he discovered on all of them.
Why do you need an OLED screen?
An offline password keeper needs to provide a way to prevent impersonation. The user has to check that the website/service he's approving the credential sending for is the same that the website/service he's currently visiting/using, as a malicious program could emit forged requests. Moreover, having a display allows the user to operate the Mooltipass without the browser plugin using our dedicated touch interface.
Why are you using both a smart card and a main Mooltipass device?
There are many reasons, the main one being that it is much easier to carry a smart card around than any other object. This smart card is a secure element that contains your credentials' encryption key, it is cheap and may be cloned without compromising the system security.
What if I lose my smartcard?
Our device is shipped with two smartcards, so you can keep your copy somewhere safe. The Mooltipass therefore allows the user to clone his smartcard as many times as he wants, provided that the card PIN is correctly entered.
Can the smartcard be used with multiple Mooltipass?
You can synchronize your credentials between multiple devices. This allows you to have one Mooltipass at work and one at home.
What if I lose my Mooltipass device?
Your encrypted credentials can be exported to either your computer or the Mooltipass official website. If you lose your device, you may purchase another one and restore your credentials.
Are you sure about your encryption implementation?
The AES-256 used in the Mooltipass has been compared again standard Nessie test vectors for correctness. Moreover, our security chain has been checked by qualified individuals.
Can I use it on Windows/Linux/Mac?
Yes, as no drivers are required to use the Mooltipass. It is recognized as a standard USB keyboard that will enter passwords for you.
Can I use on my computer/laptop/phone/tablet...?
Most (if not all) devices (including smart phones and tablet PCs) include a USB host capable port. The Mooltipass will work with all of them.
How secure is the Mooltipass?
We are using the most secure encryption algorithms and designed our case to make physical tampering practically impossible. Our solution is therefore perfectly suited for individuals wanting to improve their credentials safety.
Are you planning to make a wireless version?
The Mooltipass isn't wireless to skip the added costs of a lithium-ion battery and a wireless interface. Customer survey also let us know that having a USB cable wasn't a problem for most use cases.
How are the credentials sent to the computer?
The Mooltipass is enumerated as a composite HID keyboard / HID proprietary device. The credentials are sent over the HID proprietary channel when using the browser plugin and over the keyboard channel when using the Mooltipass through its touch interface.
Is it still possible to sniff the passwords sent over HID?
In theory yes. As mentioned in our project description the Mooltipass aims at reducing the number of attack vectors to a minimum: the device basically types your password as if you were doing it yourself. Perfect security could only be achieved by sharing dedicated secrets with every possible service and website... which is practically impossible to do.
If I can export my encrypted credentials, does this mean someone could crack them?
In short, no. We are using AES-256 encryption in CTR mode, bruteforcing the encrypted credentials takes more than fifty years.
If it is open source, does it mean it is less secure?
Not at all. Having our code open source allows everyone to check our security implementation, which actually leads to a better code quality and more trust from our final users.
You may contact the development team via the official Google group or ask for support at support[at]themooltipass[dot]com
Thanks and Acknowledgement
None of this would have been possible without the help of many people located all over the globe.
Here is a non exhaustive list:
- Darran H. (graphics, plugin, comms, general development and more) - New Zealand
- Pierre C. (GUI, encryption implementation supervision, pen testing) - France
- Bjorn W. (GUI, graphics, wise man, project advisor) - Canada
- Raoul H. (cross platform daemon, browser extensions - France
- Henryk P. (encryption implementation supervision) - Unknown
- Olivier G. (mecanics, project advisor) - Switzerland
- Josh W. (mechanics, plugin, fw supervision) - USA
- Eric E. (schematics & layout verification) - USA
- Mike N. (flash storage, node management) - USA
- Charles E. (legal, project advisor) - USA
- Miguel A. (AES encryption, RNG) - Spain
- Tom V. (part of USB) - South Africa
- Erik M. (IRC, general help) - USA
- Mikael A. (GUI, plugin) - Sweden
- Hans N. (general help) - Denmark