W3G/
๐Ÿ›กSecurity
๐Ÿ›กSECURITY
Medium8 min readMar 17, 2026

Hardware Wallets Deep Dive: What Ledger, Trezor, and Coldcard Actually Do Differently at the Chip Level

How Ledger, Trezor, and Coldcard differ in secure element design, firmware architecture, and trust model. Pick the right one by understanding what each actually protects against.

What you'll learn
โ†’Distinguish secure element vs general-purpose MCU trade-offs
โ†’Identify what open-source firmware actually lets you verify
โ†’Evaluate supply-chain attack surfaces per device
โ†’Choose based on threat model, not brand loyalty
01

The Gap Most Hardware Wallet Comparisons Skip

You already know a hardware wallet keeps your private keys offline. Most comparison guides stop at price, supported coins, and touchscreen vs. buttons. That's a feature matrix, not a security analysis.

The actual differences between Ledger, Trezor, and Coldcard sit at the chip architecture level โ€” specifically, whether the device uses a secure element (SE), how firmware updates are verified, and what an attacker with physical access to your device can extract. These three design decisions determine what each wallet actually protects you from and what it doesn't. Understanding them changes how you set up, back up, and even purchase your device.

02

Secure Elements vs. General-Purpose Microcontrollers

The core architectural split: Ledger and Coldcard use a secure element chip alongside (or instead of) a general-purpose microcontroller (MCU). Trezor uses only a general-purpose MCU โ€” an STM32F427 in the Model T, an STM32U5 in the Safe 3 (which added an Optiga Trust M SE for limited functions). This isn't a minor detail. It's the foundation of each device's threat model.

A secure element (like Ledger's ST33J2M0 or Coldcard's ATECC608A/Microchip DS28C36) is purpose-built to resist physical extraction. It stores secrets in tamper-resistant memory that self-destructs or locks under voltage glitching, decapping, or side-channel probing. A general-purpose MCU like the STM32 stores secrets in flash memory that, with the right equipment (~$200k fault injection rig, or sometimes much less), can be read. Kraken Security Labs demonstrated seed extraction from a Trezor One in roughly 15 minutes of physical access in 2020 using voltage glitching on the STM32F205.

Ledger's Nano S Plus and Nano X run their key operations inside the SE, with a separate STM32 MCU handling USB communication and display. Coldcard Mk4 uses two secure elements (a Microchip ATECC608B and a DS28C36) plus an MCU, with the seed split between the two SEs. Trezor's philosophy is that physical access attacks are outside their primary threat model โ€” they argue that a strong passphrase (the "25th word") makes extracted seeds useless.

โš  Common mistake: Assuming "secure element = fully secure." The SE protects key storage, but the MCU still controls the display and transaction parsing. If the MCU firmware is compromised, it can show you one transaction while signing another. Ledger mitigates this with cryptographic attestation between the SE and MCU, but this introduces a trust dependency on Ledger's attestation key.

Secure Element (Ledger, Coldcard)
General-Purpose MCU (Trezor)
โœ“Tamper-resistant key storage with physical attack countermeasures
โœ“Keys stored in standard flash memory
โœ“Resists voltage glitching and side-channel extraction
โœ“Vulnerable to physical extraction with ~$200K equipment
โœ“Chip internals are closed-source (vendor NDA)
โœ“Fully auditable open-source firmware and hardware
โœ“Coldcard Mk4 uses two SEs with seed splitting
โœ“Relies on BIP-39 passphrase as primary physical-attack defense
03

Firmware: Open Source vs. Closed Source and What That Actually Means

Trezor's firmware is fully open source โ€” both the application logic and the bootloader. You can build it from source and compare the binary hash to what ships on the device. Coldcard's firmware is also open source (published on GitHub), though it runs on a closed-source secure element whose internal operations you cannot audit. Ledger's BOLOS operating system, which runs inside the SE, is closed source. The companion MCU firmware and the SDK are partially open, but the core signing logic inside the SE is not publicly auditable.

The standard explanation says open-source firmware means you can verify what the device does. What's actually happening is more nuanced: even with Trezor's open firmware, almost no one builds from source and compares binaries. Reproducible builds are supported for Trezor but require matching the exact toolchain. Coldcard offers a checksum verification against published hashes, but you're trusting that the SE performs only the operations the open-source MCU firmware tells it to. With Ledger, you're trusting Ledger's internal security team and the Common Criteria EAL5+ certification of the SE chip โ€” a certification that evaluates the chip's resistance to physical attack, not the correctness of the application code running on it.

โš  Common mistake: Equating "open source" with "verified." Unless you or someone you trust has actually built the firmware and compared it to the device binary, open source is a trust-reduction mechanism, not a trust-elimination mechanism. Check Trezor's reproducible build instructions on their GitHub wiki to see what's involved.

04

Supply Chain Attacks: What Each Device Does Before It Reaches You

The moment a hardware wallet leaves the factory, it enters an adversarial environment. A tampered device that looks identical to a legitimate one could contain pre-generated seeds or modified firmware.

Ledger uses cryptographic attestation: on first boot, the SE proves to Ledger's server that it contains a genuine Ledger-provisioned key. If someone swaps the chip or reflashes firmware, attestation fails. This is strong against supply-chain swaps but creates a privacy trade-off โ€” Ledger's server knows your device exists and when it first connected. Coldcard Mk4 takes a different approach: the device has a clear plastic case so you can visually inspect the PCB, the secure bag has a unique serial number you verify against Coinkite's database, and the device generates its seed on-device with no server call. Trezor Safe 3 and Model T ship in tamper-evident packaging with holographic seals. On first boot, the bootloader verifies firmware signatures, but there's no device-to-server attestation. If someone replaced the entire board with a convincing replica running modified firmware that passes a fake signature check, the holographic seal is your main defense.

How to check this yourself: For Ledger, run the genuine check in Ledger Live โ€” it performs SE attestation. For Coldcard, verify the bag's serial at coldcard.com/bag. For Trezor, inspect seals and run the firmware verification through Trezor Suite, which checks firmware signatures against Trezor's public keys.

โš  Common mistake: Buying hardware wallets from Amazon third-party sellers or eBay. The supply-chain protections above are designed to catch tampering, but they're not infallible. Buy directly from the manufacturer. The $10 you save isn't worth the attack surface.

Hardware Wallet Receiving Checklist
โœ“
Purchased directly from manufacturer โ€” not Amazon third-party or eBay
โœ“
Tamper-evident packaging intact with matching serial numbers
โœ“
Device generates seed on-device โ€” never arrives with pre-filled seed words
โœ“
Run attestation or genuine check before first use (Ledger Live / Trezor Suite)
โœ“
For Coldcard: verify bag serial at coldcard.com/bag
โœ“
Update firmware to latest version before loading funds
05

Coin Support and Transaction Signing Architecture

Coldcard is Bitcoin-only. It signs PSBTs (Partially Signed Bitcoin Transactions) natively and supports multisig with output descriptors. If you use Bitcoin exclusively and want a device with minimal attack surface โ€” no Ethereum parser, no altcoin firmware, no Bluetooth stack โ€” Coldcard's reduced codebase is a concrete security advantage. Less code means fewer bugs.

Ledger supports over 5,500 assets through its app-based architecture: each blockchain gets a separate app that runs inside the SE's BOLOS environment. The Nano S Plus has 1.5 MB of storage for apps; the Nano X has 2 MB. Each app is sandboxed, so a vulnerability in the Solana app theoretically can't access your Ethereum keys. Trezor supports roughly 9,000+ assets, with signing logic handled in firmware rather than separate apps. Both Ledger and Trezor work with MetaMask for EVM chains and can sign transactions for DeFi interactions โ€” Coldcard cannot.

For DeFi users, the practical distinction is blind signing. When a hardware wallet can't parse a smart contract call (which is most complex DeFi transactions), it asks you to approve a raw data hash. You're trusting the companion software (MetaMask, Rabby) to show you the correct details. Ledger has pushed clear signing through its EIP-712 implementation and partnerships with protocols like Lido and Uniswap to display human-readable transaction data on the device screen. Trezor supports EIP-712 in newer firmware. This matters โ€” blind signing is exactly how the $600M+ Ronin bridge hack's stolen funds were moved through compromised signers.

โš  Common mistake: Thinking your hardware wallet verifies DeFi transactions for you. It verifies the signing key never leaves the device. Whether the transaction you're signing is the one you intended depends on the parsing capability and the companion software's honesty.

By the numbers
5,500+
Assets supported by Ledger
9,000+
Assets supported by Trezor
BTC only
Coldcard's single-chain scope
1.5 MB
Ledger Nano S Plus app storage
06

Passphrase, PIN, and Recovery: Where Mistakes Actually Happen

All three devices support BIP-39 passphrases (often called the 25th word), which effectively derive a completely separate wallet from the same seed. This is your best defense if seeds are physically extracted โ€” without the passphrase, the derived keys are different.

Coldcard lets you set a "brick me" PIN that wipes the device if entered, and a "duress" PIN that opens a decoy wallet. Ledger's PIN locks the device after three incorrect attempts, requiring seed recovery. Trezor wipes after 16 failed PIN attempts. Coldcard also supports Seed XOR โ€” splitting your 24-word seed into two or more parts that XOR together to produce the original, letting you store partial backups in separate locations without using Shamir's Secret Sharing.

Trezor Model T supports Shamir Backup (SLIP-39), which splits your seed into multiple shares with a configurable threshold (e.g., any 3 of 5 shares recover the wallet). This is genuinely superior to writing one seed phrase on steel and hoping your house doesn't burn down alongside your bank safe deposit box. Ledger does not natively support SLIP-39; it uses standard BIP-39 24-word recovery.

โš  Common mistake: Storing the passphrase with the seed. If both are in the same location, the passphrase adds zero security. Treat them as separate secrets in separate locations.

โš 
Test Recovery Before Storing Value
After setting up any hardware wallet, do a full recovery test with a small balance before depositing significant funds. Reset the device, re-enter your seed (and passphrase if set), and verify the same addresses appear. Discovering a backup error with $50 at stake is a lesson; discovering it with $50,000 is a catastrophe.
07

Choosing by Threat Model, Not Feature List

Stop comparing feature lists and start with your actual threat: remote attackers (malware, phishing), physical theft, sophisticated physical extraction (state-level or well-funded), or inheritance/recovery failure.

For remote-only threats (which covers 99% of actual crypto theft), all three devices are effective โ€” the key never touches your computer. For physical theft with moderate resources, Ledger and Coldcard's secure elements provide meaningful resistance that Trezor's MCU doesn't, unless a strong passphrase is set. For sophisticated extraction, Coldcard's dual-SE architecture is the most resistant design currently shipping. For inheritance, Trezor's Shamir backup gives you the most flexible recovery distribution.

How to check this yourself: Trezor publishes its threat model at trezor.io/learn. Coldcard documents its security architecture at coldcard.com/docs. Ledger's security white papers are at donjon.ledger.com. Read the first-party documentation โ€” it's more revealing than any comparison article, including this one.

08

Next Steps

  • Run a firmware verification on your current hardware wallet. If you own a Trezor, check the firmware hash in Trezor Suite under device settings. If you own a Ledger, run the genuine check in Ledger Live. Know what you're trusting.
  • Enable a BIP-39 passphrase if you haven't. Send a small test transaction to the passphrase-derived wallet first. Verify you can recover it. Store the passphrase separately from your seed.
  • Review your backup scheme. If you're using single-seed backup, explore Shamir (Trezor) or Seed XOR (Coldcard). For Ledger users, consider geographic distribution of identical backups on steel.
  • Read the Kraken Security Labs hardware wallet research (published on Kraken's blog) and Ledger Donjon's attack papers. Understanding what attacks look like in practice sharpens your threat model better than any buying guide.

Written by Web3Guides AI

More Security guides