📜 ⬆️ ⬇️

Bitcoin hardware wallets


We continue to deal with various wallets for cryptocurrency. Last time I rummaged a bit in software wallets, but today I’ll tell you a little about hardware. At the beginning of a small reminder.

By wallets in cryptocurrencies understand simultaneously:


In order not to be confused when we talk about keying, I will use the term "private key". Although we all understand that in a key pair there is also an open one, as well as the fact that there can be several pairs.
')
We will talk about the wallet exactly as a means of managing, storing and conducting transactions. Without a wallet, you cannot receive, save or spend your bitcoins or funds in another cryptocurrency. Wallet - your personal interface to the cryptocurrency network, similar to a bank account for fiat currency.

So, hardware wallets. Let's start with the definition. Hardware wallets are physical devices created for the safe storage of cryptocurrency. Some software and online wallets support the storage of funds on hardware wallets.

Before proceeding to a comparison of specific models of hardware wallets, let's see what most of these wallets can do, and we’ll dwell more on the features of each of them.

Spherical hardware wallet


So, any hardware wallet (of those considered):


The main differences


A little more detail on the threats that protect you from the use of hardware wallets, unlike other types of wallets.

From online wallets


Since, in the case of online wallets, your private keys are stored on remote servers, you inevitably put yourself at risk of losing money in the following situations:


From software wallets to computer


Hacking or infecting your computer with a virus will steal your wallet's private key.
The computer has a 1000 times greater attack surface than a hardware wallet.

From mobile wallets to smartphone


These wallets for smartphones can be divided into 2 groups:


From USB stick


Obviously, flash drives were never created as a security tool, but not everyone understands this.


By the way, it can be protected from theft or loss if you use special flash drives that require entering a PIN code to gain access to the data.

From an encrypted wallet


Even if you use a complex password to encrypt your wallet, you cannot protect private keys from being compromised. Virus software will simply try to get your password, and using the password you will get access to the wallet. Or just wait until you enter your password and unlock access to private keys. Not to mention the possibility of simply copying the wallet file and then sorting through the code phrase in the dictionaries.

From storing keys on paper


In fact, proper storage of a private key on a piece of paper is fairly safe. That's just very uncomfortable. Plus, to work with such a wallet, you still have to enter your private key into one of the above wallets. And after that sleep in peace will not work.

The risks and potential vulnerabilities of hardware wallets


To date, there has not been a single confirmed case of theft of a cryptocurrency from a hardware wallet. Despite the fact that they appeared not so long ago, they have already proven themselves well.

However, it should be understood that hardware wallets are not a silver bullet to protect your cryptocurrency funds. There are several security risks to which all or some of the wallets are exposed. These risks need to be taken into account when you decide which hardware wallet to purchase and how much cryptocurrency can be stored on it.


Summarize


Despite the fact that hardware wallets will not protect you from all possible threats, choosing a hardware wallet from a trusted, technically competent manufacturer with a good reputation will allow you to protect yourself from much more threats than using software wallets.

An ideal solution for long-term storage can be a solution based on open source software that uses a common hardware platform (for example, raspberry pi), as well as the use of a trusted source of entropy (such as a regular cube).

However, hardware wallets manufacturers know about these risks and potential vulnerabilities and are trying to propose various solutions. I decided to make a small review of the most popular and interesting hardware wallets, so that you yourself could draw conclusions about their security.

Trezor


The device was introduced in 2014.


So, what Trezor can offer us:


The PIN input mechanism itself is quite original. In order not to describe, just give the video:


What is nice, the manufacturer gives you very reasonable recommendations for the safe storage of this password phrase.


Issue price - $ 99

The main disadvantage is that it supports less cryptocurrency than ledger.

Ledger nano s





I will attach here also a video showing PIN input. In my opinion, not the most convenient way. It is especially hard to enter words like this to restore the backup of the wallet.


Issue price - 58.00 €

The main drawback is the quality of the manufacture of the device itself. The left button sometimes perceives a single press as a double.

KEEPKEY





The PIN input mechanism is the same as in Trezor, so there will be no separate video.

The price of the issue is $ 129.00 . More than the competition, but the screen is really good.

Bitlox




If previous wallets were more like classic tokens or devices of the TrustScreen class, then this one emulates smart cards.


A distinctive feature of this hardware wallet is a “vigorous” website. As well as the explicit positioning is not so much on the protection of funds, as on privacy and use in Darknet.

The price of the issue is $ 98.00 .

digitalbitbox




Another interesting device. Although it does not have a screen for displaying transaction information, I decided to include it in my mini-review. Already very non-standard idea.


Breaking into


Not to mention the hacking history of hardware wallets. Josh Datko and Chris Quartier at the DEF CON conference gave a presentation on which they shared their tools and methods that allow hacking into some hardware wallets for cryptocurrency.

Demonstrated the application of these techniques to the microcontroller STM32F205, which was used in devices from Trezor and Keepkey.


The presentation was based on a study performed by Jochen Hoenicke in 2015, which resulted in a private key being compromised in a Trezor device using an oscilloscope worth $ 70. Vulnerability was closed by the manufacturer. This, however, does not exclude the possibility of the emergence of new similar attacks both to the indicated devices and to devices from other manufacturers.

Let's sum up


Hardware wallets will not protect your funds from all possible threats, but their proper use will in most cases protect your funds in cryptocurrency, unless, of course, you have them :) At least they are many times more reliable than software wallets. There are already many models on the market, so there is plenty to choose from, including for the price. Although delivery to Russia still have a little tricky.

Source: https://habr.com/ru/post/341456/


All Articles