For peace of mind, backups are made to microSD card instantly and can be managed from the desktop app.
The BitBox01 features a touch sensitive LED which is used to confirm important actions, such as transaction confirmation, device reset, firmware updates etc.
Secure your favourite online accounts with universal 2 factor authentication. U2F gives you the ability to login to your online accounts securely using the BitBox as a physical security key.
Not even during the initial setup or backup. The onboard microcontroller generates a wallet using a high-quality hardware random number generator to create entropy.
The onboard slot for a micro SD card allows offline backup and recovery. There is no need to expose your wallet while typing on a keyboard or displaying recovery information on a screen, leaving it susceptible to theft by key logging, screen captures, and cameras.
Unlike other hardware wallets, you can backup your wallet at anytime and as often as you like. Switch between different wallets in a snap.
We appreciate paranoia. Therefore, external entropy is added to the hardware random number generator in two ways. First, in order to remove the need to trust the hardware, some entropy is added by us through random bytes set during the factory installation. In order to remove the need to trust us, some more is automatically gathered from you when entering your device password
They will also need to steal your password in order to steal your coins. If two-factor authentication is enabled, they will also need your second factor device (such as a mobile phone). After 15 unsuccessful attempts to guess the password, the BitBox will erase all secrets and reset in order to mitigate brute force attacks.
Hardware wallets are designed to prevent the majority of malware, such as key logging and file stealing, from allowing someone to get your coins. Even if someone learns the wallet password, the keys stay buried inside the hardware wallet. Using the keys requires physically pressing a touch button and, optionally, two-factor authentication (2FA) using a mobile app. With the mobile app, even handcrafted malware on a fully compromised computer, such as a man-in-the-middle attack (MITM), are mitigated.
Use plausible deniability. A secondary password can open a hidden wallet. Put some change there to add plausibility. Or, in case you are forced to recover a wallet from a backup, entering the wrong password will create a valid but different wallet.