Trezor Wallet is a self-custodial hardware wallet built by SatoshiLabs. It provides secure storage for cryptocurrencies with an easy-to-use interface.
Platforms: as a hardware wallet.
Walletbeat's database does not have the necessary information on Trezor Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
Transactions in Ethereum are very difficult to reverse, and there is no shortage of scams. Wallets have a role to play in helping users avoid known scams ahead of the user making the transaction.
Wallets are rated based on whether they alert the user about potential scams. This is measured along three scenarios: Does the wallet warn the user when...
Sending funds to an address the user has never previously sent or received funds from before
Interacting with a contract that is known to be a scam
Interacting with a contract that the user has never previously interacted with before
Interacting with a contract that has only recently been deployed onchain
Connecting to an app that is known to be a scam
For payments-focused wallets that do not support interacting with arbitrary contracts or external applications, only the payment scenario applies.
Note that wallets should only warn the user about such scenarios, not outright prevent the user from making such transactions, as preventing them entirely would limit the user's ability to have real sovereignty over their own wallet.
Wallets are also rated based on whether these warnings are implemented in a privacy-preserving manner. Specifically:
When sending funds, does the lookup for past interactions with that address unconditionally reveal the sender and recipient addresses to a third-party other than the wallet's default RPC provider for this chain?
Wallets can implement this feature in a privacy-preserving manner by maintaining a local set of known addresses.
When interacting with a contract, does the check whether that contract is known to be a scam reveal the user's IP address together with the contract address about to be interacted with?
This is a privacy leak similar to that of leaking the user's browsing history, as contract addresses are usually closely tied to the application being visited.
Wallets can implement this feature in a privacy-preserving manner by maintaining a local, frequently-updated cache of known-scam contract addresses.
When connecting to an application, does the check whether that application reveal the domain name or URL of the application being used?
If leaking full URLs, this is a privacy leak similar to that of leaking the user's browsing history.
If leaking domain names only, they must not be linkable to the user's IP address or Ethereum address.
Wallets can implement this feature in a privacy-preserving manner by maintaining a local, frequently-updated cache of known-scam contract URLs, or by looking up such a list based on a domain hash prefix like Safe Browsing .
It does not implement any form of scam alerting.
It leaks visited URLs to a third-party as part of its malicious app warning feature.
It implements some but not all of the required scam warning features.
It implements all required scam warning features, but not in a privacy-preserving manner.
It implements all required scam warning features in a privacy-preserving manner.
Trezor Wallet supports hardware wallets with partial clear signing through this hardware wallet. Most transaction details are displayed on the hardware wallet screen for verification, but some complex transactions may not show all details. Clear signing is crucial for security as it allows users to verify transaction details before signing.
Clear signing is a critical security feature for hardware wallets that allows users to verify transaction details directly on their hardware wallet's screen before signing. This verification step is crucial for preventing attacks where malicious software might attempt to trick users into signing transactions with different parameters than what they intended.
Without clear signing, users must trust that the software wallet is displaying the correct transaction details and not manipulating them. With clear signing, the hardware wallet shows the actual transaction details that will be signed, providing an independent verification mechanism that significantly enhances security.
Full clear signing implementations ensure that all relevant transaction details (recipient address, amount, fees, etc.) are clearly displayed on the hardware wallet screen, allowing users to make informed decisions before authorizing transactions.
Hardware wallets are evaluated based on their implementation of clear signing capabilities.
A hardware wallet receives a passing rating if it implements full clear signing, where all transaction details are clearly displayed on the hardware wallet screen for verification before signing. This includes support for standard transactions, ERC-20 token transfers, 712 messages and complex contract interactions.
The hardware should be able to clear sign all transaction types on Safe and Aave. To do so the hardware should be able to connect directly to the dapp or allow the user to use at least two different software wallets independent from the hardware manufacturer.
A hardware wallet receives a partial rating if it implements clear signing but with limitations, such as not displaying all transaction details or not supporting clear signing for all transaction types.
A hardware wallet fails this attribute if it doesn't properly implement clear signing functionality, requiring users to trust the connected software wallet without independent verification.
It implements full clear signing with hardware wallets, displaying all transaction details on the hardware wallet screen for verification before signing.
It implements partial clear signing, where most but not all transaction details are displayed on the hardware wallet screen.
It implements basic clear signing, but the implementation is limited and doesn't provide full transparency for all transaction details.
It supports hardware wallets but does not implement clear signing.
It does not support hardware wallets at all.
Trezor Wallet should extend its clear signing implementation to cover all transaction types and ensure all details are clearly displayed on the hardware wallet screen.
Trezor Wallet implements a comprehensive bug bounty program that offers strong incentives for security researchers to find and report vulnerabilities. The program has a wide scope, competitive rewards, and a responsive disclosure process.
Additionally, the wallet provides a clear upgrade path for users when security issues are identified.
Hardware wallets manage sensitive cryptographic keys and access to users' funds, making them high-value targets for attackers. Bug bounty programs incentivize security researchers to responsibly discover and disclose vulnerabilities, rather than exploit them.
A well-structured bug bounty program:
Provides clear guidelines for researchers to report vulnerabilities
Offers appropriate rewards based on severity of findings
Demonstrates a commitment to addressing security issues quickly
Communicates transparently about discovered vulnerabilities and their resolution
Additionally, hardware wallets should provide upgrade paths for users when critical security issues are discovered, as these physical devices can't always be fixed with simple software updates.
Hardware wallets are assessed based on the comprehensiveness of their bug bounty program:
Pass (Best): Implements a comprehensive bug bounty program with:
Clear scope and guidelines
Competitive rewards based on severity
Responsive disclosure process
Transparent communication about fixes
Offers upgrade paths for users when needed
Partial: Implements a basic bug bounty program with limitations:
Basic vulnerability disclosure policy but no formal rewards
Limited scope or small rewards
Slower response times
Unclear upgrade paths for users
Fail: No bug bounty program or security update process:
No formal process for reporting vulnerabilities
No incentives for responsible disclosure
No clear path for providing security updates
Known critical vulnerabilities remain unaddressed
It implements a comprehensive bug bounty program with clear incentives and responsive processes. It offers competitive rewards based on severity, has a transparent disclosure process, and provides upgrade paths for users.
It implements a basic bug bounty program with limited scope or rewards. However, it does provide a clear upgrade path for users when security issues are discovered.
It implements a vulnerability disclosure policy but does not offer formal rewards. It also lacks a clear upgrade path for users when security issues are discovered.
It does not implement any bug bounty program or vulnerability disclosure policy. It also lacks a clear process for providing security updates to address critical issues.
Walletbeat's database does not have the necessary information on Trezor Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
Your wallet address is unique and permanent, which makes it easy for applications and companies like Chainalysis to track your activity. In web-privacy terms, it is worse than cookies: its record is permanent, publicly visible, and even tracks across multiple devices and websites. The more personal information is linkable to your wallet address, the more effective such tracking can be. It is therefore important to use a wallet that does its best to protect your information from being linked to your wallet address.
In order to qualify for a perfect rating on wallet address privacy, a wallet must not, by default, allow any third-party to link your wallet address to any personal information.
As Walletbeat only considers the wallet's default behavior, wallets may still choose to offer features that allow third-parties to link wallet addresses with personal information, so long as this is done with explicit user opt-in.
To determine this, Walletbeat looks at the network requests made by wallets in their default configuration, and the contents of such requests. If a request contains the user's wallet address, we look at whether it also contains any other personal information, such as the user's name, pseudonym, email address, phone number, CEX account information, etc.
Additionally, if such a request is not proxied, then it inherently reveals the user's IP address and ties it with the user's wallet address, which is also personal information.
It requires user information (other than IP address and pseudonyms) by default, and uploads this data to a third-party or records it onchain in a publicly-viewable manner.
It allows a third party to learn the relationship between a user's wallet address and their IP address by default. This is treated as a partial rating because users may mitigate against this by forcing wallet requests to be proxied on their own.
It requires the user to identify themselves via a pseudonym which is sent to a third-party or recorded onchain. This is treated as a partial rating because users may choose an arbitrary pseudonym for each of their wallet address to mitigate this privacy issue.
It does not require any user information to function by default, and proxies all network requests carrying the user's wallet address.
It relies exclusively on a user's self-hosted node, involving no third parties.
Walletbeat's database does not have the necessary information on Trezor Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
You probably have more than one wallet address configured in your wallet, which you use for different purposes and perhaps as different identities. These wallet addresses all belong to you, but you would rather keep that fact private. It is therefore important to use a wallet that does not reveal that fact.
Wallets are assessed based on whether a third-party can learn that two or more of the user's wallet addresses belong to the same user.
A third-party may learn of this correlation either through the wallet software explicitly sending this data (e.g. through analytics), or by requesting data about multiple wallet addresses in bulk, which allows the receiving endpoint to learn that all of these addresses belong to the same user. Similar correlations are also possible by IP and/or time-based correlation of requests that each contain one wallet address.
In order to prevent this information from being revealed, wallets can use a variety of strategies:
Wallets may offer the user to only have one active wallet address at a time, and only ever makes requests about the active wallet address. The user is expected to not change their active address often. The wallet should also ensure that any account-switching widget does not cause bulk/simultaneous requests about multiple addresses to the same endpoint, such as for refreshing balances. Note that this scheme, while simple to implement, is incompatible with stealth addresses. This is because stealth addresses inherently require the user to simultaneously manage a range of addresses.
Wallets may look up information about multiple addresses by splitting up the requests such that each request only contains one address, then sending these requests over different proxy circuits in a manner that staggers the requests over time. This ensures that the receiving endpoint cannot correlate addressed based on timing or IP address.
Wallets may distribute requests across multiple RPC endpoints owned by separate entities for each wallet address, preventing each entity from learning more than one wallet address.
It refreshes multiple address balances by grouping all of these addresses in the same request.
It makes multiple simultaneous requests about each of the user's wallet balances, without proxying or staggering the requests.
It makes multiple simultaneous requests about each of the user's wallet balances, proxying each of them through a different proxy circuit (e.g. Tor with unique circuits for each wallet address). The receiving endpoint may still correlate these addresses through time-based correlation.
It makes multiple requests about each of the user's wallet balances, staggering them over time to avoid time-based correlation. The receiving endpoint may still correlate these addresses through IP-address-based correlation.
It makes multiple requests about each of the user's wallet balances, staggering them over time to avoid time-based correlation, and using unique proxy circuits for each wallet address to avoid IP-address-based correlation.
It distributes requests about each of the user's wallet balances across unique RPC endpoints owned by different entities, preventing any single entity from learning about more than one wallet address.
It only has one active wallet address at a time, and only ever makes requests about this wallet address and no other.
It runs by default with a user's own self-hosted node, preventing any third-party from learning about any of the user's wallet addresses.
Walletbeat's database does not have the necessary information on Trezor Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
Ethereum's design goes to painstaking lengths to ensure that users can run an Ethereum L1 node on commodity consumer-grade hardware and residential Internet connections. Running your own node gives you several important benefits:
Privacy: Because the wallet can work directly on your own hardware with no outside dependencies, the wallet can query data about the state of the chain without revealing private details such as your wallet address or IP address to a third-party RPC provider.
Integrity: Relying on a third-party RPC provider means that this provider may return incorrect data about the state of the chain, tricking you into signing a transaction that ends up having a different effect than the one you intended. Your own L1 node will verify the integrity of the chain, so such attacks cannot occur when using a self-hosted node.
Censorship resistance: Because an L1 node may broadcast transactions into a shared mempool directly to other nodes in the network, your transactions are not censorable by a third-party RPC provider that would otherwise act as an intermediary.
No downtime: Because the L1 node is running on your own hardware, you are not at risk of losing funds or opportunities due to downtime from a third-party RPC provider.
Wallets are rated based on whether they allow the user to configure the RPC endpoint used for Ethereum mainnet, and whether such configuration is possible before any request is made to a third-party RPC endpoint by default.
It lets you configure the RPC endpoint used for Ethereum mainnet.
It does not let you configure the RPC endpoint used for Ethereum mainnet, but lets you add a custom chain with your own self-hosted node as RPC endpoint.
It lets you configure the RPC endpoint used for Ethereum mainnet, but makes requests to a third-party RPC provider before the user has a chance to modify this RPC endpoint configuration.
It uses a third-party Ethereum node provider and does not let you change this setting.
Walletbeat's database does not have the necessary information on Trezor Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
Question: What if a wallet's dev team walked away or turned evil one day?
One of Ethereum's core promises as an Internet upgrade is to avoid the possibility for user lock-in of web2. This is achieved by ensuring accounts are permissionlessly portable across wallets.
Ensuring that accounts remain portable avoids wallets becoming lock-in vectors in web3. Permissionless account portability also keeps the wallet ecosystem healthy through open competition.
Wallets are rated based on whether accounts created within can be exported out of the wallet and imported into another, without requiring permission from the exporter wallet provider.
For EOA wallets based on private keys, this is relatively straightforward to determine. However, for more complex situations such as multisig wallets, Walletbeat considers whether such wallets can be made fully self-custodial, and whether assets and tokens can be permissionlessly transferred out of the wallet.
Specifically:
EOA wallets are rated based on the exportability of their private key material, and on whether such private key material is derived using the following standards:
MPC wallets are rated based on whether the user has a sufficient shares of the underlying key to have full control over the wallet in a self-custodial manner. Additionally, there must be a way for the user to generate a transaction (Walletbeat uses a token transfer out of the wallet as the litmus transaction for this) without reliance on a third-party API or proprietary application. The combination of these factors ensures that the wallet remains self-custodial and that the account cannot be frozen in-place due to an uncooperative third party.
ERC-4337 (smart contract wallets) are rated based on
the level of control the user has over their account according to the
smart contract's control logic that the wallet uses. The user must be
in control of who controls their account by default, and be able to
permissionlessly create asset transfer transactions.
Specifically, the rating considers:
Whether the user has the ability to change the cryptographic keys used to control the account in general, in a manner that does not involve relying on a third party or proprietary software.
Whether the smart contract wallet's default configuration starts out with the user having self-custody of their account, for example by having a majority of the key shares in self-custody in a multisig wallet.
Whether the generation of a token transfer transaction requires relying on a third-party or proprietary software, even if the user has self-custody of all requisite cryptographic keys to sign such a transaction.
EIP-7702 are not yet rated on account portability and will show up as "Unrated".
If a wallet supports multiple types of accounts, the rating for the account type it supports that is least portable takes precedence. This makes the final rating act as an effective "floor" across the account types the wallet supports.
If a wallet supports multiple types of accounts and all of them have the same level of portability, the account type that takes precedence is the one that the wallet offers the user to create by default.
It is an EOA wallet that does not use common seed phrase derivation standards for EOA key derivation, and does not allow the user to export their private keys.
It is an MPC wallet where the user does not have sufficient key shares under self-custody to unilaterally control the account by default.
It is an MPC wallet where the user is in self-custody of sufficient key shares to unilaterally control the account, but cannot generate a token transfer transaction without relying on a third party API.
It is an ERC-4337 (smart contract) wallet where the control logic of the smart contract is such that the user cannot update it to have the user's own private keys as the sole controlling keys of the account.
It is an ERC-4337 (smart contract) wallet over which the user does not have full self-custodial control by default, and needs to rely on a third-party API or proprietary software to modify this.
It is an ERC-4337 (smart contract) wallet over which the user has full self-custodial control by default, but still needs to rely on a third-party API or proprietary software to generate a valid token transfer transaction.
It is an EOA wallet that does not use common seed phrase derivation standards for EOA key derivation, but does allow the user to export private keys so that they can be imported into other wallets.
It is an MPC wallet where the user is in self-custody of sufficient key shares to unilaterally control the account, but cannot generate a token transfer transaction without the use of proprietary software.
It is an ERC-4337 (smart contract) wallet over which the user does not have full self-custodial control by default, but can create a transaction that modifies this using standalone open-source software.
It is an MPC wallet where the user is in self-custody of sufficient key shares to unilaterally control the account, and can generate a token transfer transaction using standalone open-source software which does not rely on any third party API.
It is an ERC-4337 (smart contract) wallet over which the user has full self-custodial control by default, and can create token transfer transactions using solely open-source software without relying on a third-party API.
Walletbeat's database does not have the necessary information on Trezor Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
One of the core tenets of Ethereum is censorship resistance. This means that users must be able to reliably get transactions included onchain, without the ability for intermediaries to prevent this from happening.
This property is critical to ensure that all Ethereum participants are provided equal-opportunity, unfettered access to Ethereum, and to ensure that Ethereum is resilient to attackers that would want to prevent others from using Ethereum on such footing.
In order to uphold this property on Ethereum L2s, users must be able to force transactions to be included on L2 chains as well. Most L2s implement such functionality by allowing L2 transactions to be submitted on the L1, and enforcing that their sequencing logic must respect such L1 force-inclusion requests by including them on the L2 chain, typically within some fixed duration.
By verifying that the wallet supports L2 force-withdrawal transactions, this attribute verifies censorship resistance at both levels: L1 and L2.
Wallets are rated based on whether users need to trust any intermediary in order to withdraw their funds from L2s.
This fundamentally requires two major features:
A wallet must support the creation of an L1 transaction which forces the L2 to withdraw user funds back to the L1. This message is typically posted as an L1 transaction which forces the L2 sequencing process to take it into account.
Since L2 force-withdrawal transactions require an L1 transaction, the wallet must also be able to get this transaction included without relying on a third-party to broadcast this transaction for block inclusion. Therefore, the wallet must also support either participating in Ethereum's L1 gossip network, or (for environments that do not support this such as browser extension wallets) support broadcasting L1 transactions through a user's self-hosted Ethereum node.
With these two features in place, users can withdraw their L2 funds without trusting intermediaries.
Walletbeat currently only considers OP Stack chains and Arbitrum One for this evaluation, but more L2 chains may be added as support for force-withdrawal transaction becomes feasible for them.
It supports force-withdrawal transactions on L2s, and can be configured to broadcast this transaction using a user's self-hosted L1 node.
It supports force-withdrawal transactions on L2s, and supports directly gossipping such transactions over the Ethereum L1 network.
It supports force-withdrawal transactions on L2s, but requires the use of a third-party RPC provider to submit the L1 transaction that it would take to initiate this force-withdrawal transaction.
It supports force-withdrawal transactions on some L2s, but not all of the L2s that are configured out of the box.
It does not support force-withdrawal transactions on L2s.
Walletbeat's database does not have the necessary information on Trezor Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
Free and Open Source Software (FOSS) licensing allows a software project's source code to be freely used, modified and distributed. This allows better collaboration, more transparency into the software development practices that go into the project, and allows security researchers to more easily identify and report security vulnerabilities. In short, it turns software projects into public goods.
Wallets are assessed based whether the license of their source code meets the Open Source Initiative's definition of open source .
It is licensed under a license that represents a commitment to switch to a Free and Open Source Software (FOSS) license by a specific date. Examples of such licenses include BUSL .
It is licensed under any non-FOSS (proprietary) license.
Its source code repository is missing a license file. The lack of a license file may be an accidental omission on the wallet developers' part, but also may indicate that the wallet may set its license to a proprietary license. Therefore, Walletbeat makes the conservative assumption that the wallet is not be Free and Open Open Source Software until it does have a valid license file.
Walletbeat's database does not have the necessary information on Trezor Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
When using a wallet, users are entrusting it to preserve their funds safely. This requires a high level of trust in the wallet's source code and in the wallet's development team. By making the wallet's source code visible to the public, its source code can be more easily inspected for security vulnerabilities and for potential malicious code. This improves the wallet's security and trustworthiness.
Wallets are assessed based on whether or not their source code is publicly visible, irrespective of the license of the source code.
If a wallet's source code is visible, it passes. If not, it fails.
Walletbeat's database does not have the necessary information on Trezor Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
Wallets are complex, high-stakes pieces of software. They must be maintained, regularly audited, and follow the continuous improvements in the ecosystem. This requires a reliable, transparent source of funding.
Wallets are assessed based on how sustainable, transparent, and user-aligned their funding mechanisms are.
Wallets are typically funded by one or more of the following methods:
Self-funding from developers
Seeking donations from users
Seeking grants from foundations
Venture capital funding
Charging fees on convenience functions (e.g. swapping and bridging tokens)
Governance tokens
Commemorative NFT sales
Walletbeat looks at each funding source of funding and verifies whether it is done transparently and in a user-aligned manner. In this context, "user alignment" refers to whether a source of funding grows as a function of the user's own goals, rather than being uncorrelated or anti-correlated. For example, funding acquired through hidden swap fees or governance token sales with undisclosed insider token allocations are not user-aligned. Funding acquired through transparent swap fees, user donations, or ecosystem grants are user-aligned.
In order to pass this criterion, wallets must have at least one source of funding, and all of their sources of funding must be transparent to users. Additionally, if the wallet is funded from multiple sources and some of these sources are not user-aligned, the public must be able to determine the proportion of each such funding source to the wallet's overall revenue. Depending on the funding mechanism, this can be done through publication of a revenue breakdown page, public regulatory filings, or token allocation and vesting disclosures.
It has funding but has not revealed this publicly and transparently to users.
It does not have any funding. Wallets must have sustainable funding sources in order to remain secure and up-to-date.
It is funded from hidden swap fees. While users can look this up onchain to see how much revenue the wallet is generating from this, making this funding source technically transparent, it is not user-aligned.
It is funded from user-visible swap fees and governance token sales with undisclosed vesting schedule. While users can use onchain lookups to determine how much revenue is generated from both sources, making the funding technically transparent, the undisclosed nature of governance token makes makes this not user-aligned.
It is funded from user-visible swap fees and pre-disclosed governance token sales.
It is funded from venture capital and publishes regulatory filings showing the amount raised in each round and the top investors of each round.
It is funded from onchain donations, onchain ecosystem grants, and commemorative NFT sales.
Walletbeat's database does not have the necessary information on Trezor Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
Fee transparency is crucial for users to understand the full cost of their transactions. Without clear fee information, users may be surprised by high transaction costs or hidden fees charged by the wallet.
Transparent fee disclosure helps users make informed decisions about when to transact and which wallet to use. It also builds trust between users and wallet providers by ensuring that all costs are clearly communicated upfront.
Additionally, understanding the purpose of a transaction is important for security. When users can clearly see what they're authorizing (e.g., a token swap, NFT purchase, or contract interaction), they're less likely to approve malicious transactions.
Wallets are evaluated based on how transparently they display transaction fees and transaction purposes to users.
A wallet receives a passing rating if it provides comprehensive fee information, including detailed breakdowns of network fees, clear disclosure of any additional wallet fees, and clear explanation of transaction purposes.
A wallet receives a partial rating if it provides some fee information but lacks complete transparency in one or more areas.
A wallet fails this attribute if it provides minimal or no fee information before transaction confirmation.
It provides comprehensive fee information, including detailed breakdowns of network fees, clear disclosure of any additional wallet fees, and clear explanation of transaction purposes.
It provides detailed information about network fees, but may not fully disclose additional wallet fees or clearly show transaction purposes.
It provides basic information about transaction fees, but the information is limited and may not include a breakdown of costs.
It does not provide clear information about transaction fees before users confirm transactions.
Walletbeat's database does not have the necessary information on Trezor Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
User experience on Ethereum has historically suffered from the limitations of Externally-Owned Accounts (EOAs), which is the type of account most Ethereum users use today. By contrast, smart wallet accounts offer many UX and security improvements, such as the ability to:
Batch multiple transactions, removing the need for separate "token approval" transactions before every other token operation.
Pay gas fees in other tokens than Ether, or having third-parties sponsor transaction fees (with ERC-4337)
Delegate some operation to trusted third-parties, such as allowing onchain games to withdraw small amounts of tokens without signing pop-ups for each and every transaction.
Change transaction authorization logic, enabling the use of Passkeys (and mobile phone authentication methods) for signing transactions.
Update the set of keys used to control the wallet, enabling the switch to quantum-resistant encryption algorithms in the future.
Define account recovery rules, reducing the risk of losing access to your account when losing a private key or a device.
However, smart wallet accounts have historically been an all-or-nothing, wallet-specific proposition for users. There was no transition path to such wallets.
As part of the Pectra upgrade , EIP-7702 changes this situation by allowing a clean path for existing EOAs to obtain all of the UX benefits of smart wallet accounts and account abstraction, without the need for users to switch to a different account address. This represents a large User Experience upgrade for all Ethereum EOA users.
Wallets are rated based on whether they make use of EIP-7702 transactions (for EOA or MPC wallets), or if they support ERC-4337 transactions (for smart contract wallets).
Because the user experience benefits of these enhancements are still in-flight and are expected to develop as these standards mature and are built on top of, Walletbeat does not currently consider which improvements wallets provide for their users as a result of these new capabilities. However, it is expected that a future version of this attribute would look at such improvements; for example, to verify that users are able to update the signing authority of their wallets to a quantum-safe signature scheme.
It supports EOA accounts and can use Account Abstraction features via EIP-7702: Account Abstraction via smart contract authority delegation.
It supports smart wallet accounts using ERC-4337: Account Abstraction for smart contract wallets.
It only supports plain EOAs without Account Abstraction features.
It only supports MPC wallets without Account Abstraction features.
Walletbeat's database does not have the necessary information on Trezor Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
Ethereum addresses are hexadecimal strings (0x...
) which are
unreadable to humans. Phishing scams and exploits have used this to
trick users into sending funds to invalid addresses, for example by
generating lookalike-addresses and tricking users into copy/pasting
them without noticing the difference.
Additionally, Ethereum's transition to layer 2s has changed user needs when sending funds. The hexadecimal address isn't sufficient anymore; the user needs to ensure that they are sending funds to the correct hexadecimal address on the correct chain, increasing the potential for mistakenly sending funds to the wrong place or the wrong chain.
Address naming registries like ENS partially solve this problem by
allowing more human-readable names like username.eth
to be
automatically turned into the hexadecimal address. This is easier to
share and to accurately transfer by humans. Additionally, some address
format standards improve upon this further by including the destination
chain information as part of the address itself. Such standards include:
ERC-7828: Chain-specific addresses using ENS: [email protected]
ERC-7831: Multi-chain addresses: user.eth:l2chain
Wallets that support either of these standards are able to automatically determine the destination address and chain from a human-readable string, and can bridge funds across chains as appropriate. This improves the user experience of Ethereum and its layer 2 ecosystem while reducing the potential for mistakes when sending funds.
Wallets are rated based on the types of addresses they support sending funds to.
Specifically, Walletbeat recognizes the following destination address formats:
Plain ENS addresses (username.eth
) without destination chain information
ERC-7828: Chain-specific addresses using ENS: [email protected]
ERC-7831: Multi-chain addresses: user.eth:l2chain
Wallets must resolve either ERC-7828 or ERC-7831 addresses to fulfill this attribute. Support for plain ENS addresses alone earns a partial rating.
Additionally, the mechanism used to do the resolution must either:
Be done using onchain data and reusing the wallet's common chain interaction client, inheriting its verifiability (via light client) and privacy properties.
OR be done using an offchain third-party provider in such a way that the address returned by the third-party provider is verifiable, and without revealing the user's IP address to the provider. This ensures that the wallet cannot be tricked into sending funds to an attacker compromising the offchain provider's responses, and that the provider may not progressively learn the user's contacts list by associating its successive resolution queries by IP over time.
It only supports sending funds to raw (0x...
) addresses.
It only resolves plain ENS addresses (username.eth
) which do not include a destination chain.