Read Notary: A Device for Secure Transaction Approval, ;login: (Spring 2020)
Answer the questions in either a or b (no need to do both):
a) A user installs a malicious agent alongside a Bitcoin wallet on the Notary. Suppose Notary’s communication domain SoC had a bug that allowed the malicious agent to gain persistent code execution in that domain. What sorts of things could go wrong? Would this allow the malicious agent to steal the Bitcoin private key? Do other undesirable things?
b) What if a Notary implementation did not properly clear internal state left in the Agent SoC when switching agents? What kind of attacks could this enable? Would it necessarily be a problem?
Provide a list of questions you would like to discuss in class.