

Opinion by: Igor Zemtsov, chief technology officer at TBCC
Crypto security is a ticking time bomb. Updatable firmware might just be the match that lights the fuse.
Hardware wallets have become the holy grail of self-custody, the ultimate safeguard against hackers, scammers and even government overreach. Thereās an inconvenient truth, however, that most people ignore: Firmware updates arenāt just security patches.Ā
Theyāre potential backdoors, waiting for someone ā whether a hacker, a rogue developer or a shady third party ā to kick them wide open.
Every time a hardware wallet manufacturer pushes an update, users are forced to make a choice. Hit that update button and hope for the best, or refuse to update and risk using outdated software with unknown vulnerabilities. Either way, itās a gamble.Ā
In crypto, a bad gamble can mean waking up to an empty wallet.
Firmware updates arenāt always your friend
Updating firmware sounds like common sense. More security! Fewer bugs! Better user experience!
Hereās the thing: Every update is also an opportunity not just for the wallet provider but for anyone with the power, or motivation, to tamper with the process.
Hackers dream of firmware vulnerabilities. A rushed or poorly audited update can introduce tiny, almost imperceptible flaws ā ones that sit in the background, waiting for the right moment to drain funds. And the best part? Users will never know what hit them.
Then thereās the more unsettling possibility: deliberate backdoors.
Recent: Hardware wallet Ledger helps competitor Trezor resolve security vulnerability
Tech companies have been forced to include government-mandated surveillance tools before. What makes anyone think hardware wallet makers are exempt? If a regulatory agency ā or worse, a criminal organization ā wants access to private keys, firmware updates are the perfect attack vector. One hidden function. One disguised line of code.Ā
Thatās all it takes. Still think firmware updates are harmless?Ā
Firmware vulnerabilities are already being exploited
This isnāt some far-fetched, doomsday scenario. It has already happened.
Ledger, one of the biggest names in crypto security, had a major security crisis in 2018 when security researcher Saleem Rashid exposed a vulnerability that allowed attackers to replace Ledger Nano S firmware and hijack private keys. Nearly 1 million devices were at risk before a fix was rolled out. The scary part? There was no way for users to know if their devices had already been compromised.
In 2023, OneKey suffered a similar nightmare. White hat hackers demonstrated that its firmware could be cracked in mere seconds. No crypto was lost ā this time. But what if real attackers had found the flaw first?
Then came the āDark Skippyā exploit, taking firmware-based attacks to an entirely new level. With just two signed transactions, hackers could extract a userās entire seed phrase ā without setting off a single alarm. If firmware updates can be manipulated this easily, how can anyone be sure their assets are safe?
The hidden price of updatable firmware
To be fair, not all firmware updates are security disasters. Ledger uses a proprietary operating system and secure element chips for added protection now. Trezor takes an open-source approach, allowing the community to scrutinize its firmware. Coldcard and BitBox02 give users manual control over updates, reducing ā but not eliminating ā risk.
Hereās the real question: Can users ever be 100% sure that an update wonāt introduce a fatal flaw?
Some wallets have decided to eliminate the risk altogether. Tangem ships with fixed, non-updatable firmware, meaning that its code can never be altered once the device leaves the factory. No updates. No patches.Ā
Of course, this approach has its trade-offs. If a vulnerability is discovered, thereās no way to fix it. But in security, predictability matters.Ā
Real crypto security means taking back control
The crypto market was worth $2.79 trillion as of March 2025. With that much money on the table, cybercriminals, rogue insiders and overreaching governments are always looking for weak points. Hardware wallet makers should be laser-focused on security.
Choosing a hardware wallet shouldnāt feel like gambling with private keys. It shouldnāt involve blind trust in a corporationās ability to push updates responsibly. Users deserve more than vague reassurances. They deserve security models that put control where it belongs ā with them.
Security isnāt about convenience. Itās about control. Any system that requires trusting unknown developers, opaque update processes or firmware that can be changed at will? Thatās not control. Thatās a liability.
The only real way to keep a hardware wallet safe? Remove the guesswork. Strip away the blind trust. Always research the developersā backgrounds, check their track record for security incidents, and see how theyāve handled past vulnerabilities. Stick to verifiable facts ā security should never be based on assumptions.
Opinion by: Igor Zemtsov, chief technology officer at TBCC.
This article is for general information purposes and is not intended to be and should not be taken as legal or investment advice. The views, thoughts, and opinions expressed here are the authorās alone and do not necessarily reflect or represent the views and opinions of Cointelegraph.