FAQ
Yes, it is. With desktop and mobile wallets, your keys remain exposed to hackers, since they are stored in a device connected to the Internet. In contrast, HASHWallet securely stores your keys within the card's chip, keeping them offline and also protected by a system with multiple security layers designed to enhance key protection even more.
We have created a decentralized recovery process that ensures only you can trigger it with access to your email and phone (via authentication codes). No one else, not even HASHWallet.
Although none of them are your private key, the system relies on two elements to enable the recovery process. A recovery seed stored within your backup card's chip, which has no value by itself. And, a recovery key, encrypted and stored in your Backup Center where only you can access the data with your credentials.
Exchanges are a primary target for hackers because they store massive amounts of cryptocurrency keys in centralized systems connected to the internet. This makes them highly vulnerable to large-scale breaches, as hackers can compromise thousands or even millions of accounts with a single attack.
In contrast, HASHWallet takes security to the next level. It securely stores your keys offline within the card’s secure chip, keeping them completely isolated from any internet connection. The HASHWallet system combines the advantages of cold wallets with additional layers of protection, making it significantly more secure.
Here’s the security hierarchy from most to least secure: HASHWallet → other cold wallets → mobile and desktop wallets → Exchanges
Your keys remain stored within the card’s chip that features the highest security certification on the market, EAL6+.
Although the system can help you regain access to your crypto anonymously, it does not store your keys anywhere outside the card’s chip. To restore access, the process relies on two elements, the Recovery Key and the Recovery Seed, neither of which contains your actual keys.
The HASHWallet non-updatable firmware avoids backdoors to your keys via malicious updates and also lacks commands for key extraction, adding an extra layer of security. New coins and features are added through application updates, which provides new functionalities without compromising your security.
No, you don’t. Buying a HASHWallet gives you free access to the recovery service for all your private keys. If you lose your HASHWallet card, all you need to do is order a new Backup Card from the app. There are no additional costs associated with the recovery process.
1. Anonymity
HASHWallet: Ensures full anonymity during recovery, requiring no personal information.Ledger Recover: Demands personal authentication to initiate the recovery process, potentially compromising user privacy.
2. Price
HASHWallet: Provides free recovery of all private keys just by ordering a new backup card whenever is needed.
Ledger Recover: Requires a paid monthly subscription for the recovery service of each private key, adding ongoing costs.
3. Key Management
Ledger Recover: Encrypts and splits keys into fragments stored with multiple custodians. While innovative, this introduces risks of compromise due to third-party involvement.
HASHWallet: Employs a secure recovery mechanism without storing private keys.
Recovery relies on two elements:
A Recovery Seed, stored offline in Hardware Security Modules (HSMs).
A Recovery Key, encrypted and stored in the Backup Center, accessible exclusively by the user.
An updatable cold wallet can be compromised by injecting malicious firmware designed to expose your private keys. This is why HASHWallet was designed as a non-updatable cold wallet, eliminating the risk of firmware manipulation. To further enhance security, HASHWallet is engineered without any instructions to reveal private keys.
Tangem's recovery process cannot truly be described as such, as it merely provides duplicates of the same wallet, which means that if all the cards are lost, the assets are irretrievable.
In contrast, HASHWallet allows users to order a Backup Card whenever needed, and initiate the recovery process. This ensures peace of mind, as funds remain securely protected even if cards get lost.
Users can organize inheritance of their digital assets without sharing private keys or credentials. A backup card can be requested and handed to an heir uninitialized. The email address associated with the account should be shared in the will, no password required.
When the time comes, the heir signs in with the decedent's email address and a phone verification code, then initializes the backup card.
Afterwards, they can change the email address to one of their own by verifying with card and phone OTP, then change the phone number using email verification and card scan.
An uninitialized card has no value and provides no access to funds. Keys are reconstructed inside the chip of the heir's card without ever being exposed.
The app uses banking-grade security software provided by Build38, a mobile security company specialized in high-security apps for financial services and digital identity.
It continuously monitors the execution environment, detects rooted devices, manipulated apps, bots, and overlay attacks.
If the phone environment is not secure, the app stops functioning. It uses white-box cryptography, making reverse engineering or data extraction extremely difficult. Protection is active at all times, not only during signing.
New coins, networks, and features are delivered through app updates. The physical card requires no replacement to support new functionality.
Most cold wallets are designed to manage a single private key. HASHWallet takes a different approach, allowing users to create or import multiple independent seeds on the same card, each completely isolated from the others.
Funds can be separated by use case, savings, daily spending, investments, or testing, improving both privacy and risk management.
If one key is used in a more exposed environment, the others remain secure. Also, a compromised key can be discarded and replaced with a new one without changing the card.
The main goal of the passphrase is to distribute key risk. It is generated and encrypted in the chip when the keys are created, then stored in the app. The user never sees it or memorizes it.
It is a security measure that happens in the background. Its purpose is to protect funds from any attack on the physical card. Even if the chip security were compromised, the attacker would find nothing of value, as the passphrase is necessary to complete the private keys.
Without app credentials, the card contents hold no value.
The secret passphrase does not interfere with using imported seed phrases on non-HASHWallet devices.
HASHWallet supports both options and they can be used simultaneously on the same card.
Users can generate seedless keys, created and stored inside the EAL6+ chip, never exposed to anyone, including the user and the company. There is no word list to write down, photograph, or steal.
Users can also import existing seed phrases into HASHWallet. Seedless-generated keys and imported seed phrases coexist on the same card, completely isolated from each other, and both benefit from the full recovery process, 100% self-custody, decentralized and anonymous.
HASHWallet is screenless and rather than a limitation, it is a different security approach.
Signing is 1-step and contactless via NFC. Security is established through a banking-grade app protection software secured by Build38, a mobile security company specialized in high-security apps for financial services and digital identity.
It continuously monitors the environment in real time: detects rooted devices, manipulated apps, and overlay attacks. Instead of relying on a physical screen that cannot verify whether the phone is compromised or a fake interface is active, HASHWallet addresses security at the environment level, providing broader protection.
Buy HASHWallet

Qubic and all your assets in one single card.
€149
Benefit from our self custody recovery service whenever you need it, just by purchasing a backup card.
Instantly manage and switch between all your private keys from the app with your HASHWallet.
This advanced card supports Qubic tokens and over 11 000 crypto in other networks
86 x 54 mm (standard payment card size), temperature range from -13°F to +131°F, and IP68 water resistance.
HASHWallet Mobile App
All you expect from a cold wallet App and more





HASHWallet Elite
You're a step away from owning true
exclusivity

