Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 464

Hardware Wallet

What is Hardware Wallet?

Hardware WalletA dedicated physical device that stores cryptocurrency private keys in a tamper-resistant secure element and signs transactions offline.


A hardware wallet is a small, purpose-built device that generates and stores private keys inside an isolated secure element or microcontroller, never exposing them to the connected computer or phone. Transactions are constructed on the host, sent to the device, and only released after the user verifies the destination address and amount on an on-device screen and confirms with a physical button or PIN. Because keys never leave the device, hardware wallets defeat most malware, clipboard hijackers, and remote attackers that compromise general-purpose operating systems. Leading models include Ledger Nano, Trezor, Coldcard, and Keystone. Their main residual risks are supply-chain tampering, malicious firmware, and social-engineering of the recovery phrase.

Examples

  1. 01

    A Ledger Nano X stores the keys for a long-term Bitcoin holding and only signs withdrawals after on-device confirmation.

  2. 02

    A Trezor Safe 3 is used to approve Ethereum transactions, blocking malware on the user's laptop from silently re-routing funds.

Frequently asked questions

What is Hardware Wallet?

A dedicated physical device that stores cryptocurrency private keys in a tamper-resistant secure element and signs transactions offline. It belongs to the Web3 & Blockchain category of cybersecurity.

What does Hardware Wallet mean?

A dedicated physical device that stores cryptocurrency private keys in a tamper-resistant secure element and signs transactions offline.

How does Hardware Wallet work?

A hardware wallet is a small, purpose-built device that generates and stores private keys inside an isolated secure element or microcontroller, never exposing them to the connected computer or phone. Transactions are constructed on the host, sent to the device, and only released after the user verifies the destination address and amount on an on-device screen and confirms with a physical button or PIN. Because keys never leave the device, hardware wallets defeat most malware, clipboard hijackers, and remote attackers that compromise general-purpose operating systems. Leading models include Ledger Nano, Trezor, Coldcard, and Keystone. Their main residual risks are supply-chain tampering, malicious firmware, and social-engineering of the recovery phrase.

How do you defend against Hardware Wallet?

Defences for Hardware Wallet typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Hardware Wallet?

Common alternative names include: Cold wallet, Hardware signer.

Related terms