💡 Third-Party Wallets + Hardware Devices = Maximum Security! 💡 Still using only Ledger Live or Trezor Suite? It’s time to explore the world of third-party wallets! Originally, these hardware devices didn’t have their own native apps-they were made to work seamlessly with other wallets. 🎯 I break down: 🔍 Why you may not see your balances in Ledger Live or Trezor Suite 🔐 Why third-party wallets with hardware devices enhance security 🌐 The biggest third-party wallets like Metamask, Monero Wallet, Rabby, Solflare, TON Wallet, and Sui Wallet
Crypto dad. Can Ledger write software to extract private keys from your device? I heard this was possible when previously I was told it could not physically happen. What’s the truth. How good is ELLIPAL ? What other cold wallets are best.
These devices are designed to not leak the private keys. That’s their basic functionality. They have numerous counter measures against physical attacks and software attacks. So having a third-party wallet somehow requesting the private keys is a nonstarter. The device is designed to prevent that sort of software hack. The only real risk with using a third-party wallets is connecting to a malicious website that’s pretending to be a third-party wallet like MetaMask. There are a lot of fake MetaMask wallets floating around out there. And there are a lot of malicious websites where people go to claim airdrops or mint NFT’s. However, even when this happens, the device is working as designed. Malicious websites simply trick the user into authorizing a transaction on the device, but the device isn’t being hacked, the user is.
Say you have 5 different 3rd party wallets with your Ledger. You lost your laptop, and your ledger device. Now you bought a new Ledger device and put your seed phrase in, will you be able to access the funds 3rd party wallets then ?
I think you’re giving whales too much credit. Just because they have more crypto than you do, doesn’t make them hyper intelligent. I personally can’t understand why anyone would keep those types of amounts in a single wallet, but there they are sitting on the Blockchain. I mean, I’m sure companies have more sophisticated custody solutions to prevent one person from having full access such as multi sig wallets. But a lot of single crypto users use the same types of wallets that you and I do.
💡 Third-Party Wallets + Hardware Devices = Maximum Security! 💡
Still using only Ledger Live or Trezor Suite? It’s time to explore the world of third-party wallets! Originally, these hardware devices didn’t have their own native apps-they were made to work seamlessly with other wallets. 🎯
I break down: 🔍 Why you may not see your balances in Ledger Live or Trezor Suite
🔐 Why third-party wallets with hardware devices enhance security
🌐 The biggest third-party wallets like Metamask, Monero Wallet, Rabby, Solflare, TON Wallet, and Sui Wallet
My suggestion is to watch these videos so you know exactly what to do
Best topic
Crypto dad. Can Ledger write software to extract private keys from your device? I heard this was possible when previously I was told it could not physically happen. What’s the truth.
How good is ELLIPAL ?
What other cold wallets are best.
Damn you made so easy are you sure the private keys wont leak to third party wallets & hacked by pc malware?
These devices are designed to not leak the private keys. That’s their basic functionality. They have numerous counter measures against physical attacks and software attacks. So having a third-party wallet somehow requesting the private keys is a nonstarter. The device is designed to prevent that sort of software hack. The only real risk with using a third-party wallets is connecting to a malicious website that’s pretending to be a third-party wallet like MetaMask. There are a lot of fake MetaMask wallets floating around out there. And there are a lot of malicious websites where people go to claim airdrops or mint NFT’s. However, even when this happens, the device is working as designed. Malicious websites simply trick the user into authorizing a transaction on the device, but the device isn’t being hacked, the user is.
Pls make video on how to use the other chains which are not on Trezor app
You have to use metamask though
You might want to check out this Metamask video for Trezor: ua-cam.com/video/rBjT3553YUE/v-deo.html
Thanks guys
Can I please ask you to do a video about transfer of ERC20 tokens to Nano s plus device? Totally stumped here.
Say you have 5 different 3rd party wallets with your Ledger. You lost your laptop, and your ledger device. Now you bought a new Ledger device and put your seed phrase in, will you be able to access the funds 3rd party wallets then ?
Where do whales with 100+ millions worth of bitcoin keep their coins. Hard to believe they use a cheap consumer wallet.
They do .
I think you’re giving whales too much credit. Just because they have more crypto than you do, doesn’t make them hyper intelligent. I personally can’t understand why anyone would keep those types of amounts in a single wallet, but there they are sitting on the Blockchain. I mean, I’m sure companies have more sophisticated custody solutions to prevent one person from having full access such as multi sig wallets. But a lot of single crypto users use the same types of wallets that you and I do.