FAQ

Can I use it with my hardware wallet?

At the moment you can try the dev. version of the app for Ledger Nano S. See more info at https://github.com/LedgerHQ/bolos-app-revealer/

Can I encrypt other secret that is not an Electrum seed?

Yes, you can encrypt any alphanumerical secret. Use the ‘custom secret’ field at the encryption dialog of the software. BIP 39 seeds and aezeeds will fit on the card, but will have a smaller font size. The software will adjust the font size automatically after a certain amount of characters.

Can I encrypt many different secrets for the same Revealer?

Yes, but should you? Revealer is a one time pad – it has perfect security as long as it’s used once.
In possession of multiple secrets encrypted for the same Revealer it can be attacked. Depending on your threat model you might want to have more than one secret encrypted for the same Revealer. For instance, if you need plausible deniability. In this case, you need to make sure an adversary has no way of accessing two (or more) different secrets encrypted for the same Revealer.

How is the noise generated?

The deterministic noise is generated with the provable secure HMAC_DRBG (SHA-512) seeded with 128 bit entropy from cryptographic secure /dev/urandom. In our set-up, the seed includes noise from a Moonbase OneRNG hardware RNG.

Why should I use it?

With a Revealer your secrets are encrypted, invulnerable to physical access. This allows you to create redundant backups without reducing safety. Ultimately it adds a layer of noise to your seed or password, encrypting it in two-factors. With the benefit that requires no computer or expertise to decrypt.

How to reveal the secret?

Place your Revealer card precisely on top of the noise pattern.
Observing the marks on diagonally opposing corners and pressing the card slightly down will give you a good image.

What happens if I mistype the code?

the code includes a checksum so the software detects it and does not let you proceed.

What are the codes on the cards and in the seeds?

The first digit is a version number. The next 32 digits are 128 bits of entropy in hex format – it’s the random seed used to generate the pattern. The last three digits are used as a checksum.
The code on the seeds is a identifier, so you know for which revealer it was encrypted for. The number is ‘versionnumber_checksum’, and exposes nothing of your entropy.

Why two cards?

Think of them as keys. We decided to ship out two so you are free to store them in different places and even to lose one.

If I lose both cards, can you provide a replacement?

No. Each revealer is unique and we don’t keep logs, or know what revealer is sent to whom. We send two identical cards because we consider it enough for redundancy, if you would like to have three identical cards let us know and we will consider for future products.

Why only 128 bits?

If you can break 128 bits you can break bitcoin directly and won’t bother breaking revealer.

But why should I trust you?

You shouldn’t. Even if we were malicious, or compromised, we don’t know your secrets. We send you raw noise, encoded in a card. You generate your secret and encrypt it for the card on your own computer. Ultimately you add noise to your otherwise exposed backup with a Revealer.

I printed the pdf, but the noise paper is a lot smaller than the card..

make sure that you print your PDF with setting to 100% size, not ‘fit to paper’. The print and the card should be same size. If you still have difficulties to read your seed phrase, you might want to use the Printer Calibration tool.

What is printer calibration and how does it work?

Printer calibration allows you to generate a seed pdf that is adjusted to your printer/paper and will have exact size of your card. In this way you can achieve optimal precision. Each printer/paper will have (at least) a sub-milimiter difference in the size they print out. Revealer is a precision device, if those differences are big enough it might not be possible to read all the words at the same time, rather one line or a word a time depending on how big the size difference is.