Skip to main content

Search...

Popular searches

Threat Models

Understand who might target your crypto and how. Threat analysis guides with real-world attack vectors mapped to hardware wallet defenses.

24 in-depth guides
Open rating formula

A threat model answers three questions: who might target your crypto, how would they do it, and which defenses actually stop them. Without this framework, security decisions become guesswork — you either over-spend on protection you don't need, or miss the one vulnerability that matters.

These guides cover documented, real-world attack vectors — not theoretical scenarios. From evil maid attacks on unattended devices to clipboard hijacking that silently replaces wallet addresses, each guide maps a specific threat to the hardware wallet features that defend against it.

Whether you hold $500 or $500,000, your threat model determines which wallet, backup strategy, and operational practices are right for you. Start with the cold storage threat model if you're a long-term holder, or explore DeFi security if you're an active trader. Once you understand the threats, move to our security setup guides for implementation.

Hardware Wallet Threat Matrix

Real-world attack vectors ranked by risk level. Click any row to read the full guide.

ThreatRisk
Malicious Approvals / Rug Pullcritical
Clipboard Hijackinghigh
Single Backup Compromisehigh
On-Chain Surveillancehigh
Single Point of Failurehigh
Long-Term Key Degradationmedium
Border Seizure & Forced Unlockmedium
Evil Maid Attackmedium
$5 Wrench / Coercionmedium

Wallets That Defend Against These Threats

Reading about threats is step one. Step two is choosing a wallet built to handle them.

We may earn a commission if you buy through our links. This never affects our ratings.

How We Work

Transparency is our foundation. Here's how we build our Threat Models recommendations.

Every Wallet Tested

We test every wallet we review — no pay-for-play listings.

Self-Custody Only

We only review self-custody wallets. Your keys, your crypto.

Documented Attack Vectors

Guides based on real, documented attack vectors — not hypotheticals.

Ratings Recalculated on Change

All ratings update when wallet specs change. See our open methodology.

Frequently Asked Questions

Common questions about Threat Models and hardware wallet security

What is a threat model in cryptocurrency?
A threat model is a structured framework for identifying who might target your crypto assets, what attack methods they could use, and which defenses are most effective. It helps you make rational security decisions — choosing wallet features and backup strategies based on your actual risk profile rather than fear or marketing.
What are the biggest threats to hardware wallet security?
The most common real-world threats include: phishing attacks that trick you into revealing your seed phrase, clipboard hijacking malware that replaces wallet addresses during transactions, supply chain attacks on tampered devices, evil maid attacks on unattended wallets, and physical coercion ($5 wrench attack). Each threat requires different defenses — no single solution covers everything.
How do I choose a hardware wallet based on my threat model?
Assess three factors: the value of your holdings, your technical skill level, and your physical environment. A casual holder storing $1,000 needs basic device security and a solid backup. A high-value holder with $100,000+ should consider multi-signature setups, passphrase wallets, and geographic distribution of backups. Match wallet features to the threats you actually face.
Can a hardware wallet be compromised with physical access?
Modern hardware wallets have multiple defenses: tamper-evident packaging detects supply chain attacks, secure elements resist chip-level extraction, PIN attempt limits prevent brute force, and passphrase wallets create hidden accounts that attackers cannot detect. No single feature is enough, but layered defense makes physical attacks impractical for most threat actors.
What is plausible deniability in crypto security?
Plausible deniability means being able to credibly deny owning additional crypto beyond what is visible. Hardware wallets achieve this through passphrase-protected hidden wallets: your default PIN opens a decoy wallet with a small balance, while a different passphrase unlocks your main holdings. If coerced, you can surrender the decoy. Trezor and some other wallets support this natively through BIP-39 passphrases.

Not sure which wallet fits your threat model?

Answer a few questions and get a personalized recommendation based on your security needs and budget.