For Intermediates & Medium Balances
Authored by:
User Profile
An intermediate user who is comfortable with web3 interactions and is now managing a significant, but not life-altering, amount of assets. This user understands the inherent risks of hot wallets and is actively seeking to upgrade their security posture to protect their capital.
Primary Goal
The main objective is to secure balances against online threats while still retaining the ability to interact with dApps when necessary. This involves separating the bulk of assets from daily operational balances.
Recommended Setup
A hardware wallet is the core of this setup. This dedicated physical device stores private keys offline in a secure, tamper-resistant environment, acting as a vault for the majority of the user's balances.
Hardware wallets are the cornerstone of secure asset storage and your last line of defense against attacks. All other security controls could fail and your hardware wallet would still keep you safe when used properly.
Key Considerations & Trade-offs
Adopting a hardware wallet introduces a new set of security considerations focused on physical and supply chain vectors.
- Physical Security: A hardware wallet is a physical asset that must be protected from theft, damage, or coercion. Wallets should be physically secured in a safe or secret hiding place when not in use.
- Convenience vs. Security: Using a hardware wallet introduces friction into the transaction process, as it requires physical access and approval on the device for every signature.
How to Select a Hardware Wallet
- Large Screen: Ensure your device has a large screen that supports displaying full transaction data. Wallets with clear signing technology are highly recommended.
- Touch Screen PIN: Use touch screen PIN entry with shuffled buttons.
- Brute Force Protection: PIN entry must have time-based lockouts to prevent brute force attacks.
- Open Source: Evaluate if the wallet's firmware and software are open-source, which allows for public auditing and verification by the security community.
- Secure Element (SE): Look for devices with a SE certified, tamper-resistant chip that protects against physical
attacks. Check for high assurance ratings like
EAL6+and features like attestation, which verifies the device is genuine. - Reputation & Incident: Investigate the manufacturer's security track record, including their response to past vulnerabilities, data breaches, and overall transparency.
- Verify Device Integrity: A legitimate hardware wallet will arrive uninitialized, requiring you to perform the initial setup. Reject any device that comes with a pre-set PIN, a pre-generated recovery phrase, or appears to be already configured, as it is likely compromised.
Brand Diversification
Consider diversifying wallet brands amongst your team to reduce risk of 0-day and supply chain vulnerabilities impacting multi-sig quorums.
Initial Setup
Purchase & Verification
- Direct Purchase: Purchase your wallet directly from the manufacturer, do not purchase from a reseller. Use a pseudonym and ideally have it delivered to a P.O. box or secure locker.
- Verify tamper-resistant packaging is untouched
- Check for authenticity indicators on packaging
Device Authenticity Verification
Before using a new hardware wallet, verify its authenticity:
- Ledger: Follow Ledger's device verification guide
- GridPlus: Follow GridPlus authenticity verification
- Trezor: Follow Trezor authentication guide
Device Configuration
- Update firmware to latest version before creating accounts
- Strong PIN: Use at least a 6-digit PIN, but the longer the better
- Configure PIN - Use unique, strong PIN (different from other devices)
- Wallets must have a PIN requirement or biometric factor required to access the wallet and approve transactions
Key Generation
- Generate New Keys: Generate new private keys on the device, do not import them from your computer or another device
- No Digital Storage: Never export or store your private keys or seed phrases in any digital format, including pictures or in password managers
- Generate seed following device instructions
- Create accounts as needed
Clear Signing
Use Clear Signing support when available, but never rely on it alone - always fully verify transactions manually.
Backup Device (For Critical Operations & Multisigs)
Maintain a backup hardware wallet to avoid needing to access your seed phrase if your primary device fails.
- Second hardware wallet with same seed phrase
- Test both devices can create valid signatures
- Store backup securely
- Monthly verification that backup device functions correctly