Rob Behnke
November 22nd, 2021
In our last article, we reviewed the difference between hot and cold wallets and how cold wallets – otherwise known as hardware wallets – are generally considered to be the safest crypto wallets. However, in this article, we’ll discuss how cold storage also comes with its own set of safety risks.
But before we dive into the safety of hardware wallets, it’s important to understand that wallets themselves don’t actually “hold” any cryptocurrency. This is regardless of whether it’s a hardware or cold wallet or a hot wallet stored on your computer, mobile device or browser.
Any wallet you use, including a hardware wallet, essentially holds the password or private keys, which give your wallet access to the cryptocurrency allocated to it on the blockchain.
A cryptocurrency wallet is essentially used to:
This is why having a secure cryptocurrency wallet is so critical to the safety of your digital currency assets. It all comes down to how easy it is to access and steal private key information from the place you have it stored.
Keeping in mind that it’s your private keys that give access to your crypto, it would technically be possible to access your cryptocurrency from another wallet at any time. A bad actor who accesses a user’s private keys could take those keys, input them into their own wallet interface, and then move that crypto anywhere they wanted because the private keys prove ownership and give ultimate control over the assets.
And this is precisely where hardware wallets come in – so let’s have a quick look at what makes them different from other cryptocurrency wallet options and explore whether they can be hacked.
To put it simply, once your private keys are exposed to a bad actor, your cryptocurrency is no longer under your control and can easily be transferred to any place the hacker chooses. The big problem with hot wallets that work through a mobile device, computer or browser, is that those mediums are susceptible to malware – meaning your wallets can more readily be hacked and private keys stolen.
Hardware wallets, on the other hand, are purpose-built devices that are immune to malware. They remove any unnecessary complexity outside of storing keys and signing transactions, thus removing attack vectors hackers traditionally exploit. But are they unhackable? Let’s have a deeper look into this area of hardware wallets.
Although hardware wallets are designed store cryptocurrency keys offline while being unhackable or susceptible to malware, they still have the risk of being compromised in the following ways:
Losing a hardware wallet does not mean you lose your cryptocurrency, so this is not actually a risk. If you lose your hardware wallet device or it is stolen, you simply purchase another one and set your device up as normal. The important thing is that you keep your private keys safe and separate from where you store your device. There are a number of options including writing them down and keeping them in a safety deposit box, or using something like a Crypto Steel.
As standard, hardware wallets can be set up with a 24 word seed phrase, however you can extend this security using the following options:
Consider Multisig Cold Storage: As the name suggests, multi-signature (multisig) wallets require more than one set of private keys to sign off on a transaction. This adds another layer of security, specifically in the event that one set of private keys are compromised. Wallets like Electrum or services like Unchained are well known options for setting up a multisig solution.
Use a 25th Passphrase: This is like adding an extra word to the 24 word seed phrase, for a total of 25 words. This 25th word is not stored on the device itself and can be used to add an extra layer of security to your cold storage device.
Ultimately, there is no one wallet solution that is 100% unhackable; however, hardware wallets coupled with extra security precautions, security features and best practices offer a strong solution. And if you’d like to explore more ways to increase the security of your crypto assets, check out our article on 4 Ways to Protect Your Crypto Wallet From Hacks or reach out to our cybersecurity experts at halborn@protonmail.com for help in securing your company’s assets.