Hardware Wallets Explained, Reviewed and Compared - YouTube

Channel: 99Bitcoins

[0]
What are hardware wallets?
[2]
Are they really the safest way to store Bitcoins and other cryptocurrencies?
[5]
Can they be hacked?
[6]
And what happens if I lose my hardware wallet?
[9]
Are my coins lost?
[10]
Well, stick around.
[11]
Here on Bitcoin Whiteboard Tuesday, we’ll tackle these questions and more.
[21]
Hi, I’m Nate Martin from 99Bitcoins.com
[23]
and welcome to Crypto Whiteboard Tuesday
[26]
where we take complex cryptocurrency topics,
[28]
break them down and translate them into plain English.
[31]
Before we begin, don't forget to subscribe to the channel
[33]
and click the bell so you’ll immediately get notified
[36]
when a new video comes out.
[38]
Today’s topic is hardware wallets.
[40]
But before we dive deep into hardware wallets
[43]
we need to understand how any Bitcoin wallet works in general.
[46]
The term Bitcoin wallet is a bit misleading,
[49]
as a Bitcoin wallet doesn’t really hold any Bitcoin.
[52]
Technically speaking,
[53]
a Bitcoin wallet is a software that holds passwords,
[56]
sometimes referred to in cryptographic terms as keys.
[60]
These keys give your wallet access to the Bitcoins allocated to it
[63]
on the Bitcoin transaction ledger called the blockchain.
[67]
So when you use any Bitcoin wallet,
[69]
you’ll encounter two important terms.
[72]
The first is a Bitcoin address,
[74]
this is what you send to people who want to pay you in Bitcoin,
[76]
kind of like an email address.
[78]
The second is a private key.
[80]
The private key allows you to access and control the Bitcoins you own.
[85]
For our email account analogy,
[86]
you might think of your private key as the password to your email account.
[90]
Aside from holding your private key,
[92]
the wallet also signs Bitcoin transactions on your behalf
[95]
using your private key,
[96]
and broadcasts them to the Bitcoin network.
[99]
Let me explain:
[100]
When you want to send Bitcoins to someone else,
[102]
you need to prove ownership of those Bitcoins to the whole network
[105]
so it will agree to change the ledger of transactions.
[108]
To achieve this,
[109]
your Bitcoin wallet takes your requested transaction,
[111]
signs it on your behalf using your private key
[114]
and broadcasts this digital signature to the network.
[117]
In a nutshell,
[118]
a digital signature is a way to prove you own a certain private key
[121]
without needing to expose it.
[123]
It’s done through the use of complex mathematical rules
[126]
known as cryptography.
[128]
This whole process is kind of similar to you signing a check
[131]
authorizing the transfer of money from your account.
[134]
Once a transaction is signed,
[136]
the wallet then broadcasts it to the whole network
[138]
which validates its authenticity.
[140]
Eventually,
[141]
this transaction will be entered by Bitcoin miners on to the blockchain,
[144]
and the transaction will be considered complete.
[147]
So, what does this all have to do with hardware wallets?
[150]
If my wallet is just a piece of software,
[152]
why can’t I just have it on my computer, like any other software I use?
[156]
Well, as you probably know,
[158]
stealing a piece of information from a computer
[160]
isn’t that hard these days.
[162]
And if the computer running your Bitcoin wallet
[164]
is infected with malware
[165]
it may expose your private key to bad actors.
[169]
Hackers may be able to take control over your computer
[171]
or see what’s displayed on your screen.
[174]
And once your private key is exposed,
[176]
your Bitcoins are no longer under your control.
[178]
They could be easily transferred to anywhere the hacker chooses.
[182]
In order to avoid this situation you have two options:
[185]
First -
[186]
You could make sure your computer is completely malware free.
[189]
While this may sound easy,
[190]
most viruses are either disguised as legitimate software
[193]
or have a way to avoid detection by Antivirus software.
[197]
The other option would be to use a wallet that is “immune” to malware,
[201]
so to speak, keeping your private key safe.
[204]
This is exactly what hardware wallets are designed to do.
[207]
Simply put,
[208]
hardware wallets are computers
[210]
that have been stripped down of all logic
[212]
except for a small screen, a button or two
[214]
and the simple action of storing keys and signing transactions.
[218]
Hardware wallets look like small USB devices,
[221]
and they offer a minimalist approach to security.
[224]
This is based on the logic that the more complex a device is,
[227]
the more opportunities hackers have to infiltrate it.
[230]
In the case of hardware wallets, the device is so “dumb”
[233]
it’s practically impossible to hack or infect it with anything.
[236]
Due to that simple design,
[238]
hardware wallets can’t connect to the Internet
[240]
or run complicated apps.
[242]
They are just a form of storing your private key offline.
[245]
This approach is known as cold storage,
[248]
unlike devices that connect to the Internet, which are called ‘hot wallets’.
[252]
So how do hardware wallets work exactly?
[255]
Well, let’s say you want to send a Bitcoin transaction
[257]
using a hardware wallet.
[259]
The first thing to know is that
[260]
because a hardware wallet is such a simple device
[262]
that can only sign transactions,
[264]
it needs to use a more sophisticated computer
[266]
for all other functions,
[267]
such as preparing the transaction and broadcasting it to the network.
[271]
So in order to use a hardware wallet
[272]
you’ll need to connect it to your personal computer
[275]
and download a program that can communicate with it.
[277]
We’ll call this program a bridge.
[280]
The bridge will allow you to prepare your transaction for signing.
[283]
The hardware wallet allows only very specific types of data
[286]
to pass through to it, such as cryptocurrency transactions.
[289]
Once it receives a transaction from the bridge program,
[292]
it signs it on the hardware wallet itself
[294]
and then sends it back to the bridge program.
[296]
Your private key never leaves the hardware wallet.
[299]
The only thing that gets transferred
[301]
between your computer and the hardware wallet
[303]
is the unsigned and signed transaction.
[305]
Because of its minimalistic and simple design,
[308]
a hardware wallet can be used with any computer
[310]
without fear of being hacked or infected -
[312]
even a public library computer or your mom’s laptop :)
[316]
The only thing you’ll need to do to make sure your Bitcoins are safe
[319]
is to make sure the transaction you’re approving
[321]
on the hardware wallet’s screen
[322]
matches the transaction your bridge program is showing
[325]
on your personal computer.
[326]
Today there are over a dozen companies that offer hardware wallets on the market,
[330]
with the three market leaders being Ledger, TREZOR and KeepKey.
[334]
Each company offers different models with different features.
[337]
If you’d like to read all about the different models on our site,
[340]
there’s a link in the description below.
[342]
There are many features to compare between the different hardware wallets.
[345]
Some things to consider, aside from company reputation,
[348]
include how many different coins the device can support,
[350]
and whether you can control it from your mobile phone
[353]
as well as from your computer.
[354]
Setting up a hardware wallet is fairly easy.
[357]
The main thing to do is write down the set of words you’ll be given
[360]
when initializing the device.
[362]
These words,
[363]
also known as a seed phrase or mnemonic phrase
[365]
are a way to restore any private key your hardware wallet generates.
[369]
This also means that whoever might get a hold of these words
[372]
would also control your Bitcoin,
[373]
so it's important to keep your seed phrase written offline
[376]
and in a safe place.
[378]
Before we conclude today’s episode,
[380]
I want to go over some common hardware wallet risks
[382]
you should be aware of,
[383]
and how to avoid them when possible.
[385]
The first risk is that someone may tamper with your device
[388]
when its onroute to your home for the first time.
[391]
To avoid this,
[392]
all reputable hardware wallet manufacturers
[394]
use a special holographic sticker to prove the wallet was never opened.
[398]
If you receive a wallet and this sticker isn’t in tact,
[401]
don’t use that wallet.
[403]
While some wallets also run a self tampering test when initializing,
[406]
it’s better to stay on the safe side.
[408]
In order to minimize this risk even more,
[410]
always buy a hardware wallet straight from the manufacturer’s website.
[414]
If you want to buy from a reseller,
[416]
make sure that he’s an authorised trustworthy reseller
[419]
by contacting the manufacturer first.
[421]
Closely related to this issue is the fact that your seed phrase
[424]
should be generated at random by your wallet upon setup
[427]
and is not sent to you with the device.
[429]
There’s a good reason for taking all these safety measures seriously.
[433]
For example, one unfortunate user bought a hardware wallet
[436]
from a bad actor on Amazon
[438]
and received a wallet with a card containing a preconfigured seed phrase.
[442]
He was instructed to initiate the device using this existing seed phrase.
[446]
The user wasn’t very tech savvy and did what he was instructed,
[450]
only to find out that once he deposited coins
[452]
into that hardware wallet
[453]
they were quickly removed by the hacker that had knowledge
[456]
of the preconfigured seed.
[458]
Another risk to be aware of is that
[460]
your hardware wallet device may be stolen
[462]
or physically accessed by unwanted individuals,
[464]
also known as the evil maid attack.
[467]
Most, if not all hardware wallets today, include a PIN protection.
[471]
So even if your device is stolen
[472]
it may take the thief a while before he can access your coins.
[476]
Once you notice your device is stolen
[478]
you should immediately use your seed phrase
[480]
to recover your Bitcoins
[481]
and send them to a new wallet with a different seed phrase.
[484]
This will basically drain your stolen wallet from all of its funds
[487]
and allow you to keep safe control over your Bitcoins.
[491]
Another very unusual but possible attack is the “$5 wrench attack”.
[496]
This refers to when someone physically threatens to hurt you,
[499]
with a $5 wrench,
[500]
if you don’t hand over your hardware wallet
[502]
and unlock it with your PIN code.
[504]
In order to protect from these kinds of physical attacks
[507]
certain wallets, such as TREZOR,
[509]
allow you to add another layer of protection called a passphrase.
[512]
This means you’ll be requested to add an additional passphrase
[515]
after the PIN code.
[517]
However, you can set it up
[518]
so that different passphrases will show only certain accounts
[521]
on your wallet.
[522]
So imagine having a dummy account on your wallet
[525]
with only a small amount of coins
[527]
and a real account with the majority of your funds.
[530]
When someone forces you to unlock your wallet
[532]
you can use the dummy passphrase
[534]
and it will seem that the wallet only holds a small amount of coins,
[537]
not revealing your complete holdings.
[540]
A very common fear people usually express
[542]
regarding hardware wallets is
[544]
what happens if the wallet manufacturer goes out of business?
[547]
Well, the seed phrase technology used in most hardware wallets today
[551]
is compatible with multiple wallets:
[553]
it’s not unique to any specific company.
[556]
Therefore, if a certain company goes out of business
[558]
you can recover your Bitcoins directly to another company’s wallet
[561]
using your seed phrase.
[563]
As you probably understand by now,
[565]
your seed phrase has a lot of power
[566]
and it can be used in many cases to recover your Bitcoins,
[570]
including if your hardware wallet breaks or gets damaged.
[573]
Well, that’s it for today’s episode of Crypto Whiteboard Tuesday.
[575]
Hopefully by now you understand what a hardware wallet is -
[579]
A small device that holds your private keys
[581]
and signs transactions offline keeping your Bitcoins safe.
[584]
You may still have some questions.
[586]
If so, just leave them in the comment section below.
[588]
And if you’re watching this video on YouTube,
[590]
and enjoy what you’ve seen, don’t forget to hit the like button.
[592]
Then make sure to subscribe to the channel
[594]
and click that bell
[595]
so that you’ll be notified as soon as we post new episodes.
[598]
Thanks for joining me here at the Whiteboard.
[599]
For 99bitcoins.com, I’m Nate Martin, and I’ll see you
in a bit.