Threat Models
Understand who might target your crypto and how. Threat analysis guides with real-world attack vectors mapped to hardware wallet defenses.
A threat model answers three questions: who might target your crypto, how would they do it, and which defenses actually stop them. Without this framework, security decisions become guesswork — you either over-spend on protection you don't need, or miss the one vulnerability that matters.
These guides cover documented, real-world attack vectors — not theoretical scenarios. From evil maid attacks on unattended devices to clipboard hijacking that silently replaces wallet addresses, each guide maps a specific threat to the hardware wallet features that defend against it.
Whether you hold $500 or $500,000, your threat model determines which wallet, backup strategy, and operational practices are right for you. Start with the cold storage threat model if you're a long-term holder, or explore DeFi security if you're an active trader. Once you understand the threats, move to our security setup guides for implementation.
Hardware Wallet Threat Matrix
Real-world attack vectors ranked by risk level. Click any row to read the full guide.
| Threat | Risk |
|---|---|
| Malicious Approvals / Rug Pull | critical |
| Clipboard Hijacking | high |
| Single Backup Compromise | high |
| On-Chain Surveillance | high |
| Single Point of Failure | high |
| Long-Term Key Degradation | medium |
| Border Seizure & Forced Unlock | medium |
| Evil Maid Attack | medium |
| $5 Wrench / Coercion | medium |
Start Here: Essential Threat Models Guides
New to threat models? Begin with these foundational guides
What Is a Crypto Threat Model? A Beginner's Guide to Wallet Security
A threat model helps you identify who might target your crypto, how they could attack, and which hardware wallet defenses actually matter for your situation.
Long-Term HODLing: Threat Model for Cold Storage
Buying and holding for years? The unique threats facing long-term holders and how to build a cold storage setup that lasts decades.
Clipboard Hijacking and Address Substitution Attacks
Malware replaces copied addresses with attacker wallets. How hardware wallet address verification is your last line of defense.
Hardware Wallet Security for Travelers and Border Crossings
Crossing borders with crypto? Learn how to protect your hardware wallet from seizure, forced unlock, and device inspection.
Wallets That Defend Against These Threats
Reading about threats is step one. Step two is choosing a wallet built to handle them.
We may earn a commission if you buy through our links. This never affects our ratings.
Browse All Threat Models Content
Explore 24 guides curated for threat models
What Is a Crypto Threat Model? A Beginner's Guide to Wallet Security
beginnerA threat model helps you identify who might target your crypto, how they could attack, and which hardware wallet defenses actually matter for your situation.
Long-Term HODLing: Threat Model for Cold Storage
beginnerBuying and holding for years? The unique threats facing long-term holders and how to build a cold storage setup that lasts decades.
Clipboard Hijacking and Address Substitution Attacks
intermediateMalware replaces copied addresses with attacker wallets. How hardware wallet address verification is your last line of defense.
Hardware Wallet Security for Travelers and Border Crossings
intermediateCrossing borders with crypto? Learn how to protect your hardware wallet from seizure, forced unlock, and device inspection.
Evil Maid Attack: Protecting Unattended Hardware Wallets
intermediateSomeone accesses your wallet while you are away. Hotel rooms, offices, shared spaces — how to detect and prevent physical tampering.
Day Trading with Hardware Wallets: Speed vs Security
advancedActive traders need fast transactions but also security. How to balance speed and safety with hardware wallets for frequent trading.
Showing 6 of 24 articles
Explore Other Topics
Complement your security knowledge with these related categories
Basics
Learn the fundamentals of crypto wallets and how they work.
Security
Learn how to protect your crypto assets and data.
Hardware Wallets
Learn about secure, offline storage for your crypto assets.
How We Work
Transparency is our foundation. Here's how we build our Threat Models recommendations.
Every Wallet Tested
We test every wallet we review — no pay-for-play listings.
Self-Custody Only
We only review self-custody wallets. Your keys, your crypto.
Documented Attack Vectors
Guides based on real, documented attack vectors — not hypotheticals.
Ratings Recalculated on Change
All ratings update when wallet specs change. See our open methodology.
Frequently Asked Questions
Common questions about Threat Models and hardware wallet security
What is a threat model in cryptocurrency?
What are the biggest threats to hardware wallet security?
How do I choose a hardware wallet based on my threat model?
Can a hardware wallet be compromised with physical access?
What is plausible deniability in crypto security?
Not sure which wallet fits your threat model?
Answer a few questions and get a personalized recommendation based on your security needs and budget.


