The moment a hardware wallet leaves the factory, it enters an adversarial environment. A tampered device that looks identical to a legitimate one could contain pre-generated seeds or modified firmware.
Ledger uses cryptographic attestation: on first boot, the SE proves to Ledger's server that it contains a genuine Ledger-provisioned key. If someone swaps the chip or reflashes firmware, attestation fails. This is strong against supply-chain swaps but creates a privacy trade-off โ Ledger's server knows your device exists and when it first connected. Coldcard Mk4 takes a different approach: the device has a clear plastic case so you can visually inspect the PCB, the secure bag has a unique serial number you verify against Coinkite's database, and the device generates its seed on-device with no server call. Trezor Safe 3 and Model T ship in tamper-evident packaging with holographic seals. On first boot, the bootloader verifies firmware signatures, but there's no device-to-server attestation. If someone replaced the entire board with a convincing replica running modified firmware that passes a fake signature check, the holographic seal is your main defense.
How to check this yourself: For Ledger, run the genuine check in Ledger Live โ it performs SE attestation. For Coldcard, verify the bag's serial at coldcard.com/bag. For Trezor, inspect seals and run the firmware verification through Trezor Suite, which checks firmware signatures against Trezor's public keys.
โ Common mistake: Buying hardware wallets from Amazon third-party sellers or eBay. The supply-chain protections above are designed to catch tampering, but they're not infallible. Buy directly from the manufacturer. The $10 you save isn't worth the attack surface.