Restore Ledger Wallet with Recovery Phrase in 2024
Are you stuck with an “invalid recovery phrase” message while trying to restore your Ledger wallet? While this situation is nerve-wracking, it’s not …
Read ArticleWe are not advertising Ledger products here but they have become some sort of standard. Ledger hardware wallets not only allow you to store hundreds of different cryptocurrencies and tokens but also increase the security of your digital assets compared to a software wallet.
A hardware wallet is based on the concept that the private keys are solely stored in the wallet which is kept separate from any other device. Although you have to connect your hardware wallet to your PC, laptop or smartphone, it is this physical separation that provides a high level of security. If you want to sign a transaction and approve it you can only do so by pressing a button on the hardware wallet.
As a result, you can no longer easily fall victim to phishing or other attacks that an attacker can execute remotely. Of course, this only applies if you keep your seed particularly safe and never enter it on a device other than the Ledger.
Ledger devices are equipped with very modern and particularly secure chips. Most key components have a certification, which shows their quality in terms of security. This includes the so-called “secure element”, which protects critical data on the hardware wallet and prevents an attacker who has access to the device from easily extracting data.
Inside the device there is a strict separation of tasks and each chip is designed to either completely prevent certain attacks or ensure that it would take an extremely long time to tamper with the device and attempt to successfully gain access to it.
There are only very few attack vectors that promise any success at all. The successful hacking of a Ledger device cannot be completely ruled out but would not only require very specific knowledge but also the right equipment to even get a chance to try. The last factor coming into play is time as it would take plenty of it, i.e. brief access to the ledger would not be enough to successfully infiltrate the device.
The bottom line is that these devices provide optimal protection against remote attacks or an environment that has been compromised by viruses or other malware. Assuming that an attacker had unrestricted physical access to the device and the necessary equipment, experience and resources there might still be a risk, however.
Each seed created by the Ledger hardware wallet meets a high-security standard. This is ensured by using BIP39 to create a seed consisting of 24 words, which are randomly selected from a list of 2048 words. A specific chip is responsible for the random selection which ensures that the odds of reproducing the same combination are extremely low.
These 24 words allow access to all wallets created on the Ledger like Bitcoin and Ethereum for example. Please note that whoever holds the 24-word backup seed can gain immediate access to all digital assets stored in the wallet. While the Ledger is protected with a PIN that deletes the stored data after three incorrect entries, the seed remains without any further protection.
A useful option is to add a passphrase (also called 25th word) to the seed, which you can choose yourself. As a result, you can create a hidden wallet with its own PIN. As an example:
The advantage Alice gets in our example is that she can credibly deny having a second wallet at any time. An attacker cannot determine if she has added an optional passphrase or 25th word to the seed. There is even the option of not tying the hidden wallet to a PIN. This would in principle allow any number of additional wallets to be created, all based on the original seed and each unlocked with its own 25th word. Another advantage is the safekeeping of the seed. After all, an attacker could only try to guess the passphrase. If you create a passphrase with enough complexity an attacker won’t have a chance to guess it.
The term “25th word” is commonly used, but the term passphrase is more precise and fitting. When choosing this passphrase, it is best not to choose a single word.
Instead, a combination of uppercase and lowercase letters, numbers and special characters is recommended, just like for any good password. The input process is admittedly awkward because a ledger does not have a keyboard but only two buttons. However, the gain in security is enormous.
The following mistakes should absolutely be avoided:
Essentially, there are two ways to do it. The first one binds the passphrase to a PIN:
Please note that only one passphrase can be bound to the PIN at any time. It will remain bound to it until you overwrite it with a new passphrase. The passphrase itself always remains valid in combination with the seed, so your wallet can always be recovered even if the passphrase was overwritten, i.e. is no longer bound to the PIN.
The second option sets the passphrase only temporarily. Once you turn off the ledger, the wallets created with the passphrase are not automatically reloaded into the Ledger. This means that you have to enter the passphrase again each time you would like to access the hidden wallet:
At the end of the procedure, you will be connected to your secret wallet created with the passphrase. As soon as you turn off or disconnect the ledger, the passphrase will be deleted and you will have to log back into the primary account with your PIN. To regain access to a wallet created with a temporary passphrase, you have to repeat the procedure every time.
Are you stuck with an “invalid recovery phrase” message while trying to restore your Ledger wallet? While this situation is nerve-wracking, it’s not …
Read ArticleEven when crypto users have the complete seed for their Blockchain.com wallet, they sometimes receive an error message claiming their “Trading …
Read Article