Comparison of Ledger Stax and Trezor Safe 5
Crypto Wallet Guides

Comparison of Ledger Stax and Trezor Safe 5


When choosing hardware wallets, many crypto users base their decisions on day-to-day asset management needs and perceived device security. However, savvy crypto users first consider a wallet's ability to handle long-term security scenarios. Long-term security includes expected essentials like backup and recovery tools, and also often-overlooked features related to secure and fault-proof third-party recovery. You can think of third-party recovery as your ability to allow crypto assets to be inherited by successors. Successful crypto users require a comprehensive security strategy for the full life cycle of crypto assets. This article will help you achieve that.

Let's jump into helping you understand the pros and cons of the Ledger Stax and Trezor Safe 5 hardware wallets for day-to-day activities, as well as their potential to safeguard the long-term security and longevity of your assets.



Overview

The Ledger Stax and Trezor Safe 5 both provide a wide variety of reliable security features and support a broad spectrum of cryptocurrencies, making them suitable for diverse crypto portfolios. However, several differences are clear:

Ledger Stax

  • Mobile-Centric Usability: Designed with mobility in mind, the Ledger Stax features wireless connectivity options like Bluetooth, making it highly compatible with mobile platforms.
  • Premium Design: Its unconventionally large display enhances readability, though it comes with slightly slower responsiveness.
  • Price Point: Positioned as a premium product, its cost reflects its advanced features and sleek design.

Trezor Safe 5

  • Open-Source Transparency: Built on an NDA-free framework (full disclosure), Trezor Safe 5 emphasizes trust through transparency, appealing to users who value open-source security.
  • Simplified Connectivity: Limited to USB connections, it offers reliable functionality for desktop and Android users only.
  • Affordable Access: At a much lower price point, it delivers solid security and usability without the premium cost.

In terms of crypto asset longevity features, such as backup, recovery, and crypto inheritance, both devices provide industry-standard and proprietary options with certain trade-offs, as well as compatibility with third-party solutions like Vault12 Guard for succession planning scenarios.

The decision between the two will likely hinge on individual preferences for the target platform (mobile or desktop), and should take into account the planned frequency of use.

Approach to comparison

When choosing the best hardware wallet for cryptocurrency security, you may wonder:

  • Which is better, the Ledger Stax or the Trezor Safe 5?
  • How easy to use are these wallets?
  • How do their security features compare?
  • Do these wallets have vulnerabilities, and have they been hacked?
  • What happens if your wallet is lost or stolen?
  • How do these wallets accomodate user errors, and complex scenarios like inheritance of crypto assets?

This article compares important characteristics for these two popular wallets. We’ll break down the strengths and weaknesses of each, focusing on security, ease of use, and backup and recovery methods.

By the end of this comparison, you’ll clearly understand which wallet is right for you, as well as how to recover your crypto assets in case of accidents.

What happens if your wallet is lost or stolen?

Wise wallet owners recognize the critical importance of crypto recovery before they find themselves in an unexpected bind! That's why it's important to understand the fundamental topic of crypto asset longevity, including features such as backup, recovery, and inheritance for crypto assets. These considerations are central to long-term planning.

Technical security is paramount, but in the world of crypto, the degree to which backup and recovery solutions are foolproof for users is at least equally important. Here are the backup and recovery options for these two wallets:

Ledger Stax

Trezor Safe 5

Backup & Recovery methods

Recommends Recovery Seed Phrase be written on paper, or engraved onto metallic plates.

Recommends Recovery Seed Phrase be written on paper, or engraved onto metallic plates.

Optional paid subscription

Ledger Recover, a centralized 3rd-party cloud service, highly criticized by the crypto community. Clouds are not safe — especially when operated by multiple 3rd parties.

No.

How do these wallets handle Crypto Inheritance?

Crypto Inheritance Features

Currently, most hardware wallets, including the Ledger Stax and Trezor Safe 5, lack any features for establishing and managing crypto inheritance. This gap presents a challenge for users who want to be sure that their crypto assets can be transferred to their heirs.

Ledger Stax

Trezor Safe 5

Backup

- Written only
- Optional 3rd party KYC-based cloud

- Written only

- Manual sharing of shards

Inheritance

No

No

Decentralized backup with Vault12

Yes

Yes

Inheritance Management with Vault12

Yes

Yes

Backup and recovery differentiators

Ledger Stax Recovery Disadvantages:

  • The optional Ledger Recover backup service is a paid service provided by three corporations that each hold parts of the user’s seed phrase in a Cloud. This introduces risks, as the seed phrase could potentially be accessed via subpoena; or business partners could terminate agreements or become involved in lawsuits that result in locked data or resources (like, for example, Gemini and Genesis). These scenarios contain multiple potential points of failure, and should be taken into account.
  • Very important detail: The terms of the optional Ledger Recover service do not mention support for inheritance, meaning any unfortunate accident related to the user will make crypto assets unrecoverable for his or her successors. Ledger itself suggests using 3rd-party crypto inheritance services for those purposes.

Ledger Stax Recovery Advantages:

  • People have different preferences. If a user is comfortable trusting a bank with their assets, they may also feel confident using Ledger Recover for securing their seed phrase backup (even though Ledger is not providing the entire Cloud backup solution).

Trezor Safe 5 Recovery Disadvantages:

  • Trezor has a Multishare backup service, but it is fully manual, and challenging to maintain. The user is responsible for generating, distributing, and keeping track of the encrypted shards.

Trezor Safe 5 Recovery Advantages:

  • Trezor offers the Multishare backup option for those who are able and willing to set it up.

How easy are these crypto wallets to use?

Image of user holding a mobile phone and using Ledger Stax as FIDO U2F security key

User holding a mobile phone and using Ledger Stax as FIDO U2F security key

Let's compare the key aspects of both wallets side by side, and then summarize what really stands out for user convenience:

Ledger Stax

Trezor Safe 5

Display

3,7” black and white E Ink,
672 x 400 pixels

1.54" Color LCD,
240 x 240 pixels

Input interface

Touchscreen

Touchscreen, Haptic feedback

Cable

USB-C

USB, MicroSD card slot

Wireless

Bluetooth 5.2

No

Companion Apps

macOS, Windows, Linux, Android, iOS

macOS, Windows, Linux, Android
iOS (View-only)

3rd party wallets and dapps support

50+

9+

Password manager & 2FA

FIDO2 2FA & Passkeys,
Password Manager

FIDO2 2FA

Product size & weight

85 x 54 x 6 mm / 45g

66 x 40 x 8 mm / 23g

Convenience features

Battery (Up to 10 hours in use)

Magnetic dock

Number of supported coins

5,500+

1,600+

Price

$399

$165

 

Image of Trezor Safe 5 wallet and desktop software

Trezor Safe 5 wallet and desktop software

Crypto wallet user experience differences

Ledger Stax UX Disadvantages:

  • The display has a noticeable response delay due to the "E Ink" touchscreen technology, and could be irritating.
  • Not all apps are ported to Stax yet. Even the native Passwords app still has no release date identified as of this article's publish date, so check in advance whether your favorite network/coin is supported.
  • Extremely expensive. The value in Stax is more about design, rather than practical aspects.

Ledger Stax UX Advantages:

  • Huge informative display and "Clear Signing" allows you to review and confirm all transaction details directly on Ledger Stax and in a human-readable language before they are signed and sent. This enhances security and ensures that you see exactly what you are approving in a secure and tamper-proof manner.
  • Offers Bluetooth connectivity — works with or without a cable, at least with smartphones.
  • Wide support for third-party wallets and dapps, allowing the Ledger Stax to sign transactions directly in MetaMask, Uniswap, and other platforms without relying on Ledger Live software. This is a huge advantage for DeFi users.

Trezor Safe 5 UX Disadvantages:

  • No wireless connectivity: you always have to use a cable.
  • iOS integration is view-only: you can watch your balance, but can't send transactions from iOS apps.

Trezor Safe 5 UX Advantages:

  • The display is easy to read and convenient to use on a regular basis.
  • The touchscreen and input are very well-thought-out experiences on Trezor Safe 5 — you can use them without any discomfort.

How do these wallets' security features compare?

Now, we dive deeper into the core specification of every hardware wallet: security features.

Ledger StaxTrezor Safe 5
PIN-code 4 - 8 digits up to 50 digits
BIP39 Passphrase Yes Yes
Open-source Partial Full
Secure Element Yes Yes, and it's NDA-free
Multisignature Yes Yes

Crypto wallet security feature differentiators

Image of Trezor Safe 5 with a void sticker on it - security seal of genuineness

Trezor Safe 5 with a void sticker on it - security seal of genuineness

Ledger Stax Security Disadvantages:

  • Critical components like the Secure Element and its operating system are closed-source. This raises concerns, especially after the controversial introduction of the Ledger Recover backup service, which challenged the previous assumption that the Secure Element could never transmit the recovery seed phrase outside the hardware wallet.

Ledger Stax Security Advantages:

  • Includes a Secure Element, giving Ledger devices a strong reputation for withstanding physical attacks. This is important for users who prefer not to complicate their security with BIP39 passphrases, instead prioritizing ease of use.
  • Clear Signing is also a security feature.

Trezor Safe 5 Security Disadvantages:

  • Trezor does not fully rely on open-source software and hardware, but mitigates this limitation architecturally, so that the seed phrase is not touched by any closed-source software on the device.

Trezor Safe 5 Security Advantages:

  • Along with this new flagship product, Trezor introduces Secure Element chips, raising the security bar. More importantly, its Secure Elements are "NDA-free," which is good: the chips are not bound by Non-Disclosure Agreements (NDAs) that could restrict Trezor from publicly discussing any security flaws.
  • The Secure Element is responsible for verifying device authenticity via secure boot protection, and for storing a part of the secret that is used to decrypt the recovery seed (but it never actually knows what your recovery seed is).
  • Allows for longer PIN codes, which might appeal to particularly cautious users.

Have there been vulnerabilities or hacks of these wallets?

Given that both of these products under review are very new, we will examine their manufacturers' histories of hacks. There have been vulnerabilities and hacks associated with both the Ledger and Trezor products.

While relatively secure, most crypto wallets — even hardware wallets — can not provide perfect security, and are routinely subject to malware, supply chain, and firmware vulnerabilities. Here are some recent notable incidents:

Ledger Vulnerabilities:

  1. The Connect Kit Attack (2023): The Connect Kit breach was discovered by the security teams of Ledger.
  2. Ledger User Data Breach (2020): A major data breach exposed the personal information of thousands of customers, leading to phishing attacks.
  3. Another User Data Breach (2021): Ledger announced on Twitter that it has been targeted by rogue Shopify team members who exported over 200 merchants’ customer databases.
  4. Ledger Live (2020): Users were exposed to basic double spending attacks, amplified double spending attacks, and DoS attacks without user consent.
  5. Potential Supply Chain Attack Vulnerability (2020): Kraken Security Labs Identifies Supply Chain Attacks Against Ledger Wallets.

Trezor Vulnerabilities:

  1. Ability to Physically Hack Trezor T Wallet (2023): Crypto Security Firm Unciphered Claims Ability to Physically Hack Trezor T Wallet
  2. Five Reported Vulnerabilities in Two Models of Trezor Hardware Wallets (2019): Ledger’s Attack Lab has found five vulnerabilities in hardware wallets of its direct competitor Trezor.
  3. Kraken Identifies Critical Flaw in Trezor Hardware Wallets (2020): Kraken Security Labs has devised a way to extract seeds from both cryptocurrency hardware wallets offered from industry leader Trezor, the Trezor One and Trezor Model T.
No software is perfect, and no wallet is ideal. However, some designs have been compromised more than others.

Summary of Ledger Stax and Trezor Safe 5 Comparison

The Ledger Stax and Trezor Safe 5 both provide a respectable set of security measures, and support a broad spectrum of cryptocurrencies, making them suitable for diverse crypto portfolios.

The Ledger Stax is more mobile-friendly, and offers a balance of security and convenience features at a very premium price. It offers an unconventionally-large display with delayed response, with the advantage of wireless connectivity options like Bluetooth.

On the other hand, the Trezor Safe 5, at a much lower price, boasts a more open-source and NDA-free framework, a reasonably-sized display with colors, and a touchscreen interface for enhanced user interaction. However, it has fewer convenience features: it works only with USB connections, and is missing iOS integration.

The decision between the two will likely hinge on individual preferences for the target platform (mobile or desktop), and should take into account the planned frequency of use.

Whichever you choose, remember to add crypto inheritance to your choice of wallet to ensure the long-term safety of your digital assets. Both the Ledger Stax and Trezor Safe 5 are compatible with Vault12 Guard Inheritance planning.


Vault12 Guard: a decentralized solution for Crypto Inheritance

Vault12 is the pioneer in Crypto Inheritance Management, and delivers an easy-to-use and securemethod for assigning a legacy contact to your crypto wallets. This enables you to pass on your wallet seed phrases and private keys for all types of digital assets to future generations. Vault12 Guard is designed for everyday people, yet strong enough for Crypto OGs.

Vault12 Guard has a uniquely-secure design. Utilizing advanced encryption and decentralized storage, it ensures that crypto assets are not only safe but also transferable under predefined conditions, filling a critical need unmet by most traditional hardware wallets. Vault12 Guard applies a hybrid approach of software fused with the hardware-based Secure Element of phone devices (The Secure Enclave for iOS devices, and Strongbox for Google devices). Vault12 Guard's decentralized design minimizes possible points of failure. Nothing is stored on Cloud servers or Vault12 servers, and no assets are stored on local devices, making them less of a target.

From a user perspective, the Vault12 Guard app asks users to appoint one or more people (or mobile devices) as Guardians. The designated Guardians are entrusted to protect the user's comprehensive collection of wallet seed phrases and private keys, which are safely stored within a decentralized digital Vault. Its simple, user-friendly workflow removes the necessity for regularly revising wallet inventories or modifying instructions for your lawyers — a process that otherwise could lead to privacy breaches.

Both the Ledger Stax and Trezor Safe 5 are compatible with Vault12 Guard Inheritance. This addresses the seed phrase backup dilemma for any hardware wallet. It also makes less-secure backup methods, such as paper or steel plates, unnecessary.

https://www.linkedin.com/company/vault12
https://twitter.com/_vault12_
Discover More
avatar-icon

Vault12

Vault12 is the pioneer in crypto inheritance and backup. The company was founded in 2015 to provide a way to enable everyday crypto customers to add a legacy contact to their cry[to wallets. The Vault12 Guard solution is blockchain-independent, runs on any mobile device with biometric security, and is available in Apple and Google app stores.

star-background

Backup and Inheritance for Bitcoin

vault12-guard
Get the Vault12 app onto your phone
QR code Vault12 Crypto/NFT InheritanceDownload Vault12 on App StoreDownload Vault12 on Google Play
Vault12 app mockup
Scroll down
Close

Vault12 Product Demo

Get The Vault12 App Onto Your Phone

Download Vault12 on App StoreDownload Vault12 on Google Play
You will lose your Bitcoin and other crypto when you die...

You will lose your Bitcoin and other crypto when you die...

...unless you set up Crypto Inheritance Management today.

It's simple — if you don't worry about crypto inheritance, nobody else will — not your software or hardware wallet vendors, not your exchanges, and not your wealth managers. So it's up to you to think about how to protect the generational wealth you have created, and reduce the risks around passing that wealth on to your family and heirs. What are the challenges with crypto inheritance?

  • Crypto Wallets are difficult to use and do not offer crypto inheritance management. In fact, most of them tell you to write down your seed phrase on a piece of paper, which is practically useless.
  • Some people back up their wallet seed phrases or private keys on paper, local devices like hardware wallets or USBs, or in the cloud. All of these options have severe drawbacks that range from hacking to accidental loss to disrupted cloud services.
  • Software wallets operate onspecific blockchains, yet your crypto assets span multiple blockchains. For inheritance to work, you must be able to manage inheritance across every blockchain — now and forever.
Vault12 is the pioneer in crypto inheritance management. Watch our explainer video above, or our inheritance demo today.
Screenshot of Vault12 Guard apps - Add an Asset screen

Crypto Inheritance Management: Get ready today

Vault12 is the pioneer in Crypto Inheritance Management, and offers an easy-to-use and secure method for assigning a legacy contact to your crypto wallets. Vault12 Guard enables you to pass on your wallet seed phrases and private keys for any cryptos including Bitcoin (BTC) and Ethereum (ETH) to future generations. It's designed for everyday people, yet strong enough for Crypto OGs.

This innovative, decentralized system uses a hybrid approach of software fused with the Secure Element of phone devices (the Secure Enclave for iOS devices, and Strongbox for Google devices).

Vault12 Guard enables users to appoint one or more people or mobile devices as Guardians. The designated Guardians are entrusted to collectively protect the user's comprehensive collection of wallet seed phrases and private keys, which are safely stored within a decentralized digital Vault. Nothing is stored on cloud servers or Vault12 servers, and no assets are stored on local devices, making them less of a target.

The decentralized approach reduces points of failure and removes the necessity for regularly revising wallet inventories or modifying instructions for your lawyers (which could lead to privacy breaches). Simply put, Vault12 Guard is the best way to preserve crypto generational wealth.

Screenshot of Vault12 Guard app - Adding data into the Vault

Take the first step and back up your crypto wallets.

Designed to be used alongside traditional hardware and software crypto wallets, Vault12 Guard helps cryptocurrency owners back up their wallet seed phrases and private keys (assets) without storing anything in the cloud or any single location. This increases protection and decreases the risks of loss. Making sure you have an up to date back up is the first step in crypto inheritance management.

The Vault12 Guard app enables secure decentralized backups and provides inheritance for all your seed phrases and private keys across any blockchain, including Bitcoin, Ethereum, ERC-20, and other crypto wallets.

Note: For anyone unfamiliar with cryptocurrencies, Vault12 refers to wallet seed phrases and private keys as assets, crypto assets, and digital assets. The Vault12 Guard app includes a software wallet that works alongside your digital Vault. The primary purpose of this is to guard your Bitcoin (BTC) or Ethereum (ETH) wallet seed phrases, private keys, and other essential data, now and for future generations.