👩‍💻Extended Info for Wallets

Let’s talk about securing your Crypto.

The Crypto world is a Wild West. There are thieves and scammers around every corner. But, you don’t have to worry about this too much considering you are set up safely, and you have some basic security habits in play so you don’t accidentally trip yourself up. In this article, we’ll talk about setting you up safely. You can learn the basic security habits from the security article linked HERE.

SO LET'S GET YOU SETUP SAFELY

There’s a lot at play here, but to make it simple, just think about this:

For anything to happen in the Crypto world, you have to give it permission. This includes buying, selling, transferring, staking, farming, and all else the wonderful world of Crypto gives to us. We will refer to these actions as transactions.

When these transactions start, they need permission to complete.

Everyone has a permission slip that we use to say “Yes, go ahead” when anything in the Crypto world wants to be done, like those transactions I mentioned above.

When most people start in the Crypto world, their “permission slip” is tied a little too close to all these thieves and scammers.

Our goal here is to cut the yarn between the permission slip, the thieves and scammers, then put distance and a concrete barrier between the thieves and scammer, and your permission slip.

Sounds simple enough?

We will do this using a hardware wallet.

But first, let’s back up a little and translate our analogy to crypto terms.

Our permission slip is our “seed phrase”. And the reason that it is too close to the thieves and scammers is that when you created the seed phrase (When you opened up your first wallet, and any others after that), the device you created it from was connected to the internet. If I were to guess, you created your seed phrase on the computer or smartphone you use in your everyday life.

Now imagine this: Remember when you were writing down your seed phrase? What if you had some spies (malware, viruses, keyloggers, screen recorders) running on your computer? Your seed would have been picked up - That permission slip. What does this mean? This means that not only can whoever picked up your permission slip (Your seed phrase) see the contents of your wallet, but they can start any transactions they want… And give it permission to run. This in effect can let them take all your Crypto. This is what usually happens.

Generally, anything you don’t want potentially compromised, you don’t want to do on a computer or cellphone.

HERE'S THE QUESTION NOW

If we don’t want to create our wallet (and our seed) on a computer or smartphone… How can we do it?

A hardware wallet! Hardware wallets can create wallets for you, display that seed phrase for you to write down, and it will never be connected to the internet while you’re doing this! Furthermore, because your permission slip (Your seed phrase) is now stored more securely on a device that is not connected to the internet, that device will be in charge of giving transactions the permissions to run. Remember the concrete barrier I referred to?

The internet where all the scammers and thieves live are now disconnected from your seed phrase. Your seed phrase is now on your hardware wallet, which isn’t connected to the internet. That concrete barrier is the disconnect between the hardware wallet and the internet.

WHY IS THAT JUST THE BEST?

Imagine someone gets into your Metamask because you weren’t careful, picked up a virus on your computer, and the virus found the details to get into your Metamask wallet. Imagine they start a transaction that transfers 100 ETH from your wallet to theirs. What will happen?

They’ll be stuck, of course! Why? Because that transaction, like any other, requires permission from that transaction to go through. This means, because your permission slip is now stored on a device that isn’t on the computer (the hardware wallet), the hacker would need to have YOUR hardware wallet physically with them, beside them, in their hand, to be able to give permission for that transaction to go through. Don’t get yourself confused about where Metamask is put inside this ecosystem of hardware wallets. Just focus on the main point I’m sharing for now. I’ll explain where Metamask plugs in further on down.

This lets you be as risky as you want (In other words, use the same computer you use for your daily activities) to trade crypto, and no hacker would be able to do anything with your funds.

Take that, hackers!

The only person who would be able to cause you harm now is yourself, by accidentally leaking certain information. This is why learning basic security habits is also a must. Learn about them here.

So now that we’re on the same page about why hardware wallets are a good idea, let’s get you introduced to hardware wallets.

Just like in other industries, there are multiple offerings out there for hardware wallets, too.

In this article, we are going to be covering the Trezor Model T specifically, and also the Ledger Nanos (there are two) as the second choice. There are a few reasons for this only covering these two:

The first is that we’ll use Metamask to make it easy to communicate with most of the apps we’ll use. A majority of applications, including the Wolf Den Knightswap, work really well with Metamask. Because we want to get something that works well with a lot of what’s out there in the Crypto world, we want a wallet that connects to Metamask. Metamask natively supports three wallets. Two of which are the Trezor, and the Ledger.

The second is that the Ledger and Trezor have been around the Crypto world for a very long time. Both companies were created back in 2014 and were two of the first hardware wallets created for the crypto world. This means that they are time-tested, and their creators have kept updating and continually protecting each device from the hacks and bypasses that others have tried against them. Both companies were able to adapt and patch or reinforce their devices against these issues.

With this criterion in mind, our personal recommendation is the Trezor Model T, and the Ledger Nano X will be there as a backup, in case you can’t swing a Trezor Model T.

The rest of the article will give you the information you need about both devices.

First, you will get to read about the Ledger Nanos (Model S, and Model X). Then, you will get to read about the Trezor Model T, and understand how it stands apart from the Ledger Nanos in security.

Let’s start with the Ledger Nanos. If you think of the Ledger as a purist crypto wallet that does everything you need, you’d be pretty spot on.

LEDGER NANOS

  • It creates you a 24-word “permission slip” (Called a Seed Phrase)

  • It has only two buttons you interact with, which makes it very hard for anyone to guess what your pin code is as you enter it

  • You can create multiple accounts under whichever coins you want.

The reason that creating multiple accounts under coins is useful is that you may want to separate your assets. You may want an address for your most valuable assets, but you don’t want to share this address with other assets that aren’t as valuable. That’s where you would create one address for those most valuable assets, and one for the other assets. If the address with the lesser valuable assets is hacked because you didn’t read the other article about good security habits, and approved a scam coin, your other account with your most valuable assets is left untouched, because they all belong to another address. All these accounts will be displayed in your Ledger app once you unlock your device.

Now that we covered what a purist Crypto wallet does, let’s go over the Trezor Model T. Because we covered the Ledger Nanos first, you will be able to clearly see why we recommend the Trezor over the Ledger.

Trezor Model T

Like Ledger, the Trezor Model T has the purist crypto wallet functions. On top of those, though, the Trezor Model T has many more features that make it more secure.

Let’s first talk about the permission slip. The seed phrase. Conventionally, each wallet has a seed phrase. A seed phrase is created from a dictionary of words, sorted randomly, and output as your seed phrase.

PROTECTION AGAINST HACKERS

What happens if a hacker accessed that dictionary and started entering random words in thousands of times a second until he finds a wallet with money inside? (You can open wallets with a seed phrase. That’s why you never share yours. Anyone who has your seed phrase can open your wallet). Maybe yours will end up being opened!

So how can we protect against this?

With the Trezor Model T, we can create brand new wallets with our own custom passphrases. This simple addition increases the security of your wallet private seeds exponentially. This passphrase is glued onto the end of your existing seed phrase. So to open that new wallet, you would enter your seed phrase plus the password. The Trezor Model T can do this a near-infinite number of times.

WHY IS THIS SUCH A POWERFUL FEATURE?

Let’s go back to the same example with the hacker and the seed phrase dictionary. With this one simple change of adding a passphrase on top of your seed phrase, your seed phrase turns from being inside of that dictionary, to not existing anywhere in that dictionary. Which in turn protects you much more effectively than absolutely everyone else holding a normal seed phrase. A hacker will never be able to enter your entire seed phrase, and as a result, will never be able to open up the wallets you created with the passphrase feature.

In addition, unlike how Ledger displays all your coin addresses once you log in, you can choose which wallets the Trezor Model T displays. All the passphrase wallets are hidden. By default, only the wallet with no paraphrase is displayed. All your other hidden wallets are not - Until you enter their password. Even then, you can choose to eject them once you’re done. So what you can do is put $100 in the wallet with no additional passphrase, and keep the rest of your funds in your hidden wallets. This creates what’s referred to as plausible deniability. If someone forces you to open your Trezor Model T to see your balances, you can open the standard wallet with the $100. Nothing else will be displayed. “That’s all I got Joe!”. For people who don’t know the hidden wallet functionality (the wallets secured by the passphrase on top of the seed phrase), they won’t know to ask you to open them. Even if they do ask you to open them, they don’t know how many you have. Also, any entry in the passphrase section opens a wallet. There’s no wrong answer. This is additional security against physical attacks. You can set up one “fake” hidden wallet with a few dollars, and say that’s the only one I have. How would they know how many you actually have?

PROTECTION AGAINST PHYSICAL ATTACKS

This potential of forceful entry can also be taken care of very simply through another two features the Trezor Model T has. This first is referred to as the wipe code. Every time you plug your Trezor Model T in, you are asked to enter a pin code. A wipe code is entered into the same screen. No one can know whether the code you are entering is the code to unlock your device or the code to delete 100% of the data on the device. No one will know until it’s too late, and your device is wiped out. This is one choice you have if put into this unfortunate circumstance. Not that many of us will be, but it’s still good to know about.

The other defense against forceful entry is the microSD Card Lock. The Trezor Model T has a slot for a microSD Card. You can tell the Trezor to generate a random password to the microSD Card, which will be added onto your pin code. Now, whenever your microSD Card is inside your device, your pin code will work.

Whenever the microSD Card is not in the device, your real pin code will not work. This is another defense mechanism you have available to you. You may choose to remove the microSD Card when in areas you feel are very unsafe. You may also break the microSD Card to render your Trezor Model T unusable, then recreate your wallet at a later time with the seed phrase you engraved on metal (Because you read the article about good security habits).

PROTECTION AGAINST THEFT AND DESTRUCTION

Now let’s talk about the two biggest downfalls of a seed phrase, destruction and theft, and what functionality the Trezor Model T has to solve those.

Imagine your seed phrase is destroyed in a fire (because you didn’t engrave it to metal), and your hardware wallet was destroyed too. Usually, you’d buy a new hardware wallet, type in your seed phrase, and you’ll be able to see your entire wallet recreated in front of you with all its funds. This is how you recreate your wallet. But with the hardware wallet and seed phrase both destroyed, you have no other ways to find out your seed phrase. All your money can’t be reached any longer. You may be thinking that you could have created multiple copies of the seed phrase, and I would agree. But this is where the issue of theft comes in. Once a thief steals your seed phrase, all additional copies are rendered useless. He knows your seed phrase now. You have to change it.

With your seed phrase, the thief can recreate your wallet and steal all your funds.

This is only true if all the backups are identical.

Let’s say you have 5 seed phrases that are different, though, and your wallet requires you to input 3 of those seed phrases to recreate your wallet. How would that change the outcome of the same scenario?

Let’s explore. The thief steals your seed phrase. You have 4 others in secure locations. Now because your Trezor Model T was set up to only recreate your wallet if 3 of 5 of your seed phrases are entered… guess what! The thief can’t do anything with just one! It is entirely useless to them! Furthermore, it doesn’t matter if a thief knows one of your seed phrases, because to him, it’s useless unless he has two more. None of your other seed phrases have been compromised, and you can go about business like usual.

And so this is an additional feature the Trezor Model T has for you when you are first setting up your wallet. Instead of a normal seed phrase, you can choose to do what’s called a Shamir Backup, and create this additional security feature for your seed phrase. You can also choose how many seed phrases you want to have input before your wallet gets recreated. You can choose any number from only 1, to all 5.

The Trezor Model T also doesn’t have bluetooth, nor an internal battery. It shuts off after you unplug it, rendering it entirely useless until plugged back in.

As you can see, the Trezor Model T has multiple security advances over what the Ledger Nanos offers. Your seed phrases are more future-proofed and more protected from hacking, theft, and destruction. You have multiple ways to render your Trezor useless under physical attack scenarios. Lastly, you can create an exceptional setup that has great plausible deniability. You can choose to have all the wallets you use created with the passphrase, and as such be entirely invisible to both the computer program the Trezor Model T uses and displays your accounts, and to other people who are trying to force you to log into them.

All these security features together increase the protection of your crypto multiple times over.

Of course, none of these protections can protect your crypto against yourself. This is why it is crucial for you to also learn a few basic security habits. Combining these security habits with the security features mentioned above you’ll be set up exceptionally well.

SO WHICH SHOULD YOU BUY?

Here is how I would suggest thinking through which hardware wallet you will buy

  1. If you have the $200-some for the Trezor Model T, get it. Not the Trezor One

  2. If you don’t, that’s entirely fine. There are two more options for you:

    1. Ledger Nano S. If you aren’t using more than 3 different coins in the Crypto world, or perhaps just using the Wolf Den for your wealth generation, get this. It’s $60, and will be perfect for you.

    2. Ledger Nano X. If you are using more than 3 coins, or are more active in the Crypto world and hence will likely start using additional coins, get this. It’s $120.

Your first priority is to secure your crypto with a hardware wallet, no matter what it is. Make a step forward, get whatever you can afford, then save up for a Trezor Model T. Upgrade when you can.

Simple enough? There are a few more features the X has over the S, but you can research those yourself. They’re pretty minor in my eyes. Get the S if you use 3 coins or less. Get the X if you use more. Get the Trezor Model T when it’s within your budget.

I also want to add that the Ledger Nanos have a feature that I wish the Trezor Model T had because I don’t want people with the Trezor Model T turning into this elitist club in the Wolf Den. Owners of the Ledger Nanos: The ease with which you can create multiple Binance Smart Chain accounts will make the Trezor Model T owners jealous :) Please keep in mind that a man or woman with $25 can become a millionaire in a few days in our world. Please be kind to one another, and please feel excited about sharing whichever hardware wallet you’ve chosen!

Now, let’s talk about Metamask and where it fits into this whole hardware wallet ecosystem.

We have set up the concrete barrier between the thieves and scammers and your permission slip. Now, we need something to use to be able to talk to different websites and see all of our coins.

The Ledger and the Trezor Model T both have a program that displays your coins. Let’s think of them as visual displays for your coins. But these default programs aren’t too flexible. Just like we can plug our video game consoles into different TV screens, we can “plug” our hardware wallets into different “visual displays”, too.

Remember how I mentioned Metamask up above?

This is what we will be using Metamask for. We will be using Metamask as a visual display for our hardware wallets.

Metamask will have zero permissions. All it will be able to do is display all of your coins (Even brand new ones), and it will let you interact and connect your wallet to different websites.

Whenever the time comes for a transaction, though, you will have to manually approve it using the buttons on your hardware wallet. All Metamask will do is throw the transaction over to your hardware wallet, and say “Hey. Here’s the plan. I need permission to do it though. Can I?”.

Now you know more than 99% of beginners and intermediate users do in the Crypto space, and all it took was 25 minutes of reading.

Now go secure your crypto. Order your Trezor only from their official website here.

And read that security habits article.

This article was originally written by Priest, GUARDIAN TIER of Wolf Den, on November 24th 2021.

Last updated