Always purchase from manufacturer's website to ensure you receive genuine devices. All our BUY NOW buttons redirect to the official websites.
Price
Prices ranges:
- Green: less than $150
- Yellow: between $150 and $200
- Red: more than $200
DIY
Do It Yourself
NFC
Near Field Communication (NFC) is a technology that enables two devices to communicate wirelessly when they are brought close to each other. NFC is often used as a way to quickly and securely connect the wallet to a mobile device, such as a smartphone or tablet.
microSD card
Having support for a MicroSD card is useful to install the firmware and sign transactions in a secure way.
QR scanner
A QR scanner on a hardware wallet is a feature that allows you to scan a QR code using your hardware wallet. QR codes can contain various types of information, including cryptocurrency addresses, transaction details, and other types of data.
100% Air-gapped
100% air-gapped can sign transactions, create/restore a wallet and upgrade the firmware without connecting the device to a cellular network, wifi, Bluetooth, USB, or NFC.
In contrast to the types of communication mentioned above, most fully air-gapped wallets use scannable QR codes for transactions, though some may also use micro-SD cards.
Secure Element
A secure element is a microprocessor chip designed to store and process sensitive information. It is used in hardware wallets to store seed phrases and private keys, providing added protection against physical attacks.
Read moreSupply Chain & Physical Attacks Protection
Before a hardware wallet gets into your hand, many people might have handled it before you. These people can include the shipping company, the retailer, the shipping person, and many more. If anyone of them is a hacker, they can modify the hardware wallet, install some malware, put it back together, and ship it to you. Some manufacturers protect you against these supply chain attacks using different approaches, for example deleting the whole system if they detect a breach. A complete deletion gets rid of the private key, meaning there will be nothing left for the hacker to salvage.
Upgrade
Offline updates via SD card provide key safeguards:
1. Your device (keys) is isolated from the internet during updates. Your keys cannot be extracted remotely.
2. Secure data transmission via the SD card ensures a strict one-way flow to the device. Nothing leaves your device.
Even if data were somehow transmitted from your device to the SD card, tha wallet manufacturer has no ability to access or interact with users' SD cards.
Other approaches, like upgrading the firmware using USB data or Bluetooth are less secure, because they are two-way flows, so the keys could potencially be extracted by the companion app
Source-available
A hardware wallet with source-available firmware is released through a source code distribution model where the source can be viewed, and in some cases modified, but without necessarily meeting the criteria to be called open-source. Any firmware is source-available as long its source code is distributed along with it, even if the user has no legal rights to use, share, modify, or even compile it.
Open Source
A hardware wallet firmware being open source means that the source code of the firmware is publicly available and can be freely viewed, used, modified, and distributed by anyone. Users have the legal rights to access, study, modify, and distribute the firmware according to the terms of the open-source license it is released under. This transparency and freedom allow the community to review and contribute to the development of the firmware, ensuring its security, reliability, and trustworthiness.
Duress PIN
The duress wallet is a personal safety feature: Create a duress wallet and add funds you are willing to lose. If you must reveal a PIN under duress, give the duress PIN instead of your main PIN.
Dynamic Keypad
This feature randomizes the numbers associated with the buttons on the keypad. Cameras and shoulder-surfers watching won't figure out your PIN based on the keys you press.
Brick/Reset me PIN
Using the Brick/Reset me PIN will tell the device to destroy/wipe itself, including stored secrets.
Login Countdown
As a defensive measure, the “login countdown” can force a time delay when logging into the wallet.
Anti-phishing words
Anti-phishing words are a set of words unique to the device and the PIN introduced. If a user enters the first part of their PIN and does not see their usual anti-phishing words, they know the device is not trustworthy and shouldn't to continue the login process.
Alphanumeric PIN
Alphanumeric PINs allow for a larger pool of possible combinations compared to numeric-only PINs. This increased complexity makes it more difficult for an attacker to guess or brute-force the PIN, providing better protection against unauthorized access.
Alphanumeric PINs can help protect against shoulder surfing attacks, where an attacker tries to observe and memorize the PIN being entered. The inclusion of letters and symbols in the PIN makes it harder for an attacker to accurately remember the sequence of characters.
Passphrases support
A passphrase is an advanced feature which can be used to protect your accounts. When this feature is enabled, your device asks you to enter a secret phrase in addition to your numeric PIN every time you connect your device. When you enter a passphrase, your device combines the already existing randomness of your recovery seed with your own chosen input and computes a new wallet.
Passphrase entry
Some hardware wallets allow you to enter the passphrase on the host device you're using instead of the wallet itself. But this also means that the host device you're using will learn your passphrase, which is part of your backup, and this makes it less secure.
Entering your passphrase on a malicious host device allows an attacker to secretly pass a different passphrase to your wallet. So, the attacker can hold your coins for ransom and might only give out the correct passphrase after you have paid them.
Shamir Backup (SLIP39)
Shamir's secret sharing (SSS) is a cryptographic technique formulated in 1979 by the Israeli cryptographer Adi Shamir. The essence of Shamir's scheme lies in the ability to back up, share and recover a secret by breaking up the secret into multiple shares that are individually useless and leak no information about the secret or the scheme setup.
Seed XOR
Seed XOR is a technique that consists of storing secrets in 2, 3, or 4 parts that look and behave just like the original secret. One 24-word seed phrase becomes two or more parts that are also BIP-39 compatible seed phrases. These should be backed up in your preferred method, metal or otherwise. These parts can be individually loaded with honeypot funds as each one is 24 words, with the 24th being the checksum and will work as such in any normal BIP-39 compatible wallet.
Read moreSeedQR
SeedQR is a standard developed by SeedSigner for encoding a recovery phrase as a human-transcribable QR code. Simply put, it is another way to store a recovery phrase — except as a QR code instead of a list of 12 or 24 words.
Bitcoin-only firmware
Bitcoin-only firmware only supports Bitcoin. Less code means less attack surface which further improves your security when only storing Bitcoin.
Multi-sig (PSBTs)
Bitcoin multi-sig allows having up to 15 possible signers to approve any transaction. When using multi-sig, you will have at least one seed phrase per signer, so you can store them in multiple locations.
Read moreCoin Control
Coin control is a feature in some Bitcoin wallets that allows users to have greater control over the selection of inputs (also known as UTXOs — Unspent Transaction Outputs) when creating a transaction. This increased control provides users with benefits such as enhanced privacy, transaction fee optimization, and more efficient management of their Bitcoin holdings.
Custom Node
For bitcoin to function reliably and securely, it relies on the voluntary participation of thousands of individuals worldwide. Nodes, which make up the bitcoin network and verify transactions and blocks, are crucial to this process. There are many reasons to consider running your own bitcoin node, including personal benefits and the benefits to the security and resilience of the bitcoin ecosystem.
Read moreTestnet
Testnet is an alternative Bitcoin blockchain specifically designed for testing purposes. It is a sandbox environment that allows developers, users, and businesses to experiment with new features, applications, and ideas without risking real Bitcoin or disrupting the main Bitcoin network (mainnet). The Testnet is a valuable tool for the Bitcoin community because it enables the development and testing of new technologies, improvements, and features before they are implemented on the mainnet.
User Added Entropy
Some hardware wallets allow users to generate their own true random number (entropy) with rolling dice. This allows you to remove any risk of the random number generator (RNG) being compromised, because you are creating the private key directly.
Tor
Tor aims to make all users look the same, making it difficult for you to be fingerprinted based on your browser and device information. With Tor, your traffic is relayed and encrypted three times as it passes over the Tor network. The network is comprised of thousands of volunteer-run servers known as Tor relays.
Anti-Klepto / Anti-Exfil protocol
Hardware wallets use private keys to create digital signatures that authorize transactions. These signatures are mathematically constructed with a nonce, which is a secret number chosen by the hardware wallet. However, a malicious hardware wallet can potentially leak private keys through manipulated nonces. To prevent this, a nonce contribution from the host software can be included to provide added security for the user’s funds.
The anti-klepto protocol can safeguard against this type of attack by allowing a computer or mobile wallet to verify the integrity of signatures and take action if any manipulation is detected.
U2F Authentication
Universal 2nd Factor (U2F) is an open authentication standard that strengthens and simplifies two-factor authentication (2FA) by using specialized USB or NFC devices based on a similar security technology found in smart cards.
FIDO authentication
FIDO U2F is a two-factor authentication method (2FA) developed by the FIDO Alliance.
Hardware-based SSH/GPG
Some Hardware Wallets can be used as security devices to operate GPG, SSH and age. Instead of keeping your key on your computer and decrypting it with a passphrase when you want to use it, the key is generated and stored on the hardware wallet and never reaches your computer.
Nunchuk
Eliminate single points of failure with their state-of-the-art multisig wallet. Get access to inheritance planning, scheduled payments, emergency lockdown, and much more.
Learn moreElectrum
Securing Bitcoin payments since 2011, Electrum is one of the most popular Bitcoin wallets. Electrum is fast, secure and easy to use. It suits the needs of a wide spectrum of users.
Learn moreSparrow
Sparrow is a Bitcoin wallet for those who value financial self sovereignty. Sparro's emphasis is on security, privacy and usability. Sparrow does not hide information from you - on the contrary it attempts to provide as much detail as possible about your transactions and UTXOs, but in a way that is manageable and usable.
Learn moreSpecter Desktop
Specter Desktop is FOSS free open source software under the MIT license. It exists to empower you, to hold your own keys and follow self sovereign best practices. Your Bitcoin node, on your hardware, paired with your signing devices, creating secure wallets for bitcoin self-custody.
Learn moreCasa
Casa helps you secure your crypto without wondering if you're doing it right. Hold your own keys and safely take self-custody today.
Casa protects your bitcoin with multiple keys, each stored in separate places for extra security. If one of your keys is lost or stolen, your assets are still protected and you can still access them.
Learn moreUnchained
Protect your bitcoin with cold storage that you control and get access to trading, inheritance, loans, and IRAs—all backed by the best support in the industry.
Learn moreMetaMask
A crypto wallet & gateway to blockchain apps. Start exploring blockchain applications in seconds. Trusted by over 30 million users worldwide.
Learn more1.14" (240x135 px)
1.14-inch IPS LCD display, 240×135 RGB 16-bit
YES
Camera for fully air-gapped transactions: Scan and display QR codes directly on Jade to send bitcoin and verify addresses - no USB or Bluetooth connection required.
Blockstream Jade: Air-Gapped Transactions Using QR ScanYES
Camera for fully air-gapped transactions: Scan and display QR codes directly on Jade to send bitcoin and verify addresses - no USB or Bluetooth connection required.
Blockstream Jade: Air-Gapped Transactions Using QR ScanNO
YES
Secure Boot is a technology that prevents unsigned boot firmware from running on your Jade, such as a compromised firmware image from an attacker. It ensures that only firmware you intend to run is used to boot the device.
From USB or Bluetooth
YES
YES
YES
When entering each digit, the default start number is randomized for Secure PIN Entry.
YES
Jade is only unlocked successfully if the correct PIN is entered. To prevent against brute-forcing, the oracle and Jade will delete their keys if the wrong PIN is entered three times. At this point, user's will need to restore Jade with their recovery phrase.
YES
On Hardware Wallet
6 digits PIN.
YES
YES
YES
YES
YES
YES
YES
YES
YES
USB-C (disabled by default)
Encrypted USB communication (MiTM protection)
YES (disabled by default)
YES (2)
YES
YES
NO
YES
YES
Coldcard permanently bricks itself after entering wrong PIN 13 times! “Countdown to Brick” Set a special PIN code, and when used, the Coldcard is immediately bricked while a normal-looking countdown for login is shown (default 1 hour). As an alternative to bricking, you can make it consume all but the final PIN attempt. Of course this countdown looks just like a normal “login countdown” but for some reason it errors out at the end of the period.
https://blog.coinkite.com/version-4.0.2-released/YES
YES
YES
YES
YES
YES (encrypted)
YES
YES
YES
YES
USB-C (disabled by default)
Encrypted USB communication (MiTM protection)
YES (disabled by default)
YES
YES
NO
YES
YES
Coldcard permanently bricks itself after entering wrong PIN 13 times! “Countdown to Brick” Set a special PIN code, and when used, the Coldcard is immediately bricked while a normal-looking countdown for login is shown (default 1 hour). As an alternative to bricking, you can make it consume all but the final PIN attempt. Of course this countdown looks just like a normal “login countdown” but for some reason it errors out at the end of the period.
https://blog.coinkite.com/version-4.0.2-released/YES
YES
YES
YES
YES (encrypted)
YES
YES
YES
128 x 64 px
NO
YES
A miniature computer (aka a microcontroller chip) inside the BitBox02 allows running open-source security code that is available from high-quality publicly-vetted repositories. A separate secure chip, the ATECC608B hardens access to your wallet in multiple ways.
Best of both worlds: using a secure chip with open source firmwareYES
Secure chip: As a fallback to avoid brute force attacks if the 10-attempt limit imposed by the microcontroller is somehow bypassed by a thief, a monotonic counter in the secure chip limits the total attempts of device-password entries. In addition, password stretching increases the amount of time needed to test each possible password, making such attacks infeasibly difficult.
Epoxy potting: A specialized solvent-resistant epoxy is applied over the microcontroller and secure chip to completely encapsulate it. Once dry, the epoxy bonds the chips to the casing of the BitBox02. If the casing is opened to access the chips, the chips will be physically ripped off the PCB, thus destroying the BitBox02.
Breaking pins: The glue used to attach both halves of the BitBox02 casing is specially chosen to create a permanent bond between the pins of the top casing and the pin holes of the bottom casing. An attempt at separating both halves of the casing will physically break the pins. Two halves can no longer cleanly re-attach, thus making it obvious to the user that the BitBox02 has been opened.
Anti-klepto explained: how the BitBox02 protects you against leaking private keys How we mitigate supply chain attacksYES
YES
YES
If you type in an incorrect device password 10x times, then your device will reset to factory reset.
YES
On Hardware Wallet
YES (Not encrypted)
YES
YES
YES
128 x 64 px
NO
YES
A miniature computer (aka a microcontroller chip) inside the BitBox02 allows running open-source security code that is available from high-quality publicly-vetted repositories. A separate secure chip, the ATECC608B hardens access to your wallet in multiple ways.
Best of both worlds: using a secure chip with open source firmwareYES
Secure chip: As a fallback to avoid brute force attacks if the 10-attempt limit imposed by the microcontroller is somehow bypassed by a thief, a monotonic counter in the secure chip limits the total attempts of device-password entries. In addition, password stretching increases the amount of time needed to test each possible password, making such attacks infeasibly difficult.
Epoxy potting: A specialized solvent-resistant epoxy is applied over the microcontroller and secure chip to completely encapsulate it. Once dry, the epoxy bonds the chips to the casing of the BitBox02. If the casing is opened to access the chips, the chips will be physically ripped off the PCB, thus destroying the BitBox02.
Breaking pins: The glue used to attach both halves of the BitBox02 casing is specially chosen to create a permanent bond between the pins of the top casing and the pin holes of the bottom casing. An attempt at separating both halves of the casing will physically break the pins. Two halves can no longer cleanly re-attach, thus making it obvious to the user that the BitBox02 has been opened.
Anti-klepto explained: how the BitBox02 protects you against leaking private keys How we mitigate supply chain attacksYES
YES
YES
If you type in an incorrect device password 10x times, then your device will reset to factory reset.
YES
On Hardware Wallet
YES (Not encrypted)
YES
YES
YES
YES
YES
Tamper-evident seal on the outside of the box
Supply chain validation
From MicroSD Card
YES
YES
YES
In the event that an incorrect PIN is entered 21 times, the device will self destruct and become permanently useless.
YES
The Secure Element includes monotonic counters that enable PIN attempt tracking, where the Secure Element will “brick” itself by no longer permitting login attempts if the maximum number of attempts is exceeded.
The Secure Element configuration in Passport allows a maximum of 21 incorrect PIN attempts.
SecurityYES
On Hardware Wallet
6 to 12 digits length
YES
YES (encrypted)
YES
YES
YES
YES
YES
YES
YES
From USB Data
YES
YES
YES
After 16 incorrect attempts, your device wipes itself, making it possible to access your funds only with the use of your
Common security threatsYES
After 16 incorrect attempts, your device wipes itself, making it possible to access your funds only with the use of your
Create wipe code to erase deviceVia computer or mobile
Up to 50 digits length
YES
YES
YES
YES
YES
YES
NO
YES
YES
YES
YES
From USB Data
YES
YES
YES
After 16 incorrect attempts, your device wipes itself, making it possible to access your funds only with the use of your
Common security threatsYES
After 16 incorrect attempts, your device wipes itself, making it possible to access your funds only with the use of your
Create wipe code to erase deviceYES
YES
YES
YES
YES
YES
YES
NO
YES
YES
YES
YES
YES
Transaction Signing via QR Code: By using QR code transmissions, are eliminated potential malware infiltration risks and delivered a level of transparency that just isn't possible with Bluetooth or USB.
YES
YES (EAL 5+)
YES
Supply chain attacks are one of the most serious security threats for hardware wallets because they target vulnerabilities in the logistics process and can happen without anyone's knowledge. Keystone's Web Authentication process will give assurance that your device has not fallen victim to any sort of supply chain attack e.g. Device tampering
Web Authentication: A Counter to Supply Chain AttacksFrom MicroSD Card
Offline Firmware Upgrades. In order to minimize all attack vectors, firmware upgrades are done via a MicroSD Card.
YES
YES
Keystone has pioneered the industry's first Open Source code for hardware wallets. It allows everyone to analyze how private keys are derived from physically generated entropy (TRNG) and remain entirely confined within the Secure Element.
YES
After 12 incorrect attempts using the pattern unlock option, users will be required to unlock their devices with the text password.
After 5 incorrect attempts to unlock your device with the text password option, the device will automatically wipe itself of all data.
User Guide: PasswordYES
YES
Keystone supports SLIP39. It enables you to create a Shamir Backup for your recovery phrase. This also helps with counteracting against the two greatest risks involved with protecting your recovery seed: Theft & Destruction.
Why Keystone implemented Shamir BackupsYES
YES
Keystone's Bitcoin-only Firmware is compatible with various top Bitcoin wallets that offer multi-sig functionalities. Their team co-authored BIP-129, which is widely used as the standard process for setting up Bitcoin multi-sig wallets securely across different protocols.
User Guide: Multi SignatureYES
Generate your recovery phrase by manually rolling dices. The manual entropy eliminates all trust dependencies on the Secure Element or PRNG (Pseudorandom Number Generator).
How to verify the recovery phrase created by dice rolling Use Dice to Generate Recovery PhraseYES
YES
YES
YES
YES
YES
Transaction Signing via QR Code: By using QR code transmissions, are eliminated potential malware infiltration risks and delivered a level of transparency that just isn't possible with Bluetooth or USB.
YES
YES (EAL 5+)
YES
Supply chain attacks are one of the most serious security threats for hardware wallets because they target vulnerabilities in the logistics process and can happen without anyone's knowledge. Keystone's Web Authentication process will give assurance that your device has not fallen victim to any sort of supply chain attack e.g. Device tampering
Web Authentication: A Counter to Supply Chain AttacksSelf-Destruct Mechanism: Automatically destroys your secret keys if someone tries to physical tamper with the device
Self-Destruct Mechanism’s Unique Defense Against Side-Channel AttacksFrom MicroSD Card
Offline Firmware Upgrades. In order to minimize all attack vectors, firmware upgrades are done via a MicroSD Card.
YES
YES
Keystone has pioneered the industry's first Open Source code for hardware wallets. It allows everyone to analyze how private keys are derived from physically generated entropy (TRNG) and remain entirely confined within the Secure Element.
YES
After 12 incorrect attempts using the pattern unlock option, users will be required to unlock their devices with the text password.
After 5 incorrect attempts to unlock your device with the text password option, the device will automatically wipe itself of all data.
User Guide: PasswordYES
YES
Keystone supports SLIP39. It enables you to create a Shamir Backup for your recovery phrase. This also helps with counteracting against the two greatest risks involved with protecting your recovery seed: Theft & Destruction.
Why Keystone implemented Shamir BackupsYES
YES
Keystone's Bitcoin-only Firmware is compatible with various top Bitcoin wallets that offer multi-sig functionalities. Their team co-authored BIP-129, which is widely used as the standard process for setting up Bitcoin multi-sig wallets securely across different protocols.
User Guide: Multi SignatureYES
Generate your recovery phrase by manually rolling dices. The manual entropy eliminates all trust dependencies on the Secure Element or PRNG (Pseudorandom Number Generator).
How to verify the recovery phrase created by dice rolling Use Dice to Generate Recovery PhraseYES
YES
YES
YES
YES
YES
585 mAh
Li-ion Polymer 585mAh 3.7V
YES
Bluetooth Low Energy. BLE 4.1 Nordic
YES (EAL5+)
YES
FingCapacitive Touch Sensor. 509 dpi Resolution. 160 x 160 Pixels With 8 bit Depth
YES
There are multiple security features are implemented at the D'CENT gift box. First one is plastic wrap and user should not use it when plastic wrap is broken or missed. Second on is "Security stickers" at both side and make sure both security stickers are not broken. With those 2 features, users can check whether wallet is opened before it reaches.
If external code is detected during an update, the entire wallet is wiped out.
From USB Data or OTG cable
YES
When un-authorized user scans fingerprint more than 5 times, wallet will ask user to enter 6-8 PIN. And when 10 trials fail for correct PIN entry, wallet will wipe out entire information at the wallet.
YES
YES
YES
After three incorrect PIN code entries, Ledger hardware wallets reset to factory settings, erasing the private keys from their secure storage.
User Guide: Forgot your pin code?YES
YES
YES
YES
YES
YES
After three incorrect PIN code entries, Ledger hardware wallets reset to factory settings, erasing the private keys from their secure storage.
User Guide: Forgot your pin code?YES
YES
YES
YES
YES
YES
After three incorrect PIN code entries, Ledger hardware wallets reset to factory settings, erasing the private keys from their secure storage.
User Guide: Forgot your pin code?YES
YES
YES
YES
Ledger Stax allows setting your favorite picture or NFT as its lock screen.
YES
YES
Tamper-proof label
Self Destruction seal
YES
YES
YES
10 wrong code attempts trigger self-erase
YES
10 wrong code attempts trigger self-erase
YES
You can enable/disable Bluetooth by software, but not by hardware.
YES
Tamper-proof label
Self Destruction seal
YES
YES
YES
10 wrong code attempts trigger self-erase
YES
10 wrong code attempts trigger self-erase
On Hardware Wallet
4 to 50 digits length
YES
You can enable/disable Bluetooth by software, but not by hardware.
YES
Tamper-proof label
Self Destruction seal
YES
YES
YES
You can create, reset, erase device w/ the PIN. There's also a self-destroy function after 10 times wrong tries.
YES
You can create, reset, erase device w/ the PIN. There's also a self-destroy function after 10 times wrong tries.
On Hardware Wallet
4 to 50 digits length
YES
YES
Camera: 2.4M AF
YES
YES
YES
If an user try to unlock with the wrong pin five times, a warning is displaying. If the user use the wrong pin ten times, everything in the device is deleted.
On Hardware Wallet
6 digits length
YES
YES
Camera: 2.4M AF
YES
YES
YES
If an user try to unlock with the wrong pin five times, a warning is displaying. If the user use the wrong pin ten times, everything in the device is deleted.
YES
YES
YES
IP55-certified
It's not completely waterproof but the ZERO is IP55-certified and is resistant to water and dust.
YES
SOON
SOON
On Companion App
YES
YES
YES
YES
YES
YES
YES (EAL5+)
YES
YES
YES
YES
YES
YES
YES
YES
The key component in SeedSigner is a specific version of the Raspberry Pi Zero single board computer (version 1.3) that does not include WiFi or Bluetooth functionality; the absence of these modules ensures that your private keys never leave the device. Communication with wallet software is accomplished using a two-way QR code exchange process. Information about a proposed transaction is displayed by the wallet software on your computer’s screen, encoded in multiple QR codes, and you scan in the transaction information using SeedSigner’s built-in camera. Information about the proposed transaction is then displayed on the SeedSigner screen. Using cryptographic signatures, SeedSigner then proves that it has the correct private keys to authorize the transaction, and QR codes demonstrating that proof are displayed on SeedSigner’s screen. You then use your computers web-camera to input the QR codes generated by SeedSigner to authorize the transaction.
YES
YES
YES
Guided interface to manually create a SeedQR for instant input
YES
Create a 24-word BIP39 seed phrase with 99 dice rolls or by taking a digital photo
YES
YES
YES
Scan QR code to import wallet descriptor.
YES
Use coin-flips to introduce extra randomness to key generation.
YES
YES
Each TAPSIGNER made by Coinkite carries a certificate, signed by their factory. Like the X.509 certificate chain for OPENDIME, it can be traced back and verified in the field.
The Python code in cktap will always verify the certificate chain when speaking to TAPSIGNER, and mobile wallets should do the same.
YES
NO
YES
TAPSIGNER comes without a private key. The setup process combines your entropy (random bits) with secret entropy picked by the card.
NO
- You have to use NFC to sign transactions.
- When creating a wallet, the seedphrase is sent and displayed on the companion mobile app.
- When restoring a wallet, you need to write the seedphrase on the companion mobile app.
NOTE: When creating/restoring a wallet, the seed phrase is displayed, but it is not saved on the phone. It is also programmatically blocked from screenshots or recordings. Users can do either of these processes in Airplane mode for added security.
Via mobile
The Arculus App is only accessible on your smartphone when used with your unique biometric lock. The biometric lock gives you and you alone access to your Arculus Cold Storage Wallet.
YES
Card is shipped locked, meaning the code on the card can’t be updated so it isn’t possible for hacked or infected code to be introduced.
YES
USB 3.0 SIM/EID card reader needed
NO
When created, the seedphrase is displayed on the thirdparty app on your personal computer.
When restoring a wallet, you need to write the seedphrase on the software app.
NOTE: When creating/restoring a wallet, the seed phrase is displayed, but it is not saved anywhere.
You can use a Seedkeeper card (https://seedkeeper.io) which allow you to generate a masterseed directly onto the chip and then export it to your hardware wallet in an encrypted way. So, in this case you will be 100% airgapped
YES (EAL6)
The Satochip hardware wallet is built on a contact interface javacard and runs on a specific operating system called JCOP. This system combined with a secure chip is great for use where a high security solution at a low cost is needed.
YES
Every chipcard is digitally signed using our own certificate. This allow the user to check the card authenticity when he gets it.
BTC + Alt Coins
Satochip supports BTC, BCH, XEC, LTC, ETH and all the ERC-20 tokens, BNB and the BEP-20 tokens along with the EVM compatible network. And also CounterParty (XCP).
YES
YES
YES
If a wrong PIN code is entered multiple time, the chip card get bricked
Via 3rd-party app
Up to 16 chars
Via 3rd-party app
Each Satochip hardware wallet is delivered non-initialized to the customer.
During the wallet initialization with the suitable Satochip client, the seed is shown on the screen and must be confirmed by the user.
THIS IS THE ONLY TIME the seed is visible to the user and the only opportunity to do a backup of the seed!
After that, it is no more possible to export the seed or any private key from the Satochip.
The seed and optionally the PIN code along with the derivation path are the information the user needs to recover the Satochip hardware wallet on another hardware wallet.
Via 3rd-party app
Given that there is no screen on the device, the user generates its seedphrase on its computer (eg: using Electrum). So the entropy is dealt by the software client.
This is not the safest method to initialize a hardware wallet. So they developed a product called Seedkeeper that allow the user to generate a master key directly onto the chipcard and then initialize its hardware wallet from that generated master key. This process is completely secure and encrypted end-to-end.
YES
YES
IP68. The wallet can survive against dust, water and temperature extremes. Freeze it in the Arctic, carry with you all the way through the Sahara desert or submerge to the bottom of the Mariana Trench, and it will still be completely functional.
Tangem Hardware Wallet | I Tested It In Water!!!On Mobile App
YES
Tangem cards cannot be physically modified, as there is a monolithic chip inside the card. Tangem cards cannot be modified in terms of software.
The official app can accurately check the following:
— that the card was produced by Tangem;
— that the card is flashed with Tangem software.
It is entirely safe to buy even in the underpass thanks to end-to-end certification. Most importantly, note that:
1. You have installed the official Tangem app.
2. Cards should prompt you to create a wallet. If not, reset the cards to factory settings.
The Tangem card carries only one single secure chip providing direct end-to-end attestation of the entire device. This unique feature guarantees that you hold a genuine Tangem card, regardless of how and from where it was delivered to you. There are several mechanisms of attestation for the holder to ensure they operate a genuine Tangem card:
1. Card attestation. During the manufacturing process, special service keys are generated within the card (not to be confused with wallet keys) and the public key of the card is uploaded to the Tangem attestation service back-end. At the time of attestation, the card confirms the ownership of the corresponding private key, and the public key is compared with the one uploaded to the server.
2. Attestation of wallets. If wallets have already been created on the card, during the attestation process, a special challenge will be sent to the card to verify the possession of the corresponding private keys.
3. Firmware attestation. The card can access any random segment of its flash memory containing firmware and return its hash. Thus, the holder can make sure that the firmware installed on the card was produced by Tangem as well as that this is exactly the firmware that was checked by the auditor.
The cards' microprocessor employs many anti-tampering mechanisms that can recognize various types of invasive and non-invasive attacks. Tangem COS will react to attempts of such attacks according to its severity.
Not possible
For user safety, the card is flashed once and is not updated again. This eliminates the risk of counterfeit firmware and possible theft of funds.
The ability to update the software of a hardware wallet means that you should trust the wallet manufacturer and hope that, at some point, you will not receive an update that compromises your keys.
In the case of Tangem, the card is flashed only once, and the firmware has been audited by the independent Swiss company Kudelski Security. Moreover, the card can prove that it has precisely the firmware that was audited. This is one of the wallet's unique features that makes Tangem the most secure and trusted wallet in the world.
Firmware update: a necessity or a danger?NO
Independent firmware audit. An independent audit of the firmware and source code carried out by Swiss auditing company Kudelski Security offers a further security guarantee.
YES
After the sixth incorrect attempt to enter the code, the delay time for the next attempt is increased by 1 second. The maximum delay time is 45 seconds. The delay is only reset after the access code has been successfully entered.
NO
Tangem does not use BIP39 technology (seed-phrase) cause considers it highly insecure. The presence of a public key is a potential vulnerability. Firstly, hot and "warm" wallets always have access to the key, which can be hacked. Secondly, having the key in an open place at home, work, or elsewhere is always a potential risk of compromise. Instead, Tangem offers a backup on 2 or 3 identical cards. The cards hold the keys and never share them with anyone; they are protected by an access code. Thus you have 2 or 3 duplicate keys for one vault (your wallet). They are equal; you can keep them in different places and use any of them. And the most important thing is that the keys have never been in public view. No bug or vulnerability in the software can expose the key at the moment it is generated. It is as safe and secure as possible.
Seed phrase: a risky solution? How Tangem Wallet backs up your private keysNO
When you activate Tangem Wallet, the chip in the card generates a random private key. The key is generated on the card using a hardware random number generator during card activation. The entropy for the random number is taken from the chip's physical sensors.
YES
Encrypted Bluetooth. The Bluetooth connection can only be initialized when the wallet is turned on within a proximity of 10 meters. The design of our product uses AES256 Encryption to communicate between a CoolWallet and your phone along with a dedicated pairing passcode. Thus, any unauthorized devices are prohibited to communicate with the card for data retrieval.
YES (EAL5+)
Your private key is stored safely in a CCEAL5+ certified S.E. Chipset which is equivalent to FIPS complied security level, similar to the US military's requirements, and the private key never leaves the CoolWallet. This chip calculates all the necessary algorithms and transmits only the calculated results (non-sensitive data) out to the phone via Bluetooth.
Hardware Wallet Secure Element: The Complete GuideYES
CoolWallet uses a patented "Cold Compression" process which makes it impossible for hackers to install intercepting devices that can alter the transaction details. The CoolWallet is wafer-thin and there is no extra space on its circuit board. With an adhesive layer that cannot be removed without visual damage, any alteration or tampering will be immediately visible on the CoolWallet. In any case, the Secure Element will still protect your private keys.
Can hackers obtain the private key from the secure element chipset?YES
Encrypted Bluetooth. The Bluetooth connection can only be initialized when the wallet is turned on within a proximity of 10 meters. The design of our product uses AES256 Encryption to communicate between a CoolWallet and your phone along with a dedicated pairing passcode. Thus, any unauthorized devices are prohibited to communicate with the card for data retrieval.
YES (EAL6+)
Your private key is stored safely in a CCEAL6+ certified S.E. Chipset which is equivalent to FIPS complied security level, similar to the US military’s requirements, and the private key never leaves the CoolWallet. This chip calculates all the necessary algorithms and transmits only the calculated results (non-sensitive data) out to the phone via Bluetooth.
Hardware Wallet Secure Element: The Complete GuideYES
CoolWallet uses a patented "Cold Compression" process which makes it impossible for hackers to install intercepting devices that can alter the transaction details. The CoolWallet is wafer-thin and there is no extra space on its circuit board. With an adhesive layer that cannot be removed without visual damage, any alteration or tampering will be immediately visible on the CoolWallet. In any case, the Secure Element will still protect your private keys.
Can hackers obtain the private key from the secure element chipset?