Supply Chain Attack
Security● Common
Compromising bitcoin security by tampering with hardware or software before it reaches the user. Includes: modified hardware wallets, backdoored firmware, malicious dependencies in software. Difficult to detect; requires verifying supply chain integrity.
Technical Notes
Vectors: intercepted shipments, compromised manufacturers, malicious npm/pip packages, backdoored compilers. Mitigations: buy direct from manufacturer, verify firmware signatures, reproducible builds, inspect hardware, DIY devices (SeedSigner).
Metadata
Visibility: Public
Created:1/3/2026by System