Mcap -- BTC -- ETH -- SOL -- BNB -- XRP -- F&G -- View Market
Loading prices…

Hardware Wallet

A physical device that stores crypto private keys offline and signs transactions internally so the keys never touch an internet-connected computer.

Wallets 3 min read

A hardware wallet is a small physical device β€” usually USB-stick-sized, sometimes shaped like a credit card β€” designed to store private keys in an isolated environment and sign transactions without ever exposing the keys to a connected computer. The device has a screen, a button or two, and a secure element chip. When you want to send a transaction, your regular wallet software prepares it, sends the unsigned transaction to the device, you verify the details on the device’s own screen, confirm with a physical button press, and the device sends back a signature. The private keys never leave the device.

Ledger and Trezor are the two names you will hear most often. Ledger makes the Nano S Plus, Nano X, and the Stax; Trezor makes the Model One, Model T, and Safe 3. There are others β€” Coldcard is popular with Bitcoin maximalists, Keystone makes air-gapped devices that communicate via QR code rather than USB, and GridPlus Lattice1 is positioned for institutional use. They all do roughly the same thing, with varying tradeoffs on open-source-ness, supported chains, and convenience features.

Why This Matters More Than It Sounds Like It Does

The central problem with self-custody is that your private keys are the entire thing. Anyone who sees them can drain your wallet. If you store them in software on a computer that is connected to the internet, you are one browser exploit, one malicious extension, or one clipboard-hijacking piece of malware away from losing everything. Hot wallets on desktops and phones are good enough for small amounts that you are actively using, but they are not a safe place to park life savings.

A hardware wallet moves the keys to an environment that does not run arbitrary code. Even if your computer is fully compromised by a sophisticated attacker, they cannot sign a transaction without physical possession of your device and knowledge of its PIN. The security model is that compromising the host computer is relatively easy and compromising a physical device you control is substantially harder. That gap is the whole value proposition.

The Ledger Controversy

In 2023, Ledger announced a feature called “Ledger Recover” that allowed users to split their seed phrase into encrypted shards held by third-party custodians, to be reconstructed if the user lost their device. This caused a massive backlash. The feature was opt-in, but the fact that it was technically possible meant that Ledger’s firmware had always had the ability to extract the seed from the secure element β€” and the community had assumed, based on earlier marketing, that this was architecturally impossible. The ensuing argument ran for weeks and drove some users to Trezor or air-gapped alternatives. The episode was a useful reminder that “hardware wallet” is a trust relationship with the manufacturer, not an absolute security guarantee, and that the exact threat model you care about matters when choosing one.

How to Actually Use One

When you set up a hardware wallet, it generates a seed phrase β€” 12 or 24 words β€” which is the master secret that all keys are derived from. You write this down on paper or stamp it into metal and store it somewhere safe. If your device is lost, stolen, or destroyed, you can recover by buying a new device and entering the seed. The device itself is disposable; the seed phrase is the thing you are actually protecting. People who treat the device as the valuable object and the seed phrase as an afterthought are doing it backwards, and it is one of the main ways funds get permanently lost.