Hardware Wallet
What is Hardware Wallet?
Hardware WalletA dedicated physical device that stores cryptocurrency private keys in a tamper-resistant secure element and signs transactions offline.
A hardware wallet is a small, purpose-built device that generates and stores private keys inside an isolated secure element or microcontroller, never exposing them to the connected computer or phone. Transactions are constructed on the host, sent to the device, and only released after the user verifies the destination address and amount on an on-device screen and confirms with a physical button or PIN. Because keys never leave the device, hardware wallets defeat most malware, clipboard hijackers, and remote attackers that compromise general-purpose operating systems. Leading models include Ledger Nano, Trezor, Coldcard, and Keystone. Their main residual risks are supply-chain tampering, malicious firmware, and social-engineering of the recovery phrase.
● Examples
- 01
A Ledger Nano X stores the keys for a long-term Bitcoin holding and only signs withdrawals after on-device confirmation.
- 02
A Trezor Safe 3 is used to approve Ethereum transactions, blocking malware on the user's laptop from silently re-routing funds.
● Frequently asked questions
What is Hardware Wallet?
A dedicated physical device that stores cryptocurrency private keys in a tamper-resistant secure element and signs transactions offline. It belongs to the Web3 & Blockchain category of cybersecurity.
What does Hardware Wallet mean?
A dedicated physical device that stores cryptocurrency private keys in a tamper-resistant secure element and signs transactions offline.
How does Hardware Wallet work?
A hardware wallet is a small, purpose-built device that generates and stores private keys inside an isolated secure element or microcontroller, never exposing them to the connected computer or phone. Transactions are constructed on the host, sent to the device, and only released after the user verifies the destination address and amount on an on-device screen and confirms with a physical button or PIN. Because keys never leave the device, hardware wallets defeat most malware, clipboard hijackers, and remote attackers that compromise general-purpose operating systems. Leading models include Ledger Nano, Trezor, Coldcard, and Keystone. Their main residual risks are supply-chain tampering, malicious firmware, and social-engineering of the recovery phrase.
How do you defend against Hardware Wallet?
Defences for Hardware Wallet typically combine technical controls and operational practices, as detailed in the full definition above.
What are other names for Hardware Wallet?
Common alternative names include: Cold wallet, Hardware signer.
● Related terms
- web3№ 613
Ledger Wallet
A hardware wallet line by French firm Ledger SAS that stores cryptocurrency keys inside a certified secure-element chip.
- web3№ 1170
Trezor Wallet
An open-source hardware wallet line by SatoshiLabs that stores cryptocurrency seeds offline and signs transactions through a built-in screen and buttons.
- web3№ 906
Recovery Phrase
A list of 12 or 24 words generated under the BIP-39 standard that encodes the master seed of a cryptocurrency wallet and can restore all derived keys.
- web3№ 709
Multisig Wallet
A cryptocurrency wallet that requires m-of-n signatures from independent keys to authorise a transaction, removing single-key compromise as a fatal failure.
- web3№ 016
Address Poisoning
Address poisoning seeds a victim's transaction history with attacker-controlled lookalike addresses so they later copy-paste the wrong one and send funds to the attacker.