The Truth About Third Party Wallets: Secure Your Crypto with Ledger & Trezor Devices

Поділитися
Вставка
  • Опубліковано 31 жов 2024

КОМЕНТАРІ • 28

  • @CryptoDad
    @CryptoDad  8 днів тому +1

    💡 Third-Party Wallets + Hardware Devices = Maximum Security! 💡
    Still using only Ledger Live or Trezor Suite? It’s time to explore the world of third-party wallets! Originally, these hardware devices didn’t have their own native apps-they were made to work seamlessly with other wallets. 🎯
    I break down: 🔍 Why you may not see your balances in Ledger Live or Trezor Suite
    🔐 Why third-party wallets with hardware devices enhance security
    🌐 The biggest third-party wallets like Metamask, Monero Wallet, Rabby, Solflare, TON Wallet, and Sui Wallet

  • @ampovpodcast1624
    @ampovpodcast1624 8 днів тому +2

    My suggestion is to watch these videos so you know exactly what to do

  • @shaiksajid4739
    @shaiksajid4739 8 днів тому +2

    Best topic

  • @willpower6720
    @willpower6720 6 днів тому

    Crypto dad. Can Ledger write software to extract private keys from your device? I heard this was possible when previously I was told it could not physically happen. What’s the truth.
    How good is ELLIPAL ?
    What other cold wallets are best.

  • @Silencemanhere
    @Silencemanhere 7 днів тому +1

    Damn you made so easy are you sure the private keys wont leak to third party wallets & hacked by pc malware?

    • @CryptoDad
      @CryptoDad  6 днів тому

      These devices are designed to not leak the private keys. That’s their basic functionality. They have numerous counter measures against physical attacks and software attacks. So having a third-party wallet somehow requesting the private keys is a nonstarter. The device is designed to prevent that sort of software hack. The only real risk with using a third-party wallets is connecting to a malicious website that’s pretending to be a third-party wallet like MetaMask. There are a lot of fake MetaMask wallets floating around out there. And there are a lot of malicious websites where people go to claim airdrops or mint NFT’s. However, even when this happens, the device is working as designed. Malicious websites simply trick the user into authorizing a transaction on the device, but the device isn’t being hacked, the user is.

  • @rh4958
    @rh4958 8 днів тому

    Pls make video on how to use the other chains which are not on Trezor app

    • @nobitaadidas
      @nobitaadidas 8 днів тому +1

      You have to use metamask though

    • @CryptoDad
      @CryptoDad  8 днів тому +1

      You might want to check out this Metamask video for Trezor: ua-cam.com/video/rBjT3553YUE/v-deo.html

    • @rh4958
      @rh4958 4 дні тому

      Thanks guys

  • @divineashler
    @divineashler 8 днів тому

    Can I please ask you to do a video about transfer of ERC20 tokens to Nano s plus device? Totally stumped here.

  • @colinpowda
    @colinpowda 5 днів тому

    Say you have 5 different 3rd party wallets with your Ledger. You lost your laptop, and your ledger device. Now you bought a new Ledger device and put your seed phrase in, will you be able to access the funds 3rd party wallets then ?

  • @RA-gk5zg
    @RA-gk5zg 8 днів тому

    Where do whales with 100+ millions worth of bitcoin keep their coins. Hard to believe they use a cheap consumer wallet.

    • @HtPt
      @HtPt 8 днів тому

      They do .

    • @CryptoDad
      @CryptoDad  7 днів тому +1

      I think you’re giving whales too much credit. Just because they have more crypto than you do, doesn’t make them hyper intelligent. I personally can’t understand why anyone would keep those types of amounts in a single wallet, but there they are sitting on the Blockchain. I mean, I’m sure companies have more sophisticated custody solutions to prevent one person from having full access such as multi sig wallets. But a lot of single crypto users use the same types of wallets that you and I do.