đ
Hardware Wallets Explained, Reviewed and Compared - YouTube
Channel: 99Bitcoins
[0]
What are hardware wallets?
[2]
Are they really the safest way to store
Bitcoins and other cryptocurrencies?
[5]
Can they be hacked?
[6]
And what happens
if I lose my hardware wallet?
[9]
Are my coins lost?
[10]
Well, stick around.
[11]
Here on Bitcoin Whiteboard Tuesday,
weâll tackle these questions and more.
[21]
Hi, Iâm Nate Martin from 99Bitcoins.com
[23]
and welcome
to Crypto Whiteboard Tuesday
[26]
where we take
complex cryptocurrency topics,
[28]
break them down and translate them
into plain English.
[31]
Before we begin,
don't forget to subscribe to the channel
[33]
and click the bell
so youâll immediately get notified
[36]
when a new video comes out.
[38]
Todayâs topic is hardware wallets.
[40]
But before we dive deep
into hardware wallets
[43]
we need to understand
how any Bitcoin wallet works in general.
[46]
The term Bitcoin wallet
is a bit misleading,
[49]
as a Bitcoin wallet
doesnât really hold any Bitcoin.
[52]
Technically speaking,
[53]
a Bitcoin wallet is a software
that holds passwords,
[56]
sometimes referred to
in cryptographic terms as keys.
[60]
These keys give your wallet access
to the Bitcoins allocated to it
[63]
on the Bitcoin transaction ledger
called the blockchain.
[67]
So when you use any Bitcoin wallet,
[69]
youâll encounter two important terms.
[72]
The first is a Bitcoin address,
[74]
this is what you send to people
who want to pay you in Bitcoin,
[76]
kind of like an email address.
[78]
The second is a private key.
[80]
The private key allows you to access
and control the Bitcoins you own.
[85]
For our email account analogy,
[86]
you might think of your private key
as the password to your email account.
[90]
Aside from holding your private key,
[92]
the wallet also signs Bitcoin transactions
on your behalf
[95]
using your private key,
[96]
and broadcasts them
to the Bitcoin network.
[99]
Let me explain:
[100]
When you want to send Bitcoins
to someone else,
[102]
you need to prove ownership
of those Bitcoins to the whole network
[105]
so it will agree to change
the ledger of transactions.
[108]
To achieve this,
[109]
your Bitcoin wallet takes
your requested transaction,
[111]
signs it on your behalf
using your private key
[114]
and broadcasts this digital signature
to the network.
[117]
In a nutshell,
[118]
a digital signature is a way to prove
you own a certain private key
[121]
without needing to expose it.
[123]
Itâs done through the use of
complex mathematical rules
[126]
known as cryptography.
[128]
This whole process is kind of similar
to you signing a check
[131]
authorizing the transfer of money
from your account.
[134]
Once a transaction is signed,
[136]
the wallet then broadcasts it
to the whole network
[138]
which validates its authenticity.
[140]
Eventually,
[141]
this transaction will be entered
by Bitcoin miners on to the blockchain,
[144]
and the transaction
will be considered complete.
[147]
So, what does this all have to do
with hardware wallets?
[150]
If my wallet is just a piece of software,
[152]
why canât I just have it on my computer,
like any other software I use?
[156]
Well, as you probably know,
[158]
stealing a piece of information
from a computer
[160]
isnât that hard these days.
[162]
And if the computer running
your Bitcoin wallet
[164]
is infected with malware
[165]
it may expose your private key
to bad actors.
[169]
Hackers may be able to take control
over your computer
[171]
or see whatâs displayed on your screen.
[174]
And once your private key is exposed,
[176]
your Bitcoins are no longer
under your control.
[178]
They could be easily transferred
to anywhere the hacker chooses.
[182]
In order to avoid this situation
you have two options:
[185]
First -
[186]
You could make sure your computer
is completely malware free.
[189]
While this may sound easy,
[190]
most viruses are either disguised
as legitimate software
[193]
or have a way to avoid detection
by Antivirus software.
[197]
The other option would be to use
a wallet that is âimmuneâ to malware,
[201]
so to speak,
keeping your private key safe.
[204]
This is exactly what hardware wallets
are designed to do.
[207]
Simply put,
[208]
hardware wallets are computers
[210]
that have been stripped down
of all logic
[212]
except for a small screen,
a button or two
[214]
and the simple action of storing keys
and signing transactions.
[218]
Hardware wallets look like
small USB devices,
[221]
and they offer a minimalist approach
to security.
[224]
This is based on the logic that
the more complex a device is,
[227]
the more opportunities hackers have
to infiltrate it.
[230]
In the case of hardware wallets,
the device is so âdumbâ
[233]
itâs practically impossible to hack
or infect it with anything.
[236]
Due to that simple design,
[238]
hardware wallets canât connect
to the Internet
[240]
or run complicated apps.
[242]
They are just a form of storing
your private key offline.
[245]
This approach is known as cold storage,
[248]
unlike devices that connect to the Internet,
which are called âhot walletsâ.
[252]
So how do hardware wallets work exactly?
[255]
Well, letâs say you want to send
a Bitcoin transaction
[257]
using a hardware wallet.
[259]
The first thing to know is that
[260]
because a hardware wallet
is such a simple device
[262]
that can only sign transactions,
[264]
it needs to use
a more sophisticated computer
[266]
for all other functions,
[267]
such as preparing the transaction
and broadcasting it to the network.
[271]
So in order to use a hardware wallet
[272]
youâll need to connect it
to your personal computer
[275]
and download a program
that can communicate with it.
[277]
Weâll call this program a bridge.
[280]
The bridge will allow you to prepare
your transaction for signing.
[283]
The hardware wallet allows
only very specific types of data
[286]
to pass through to it,
such as cryptocurrency transactions.
[289]
Once it receives a transaction
from the bridge program,
[292]
it signs it on the hardware wallet itself
[294]
and then sends it back
to the bridge program.
[296]
Your private key never leaves
the hardware wallet.
[299]
The only thing that gets transferred
[301]
between your computer
and the hardware wallet
[303]
is the unsigned and signed transaction.
[305]
Because of its minimalistic
and simple design,
[308]
a hardware wallet can be used
with any computer
[310]
without fear of being hacked or infected -
[312]
even a public library computer
or your momâs laptop :)
[316]
The only thing youâll need to do
to make sure your Bitcoins are safe
[319]
is to make sure the transaction
youâre approving
[321]
on the hardware walletâs screen
[322]
matches the transaction
your bridge program is showing
[325]
on your personal computer.
[326]
Today there are over a dozen companies
that offer hardware wallets on the market,
[330]
with the three market leaders being
Ledger, TREZOR and KeepKey.
[334]
Each company offers different models
with different features.
[337]
If youâd like to read all about
the different models on our site,
[340]
thereâs a link in the description below.
[342]
There are many features to compare
between the different hardware wallets.
[345]
Some things to consider,
aside from company reputation,
[348]
include how many different coins
the device can support,
[350]
and whether you can control it
from your mobile phone
[353]
as well as from your computer.
[354]
Setting up a hardware wallet
is fairly easy.
[357]
The main thing to do is write down
the set of words youâll be given
[360]
when initializing the device.
[362]
These words,
[363]
also known as a seed phrase
or mnemonic phrase
[365]
are a way to restore any private key
your hardware wallet generates.
[369]
This also means that whoever
might get a hold of these words
[372]
would also control your Bitcoin,
[373]
so it's important to keep
your seed phrase written offline
[376]
and in a safe place.
[378]
Before we conclude todayâs episode,
[380]
I want to go over some common
hardware wallet risks
[382]
you should be aware of,
[383]
and how to avoid them when possible.
[385]
The first risk is that someone
may tamper with your device
[388]
when its onroute to your home
for the first time.
[391]
To avoid this,
[392]
all reputable hardware
wallet manufacturers
[394]
use a special holographic sticker
to prove the wallet was never opened.
[398]
If you receive a wallet
and this sticker isnât in tact,
[401]
donât use that wallet.
[403]
While some wallets also run
a self tampering test when initializing,
[406]
itâs better to stay on the safe side.
[408]
In order to minimize this risk even more,
[410]
always buy a hardware wallet
straight from the manufacturerâs website.
[414]
If you want to buy from a reseller,
[416]
make sure that heâs an authorised
trustworthy reseller
[419]
by contacting the manufacturer first.
[421]
Closely related to this issue
is the fact that your seed phrase
[424]
should be generated at random
by your wallet upon setup
[427]
and is not sent to you with the device.
[429]
Thereâs a good reason for taking
all these safety measures seriously.
[433]
For example, one unfortunate user
bought a hardware wallet
[436]
from a bad actor on Amazon
[438]
and received a wallet with a card
containing a preconfigured seed phrase.
[442]
He was instructed to initiate the device
using this existing seed phrase.
[446]
The user wasnât very tech savvy
and did what he was instructed,
[450]
only to find out that
once he deposited coins
[452]
into that hardware wallet
[453]
they were quickly removed by the hacker
that had knowledge
[456]
of the preconfigured seed.
[458]
Another risk to be aware of is that
[460]
your hardware wallet device
may be stolen
[462]
or physically accessed
by unwanted individuals,
[464]
also known as the evil maid attack.
[467]
Most, if not all hardware wallets today,
include a PIN protection.
[471]
So even if your device is stolen
[472]
it may take the thief a while
before he can access your coins.
[476]
Once you notice your device is stolen
[478]
you should immediately use
your seed phrase
[480]
to recover your Bitcoins
[481]
and send them to a new wallet
with a different seed phrase.
[484]
This will basically drain
your stolen wallet from all of its funds
[487]
and allow you to keep safe control
over your Bitcoins.
[491]
Another very unusual but possible attack
is the â$5 wrench attackâ.
[496]
This refers to when someone
physically threatens to hurt you,
[499]
with a $5 wrench,
[500]
if you donât hand over
your hardware wallet
[502]
and unlock it with your PIN code.
[504]
In order to protect
from these kinds of physical attacks
[507]
certain wallets, such as TREZOR,
[509]
allow you to add another layer
of protection called a passphrase.
[512]
This means youâll be requested to add
an additional passphrase
[515]
after the PIN code.
[517]
However, you can set it up
[518]
so that different passphrases
will show only certain accounts
[521]
on your wallet.
[522]
So imagine having a dummy account
on your wallet
[525]
with only a small amount of coins
[527]
and a real account
with the majority of your funds.
[530]
When someone forces you
to unlock your wallet
[532]
you can use the dummy passphrase
[534]
and it will seem that the wallet
only holds a small amount of coins,
[537]
not revealing your complete holdings.
[540]
A very common fear
people usually express
[542]
regarding hardware wallets is
[544]
what happens if the wallet manufacturer
goes out of business?
[547]
Well, the seed phrase technology
used in most hardware wallets today
[551]
is compatible with multiple wallets:
[553]
itâs not unique to any specific company.
[556]
Therefore, if a certain company
goes out of business
[558]
you can recover your Bitcoins
directly to another companyâs wallet
[561]
using your seed phrase.
[563]
As you probably understand by now,
[565]
your seed phrase has a lot of power
[566]
and it can be used in many cases
to recover your Bitcoins,
[570]
including if your hardware wallet
breaks or gets damaged.
[573]
Well, thatâs it for todayâs episode
of Crypto Whiteboard Tuesday.
[575]
Hopefully by now you understand
what a hardware wallet is -
[579]
A small device that holds
your private keys
[581]
and signs transactions offline
keeping your Bitcoins safe.
[584]
You may still have some questions.
[586]
If so, just leave them
in the comment section below.
[588]
And if youâre watching this video
on YouTube,
[590]
and enjoy what youâve seen,
donât forget to hit the like button.
[592]
Then make sure to subscribe
to the channel
[594]
and click that bell
[595]
so that youâll be notified
as soon as we post new episodes.
[598]
Thanks for joining me
here at the Whiteboard.
[599]
For 99bitcoins.com, Iâm Nate Martin,
and Iâll see youâŠin a bit.
You can go back to the homepage right here: Homepage





