Solana Mobile анонсировала токен SKR, несмотря на уязвимость в Seeker Translation: Solana Mobile announced the SKR token despite the vulnerability in Seeker.

The Ledger team has identified an irreparable vulnerability in the Seeker smartphone’s chip.

Solana Mobile has announced the launch of its own cryptocurrency, SKR, for the mobile ecosystem, set for January 2026.

The total supply will comprise 10 billion tokens, with 30% (3 billion SKR) allocated for an airdrop. The distribution of the remaining assets is as follows:

The issuance of SKR will feature linear inflation to incentivize early stakers. The complete tokenomics model and distribution details will be unveiled at the Solana Breakpoint conference, scheduled to take place from December 11 to 13.

Initially, the primary innovation from Solana Mobile was not the Seeker phone itself, but rather its decentralized application store (Dapp Store), which hosts over 100 projects on Solana. The goal was to build a comprehensive ecosystem rather than just a «money-making device,» as was the case with the first model, the Saga.

The SKR token is expected to serve as the main tool to stimulate growth within the Solana dApp Store.

Simultaneously, the company introduced the concept of «Guardians,» individuals responsible for security and trust within the ecosystem. The announcement stated that SKR will be a key component of this system.

The Ledger team has discovered an irreparable vulnerability within the Seeker smartphone chip—MediaTek Dimensity 7300 (MT6878). This flaw could allow attackers to gain complete control over the device.

Security engineers Charles Christen and Leo Benito tested the attack on this popular processor using electromagnetic pulses during the initial system boot. They successfully bypassed all levels of security within the chip.

«There is no secure way to store and use your private keys on these devices,» Christen and Benito stated.

The identified vulnerability cannot be remedied through a software update or a patch, as the issue is rooted in the silicon structure of the MT6878.

The likelihood of success for such an attack is low—between 0.1% and 1%. However, specialists noted that due to the ability to attempt the attack every second, an attacker could potentially gain access to the device within just a few minutes.

«We can generate an attack attempt approximately once per second. This allows us to automatically cycle reboot the device, apply an electromagnetic pulse, and, in case of failure, immediately restart the process from the beginning,» the engineers explained.

In response to the discovery of the issue, MediaTek stated that the MT6878 was not originally designed to defend against such attacks. Threats using electromagnetic pulses are «beyond the design requirements» for this component, company representatives noted.

It is worth mentioning that in November 2023, CertiK analysts identified a critical vulnerability within the Saga smartphone.