Wallet Logo

Open Ledger Micro

Latest release: ?? ( 25th March 2018 ) 🔍 Last analysed 19th May 2022 . Do-It-Yourself Project
22nd March 2018

This project is not meant for non-technical end users.

As part of our Methodology, we ask:

Is the product meant to be ready for use "out of the box"?

If the answer is "no", we mark it as "Do-It-Yourself Project".

Many hardware wallet projects aim to be as transparent as possible by using only off-the-shelf hardware with an open design and open code. If the product reviewed is not available in an assembled form - if the user has to source his own hardware to then maybe solder and compile software to install on the device it falls into this category.

Help spread awareness for build reproducibility

Please help us spread the word discussing build reproducibility with Open Ledger Micro  via their Twitter!

Do your own research!

Try out searching for "lost bitcoins", "stole my money" or "scammers" together with the wallet's name, even if you think the wallet is generally trustworthy. For all the bigger wallets you will find accusations. Make sure you understand why they were made and if you are comfortable with the provider's reaction.

If you find something we should include, you can create an issue or edit this analysis yourself and create a merge request for your changes.

The Analysis 

Background Information

This is an Open Source do-it-yourself project coded by Nic Raboy, described in this blog post:

The Raspberry Pi Zero is a $5.00 computer with no WiFi or Bluetooth and can be configured to emulate Ethernet over USB. The application written in Go and Angular, serves a RESTful API to be consumed with the integrated Angular application.

Device Specifics

The point of hardware wallets is that they hold encrypted private keys, never expose the private keys, and operate in an offline environment. We are using a Raspberry Pi Zero because it has neither WiFi or Bluetooth which makes it much more difficult to compromise.

Once configured, software like Bonjour on a host machine will allow the Raspberry Pi Zero to be accessed by its hostname. For example, http://raspberrypi.local would show the Angular web application.

Sensitive information such as private keys are encrypted on the Raspberry Pi and are never exposed through HTTP. Transactions are created and signed directly on the device and returned to the Angular application.


This is a do-it-yourself project.