Wealth Security Protocol
Go to Casa Home
  • 🗺️Overview
  • 💜Casa vs. Alternatives
    • Introduction
    • Option #1: Do-it-yourself
    • Option #2: Custodial Storage
    • Option #3: Commercial Systems
  • 🔑System Design Principles
    • Introduction
    • Minimal Knowledge
    • High Security
    • Usability is Security
    • Expert Support
    • Redundancy
    • Sovereignty
    • Incentive Alignment
  • 🚨Threat Overview
    • Introduction
    • Data and Credential Loss
    • Phishing
    • SIM Hijacking
    • Network Attacks
    • Malware
    • Supply Chain Attack
    • Physical Coercion
    • Child/Pet Attack
    • Internal Service Provider Attack
    • Platform / Hosting Provider Attack
    • Code Dependency Attack
    • Official Seizure
    • Inheritance Failure
  • 🔐Chosen Features
    • Introduction
    • Hardware Wallet Signing
    • Multi-signature
    • Multi-location
    • Heterogeneous Hardware and Software
    • Seedless Hardware Wallets
    • Emergency Recovery Key
    • PIN or Biometrics for Mobile Key only
    • PIN for every device
    • Sovereign Recovery Instructions
    • Emergency Lockdown Button
    • Health Check
    • Identity Verification for Account Recovery
    • Inheritance
  • ✅Chosen Key Schemes
    • 5-Key Vault
    • 3-Key Vault
    • Pay Wallet
  • ❌Rejected Key Schemes
    • Shamir's Secret Sharing
    • 2-of-2
    • 1-of-2
  • ❌Rejected Features
    • Biometrics General Usage
    • Brain Wallet -- Memory Based Solutions
  • 🔧Remaining Attack Vectors
    • Address Spoofing
    • Malicious Insider Key Theft
    • Extreme disaster scenarios
    • Extortion
  • 👨‍🚀Future Improvements
    • Taproot/MAST
    • Schnorr Signatures
Powered by GitBook
On this page

Was this helpful?

  1. 🔐Chosen Features

Hardware Wallet Signing

Hardware wallets offer the highest degree of usable security for cryptocurrency owners.

Hardware wallets are dedicated single-purpose offline computers used only to store private keys and conduct cryptocurrency signing operations. Private keys are generated on the device and never leave it; they can not be exfiltrated via a network connection. The devices connect to internet-enabled computers via NFC / QR codes / USB to transfer data and provide signed transactions for broadcast.

Some people feel that paper wallets are more secure than hardware wallets since they are non-electronic and therefore free from direct malware threats. But paper wallets add a host of complexity, taking setup and use time from minutes to hours or even days. Additionally paper wallets can still be affected by malware, since PCs and printers are often used in their generation. Some paper wallet generator sites themselves are malicious and generate keys that are known by the wallet author. Users of paper wallets still must consider supply chain attacks, air-gapping, how to trust the software stack, and side-channel attacks when generating paper wallets.

We use hardware wallets to store the majority of keys and conduct signing operations because it is the best way today to create secure storage systems that are usable by the general public.

PreviousIntroductionNextMulti-signature

Last updated 1 year ago

Was this helpful?