Wallet Logo

Zeokku Teensy 2.0 DIY Hardware Wallet

Latest release: ?? ( 28th February 2022 ) 🔍 Last analysed 21st May 2022 . Do-It-Yourself Project
14th February 2022

This project is not meant for non-technical end users.

As part of our Methodology, we ask:

Is the product meant to be ready for use "out of the box"?

If the answer is "no", we mark it as "Do-It-Yourself Project".

Many hardware wallet projects aim to be as transparent as possible by using only off-the-shelf hardware with an open design and open code. If the product reviewed is not available in an assembled form - if the user has to source his own hardware to then maybe solder and compile software to install on the device it falls into this category.

Help spread awareness for build reproducibility

Please help us spread the word discussing build reproducibility with Zeokku Teensy 2.0 DIY Hardware Wallet  via their Twitter!

Do your own research!

Try out searching for "lost bitcoins", "stole my money" or "scammers" together with the wallet's name, even if you think the wallet is generally trustworthy. For all the bigger wallets you will find accusations. Make sure you understand why they were made and if you are comfortable with the provider's reaction.

If you find something we should include, you can create an issue or edit this analysis yourself and create a merge request for your changes.

The Analysis 


The Teensy 2.0 is an Arduino compatible breadboard-friendly development board. Zeokku is an informal organization with a lot of projects including the Zeokku Teensy 2.0 DIY Hardware Wallet.

This is a recent do-it-yourself project posted on GitHub. Its aim is to use the Teensy into a key storage and signature generation device.

Product Description


You will need Arduino IDE for building the firmware


The wallet uses Ed25519 signature scheme. The key is stored in encrypted form in EEPROM memory along with password seed and IV. The encryption method used is AES-256 with OFB mode. OFB mode is chosen due to the fact it cannot be parallelized for both decryption and encryption meaning to uncover full private key the attacker will have to act sequentially in any case. And because OFB uses exact same scheme for encryption and decryption we have some memory savings.


This is an active do-it-yourself project.