Уязвимость в чипе Seeker может поставить под угрозу запуск токена SKR от Solana Mobile Translation: Vulnerability in Seeker Chip Could Threaten Launch of SKR Token by Solana Mobile

The Ledger team has identified an unfixable vulnerability in the chip of Seeker smartphones.

Solana Mobile has revealed plans to launch its own cryptocurrency, SKR, for the mobile ecosystem in January 2026.

The total supply will be 10 billion tokens, with 30% (3 billion SKR) allocated for an airdrop. The distribution of the remaining assets is as follows:

The issuance of SKR will involve a linear inflation mechanism to reward early stakers. A comprehensive tokenomics model and details on distribution will be disclosed at the Solana Breakpoint conference, which will take place from December 11-13.

Initially, the major innovation from Solana Mobile was not the phone itself, Seeker, but rather its decentralized application store (Dapp Store), which features over 100 projects built on Solana. The objective was to develop a full-fledged ecosystem rather than just a “money-making device” like the first model, the Saga.

The SKR token is set to be the primary tool for fostering growth within the Solana dApp Store.

At the same time, the company introduced the concept of «Guardians,» participants responsible for the safety and trust within the ecosystem. According to the announcement, SKR will be a crucial component of this system.

The Ledger team has discovered an irreparable vulnerability in the Seeker smartphone chip, the MediaTek Dimensity 7300 (MT6878), which allows attackers to gain complete control over the device.

Security engineers Charles Christen and Leo Benito tested an attack on the widely-used processor using electromagnetic pulses during the system’s initial boot. They managed to bypass all levels of the chip’s security.

“There is no way to safely store and use your private keys on these devices,” Christen and Benito stated.

The identified vulnerability cannot be resolved through software updates or patches, as the issue is embedded in the silicon structure of the MT6878.

The likelihood of a successful attack is low, ranging from 0.1% to 1%. However, experts assert that due to the ability to repeat the attempt every second, an attacker could gain access to the device within just a few minutes.

“We can generate an attack attempt approximately once per second. This allows us to automatically cyclically reboot the device, apply an electromagnetic pulse, and, in case of failure, immediately restart the procedure from the beginning,” the engineers explained.

In response to the discovery of this issue, MediaTek stated that the MT6878 was not originally designed to defend against such attacks. Threats involving electromagnetic pulses are “beyond the design requirements” of this component, representatives of the company noted.

It’s worth mentioning that in November 2023, analysts from CertiK identified a critical vulnerability in the Saga smartphone.