
ChainSecurity
21 Followers
Hardware wallets aren't what would be considered a hot wallet in the context mentioned by @pcaversaccio , as infostealers can't get to their private keys. Just don't take pictures of the hardware wallet seed phrase ever, do spend the few minutes to write it down on paper(s).
Of course a compromised device (usually at that stage by something beyond an infostealer, like a malware giving full remote control) is likely to trick you into signing something malicious with your hardware wallet eventually, so you might still lose funds this way. But it is more advanced and takes more effort by the attackers (like needing access to more advanced and usually much more expensive and limited access malware).
recast:farcaster://casts/0x5fb8ae709245235a9dc4b38b5945621c18c67b79eecb0c5ed355699ea0e84d8d
Bottom right: What are the LEDs at the end of that white cable telling you? Left top: Which node HW is that? How well is it running the reth archive node? Is it silent? Also: Shoutout to another OG HOPR node out there 🫡