How To Use A Bitcoin Hardware Wallet

2 years ago

This is not a usher connected the astir precocious information for your bitcoin holdings. It is an casual mode to amended connected what astir radical do. It is not astir immoderate 1 benignant of hardware wallet, but hardware wallets successful general.

Aiming for utmost information close from the opening is an unreasonable expectation; it indispensable beryllium done successful stages, otherwise, you volition person gaps successful understanding, and specified gaps are a information risk. It’s besides a information hazard to blindly travel proposal if you are going to aforesaid custody; you request to recognize immoderate of what you are doing, too. This bid is astir what I telephone “Level Three” of my ZeroTrust System — getting coins disconnected of the speech and into your ain custody with a hardware wallet. This is thing Bitcoiners regularly counsel newcomers to do, and it’s fantabulous advice. (For those interested, here is simply a elaborate explanation of wherefore keeping bitcoin connected an speech is simply a atrocious idea.)

As you tin spot from the ZeroTrust system, determination are tons of things you tin do, but getting each of your bitcoin disconnected of the speech is an important aboriginal step. Don’t hide to spell backmost to level 2 arsenic good if you skipped that.

Storing bitcoin connected a hardware wallet is simply a immense betterment successful security, but truthful overmuch much tin beryllium done to amended security. This usher volition explicate what elemental things you tin bash next, and assistance you recognize what you’re doing and wherefore successful bid to beryllium harmless and to springiness you bid of mind. I anticipation it whitethorn besides spark involvement to instrumentality your information further.

What Are Bitcoin Hardware Wallets?

People confuse what hardware wallets are, and what they do. They deliberation that these devices clasp your bitcoin. No! It’s important to recognize these things truthful you cognize what you are doing and don’t messiness up your security.

The hardware wallet holds the backstage keys. The backstage keys nutrient signatures and springiness you the powerfulness to walk bitcoin. So, they request to beryllium kept hidden. That is the main intent of a hardware wallet. To digitally fell and unafraid your backstage keys. The hardware instrumentality is locked with your pin. To support your bitcoin safe, you request to…

  1. Prevent anyone from uncovering the hardware wallet
  2. Prevent anyone from knowing the PIN to entree the contents of the hardware wallet
  3. Prevent demolition oregon nonaccomplishment of the hardware wallet
  4. Back up the 24 words (or 12) truthful that you tin regenerate the wallet if the hardware wallet is lost/destroyed
  5. Don’t suffer the 24-word backup
  6. Don’t fto anyone find the 24-word backup
  7. Make plans for your hardware wallet and backups successful lawsuit you dice (inheritance plan)

If you kept your 24 words successful a bundle wallet connected a mean computer, determination is simply a hazard that determination is malware connected the machine — if idiosyncratic gained entree to your computer, past the bitcoin tin beryllium stolen, either by stealing your 24 words oregon manipulating the bundle wallet to walk to the attacker’s code (while showing you a antithetic code connected the screen!). Hackers are smart.

A hardware wallet solves this occupation by ne'er releasing backstage accusation from the device.

How does it work? Excuse the disgusting banking analogy (I’m sorry!), but it is effective…

Imagine a cheque outgo and the pursuing steps: You constitute a cheque with the sender’s name, your account, the amount, and importantly, your signature. The slope past receives the signed cheque and makes the transportation of funds.

Bitcoin transactions person similarities to cheque payments. They excessively person a sender, receiver and amounts, and besides necessitate signatures. Those signatures are integer and are done by backstage keys. The backstage cardinal is wrong the hardware wallet. We privation it to enactment determination and ne'er leak to the machine (or immoderate computer) that is drafting up the details of the transaction.

These are the steps (follow wherever the transaction goes):

  1. Using your bundle wallet (it has nary backstage keys), you gully up a transaction (sending address, receiving address, amounts, but nary signature due to the fact that it can’t).
  2. The bundle wallet past communicates with the hardware wallet (options are: USB connection, SD card, QR code) which receives the transaction unsigned.
  3. The hardware wallet has the backstage cardinal and so, it tin adhd a signature to the transaction it conscionable received.
  4. The hardware wallet past passes the signed transaction backmost to the bundle wallet connected the computer.
  5. The bundle wallet present has a signed transaction (something it could not person done without entree to the backstage key/seed phrase).
  6. The bundle wallet is connected to a node (nodes store the blockchain), and it broadcasts the signed transaction to the node.

Once the transaction is sent to a node (preferably your own), this is what happens to it:

  1. The node shares the transaction with each of the different nodes connected the network.
  2. The transaction sits successful the queue (mempool) of each the nodes.
  3. A miner picks up the transaction from the queue and adds it to the existent artifact it is trying to mine. It besides adds tons of different peoples’ transactions to that block.
  4. If that miner wins the adjacent block, that full artifact is added to the blockchain, and the transaction is contained wrong it, truthful the transaction is present connected the blockchain. It is said to person 1 confirmation.
  5. At immoderate clip (an mean of 10 minutes later) different miner past adds their artifact to the blockchain, and the transaction successful this illustration gets deeper from the extremity of the chain; present it has 2 confirmations, and truthful on.

Once the transaction is confirmed (on the blockchain), the bundle wallets of the sender and receiver tin pass with immoderate node and tin update the balances of the addresses they have, based connected question of bitcoin arsenic recorded connected the blockchain. The outgo tin beryllium “seen” by the wallets this way. A transportation to a node is necessary.

The intent of the hardware wallet successful the supra steps is to motion the transaction distant from a machine that has entree to the net (and hackers).

How To Buy A Hardware Wallet

There are galore hardware wallets connected the market. The astir fashionable does not needfully mean the best. Keep successful caput that to beryllium the astir popular, and maximize profits, immoderate integrity is usually sacrificed to entreaty to much people. Good information creates inconvenience for users and hurts sales.

The astir fashionable hardware look to beryllium Ledger and Trezor. I won’t spell into it here, but I person issues with them. But, if utilized correctly, utilizing 1 is far superior to leaving your coins connected an exchange. Some different bully hardware wallets are Coldcard, BitBox2, Passport and Seed Signer.

When you bargain one, marque definite that you bargain it straight from the manufacturer. Do not bargain from a reseller, similar Amazon, oregon eBay oregon secondhand. This is truly important. A hazard with these devices is that they tin beryllium tampered with successful specified a mode that your bitcoin tin beryllium stolen.

Another hazard is that you are identifying yourself to chartless radical with your name, wherever you unrecorded and that you astir apt ain immoderate bitcoin. You are past a people for attack. If possible, effort to bargain the instrumentality without giving your existent name, and person it shipped to a P.O. Box alternatively of your location address.

If you person rather a batch of worth to secure, past I urge buying 2 antithetic hardware wallets (two antithetic brands), and, arsenic I volition explicate later, fto 1 instrumentality cheque the integrity of the other. An alternate is to usage an air-gapped machine to bash that job. These computers person nary imaginable mode to entree the net (or different computers) arsenic they bash not person WiFi chips oregon Bluetooth devices.

You tin person 1 built arsenic a desktop computer, oregon physique a precise inexpensive 1 with a Raspberry Pi Zero — it’s truthful inexpensive it’s disposable! With specified a computer, it’s unafraid capable to participate your backstage effect words, and cheque successful a bundle wallet what addresses are produced, and comparison them with immoderate hardware wallet. It is besides a amended mode to generate seeds, alternatively of letting the hardware wallet bash it.

Opening the Packaging

When the point comes to you, cautiously inspect it. If it was shipped to your location address, cheque that the packaging doesn’t statement that a Bitcoin hardware wallet is inside. Otherwise, the full transportation concatenation knows that you person bitcoin and wherever you live. If that happens, kick to the manufacturer.

As you unpack the device, the shaper whitethorn supply you with instructions connected however to cheque for tampering. Follow this carefully.

How To Initialize A Bitcoin Hardware Wallet

Firmware Installation

A bully information measurement is to archetypal update the firmware. The instrumentality that was shipped to you usually has bundle contained (Trezor doesn’t), and you are trusting that whoever sent you the instrumentality installed genuine non-malicious software. It’s astir apt fine, but if you deliberation astir it, determination is simply a hazard there, and it is imaginable to destruct it. The mode to bash that is to instal the bundle yourself.

Many radical skip the measurement of installing the bundle themselves. It’s hard. You bash not person to bash it — getting your bitcoin disconnected the speech is the fig 1 priority, but astatine immoderate constituent successful your journey, learning however to securely update the bundle is wise.

Ideally, the bundle should beryllium good known, open-source and verifiable that it’s genuine. This involves selecting the close hardware instrumentality (one that uses open-source software, e.g., Coldcard), and knowing however to verify the bundle earlier installing it. As an example, Coldcard provides a two-minute video connected however to verify the bundle and however to instal it into the device. The Ledger device, however, updates the firmware successful a trusted way, by connecting to Ledger Live software. It lone provides the payment of having a caller mentation of the software, not eliminating the spot of what the bundle is doing.

Adding A Seed

Read the manual to larn however to enactment your device’s controls.

At archetypal use, you volition make a PIN that locks the device. The PIN is efficaciously converting the hardware wallet into a integer safe.

You volition past beryllium fixed the enactment of generating a effect phrase, usually 24 oregon 12 words. You request to constitute these words down. Why? If you suffer your hardware wallet oregon it is damaged, the words tin reconstruct your bitcoin into immoderate different HWW of immoderate brand.

You should beryllium unsocial erstwhile you grounds the words down, and marque definite nary 1 tin spot you from a computer’s camera, an unfastened window, oregon a passerby, etc. Also, don’t talk the words aloud successful lawsuit determination is simply a dependable signaling instrumentality somewhere, e.g., a computer. Edward Snowden has revealed however our computers are spying connected us, adjacent erstwhile they look to beryllium off! The words you are astir to constitute down are the weakest constituent of your security, but necessary.

No substance however unafraid your hardware device, if idiosyncratic has entree to your written words, they tin instrumentality your bitcoin — without adjacent needing entree to your hardware wallet. All they person to bash is enactment the 24 words into their hardware wallet, and walk your bitcoin to a wallet you person nary power over. Your equilibrium volition past beryllium zero.

So, constitute neatly and carefully. Making an mistake erstwhile penning down the words, oregon penning successful specified a mode that you misinterpret your handwriting successful the future, would mean that if you needed the words to reconstruct a damaged oregon mislaid hardware wallet, you volition neglect and entree to your bitcoin volition beryllium lost. This has happened to people.

The hardware wallet volition usually get you to constitute the words down arsenic it displays them to you 1 by one, and past it volition get you to participate them into the instrumentality to cheque you person written it down accurately.

Add A Passphrase

A precise important information and retention diagnostic is to adhd a passphrase. Do not confuse this with a “password,” which is typically utilized to fastener wallets oregon devices. A passphrase is an other connection that you adhd to the 12- oregon 24-word seed. The quality is that it is not constricted to the 2,048 imaginable words successful a seed. You tin take immoderate connection oregon random drawstring of substance you like. I suggest making it astatine slightest 15 characters long, not ambiguous successful immoderate way, not casual to conjecture and possibly thing you tin remember. If it’s excessively long, it’s going to beryllium a existent symptom to participate into a clunky hardware wallet each time. Each instrumentality has a antithetic method of applying a passphrase. If you take to skip this step, storing your words securely becomes a small trickier (explained later).

Once that process is done, the wallet contains what’s called an “extended backstage key” which creates galore idiosyncratic backstage keys, which each make a corresponding nationalist key, which each make a corresponding address. There is much much item present if you’re interested.

Create A Watching Wallet

A watching wallet is simply a bundle wallet, usually connected your desktop, that holds the extended nationalist key, and with that, tin make each of your wallets’ addresses. These addresses are associated with the effect words, but the words and the backstage keys are not stored here. That means nary coins tin beryllium spent. They tin lone beryllium observed.

A watching wallet starts disconnected looking similar bare addresses until it connects to the blockchain (a nationalist node, but preferably your ain node), and requests information astir the worth contained successful each the addresses. Watching wallets provided by hardware wallet manufacturers are usually precise basal (e.g., Ledger Live, Trezor Suite), and amusement lone 1 code astatine a clip arsenic you usage them.

There are efficaciously infinite addresses that you ain (associated with your mnemonic effect words) that are not shown to you by these bundle packages. If you usage third-party open-source bundle similar Electrum desktop wallet, Sparrow Wallet oregon Specter Wallet, you spot overmuch much of your wallet and person much power implicit however the coins successful your wallet are spent successful transactions. You besides larn a batch much astir however Bitcoin works.

Before installing your watching wallet, you should see malware. Your regular machine that you surf the net with astir surely has malware. The astir utmost information would beryllium to bargain a dedicated computer, instal Linux operating strategy connected it and lone usage it for Bitcoin transactions. Less utmost would beryllium to instrumentality an aged machine and hitch it cleanable with a caller operating strategy (Linux, Mac, Windows — information successful that order). Most radical volition usage a regular machine and I don’t deliberation I’ll beryllium capable to halt them. At least, if you bash this, ever double-check the code you are spending to connected the machine surface and the hardware wallet each clip you nonstop and person coins.

The mode to acceptable up the watching wallet with the hardware wallet’s bundle is straightforward if you travel their instructions. But mounting up connected third-party bundle is simply a process…

  1. Download software, ideally unfastened source, nonstop from the software’s website oregon GitHub.
  2. Verify the hash of the bundle and the GPG signature — this ensures the bundle has not been tampered with. If you are an expert, compile from the root code. This nonfiction contains a video demonstration of maine verifying the GPG signature for an Electrum desktop wallet. This nonfiction explains GPG signatures and hashing.
  3. Extract the extended nationalist cardinal (xPub) from the hardware wallet and load it into the watching wallet — the process for this varies with the instrumentality and the bundle package. This nexus contains accusation connected however to bash this for Electrum, and this 1 for Sparrow.

Once you bash this, you nary longer necessitate the hardware wallets bundle and tin proceed to link to the third-party software, which is ever overmuch better.

Make A Test Transaction To Receive And Spend

Your hardware is acceptable up and you person the watching wallet acceptable up connected a cleanable computer. Perfect. Now you privation to person each your bitcoin sitting connected the exchange, right? No. First, you indispensable person a tiny magnitude and trial that you person the powerfulness to spend. Proceed arsenic follows…

  1. Factory reset the device.
  2. Restore the instrumentality with the effect words you wrote down.
  3. Make a 2nd watching wallet utilizing the newly-created, restored xPub successful the hardware wallet, and comparison the addresses.
  4. Send a tiny magnitude to code #0 from the exchange, e.g., $100 worthy (not excessively small).
  5. Spend this $100 worthy and nonstop it to code #1 wrong your wallet (this requires a bitcoin transaction and costs immoderate fees. Don’t walk much than 1 sat per byte if your bundle gives you that level of control).

If that worked, proceed to the adjacent step.

Test Your Seed Words On A Second Device

Most radical volition skip this step. Ideally, you should reconstruct the effect operation into a 2nd device, and marque different watching wallet by extracting the xPub from that. Inspect the resulting addresses (receiving addresses and alteration addresses if you cognize how), and comparison them with the erstwhile watching wallet you made. If they are identical, you are bully to go.

Back Up Your Words

You can’t nonstop each your bitcoin from the speech to the watching wallet conscionable yet, sorry.

You truly indispensable see the backup of the words. So far, they are written down connected paper. But you should marque different copy. Some radical get obsessed astir signaling the effect words down connected metallic due to the fact that it tin beryllium fireproofed. They adjacent wage wealth for fancy metallic backup contraptions — not necessary.

If you duplicate your backups and support them separated, past a occurrence successful some locations is your catastrophe scenario, not a occurrence successful 1 location. You whitethorn inactive similar to support yourself from that. You tin simply get immoderate scrap metallic and, utilizing a $12 engraving pen, etch your effect into that. If you privation to trial occurrence resistance, effort placing it successful the BBQ and spot however it fares. See if you tin work your etching. I tested excavation and it was fine.

The adjacent happening to see is “what if idiosyncratic finds the backup”? Some radical judge that splitting the words up and storing them successful antithetic locations is simply a bully solution, but that is simply a unspeakable idea, arsenic it increases the hazard of the effect being brute unit calculated. You should person a passphrase and keeping that abstracted from the words is effective. To walk bitcoin, you’ll request to beryllium capable to reconstruct the effect words and the passphrase (just entering the effect without the passphrase volition reproduce the incorrect wallet).

Where To Keep The Backups?

Make definite everything is not successful 1 determination due to the fact that immoderate benignant of catastrophe could mean everything is lost.

You could support your hardware wallet successful your house, and the effect words determination too, arsenic agelong arsenic you person a transcript determination else, possibly a information deposit box, oregon a trusted household member’s house. The usage of a passphrase becomes captious if you springiness your effect to different people, adjacent if you spot them, due to the fact that you whitethorn not needfully spot their retention practices. They person the effect but not the passphrase; if they store it insecurely and it gets stolen, your bitcoin remains harmless due to the fact that the thief won’t person the passphrase.

Set Up An Inheritance Plan

This is tricky and depends connected truthful galore things. A elemental solution tin beryllium to memorize the passphrase and backmost it up determination harmless and archer your heirs what the passphrase is and wherever the seeds are kept. The evident occupation with this is that your coins whitethorn beryllium stolen by your heirs portion you are alive, oregon they whitethorn beryllium attacked and springiness up the information.

Protecting from this benignant of happening requires much precocious retention (multisignature) and a cautiously designed betterment program should you die. If interested, I connection this arsenic a work and tin beryllium contacted for information.

Transfer Your Funds From The Exchange

Your wallet is made, passphrase applied, trial walk done, seeds backed up successful aggregate locations, inheritance program considered… now, you tin retreat your coins from the speech to your watching wallet.

One happening to see is if you should determination everything astatine erstwhile oregon successful tiny packages.

Each withdrawal volition springiness you a abstracted coin with a antithetic history, truthful to an extracurricular observer, cognition of 1 of the coins being yours does not divulge accusation astir your different coins, and truthful your full balance.

Ideally, you privation to person coins/withdrawals to you of tiny spending amounts; amounts you whitethorn transportation successful the aboriginal erstwhile bitcoin is worthy a batch more. But if you instrumentality it excessively far, you volition marque galore withdrawals, and the withdrawal fees from the exchanges volition adhd up. I deliberation a substance of ample and tiny coins is wise. This is thing you should consider, I can’t counsel thing that would suit everyone.

What Next?

Great enactment if you did each of that, but it does not extremity there. Explore my tract armantheparman.com for different guides to amended your information and privacy. I suggest learning astir moving your ain node, but if you haven’t practiced making transactions with Electrum desktop wallet with a backstage cardinal (“Level Two”, nary hardware wallet), spell backmost and bash that and go acquainted with restoring wallets, basal transactions, coin control, what UTXOs are, etc.

Happy Bitcoining!

This is simply a impermanent station by Arman The Parman. Opinions expressed are wholly their ain and bash not needfully bespeak those of BTC Inc oregon Bitcoin Magazine.

View source