Paper, Software, or Hardware: Why Trezor Beats Ledger for Cryptocurrency Security

ChiefGyk3D
4 Aug 202413:06

Summary

TLDRIn this video, the speaker discusses their journey with cryptocurrency, focusing on security and the evolution of their wallet choices. Starting with software wallets, they transitioned to Ledger hardware wallets for added security, appreciating the secure element and transaction confirmation features. However, they express concerns about Ledger's reliance on a central authority for recovery keys. The speaker then introduces the Trezor Safe 3, highlighting its open-source nature, secure element, and the innovative Shamir Shard feature for splitting key recovery into multiple pieces, enhancing security. The video is a blend of personal experience and a deep dive into the technical aspects of cryptocurrency wallets.

Takeaways

  • πŸ˜€ The speaker is transitioning from using Ledger hardware wallets to Trezor Safe 3 for enhanced security.
  • πŸ”’ The speaker has always been interested in cryptocurrency from a cybersecurity perspective and has been involved since 2010.
  • πŸ’‘ The speaker uses a hot wallet for active transactions and a semi-cold wallet for longer-term storage, in addition to paper wallets for long-term holdings.
  • πŸ›‘οΈ Ledger wallets were chosen for their secure element feature, providing anti-tamper protection, which Trezor lacked initially but has now incorporated in the Safe 3.
  • πŸ“ˆ The speaker started with software wallets and paper wallets but moved to hardware wallets for better security against online threats.
  • πŸš€ The original Ledger Nano S was appreciated for its simplicity and secure element, but the speaker upgraded to the Nano X for its ability to hold more cryptocurrencies.
  • πŸ”‹ Disadvantages of the Ledger Nano X included a battery, which had issues, and Bluetooth connectivity, which the speaker does not favor for security reasons.
  • πŸ› οΈ The Trezor Safe 3 was chosen for its open-source nature, secure element, and the ability to create a more customized and secure setup.
  • πŸ”‘ The Trezor Safe 3 introduces the Shamir Shard feature, allowing for the splitting of a key into multiple parts for enhanced security.
  • πŸ”„ The speaker dislikes Ledger's reliance on a central authority for recovery keys and prefers the self-sovereignty offered by Trezor's open-source approach.
  • πŸ”„ The speaker emphasizes the importance of tinkering and learning about the technology behind cryptocurrencies rather than just focusing on financial gains.

Q & A

  • Why is the speaker interested in cryptocurrency?

    -The speaker is interested in cryptocurrency due to their fascination with digital money, its security, transferability, and the technology behind it, rather than for financial gain.

  • What are the different types of cryptocurrency wallets the speaker uses?

    -The speaker uses three types of wallets: a hot wallet for active use, a semi-cold wallet for storing cryptocurrencies long-term and making trades, and paper wallets for exclusive long-term holdings.

  • Why did the speaker initially choose Ledger wallets?

    -The speaker chose Ledger wallets because they included a secure element, which provides additional protection against tampering, and because they offered a simple and reliable way to secure their digital assets.

  • What are the main differences between Ledger Nano S and Ledger Nano X?

    -The Ledger Nano S can hold only 4-5 cryptocurrencies at a time and has no battery or Bluetooth capability, whereas the Ledger Nano X can hold up to 127 cryptocurrencies, has a battery, and supports Bluetooth connections.

  • Why is the speaker moving from Ledger to Trezor?

    -The speaker is moving to Trezor because the new Trezor Safe 3 includes a secure element, offers more open-source options, and avoids the need to rely on another company's infrastructure for key management.

  • What security measures does the speaker use for their seed phrases?

    -The speaker uses a steel tablet to store their seed phrases, anti-tamper stickers for added security, and sometimes splits the seed phrases into multiple parts (shards) to enhance security further.

  • What is a Shamir Shard and why is it useful?

    -A Shamir Shard splits a seed phrase into multiple parts, requiring a minimum number of parts to recover the full seed phrase. This adds a layer of security by distributing the parts to different locations, making it harder for someone to steal the entire seed phrase.

  • What are the speaker's thoughts on Bluetooth and batteries in hardware wallets?

    -The speaker is not a fan of Bluetooth or batteries in hardware wallets, as they believe Bluetooth is not secure and batteries can fail or cause issues, preferring simpler, more reliable devices without these features.

  • How does the speaker feel about the open-source nature of Trezor wallets?

    -The speaker appreciates the open-source nature of Trezor wallets, as it allows for greater transparency and the ability to build or modify the hardware and software independently if desired.

  • What is the speaker's overall approach to cryptocurrency and security?

    -The speaker approaches cryptocurrency from a cybersecurity and technology perspective, focusing on the security and architecture of digital assets rather than on speculative financial gains.

Outlines

00:00

πŸ”’ Introduction to Ledger Wallets and Cryptocurrency Security

The speaker begins by introducing the topic of cryptocurrency security, particularly focusing on Ledger hardware wallets. They share their longstanding interest in cybersecurity and digital money, emphasizing a practical approach rather than speculative enthusiasm. The speaker explains their use of multiple Ledger wallets for different purposes: a 'hot' wallet for active transactions, a 'semi-cold' wallet for longer-term storage, and paper wallets for even more secure, long-term holdings. They provide background on their experience with Bitcoin and other cryptocurrencies since 2010, discussing the evolution from software wallets to more secure hardware solutions.

05:00

πŸ”„ Ledger Wallets: Evolution and Preferences

The speaker discusses the progression of their use of Ledger wallets, starting with the Nano S and moving to the Nano X. They explain the limitations of the Nano S, which could only hold a few cryptocurrencies at a time, leading them to upgrade to the Nano X, which supports up to 127 cryptocurrencies. However, the speaker expresses concerns about the Nano X's built-in battery and Bluetooth capability, which they perceive as security risks. They prefer the simpler Nano S Plus for its reliability, secure element, and lack of unnecessary features. The speaker concludes by outlining their multi-tiered wallet system: a hot wallet, a semi-cold wallet, and paper wallets for different security levels.

10:01

πŸ”§ Transitioning to Trezor and Enhanced Security Measures

The speaker explains their decision to transition from Ledger to Trezor wallets, particularly the Trezor Safe 3, due to its open-source nature and inclusion of a secure element, addressing concerns they had with Ledger’s security practices. They appreciate the transparency and customization options Trezor offers, including the ability to build a wallet from scratch using a Raspberry Pi. The speaker also discusses the initial setup process for the Trezor wallet, which includes installing firmware, and highlights the security features like anti-tamper seals and secure USB connections. They also critique Ledger's reliance on proprietary systems, which limits user control over key management.

πŸ” Introducing Shamir Sharding for Enhanced Key Security

The speaker introduces Shamir Sharding, a security feature available with Trezor that allows a user to split their recovery seed into multiple shards, requiring a minimum number of shards to restore the wallet. They explain how this method enhances security by distributing the risk, making it harder for a single point of failure to compromise the wallet. The speaker unboxes the Shamir Shard kit, explaining its components and how it works. They express excitement about exploring this feature further and emphasize their interest in cryptocurrency technology rather than speculation. The speaker concludes by wishing the audience well and encouraging them to focus on the technology behind cryptocurrency.

Mindmap

Keywords

πŸ’‘Ledger Hardware Wallets

Ledger hardware wallets are devices used to securely store and manage cryptocurrencies. In the video, the speaker discusses his use of Ledger wallets, highlighting their secure elements and their role in protecting digital assets from malware and online threats.

πŸ’‘Cryptocurrency

Cryptocurrency refers to digital or virtual money that uses cryptography for security. The speaker has a long-standing interest in cryptocurrency due to its fascinating concept and the challenges of securing and transferring digital money. Examples mentioned include Bitcoin, Litecoin, and Monero.

πŸ’‘Seed Phrase

A seed phrase is a set of words generated by a cryptocurrency wallet that allows access to the wallet’s funds. The speaker mentions using seed phrases for both of his Ledger wallets and explains their importance in securing access to his assets.

πŸ’‘Tresor Safe 3

Tresor Safe 3 is a hardware wallet known for its open-source nature and enhanced security features, including a secure element. The speaker prefers Tresor over Ledger due to its transparency and the ability to self-host key recovery services, which enhances trust and control over his digital assets.

πŸ’‘Hot Wallet

A hot wallet is a cryptocurrency wallet that is connected to the internet, making it convenient for regular transactions. The speaker uses a Ledger wallet as his hot wallet for more active use and immediate access to funds.

πŸ’‘Cold Wallet

A cold wallet is a type of cryptocurrency wallet that is kept offline to provide enhanced security for long-term storage of assets. The speaker uses a second Ledger wallet as his semi-cold wallet for less frequent trades and more secure holdings.

πŸ’‘Paper Wallet

A paper wallet is a physical document that contains a cryptocurrency address and private key, typically in the form of a QR code. The speaker uses paper wallets for his long-term holdings, emphasizing their security for offline storage.

πŸ’‘Shamir Shard

Shamir Shard is a method of splitting a cryptocurrency seed phrase into multiple parts (shards) for enhanced security. The speaker discusses Tresor's use of Shamir Sharding, which requires multiple shards to restore the wallet, thus increasing security by distributing the seed phrase across different locations.

πŸ’‘Secure Element

A secure element is a tamper-resistant hardware component designed to securely store cryptographic keys. The speaker prefers hardware wallets like Ledger and Tresor Safe 3 that include secure elements for added protection against physical tampering and unauthorized access.

πŸ’‘Open Source

Open source refers to software or hardware whose design is publicly accessible, allowing anyone to inspect, modify, and enhance it. The speaker values Tresor's open-source approach, which contrasts with Ledger's more proprietary model, as it provides greater transparency and control over his cryptocurrency security.

Highlights

Introduction to security upgrades and the speaker's transition from Ledger to Tresor wallets.

Background on the speaker's interest in cryptocurrency, cyber security, and digital money.

Explanation of the different types of cryptocurrency wallets: hot wallets, semi-cold wallets, and paper wallets.

Detailed overview of the speaker's use of two Ledger wallets, each with independent seed phrases.

Introduction to paper wallets for long-term cryptocurrency holdings.

History of the speaker's involvement in cryptocurrency since 2010-2011.

Description of the early use of software wallets like Bitcoin Core and Dogecoin Core.

Transition from software wallets to hardware wallets for improved security.

Advantages of Ledger wallets, including the secure element for anti-tamper protection.

Comparison of Ledger and Tresor wallets, highlighting the open-source nature of Tresor.

Speaker's personal experience with building a Tresor wallet using a Raspberry Pi Zero.

Critique of Ledger's approach to key management and the introduction of the Tresor Safe 3.

Overview of the Shamier Shard system for enhanced security in key storage.

Details on setting up Shamier Shards and the benefits of distributing shards across different locations.

Final thoughts on the speaker's passion for cryptocurrency technology and their focus on security rather than speculation.

Transcripts

play00:00

well hello Internet I didn't see you

play00:02

come in we're going to be talking about

play00:03

some security upgrades as well as the

play00:05

end of an era for myself and we're going

play00:08

to be talking about these Ledger

play00:09

Hardware wallets over here and what I'm

play00:11

moving on from why I got into them and

play00:14

why I architect things the way I do so

play00:16

I've always been interested in

play00:17

cryptocurrency as someone who is

play00:19

interested in cyber security and

play00:21

Technology I've never been one of those

play00:22

we're going to go to the Moon Bros I've

play00:24

just always been fascinated with the

play00:26

concept of digital money and how it can

play00:29

be you know secured and transferred

play00:31

architected how we can protect people's

play00:33

assets around it and we're going to be

play00:36

talking about Ledger and we're going to

play00:38

be talking about what I eventually am

play00:39

transferring into with the Tresor safe 3

play00:42

and how I'm using Tresor to enhance my

play00:45

Security even further than Ledger but

play00:48

we're going to get some backstory here

play00:49

first to talk about why I got into

play00:51

Ledger why what the different types of

play00:54

uh you know cryptocurrency wallets are

play00:56

out there and why I'm doing things the

play00:59

way I am so let's start off with the

play01:02

fact that I have two Ledger wallets if

play01:04

you noticed and I actually use both of

play01:06

these they're not a backup of the other

play01:07

one they're both independent of each

play01:09

other with their own seed phrases and

play01:12

the way that this works is I have a hot

play01:13

wallet which is my more active wallet

play01:15

that I use and I have my semic cold

play01:17

wallet which is the wallet that I use

play01:19

for you know uh storing different

play01:21

cryptocurrencies and stuff in longer

play01:22

term this is maybe like what I would do

play01:24

trades on or you know my more risky

play01:26

things maybe some pocket money

play01:28

equivalent of it and then of course

play01:29

course I have my third tier on top of

play01:31

that which is paper wallets which are

play01:34

exclusively for long-term Holdings and

play01:36

they are what they sound like they are

play01:38

pieces of paper that I printed out with

play01:39

a QR code and a string of characters so

play01:41

that I can recover and swipe those coins

play01:43

in at a later point so I've been doing

play01:45

that for many years with Bitcoin and

play01:47

even Litecoin back in the day and you

play01:49

know Monero things like that but the

play01:52

reason why I got into Ledger wallets

play01:55

around 2016 2017 I've been doing

play01:57

cryptocurrency for over a decade I mean

play01:59

I think I started around 2010 2011 it

play02:02

was worthless it was just an idea

play02:04

somebody had out there and we're like

play02:06

hey I can use my computer to possibly

play02:07

make money and you know it wasn't like

play02:10

you know money like we were thinking

play02:11

like you know go to the Moon it was I

play02:13

can make a couple bucks that's literally

play02:15

when I say a couple bucks I mean like

play02:16

we're talking a dollar or two it was

play02:18

just like the the idea of digital money

play02:21

was more amazing to us than the idea of

play02:24

Financial Freedom which some Crypt Bros

play02:27

have gotten about if you're looking for

play02:28

a crypt bro video and a person that's

play02:30

going to tell you buy this coin we're

play02:31

going to go to the moon go somewhere

play02:33

else we're talking about this from a

play02:35

cyber security professional perspective

play02:37

somebody who likes technology somebody

play02:38

who likes to research the Technologies

play02:40

and is genuinely fascinated in the tech

play02:44

and how we can architect everything

play02:46

around it so I even built some you know

play02:49

uh Bitcoin Miners and stuff back in the

play02:51

day when GPU mining was a thing but you

play02:53

know we started out with software

play02:55

wallets so I remember using the Bitcoin

play02:56

core wallets and all of those I remember

play02:58

the Dogecoin core wallet I remember we

play03:00

were literally mining Dogecoin as a meme

play03:03

before people actually took it seriously

play03:04

like we knew we were wasting our time

play03:07

Dogecoin was the idea of you would

play03:09

mindless to learn about cryptocurrency

play03:11

and how it works and all that it was

play03:13

literally made as a meme and a joke but

play03:15

I digress so we had software wallets and

play03:18

we had paper wallets and the idea with

play03:19

the software wallet is it's a piece of

play03:21

software on your computer or phone and

play03:23

the issue with that of course is that

play03:24

it's on your phone or computer which you

play03:26

regularly access the internet and many

play03:28

other things so if you have malware or

play03:29

such like that it can come in and swipe

play03:31

all of your things out so that of course

play03:33

is a problem so we need to talk about

play03:35

how to secure all those things and

play03:36

that's where the Advent of Hardware

play03:38

wallets came about now of course you

play03:40

have Tresor over here open source the

play03:43

one issue that I had with them is that

play03:45

they didn't have a secure element and

play03:47

this trasor wallet just so you know this

play03:49

is one I made myself with a Raspberry Pi

play03:51

zero they're very open source and I 3D

play03:53

printed a case so I've actually been

play03:55

tinkering with Tresor for a while but

play03:58

Ledger had a secure element so what that

play04:00

is is it's a additional chip on here

play04:03

that allows some uh anti-tamper

play04:05

protection so that way if somebody gets

play04:08

your device yes they you can either

play04:10

Brute Force the pin but there are some

play04:11

additional protections that if to

play04:14

prevent it from tampering they're not

play04:15

fullprof of course because once you have

play04:17

physical access to any device you can do

play04:19

whatever you want so there are you know

play04:20

ways to modify that but it helps get a

play04:22

little additional layer of protection if

play04:25

you will and trasor didn't have that I

play04:27

even have the trasor Model T somewhere

play04:29

in my uh shelves where I was playing

play04:31

with that and it had as little

play04:33

protection as this Raspberry Pi zero in

play04:35

that case but nonetheless Ledger had

play04:38

that so originally I had The Ledger Nano

play04:40

s this is the Nan S Plus uh I don't have

play04:42

the Nano s here at somewhere um but the

play04:45

idea was with The Ledger Nano s that I

play04:47

liked with was that you could you know

play04:50

just have a very simple device that

play04:52

would allow with secure element on there

play04:55

so that you could protect your assets

play04:57

and then I could also make sure that if

play05:00

I wanted to transact I had to confirm

play05:02

the transaction on the hardware wallet

play05:04

as well as the entire seed is generated

play05:07

on the Harbor wallet it stays on the

play05:09

seed with only the public view key being

play05:11

exported to the device so that it can

play05:13

actually view the things you still have

play05:14

to press the buttons to actually confirm

play05:16

transactions and such and then

play05:18

eventually I got The Ledger Nano x uh uh

play05:20

because well the Nano s is great but the

play05:24

original one only held four or five

play05:25

cryptocurrencies at a time so you would

play05:28

have to swap between wallets your

play05:30

cryptocurrency was tied to that seed

play05:32

phrase you could uninstall the the app

play05:34

running that cryptocurrency on the

play05:36

wallet but then you'd have to reinstall

play05:38

it if you want it was very cumbersome so

play05:40

the Nano X went from allowing you to

play05:42

have four or five to 127 and that was

play05:44

the main reason but one reason I didn't

play05:46

like that the X was it had a battery in

play05:49

there as well as it allowed Bluetooth

play05:51

connection I'm not a fan of Bluetooth

play05:53

it's not the most secure thing in the

play05:54

world it was designed as a wireless

play05:55

serial equivalent that's a whole other

play05:57

video that we can go into with rs23 2

play05:59

and everything at another time but

play06:01

nonetheless I don't like Bluetooth I

play06:02

don't even like Bluetooth headphones I I

play06:05

like hard wirring my things and a

play06:07

battery was just another issue on a

play06:09

device which this battery had issues

play06:12

well the prior one had issues so I had

play06:14

to buy another X because the battery

play06:15

kept messing up it actually kind of like

play06:17

imploded and then broke that which is

play06:19

why I really like the Nano s+ less

play06:21

expensive same capabilities as The

play06:23

Ledger nanox no Bluetooth no battery a

play06:26

lot more simple a lot more reliable but

play06:29

with that being said had a secure

play06:31

element and I have you know of course

play06:34

three wallets we have the hot wallet

play06:37

semi-old wallet and we have the paper

play06:39

wallet moving on from there Tresor

play06:42

finally released the trasor safe 3 and

play06:45

they also have the save five now but the

play06:46

save three is more than enough and they

play06:48

have different colors so I got not one

play06:50

but two of these guys to replace the

play06:54

ledgers because the safe 3 has a secure

play06:57

element in there not only that they have

play06:59

additional security and they're a lot

play07:01

more open source and I don't like how

play07:03

Ledger has ADD this whole esro key thing

play07:07

where you're trusting them more rather

play07:09

than building your own infrastructure

play07:11

because the honest truth of is is if

play07:12

Ledger actually released the tools for

play07:15

us to host our own asod Keys like many

play07:18

of us want to do we want to maybe throw

play07:21

up a Raspberry Pi in our own Rack or uh

play07:24

a server on something else that we can

play07:26

monitor and control so that if we lose

play07:28

it we can restore it from our own Astro

play07:30

rather than relying on another company I

play07:32

wouldn't have nearly as much of a

play07:34

complaint but with that being said that

play07:37

was kind of the final straw for me to

play07:38

look at different solutions so tror safe

play07:41

3 has a lot better benefits in my mind

play07:44

it's a lot more open source from end to

play07:47

end open source like I said you can make

play07:50

your own Hardware wallet over here like

play07:53

I did with my Raspberry Pi zero whereas

play07:56

The Ledger you got to buy it from Ledger

play07:58

you got to make sure that you know you

play08:01

um uh get it and uh you can trust them

play08:04

whereas Ledger there are ways for you if

play08:07

you want to make your own safe 3 to buy

play08:09

the printed circuit board and remake

play08:11

this entire thing I saw projects out

play08:13

there for people that were selling the

play08:15

pieces for me to solder on to make my

play08:18

own Model T if I really wanted to go

play08:19

about doing that if you want to do micro

play08:21

soldering and all that be my guest I was

play08:23

not a fan of that so but trasor out of

play08:25

the box even like has you install the

play08:28

firmware as step zero on this guy

play08:30

whereas Ledger out the box is ready to

play08:32

go if that's an advantage to you great

play08:35

but you still got to update the firmware

play08:36

anyway so you may as well come with a

play08:38

blank one so you make sure your firmware

play08:39

is not tampered with I also like the

play08:41

fact that when I open this up that USB

play08:45

connections very secure um they had not

play08:48

just tape over the um screen and the

play08:51

entire device but they had it around

play08:52

this lip here where you can see uh it

play08:55

was an anti-tamper so you could actually

play08:57

see is that going to focus I don't think

play08:59

think it's going to focus but there's a

play09:00

little bit of residue still there so I

play09:02

could tell like somebody took a sticker

play09:04

off now additional enhancements that it

play09:07

has are on the actual key storage itself

play09:10

so of course you have the typical bip 39

play09:13

12 to 24 uh word uh passphrase backup

play09:16

you know write down on a piece of paper

play09:18

but we're going to be building on that a

play09:19

little bit so with the hot wallet we're

play09:22

going to be using a typical bip 39

play09:24

storage which this is the ellipal seed

play09:26

phrase uh tablet I think it's called

play09:29

it's a steel tablet basically so you

play09:31

then uh generate your key on the trasor

play09:34

same as you would The Ledger but then

play09:36

you can use these little punchouts here

play09:39

to store them in your little seed phrase

play09:42

tablet and then what I'm going to be

play09:44

doing is I have some anti-tamper

play09:46

stickers here I have these with the

play09:48

shiny seal that like leave a little bit

play09:50

of a Mark if you get left behind but I

play09:52

also have these over here that are

play09:54

serialized and I can you know write my

play09:57

uh signature on so I can make sure learn

play09:59

tampering with and then of course put a

play10:01

little lock on there now of course once

play10:02

people have physical access game over

play10:05

but that's where the trasor has some

play10:09

advantages so over

play10:11

here we have their shamier Shard kit

play10:16

yeah so what is a sharir Shard so it is

play10:18

the ability for you to create a key and

play10:22

split it into different shards so as the

play10:24

bip 39 it's all in one place all your 24

play10:27

words take it game game over man they

play10:30

once they have this it's game over

play10:32

that's it that all they need to do is

play10:34

get access to your one seed phrase so

play10:36

what is The shamier Shard so basically

play10:40

you have to at least have two of three

play10:43

or up to you can do a 16 shards if you

play10:46

want and there's these different you

play10:48

know shards we're going to open this up

play10:50

over here as you can see I haven't

play10:52

opened these at all so each one of these

play10:55

is a Shard that's going to have 20 words

play10:58

on it me open this up so I can show you

play11:01

and uh this is going to be my first time

play11:03

actually seeing them myself the concept

play11:05

of A shamier Shard is something we know

play11:07

of in cyber security and it's a really

play11:09

cool concept but the idea is we have

play11:11

three of these shards over here I can

play11:14

got to rip that

play11:17

open you're going to have three of these

play11:19

shards over here there's this little

play11:21

stylus over here that we're going to

play11:22

punch out to know what the words

play11:27

are and you have this little caps

play11:29

so there's three of these you can do

play11:32

more if you want but the idea is each

play11:35

one is going to have 20 words on

play11:39

it so you can do up the 20 and there's

play11:43

three different ones with 20 words each

play11:45

so you have 60 words versus 24 words not

play11:48

only that you need at least two of the

play11:51

three shards if you set up a two of

play11:52

three unless you do a 15 of 16 again to

play11:55

restore everything so what you can do in

play11:58

addition is you you now can take these

play12:01

three shards put them in three separate

play12:03

physical locations so let's say if you

play12:06

do happen to keep one Shard at your

play12:07

house and somebody happens to steal it

play12:09

from you they still need one of the

play12:12

other two so you then can go find the

play12:15

other two shards restore your wallet or

play12:17

whatever and then Rey it to a whole new

play12:20

one so this is some nice security and

play12:23

that is one of the nice upgrades cuz

play12:25

Ledger doesn't do A sherier Shard so

play12:28

yeah really looking forward to tinkering

play12:30

with this a little bit more I obviously

play12:32

haven't set up my Shamir Shard yet I'm

play12:34

going to have some more updates on that

play12:36

as we go but like I said I tinker with

play12:40

cryptocurrency because I genuinely enjoy

play12:43

the concept of it and the ideas around

play12:46

it and I'm not you know going to the

play12:48

Moon with everybody you go look through

play12:50

any of my Tik Tok or other content

play12:52

you're not going to find me speculating

play12:53

on price you're going to find me talking

play12:54

about the tech around the cryptocurrency

play12:56

and why I like things

play12:59

but with that being said I love all of

play13:01

you happy hacking and I hope you learned

play13:04

a few things along the way

Rate This
β˜…
β˜…
β˜…
β˜…
β˜…

5.0 / 5 (0 votes)

Related Tags
Cryptocurrency SecurityLedger WalletsTresor SafeHardware WalletsCybersecurityDigital AssetsBlockchain TechSecurity UpgradesShard StorageTech Tinkering