how so? the whole process is untouch with the internet 🤔
10 sats \ 0 replies \ @nyan 11 Jun
I think what @joda means that you have a single point of failure here. In order to transact, you need to sign with this wallet and however you do it, in this process malware can extract the private key from your wallet. Having hardware signing devices mitigates this attack vector to a huge extent. You of course open a new attack vector by trusting the manfacturer, therefore, you should use devices from at least two different ones in a multisig.
reply