Skip to content

Latest commit

 

History

History
16 lines (16 loc) · 1.04 KB

File metadata and controls

16 lines (16 loc) · 1.04 KB

Definition

Special devices for storing private keys (incl coins - e.g. [[Crypto-Currency]]).

  • Secure in hardware (can only perform the required key storage functions)
  • airgapped / disconnected, so unavailable for attackers
  • many require transaction confirmation by physically pressing a button on the device
  • encrypted with a pin, meaning they are unusable when phycially stolen
  • can support multiple cryptocurrencies
  • software often open source, so can be independently analysed

Weaknesses

Type Description
[[Main-in-the-Middle Attack]] compromising the connection between the hardware wallet, and the internet connection to the blockchain when the user make transactions.
[[Supply Chain Attack]] Sabotaging supplied components of the wallets (or software), before they are supplied to consumers.

Examples