Are Hardware Wallets Unhackable?

Hardware wallets meaningfully reduce one specific attack vector. They don't eliminate risk. Understanding what they actually protect against — and what they don't — changes how you use them.
Lewis Jackson
CEO and Founder

Hardware wallet marketing tends toward words like "offline," "air-gapped," and "cold." These descriptions are technically accurate. They're also frequently interpreted as "immune to attack," which isn't.

The security model behind hardware wallets is more conditional than most descriptions suggest. These devices meaningfully reduce a specific and common category of attack. They don't eliminate risk. Understanding what they actually protect against — and what they demonstrably don't — determines whether you're using them correctly.

What a Hardware Wallet Actually Does

A hardware wallet stores private keys inside a dedicated, tamper-resistant chip that never exposes those keys to a networked device. When you want to sign a transaction, you plug the device in, review the transaction details on the device's own screen, and approve with a physical button. The signed transaction leaves the device; the private key never does.

This architecture defeats the most common attack vector in crypto: malware on your computer. If an attacker compromises your laptop with a keylogger or screen capture tool, they get nothing — because the key is never typed, copied, or processed on the laptop. The signing happens inside the device. That's a genuinely significant security improvement over software wallets, which operate in a general computing environment where malware is persistent and well-resourced.

The Secure Element chip — used in Ledger devices and some others — adds physical hardening against extraction attempts and runs manufacturer-verified firmware. It's the same class of chip used in payment cards and passports.

So hardware wallets are very good at one specific thing: keeping private keys off malware-exposed machines.

Where the Security Model Breaks Down

Supply chain attacks. A device tampered with before delivery — modified firmware, a compromised chip, a pre-loaded seed phrase — is dangerous regardless of how carefully the user handles it afterward. This isn't theoretical. Ledger has documented fake devices circulating through third-party Amazon sellers with pre-seeded recovery phrases that the attacker controls. A user who "restores" the wallet using that pre-loaded phrase gives the attacker full access. The attack surface is the distribution chain, not the cryptography.

The mitigation is straightforward: buy directly from the manufacturer, verify tamper-evident packaging on arrival, and never use a device that arrives with a recovery phrase already written inside the box.

Seed phrase exposure. The security of any hardware wallet ultimately depends on the 12- or 24-word seed phrase generated during setup. If an attacker obtains that phrase, the hardware is irrelevant — they can import the same wallet anywhere, on any device. Most real-world hardware wallet compromises don't involve breaking the device at all. They involve social engineering, phishing for seed phrases, or physical observation during setup.

This is arguably the most common attack vector in practice. The hardware is doing its job. The human handling the seed phrase often isn't.

Physical access by a motivated attacker. Given sustained physical access to a device and lab equipment, attackers have extracted private keys from some hardware wallets. Kraken Security Labs demonstrated a seed extraction attack against the Trezor One and Trezor Model T in 2020 — requiring de-soldering the chip and voltage glitching. Sophisticated, requiring specialized equipment, requiring the device for an extended period. Ledger's Secure Element architecture is more resistant to this class of attack, but more resistant isn't immune.

This is where threat modeling matters. If you're worried about an adversary with extended laboratory access to your specific device, you have a different problem than most users. But physical possession by a motivated attacker is a non-zero risk, and claiming otherwise is inaccurate.

Firmware as a trust dependency. All major hardware wallets receive firmware updates, which means the manufacturer can modify device behavior. This is a soft constraint — not cryptographic, but real. Ledger's 2023 announcement of "Ledger Recover" (a firmware-based service that would allow sharded seed phrase backups to be transmitted to cloud services) created significant controversy, because it demonstrated that firmware could, in principle, extract and transmit seed phrase components. The security model includes trust in the manufacturer, which users often don't consciously factor in.

Trezor's response has been to lean into fully open-source firmware — external researchers can audit exactly what the device is doing. That's a different trust model, with its own trade-offs.

Transaction approval as the final human step. Hardware wallets display transaction details on their own screen, independent of the connected computer. But users who tap through approval without reading the on-screen address are vulnerable to address-swapping malware that substitutes a different recipient address at the interface level. The hardware wallet faithfully signs the transaction it's shown — it signs what's presented, not necessarily what you intended.

The security gain of hardware wallet screens is real and meaningful. It only works if you actually verify the address shown.

The Threat Model Question

Hardware wallets provide strong protection against remote attackers compromising your home computer. That's the threat most retail holders actually face, and for that threat, hardware wallets are highly effective.

They provide limited protection against:

  • A tampered device from the supply chain
  • Seed phrase exposure during setup or storage
  • A motivated adversary with extended physical device access
  • Manufacturer firmware changes
  • Users who don't verify transaction details on-screen

The security question isn't whether hardware wallets are unhackable in some absolute sense — nothing is. The question is whether they protect you from the attacks you're actually likely to encounter. For most users, internet-based malware and phishing are the realistic threats. Hardware wallets reduce that attack surface substantially.

For users storing very large amounts, the full list above needs consideration: supply chain verification, secure seed phrase storage (steel plates, geographic distribution), and potentially multi-signature setups that distribute risk across multiple devices or signers.

What's Changing

Multi-party computation (MPC) wallets are emerging as an alternative security model, particularly for institutional holders. MPC splits key material between multiple parties and never assembles the full key in one location — eliminating the single-point-of-failure that a stolen or compromised device represents. The trade-off is trust dependencies on MPC service providers rather than a physical manufacturer.

Hardware wallet manufacturers are also improving firmware transparency and auditing processes in response to growing scrutiny. Whether open-source firmware becomes standard across the industry is an open question.

Confirmation and Invalidation

The hardware wallet security model holds if supply chain compromises remain rare isolated incidents rather than systematic, no major manufacturer pushes regulatory-forced firmware at scale, and physical extraction attacks remain confined to sophisticated laboratory conditions requiring extended device access.

The model weakens if regulatory pressure forces key escrow into firmware, supply chain compromise becomes systematic through major distribution channels, or a critical vulnerability enabling remote seed extraction is discovered and weaponized at scale.

Boundary

This post explains what the hardware wallet security model actually covers and where it doesn't. It doesn't recommend specific devices, make claims about relative manufacturer trustworthiness, or account for how individual security practices affect outcomes in specific situations.

Hardware wallets are among the best tools available for self-custody — not because they're invulnerable, but because they're well-suited to the realistic threat environment most users face.

Related Posts

See All
Crypto Research
New XRP-Focused Research Defining the “Velocity Threshold” for Global Settlement and Liquidity
A lot of people looking at my recent research have asked the same question: “Surely Ripple already understands all of this. So what does that mean for XRP?” That question is completely valid — and it turns out it’s the right question to ask. This research breaks down why XRP is unlikely to be the internal settlement asset of CBDC shared ledgers or unified bank platforms, and why that doesn’t mean XRP is irrelevant. Instead, it explains where XRP realistically fits in the system banks are actually building: at the seams, where different rulebooks, platforms, and networks still need to connect. Using liquidity math, system design, and real-world settlement mechanics, this piece explains: why most value settles inside venues, not through bridges why XRP’s role is narrower but more precise than most narratives suggest how velocity (refresh interval) determines whether XRP creates scarcity or just throughput and why Ripple’s strategy makes more sense once you stop assuming XRP must be “the core of everything” This isn’t a bullish or bearish take — it’s a structural one. If you want to understand XRP beyond hype and price targets, this is the question you need to grapple with.
Read Now
Crypto Research
The Jackson Liquidity Framework - Announcement
Lewis Jackson Ventures announces the release of the Jackson Liquidity Framework — the first quantitative, regulator-aligned model for liquidity sizing in AMM-based settlement systems, CBDC corridors, and tokenised financial infrastructures. Developed using advanced stochastic simulations and grounded in Basel III and PFMI principles, the framework provides a missing methodology for determining how much liquidity prefunded AMM pools actually require under real-world flow conditions.
Read Now
Crypto Research
Banks, Stablecoins, and Tokenized Assets
In Episode 011 of The Macro, crypto analyst Lewis Jackson unpacks a pivotal week in global finance — one marked by record growth in tokenized assets, expanding stablecoin adoption across emerging markets, and major institutions deepening their blockchain commitments. This research brief summarises Jackson’s key findings, from tokenized deposits to institutional RWA chains and AI-driven compliance, and explains how these developments signal a maturing, multi-rail settlement architecture spanning Ethereum, XRPL, stablecoin networks, and new interoperability layers.Taken together, this episode marks a structural shift toward programmable finance, instant settlement, and tokenized real-world assets at global scale.
Read Now

Related Posts

See All
No items found.
Lewsletter

Weekly notes on what I’m seeing

A personal letter I send straight to your inbox —reflections on crypto, wealth, time and life.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.