Different hardware wallets have different secure models and tradeoffs to defend against various types of attacks.

nostr:npub1az9xj85cmxv8e9j9y80lvqp97crsqdu2fpu3srwthd99qfu9qsgstam8y8 and Lloyd Fournier discuss some of these attacks, and how the risks can be minimized, in BR073.

https://m.primal.net/LMNp.mov

Reply to this note

Please Login to reply.

Discussion

No replies yet.