TREZOR One Review 2021
Meanwhile there is a follow-up of this model. Look here to learn more about it: TREZOR Model T
- 1 First Impression
- 2 First setup of hardware wallet TREZOR
- 3 Handling
- 4 Compatibility
- 5 Security of TREZOR hardware wallet
You can read out whether the hardware wallet delivers what its reputation promises in the following review.
TREZOR offers its wallet in its own online shop for 59,00 € (click here to check the current price). Shipping is possible to many countries and will be charged additionally. Depending on the inventory, the colours are available in white, grey and black.
In addition, you can also choose accessories:
- An OTG cable for Android smartphones to use the hardware wallet on the go. This is to be selected in the shop’s shopping cart.
- Cryptosteel (for the test report), which allows you to keep your recovery seed safe from the elements instead of writing it down on paper.
TREZOR also has a close network of resellers around the world. These purchase hardware wallets on better terms and then distribute them in their respective countries. These are spread all over the world.
Hardware Wallets should preferably be ordered directly from the manufacturer or official resellers if possible. Dubious stores or private sellers on platforms like ebay or amazon could manipulate the devices for their own purposes or trick the buyer. This way, the thieves can steal all the coins from your hardware wallet at a later time. Unfortunately there have been cases like this in the past.
For this test, TREZOR provided me with the hardware wallet in black including the OTG adapter for Android. After three days, the package sent from the Czech Republic has already arrived at my place.
Packaging and delivery
In the small shipping envelope, which fits directly into the mailbox, there is the hardware wallet and the OTG adapter, which also needs to be ordered.
The TREZOR hardware wallet
The hardware wallet is packaged in a simple cardboard box, which is completely welded in foil. The seals are located below the protective film.
The note on the back of the packaging should be taken to heart and contact support if any of the seals are broken. In this case, the device may have been tampered with and TREZOR will take care of a solution to the problem.
The colour is also indicated on the page by a small sticker. This, too, should be controlled again before opening.
If you pay the seal and open the additional bondboard, you jump directly towards the entire scope of delivery. It is securely embedded in a foam sheath and so shock-proof packed.
On the one hand, the hardware hardware wallet itself, which is glued with a foil to protect against scratches, is of course included. It also contains four stickers with the TREZOR logo, a USB-to-micro USB cable for connecting to the computer, two notes for noting the recovery seed and a small ribbon for attaching to the TREZOR.
It is surprising how small the TREZOR ultimately is. It is 60mm x 30mm x 6mm tall and weighs only 12 grams. On the front is the TREZOR logo, including the OLED display with a resolution of 128×64 pixels and two buttons underneath, which provide a pleasant pressure point.
On the bottom is the MircoUSB port for connecting to the device and on the top is an eyelet for a trailer. The back is completely unused.
Cable for Android smartphones (accessories)
Android supports the USB OTG standard, which allows an Android smartphone from Android 3.1 to act as a host itself and thus, for example, to use a USB stick on the smartphone.
The hardware wallet TREZOR also uses this standard, so that you can use the hardware wallet on the go with an Android smartphone with a corresponding app.
This cable is not included in the normal scope of delivery and must be ordered as an accessory.
First Impression: Conclusion
The order in TREZOR ‘s online shop seems to be straightforward, only the address details are to be provided and the payment is then made by Bitcoin or credit card.
Shipping proceeded very quickly and without any problems from Prague, Czech Republic.
Although the TREZOR Hardware Wallet can also be ordered from Amazon, hardly any retailer was delivering to Germany at the time of the test. I also think that third-party retailers should be treated with caution, as they could manipulate the device including the packaging.
Otherwise, the delivery can convince. I don’t miss anything and the device works very well processed. The extra stickers are a nice side dish.
First setup of hardware wallet TREZOR
Never use a hardware wallet that is already set up. You must choose your own PIN code or password and do the backup yourself. This is not given by anyone!
As the back of the box reveals, the trezor.io/start page must be called to set up the hardware wallet TREZOR .
Here you first have to select the appropriate device-in this case, it is TREZOR One.
It is then necessary to install a TREZOR bridge depending on the operating system and browser. This is software that is the link between USB port and web wallet.
Then reload the page and connect the TREZOR One to a free USB port via the included USB cable.
First firmware to play
If you now add TREZOR to the computer as requested, the firmware must first be installed.
This is not delivered from the factory, but only is loaded onto the device when it is set up. So you have the most up-to-date and therefore safest firmware on the device right at the start.
Within a minute, your device will restart and the new firmware will be loaded. TREZOR Wallet then starts with the initialization of the wallets.
Set up wallet
Now you’re faced with the choice: Do you want to set up a new wallet or restore an existing one. You can do the latter if you already have a recovery seed in the form of 24 words from a previous hardware wallet .
It is also possible to set up mobile with an Android device. More on this in the area of compatibility of this test report.
Once TREZOR has been reconnected, the setup via the TREZOR wallet in the browser can be started.
Although the hardware wallet can now already be used in this way, there is still no important step of the setup. The current status of the facility can be viewed via the progress bar in the TREZOR Wallet.
Creating a Backup
The first step is the most important: Now you are creating a backup of your hardware wallet. These 24 words, which you note during the backup process, allow you to restore all coins in the event of defect or loss of hardware wallet TREZOR One.
Your Recovery Seed is the backup key to all your cryptocurrencies and applications. The Recovery Seed (backup) can only be viewed once. Never make a digital copy of the Recovery Seed and never upload it online. Keep the Recovery Seed in a safe place, ideally also safe from fire and water. Special backup products, for example Cryptosteel Capsule or Billfodl are suitable for this.
No one but yourself can be held liable for any financial losses caused by improper handling of sensitive data.
Therefore, go through the process conscientiously and accurately according to the instructions. Click on “Create a backup in 3 minutes.”
As the process progresses, you’ll see each of the 24 words individually on the TREZOR One’s display.
You can write these words in the small booklet from the scope of delivery. Once you arrive at the last word, you have the opportunity to go through and control all the words again.
After checking each word, you can complete the process by pressing the right button. The booklet is now kept safe as it represents access to your cryptocurrencies .
Choose a Name
The next step is to set a name for your TREZOR One.
By adjusting the device name, you can be sure that the TREZOR in your hands is really yours. It can also help you distinguish between different TREZORdevices.
Simply enter the name in the text box and confirm the action on TREZOR One.
Set PIN code
The PIN is then set so that not everyone gets instant access to your wallet. Click the button and confirm the action via the TREZOR One.
For this purpose, the hardware wallet displays a PIN field with random order of numbers 1 to 9. According to this pattern, the individual fields of the desired PIN must now be pressed in the browser. This measure prevents malware from reading the PIN on the computer.
Choose a strong PIN to protect the device from unauthorized access.
The whole thing has to be repeated a second time, this time with a different PIN field. As a result, other fields in the browser need to be pressed.
The PIN can be changed later at any time via the devices options.
Subscribe to the Newsletter
Finally, one is asked to leave your email address to be informed of any news.
Alternatively, you can follow TREZOR on medium or Twitter. This step is optional.
Now the TREZOR One is ready for use! But always remember to keep your backup, the Recovery Seed, in a safe place.
The hardware wallet is easy and quick to master thanks to the guided instructions . In addition, extensive articles of your own documentation are available, so that no questions should remain unanswered.
I like the fact that the TREZOR Bridge does not rely on a special browser and that the firmware is only played on the device when it is initialized and is not already supplied from the factory.
To operate the TREZOR hardware wallet , the in-house TREZOR Wallet, whose plugin or bridge was installed for the connection to the Hardware hardware wallet at the setup, will be used as part of the test. Of course, it is also possible to use it with other software wallets, such as the Electrum Bitcoin Wallet, as can be read in the “Compatibility” section of this test report .
Conduct transactions with TREZOR
With the TREZOR Hardware Wallet, various cryptocurrencies can be managed. By default, Bitcoin is already selected.
First, the wallet must be filled with Bitcoin. To do this, the software needs to switch to the Receiving tab, where one or directly several new addresses of the current account can be generated.
In order to ensure that the address has actually been generated by the hardware wallet and that the website has not been tampered with, the green button must be pressed.
Only if the address on the TREZOR One display matches that on the computer’s display is the address valid. Then you can confirm the address by pressing the right button. Now the address is fully displayed and can be scanned or copied.
At a later time, you can re-verify the address via the “eyes” button to the right of the address at any later date. It is also possible to generate more addresses.
Once a transaction has been made to one of the addresses, the transaction will appear on the home page and the account balance will also change in the short overview of the account.
In addition to simply listing past transactions, the transaction overview also shows other information and offers helpful functions:
- Sum of the outputs and inputs of the account
- Current price of the currency set in the options
- Bar chart of the amount of transactions in the past few days
- Easy search of all transactions made, including descriptions, if the label has been activated
If an address is used, a new one will be generated for the next transaction. This avoids being able to assign multiple transactions to a wallet.
Addresses that have already been used can still be viewed and, if necessary, reused. The total of the receiving coins of an address are also displayed directly underneath.
To send, switch to the “send” tab.
The form that appears here will be filled in first. First, enter the recipient address, either by typing in directly or by using a webcam.
Then you enter the desired amount, either in Bitcoin or in another currency such as euros, which is then converted directly. It is also possible to select all the bitcoins of an account via the small arrow, leaving it empty.
Depending on which fee has been selected, an expected confirmation time will be displayed by the network and the amount of the cost will be calculated.
More options for experts are possible via the drop-down box at the bottom right. This also allows simultaneous sending to multiple recipients. You can do one to do that. Import CSV file or type in multiple addresses. This is much more practical than performing multiple transactions one after the other and also saves fees.
You can also sign transactions without sharing them with the network or install a delay in the transaction.
The “Send” button sends the transaction to the hardware wallet for verification.
In two steps, the most important data is also displayed again on the TREZOR in order to prevent manipulation on the computer. If the recipient’s address and final amount match the data typed into the form, the transaction can be confirmed with the right button.
Now the transaction is sent to the network and a new negative entry appears in the transaction view.
So far, all transactions have been processed through the wallet’s first standard “User Account #1” account.
But TREZOR also offers the ability to create additional accounts, such as separating private from business transactions. Or if you want to create standalone accounts for different people who work with the same TREZOR .
You can only create a new account if the last account is not empty.
The accounts are based on the same seed and therefore do not need their own recovery seed. Nevertheless, the accounts can be used like standalone wallets: Each account has its own address area and balance.
Renaming is possible with a Dropbox connection.
Sign and verify Message
TREZOR One supports the ability of Bitcoin to sign and verify messages to confirm the ownership of an address beyond a reasonable doubt.
To do this, you switch to the Signing tab.
The form on the left allows you to sign your own address.
The generated data is now passed on to the corresponding recipient. This can now, for example, type and verify this data with the help of a TREZORvia the right form or any other tool.
If no error occurs, the ownership of the address has been confirmed.
TREZOR Password Manager
TREZOR provides its own password manager Chrome extension. This makes it possible to store all of its passwords securely encrypted in the free cloud service Dropbox or Google Drive.
The keys to the passwords were generated on the hardware wallet , making it impossible for others to access your passwords.
At launch, you have to grant TREZOR access to either Google Drive or Dropbox and confirm the activation of the password manager directly on the device.
Once everything is connected correctly, you can create new passwords and sort them by your own categories.
If you want to copy a username or password into the cache, you have to confirm the action hardware wallet TREZOR by pressing a button.
By clicking on the icon or name, you can also go to the page directly and TREZOR tries to fill the login form automatically. Again, the action must be confirmed on the device again.
TREZOR as universal second factor (U2F)
Like many other hardware wallets, TREZOR supports the U2F industry standard.
In addition to an access password, it serves to prove access authorization, for example for web-based services, and can also be used in combination with digital personal documents to determine identity.
U2F, however, is completely detached from any other features of your hardware wallet. So you don’t need to worry about your passwords or cryptocurrencies that you manage with TREZOR .
In order to activate U2F, TREZOR must first be made known via the settings with the corresponding service. Using Google’s example, this is done through the security center.
Once TREZOR has been configured as a second factor, you have to have the hardware wallet at hand when logging in.
Own descriptions by Dropbox connection
You can connect TREZOR to the free Cloud service Dropbox. This makes it possible to rename accounts, describe addresses and transactions, and use the full text search.
This data is then stored encrypted in the Dropbox and is only accessible through your hardware wallet .
To activate the connection, click on “Enable Labeling” on the left of the menu. A note with more information appears and the action must, as always, be confirmed by pressing a button.
The app settings are linked on the left directly above the label and apply to an app within the wallet, for example to the Bitcoin app.
Here, the Fiat currency can be set or the URL can be changed through which the wallet communicates with the network.
The devices settings can be accessed by clicking on the devices name.
These settings are independent of the app and therefore apply to all wallets and cryptocurrencies.
Here you can first change the device name as well as the PIN. In addition, the Extended Public Key can be exported, which allows you to view the entire transaction history of this wallet.
If you click on the “Home Screen” tab, you can change the background that appears on the hardware wallet .
Under the Extended tab, you can set up a hidden wallet, disable the PIN completely, or reset the entire device.
TREZOR Wallet leaves nothing to be desired for me. If a function is not clear or there are questions, the extensive documentation immediately helps, which is very positive.
The basic functions such as sending and receiving fold without any problems and offer all important actions, such as emptying a wallet or directly converting it to other currency.
Also, simply managing accounts and simply allowing them to describe any address or transaction by connecting to Dropbox are very helpful features.
Additional features such as a fully functional password manager, use as a universal second factor or signing messages still set the TREZOR Wallet apart from its competitors.
TREZOR can be used on the following platforms:
It is particularly noteworthy that with TREZOR you can even set up the hardware wallet via an Android smartphone by using the TREZOR Manager app. More information can be found in the “Mobile Use” sub-section. MacOS will be supported from version 10.11 (“El Capitan”), Windows from version 7.
TREZOR supports the following cryptocurrencies:
- Bitcoin Private
- Bitcoin Gold
- Bitcoin Cash
- Ethereum Classic
- ERC-20 Tokens
Here at Inivty you can see all Bitcoin and Altcoin prices from many exchanges in real time, compare rates and buy instantly. You can then easily send the purchased cryptocurrencies to your hardware wallet: compare prices here.
Not all cryptocurrencies are directly supported by the TREZOR Wallet software from SatoshiLabs, but in some cases only through third-party software.
You can easily switch between them via a drop-down menu over the web interface, without an interaction at the hardware wallet itself.
However, only Bitcoin-like coins are supported by the TREZOR Wallet software. If you want to use the TREZOR Wallet to manage Ethereum for example, you only get a message that you should use another service, in this case the MyEtherWallet.
Supported software and services
TREZOR is very popular with cryptocurrencies users, which is why there are a variety of so-called TREZOR apps. This is software or online services that have included TREZOR support through the official API.
This means that, for example, you can interact directly with the hardware wallet on the online exchange Bitstamp or use other software wallets such as Electrum or Copay.
This supports the following software and services:
- Passwort Manager
- SSH Agent
A complete and up-to-date list of all TREZOR apps can be found in the official documentation.
SatoshiLabs, the manufacturer of the TREZOR hardware wallet, provides an Android app called TREZOR Manager.
This app works with all Android smartphones that supported the USB OTG standard. You also need a special USB OTG cable foruse.
At the time of testing, the app can only be used to initialize the device, restore the device, set up the PIN code and password, and some other settings.
Also on the go, you have to enter a PIN code as usual to unlock it and confirm every action at the hardware wallet Just as you know it from the TREZOR Web Wallet.
If you want to make mobile transactions, you have to switch to other apps, such as the Mycelium app.
In addition to altcoins, the hardware wallet TREZOR also supports a lot of other software and services. Switching between the individual cryptocurrencies is possible directly via the software, without interaction at the hardware wallet itself.
I think it’s a bit of a shame that you have to switch to another service to use Ethereum.
A big plus is that the hardware wallet can do without a computer if you have an Android smartphone or tablet.
Security of TREZOR hardware wallet
This is because the TREZOR Wallet is able to remember a TREZOR device. This allows you to use the software even without a connected device and without entering a PIN, for example, to view transactions.
On the one hand, this is extremely practical for computers that are used exclusively by oneself. In the case of public computers, however, you should always separate your TREZOR correctly and release it to forget, so that the successor cannot see your account balance.
As soon as you want more than just reading, you are asked directly to plug in the wallet and enter your PIN. If the PIN is incorrect, the input is delayed further and further. This would take about 17 years to try 30 pins! The hardware wallet then stays unlocked for 10 minutes, so you don’t have to re-type the PIN for every action during that time.
You can also manually lock TREZOR at any time if you leave the computer within the 10 minutes, for example. Simply click on the open lock. Alternatively, you can simply disconnect the TREZOR from the computer.
In addition to a PIN, it is possible to add a passphrase to TREZOR .
This has the advantage that TREZOR is impervious to a physical attack. Even if your hardware wallet was stolen and the chip is examined under an electron microscope, your bitcoins would still be safe.
As a passphrase, you can choose anything you can remember well, as you shouldn’t write them down. Each passphrase unlocks its own wallet, so that even in the event of blackmail, a different passphrase can be issued with only a small amount of money. The old accounts remain accessible behind an empty passphrase.
One limitation of this approach is that you need to enter your password through the computer keyboard. For this reason, you should not turn off your PIN, even if you use a password!
enable passphrase Encryption
To activate, you switch to the devices settings and activate the encryption using passphrase via the “Advanced Settings” tab.
Once encryption has been activated by a password, you need to reconnect the wallet. Now, as always, the PIN is entered and then a passphrase is added.
It doesn’t matter which passphrase is typed, because each passphrase always opens a different, functioning wallet. Of course, you should still commit to one that you use for your everyday transactions.
But a second passphrase is conceivable, on which you send only a few coins and issue them in the event of blackmail.
When setting up, the Recovery Seed was recorded, which is supposed to restore the generated wallets in the event of a defect, theft or forgetting of the PIN.
The recovery can be started directly with a new hardware wallet or you can use a software wallet that supports recovery with a 24-word recovery seed.
The recovery is tested with the help of a new TREZORs.
Instead of the normal setup, you select the recovery option on the right this time.
Here you can choose the number of words that the Recovery Seed includes. In addition, the “Advanced Recovery” option is available for recovery, in which the words are clicked through word fields rather than via the keyboard, but similar to the PIN.
This method increases security because no keylogger can read your words. However, since the words are randomly queried in standard mode, even with known words, testing all the combination is extremely time consuming. TREZOR published a blog post about this. So in most cases, the standard recovery mode is perfectly sufficient.
Finally, “Continue” will begin entering the Recovery Seeds.
No matter what input method you choose, once you type the last word correctly, the wallet is immediately restored.
TREZOR is completely open source, meaning any code can be viewed. This makes it theoretically possible for everyone to recreate the entire product 1:1 and also to check the software for possible back doors. TREZOR is one of the largest manufacturers in this market and has many satisfied customers.
Like any other hardware wallet, TREZOR can convince that the seal of the HD wallet is generated on the device and never leaves the device apart from the backup. This already ensures a high level of security.
The PIN input uses a random number box each time, which is why the PIN is not readable through a PC.
The possibility of password encryption offers additional security as an option. However, it should be noted that the password is entered via the PC’s keyboard and could therefore potentially end up in the hands of third parties.
Restoring the wallet is easy and works without any problems.
The ability to read your wallet on trusted computers without connected hardware wallet is very convenient, but should only be activated on private computers.
FAQ 11Ask your own question
That is not a problem. You can restore your accounts to a new hardware wallet using the recovery key you wrote down when you set it up.
Most wallets support more than just one cryptocurrency, but only generate one backup. Nevertheless, this one backup is sufficient to restore all cryptocurrencies as all private keys of the different wallets result from the seed that is backed up as a backup during setup.
Hardware Wallets such as the Ledger Nano X, TREZOR Model T, BitBox02 or KeepKey all work according to the same principle. They are a special form of a so-called wallet, which is used to manage cryptocurrencies. A hardware wallet is a physical device that securely and inisolationly generates the private keys to the cryptocurrencies. Due to the extra hardware, they have some advantages over software wallets:
- Private keys are often stored in a protected area of a microcontroller and cannot be transferred out of the device in clear text.
- Hardware wallets are immune to computer viruses that steal from software wallets.
- They can be used securely and interactively, private keys never need to come into contact with potentially vulnerable software.
- The software is in most cases open source, so that the user or professionals can validate the entire operation of the device.
However, it is important to understand that hardware wallets are an attractive target for attackers and depend on several assumptions to maintain security. They are not a miracle weapon, and there are several realistic ways to hack a hardware wallet Especially if someone has physical access to the device.
Yes. Since April 2018, TREZOR One as well as TREZOR Model T support the TREZOR Password Manager. This allows you to manage passwords. The master key is the hardware wallet itself. TREZOR encrypts each password entry separately with a unique key. The signature is derived from a unique private key on the TREZOR. All private keys are generated in its secure offline environment and never leave the device, making TREZOR inaccessible to hackers or malware.
The TREZOR Model T is the successor to the bestseller TREZOR One. Both devices are open source, are subject to the same high security standards and are managed with the TREZOR Wallet. However, the TREZOR Model T offers some improvements compared to its predecessor:
- LCD Touch color display
- supports more cryptocurrencies
- supports Shamir Backup
- has an SD cards slot
TREZOR One can be ordered mainly on the Internet. The hardware wallet is available from amazon or ebay or from resellers all over the world. However, it is recommended to always order hardware walletdirectly from the manufacturer. This reduces the risk of hardware manipulation. In the official TREZOR shop the TREZOR One is currently available for 59,00 € (click here to check the current price).
A new cryptocurrency is rarely supported directly by a hardware wallet at the beginning. However, most providers such as Ledger or TREZOR are constantly working to support new cryptocurrencies. Therefore, it is often worth waiting until the desired currency is supported by your hardware wallet.
If you’ve forgotten your PIN or want to reset your hardware wallet TREZOR Model T or TREZOR One for some other reason, you can do so without any problems.
First, connect to the TREZOR Wallet software.
On the TREZOR Model T, swipe your finger across the screen while simultaneously plugging the cable into the TREZOR Model T. The screen will then display the message that you are in bootloader mode. In the TREZOR Wallet software, you can now press the “Reset Device” button.
With TREZOR One, all you have to do is click away the PIN entry window in the TREZOR wallet. Then go on to the Advanced tab in the menu bar located at the top of the page and look for the “Reset Device” button at the bottom.
Complete the process by confirming the action on your device. The TREZOR is now reset. Now you can set up the hardware wallet again after reconnecting.
I would like to give a hardware wallet as a birth gift. Do I need this every time I want to deposit coins or is there another way?
No, you don’t need the hardware wallet every time you want to make a deposit. It is only necessary to set up the hardware wallet and generate an address of the corresponding cryptocurrency.
Cryptocurrency can now be sent to this address on the desired cycle on a regular basis without the need for the hardware wallet. The address does not expire.
Are my cryptocurrencies stored in the hardware wallet, or where exactly are they? This is a very good question because the answer defines what your wallet actually needs to protect.
Cryptocurrencies are so named because they are secured by cryptography. For this you need a set of digital keys, for example your (very secret) private key. With this key you can encrypt and digitally sign things.
Let’s take Bitcoin as an example (other cryptocurrencies work in a similar way). The entire Bitcoin network is kept up to date by a common data structure called the blockchain. It contains records of all transactions ever made and is publicly accessible online, so anyone can read it. When you receive some bitcoins, say 0.1 BTC, you see them in your bitcoin wallet, listed under a bitcoin address.
At the same time, the bitcoins are not actually stored in the wallet, they are just an entry in the public blockchain. What the wallet stores is your secret private key that belongs to that address. Since you control that private key, you can spend those Bitcoins again: that’s how “Bitcoin ownership” is defined. Anyone can see these bitcoins, but only you can spend it, so they are yours. But that also means that *anyone* with the right private key can spend those bitcoins. Therefore, it is very important to keep this key secret.
What stops the manufacturer of your hardware from using a backdoor and simply stealing your cryptocurrencies? How much do you have to trust hardware wallet manufacturers?
While a completely “trustless” solution is probably not possible, manufacturers are doing everything they can to minimize the need to trust them.
Most of the software code of many hardware waller manufacturers is open source, i.e. publicly available. Anyone can check how the device works and how secrets are handled. Of course, not everyone has the ability to review code: that’s why independent researchers are often encouraged to analyze, and are often rewarded by bug bounty programs when they find something. This does not limit their ability to publish a full independent report without permission.
The essentials to go: A wallet manages your secret private keys and requires full access to them. You can and should demand full transparency about how a wallet works and ensure that independent public audits are encouraged.
Ask your question about the product. The question will be published here together with the answer after a few days. You will be notified by e-mail.
|Compatibility||Mycelium, efolio, Osclass, Strip4bit, Copay, Electrum, MyEtherWallet, FIDO/U2F, ArcBit, bitpay, Bitstamp, bitwala, cashila, Coinmap, coinpayments, Encompass, MultiBit, Passwort Manager, SSH Agent, wordpress|
|Cryptocurrencies||Bitcoin, Bitcoin Private, Ubiq, Expanse, NEM, Bitcoin Gold, Ethereum, Litecoin, Dogecoin, Zcash, Dash, Bitcoin Cash, Ethereum Classic, ERC-20 Tokens, Namecoin|
|Platform||Windows, Linux, Mac, Android|
|FIDO U2F Authenticator|
User Reviews 3