Bitcoin Wallets & Self-Custody

Hardware Wallet Comparison Chart 2026

Top-down view of six different hardware wallet devices arranged for comparison
Reading Time: 11 minutes

Hardware Wallet Comparison Chart 2026: Every Major Device Ranked

Choosing a hardware wallet in 2026 means navigating a market that has matured significantly over the past few years. There are now over a dozen serious contenders across four major manufacturers — Trezor, Ledger, Coinkite (Coldcard), Blockstream, Foundation, Keystone, and Shift Crypto (BitBox). Each makes different tradeoffs between security architecture, usability, coin support, and price.

This comparison covers twelve wallets across all relevant categories. Whether you hold only bitcoin or a broader portfolio, store modest savings or significant wealth, want air-gapped operation or prefer plug-and-play USB — there is a device here that matches your requirements. If you are entirely new to hardware wallets, start with the Hardware Wallet Buying Guide for foundational concepts before diving into the comparison table below.

Full Comparison Table

Wallet Price Coins Connectivity Open Source Secure Element Air-Gap Screen Battery
Trezor Safe 3 ~$79 Bitcoin + altcoins USB-C Full (FW + HW design) Optiga Trust M (debated) No Mono OLED No
Trezor Safe 5 ~$169 Bitcoin + altcoins USB-C Full (FW + HW design) EAL6+ Secure Element No Color touchscreen No
Ledger Nano S Plus ~$79 5,500+ coins USB-C Partial (app layer) CC EAL5+ No Mono OLED No
Ledger Nano X ~$149 5,500+ coins USB-C, Bluetooth Partial (app layer) CC EAL5+ No Mono OLED Yes
Ledger Flex ~$249 5,500+ coins USB-C, Bluetooth, NFC Partial (app layer) CC EAL5+ No E-ink touchscreen Yes
Coldcard MK4 ~$148 Bitcoin only USB-C, NFC, microSD Full (FW) Dual (ATECC608B + SE050) Yes Mono OLED No (USB/battery pack)
Coldcard Q ~$239 Bitcoin only USB-C, NFC, microSD Full (FW) Dual (ATECC608B + SE050) Yes Larger LCD Yes (AAA batteries)
Blockstream Jade ~$65 Bitcoin + Liquid USB-C, Bluetooth, camera Full (FW + HW design) Virtual (blind oracle) Yes (QR via camera) Color LCD Yes
Blockstream Jade Plus ~$100 Bitcoin + Liquid USB-C, Bluetooth, camera Full (FW + HW design) Virtual (blind oracle) Yes (QR via camera) Upgraded color LCD Yes
Keystone 3 Pro ~$149 Bitcoin + altcoins QR codes only (camera) Firmware (open source) EAL5+ (PCI) Yes (QR only) 4″ color touchscreen Yes
Foundation Passport ~$299 Bitcoin only Camera (QR), microSD Full (FW + HW design) ATECC608B Yes Color IPS Yes (removable)
BitBox02 Bitcoin-only ~$149 Bitcoin only USB-C Full (FW + HW design) ATECC608B No Mono OLED No

Category Winners

Best Budget: Blockstream Jade (~$65)

At $65, the original Jade undercuts everything else on this list. You get a fully open-source device with a camera for air-gapped QR-code signing, Bluetooth connectivity, and a color screen. The “virtual secure element” design — where the device uses Blockstream’s blind oracle server to decrypt the seed — is unconventional and not without trade-offs. If the oracle server goes offline permanently, you need your seed phrase to recover (which you should have backed up anyway). But for the price, no other device offers air-gapped signing capability, open-source firmware, and multi-connectivity options. If you want the upgraded build quality and larger screen, the Jade Plus at ~$100 is still budget-friendly.

Best Bitcoin-Only: Coldcard MK4 (~$148)

The Coldcard has been the standard-bearer for Bitcoin maximalists since 2018, and the MK4 continues that tradition. Dual secure elements, fully air-gapped operation via microSD or NFC, and firmware that will never support altcoins. The device runs on a philosophy that attack surface reduction matters — fewer features means fewer vulnerabilities. The MK4’s numeric keypad is functional but not luxurious; if you want a more comfortable input experience, the Coldcard Q adds a full QWERTY keyboard and larger screen for $91 more. Both models support advanced features like seed XOR, temporary seeds, and extensive multisig coordination.

Best Premium: Foundation Passport (~$299)

The Passport is the most expensive device here, and you can feel it in the build quality. Machined aluminum chassis, a removable battery, an IPS color screen, and a camera for QR-code scanning. The firmware and hardware designs are fully open source. Foundation has positioned the Passport as the premium Bitcoin-only signing device, and the build quality reflects that. It pairs natively with their Envoy app for mobile wallet coordination. At $299, it is a serious investment, but for users storing significant value in Bitcoin who want the best physical hardware experience, it stands alone. For an analysis of open-source hardware principles, see The Evolution and Ethics of Bitcoin Hardware Security.

Best Open Source: Trezor Safe 5 (~$169)

Trezor pioneered the open-source hardware wallet and remains the only major manufacturer that publishes both firmware and hardware schematics under permissive licenses. The Safe 5 is their current flagship: a color touchscreen with haptic feedback, an EAL6+ secure element (addressing years of criticism about lacking one), and support for a broad range of cryptocurrencies. The full-stack open-source approach means independent security researchers can audit every component. If open-source auditability is your top priority and you also hold altcoins, the Safe 5 is the strongest choice.

Best for Beginners: BitBox02 Bitcoin-only (~$149)

The BitBox02 makes the fewest demands on new users. Plug it in via USB-C, open the BitBoxApp on your computer, and follow the guided setup. The firmware is open source, the device includes an ATECC608B secure element, and the minimalist design means there are fewer things to configure or misunderstand. The Bitcoin-only edition runs firmware that physically cannot sign altcoin transactions — it is stripped at the code level. Swiss engineering, clean software, and a smooth onboarding experience make it the easiest recommendation for someone buying their first hardware wallet.

Security Architecture Comparison

Not all security architectures are equal, and understanding the differences helps you evaluate what you are actually trusting when you use each device.

Secure Element Approaches

The secure element debate has been central to hardware wallet security for years. Here are the distinct approaches:

Dedicated certified secure elements (Ledger, Trezor Safe 5, Keystone): These use bank-grade chips certified to Common Criteria EAL5+ or EAL6+. The secure element handles key storage and signing operations in a tamper-resistant environment. The trade-off: these chips typically run proprietary firmware that cannot be fully audited.

Companion secure elements (Coldcard, BitBox02, Passport): These devices use a general-purpose microcontroller for main operations and an ATECC608B (or similar) chip as a secondary security layer. The secure element stores secrets or provides attestation, but the main MCU handles signing. The firmware on the MCU is open source and auditable.

Virtual secure element (Blockstream Jade): Jade takes a completely different approach. The device has no hardware secure element. Instead, it uses a “blind oracle” protocol where an encrypted secret is stored on the device and decrypted using a PIN-derived key in combination with Blockstream’s server. This means the server cannot learn your keys (it never sees them in the clear), and the device alone cannot decrypt them without the correct PIN. The trade-off: you need network access for the oracle step during normal unlock, though you can optionally set up a fully offline PIN for emergency use.

For a deeper technical analysis of secure element vulnerabilities, read Side-Channel Attack Risks in Hardware Security.

Firmware Verification

How do you know the firmware running on your device is legitimate? Each manufacturer handles this differently:

  • Trezor: Fully open-source firmware. You can compile from source and compare the binary hash. The bootloader verifies firmware signatures on boot.
  • Ledger: The secure element verifies firmware integrity. The firmware for the secure element is not open source. Ledger has introduced Ledger Recover as an optional feature, which has sparked debate about the trust model.
  • Coldcard: Open-source firmware. You can verify the firmware hash displayed on the device against published hashes. The dual secure elements provide boot-time attestation.
  • Blockstream Jade: Fully open-source firmware and hardware. Reproducible builds allow independent verification.
  • Foundation Passport: Open-source firmware and hardware. Firmware updates are loaded via microSD, allowing fully air-gapped updates.
  • BitBox02: Open-source firmware. The device uses dual-chip architecture with secure boot.
  • Keystone: Open-source firmware. Firmware updates via QR code, maintaining the air gap.

For more on firmware update security, see Firmware Updates and Security Best Practices.

Connectivity Comparison

Connectivity is not just about convenience — it directly impacts your security model. Every communication channel between your signing device and your internet-connected computer or phone is a potential attack surface.

USB (All devices)

USB is the most common and most straightforward connection method. The device connects directly to your computer, and transaction data is transmitted over the USB protocol. This is simple and fast, but it means your signing device is physically connected to a potentially compromised machine. USB connections also carry theoretical risks from malicious USB payloads, though all reputable hardware wallets implement USB communication at the application level with limited protocol exposure.

Bluetooth (Ledger Nano X, Ledger Flex, Jade, Jade Plus)

Bluetooth enables wireless signing from a mobile device. This is convenient for on-the-go transactions but adds wireless attack surface. Ledger and Blockstream both encrypt the Bluetooth communication channel, and the device still requires physical confirmation of every transaction. The practical risk is low, but security purists avoid Bluetooth on principle. If you use Bluetooth, keep your device’s firmware updated and pair only with your own phone.

QR Codes / Camera (Jade, Jade Plus, Keystone, Passport)

QR-code-based communication via camera is the gold standard for air-gapped operation. The signing device and the coordinator software exchange transaction data through on-screen QR codes — no electrical or wireless connection whatsoever. The Keystone is the purest implementation, having no USB port at all. Passport and Jade use cameras to scan QR codes displayed on a phone or computer screen. The trade-off is speed: scanning multiple QR codes for a large or complex transaction can take a few seconds longer than USB.

NFC (Coldcard MK4, Coldcard Q, Ledger Flex)

Near-field communication allows tap-based data transfer between the signing device and a phone. Coldcard uses NFC for exporting PSBTs (partially signed Bitcoin transactions) and for sharing wallet configuration files. The NFC radio can be permanently disabled in Coldcard’s settings if you prefer to restrict communication to microSD only. NFC range is very short (a few centimeters), which limits remote attack possibilities.

MicroSD (Coldcard MK4, Coldcard Q, Passport)

The most paranoid air-gap option. Transaction data is saved to a microSD card on the computer, physically moved to the signing device, signed, and then moved back. There is zero wireless or wired connectivity between the signing device and any networked machine. The downside is workflow friction — but for cold storage that you access infrequently, it is the strongest isolation model available.

Multisig Compatibility

If you plan to use multisig — and you should consider it for significant holdings — verify that your chosen devices work together. Not all wallets play nicely in multi-vendor multisig setups.

The most broadly compatible devices for multisig coordination are Coldcard, Passport, Keystone, and BitBox02, all of which support standard descriptor-based multisig and work well with coordinator software like Sparrow Wallet, Electrum, or Nunchuk. Trezor and Ledger also support multisig but may require additional setup steps in some coordinator apps.

Using devices from multiple manufacturers in a single multisig quorum is a best practice — it eliminates single-vendor risk. If a critical vulnerability is found in one manufacturer’s firmware, your other keys are unaffected. For a detailed analysis, see Hardware Diversity in Multisig Security.

For guidance on setting up multisig from scratch, read Multi-Sig Wallet Configurations.

Which Wallet Should You Buy?

Decision frameworks help more than blanket recommendations:

You hold only bitcoin and want maximum security: Coldcard MK4 or Passport. Both are Bitcoin-only, air-gapped, and open source. Coldcard costs half the price. Passport has better build quality and UX.

You hold bitcoin and altcoins: Trezor Safe 5 for open source. Ledger Flex for the widest coin support and premium hardware. Keystone 3 Pro for air-gapped altcoin signing.

You are on a tight budget: Blockstream Jade at $65 is hard to beat. It does more than most devices twice its price.

You want the simplest setup experience: BitBox02 Bitcoin-only. Plug in, follow the app, done.

You are building a multisig setup: Mix vendors. A common combination is Coldcard + Passport + BitBox02, or Coldcard + Trezor + Jade. Diversity matters more than any single device choice. Read Transitioning from Single-Sig to Multisig for the full migration process.

You worry about supply chain attacks: Favor devices where you can verify firmware reproducibility. Trezor, Jade, and BitBox02 currently offer the most robust reproducible build processes. For a technical look at firmware-level threats, see Dark Skippy and Beyond.

Part of our free Bitcoin course: This topic is covered in depth in
Ledger vs Trezor: Best Hardware Wallet from the
Bitcoin Wallets & Self-Custody course.

Frequently Asked Questions

Do I need a secure element in my hardware wallet?

A secure element adds physical tamper resistance, making it harder for an attacker with physical access to extract your private keys through power analysis, electromagnetic probing, or chip decapping. However, a secure element is not strictly necessary for security. The original Trezor One operated for years without one, relying on strong firmware security and user-held seed phrase backups. The real question is your threat model: if you worry about sophisticated physical attacks on your device, a secure element matters. If your primary concern is remote software attacks, the firmware’s quality and auditability matter more. For a thorough analysis of physical attack vectors, see Side-Channel Attack Risks.

Is Bluetooth on a hardware wallet a security risk?

Bluetooth adds attack surface — that is undeniable. However, the practical risk is low when implemented correctly. Ledger and Blockstream both encrypt the Bluetooth channel, and the hardware wallet still requires physical button confirmation for every transaction. An attacker intercepting Bluetooth traffic would see encrypted data and could not approve transactions without physical access to the device. The real risk with Bluetooth is not interception but rather that Bluetooth firmware itself could contain vulnerabilities. If this concerns you, choose a device without Bluetooth or disable Bluetooth in device settings.

Should I buy a Bitcoin-only hardware wallet or one that supports altcoins?

If you only hold bitcoin, a Bitcoin-only device is strictly superior from a security perspective. Every additional coin’s codebase adds potential attack surface. Coldcard, Passport, and BitBox02 Bitcoin-only edition run firmware that physically cannot process altcoin transactions — the code is not present on the device. If you hold altcoins alongside bitcoin, you need a multi-coin device like Trezor, Ledger, or Keystone, or you can use a dedicated Bitcoin-only device for your bitcoin and a separate device for altcoins.

How important is air-gapped operation?

Air-gapping means your signing device never has a direct electrical or wireless connection to any networked computer. The signing device and the software wallet exchange transaction data via QR codes or microSD cards. This eliminates an entire class of attacks where malware on your computer could attempt to exploit the USB connection to the hardware wallet. For cold storage that you access infrequently, air-gapped operation is a strong security upgrade. For daily spending, the inconvenience may not be worthwhile. Most users benefit from a middle ground: use an air-gapped device for cold storage and a USB-connected device for routine transactions.

Can I use multiple hardware wallets together in a multisig setup?

Yes, and it is one of the most powerful security configurations available to individuals. A 2-of-3 multisig using three different hardware wallets from three different manufacturers means an attacker must compromise two separate devices with two different security architectures stored in two different locations. No single device failure, theft, or manufacturer vulnerability can result in loss of funds. Common multi-vendor combinations include Coldcard + Passport + BitBox02, or Coldcard + Trezor + Jade. Read Multisig Recovery Protocols to understand the recovery process before committing to a multisig setup.

You may also find our Bitcoin seed phrase security guide useful.

{“@context”: “https://schema.org”, “@type”: “FAQPage”, “mainEntity”: [{“@type”: “Question”, “name”: “Do I need a secure element in my hardware wallet?”, “acceptedAnswer”: {“@type”: “Answer”, “text”: “A secure element adds physical tamper resistance, making it harder for an attacker with physical access to extract your private keys through power analysis, electromagnetic probing, or chip decapping. However, a secure element is not strictly necessary for security. The original Trezor One operated for years without one, relying on strong firmware security and user-held seed phrase backups. The real question is your threat model: if you worry about sophisticated physical attacks on your devic…”}}, {“@type”: “Question”, “name”: “Is Bluetooth on a hardware wallet a security risk?”, “acceptedAnswer”: {“@type”: “Answer”, “text”: “Bluetooth adds attack surface — that is undeniable. However, the practical risk is low when implemented correctly. Ledger and Blockstream both encrypt the Bluetooth channel, and the hardware wallet still requires physical button confirmation for every transaction. An attacker intercepting Bluetooth traffic would see encrypted data and could not approve transactions without physical access to the device. The real risk with Bluetooth is not interception but rather that Bluetooth firmware itself…”}}, {“@type”: “Question”, “name”: “Should I buy a Bitcoin-only hardware wallet or one that supports altcoins?”, “acceptedAnswer”: {“@type”: “Answer”, “text”: “If you only hold bitcoin, a Bitcoin-only device is strictly superior from a security perspective. Every additional coin’s codebase adds potential attack surface. Coldcard, Passport, and BitBox02 Bitcoin-only edition run firmware that physically cannot process altcoin transactions — the code is not present on the device. If you hold altcoins alongside bitcoin, you need a multi-coin device like Trezor, Ledger, or Keystone, or you can use a dedicated Bitcoin-only device for your bitcoin and a se…”}}, {“@type”: “Question”, “name”: “How important is air-gapped operation?”, “acceptedAnswer”: {“@type”: “Answer”, “text”: “Air-gapping means your signing device never has a direct electrical or wireless connection to any networked computer. The signing device and the software wallet exchange transaction data via QR codes or microSD cards. This eliminates an entire class of attacks where malware on your computer could attempt to exploit the USB connection to the hardware wallet. For cold storage that you access infrequently, air-gapped operation is a strong security upgrade. For daily spending, the inconvenience m…”}}, {“@type”: “Question”, “name”: “Can I use multiple hardware wallets together in a multisig setup?”, “acceptedAnswer”: {“@type”: “Answer”, “text”: “Yes, and it is one of the most powerful security configurations available to individuals. A 2-of-3 multisig using three different hardware wallets from three different manufacturers means an attacker must compromise two separate devices with two different security architectures stored in two different locations. No single device failure, theft, or manufacturer vulnerability can result in loss of funds. Common multi-vendor combinations include Coldcard + Passport + BitBox02, or Coldcard + Trez…”}}]}

Search on Knowing Bitcoin