Not long ago, another well know hardware wallet got hacked under test conditions, and it wasn’t the first one this year either. Among all these hacks on the famous hardware wallets, there is one thing in common. The similarity is that hackers must first have physical access to the device for a considerable amount of time. Therefore, it is within...
Continue reading