{"id":4930,"date":"2022-08-14T09:23:52","date_gmt":"2022-08-14T09:23:52","guid":{"rendered":"https:\/\/cyberscrilla.com\/staging\/4768\/?p=4930"},"modified":"2022-08-17T14:35:36","modified_gmt":"2022-08-17T14:35:36","slug":"can-a-ledger-wallet-be-hacked","status":"publish","type":"post","link":"https:\/\/cyberscrilla.com\/staging\/4768\/can-a-ledger-wallet-be-hacked\/","title":{"rendered":"Can A Ledger Wallet Be Hacked? (+ Tips to Keep it Safe)"},"content":{"rendered":"\n<p>If you own any sort of digital assets like <a rel=\"noreferrer noopener\" href=\"https:\/\/cyberscrilla.com\/staging\/4768\/what-is-an-nft\/\" target=\"_blank\">NFTs<\/a> or crypto, then you have probably heard about <a rel=\"noreferrer noopener\" href=\"https:\/\/cyberscrilla.com\/staging\/4768\/best-hardware-wallet-for-nfts\/\" target=\"_blank\">Ledger hardware wallets<\/a>. These wallets are said to be the safest way to store your digital assets\u2014but can a Ledger wallet be hacked?<\/p>\n\n\n\n<p><strong>Ledger wallets are built to withstand physical and software attacks. Its security chip means it&#8217;s resistant to malicious attacks like fault injections, laser attacks, electromagnetic tampering, and power glitches. Also, its BOLOS operating system keeps apps isolated to ensure private info remains secure.<\/strong><\/p>\n\n\n\n<p>Knowing the various ways a Ledger wallet could be compromised and how to avoid these various attacks is crucial to keeping your wallet and the assets within it safe. In this article, you\u2019ll learn what to look out for and how to know if your wallet has been compromised.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Can A Leder Wallet Be Hacked?<\/h2>\n\n\n\n<p>There are numerous ways that hardware wallets can be attacked. That being said, Ledger has done a great job covering all its bases to ensure these hacks don&#8217;t affect their devices. <strong>Here are some realistic ways a hardware wallet could be hacked, and how Ledger eliminates the threat.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"845\" height=\"563\" src=\"https:\/\/cyberscrilla.com\/staging\/4768\/wp-content\/uploads\/2022\/08\/Potential-Hardware-Wallet-Hacks.png\" alt=\"A Ledger wallet can be hacked in a number of ways.\" class=\"wp-image-5001\" srcset=\"https:\/\/cyberscrilla.com\/staging\/4768\/wp-content\/uploads\/2022\/08\/Potential-Hardware-Wallet-Hacks.png 845w, https:\/\/cyberscrilla.com\/staging\/4768\/wp-content\/uploads\/2022\/08\/Potential-Hardware-Wallet-Hacks-300x200.png 300w, https:\/\/cyberscrilla.com\/staging\/4768\/wp-content\/uploads\/2022\/08\/Potential-Hardware-Wallet-Hacks-768x512.png 768w\" sizes=\"auto, (max-width: 845px) 100vw, 845px\" \/><figcaption>Potential hardware wallet hacks<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">1. Power Glitching<\/h3>\n\n\n\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/hackaday.com\/tag\/glitching\/\" target=\"_blank\">Power glitching<\/a> can be used to violate a cryptographic coprocessor by disrupting the system and flooding the power supply of the hardware\u2019s circuit board. If done correctly, this brief surge of power could lead to your wallet\u2019s private info being exposed.<\/p>\n\n\n\n<p>In order to execute this attack, a hacker would need physical access to your wallet. <\/p>\n\n\n\n<p><strong>Ledger&#8217;s Solution:<\/strong> By using a high-end security chip called a <a rel=\"noreferrer noopener\" href=\"https:\/\/www.ledger.com\/academy\/security\/not-all-chips-are-born-equal\" data-type=\"URL\" data-id=\"https:\/\/www.ledger.com\/academy\/security\/not-all-chips-are-born-equal\" target=\"_blank\">secure element<\/a> (the same chip found in passports and credit cards), Ledger is resistant to this type of attack. Ledger wallets are the only hardware devices that use SE chips.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Side-Channel Attack<\/h3>\n\n\n\n<p>A <a rel=\"noreferrer noopener\" href=\"https:\/\/www.rambus.com\/blogs\/side-channel-attacks\/\" target=\"_blank\">side-channel attack<\/a> (SCA) is exploit hackers use to extract private info from a chip or system. This is done by analyzing various physical parameters such as supply current, execution time, and electromagnetic emission.<\/p>\n\n\n\n<p>Hackers could potentially listen to the noise of the wallet while testing random PIN codes and also observing how each code changes the consumption behavior.<\/p>\n\n\n\n<p>Since different PINs will leave a different footprint, hackers can determine which codes might work. Moreover, by watching the behavior of the power consumption with each attempt, hackers can build a database of information.<\/p>\n\n\n\n<p>This database could then be used with a script that guesses PIN numbers one by one, eventually guessing the correct PIN.<\/p>\n\n\n\n<p><strong>Ledger&#8217;s Solution: <\/strong>In the case of a side-channel attack, Ledger&#8217;s secure element is able to safeguard against this type of attack as well.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Software Attack<\/h3>\n\n\n\n<p>A software attack is a direct hit on a device\u2019s <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/hardware-security-module-HSM\" target=\"_blank\" rel=\"noreferrer noopener\">hardware security module<\/a> (HSM). This module is responsible for safeguarding and managing digital keys, performing both encryption and decryption functions for digital signatures, and other cryptographic functions.<\/p>\n\n\n\n<p>To attack the HSM, hackers need to have a better understanding of the technology than the developers themselves in order to locate vulnerabilities in the software\u2019s code.<\/p>\n\n\n\n<p>Carrying out this type of attack would require the hacker to plug in the hardware module to a computer to recover its underlying software. Then, after running a script that scans the code of the device, it locates the software in <a href=\"https:\/\/www.synopsys.com\/glossary\/what-is-binary-code-binary-analysis.html\" target=\"_blank\" rel=\"noreferrer noopener\">binary form<\/a>\u2014which only computers understand.<\/p>\n\n\n\n<p>Of course, with a little finagling, hackers can transform the code into a human-readable form. From there, the goal is to find a vulnerability in the software so that the attacker can take control of the software and receive data from it.<\/p>\n\n\n\n<p><strong>Ledger&#8217;s Solution:<\/strong> The device&#8217;s BOLOS operating system keeps apps isolated to ensure private info remains secure. That means if you were to download an app that had malicious intent, there&#8217;s no way it could gain access to the private information that&#8217;s stored on your Ledger device.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Phishing Link Scam<\/h3>\n\n\n\n<p>Perhaps the most common type of scam that is experienced in the web3 space is accomplished via a phishing link. These links lead to malicious websites that are designed to gain access to your wallet.<\/p>\n\n\n\n<p>Generally, visiting this type of website isn\u2019t enough to get your wallet compromised. Instead, scammers will create a website that looks like a popular and trusted website (such as a <a href=\"https:\/\/cyberscrilla.com\/staging\/4768\/top-nft-marketplaces-for-buying-and-selling-nfts\/\">well-known NFT marketplace<\/a>) or offer you a deal that\u2019s too good to pass up.<\/p>\n\n\n\n<p>Then once you go to sign the transaction using your wallet, you actually voluntarily sign over your access to the attacker. From there, the scammer swiftly sends all your digital assets to their own wallet so that they can liquidate them for a quick profit.<\/p>\n\n\n\n<p>The worst thing about this <a href=\"https:\/\/cyberscrilla.com\/staging\/4768\/top-nft-scams-and-how-to-avoid-them\/\" target=\"_blank\" rel=\"noreferrer noopener\">common NFT scam<\/a> is that it usually goes unnoticed, that is, until it\u2019s too late and you realize your wallet has been drained. To make things worse, hackers don\u2019t need physical access to your Ledger device to accomplish this attack.<\/p>\n\n\n\n<p>All they need is for you to get online, click on their link, and then sign a transaction using your wallet.&nbsp;<\/p>\n\n\n\n<p><strong>Ledger&#8217;s Solution:<\/strong> Since Ledger hardware wallets store all of its sensitive information offline and on the device itself, there is little concern for this type of hack. However, if you decide to connect your wallet to a malicious site and voluntarily sign over control, there&#8217;s very little that can be done at that point. That&#8217;s why it&#8217;s important to stay vigilant and consider getting a second wallet (one for transactions and one for storage).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Secure Are Ledger Wallets?<\/h2>\n\n\n\n<p>Ledger devices are the most secure wallets on the market. By using a combination of a secure chip (the same technology found in credit cards and passports) and its one-of-a-kind BOLOS operating system, Ledger wallets are protected from malicious attacks including software, side-channel, and glitches.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"845\" height=\"563\" src=\"https:\/\/cyberscrilla.com\/staging\/4768\/wp-content\/uploads\/2022\/08\/How-Secure-Are-Ledger-Wallets.png\" alt=\"Ledger devices are the most secure wallets on the market.\" class=\"wp-image-4937\" srcset=\"https:\/\/cyberscrilla.com\/staging\/4768\/wp-content\/uploads\/2022\/08\/How-Secure-Are-Ledger-Wallets.png 845w, https:\/\/cyberscrilla.com\/staging\/4768\/wp-content\/uploads\/2022\/08\/How-Secure-Are-Ledger-Wallets-300x200.png 300w, https:\/\/cyberscrilla.com\/staging\/4768\/wp-content\/uploads\/2022\/08\/How-Secure-Are-Ledger-Wallets-768x512.png 768w\" sizes=\"auto, (max-width: 845px) 100vw, 845px\" \/><figcaption>Ledger wallet security features<\/figcaption><\/figure>\n\n\n\n<p>To further elaborate on just how secure Ledger devices are, let&#8217;s break down each security measure.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Password<\/h3>\n\n\n\n<p>Let&#8217;s start with the basics. All ledger wallets require you to set up a password so that you can lock it to prevent unauthorized access. The password encrypts all your sensitive user data such as your account names, public addresses, and your transactions.&nbsp;<\/p>\n\n\n\n<p>To ensure your password remains secure, it should be a mix of upper and lower-case characters.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">PIN Code<\/h3>\n\n\n\n<p>Ledger\u2019s PIN code contains 4 or 8 digits chosen by you when you first set up the device. This adds another layer of protection by preventing unauthorized access to your digital assets. You can always change your PIN code at any time.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Secret Phrase<\/h3>\n\n\n\n<p>If you aren\u2019t aware, nearly every crypto-based wallet comes equipped with a secret phrase (also called seed phrase, private key, and recovery phrase). This phrase is the literal key used to access your wallet. Even if you forget your password, you can use your wallet\u2019s recovery phrase to regain access and create a new password.<\/p>\n\n\n\n<p>Most wallets come standard with a 12-word secret phrase, however, Ledger wallets come with a 24-word phrase. But, how secure can this phrase really be? Extremely secure.<\/p>\n\n\n\n<p>Ledger uses a standard called <a href=\"https:\/\/www.blockplate.com\/blogs\/blockplate\/list-of-bip39-wallets-mnemonic-seed\" target=\"_blank\" rel=\"noreferrer noopener\">BIP-39<\/a> to generate every single one of their wallet\u2019s secret phrases. This standard consists of only 2,048 words from the <a href=\"https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0039\/english.txt\" target=\"_blank\" rel=\"noreferrer noopener\">BIP-39 wordlist<\/a>. <\/p>\n\n\n\n<p>That being said, there are 115,792,089,237,316,195,423,570,985,008,687,907,853,269,984,665,640,564,039, 457,584,007,913,129,639,936 possible mnemonic seeds.<\/p>\n\n\n\n<p>How\u2019s that for security?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Secure Chip (secure element)<\/h3>\n\n\n\n<p>Ledger\u2019s secure element is a step up in terms of security. A secure chip is the same technology that\u2019s found in your passport, credit cards, and SIM cards. Its sole function is to protect highly sensitive information from being accessed by people with malicious intent.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">BOLOS Operating System<\/h3>\n\n\n\n<p>Ledger\u2019s very own BOLOS operating system is unique to their devices. Similar to more familiar operating systems like Windows and Mac OS, BOLOS enables Ledger wallets to install applications that are isolated from each other. Furthermore, it also ensures your 24-word secret phrase remains isolated from the applications on the device.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"845\" height=\"563\" src=\"https:\/\/cyberscrilla.com\/staging\/4768\/wp-content\/uploads\/2022\/08\/BOLOS-Operating-System.png\" alt=\"As shown in the image above, applications can\u2019t interact with each other. Instead, they communicate directly with BOLOS. \" class=\"wp-image-4940\" srcset=\"https:\/\/cyberscrilla.com\/staging\/4768\/wp-content\/uploads\/2022\/08\/BOLOS-Operating-System.png 845w, https:\/\/cyberscrilla.com\/staging\/4768\/wp-content\/uploads\/2022\/08\/BOLOS-Operating-System-300x200.png 300w, https:\/\/cyberscrilla.com\/staging\/4768\/wp-content\/uploads\/2022\/08\/BOLOS-Operating-System-768x512.png 768w\" sizes=\"auto, (max-width: 845px) 100vw, 845px\" \/><figcaption>Ledger&#8217;s BOLOS OS (<a href=\"https:\/\/www.ledger.com\/academy\/security\/our-custom-operating-system-bolos\" data-type=\"URL\" data-id=\"https:\/\/www.ledger.com\/academy\/security\/our-custom-operating-system-bolos\" target=\"_blank\" rel=\"noreferrer noopener\">Source<\/a>)<\/figcaption><\/figure>\n\n\n\n<p>As shown in the image above, applications can\u2019t interact with each other. Instead, they communicate directly with BOLOS. This keeps malicious users and developers away from your private info.<\/p>\n\n\n\n<p>With that, third parties can still develop applications for Ledger devices. Of course, there\u2019s still a <a href=\"https:\/\/developers.ledger.com\/docs\/nano-app\/introduction\/\" target=\"_blank\" rel=\"noreferrer noopener\">process in place<\/a> for being accepted as an official app on Ledger Live.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Know if Your Ledger Wallet Is Compromised<\/h2>\n\n\n\n<p>Even though it&#8217;s apparent that Ledger provides the <a href=\"https:\/\/cyberscrilla.com\/staging\/4768\/what-is-the-safest-nft-wallet\/\" target=\"_blank\" rel=\"noreferrer noopener\">safest NFT wallet<\/a> on the market, it\u2019s still possible that your wallet could be compromised. Below are a few steps to check that your wallet isn\u2019t compromised.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"845\" height=\"563\" src=\"https:\/\/cyberscrilla.com\/staging\/4768\/wp-content\/uploads\/2022\/08\/How-to-Know-if-Your-Ledger-Wallet-Is-Compromised.png\" alt=\"Below are a few steps to check that your wallet isn\u2019t compromised.\" class=\"wp-image-4938\" srcset=\"https:\/\/cyberscrilla.com\/staging\/4768\/wp-content\/uploads\/2022\/08\/How-to-Know-if-Your-Ledger-Wallet-Is-Compromised.png 845w, https:\/\/cyberscrilla.com\/staging\/4768\/wp-content\/uploads\/2022\/08\/How-to-Know-if-Your-Ledger-Wallet-Is-Compromised-300x200.png 300w, https:\/\/cyberscrilla.com\/staging\/4768\/wp-content\/uploads\/2022\/08\/How-to-Know-if-Your-Ledger-Wallet-Is-Compromised-768x512.png 768w\" sizes=\"auto, (max-width: 845px) 100vw, 845px\" \/><figcaption>Check if your Ledger wallet is compromised<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">1. Know where your device came from<\/h3>\n\n\n\n<p>The first step is to confirm that you ordered your device <a href=\"https:\/\/shop.ledger.com?r=f3f59e340ecb\" target=\"_blank\" rel=\"noreferrer noopener\">directly from Ledger<\/a>. Ordering your wallet from resellers such as Amazon, eBay, or from friends on the internet is a bad idea as your device could arrive compromised.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Verify the box contents<\/h3>\n\n\n\n<p>Every Ledger box should contain the proper contents. If an item is missing, this should be a major red flag that your wallet may have been accessed by someone else. The box contents are as follows:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Ledger Wallet&nbsp;<\/li><li>USB Type-C cable&nbsp;<\/li><li>An envelope containing:&nbsp;<ul><li>Get Started leaflet<\/li><\/ul><ul><li>Care and Regulatory Statement<\/li><\/ul><ul><li>3 Recovery sheets&nbsp;<\/li><\/ul><\/li><li>Accessories:<ul><li>Keychain<\/li><\/ul><\/li><li>Packaging:&nbsp;<ul><li>Ledger-branded cardboard box and sleeve<\/li><\/ul><\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">3. Ensure the recovery phrase hasn\u2019t been setup<\/h3>\n\n\n\n<p>Your recovery words are generated on your <a href=\"https:\/\/cyberscrilla.com\/staging\/4768\/how-to-setup-your-ledger-wallet-and-safely-transfer-nfts-to-it\/\">Ledger wallet screen in the initial setup<\/a>. If your device came with a pre-filled recovery sheet or if your wallet did not generate recovery words during setup, your device is not safe to use.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Check for factory settings<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"845\" height=\"563\" src=\"https:\/\/cyberscrilla.com\/staging\/4768\/wp-content\/uploads\/2022\/08\/Check-Ledger-Factory-Settings.png\" alt=\"You can check Ledger's factory settings when your turn on your wallet.\" class=\"wp-image-4942\" srcset=\"https:\/\/cyberscrilla.com\/staging\/4768\/wp-content\/uploads\/2022\/08\/Check-Ledger-Factory-Settings.png 845w, https:\/\/cyberscrilla.com\/staging\/4768\/wp-content\/uploads\/2022\/08\/Check-Ledger-Factory-Settings-300x200.png 300w, https:\/\/cyberscrilla.com\/staging\/4768\/wp-content\/uploads\/2022\/08\/Check-Ledger-Factory-Settings-768x512.png 768w\" sizes=\"auto, (max-width: 845px) 100vw, 845px\" \/><figcaption>Ledger logo and welcome screen<\/figcaption><\/figure>\n\n\n\n<p>The factory settings on every new Ledger device should be the same. When your first turn your wallet on, it should display the Ledger Logo. Once you release the buttons used to turn it on, the welcome message should appear\u2014prompting you to press right to continue.<\/p>\n\n\n\n<p>The next step is to set up your PIN code. It\u2019s important to note that Ledger does not provide you with a PIN, you are responsible for entering your own. So if your wallet requires a PIN code the first time you use it, it\u2019s not safe to use.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Confirm authenticity with Ledger Live<\/h3>\n\n\n\n<p>Your last line of defense to ensure your Ledger wallet has not been compromised is to <a href=\"https:\/\/support.ledger.com\/hc\/en-us\/articles\/4404807946001-How-to-verify-the-authenticity-of-Ledger-Live-?support=true\" target=\"_blank\" rel=\"noreferrer noopener\">confirm its authenticity<\/a> using Ledger Live.<\/p>\n\n\n\n<p>Only genuine Ledger devices hold a secret key which is set during the manufacturing process. Ledger Live uses this key to pass the genuineness check. If your device doesn\u2019t pass, don\u2019t use it.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. Check hardware integrity (for advanced users only)<\/h3>\n\n\n\n<p>If you\u2019re someone who enjoys taking things apart and putting them back together, then you might want to consider checking your wallet\u2019s hardware integrity.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"845\" height=\"563\" src=\"https:\/\/cyberscrilla.com\/staging\/4768\/wp-content\/uploads\/2022\/08\/Ledger-Hardware-Integrity.png\" alt=\"You can open your Ledger device to verify no additional chip has been added.\" class=\"wp-image-4941\" srcset=\"https:\/\/cyberscrilla.com\/staging\/4768\/wp-content\/uploads\/2022\/08\/Ledger-Hardware-Integrity.png 845w, https:\/\/cyberscrilla.com\/staging\/4768\/wp-content\/uploads\/2022\/08\/Ledger-Hardware-Integrity-300x200.png 300w, https:\/\/cyberscrilla.com\/staging\/4768\/wp-content\/uploads\/2022\/08\/Ledger-Hardware-Integrity-768x512.png 768w\" sizes=\"auto, (max-width: 845px) 100vw, 845px\" \/><figcaption>Ledger hardware<\/figcaption><\/figure>\n\n\n\n<p>To do this, you can open your device to verify no additional chip has been added. Just make sure you are aware of all of <a href=\"https:\/\/support.ledger.com\/hc\/en-us\/articles\/4404382029329-Check-hardware-integrity?support=true\" target=\"_blank\" rel=\"noreferrer noopener\">Ledger\u2019s hardware revisions<\/a> before jumping to any conclusions about whether or not there\u2019s an additional chip.<\/p>\n\n\n\n<p>If you have reason to believe that something doesn\u2019t look right, don\u2019t use your device, and contact Ledger immediately.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Tips for Keeping Your Ledger Wallet Safe<\/h2>\n\n\n\n<p>Ledger\u2019s team of over 130 employees who have extensive knowledge in embedded securities, cryptocurrency, and NFTs, have done everything in their power to develop the most secure wallet for safely storing your digital assets.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"845\" height=\"563\" src=\"https:\/\/cyberscrilla.com\/staging\/4768\/wp-content\/uploads\/2022\/08\/Tips-for-Keeping-Your-Ledger-Wallet-Safe.png\" alt=\"Below of some of my top safety tips to ensure your wallet remains secure.\" class=\"wp-image-4944\" srcset=\"https:\/\/cyberscrilla.com\/staging\/4768\/wp-content\/uploads\/2022\/08\/Tips-for-Keeping-Your-Ledger-Wallet-Safe.png 845w, https:\/\/cyberscrilla.com\/staging\/4768\/wp-content\/uploads\/2022\/08\/Tips-for-Keeping-Your-Ledger-Wallet-Safe-300x200.png 300w, https:\/\/cyberscrilla.com\/staging\/4768\/wp-content\/uploads\/2022\/08\/Tips-for-Keeping-Your-Ledger-Wallet-Safe-768x512.png 768w\" sizes=\"auto, (max-width: 845px) 100vw, 845px\" \/><figcaption>Ledger wallet safety tips<\/figcaption><\/figure>\n\n\n\n<p>That being said, it\u2019s up to you to ensure that you\u2019re doing everything in your power to keep your wallet safe. Below of some of my top safety tips to ensure your wallet remains secure.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Store your Ledger device and private info in a secure location<\/h3>\n\n\n\n<p>The safest place to store your wallet and private info such as your recovery phrase, password, and PIN code are in a secure location, such as a <a href=\"https:\/\/amzn.to\/3pe7fq8\" target=\"_blank\" rel=\"noreferrer noopener\">fireproof safe<\/a>.&nbsp;<\/p>\n\n\n\n<p>You should never store your wallet\u2019s private information on your computer or anywhere online, as it increases the likelihood of your wallet being compromised.<\/p>\n\n\n\n<p>Writing your phrase down using a pen and paper is the most common practice. However, you risk losing your phrase if the paper were to somehow get destroyed\u2014such as in a fire or flood.&nbsp;<\/p>\n\n\n\n<p>For this reason, I recommend picking up a <a href=\"https:\/\/amzn.to\/3AjeWl9\" target=\"_blank\" rel=\"noreferrer noopener\">stainless steel seed storage plate<\/a>. These plates are fire and waterproof and come with an engraving pen to easily record your phrase.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Only buy your wallet directly from Ledger<\/h3>\n\n\n\n<p>There\u2019s no reason to purchase your wallet from anywhere but from Ledger directly.&nbsp; Under no circumstances should you trust buying a wallet from someone else or on Amazon.&nbsp;<\/p>\n\n\n\n<p>I have seen numerous people buy compromised Ledger wallets from Amazon, and it\u2019s not pretty. Once you receive it and fill it with your assets, the seller will drain your wallet. Trust me. It\u2019s worth spending the extra $10-$20 to ensure you are buying a legit wallet that you can trust.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Create a strong password&nbsp;<\/h3>\n\n\n\n<p>Even though your secret phrase is one of your wallet\u2019s greatest lines of defense, it\u2019s best to create a strong password too.&nbsp;<\/p>\n\n\n\n<p>A strong password includes upper and lowercase letters, numbers, and symbols. Also, it\u2019s best to not use words when creating a password. Rather, choose random characters that make your password near impossible to guess.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Do not connect your Ledger wallet to the internet<\/h3>\n\n\n\n<p>The most common scam in the NFT and crypto space is phishing links. If you plan on using your wallet as a storage solution for your NFTs, crypto, and other digital assets, then you should not connect it to the internet.<\/p>\n\n\n\n<p>The greatest strength of a hardware wallet like Ledger is that all your wallet\u2019s private info is stored offline. However, the moment you decide to connect it to the internet, you lose that benefit. All you\u2019re really doing is putting your wallet and the assets within it at risk.&nbsp;<\/p>\n\n\n\n<p>If you fall victim to a fishing link scam, there\u2019s very little that can be done to recover your assets.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Keep your wallet locked when not in use<\/h3>\n\n\n\n<p>There\u2019s no reason to keep your wallet unlocked if you\u2019re not actively using it. Every time you are done with it, even if you\u2019re only stepping away for a minute, make sure to lock it.&nbsp;<\/p>\n\n\n\n<p>It only takes two seconds and it puts up another barrier to protect against hackers. Once you\u2019re ready to use it again, you can easily unlock it using your PIN and password.<\/p>\n\n\n\n<p>Ultimately, just about any type of device can be hacked. However, Ledger has done everything they can to ensure their wallets are the most secure device on the market for <a rel=\"noreferrer noopener\" href=\"https:\/\/cyberscrilla.com\/staging\/4768\/securely-storing-your-nfts-a-complete-guide\/\" target=\"_blank\">safely storing your digital assets<\/a>, and for a very reasonable price. If you own any NFTs, crypto, or other blockchain-based assets, then you need to <a rel=\"noreferrer noopener\" href=\"https:\/\/shop.ledger.com?r=f3f59e340ecb\" target=\"_blank\">get a Ledger<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ledger makes the most secure hardware wallets on the market. But, can a Ledger wallet be hacked? In this article, we discuss just how secure these wallets are.<\/p>\n","protected":false},"author":1,"featured_media":4934,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","footnotes":""},"categories":[13],"tags":[163,202],"class_list":["post-4930","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nft","tag-ledger","tag-wallet","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-33"],"_links":{"self":[{"href":"https:\/\/cyberscrilla.com\/staging\/4768\/wp-json\/wp\/v2\/posts\/4930","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberscrilla.com\/staging\/4768\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberscrilla.com\/staging\/4768\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberscrilla.com\/staging\/4768\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberscrilla.com\/staging\/4768\/wp-json\/wp\/v2\/comments?post=4930"}],"version-history":[{"count":5,"href":"https:\/\/cyberscrilla.com\/staging\/4768\/wp-json\/wp\/v2\/posts\/4930\/revisions"}],"predecessor-version":[{"id":6581,"href":"https:\/\/cyberscrilla.com\/staging\/4768\/wp-json\/wp\/v2\/posts\/4930\/revisions\/6581"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberscrilla.com\/staging\/4768\/wp-json\/wp\/v2\/media\/4934"}],"wp:attachment":[{"href":"https:\/\/cyberscrilla.com\/staging\/4768\/wp-json\/wp\/v2\/media?parent=4930"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberscrilla.com\/staging\/4768\/wp-json\/wp\/v2\/categories?post=4930"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberscrilla.com\/staging\/4768\/wp-json\/wp\/v2\/tags?post=4930"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}