Skip to main content

Ledger Nano S Hardware Wallet – Review

Ledger Nano S

The Ledger Nano S is not quite the same as Ledger’s other two equipment wallets—the Ledger Nano and Ledger HW.1—in light of the fact that it has a screen. The Nano S’s screen implies, as other equipment wallets (like KeepKey or TREZOR), it can be utilized even on a PC that is tainted with malware.

The Ledger Nano comes bundled and incorporates the accompanying things:

  • Ledger Nano S
  • 1 micro USB link
  • Cord for wearing gadget around your neck
  • One keychain and key ring
  • Recovery sheet for recording seed


The Ledger Nano S is currently selling on Amazon for $99.99

I highly recommend you never purchase your hardware wallet from an untrusted source such as eBay. Only purchase from the Ledger store or from Amazon.

Physical Buttons

Like the TREZOR, the S additionally has two physical buttons which add to its security.

So as to confirm a payment you have to physically press the two buttons. This makes it so no programmer could hack into your gadget and confirm a payment.


The Ledger Nano S additionally requires the client to make a PIN code on setup. The PIN code keeps the loss of bitcoins in the event that your lose your gadget.

An outsider would not have the capacity to send bitcoins from your Nano S since he/she would not know your pin code. After three incorrect entries of the pin, the gadget wipes itself.

Disconnected Storage

Bitcoins and private keys put away on an online PC are simple focus for programmers. When you utilize an equipment wallet, which stores your bitcoins disconnected, at that point your coins are put away offline and distant from cyber thieves.

Security Seal

The case ships with carefully designed tape around the bundling. On the off chance that this tape gives off an impression of being changed in any capacity, it is likely somebody messed with your gadget before it touched base to you.

Why is the Nano S’s screen Important?

The S’s screen allows you to enter your security pin without entering it on what could be an infected computer. This extra layer of security ensures hackers cannot gain access to your private keys.