Many people don't take this aspect of security seriously, dismissing the
possibility that it could happen to them. Some even flaunt it: posting
relevant information about their crypto assets on social media, putting
their Hardware Wallet sticker on their car window, etc. The truth is,
robbing a self-custodian can be very lucrative, and the statistics are
growing exponentially. It's wise to be physically and mentally prepared
for this eventuality, including measures in your designed scheme.
When it comes to hardware wallets, more and more offer the ability to
manage “secondary wallets,” allowing you to keep the real one hidden and
a superficial one to mislead the attacker. Additionally, if you create a
passphrase when defining your seed, you add an extra layer of security
that will allow you to control a threat situation where you are forced
to hand over the keys.
As an additional measure, Cuvex offers multi-signature when creating
your cryptogram. This greatly strengthens your scheme by allowing you to
diversify the ownership of the key to your secret. Even if the thief
threatens you with a wrench, they will have to settle for the fact that
you are only a fragment of the key that opens the chest.
If your implementation also involves cyberspace, you need to be even
more careful. The main avenue of theft and threats is here, and any
measure you take is not too much. The best practice is to designate a
computer exclusively for this purpose, not use any unknown software, and
always connect via VPN, preferably through TOR.
It's worth reminding you that regarding Cuvex, none of the device's
processes require an internet connection. Even the firmware update is
done without an internet connection; the app is responsible for
downloading the update and then sending it through a secure one-way
Bluetooth channel.