Your Internet connected phone could already be compromised. There many ways to steal your keys from a compromised device. It's just a basic principle you don't mess with for serious sums.

Reply to this note

Please Login to reply.

Discussion

I completely agree. I know we can dont trust verify. The thing is I cannot verify any hardware wallet anyway. Has anyone really read all the code and done an analysis? Are there any independent reviews proving some of these hardware companies claims?