Introducing Vault12 Guard.
Protecting the future of Crypto assets. Vault12 Guard revolutionizes and simplifies inheritance for all Digital Assets, and brings an easy onboarding experience for a broader set of people.
Summary
Introducing the newly-revamped Vault12 Guard app, Version 2.0, designed for everyday users and offering native support for NFTs, digital art, and Web3 wallets. The updated app provides a simplified onboarding experience, making it easier for users to create a Vault and add assets. With the option to assign Guardians for fully decentralized backup and inheritance, the app now supports subscriptions via both Apple iOS App Store and Google Play App Store.
Vault12 Guard offers a consistent user experience with enhanced features, such as support for Web3 wallets, NFTs, and digital art. The app also allows creators to secure multiple Web3 wallets and original media files without capturing personal information about subscribers and Guardians.
Existing Vault12 customers can easily update their app when it becomes available, with the app icon transitioning to a new design. The app's functionality remains unchanged, with Guardians still essential for a fully decentralized backup and inheritance.
What is Vault12 Guard?
Today, we're excited to release Vault12 Guard, Version 2.0, which offers an entirely revamped user experience catering to a broader audience. With this update, we're rebranding the app to "Vault12 Guard" to emphasize its core function—safeguarding your vital Web3 assets and ensuring their inheritance for future generations.
New Experiences
Our team has been diligently working to enhance the Vault12 app, making it more accessible for everyday users and not just security experts.
We've also expanded its capabilities to encompass NFTs and artwork alongside cryptocurrencies. Some of these improvements were implemented in "hybrid" updates last year, such as the immediate backup of seed phrases without needing Guardians, which significantly streamlined the onboarding process.
Furthermore, we introduced support for subscriptions through Google's Play Store earlier this year, aligning it with the Apple iOS App Store.
What are the new features in Vault12 Guard
- Simple and easy onboarding. Create a Vault, add assets, and you are done protecting the assets at hand.
- For fully decentralized backup and inheritance, you can assign Guardians at your convenience.
- Vault subscriptions can now be done via Apple iOS App Store and Google Play App Store.
- New consistent user experience as you use the app to learn more and activate capabilities.
- Supports Web3 wallets, NFTs - including multiple media files, and digital art.
- Create security for creator projects where there are multiple Web3 wallets - including royalty wallets and multiple original media files that need protecting.
- Eliminated the need to capture personal information about Vault subscribers and Guardians.
What does this mean for existing Vault12 customers?
When Vault12 Guard becomes available in app stores, you can effortlessly update your app. The app icon will transition to a new design, but apart from the interface changes, your Vault will continue functioning as before. No need to do anything else.
Why the name change?
#Fallout #Fallout25 @BethesdaStudios @Bethesda @Fallout @Kilter_Films
Amazon Prime Video
We believe that a name reflecting the app's primary purpose makes it more memorable and easily recognizable for potential users.
Additionally, with a new Fallout TV Show releasing this year, we wanted to distinguish our app from unrelated search results for "Vault12.”
How do I update the Vault12 app?
Simply update the app when it becomes available, and you'll see the new name and icon on your device. We recommend contacting your Guardians and encouraging them to update their app as well.
If Guardians are now optional, how does inheritance work?
Guardians are not optional if you want an entirely distributed, decentralized backup or want to configure Inheritance. All that has changed is you don't have to assign Guardians the moment you create a new Vault; you can safely add assets that are protected by your device's biometric security.
Fully distributed, decentralized backups are enabled by assigning Guardians, as before. This way, if you lose your phone, the entire Vault can be recreated on your new phone.
Crypto Inheritance: Roundup - February 2025
Vault12’s monthly update on regs, the industry, and crypto inheritance management.
- Regs Update
- Vault12 Guard Product Updates
- Industry Updates
- New to Inheritance? Start here.
Regs Update
The SEC Crypto Task Force has spoken. In a posted statement, Commissioner Hester Peirce revealed her priorities for the immediate upcoming Task Force work.
Our analysis here focuses on how this work affects Vault12.
The first thing to note is that no regulations or laws have changed (other than rescinding the controversial SEC Bulletin SAB 121, which now enables Banks to conduct crypto custody). Until SEC policies actually change, or new bills are written and submitted to Congress, or pending lawsuits are finalised, everything that happens is simply directional, with no mandates. Therefore, companies must be careful to avoid straying into grey territory and potentially creating legal jeopardy - especially this close to the finishing line.
Let’s look at the top three key items:
- Security Status: This is a fundamental item of policy that needs clarification, and everything else will hang off the definitions used here. Are crypto tokens issued by software developers utilities, or are they securities?
- Coin and Token Offerings. What happens if, out of an abundance of caution (and lack of clarity), a token was issued as a security but in fact is used as a utility token? This was the subject of Commissioner Peirce’s “Safe Harbour 2.0” initiative under the previous administration.
- Special Purpose Broker Dealer: Under the last administration, the definition of “broker-dealer” was expanded, leading to a fundamental conflict with crypto trading platforms: centralised exchanges, decentralized exchanges (DEXs), smart contracts, etc. This expanded definition is misguided and unworkable, and currently the subject of active legal proceedings. These lawsuits needs to be settled so that the industry can get on with innovating and releasing financial products.
Once these items are sorted out, crypto companies will be free to conduct their business and have their tokens freely trading.
With the 2024 election behind us, this year is pivotal for #crypto policy and innovation. That's why I'm excited to take the stage at DC Blockchain Summit 2025 on March 26! Join top regulators, policymakers, and industry leaders as we discuss what's next for blockchain and digital assets in this new era.
Don't miss your chance to be part of the conversation driving a better tomorrow! https://bit.ly/DCB25 Discount Code:VAULT1220
Vault12 Guard Product Updates
We are excited to announce that Release 2.6.0 is coming soon:
- Now on Mac and iPad – Full official support through the App Store.
- Drag and drop on Mac – Instantly add assets to your Vault with a simple gesture.
- Smoother navigation – A refreshed Dashboard with a smarter layout helps you find what you need faster.
- Expanded search for more crypto wallets – Now compatible with 20+ more wallets.
- Enhanced Address Explorer – Now supports all major Bitcoin address formats, such as Segwit and Taproot.
- Performance improvements – Faster, smoother, and more reliable than ever.
Industry Updates
Earlier this month, we saw the Presidents’s Crypto and AI Czar, David Sacks, hold the first Crypto Press conference. In attendance were industry leaders and politicians — most of whom were affiliated with the CFTC through their committee assignments.
This has sparked rumours that any cryptocurrency not deemed a security will fall under the jurisdiction of the CFTC — a marked change. This is a simply a rumour at this stage.
The highlights of the conference were:
- Keeping crypto innovation onshore to ensure crypto innovation in financial technology keeps the US ahead.
- Formation of a bipartisan and bicameral working group to drive new legislation across SEC and CFTC.
- The role of stablecoins ensuring dominance of the US dollar, including a new bill with well-defined regulations bringing much-needed clarity to industry participants.
New to Crypto Inheritance? Start here
Have you been tracking a 2025 New Years resolution to get more organized with your digital life? If yes, then you are probably using a password manager to keep track of your passwords.
But hopefully you're not storing your digital wallet seed phrase in your password manager! And where are you storing the password to your password manager? It might be time for you to consider using a Digital Vault.
Are you growing more concerned about your online privacy? Is it possible for you to keep track of which third parties are giving others access to your data ... including data stored in encrypted Clouds? A new UK push for access to Apple iCloud data is leading even more people to think about how to protect their online privacy.
Crypto Inheritance: Industry Roundup - January 2025
Vault12’s monthly update on regs, the industry, and crypto inheritance management.
- Regs Update
- Vault12 Guard Product Updates
- Industry Updates
- New to Inheritance? Start here.
Regs Update
Following the inauguration of United States President Trump, we eagerly await new clarity on the state of crypto innovation in the US. Acting chairs are in place at both the Securities and Exchange Commission (SEC) (Mark Uyeda) and the Commodity Futures Trading Commission (CFTC) (Caroline Pham) whilst the nominee process is completed. Just yesterday, the SEC announced that a new Crypto Taskforce has been created, headed up by the extremely experienced Commissioner Hester Peirce.
We at Vault12 are excited, as we have met all of these commissioners at meetings set up by The Digital Chamber of Commerce. We’ll have more on this soon.
Thanks for reading Vault12 Crypto Inheritance Newsletter! Subscribe for free to receive new posts and support our work.
EU
After much preparation, a new European Union crypto regulatory framework — MiCA — went into effect at the end of December 2024. MiCA regulations offer more clarity for crypto-asset service providers and related firms operating in Europe. Unfortunately, this additional red tape is being applied just when the US market for crypto is finally opening up. This suggests that few US companies will be willing to invest the time, attention, or money to comply with the new rules and take advantage of the developing European crypto market. It will be interesting to see how MiCA evolves in response to US Market momentum during 2025. Vault12 will be keeping an eye on this.
UK
Meanwhile, the UK’s Financial Conduct Authority (FCA) regulatory body has published a new discussion paper as part of its crypto regulation roadmap. So far, like MiCA, it contains more reinvention of the wheel, bringing little to no efficiencies and simply more stifling burdens placed on fledgling companies. Vault12 is part of a group of industry experts commenting on the FCA’s proposal via CryptoUK, and will be providing constructive feedback.
With continuing regulator-sanctioned debanking of crypto companies, combined with enormous paperwork and time burdens, it is virtually impossible for a US startup company to continue operations in the UK at this time. These regulations coming just as the US takes crypto by the horns suggests that again, companies will give the UK a wide berth until it responds with efficient regulations that make sense for entrepreneurs and supports innovation in this this space. What is particularly sad is that this regulatory stance is at odds with not only the previous UK government but also the government of the day. British people deserve better.
Vault12 Guard Product Updates
In November and December, Vault12 issued three releases containing improvements to the Vault12 Guard product. You can read about them on our website Releases page. Particularly exciting is a new voice-based capability that adds another layer of security to your communication with your chosen crypto asset Guardians.
[Learn More]
Industry News
Last month saw a LOT of roundups and predictions for 2025 — but the biggest news is that the US Crypto industry is now enthusiastically “open for business” as of January 20, 2025.
In other news from 2024, after a massive delay, we finally saw the new Ledger Stax wallet delivered to customers, and we have been busy putting it through its paces in a series of comparison articles. The “net-net” of our evaluation highlights the fact that just because you have a hardware wallet doesn't mean your assets are backed up and set up for inheritance to future generations. You will need to handle that separately (and thankfully, Vault12 is here to help you with that).
Crypto Inheritance
Are you unsure about how a crypto inheritance plan is different from a regular estate plan? We offer a quick overview: https://vault12.com/blog/crypto-inheritance-planning/. For extra motivation, also consider What happens to your crypto when you die? Even though that day may be far off, it’s better to be prepared sooner rather than later.
See you next month.
Thanks for reading Vault12 Crypto Inheritance Newsletter! Subscribe for free to receive new posts and support our work.
Ledger Stax and Trezor Model T: two strong wallets compared
The right wallet for you depends on your usage patterns and design preferences
When choosing hardware wallets, many crypto users base their decisions on day-to-day asset management needs and perceived device security. However, savvy crypto users first consider a wallet's ability to handle long-term security scenarios. Long-term security includes expected essentials like backup and recovery tools, and also often-overlooked features related to secure and fault-proof third-party recovery. You can think of third-party recovery as your ability to allow crypto assets to be inherited by successors. Successful crypto users require a comprehensive security strategy for the full life cycle of crypto assets. This article will help you achieve that.
Let's jump into helping you understand the pros and cons of the Ledger Stax and Trezor Model T for day-to-day activities, as well as their potential to safeguard the long-term security and longevity of your assets.
Overview
The Ledger Stax and Trezor Model T both provide a wide variety of reliable security features and support a broad spectrum of cryptocurrencies, making them suitable for diverse crypto portfolios. However, several differences are clear:
Ledger Stax
- Mobile-Centric Usability: Designed with mobility in mind, the
- Ledger Stax features wireless connectivity options like Bluetooth and
- NFC, making it highly compatible with mobile platforms.
- Premium Design: Its unconventionally large display enhances readability, though it comes with slower responsiveness included.
- Price Point: Positioned as a premium product, its cost reflects its advanced features and sleek design
- Mobile-Centric Usability: No Bluetooth connectivity. iOS app is view-only.
- General Usability: Smaller set of wallets, coins, and apps.
- Design: The touchscreen and input are very well-thought-out experiences.
- Price Point: More affordable.
In terms of crypto asset longevity features, such as backup, recovery, and crypto inheritance, both devices provide industry-standard and proprietary options with certain trade-offs, as well as compatibility with third-party solutions like Vault12 Guard for succession planning scenarios.
The decision between the two will likely hinge on individual preferences for the target platform (mobile or desktop), and should take into account the planned frequency of use.
Approach to comparison
When choosing the best hardware wallet for cryptocurrency security, you may wonder:
- Which is better, the Ledger Stax or the Trezor Model T?
- How easy to use are these wallets?
- How do their security features compare?
- Do these wallets have vulnerabilities, and have they been hacked?
- What happens if your wallet is lost or stolen?
- How do these wallets accomodate user errors, and complex scenarios like inheritance of crypto assets?
This article compares important characteristics for these two popular wallets. We’ll break down the strengths and weaknesses of each, focusing on security, ease of use, and backup and recovery methods.
By the end of this comparison, you’ll clearly understand which wallet is right for you, as well as how to recover your crypto assets in case of accidents.
What happens if your wallet is lost or stolen?
Wise wallet owners recognize the critical importance of crypto recovery before they find themselves in an unexpected bind! That's why it's important to understand the fundamental topic of crypto asset longevity, including features such as backup, recovery, and inheritance for crypto assets. These considerations are central to long-term planning.
Technical security is paramount, but in the world of crypto, the degree to which backup and recovery solutions are foolproof for users is at least equally important. Here are the backup and recovery options for these two wallets:
Ledger Stax | Trezor Model T | |
Backup & Recovery methods | Recommends Recovery Seed Phrase be written on paper, or engraved onto metallic plates. | Recommends Recovery Seed Phrase be written on paper, or engraved onto metallic plates. |
Optional paid subscription | Ledger Recover, a centralized 3rd-party cloud service, highly criticized by the crypto community. Clouds are not safe — especially when operated by multiple 3rd parties. | No. |
How do these wallets handle Crypto Inheritance?
Crypto Inheritance Features
Currently, most hardware wallets, including the Ledger Stax and Trezor Model T, lack any features for establishing and managing crypto inheritance. This gap presents a challenge for users who want to be sure that their crypto assets can be transferred to their heirs.
Ledger Stax | Trezor Model T | |
Backup |
- Written only | - Written only - Manual sharing of shards |
Inheritance | No | No |
Decentralized backup with Vault12 | Yes | Yes |
Inheritance Management with Vault12 | Yes | Yes |
Backup and recovery differentiators
Ledger Stax Recovery service Disadvantages:
- The optional Ledger Recover backup service is a paid service provided by three corporations that each hold parts of the user’s seed phrase in a Cloud. This introduces risks, as the seed phrase could potentially be accessed via subpoena; business partners could terminate agreements or become involved in lawsuits that result in locked data or resources (like, for example, Gemini and Genesis); and there are multiple potential points of failure.
- Very important detail: The terms of the optional Ledger Recover service do not mention support for inheritance, meaning any unfortunate accident related to the user will make crypto assets unrecoverable for his or her successors. Ledger itself suggests using 3rd-party crypto inheritance services for those purposes.
Ledger Stax Recovery service Advantages:
- People have different preferences. If a user is comfortable trusting a bank with their assets, they may also feel confident using Ledger Recover for securing their seed phrase backup (even though Ledger is not providing the complete cloud backup solution).
Trezor Model T backup Disadvantages:
- Trezor has a Multishare backup service, but it is fully manual, and challenging to maintain. The user is responsible for generating, distributing, and keeping track of the encrypted shards.
Trezor Model T backup Advantages:
- Trezor does offer a Multishare backup option for those who are able and willing to set it up.
How easy are these crypto wallets to use?
Let's compare the key aspects of both wallets side by side, and then summarize what really stands out for user convenience:
Ledger Stax | Trezor Model T | |
Display | 3,7” black and white E Ink, |
1.54" Color LCD, |
Input interface | Touchscreen | Touchscreen |
Cable | USB-C | USB, MicroSD card slot |
Wireless |
Bluetooth 5.2, | No |
Companion Apps | macOS, Windows, Linux, Android, iOS |
macOS, Windows, Linux, Android |
3rd party wallets and dapps support | 50+ | 9+ |
Password manager & 2FA | FIDO2 2FA & Passkeys, | FIDO2 2FA |
Product size & weight | 85 x 54 x 6 mm / 45g | 64 x 39 x 10 mm / 22g |
Convenience features |
Battery (10 hours of use), | Magnetic dock |
Number of supported coins | 5,500+ | 1,600+ |
Price | $399 | $149 |
Crypto wallet user experience differences
User holding a mobile phone and using Ledger Stax as FIDO U2F security key
Ledger Stax Disadvantages:
- The display has a noticeable response delay due to the "E Ink" touchscreen technology, and could be irritating.
- Not all apps are ported to Stax yet. Even the native Passwords app still has no release date identified as of this article's publish date, so check in advance whether your favorite network/coin is supported.
- Extremely expensive. The value in Stax is more about design, rather than practical aspects.
Ledger Stax Advantages:
- Huge informative display and "Clear Signing" allows you to review and confirm all transaction details directly on Ledger Stax and in a human-readable language before they are signed and sent. This enhances security and ensures that you see exactly what you are approving in a secure and tamper-proof manner.
- Offers Bluetooth connectivity as well as NFC — works with or without a cable, at least with smartphones.
- Wide support for third-party wallets and dapps, allowing the Ledger Stax to sign transactions directly in MetaMask, Uniswap, and other platforms without relying on Ledger Live software. This is a huge advantage for DeFi users.
Trezor Model T Disadvantages:
- No wireless connectivity: you always have to use a cable.
- iOS is a balance view-only app, so you can't send transactions from iOS.
Trezor Model T Advantages:
- The display is much more convenient to work with on a regular basis, and easy to read.
- The touchscreen and input are very well-thought-out experiences on Trezor Model T — you can use it without any discomfort.
How do these wallets' security features compare?
Now, we dive deeper into the core specification of every hardware wallet: security features.
Ledger Stax | Trezor Model T | |
PIN-code | 4 - 8 digits | up to 50 digits |
BIP39 Passphrase | Yes | Yes |
Open-source | Partial | Full |
Secure Element | Yes | No |
Multisignature | Yes | Yes |
Crypto wallet security feature differentiators
Ledger Stax security Disadvantages:
- Critical components like the Secure Element and its operating system are closed-source. This has raised concerns, especially after the controversial introduction of the Ledger Recover backup service, which challenged the assumption that the Secure Element could never transmit the recovery seed phrase outside the hardware wallet.
Ledger Stax security Advantages:
- Includes a Secure Element, giving Ledger devices a strong reputation for withstanding physical attacks. This is important for users who prefer not to complicate their security with BIP39 passphrases, prioritizing ease of use.
- Clear Signing is also a security feature.
Trezor Model T security Disadvantages:
- Lacks a Secure Element, making it resistant to physical attacks only if a BIP39 passphrase is used. This is a significant drawback in both convenience and its ability to be fault-proof.
Trezor Model T security Advantages:
- Fully open-source software and hardware. This minimizes third-party risks, and avoids any need to rely on trust.
- Allows for longer PIN codes, which might appeal to particularly cautious users.
Have there been vulnerabilities or hacks of these wallets?
There have been vulnerabilities and hacks associated with both the Ledger and Trezor products, however given Stax is very new we will cover it's manufacturer's hacks history.
Far from delivering uncompromised security, these wallets are routinely subject to malware, supply chain, and firmware vulnerabilities. Here are some recent notable incidents:
Ledger Vulnerabilities:
- The Connect Kit Attack (2023): The Connect Kit breach was discovered by the security teams of Ledger.
- Ledger User Data Breach (2020): A major data breach exposed the personal information of thousands of customers, leading to phishing attacks.
- Another User Data Breach (2021): Ledger announced on Twitter that it has been targeted by rogue Shopify team members who exported over 200 merchants’ customer databases.
- Ledger Live (2020): Users were exposed to basic double spending attacks, amplified double spending attacks, and DoS attacks without user consent.
- Potential Supply Chain Attack Vulnerability (2020): Kraken Security Labs Identifies Supply Chain Attacks Against Ledger Wallets.
Trezor Model T Vulnerabilities:
- Ability to Physically Hack Trezor T Wallet (2023): Crypto Security Firm Unciphered Claims Ability to Physically Hack Trezor T Wallet
- Five Reported Vulnerabilities in Two Models of Trezor Hardware Wallets (2019): Ledger’s Attack Lab has found five vulnerabilities in hardware wallets of its direct competitor Trezor.
- Kraken Identifies Critical Flaw in Trezor Hardware Wallets (2020): Kraken Security Labs has devised a way to extract seeds from both cryptocurrency hardware wallets offered from industry leader Trezor, the Trezor One and Trezor Model T.
Summary of Ledger Stax and Trezor Model T Comparison
The Ledger Stax and Trezor Model T both provide a respectable set of security measures, and support a broad spectrum of cryptocurrencies, making them suitable for diverse crypto portfolios.
The Ledger Stax is very mobile-friendly, and offers a balance of security and convenience features at a very premium price. It offers a big, but unconventional display and with delayed input, but with the advantages of a Secure Element and wireless connectivity options like Bluetooth.
On the other hand, the Trezor Model T, at a much lower price, boasts a fully open-source framework, larger display with colors, and touchscreen interface for enhanced user interaction, but with reduced security and convenience from not having a Secure Element and working only with USB connections the offer sounds non-attractive.
The decision between the two will likely hinge on individual preferences for the target platform (mobile or desktop), and should take into account the planned frequency of use.
Whichever you choose, remember to add crypto inheritance to your choice of wallet to ensure the long-term safety of your digital assets.
Vault12 Guard: a decentralized solution for Crypto Inheritance
Vault12 is the pioneer in Crypto Inheritance Management, and delivers an easy-to-use and securemethod for assigning a legacy contact to your crypto wallets. This enables you to pass on your wallet seed phrases and private keys for all types of digital assets to future generations. Vault12 Guard is designed for everyday people, yet strong enough for Crypto OGs.
Vault12 Guard has a uniquely-secure design. Utilizing advanced encryption and decentralized storage, it ensures that crypto assets are not only safe but also transferable under predefined conditions, filling a critical need unmet by most traditional hardware wallets. Vault12 Guard applies a hybrid approach of software fused with the hardware-based Secure Element of phone devices (The Secure Enclave for iOS devices, and Strongbox for Google devices). Vault12 Guard's decentralized design reduces possible points of failure. Nothing is stored on cloud servers or Vault12 servers, and no assets are stored on local devices, making them less of a target.
From a user perspective, the Vault12 Guard app asks users to appoint one or more people (or mobile devices) as Guardians. The designated Guardians are entrusted to protect the user's comprehensive collection of wallet seed phrases and private keys, which are safely stored within a decentralized digital Vault. Its simple, user-friendly workflow removes the necessity for regularly revising wallet inventories or modifying instructions for your lawyers — a process that otherwise could lead to privacy breaches.
Both the Ledger Stax and Trezor Model T are compatible with Vault12 Guard Inheritance. This addresses the seed phrase backup dilemma for any hardware wallet. It also makes less-secure backup methods, such as paper or steel plates, unnecessary.
Voice-Level Security: A New Dimension of Digital Trust
Personal Voice Memos add a new layer of protection to your Digital Vault recovery requests
Expanding the ever-evolving landscape of digital security, Vault12 has enabled Voice-Level Security for the Vault12 Guard app. This innovative feature adds another mechanism to the ways that Vault12 Guard users can authenticate to each other. Now Vault Owners can use personal voice memos during Vault recovery requests. Voice memos can be used in multiple simple but powerful ways for better safety during recovery requests, adding a new layer of protection to your Digital Guardianship.
Simple Voice Authentication: Added Security for Vaults
Incorporating simple voice authentication as an additional security layer ensures that only the Vault Owner can initiate recovery requests. This method verifies identity through unique vocal characteristics.
Benefits:
- Enhances security by including the Vault Owner's voice message for verification
- Adds an extra layer of protection to recovery processes
The Canary Protocol: Your Early Warning System
The Canary Protocol acts as a subtle security measure, embedding a familiar verbal cue into your voice memos for recovery requests. An agreed-upon phrase, known only to you and your Guardian, serves as a covert password. Its absence suggests a compromised request, signalling an unauthorized recovery attempt.
How it Works:
- Record a voice memo with a pre-agreed verbal cue
- Use this cue in all recovery requests or safety checks
- Guardians recognize the cue, ensuring the request's authenticity
Example:
A friendly greeting or inside joke could serve as the Canary, seamlessly integrated into your communication, adding a layer of fun and security.
Emergency Words: Discreet Alerts
Emergency words provide a discreet method to alert Guardians of potential threats. These phrases, understood only by the recipient, can signal a call for specific behavior (e.g., to avoid confirming recovery requests, or to implement an emergency plan).
Key Features:
- Pre-agreed phrases that indicate distress
- Only recognizable by trusted Guardians
- Prevents unauthorized recovery confirmations, and may help signal for assistance
Example:
A subtle phrase within a memo can alert a Guardian to halt the recovery process, protecting you and your Vault contents.
The backbone for Voice-Level Security implementation
Voice memo data is transferred over the secure and decentralized messaging protocol Zax, developed by the Vault12 team as a foundation of the Vault12 Guardian app. This means that in the case of a private Zax relay, your communication and voice memos will be transferred only by your own private network.
Privacy and Ethical Considerations for Voice-Level Security
Vault12 is committed to maintaining the highest standards of privacy and user consent. All voice authentication data is:
- Encrypted end-to-end
- Stored exclusively on user devices
- Never shared with third-party services
- Fully under user control
Summary: Enhancing Security with Voice-Level Authentication
By treating your voice as a unique, dynamic authentication tool, Vault12 is creating a more intuitive, secure, and human-centric approach to safeguarding digital assets. Voice-Level Security, with its innovative use of voice memos and verbal cues, provides a robust, personalized security solution, ensuring your digital assets are protected with an additional layer of trust.
This additive security function complements the existing high-security measures of Vault12 Guard, such as end-to-end threshold encryption and decentralized messaging. By integrating voice authentication, Vault12 enhances the robustness of its security framework, providing users with personalization tools to ensure that only the legitimate Vault Owner will be able to recover assets from the Vault, thus protecting digital assets with an additional layer of confidence.
How to use Voice memos?
Have questions on how to use voice security? Proceed with our step-by-step help article:
Upgrade your phone and transfer your Vault12 Guard app data
Summary
Upgrading your phone can be an exciting time, whether you are buying a new phone, switching your operating system from Android to iPhone, or just upgrading your tablet. Among the many positive changes you'll experience, the last thing you want to do is to invest a lot of effort into migrating individual apps from your original device.
Vault12 is pleased to announce that it's now easier than ever to safely transfer all your Vault information to your new device — whether you're a Vault owner, or the Guardian of someone else's Vault.
- Vault Owners with a new device can complete the transfer without involving Guardians or spare devices.
- Guardians with a new device can upgrade without interrupting the security of the assets they protect.
- Settings, subscriptions, and preferences will seamlessly transfer along with your data to the new device.
Read our step by step guide here.
Time to Upgrade
For various reasons, you might consider upgrading your phone every year or so. The process can be pretty simple by using cloud backups/restores from Apple and Google. Nevertheless, people always wonder whether everything has been transferred correctly — especially when crypto assets are involved.
Vault12 has always had a seamless upgrade process between phones for Vault owners. For Vault Guardians, historically, you have had to go through one extra step of notifying the Vault owner that you changed phones. With this new update, no one needs to notify anyone, and the transfer process ensures that all information is transferred from the old device to a new device, with no need to bother Vault owners or Guardians.
Time to Transfer
The most common scenario is of course buying a brand new phone with nothing on it. In this scenario, you can easily initiate the Transfer process by simply installing the Vault12 Guard app.
Other scenarios include switching device types (e.g., switching to an iPhone from an Android, or vice versa). With the new Transfer function, you can ensure that everything is cleanly and safely transferred to your new device, without the need to call Guardians and Vault owners.
Follow the steps from our Help portal, here.
How To Back Up Your Crypto Wallet
Backing Up Your Crypto Wallet With Vault12 Guard Preserves Your Personal Crypto Security
Crypto can be difficult to store securely, but backing up your crypto wallet is essential so you can recover funds if your crypto wallet is ever lost, stolen, or damaged. A proper crypto wallet backup is also important for inheritance purposes so your assets live on, even after you die.
Why should you back up your crypto wallet?
Proper crypto wallet backups protect you from threats ranging from criminal actors and accidents to natural disasters and damage. Once securely backed up, you can recover your assets in times of need.
A proper backup of your crypto wallet involves recording:
- Each crypto wallet asset
- Seed phrases and passphrases
- Any supporting files for your assets
All crypto backup solutions should be physically secure, digitally secure, and resilient to degradation – but unfortunately, not all of them are.
What are some limitations of common crypto backup methods?
These are some common backup methods, but each has drawbacks:
- Back up to metal plates - This method sounds simple, but to do it right takes some planning, cost, and time.
- Back up to a local drive - This method is quick, but fraught with risks!
- Back up to the Cloud - This method is also quick, but it has significant risks related to the involvement of third parties.
- Back up to “brain wallet” - This method is slow, unreliable, and only justifiable in cases of extreme limitation or duress.
- Back up to paper - This method is extremely vulnerable and surprisingly subject to error.
How does Vault12 back up your crypto wallet?
The video demo below shows you how Vault12 Guard is used to back up a crypto wallet, making sure your assets live on, even after you pass:
YouTube
Vault12 Guard crypto backup is decentralized, resilient, and secure.
Vault12 Guard allows you to breathe easy, as it avoids the pitfalls of other backup methods:
- Guard's backups are decentralized. There is no single point of failure, allowing you to recover even if your phone is lost or stolen.
- Guard does not rely on Cloud servers. Your assets remain private from third parties and resilient to Cloud outages.
- Guard implements post-quantum encryption - giving your assets the highest possible level of security.
Vault12 Guard is the most advanced yet simple crypto backup solution
Not only is Vault12 Guard secure and resilient, but it is also simple to use. It allows you to back up all types of wallets, as well as NFT-related files, to construct a full inventory of your crypto assets. This includes multi-wallet management, which Vault12 simplifies with an integrated backup and inheritance solution. When you need to restore your Vault, Vault12 makes the process easy by requesting access from your most-trusted Guardians.
Of all your choices for backing up a crypto wallet, Vault12 Guard uniquely backs up your crypto wallets in a manner that is physically secure, digitally secure, and passes the test of time.
How Vault12 Guard Helps You Manage Your Crypto Inheritance
Managing digital assets like cryptocurrencies can be complex, especially when it comes to inheritance—but it doesn’t have to be. Vault12 Guard ensures that your digital inheritance is securely managed, and that only the right people—your chosen Guardians—can approve your beneficiary’s access at the right time.
Implement Your Inheritance Plan
Vault12 encourages you to create a carefully considered inheritance plan that covers all of your digital assets. Once your inheritance plan is set, Vault12 Guard will help you manage access to these assets and ensure everything is handled as you intended.
A Comprehensive Digital Vault
Vault12 Guard isn’t just for backing up crypto wallets. It’s a comprehensive solution for backing up all types of digital assets and storing sensitive information:
- Seed phrases from any type of wallet and even private keys including Bitcoin, Ethereum, and other cryptocurrencies. Vault12 Guard allows you to select from a pre-determined list of wallets or add your own.
- Non-fungible tokens (NFTs).
- Digitized copies of legal documents, medical records, or any other personal records.
- PINs and instructions for accessing devices and password managers.
Vault12 keeps everything safe and organized in one digital vault.
Backed up and Protected By Trusted Guardians
Your digital assets are protected by your most trusted people: your chosen Guardians, who can use Vault12 Guard for free.
In the event that you lose a device like your mobile phone that holds crypto wallets, Vault12 Guard offers you and your Guardians a straightforward process to restore your assets.
In the case of inheritance, your Guardians must approve the beneficiary’s request to access your Digital Vault.
Manage your Digital Inheritance with Vault12 Guard
Vault12 Guard is available on iOS, Android, MacOS, and Windows. For detailed guidance on setting up your digital inheritance with Vault12 Guard, including step-by-step app screenshots, check out our guide here.
Here’s a brief overview of the essential steps after you download the app:
- Set Up Your Vault: Implement your digital inheritance plan by adding your digital assets and designating Guardians (including your beneficiary).
- Manage: Use Vault12 Guard to do the heavy lifting:
- provide truly high-security storage for your data
- add or remove wallet seed phrases and other digital assets
- add or replace Guardians, and verify their “active” status
- securely transfer access to your Digital Vault with your Guardians’ approval.
Regular Asset Reviews
As with all assets, it’s a good idea to periodically review your digital assets to check for legal or regulatory changes that may affect your holdings, related technology or product updates, and current market value. Adjust your digital inheritance management strategies as needed.
Check in with your Guardians, too, to confirm their continued readiness to help guard your digital assets.
Vault12 Guard makes managing and inheriting digital assets simple and secure. Whether you’re new to cryptocurrency or looking to safeguard your digital legacy, Vault12 provides an easy-to-use solution for modern estate planning and inheritance.
Managing Multiple Crypto Wallets with Vault12 Guard
An Easy Solution To Securely Manage Access To Your Diverse Portfolio, Including Backups & Inheritance
It’s not uncommon for investors these days to juggle multiple wallets for their cryptocurrency. Most crypto investors (and creators) have multiple wallets, whether they like it or not, because different wallets are compatible with different digital assets. There are also benefits of managing multiple wallets, such as risk management, better organization, and more granular security.
At times, handling multiple wallets can seem overwhelming. Vault12 Guard simplifies this with an easy solution to securely manage access to your diverse digital portfolio. The Vault12 approach for backups and inheritance ensures that you can access your wallets in the future, even if your phone or laptop is stolen, lost, or damaged. It also means that all of your assets, across all your wallets regardless of blockchain, can be inherited. Vault12 Guard helps you keep an inventory of all your wallets so that you don’t forget any, and your beneficiaries won’t lose any assets after you pass.
Why Manage Multiple Crypto Wallets
There are several advantages to multiple wallets, including risk management and organization. You might own multiple wallets in order to:
- Organize your crypto based on different transaction tracking needs: you might choose to separate high-privacy transactions from low-privacy ones, or individual wallets for unique NFT collections.
- Limit the maximum value of each wallet to reduce risk.
- Invest across different blockchains such as NFTs that are built on different blockchains and not supported by the same wallet.
- Maintain separatehot wallets and cold wallets which might be both custodial and self-custody types.
- Try new wallets to explore new features.
- Duress/Dummy wallets for use when criminals try to hijack your crypto or even worse, attempt a “$5 Wrench Attack.”
Challenges of Multiple Crypto Wallets
Keep in mind the following before making the decision to use multiple wallets:
- Need to make sure that you can recover each and every wallet. You must have a backup for everything - otherwise your assets can easily be lost.
- Remember to record every seed phrase so you can access all wallets in the future.
- You must practice good Key Management- or else you could forget or lose access to your wallet seed phrases.
- You could forget that you even have some wallets in your inventory. To avoid this risk, keep your wallet inventory up to date.
- It is complicated to communicate information about multiple wallets to beneficiaries, especially keeping access private until the time comes to transfer that knowledge.
- For inheritance, your assets must be backed up and documented to pass on properly.
How Vault12 Guard Simplifies Multi-Wallet Management
What's needed is an integrated backup and inheritance solution, so that everything is backed up, recoverable, and can be passed on. Vault12 does all of this - it gives you the ability to generate, back up, and restore seed phrases. It’s easy to use for the person setting up the Digital Vault, the Guardians protecting it, and the beneficiary receivingthe inheritance.
With multiple wallets, inheritance can become complex. Vault12 Guard simplifies this process, so you can designate the right beneficiary and Guardians, and the transition of assets after your passing is seamless. Keep in mind the following goals:
- Creating an inventory of multiple wallets with associated seed phrases and passphrases.
- Designating a technical beneficiary who can manage assets in the event of your passing or incapacitation.
- Providing a simple and easy-to-use process both for the crypto asset owner and the beneficiary.
- Being independent of the legal process in any jurisdiction, but part of the overall trust and estate plan.
Managing Multiple Crypto Wallets with Vault12 Guard
The process to set up multiple wallets in Vault12 Guard couldn’t be easier.
Vault12 can optionally be used to generate seed phrases which can be imported into your wallets and stored in your Digital Vault for easy organization.
Whether you used Vault12 Guard to generate your seed phrases or some other method, Vault12 Guard can back up your seed phrases as described in step-by-step detail with screenshots in this guide, “Back up your Recovery Phrase or add an asset using Vault12.”
Do this for each wallet and you’re all set. Now everything is in one place and you can rest easy – Vault12 Guard is ready to distribute the encrypted backup of your assets to all of your Guardians.
When you need to restore your Digital Vault (whether it holds one or multiple wallets) follow the simple steps to restore your Vault. In the case of inheritance, your Digital Vault beneficiary will use the Vault12 Guard app to request and receive approval from your chosen Guardians to access your Digital Vault’s inventory of wallets.
Once set up, Vault12 Guard offers you peace of mind and the confidence of knowing that your assets are secure, organized, and ready to pass on.
Pay-by-Crypto Subscriptions (50% off) and Vault12 Guard Operational Enhancements
The latest release of Vault12 Guard has some powerful new capabilities under the covers as well as refinements that streamline its user experience for you.
We've revamped the subscription payments system so that whether you choose to use Apple iOS App Store subscriptions, Google Play Store subscriptions, or subscribe directly through Vault12 using ETH or VGT, you have multiple options of simple and straightforward ways to subscribe.
Here's the rest of the news:
New Enhancements in Vault12 Guard Version 2.3
- Pay-by-Crypto Subscriptions via VGT and ETH
- Seamless Subscription Journey
- Comprehensive Data Control
- Faster Vault Status Updates
- Android 14 Ready
- Enhanced Reporting Privacy
- More-Polished Experience
Pay-by-Crypto Subscription via ETH or VGT (includes 50% discount)
In previous releases, we switched to using native subscription options provided by the Google and Apple App Stores, and now with this release we have released a streamlined capability to enable subscriptions using Ethereum (ETH) or the Vault Guardian Token (VGT).
To access the subscription options, visit the website and click on "My Subscriptions," or just go to pay.vault12.com.
Key highlights include a simple process, and no extra ETH payments required beyond the wallet fees associated with transferring crypto to your subscription deposit address.
For a full step-by-step walkthrough, visit our help article: How to subscribe to Vault12 Guard with $ETH and $VGT (and get a 50% Discount)
My Subscription
Vault12 Guard Subscription Plans
Seamless Subscription Journey
We have simplified the available Subscription plans to match how everyday people like to use the app:
Basic - For checking out the app, and for Guardians (free forever).
Backup - For people using the app to ensure they have a decentralized backup of all their crypto wallets. This includes the ability to assign Guardians and to ensure that your Vault can be recreated in the event of loss of your device.
Inheritance - For everyone who wants to ensure that their crypto assets can be passed on to their family or designated heirs.
Comprehensive Data Control
We have added options to ensure that you can erase your data inside the app, as well as on any data stored by Guardian devices.
Faster Vault Status Update
Generally speaking, updates within the app and Guardian devices are asynchronous, so now you are able to immediately refresh your Vault status by simply pulling down in the app.
Android 14 Ready
This release supports Android 14, including newly-announced features.
Enhanced Reporting Privacy
Opt-in to anonymously issue reports that can help us to enhance the app.
A More-Polished Experience
Revamped dialogs, improved localizations, and minor fixes make the app more graceful to use.
Ledger Stax and Ledger Nano X Wallets: Which is right for you?
The right wallet for you depends on your design preferences and price sensitivity
When choosing hardware wallets, many crypto users base their decisions on day-to-day asset management needs and perceived device security. However, savvy crypto users first consider a wallet's ability to handle long-term security scenarios. Long-term security includes expected essentials like backup and recovery tools, and also often-overlooked features related to secure and fault-proof third-party recovery. You can think of third-party recovery as your ability to allow crypto assets to be inherited by successors. Successful crypto users require a comprehensive security strategy for the full life cycle of crypto assets. This article will help you achieve that.
Let's jump into helping you understand the pros and cons of the Ledger Stax and Ledger Nano X hardware wallets for day-to-day activities, as well as their potential to safeguard the long-term security and longevity of your assets.
Overview
The Ledger Stax and Ledger Nano X both provide a wide variety of reliable security features and support a broad spectrum of cryptocurrencies, making them suitable for diverse crypto portfolios. However, several differences are clear:
Ledger Stax
- Mobile-Centric Usability: Designed with mobility in mind, the Ledger Stax features wireless connectivity options like Bluetooth and NFC, making it highly compatible with mobile platforms. Stax also has a longer battery life (up to 10 hours versus Nano X's 5).
- Premium Design: Its unconventionally large display enhances readability, though it comes with slightly slower responsiveness.
- Price Point: Positioned as a premium product, its cost reflects its advanced features and sleek design.
Ledger Nano X
- Mobile-Centric Usability: Offers Bluetooth connectivity — works with or without a cable, at least with smartphones.
- Design: A bit more compact than Stax. User input is via buttons, not touchscreen.
- Price Point: Not so overpriced.
In terms of crypto asset longevity features, such as backup, recovery, and crypto inheritance, both devices provide industry-standard and proprietary options with certain trade-offs, as well as compatibility with third-party solutions like Vault12 Guard for succession planning scenarios.
The decision between the two will likely hinge on individual preferences for the target platform (mobile or desktop), and should take into account the planned frequency of use.
Approach to comparison
When choosing the best hardware wallet for cryptocurrency security, you may wonder:
- Which is better, the Ledger Stax or the Ledger Nano X?
- How easy to use are these wallets?
- How do their security features compare?
- Do these wallets have vulnerabilities, and have they been hacked?
- What happens if your wallet is lost or stolen?
- How do these wallets accomodate user errors, and complex scenarios like inheritance of crypto assets?
This article compares important characteristics for these two popular wallets. We’ll break down the strengths and weaknesses of each, focusing on security, ease of use, and backup and recovery methods.
By the end of this comparison, you’ll clearly understand which wallet is right for you, as well as how to recover your crypto assets in case of accidents.
What happens if your wallet is lost or stolen?
Wise wallet owners recognize the critical importance of crypto recovery before they find themselves in an unexpected bind! That's why it's important to understand the fundamental topic of crypto asset longevity, including features such as backup, recovery, and inheritance for crypto assets. These considerations are central to long-term planning.
Technical security is paramount, but in the world of crypto, the degree to which backup and recovery solutions are foolproof for users is at least equally important. Here are the backup and recovery options for these two wallets:
Ledger Stax | Ledger Nano X | |
Backup & Recovery methods | Recommends Recovery Seed Phrase be written on paper, or engraved onto metallic plates. | Recommends Recovery Seed Phrase be written on paper, or engraved onto metallic plates. |
Optional paid subscription | Ledger Recover, a centralized 3rd-party cloud service, highly criticized by the crypto community. Clouds are not safe — especially when operated by multiple 3rd parties. | Ledger Recover, a centralized 3rd-party cloud service, highly criticized by the crypto community. Clouds are not safe — especially when operated by multiple 3rd parties. |
How do these wallets handle Crypto Inheritance?
Crypto Inheritance Features
Currently, most hardware wallets, including the Ledger Stax and Ledger Nano X, lack any features for establishing and managing crypto inheritance. This gap presents a challenge for users who want to be sure that their crypto assets can be transferred to their heirs.
Ledger Stax | Ledger Nano X | |
Backup |
- Written only | - Written only - Optional 3rd party KYC-based cloud |
Inheritance | No | No |
Decentralized backup with Vault12 | Yes | Yes |
Inheritance Management with Vault12 | Yes | Yes |
Backup and recovery differentiators
Ledger Stax and Ledger Nano X both have similar recovery service Disadvantages:
- The optional Ledger Recover backup service is a paid service provided by three corporations that each hold parts of the user’s seed phrase in a Cloud. This introduces risks, as the seed phrase could potentially be accessed via subpoena; or business partners could terminate agreements or become involved in lawsuits that result in locked data or resources (like, for example, Gemini and Genesis). These scenarios contain multiple potential points of failure, and should be taken into account.
- Very important detail: The terms of the optional Ledger Recover service do not mention support for inheritance, meaning any unfortunate accident related to the user will make crypto assets unrecoverable for his or her successors. Ledger itself suggests using 3rd-party crypto inheritance services for those purposes.
Ledger Stax and Ledger Nano X both have similar recovery service Advantages:
- People have different preferences. If a user is comfortable trusting a bank with their assets, they may also feel confident using Ledger Recover for securing their seed phrase backup (even though Ledger is not providing the entire cloud backup solution).
How easy are these crypto wallets to use?
Let's compare the key aspects of both wallets side by side, and then summarize what really stands out for user convenience:
Ledger Stax | Ledger Nano X | |
Display | 3,7” black and white E Ink, | 1” Monochrome OLED, |
Input interface | Touchscreen |
2 click buttons |
Cable | USB-C | USB-C |
Wireless |
Bluetooth, | Bluetooth |
Companion Apps | macOS, Windows, Linux, Android, iOS | macOS, Windows, Linux, Android, iOS |
3rd party wallets and dapps support | 50+ | 50+ |
Password manager & 2FA | FIDO2 2FA & Passkeys, | FIDO2 2FA & Passkeys,Password Manager |
Product size & weight | 85 x 54 x 6 mm / 45g | 72 x 19 x 12 mm / 34g |
Convenience features | Battery (Up to 10 hours in use) | Battery (Up to 5 hours in use) |
Number of supported coins | 5,500+ | 5,500+ |
Price | $399 | $149 |
Crypto wallet user experience differences
Ledger Stax UX Disadvantages:
- The display has a noticeable response delay due to the "E Ink" touchscreen technology, and could be irritating.
- Not all apps are ported to Stax yet. Even the native Passwords app still has no release date identified as of this article's publish date, so check in advance whether your favorite network/coin is supported.
- Extremely expensive. The value in Stax is more about design, rather than practical aspects.
Ledger Stax UX Advantages:
- Huge informative display and "Clear Signing" allows you to review and confirm all transaction details directly on Ledger Stax and in a human-readable language before they are signed and sent. This enhances security and ensures that you see exactly what you are approving in a secure and tamper-proof manner.
- Offers Bluetooth connectivity as well as NFC — works with or without a cable, at least with smartphones.
- Wide support for third-party wallets and dapps, allowing the Ledger Stax to sign transactions directly in MetaMask, Uniswap, and other platforms without relying on Ledger Live software. This is a huge advantage for DeFi users.
Ledger Nano X Disadvantages:
- The display is literally the size of a coin: very uncomfortable to use.
- Requires two-handed operation, making it difficult to use with a phone simultaneously — contrary to some misleading ads.
- The buttons are stiff, making operations cumbersome.
- No NFC.
Ledger Nano X Advantages:
- A bit more compact than Stax while also offering Bluetooth connectivity — works with or without a cable, at least with smartphones.
- Wide support for third-party wallets and dapps, allowing the Ledger Nano X to sign transactions directly in MetaMask, Uniswap, and other platforms without relying on Ledger Live software. This is a huge advantage for DeFi users.
- Not so overpriced.
How do these wallets' security features compare?
Now, we dive deeper into the core specification of every hardware wallet: security features.
Ledger Stax | Ledger Nano X | |
PIN-code | 4 - 8 digits | 4 - 8 digits |
BIP39 Passphrase | Yes | Yes |
Open-source | Partial | Partial |
Secure Element | Yes | Yes |
Multisignature | Yes | Yes |
Crypto wallet security feature differentiators
Ledger Stax and Ledger Nano X both have similar security feature Disadvantages:
- Critical components like the Secure Element and its operating system are closed-source. This raises concerns, especially after the controversial introduction of the Ledger Recover backup service, which challenged the previous assumption that the Secure Element could never transmit the recovery seed phrase outside the hardware wallet.
Ledger Stax and Ledger Nano X both have similar security feature Advantages:
- Includes a Secure Element, giving Ledger devices a strong reputation for withstanding physical attacks. This is important for users who prefer not to complicate their security with BIP39 passphrases, prioritizing ease of use.
- Clear Signing is also a security feature.
Have there been vulnerabilities or hacks of these wallets?
There have been some vulnerabilities and hacks associated with Ledger products in the past — let's consider their "hack history." While relatively secure, most crypto wallets — even hardware wallets — can not provide perfect security, and are routinely subject to malware, supply chain, and firmware vulnerabilities. Here are some recent notable incidents:Ledger Vulnerabilities:
- The Connect Kit Attack (2023): The Connect Kit breach was discovered by the security teams of Ledger.
- Ledger User Data Breach (2020): A major data breach exposed the personal information of thousands of customers, leading to phishing attacks.
- Another User Data Breach (2021): Ledger announced on Twitter that it has been targeted by rogue Shopify team members who exported over 200 merchants’ customer databases.
- Ledger Live (2020): Users were exposed to basic double spending attacks, amplified double spending attacks, and DoS attacks without user consent.
- Potential Supply Chain Attack Vulnerability (2020): Kraken Security Labs Identifies Supply Chain Attacks Against Ledger Wallets.
No software is perfect, and no wallet is ideal. However, some designs have been compromised more than others.
Summary of Ledger Stax and Ledger Nano X Comparison
The Ledger Stax and Ledger Nano X both provide a respectable set of security measures, and support a broad spectrum of cryptocurrencies, making them suitable for diverse crypto portfolios.
The Ledger Stax is more mobile-friendly, and offers a balance of security and convenience features at a very premium price. It offers an unconventionally large display with delayed response, with the advantage of wireless connectivity options like Bluetooth.
On the other hand, the Ledger Nano X, at a lower price point, is still mobile-friendly and offers a balance of security and convenience features. It offers a small display and uncomfortable input, but still has the advantages of a Secure Element and wireless connectivity options like Bluetooth.
The decision between the two will likely hinge on individual preferences for the target user interface with screen, and should take into account the planned frequency of use.
Whichever you choose, remember to add crypto inheritance to your choice of wallet to ensure the long-term safety of your digital assets. Both the Ledger Stax and Ledger Nano X are compatible with Vault12 Guard Inheritance planning.Vault12 Guard: a decentralized solution for Crypto Inheritance
Vault12 is the pioneer in Crypto Inheritance Management, and delivers an easy-to-use and securemethod for assigning a legacy contact to your crypto wallets. This enables you to pass on your wallet seed phrases and private keys for all types of digital assets to future generations. Vault12 Guard is designed for everyday people, yet strong enough for Crypto OGs.
Vault12 Guard has a uniquely-secure design. Utilizing advanced encryption and decentralized storage, it ensures that crypto assets are not only safe but also transferable under predefined conditions, filling a critical need unmet by most traditional hardware wallets. Vault12 Guard applies a hybrid approach of software fused with the hardware-based Secure Element of phone devices (The Secure Enclave for iOS devices, and Strongbox for Google devices). Vault12 Guard's decentralized design reduces possible points of failure. Nothing is stored on cloud servers or Vault12 servers, and no assets are stored on local devices, making them less of a target.
From a user perspective, the Vault12 Guard app asks users to appoint one or more people (or mobile devices) as Guardians. The designated Guardians are entrusted to protect the user's comprehensive collection of wallet seed phrases and private keys, which are safely stored within a decentralized digital Vault. Its simple, user-friendly workflow removes the necessity for regularly revising wallet inventories or modifying instructions for your lawyers — a process that otherwise could lead to privacy breaches.
Both the Ledger Stax and Ledger Nano X are compatible with Vault12 Guard Inheritance. This addresses the seed phrase backup dilemma for any hardware wallet. It also makes less-secure backup methods, such as paper or steel plates, unnecessary.
Ledger Stax and Trezor Model T: two strong wallets compared
The right wallet for you depends on your usage patterns and design preferences
When choosing hardware wallets, many crypto users base their decisions on day-to-day asset management needs and perceived device security. However, savvy crypto users first consider a wallet's ability to handle long-term security scenarios. Long-term security includes expected essentials like backup and recovery tools, and also often-overlooked features related to secure and fault-proof third-party recovery. You can think of third-party recovery as your ability to allow crypto assets to be inherited by successors. Successful crypto users require a comprehensive security strategy for the full life cycle of crypto assets. This article will help you achieve that.
Let's jump into helping you understand the pros and cons of the Ledger Stax and Trezor Model T for day-to-day activities, as well as their potential to safeguard the long-term security and longevity of your assets.
Overview
The Ledger Stax and Trezor Model T both provide a wide variety of reliable security features and support a broad spectrum of cryptocurrencies, making them suitable for diverse crypto portfolios. However, several differences are clear:
Ledger Stax
- Mobile-Centric Usability: Designed with mobility in mind, the
- Ledger Stax features wireless connectivity options like Bluetooth and
- NFC, making it highly compatible with mobile platforms.
- Premium Design: Its unconventionally large display enhances readability, though it comes with slower responsiveness included.
- Price Point: Positioned as a premium product, its cost reflects its advanced features and sleek design
- Mobile-Centric Usability: No Bluetooth connectivity. iOS app is view-only.
- General Usability: Smaller set of wallets, coins, and apps.
- Design: The touchscreen and input are very well-thought-out experiences.
- Price Point: More affordable.
In terms of crypto asset longevity features, such as backup, recovery, and crypto inheritance, both devices provide industry-standard and proprietary options with certain trade-offs, as well as compatibility with third-party solutions like Vault12 Guard for succession planning scenarios.
The decision between the two will likely hinge on individual preferences for the target platform (mobile or desktop), and should take into account the planned frequency of use.
Approach to comparison
When choosing the best hardware wallet for cryptocurrency security, you may wonder:
- Which is better, the Ledger Stax or the Trezor Model T?
- How easy to use are these wallets?
- How do their security features compare?
- Do these wallets have vulnerabilities, and have they been hacked?
- What happens if your wallet is lost or stolen?
- How do these wallets accomodate user errors, and complex scenarios like inheritance of crypto assets?
This article compares important characteristics for these two popular wallets. We’ll break down the strengths and weaknesses of each, focusing on security, ease of use, and backup and recovery methods.
By the end of this comparison, you’ll clearly understand which wallet is right for you, as well as how to recover your crypto assets in case of accidents.
What happens if your wallet is lost or stolen?
Wise wallet owners recognize the critical importance of crypto recovery before they find themselves in an unexpected bind! That's why it's important to understand the fundamental topic of crypto asset longevity, including features such as backup, recovery, and inheritance for crypto assets. These considerations are central to long-term planning.
Technical security is paramount, but in the world of crypto, the degree to which backup and recovery solutions are foolproof for users is at least equally important. Here are the backup and recovery options for these two wallets:
Ledger Stax | Trezor Model T | |
Backup & Recovery methods | Recommends Recovery Seed Phrase be written on paper, or engraved onto metallic plates. | Recommends Recovery Seed Phrase be written on paper, or engraved onto metallic plates. |
Optional paid subscription | Ledger Recover, a centralized 3rd-party cloud service, highly criticized by the crypto community. Clouds are not safe — especially when operated by multiple 3rd parties. | No. |
How do these wallets handle Crypto Inheritance?
Crypto Inheritance Features
Currently, most hardware wallets, including the Ledger Stax and Trezor Model T, lack any features for establishing and managing crypto inheritance. This gap presents a challenge for users who want to be sure that their crypto assets can be transferred to their heirs.
Ledger Stax | Trezor Model T | |
Backup |
- Written only | - Written only - Manual sharing of shards |
Inheritance | No | No |
Decentralized backup with Vault12 | Yes | Yes |
Inheritance Management with Vault12 | Yes | Yes |
Backup and recovery differentiators
Ledger Stax Recovery service Disadvantages:
- The optional Ledger Recover backup service is a paid service provided by three corporations that each hold parts of the user’s seed phrase in a Cloud. This introduces risks, as the seed phrase could potentially be accessed via subpoena; business partners could terminate agreements or become involved in lawsuits that result in locked data or resources (like, for example, Gemini and Genesis); and there are multiple potential points of failure.
- Very important detail: The terms of the optional Ledger Recover service do not mention support for inheritance, meaning any unfortunate accident related to the user will make crypto assets unrecoverable for his or her successors. Ledger itself suggests using 3rd-party crypto inheritance services for those purposes.
Ledger Stax Recovery service Advantages:
- People have different preferences. If a user is comfortable trusting a bank with their assets, they may also feel confident using Ledger Recover for securing their seed phrase backup (even though Ledger is not providing the complete cloud backup solution).
Trezor Model T backup Disadvantages:
- Trezor has a Multishare backup service, but it is fully manual, and challenging to maintain. The user is responsible for generating, distributing, and keeping track of the encrypted shards.
Trezor Model T backup Advantages:
- Trezor does offer a Multishare backup option for those who are able and willing to set it up.
How easy are these crypto wallets to use?
Let's compare the key aspects of both wallets side by side, and then summarize what really stands out for user convenience:
Ledger Stax | Trezor Model T | |
Display | 3,7” black and white E Ink, |
1.54" Color LCD, |
Input interface | Touchscreen | Touchscreen |
Cable | USB-C | USB, MicroSD card slot |
Wireless |
Bluetooth 5.2, | No |
Companion Apps | macOS, Windows, Linux, Android, iOS |
macOS, Windows, Linux, Android |
3rd party wallets and dapps support | 50+ | 9+ |
Password manager & 2FA | FIDO2 2FA & Passkeys, | FIDO2 2FA |
Product size & weight | 85 x 54 x 6 mm / 45g | 64 x 39 x 10 mm / 22g |
Convenience features |
Battery (10 hours of use), | Magnetic dock |
Number of supported coins | 5,500+ | 1,600+ |
Price | $399 | $149 |
Crypto wallet user experience differences
User holding a mobile phone and using Ledger Stax as FIDO U2F security key
Ledger Stax Disadvantages:
- The display has a noticeable response delay due to the "E Ink" touchscreen technology, and could be irritating.
- Not all apps are ported to Stax yet. Even the native Passwords app still has no release date identified as of this article's publish date, so check in advance whether your favorite network/coin is supported.
- Extremely expensive. The value in Stax is more about design, rather than practical aspects.
Ledger Stax Advantages:
- Huge informative display and "Clear Signing" allows you to review and confirm all transaction details directly on Ledger Stax and in a human-readable language before they are signed and sent. This enhances security and ensures that you see exactly what you are approving in a secure and tamper-proof manner.
- Offers Bluetooth connectivity as well as NFC — works with or without a cable, at least with smartphones.
- Wide support for third-party wallets and dapps, allowing the Ledger Stax to sign transactions directly in MetaMask, Uniswap, and other platforms without relying on Ledger Live software. This is a huge advantage for DeFi users.
Trezor Model T Disadvantages:
- No wireless connectivity: you always have to use a cable.
- iOS is a balance view-only app, so you can't send transactions from iOS.
Trezor Model T Advantages:
- The display is much more convenient to work with on a regular basis, and easy to read.
- The touchscreen and input are very well-thought-out experiences on Trezor Model T — you can use it without any discomfort.
How do these wallets' security features compare?
Now, we dive deeper into the core specification of every hardware wallet: security features.
Ledger Stax | Trezor Model T | |
PIN-code | 4 - 8 digits | up to 50 digits |
BIP39 Passphrase | Yes | Yes |
Open-source | Partial | Full |
Secure Element | Yes | No |
Multisignature | Yes | Yes |
Crypto wallet security feature differentiators
Ledger Stax security Disadvantages:
- Critical components like the Secure Element and its operating system are closed-source. This has raised concerns, especially after the controversial introduction of the Ledger Recover backup service, which challenged the assumption that the Secure Element could never transmit the recovery seed phrase outside the hardware wallet.
Ledger Stax security Advantages:
- Includes a Secure Element, giving Ledger devices a strong reputation for withstanding physical attacks. This is important for users who prefer not to complicate their security with BIP39 passphrases, prioritizing ease of use.
- Clear Signing is also a security feature.
Trezor Model T security Disadvantages:
- Lacks a Secure Element, making it resistant to physical attacks only if a BIP39 passphrase is used. This is a significant drawback in both convenience and its ability to be fault-proof.
Trezor Model T security Advantages:
- Fully open-source software and hardware. This minimizes third-party risks, and avoids any need to rely on trust.
- Allows for longer PIN codes, which might appeal to particularly cautious users.
Have there been vulnerabilities or hacks of these wallets?
There have been vulnerabilities and hacks associated with both the Ledger and Trezor products, however given Stax is very new we will cover it's manufacturer's hacks history.
Far from delivering uncompromised security, these wallets are routinely subject to malware, supply chain, and firmware vulnerabilities. Here are some recent notable incidents:
Ledger Vulnerabilities:
- The Connect Kit Attack (2023): The Connect Kit breach was discovered by the security teams of Ledger.
- Ledger User Data Breach (2020): A major data breach exposed the personal information of thousands of customers, leading to phishing attacks.
- Another User Data Breach (2021): Ledger announced on Twitter that it has been targeted by rogue Shopify team members who exported over 200 merchants’ customer databases.
- Ledger Live (2020): Users were exposed to basic double spending attacks, amplified double spending attacks, and DoS attacks without user consent.
- Potential Supply Chain Attack Vulnerability (2020): Kraken Security Labs Identifies Supply Chain Attacks Against Ledger Wallets.
Trezor Model T Vulnerabilities:
- Ability to Physically Hack Trezor T Wallet (2023): Crypto Security Firm Unciphered Claims Ability to Physically Hack Trezor T Wallet
- Five Reported Vulnerabilities in Two Models of Trezor Hardware Wallets (2019): Ledger’s Attack Lab has found five vulnerabilities in hardware wallets of its direct competitor Trezor.
- Kraken Identifies Critical Flaw in Trezor Hardware Wallets (2020): Kraken Security Labs has devised a way to extract seeds from both cryptocurrency hardware wallets offered from industry leader Trezor, the Trezor One and Trezor Model T.
Summary of Ledger Stax and Trezor Model T Comparison
The Ledger Stax and Trezor Model T both provide a respectable set of security measures, and support a broad spectrum of cryptocurrencies, making them suitable for diverse crypto portfolios.
The Ledger Stax is very mobile-friendly, and offers a balance of security and convenience features at a very premium price. It offers a big, but unconventional display and with delayed input, but with the advantages of a Secure Element and wireless connectivity options like Bluetooth.
On the other hand, the Trezor Model T, at a much lower price, boasts a fully open-source framework, larger display with colors, and touchscreen interface for enhanced user interaction, but with reduced security and convenience from not having a Secure Element and working only with USB connections the offer sounds non-attractive.
The decision between the two will likely hinge on individual preferences for the target platform (mobile or desktop), and should take into account the planned frequency of use.
Whichever you choose, remember to add crypto inheritance to your choice of wallet to ensure the long-term safety of your digital assets.
Vault12 Guard: a decentralized solution for Crypto Inheritance
Vault12 is the pioneer in Crypto Inheritance Management, and delivers an easy-to-use and securemethod for assigning a legacy contact to your crypto wallets. This enables you to pass on your wallet seed phrases and private keys for all types of digital assets to future generations. Vault12 Guard is designed for everyday people, yet strong enough for Crypto OGs.
Vault12 Guard has a uniquely-secure design. Utilizing advanced encryption and decentralized storage, it ensures that crypto assets are not only safe but also transferable under predefined conditions, filling a critical need unmet by most traditional hardware wallets. Vault12 Guard applies a hybrid approach of software fused with the hardware-based Secure Element of phone devices (The Secure Enclave for iOS devices, and Strongbox for Google devices). Vault12 Guard's decentralized design reduces possible points of failure. Nothing is stored on cloud servers or Vault12 servers, and no assets are stored on local devices, making them less of a target.
From a user perspective, the Vault12 Guard app asks users to appoint one or more people (or mobile devices) as Guardians. The designated Guardians are entrusted to protect the user's comprehensive collection of wallet seed phrases and private keys, which are safely stored within a decentralized digital Vault. Its simple, user-friendly workflow removes the necessity for regularly revising wallet inventories or modifying instructions for your lawyers — a process that otherwise could lead to privacy breaches.
Both the Ledger Stax and Trezor Model T are compatible with Vault12 Guard Inheritance. This addresses the seed phrase backup dilemma for any hardware wallet. It also makes less-secure backup methods, such as paper or steel plates, unnecessary.
How to choose between the Ledger Stax and Trezor Safe 5 Wallets
The right wallet for you depends on your mobility needs, design preferences, and price sensitivity
When choosing hardware wallets, many crypto users base their decisions on day-to-day asset management needs and perceived device security. However, savvy crypto users first consider a wallet's ability to handle long-term security scenarios. Long-term security includes expected essentials like backup and recovery tools, and also often-overlooked features related to secure and fault-proof third-party recovery. You can think of third-party recovery as your ability to allow crypto assets to be inherited by successors. Successful crypto users require a comprehensive security strategy for the full life cycle of crypto assets. This article will help you achieve that.
Let's jump into helping you understand the pros and cons of the Ledger Stax and Trezor Safe 5 hardware wallets for day-to-day activities, as well as their potential to safeguard the long-term security and longevity of your assets.
Overview
The Ledger Stax and Trezor Safe 5 both provide a wide variety of reliable security features and support a broad spectrum of cryptocurrencies, making them suitable for diverse crypto portfolios. However, several differences are clear:
Ledger Stax
- Mobile-Centric Usability: Designed with mobility in mind, the Ledger Stax features wireless connectivity options like Bluetooth, making it highly compatible with mobile platforms.
- Premium Design: Its unconventionally large display enhances readability, though it comes with slightly slower responsiveness.
- Price Point: Positioned as a premium product, its cost reflects its advanced features and sleek design.
Trezor Safe 5
- Open-Source Transparency: Built on an NDA-free framework (full disclosure), Trezor Safe 5 emphasizes trust through transparency, appealing to users who value open-source security.
- Simplified Connectivity: Limited to USB connections, it offers reliable functionality for desktop and Android users only.
- Affordable Access: At a much lower price point, it delivers solid security and usability without the premium cost.
In terms of crypto asset longevity features, such as backup, recovery, and crypto inheritance, both devices provide industry-standard and proprietary options with certain trade-offs, as well as compatibility with third-party solutions like Vault12 Guard for succession planning scenarios.
The decision between the two will likely hinge on individual preferences for the target platform (mobile or desktop), and should take into account the planned frequency of use.
Approach to comparison
When choosing the best hardware wallet for cryptocurrency security, you may wonder:
- Which is better, the Ledger Stax or the Trezor Safe 5?
- How easy to use are these wallets?
- How do their security features compare?
- Do these wallets have vulnerabilities, and have they been hacked?
- What happens if your wallet is lost or stolen?
- How do these wallets accomodate user errors, and complex scenarios like inheritance of crypto assets?
This article compares important characteristics for these two popular wallets. We’ll break down the strengths and weaknesses of each, focusing on security, ease of use, and backup and recovery methods.
By the end of this comparison, you’ll clearly understand which wallet is right for you, as well as how to recover your crypto assets in case of accidents.
What happens if your wallet is lost or stolen?
Wise wallet owners recognize the critical importance of crypto recovery before they find themselves in an unexpected bind! That's why it's important to understand the fundamental topic of crypto asset longevity, including features such as backup, recovery, and inheritance for crypto assets. These considerations are central to long-term planning.
Technical security is paramount, but in the world of crypto, the degree to which backup and recovery solutions are foolproof for users is at least equally important. Here are the backup and recovery options for these two wallets:
Ledger Stax | Trezor Safe 5 | |
Backup & Recovery methods | Recommends Recovery Seed Phrase be written on paper, or engraved onto metallic plates. | Recommends Recovery Seed Phrase be written on paper, or engraved onto metallic plates. |
Optional paid subscription | Ledger Recover, a centralized 3rd-party cloud service, highly criticized by the crypto community. Clouds are not safe — especially when operated by multiple 3rd parties. | No. |
How do these wallets handle Crypto Inheritance?
Crypto Inheritance Features
Currently, most hardware wallets, including the Ledger Stax and Trezor Safe 5, lack any features for establishing and managing crypto inheritance. This gap presents a challenge for users who want to be sure that their crypto assets can be transferred to their heirs.
Ledger Stax | Trezor Safe 5 | |
Backup |
- Written only | - Written only - Manual sharing of shards |
Inheritance | No | No |
Decentralized backup with Vault12 | Yes | Yes |
Inheritance Management with Vault12 | Yes | Yes |
Backup and recovery differentiators
Ledger Stax Recovery Disadvantages:
- The optional Ledger Recover backup service is a paid service provided by three corporations that each hold parts of the user’s seed phrase in a Cloud. This introduces risks, as the seed phrase could potentially be accessed via subpoena; or business partners could terminate agreements or become involved in lawsuits that result in locked data or resources (like, for example, Gemini and Genesis). These scenarios contain multiple potential points of failure, and should be taken into account.
- Very important detail: The terms of the optional Ledger Recover service do not mention support for inheritance, meaning any unfortunate accident related to the user will make crypto assets unrecoverable for his or her successors. Ledger itself suggests using 3rd-party crypto inheritance services for those purposes.
Ledger Stax Recovery Advantages:
- People have different preferences. If a user is comfortable trusting a bank with their assets, they may also feel confident using Ledger Recover for securing their seed phrase backup (even though Ledger is not providing the entire Cloud backup solution).
Trezor Safe 5 Recovery Disadvantages:
- Trezor has a Multishare backup service, but it is fully manual, and challenging to maintain. The user is responsible for generating, distributing, and keeping track of the encrypted shards.
Trezor Safe 5 Recovery Advantages:
- Trezor offers the Multishare backup option for those who are able and willing to set it up.
How easy are these crypto wallets to use?
User holding a mobile phone and using Ledger Stax as FIDO U2F security key
Let's compare the key aspects of both wallets side by side, and then summarize what really stands out for user convenience:
Ledger Stax | Trezor Safe 5 | |
Display | 3,7” black and white E Ink, |
1.54" Color LCD, |
Input interface | Touchscreen |
Touchscreen, Haptic feedback |
Cable | USB-C | USB, MicroSD card slot |
Wireless | Bluetooth 5.2 | No |
Companion Apps | macOS, Windows, Linux, Android, iOS |
macOS, Windows, Linux, Android |
3rd party wallets and dapps support | 50+ | 9+ |
Password manager & 2FA | FIDO2 2FA & Passkeys, | FIDO2 2FA |
Product size & weight | 85 x 54 x 6 mm / 45g | 66 x 40 x 8 mm / 23g |
Convenience features | Battery (Up to 10 hours in use) | Magnetic dock |
Number of supported coins | 5,500+ | 1,600+ |
Price | $399 | $165 |
Trezor Safe 5 wallet and desktop software
Crypto wallet user experience differences
Ledger Stax UX Disadvantages:
- The display has a noticeable response delay due to the "E Ink" touchscreen technology, and could be irritating.
- Not all apps are ported to Stax yet. Even the native Passwords app still has no release date identified as of this article's publish date, so check in advance whether your favorite network/coin is supported.
- Extremely expensive. The value in Stax is more about design, rather than practical aspects.
Ledger Stax UX Advantages:
- Huge informative display and "Clear Signing" allows you to review and confirm all transaction details directly on Ledger Stax and in a human-readable language before they are signed and sent. This enhances security and ensures that you see exactly what you are approving in a secure and tamper-proof manner.
- Offers Bluetooth connectivity — works with or without a cable, at least with smartphones.
- Wide support for third-party wallets and dapps, allowing the Ledger Stax to sign transactions directly in MetaMask, Uniswap, and other platforms without relying on Ledger Live software. This is a huge advantage for DeFi users.
Trezor Safe 5 UX Disadvantages:
- No wireless connectivity: you always have to use a cable.
- iOS integration is view-only: you can watch your balance, but can't send transactions from iOS apps.
Trezor Safe 5 UX Advantages:
- The display is easy to read and convenient to use on a regular basis.
- The touchscreen and input are very well-thought-out experiences on Trezor Safe 5 — you can use them without any discomfort.
How do these wallets' security features compare?
Now, we dive deeper into the core specification of every hardware wallet: security features.
Ledger Stax | Trezor Safe 5 | |
PIN-code | 4 - 8 digits | up to 50 digits |
BIP39 Passphrase | Yes | Yes |
Open-source | Partial | Full |
Secure Element | Yes | Yes, and it's NDA-free |
Multisignature | Yes | Yes |
Crypto wallet security feature differentiators
Trezor Safe 5 with a void sticker on it - security seal of genuineness
Ledger Stax Security Disadvantages:
- Critical components like the Secure Element and its operating system are closed-source. This raises concerns, especially after the controversial introduction of the Ledger Recover backup service, which challenged the previous assumption that the Secure Element could never transmit the recovery seed phrase outside the hardware wallet.
Ledger Stax Security Advantages:
- Includes a Secure Element, giving Ledger devices a strong reputation for withstanding physical attacks. This is important for users who prefer not to complicate their security with BIP39 passphrases, instead prioritizing ease of use.
- Clear Signing is also a security feature.
Trezor Safe 5 Security Disadvantages:
- Trezor does not fully rely on open-source software and hardware, but mitigates this limitation architecturally, so that the seed phrase is not touched by any closed-source software on the device.
Trezor Safe 5 Security Advantages:
- Along with this new flagship product, Trezor introduces Secure Element chips, raising the security bar. More importantly, its Secure Elements are "NDA-free," which is good: the chips are not bound by Non-Disclosure Agreements (NDAs) that could restrict Trezor from publicly discussing any security flaws.
- The Secure Element is responsible for verifying device authenticity via secure boot protection, and for storing a part of the secret that is used to decrypt the recovery seed (but it never actually knows what your recovery seed is).
- Allows for longer PIN codes, which might appeal to particularly cautious users.
Have there been vulnerabilities or hacks of these wallets?
Given that both of these products under review are very new, we will examine their manufacturers' histories of hacks. There have been vulnerabilities and hacks associated with both the Ledger and Trezor products.
While relatively secure, most crypto wallets — even hardware wallets — can not provide perfect security, and are routinely subject to malware, supply chain, and firmware vulnerabilities. Here are some recent notable incidents:
Ledger Vulnerabilities:
- The Connect Kit Attack (2023): The Connect Kit breach was discovered by the security teams of Ledger.
- Ledger User Data Breach (2020): A major data breach exposed the personal information of thousands of customers, leading to phishing attacks.
- Another User Data Breach (2021): Ledger announced on Twitter that it has been targeted by rogue Shopify team members who exported over 200 merchants’ customer databases.
- Ledger Live (2020): Users were exposed to basic double spending attacks, amplified double spending attacks, and DoS attacks without user consent.
- Potential Supply Chain Attack Vulnerability (2020): Kraken Security Labs Identifies Supply Chain Attacks Against Ledger Wallets.
Trezor Vulnerabilities:
- Ability to Physically Hack Trezor T Wallet (2023): Crypto Security Firm Unciphered Claims Ability to Physically Hack Trezor T Wallet
- Five Reported Vulnerabilities in Two Models of Trezor Hardware Wallets (2019): Ledger’s Attack Lab has found five vulnerabilities in hardware wallets of its direct competitor Trezor.
- Kraken Identifies Critical Flaw in Trezor Hardware Wallets (2020): Kraken Security Labs has devised a way to extract seeds from both cryptocurrency hardware wallets offered from industry leader Trezor, the Trezor One and Trezor Model T.
Summary of Ledger Stax and Trezor Safe 5 Comparison
The Ledger Stax and Trezor Safe 5 both provide a respectable set of security measures, and support a broad spectrum of cryptocurrencies, making them suitable for diverse crypto portfolios.
The Ledger Stax is more mobile-friendly, and offers a balance of security and convenience features at a very premium price. It offers an unconventionally-large display with delayed response, with the advantage of wireless connectivity options like Bluetooth.
On the other hand, the Trezor Safe 5, at a much lower price, boasts a more open-source and NDA-free framework, a reasonably-sized display with colors, and a touchscreen interface for enhanced user interaction. However, it has fewer convenience features: it works only with USB connections, and is missing iOS integration.
The decision between the two will likely hinge on individual preferences for the target platform (mobile or desktop), and should take into account the planned frequency of use.
Whichever you choose, remember to add crypto inheritance to your choice of wallet to ensure the long-term safety of your digital assets. Both the Ledger Stax and Trezor Safe 5 are compatible with Vault12 Guard Inheritance planning.
Vault12 Guard: a decentralized solution for Crypto Inheritance
Vault12 is the pioneer in Crypto Inheritance Management, and delivers an easy-to-use and securemethod for assigning a legacy contact to your crypto wallets. This enables you to pass on your wallet seed phrases and private keys for all types of digital assets to future generations. Vault12 Guard is designed for everyday people, yet strong enough for Crypto OGs.
Vault12 Guard has a uniquely-secure design. Utilizing advanced encryption and decentralized storage, it ensures that crypto assets are not only safe but also transferable under predefined conditions, filling a critical need unmet by most traditional hardware wallets. Vault12 Guard applies a hybrid approach of software fused with the hardware-based Secure Element of phone devices (The Secure Enclave for iOS devices, and Strongbox for Google devices). Vault12 Guard's decentralized design minimizes possible points of failure. Nothing is stored on Cloud servers or Vault12 servers, and no assets are stored on local devices, making them less of a target.
From a user perspective, the Vault12 Guard app asks users to appoint one or more people (or mobile devices) as Guardians. The designated Guardians are entrusted to protect the user's comprehensive collection of wallet seed phrases and private keys, which are safely stored within a decentralized digital Vault. Its simple, user-friendly workflow removes the necessity for regularly revising wallet inventories or modifying instructions for your lawyers — a process that otherwise could lead to privacy breaches.
Both the Ledger Stax and Trezor Safe 5 are compatible with Vault12 Guard Inheritance. This addresses the seed phrase backup dilemma for any hardware wallet. It also makes less-secure backup methods, such as paper or steel plates, unnecessary.
Wallets vs Vaults — which is better?
What is the difference between Wallets and Vaults? Do you need both? In this article, we'll dive into their key differences and why you need both for backup and inheritance.
What is the difference between a Wallet and a Vault?
What is a crypto wallet? You can set up a crypto wallet to interact with blockchain networks in order to send, receive, buy, and sell cryptocurrency. Your wallet uses a unique, secret private key to digitally sign your transactions on the blockchain, proving that it's really you authorizing transactions. In other words, you use your crypto wallet to perform your crypto transactions on a blockchain network.
A vault, on the other hand, is completely inert. It's completely separate from your blockchain activity. No transactions are going on. It's simply a place to store valuable things like seed phrases, passwords, private keys, and digital art.
So a vault is completely different from a wallet in some major ways:
- Security — A digital vault is significantly more secure. It prioritizes long-term security, and is ideal for digital inheritance.
- Accessibility. Wallets are used for day-to-day crypto transactions. Vaults are more appropriate for preserving your digital assets for inheritance and ensuring that heirs can securely access them when the time comes. Vaults maintain long-term accessibility to your crypto.
What is the Vault12 app?
The Vault12 Guard app is an intelligent digital vault that can back up and support the inheritance of your digital assets like passwords, PINs, seed phrases, private keys, files associated with your NFTs, and digital artwork. It safeguards basically everything that you know and love in the world of crypto.
Why do you need both a wallet and vault?
There are three reasons why you should have both a wallet and a vault for your digital assets.
- The first reason is backups. It's very important that you've backed up your precious assets, whether they're PINs, passwords, seed phrases, or artwork. Everything should have a backup that is available to you should you need to access it.
- The second reason is inheritance. It's very easy to lose track of assets that you need to pass on to the next generation. Having a single inventory in one place with all of your digital assets, all of the instructions, PINs, passwords, seed phrases, private keys, and digital artwork that you want to pass on in the case of incapacitation, or when you pass, and having a mechanism to smoothly transfer them is really important. This is not something you can do with a wallet.
- The third reason is that centralized custodial services are prone to loss. We've seen this time and time again over the last decade. Custodial services are susceptible to fraud and hacking. They're subject to companies going bankrupt and users losing all of their assets. In contrast, the Vault12 app provides a distributed, self-custody backup.
$6 Trillion of Crypto Assets to Be Inherited by 2045
How will you manage your crypto inheritance?
Over the next two decades, up to $6 trillion in crypto could be inherited, as younger investors favor digital assets over traditional stocks and bonds. Learn how this shift is reshaping wealth transfer and the future of investing
Unprecedented Asset Transfer via Inheritance by 2045
A recent report, the 2024 Bank of America Private Bank Study on Wealthy Americans, reveals key trends related to inheritance, and particularly how younger generations view the future of wealth, including crypto and estate planning.
An astounding $84 trillion of wealth transfer is projected over the next 20 years from current generations to Gen X, Millenials and Gen Z. Renowned expert Matthew Sigil, head of digital assets research at Van Eck (a prominent issuer of Bitcoin ETFs) has estimated that of this amount, $6T in crypto assets will be passed on via inheritance.
This transfer will be successful only if care and attention are paid to crypto inheritance planning and management, and if the right approaches are in place to support the technical transfer of these funds. Crypto assets are technically different in a number of ways to traditional assets, so inheritance needs to be carefully choreographed between asset owners, Trust and Estate Lawyers, and intended crypto beneficiaries.
Despite the fact that important steps must be taken for the safe, secure, and private transfer of crypto assets, none of the participants in the crypto ecosystem have offered inheritance plans or services. The pioneer of crypto inheritance management since 2015 has been Vault12.
Vault12 has built and continues to innovate a comprehensive solution that is easy to use for non-technical participants, yet incorporates a highly secure architecture and technology that is designed to preserve your crypto wealth and ensure successful transfer to your heirs. Learn more at vault12.com.
The Bank of America Private Bank Study
This report by Bank of America Private Bank analyzes financial outlooks, investing habits, and estate planning practices of wealthy Americans. The study reveals a generational divide, with younger wealthy individuals exhibiting different investment preferences than older generations. Younger individuals tend to be more skeptical of traditional investment strategies, and favor alternatives like cryptocurrencies and private equity. The study highlights the challenges facing wealthy families as they navigate wealth transfer, including the emotional strain of inheritance and the increasing burden of serving as trustee or executor.
Takeaways
- Great Wealth Transfer: Approximately $84 trillion is projected to transfer from seniors and baby boomers to Gen X, millennials, and their heirs by 2045.
- Crypto Inheritance Surge:Matthew Sigel of VanEck Investments estimates that up to $6 trillion could enter the crypto market through inheritance in the next 20 years.
- Investment Shifts: Millennials and Gen Xers will inherit $84 trillion, with a growing proportion of cryptocurrencies.
- Young Investor Participation: To reach the $6 trillion estimate, young investors (ages 21-43) need to allocate 14% of their inherited wealth to crypto: about $300 billion annually.
- Broader Investment Preferences: Many young investors view traditional stocks and bonds as insufficient for superior returns, preferring high-growth assets like cryptocurrencies.
- Risk Appetite by Generation: Younger investors show a higher risk tolerance, with significant crypto allocations (14%-17%) compared to older investors, who remain conservative.
- Crypto Exposure: Younger investors hold the highest average exposure to crypto, highlighting a shift in how the next generation approaches digital assets.
Sources:
2024 Bank of America Private Bank Study of Wealthy Americans
VanEck: $6 Trillion Could Pour Into Bitcoin, XRP and Crypto via Inheritances Over 20 Years
Crypto and Digital Asset Allocations
Bank of America 2024 Private Bank Study on Wealthy Americans
Crypto, Inheritance, and Wealth Management in Younger Generations
The 2024 Bank of America Private Bank Study on Wealthy Americans focuses on several key trends related to inheritance, particularly how younger generations view the future of wealth, including crypto and estate planning.
1. Crypto and Digital Assets
Younger generations (ages 21-42) are more inclined to see digital assets like cryptocurrency as a key growth opportunity. Around 28% of younger respondents ranked crypto as a promising investment vehicle, significantly higher than older generations, where only 4% expressed the same confidence. This highlights the generational shift towards embracing newer financial instruments like blockchain and decentralized finance.
2. Inheritance and Estate Planning
Interpersonal family dynamics can create tension during wealth transfers. For both younger and older wealthy individuals, unequal distribution of assets and a lack of clear instructions or communication were common sources of strain. Younger generations are more focused on including hard assets like jewelry and heirlooms — which are frequently overlooked in formal planning — in their estate plans.
3. Generational Differences in Wealth Management
Younger heirs are more likely to pursue alternative investment strategies, such as private equity and digital tools, reflecting their broader interest in controlling their wealth. These individuals also prioritize sustainability and impact investing as part of their inheritance planning, distinguishing their approach from older generations.
These insights demonstrate the ongoing generational divide in attitudes toward wealth management and the evolving role of digital assets in estate planning.
Inheritance and Estate Planning "Strain Points"
Factors driving strain on inheritance-related issues
Bank of America 2024 Private Bank Study
What you need to know about Crypto Inheritance Planning
Unlike traditional assets, crypto assets need to be managed differently from an inheritance standpoint. In fact, the only similarity between traditional and digital assets is that you must maintain an update inventory of them. The main challenges associated with crypto inheritance are:
- Inventory of crypto assets: You must carefully maintain an inventory of crypto assets. This means backing up seed phrases and/or private keys of all crypto wallets, across all blockchains, and all types of devices or places where those wallets exist, e.g., mobile phones, hardware wallets, cloud, and paper backups. Any assets that are not documented in your backup are liable to be lost.
- Privacy of all information:You must ensure absolute privacy of the backup information. Anyone with access to private keys or seed phrases will be able to compromise the funds. This includes ensuring that any documentation left with your lawyers is strongly protected.
- Critical Points of Failure: You must eliminate personal devices and cloud services as critical points of failure. The most significant risk in inheritance is reliance on individual devices, which can be stolen, lost, or damaged. The second risk is the dependency on one or more cloud servers. We have seen what happens when business relationships between cloud partners face legal challenges, or cloud services are disrupted by malware or bad software updates.
- Technical Beneficiary awareness: As the varieties of crypto assets expand over time, staying aware of them becomes important. You will need to designate someone technically fluent in this area. They may not be the ultimate beneficiary; however, you will need to trust them to distribute the assets per your wishes.
- Trust & Estate Attorney: You must consult with experienced lawyers who are well versed in inheritance of crypto assets. A great resource is "A Practical Guide to Estate Administration and Crypto Assets" by Richard Marshall from Hill Dickinson LLP.
Why Choose Vault12 Guard for Crypto Inheritance Management?
Vault12 is the pioneer of crypto inheritance management, and Vault12 Guard is the first solution to offer a simple, direct, and secure way for all types of investors to ensure that all of their crypto assets can be accessed by future generations.
Consider that:
- Traditional approaches to the inheritance of assets, when applied to digital assets, create complexity and risk.
- Your portfolio of digital assets is continually changing — you cannot rely on doing an inventory once, or for that matter continuously, without assistance.
- A simple and direct approach like Vault12 Guard reduces the uncertainty around assets not being available to the designated recipient. It also avoids having to approach and petition each service individually during probate to gain access.
- Inventory of crypto assets: The first step in inheritance is backing up all your crypto wallets. Vault12 makes this as easy as possible - despite the appalling lack of usability in current hardware and software wallets. There will always be new crypto assets on new blockchains, and Vault12 can manage any crypto asset on any device, on any blockchain, now and in the future.
- Privacy of all information:Your crypto assets are protected via a Secure Element (Secure Enclave in iOS, and Strongbox on Google Android phones), and the encryption used is Quantum-safe. With this security, no one knows what assets are part of your Vault.
- No Critical Points of Failure: No assets are stored locally, no assets are stored in any cloud, and no assets are stored at Vault12. There are no devices to lose, no paper backups, and no need to manually give encrypted assets to a subset of people. The Vault12 system is decentralized, making it a difficult target for hackers — and in fact for any type of failure.
- Confidence in a Technical Beneficiary: With Vault12 you get to designate a trusted technical beneficiary. Should you change your mind, you can swap them out at any time.
- Flexibility in Trust & Estate Attorney: While regulations and guidelines for inheritance planning can vary from state to state and country to country, Vault12 Guard is designed to be independent of whatever legal framework you choose to govern the inheritance of your assets. Vault12 Guard is simply a transfer mechanism that ensures all your crypto assets are passed from your control to a designated technical beneficiary.
Key Product Features of Vault12 Guard
The Vault12 platform provides your crypto assets with the highest security and strong backup resilience. Vault12 Guard Inheritance enables you to designate a beneficiary (an executor, trustee, or other chosen beneficiary) who can inherit the entire portfolio of digital assets that you choose to store in your Vault. There is no need to update an inventory continually or to issue updated instructions.
- Unified Digital Vault: Use Vault12 Guard Digital Vault to store digital assets, including cryptocurrency, financial login information, legal documents, medical records, and more.
- Guardian Network: The Vault is protected by your network of Guardians: friends, family, and/or business associates — people that you know and trust.
- Beneficiary Designation: Designate a beneficiary from your chosen Guardians. A declaration is then digitally signed, and can be emailed to other parties, such as lawyers.
- Trigger-Based Access: As a Vault Owner, you can configure a legally-defined trigger such as incapacitation or death. When the trigger occurs, the beneficiary indicates they are ready to access the digital assets. Assets are unlocked and transferred to the beneficiary only when a designated number of Guardians approve the request.
- Preemptive Veto Option: Should the beneficiary attempt to access the assets before they are intended to, the owner can veto the request before any of the Guardians receive an approval request.
.
Media
Vault12 Guard provides inheritance, and secure decentralized backup of seed phrases and/or private keys, giving Bitcoin (BTC), Ethereum (ETH).
View all articlesSuccession Spotlight Series - Vault12 Guard
Crypto Succession Substack
Welcome to our Succession Spotlight Series, where we will be taking a deep dive with guests to explore solutions, issues and services for those holding decentralised assests.
In our first instalment I have the pleasure of introducing Wasim Ahmad of Vault12 Guard.
I met Wasim last year at NFT_NYC London, where we discussed all things Web3 Inheritance.
We caught up earlier this month in New York at NFT_NYC where Wasim told me more about the exciting relaunch of Vault12 Guard in this Q&A:
What is Vault12 Guard?
Vault12 Guard is a security, inheritance, and self-custody backup app that enables you to safely store your web3 wallet seed phrases, private keys, NFT media, and digital art inside a digital Vault. All your assets are encrypted and split and sent to “Guardians” that you choose for safekeeping. When you need them or when the need for inheritance arises, Guardians are able to release the pieces of encrypted assets, so they can be recombined and accessed.
Our app is designed for ordinary consumers who have purchased crypto and NFTs from a variety of exchanges and marketplaces across any blockchain and on any phone (iOS and Android).
What is your role at Vault12?
As in all startups, everyone wears multiple hats - I led our fundraising efforts and subsequently have focused on expanding our customer base to a robust 60,000+ clients.
What can be stored with Vault12 Guard?
Basically, your Vault can store any digital asset or file; typically, people are storing seed phrases, private keys, backing up their web3 wallets (with their NFTs) and also the digital media associated.
How is Vault12 Guard helping to secure access to Web3 Assets?
All web3 assets are tied to the blockchain and, therefore to web3 wallets which are the interface to those assets. These wallets are protected via private keys, and seed phrases and Vault12 Guard backs those up in a digital Vault, ensuring that whenever you change web3 wallets, lose them, or forget the seed phrase you have a way to access those assets using what is stored in the Vault.
How is Vault12 Guard ensuring this is still the case when the asset holder dies?
The biggest problem with corralling web3 assets for inheritance is keeping track of them - across every exchange, every blockchain, every marketplace, every gallery. There’s no one place to go to access all of your assets. This is where Vault12 Guard comes in; by routinely backing up every web3 wallet, you always have an accurate inventory of all the assets - so when the time comes for an inheritance, the entire Vault can be passed directly to a named individual. This person can then work with lawyers, executors etc… to get the assets to the rightful heir.
For the hardcore tech fans:
Which Wallets do Vault12 Guard support?
No restrictions - all wallets are supported - we are not constrained by wallet integrations or blockchains.
What blockchains does Vault12 Guard operate on?
Vault12 Guard is not tied to any one particular blockchain - assets from anywhere can be stored and retrieved.
How will Vault12 Guard play with Smart Wallets ERC 4337?
First, let’s cover the common ground: ERC 4337 Account Abstraction has come about because the management of web3 accounts via private keys and seed phrases is cumbersome. While it has worked for OG crypto gurus it really doesn’t scale to where we all believe adoption will go - for everyone. So Smart Wallets rely on smart contracts to handle the nitty-gritty of account/key management and enable things like social recovery - the ability to recover wallet assets via a network of designated individuals - just like Vault12 Guard does with Guardians. Instead of using multi-signatures, Vault12 Guard uses an enhanced form of Shamir’s Secret Sharing designed to be simple for a non-technical customer.
The difference comes in the technical implementation — ERC 4337 is bound to the Ethereum blockchain. You don’t have to trust seed phrases and private keys - but you have to trust a smart contract running on a specific blockchain. Given that many popular web3 assets do not in fact reside on Ethereum blockchain, this presents a problem — it’s a great idea, but it is not going to work for everyone, everywhere, all the time.
Vaut12 Guard was designed specifically to be distributed, decentralized, and peer-to-peer and be independent of the underlying blockchain, cryptocurrency, and device. So we love the idea of ERC 4337, and our implementation of solving the same problem is far more wide-reaching.
Planning to pass on decentralised assets is key, and anyone looking for more information about Vault12 Guard can find out more at https://vault12.com/
Disclaimer:Guests, products and services featured in the Succession Spotlight Series are not endorsed or recommended by Crypto Succession Hub and the series does not represent any advertising of or association with any products or services. As ever, do your own research.
Digital art frenzy raises questions for tax, law enforcement
Blockchains where cryptocurrencies and NFTs are traded are seen as vulnerable
MINTED – The NFT Collective
NFTs shall be the future driving force of the future creator economy. We will dive into the market stabilization of NFTs and what the next decade and beyond looks like.
NFT Success Factors
- Sean Dickens, Journalist, CoinRivet
- Avery Akkineni, President of VaynerNFT
- Wasim Ahmad, Chief Crypto Officer, Vault12
- Sachi Kamiya, Investments Lead at Polygon Ecosystem Fund
This year we have witnessed an explosion of NFTs, non-fungible tokens. Explore the future of digital asset collectibles. NFTs shall be the future driving force of the future creator economy. We will dive into the market stabilization of NFTs and what the next decade and beyond looks like.
Keynote: Security & Privacy Conference
Privacy and security concerns remain an essential part of this industry and hold the keys to success. Join us in learning more about the key players in the security space and how to best capture the emerging trend that is privacy.
24 August 2021
- Wasim Ahmad, Chief Crypto Officer, Vault12
Blockchain & crypto industry continues to thrive and grow worth over 1.2T in value. Billions have been stolen as a result of hacks, scams, and other vectors of attacks on the digital asset space. The importance of privacy and security has never been more necessary than it is now as cash starts to turn into digital currency and institutions begin to adopt it. We will explore themes and trends of privacy and security within digital assets within our three-hour virtual conference. Privacy and security concerns remain an essential part of this industry and hold the keys to success. Join us in learning more about the key players in the security space and how to best capture the emerging trend that is privacy.