Close

Does this project spark your interest?

Become a member to follow this project and don't miss any updates

Mooltipass

Offline password keeper project created by and for the Hackaday community

Similar projects worth following

This project was created on 02/15/2014 and last updated 3 days ago.

Description
The mooltipass is an offline password keeper.
The concept behind this product is to minimize the number of ways your passwords can be compromised, while generating and storing long and complex random passwords for the different websites you use daily. It is designed to be as small as possible so it can fit in your pocket. Simply visit a website and the device will ask for confirmation to enter your credentials when you need to login.
Details

Mooltipass is composed of one main device and a smartcard.

On the device are stored your AES-256 encrypted passwords. The smartcard is a read protected EEPROM that needs a PIN code to unlock its contents (AES-256 key + a few websites credentials). As with your credit card, too many tries will permanently lock the smart card.
The mooltipass main components are: a smart card connector, an Arduino compatible microcontroller, a FLASH memory, an OLED screen and its touchscreen panel. The OLED screen provides good contrast and good visibility.

Components
  • 1 × ST662ACD-TR Content/Electronic Components/Semiconductors and Integrated Circuits/Power Management ICs/Switching Regulators and Controllers
  • 1 × ATMEGA32U4-MU Content/Electronic Components/Semiconductors and Integrated Circuits/Microprocessors, Microcontrollers, DSPs/ARM, RISC-Based Microcontrollers
  • 1 × AT88SC102 Content/Electronic Components/RF, IF, RFID and ZigBee/RF, IF, RFID, ZigBee Semiconductors and ICs/Memory
  • 1 × AT45DB011D-SSH-T Content/Electronic Components/Semiconductors and Integrated Circuits/Memory ICs/FLASH Memory

Project logs
  • One of the Final Updates: Mass Production has Started!

    3 days ago • 0 comments

    It all started on Hackaday more than a year and a half ago... we had this funny idea of an offline password keeper and wanted to see if we could get interested people from all the globe to work on it.

    Now we are mass producing more than 1500 units and passed FCC & CE tests, all thanks to the awesome persons who believed in this idea and the power of open hardware. Our beta testers are more than happy with the current firmware state, as we implemented all the ideas they had.

    What's next? Maybe a Mooltipass v2... who knows.

    Want a Mooltipass? You may join the waiting list here to get notified when the units are available for purchase in June!

  • The Mooltipass Crowdfunding Campaign is Live!

    7 months ago • 0 comments

    Inline image 1

    Dear Mooltipass enthusiasts,

    The development team and I would like to thank you for your support during this year of development. A little less than a year ago we started with just an idea and it is with your help that we end up here today with a product ready for production!

    You will find our crowdfunding campaign here: https://www.indiegogo.com/projects/mooltipass-open-source-offline-password-keeper.

    As you'll see we included a nice explanation video on why an offline password keeper reduces the number of attack vectors and is therefore better than closed or software based password keepers. It is time to sensitize and educate people about their credentials security.

    We'd therefore appreciate if you could help us spread the word of open source security by sharing our video or campaign with your family and friends via Facebook, twitter or any social media or news website.

    We did our best to keep costs down, however we still need to hire Javascript developers to finish our plugin. You'll find our pledge funding breakdown in the campaign. Our goal isn't to make money but contribute to individuals' security!

    Some of the development team will be hanging out in #mooltipass on irc.freenode.net in case you'd like to ask us questions about our adventure or simply give us feedback about our campaign. As usual we welcome constructive criticism!

    Any contribution is appreciated!

    Cheers,

    Mathieu & the dev team

  • Current status and progress #6: Crowdfunding campaign in the works!

    8 months ago • 0 comments

    Dear Mooltipass enthusiasts,


    Since our last newsletter the Mooltipass firmware evolved drastically, a direct result of our beta testers' feedback.

    So much in fact that we're starting to consider it as very close to completion!

    Here is our newsletter #6:

    - Most of our beta testers are now only using the Mooltipass to store their passwords

    - Beta testers Mooltipass adoption survey after one month of use is extremely positive

    - we switched our login & password field detection algorithm to the well tested (and GPLed) chromeipass'

    - our small animation video explaining how the Mooltipass works is done

    - we've started setting up our Kickstarter campaign

    As you can guess these lasts months work was mostly about improving our user interface and implementing our last functionalities.

    We're actually impressed that everything could fit in the small ATMega32U4, together with a bootloader.

    We should be ready to launch our crowdfunding campaign in the next few weeks.

    Tell your friends to subscribe to our official Google group as it'll be the only way to get early birds rewards!

    Cheers,

    Mathieu & the dev team

View all 14 project logs

Discussions

Doomsdaydoctrine wrote 2 months ago point

Great project you guys have going here, I have to say that i'm extremely interested in something like this, but lets say you are a user with many multiple email accounts from the same host(gmail) , then how would this device go about deciding which one you log into?

Are you sure? [yes] / [no]

Mathieu Stephan wrote 2 months ago point

We support this case... check out our gifs at themooltipass.com 

Are you sure? [yes] / [no]

morgan-tom wrote 6 months ago point
Mooltipass Indiegogo hit the initial goal!!!! I can't help but think that a Kickstarter campaign may have made more, but we got there anyway. Grats!!!

Are you sure? [yes] / [no]

hassanahmed wrote 7 months ago point
Hey ,
I need help
May any programmer help me ?

Are you sure? [yes] / [no]

iWhacko wrote 8 months ago point
Hi, I'm interested in smart card programming aswell. I'd love to directly work on the chips inside it instead of using javacards etc. Do you have any information on this subject. ie, how do you test your cards? is the firmware sent to a factory and they produce the cards? or can you upload new firmware to blank cards?

Are you sure? [yes] / [no]

Mathieu Stephan wrote 8 months ago 1 point
The card we use is a standard one: the AT88SC102. When we receive them we just set it up in a particular way and burn some fuses.

Are you sure? [yes] / [no]

Victor Suarez Rovere wrote 9 months ago point
Have you seen this similar entry, PassKey? It offers an unprecedented level of security.
http://hackaday.io/project/2620

Are you sure? [yes] / [no]

Mathieu Stephan wrote 9 months ago point
Hey Victor,
I can see that you're _extremely_ biased on the subject ;). This is a very ambitious project that you're considering... how many people are working on it?

Are you sure? [yes] / [no]

Mathieu Stephan wrote 9 months ago point
Just to be sure I completely understand your project: are you implementing a commercial man in the middle device?

Are you sure? [yes] / [no]

John Reiter wrote 9 months ago point
What if the smart card also had RFID for door access? You could use it as an employee ID as well.

Are you sure? [yes] / [no]

Mathieu Stephan wrote 9 months ago point
that would be neat indeed... however different companies have different type of NFC cards so it'd be hard to be flexible enough

Are you sure? [yes] / [no]

Mark Jeronimus wrote 9 months ago point
Not to burst your bubble but let me tell you why no one has ever made something similar. I work at a large hardware security evaluation lab, and I can tell you that without rigorous security evaluation and feedback, devices like this are almost sure to contain side-channel leaks and exploits. Even if every part is tested and certified, the final product may not be secure. We had companies having to re-evaluating things only because they swapped an innocent chip with a different footprint, for which the main PCB was re-routed. Evaluation of a simple PIN entry device can cost between $100,000 - $500,000. Especially with the publicity you're getting here and in China, there'll be attackers for sure. Probably safe for most people, but not for a commercial product.

Are you sure? [yes] / [no]

Mark Jeronimus wrote 9 months ago point
I'll give you a free tip. Use temper-switches to detect entry and modification of the device. Usually they are placed around buttons so they can't be tapped electrically. Also don't leave space that attackers can inserts evesdrop/logging devices into.

Are you sure? [yes] / [no]

Mathieu Stephan wrote 9 months ago point
Hey Mark,

Considering the tone of your comment: is it a reason not to try then?
This is why we are going the open hardware way. Perhaps concerned individuals like yourself will consider putting some of their time to either look at our code or go for a black box type of attack. We already have several pen-testers checking our security implementation, and we would love you to be one of them :)

Cheers

Are you sure? [yes] / [no]

Mathieu Stephan wrote 9 months ago point
Thanks for the tip Mark, we actually already had this one on day 2 after we launched this project ;)

Are you sure? [yes] / [no]

markbng wrote a year ago 1 point
Very nice project. Very professional project.
Please note that the AT88SC102 is NOT secure (www.break-ic.com). You can use the ATECC108 instead. An ARM cortex M3/M4 controller is preferred for main controller (good performance/cost ratio).
Do you also make a 'lastpass' browser add-on?

Are you sure? [yes] / [no]

Mathieu Stephan wrote a year ago 1 point
Thanks!
It depends what you mean by secure. Security has a cost so the appropriate question would be: how long does it take / how expensive is it to break the AT88SC102 security?

Are you sure? [yes] / [no]

markbng wrote a year ago point
I know. Security is difficult. You have to choose a good security for a reasonable price. I don't know the exact price (I use the break-ic list only to see which components can be hacked), but I think the price is from 800USD up to a few thousand dollar.

Are you sure? [yes] / [no]

elliot.buller wrote a year ago point
Not sure if there's any interest but I have 50 AT88SC0404C atmel crypto cards from a previous project. They are unused and in the protective sleeve. All white, looks like they could be printed on. Feel free to email if anyone has interest. elliot.buller(AT)gmail.com

Are you sure? [yes] / [no]

Mathieu Stephan wrote a year ago point
Thanks for the offer Elliot!
However we're only supporting the AT88SC102 atm.

Are you sure? [yes] / [no]

elliot.buller wrote a year ago point
I understand. Hard to develop for a moving target. I have pcsc scripts with apdu packet examples to access data, setup crypto, etc. More storage space too. I'll try and buy one to do the port myself once they are commercial. Been meaning to repurpose the smartcards and this sounds like a good opportunity. (Also will work for many automated laundry systems ;) Sorry, off topic.

Are you sure? [yes] / [no]

mexoplex wrote a year ago -1 point
you dont think the lawyers of the producers of the movie, " The Fifth Element" will be contacting you shortly?

Are you sure? [yes] / [no]

Mathieu Stephan wrote a year ago point
so far so good!
I don't think so though, given there already exist multipass brands / companies around the world

Are you sure? [yes] / [no]

pierrep wrote a year ago 1 point
Maybe the concern with the use of an USB key is the accessibility of the datas, that are usually readable in all circumstances even using an encryption it might just ask a password to decrypt/use the USB key, as with a microcontroller datas may be harder to retreive thus more secure. That's mt little point of view on the use of USB. I must finally say the design of the 3D rendering is nice !

Are you sure? [yes] / [no]

John Boyd wrote a year ago point
My only concern is the trade-off between security and convenience. This project gives much better security, but in order to access any web accounts we may have, we need to have the mooltipass with us. Are there plans to make a later revision that will just be a keychain-able USB drive? that way we dont need to add a whole new device to our daily tools (phone, wallet, keys, etc)?

That being said, I DO love this project and the direction yall have chosen, and you can expect me to be the first buyer or kickstarter funder!

Are you sure? [yes] / [no]

Mathieu Stephan wrote a year ago point
Hey phreaknik,

Thanks a lot for the support! As for your questions, a smaller version might be designed in the future but it's not planned yet. Are you sure that in your case you'd need to carry the mooltipass all the time? For example I mostly do my browsing at home or at work, so in my case I'd use 2 mooltipass and one smartcard...

Are you sure? [yes] / [no]

John Boyd wrote a year ago point
Mathieu,

Well as a student, I find myself sitting in front of a different computer every few hours every day, where i log into many accounts i would like to keep secure. I can easily sit down in front of 20 different computers a week, and sometimes never come back to the same computer twice. Even if I could afford twenty multipasses and came back to the same twenty computers every week, i certainly couldnt trust leaving them there at all these public computers.

This is why i feel a more portable option may be necessary for people like me to fully adopt the multipass as a security solution.

Just my two cents, and as I said before, I do really like the project. Definitely good work done!

Are you sure? [yes] / [no]

Jake wrote a year ago point
Maybe, if this project really kicks off, you could see it as a standard device on computers?

Are you sure? [yes] / [no]

Mathieu Stephan wrote a year ago point
Jake,

Hopefully! We need great supports and contributors to make this project a reality :)

Are you sure? [yes] / [no]

Mathieu Stephan wrote a year ago point
The Mooltipass will be credit-card sized with a 12mm width. At the moment, we're not sure yet what the final price will be.

Are you sure? [yes] / [no]

pierrep wrote a year ago point
I was wandering how much was actually the prototype at the end of built, it seems to be such a tiny object I was wandering how low cost.

Are you sure? [yes] / [no]

pierrep wrote a year ago point
Okay, so maybe it's just a funny coincidence. Still a very promessing project, i'll follow it closely! Thank's for the quick answer!

Are you sure? [yes] / [no]

Mathieu Stephan wrote a year ago point
Hey Pierrep, the name was actually suggested by one HaD reader after we started the development process!

Are you sure? [yes] / [no]

pierrep wrote a year ago point
What a great idea it's really nice! Is the idea actually based on the Fith Element (1997) multipass card? I was sure I heard that term somewhere and finally remembered there was a multipass or "mooltipass" with the accent, that was mentioned in the movie.

Are you sure? [yes] / [no]

Mathieu Stephan wrote a year ago 1 point
Here is our newsletter #1:

- we should receive soon the bottom PCB for Olivier's design. Once we receive it, we'll be able to check that most Arduino shields are compatible with our device. Hopefully, it'll be bug free and fit in the case as well...

- we are currently designing the top PCB that will contain the touch sensor IC, capactive wheel / buttons and the LEDs

- we machined the case for Olivier's design... it's a bit wide but quite thin! I'll try to send pictures soon...

- it seems the other mechanical contributors are not really motivated to have their designs produced (even if I'd like so)... so they could use your words of encouragement!

- the Arduino Leonardo bootloader has been modified to work with the Mooltipass, you'll be able to find it in the repository

- we are using both a makefile and Atmelstudio for our development process (which is cool imho)

- we recently switched to a new graphics library (which is awesome) that can handle fixed and variable font widths but also different color depths... we still need to optimize it for speed though

- the credential management code should be finished in the next 2 weeks

- we lost contact with the person in charge of the USB code :-(

- the computer-side software / browser extension hasn't progressed much :-(

- we still need to format our code to the agreed convention

Any question/suggestion is welcome!
Cheers,
Mathieu

Are you sure? [yes] / [no]

Similar projects