Besteht ein Risiko bei der Verwendung der ersten von einem neuen Ledger-Gerät generierten Seed-Phrase?
Home › Foren › Ledger Wallet › Besteht ein Risiko bei der Verwendung der ersten von einem neuen Ledger-Gerät generierten Seed-Phrase?
- Dieses Thema hat 8 Antworten und 1 Teilnehmer, und wurde zuletzt aktualisiert vor 4 Wochen, 1 Tag von Successful-Snow-9210.
-
AutorBeiträge
-
-
3. April 2024 um 18:06 Uhr #3698831root_s2yse8vtAdministrator::
Lesen Sie, dass einige Benutzer vorschlagen, dass, wenn Sie ein neues Gerät haben, sollten Sie nicht die erste generierte Ledger-Seed-Phrase verwenden, versuchen Sie 2. 3. und besser verwenden Sie eine Passphrase mit ihm … gibt es ein Risiko, dass die erste generierte Phrase wiederhergestellt/manipuliert werden könnte, wenn es an die Fabrik für Garantieansprüche geht …
-
3. April 2024 um 18:06 Uhr #3698832No-Understanding903Gast::
As long as you yourself are writing down the first generated 24 word seed phrase and it’s not already implemented on the device (as in someone else wrote it down FOR you and placed the words in with the ledger), you can use the first phrase no problem. Have 3 ledgers all with the first phrase since 2018. No problems
-
3. April 2024 um 18:06 Uhr #3698833JustSomeBadAdviceGast::
Well, you’ve got 4 answers all saying “no risk” and all four are slightly wrong. If you trust Ledger’s generation process completely, then there’s no risk, so long as you’re reading the words off the screen. If you don’t trust Ledger’s generation completely, there’s no benefit to using the second or third seed, but that isn’t the same as saying there’s no risk.
There’s *always* risk when it comes to security choices. If you want to ensure that you aren’t trusting Ledger’s seed generation, create your own seed via dice rolling and other randomness. If you google bip-39 diceware you can see how to do this. For selecting the last word in the list, I’m not sure if Ledger displays only valid options for last word or not, as it contains a checksum (has been too long since I entered a seed). But if it doesn’t, you can use a completely offline computer and iancoleman’s tools to generate the missing word correctly, and then wipe the stuff that touched it.
Personally I find it pretty unlikely that Ledger would have taken steps to steal seeds. But if they did, dice rolling will protect against that.
-
3. April 2024 um 18:06 Uhr #3698834
-
3. April 2024 um 18:06 Uhr #3698835Kells-LedgerGast::
Using the first recovery phrase generated by a Ledger device is safe. It is impossible for a recovery phrase that has not yet been generated to be displayed on the device’s screen. Each recovery phrase is created within the device’s Secure Element and shown only once to the user on the screen.
-
3. April 2024 um 18:06 Uhr #3698836btc_cluelessGast::
No, it’s fine.
But what’s super important for generating seed phrases is that they must be truly random. On a hardware wallet this is done by a built-in random number generator. Ledger has an article that touches on the topic in case you want to dive a bit deeper: [https://www.ledger.com/academy/topics/security/what-is-the-entropy](https://www.ledger.com/academy/topics/security/what-is-the-entropy)
-
3. April 2024 um 18:06 Uhr #3698837hobbyhackerGast::
is there any risk? no
will I do anyway? yes, because why not. I want to make sure it resets itself on wrong pin.
will I redo if I already had a ledger set up with first phrase? no, not worth the hassle
passphrase? technically helps, but have to learn for sure how it exactly works and what it does.
seed recovery without PIN? never happened yet
-
3. April 2024 um 18:06 Uhr #3698838
-
3. April 2024 um 18:06 Uhr #3698839Successful-Snow-9210Gast::
After you’ve written down your 24 word seed phrase verify it using this process.
https://support.ledger.com/hc/en-us/articles/360007223753-Recovery-Check?docs=true
Then stamp or punch seedphrase into metal.
https://blog.lopp.net/a-treatise-on-bitcoin-seed-backup-device-design/
-
-
AutorBeiträge
- Du musst angemeldet sein, um auf dieses Thema antworten zu können.