Hardware categories
General purpose hardware, like personal computers and smartphones, work great for most basic bitcoin operations. In some circumstances, dedicated hardware devices are optimized for the nuances of bitcoin. We’ll explore them and how they work here.
Physical backups #
Recovery phrases and other important recovery data such as descriptors are often backed up physically. Many simple, cheap, and robust physical backup solutions for bitcoin exist.
Many users back up their wallet using metal plates that have their recovery phrase etched into them. This protects the recovery phrase from various forms of physical destruction. Seedplate is an example of such a product.
A simpler option is writing a recovery phrase on a piece of paper. Paper can be easily destroyed compared to steel, making this option less secure.
Some applications, such as Muun have users print out encrypted PDF backups that contain all the required recovery data, not just the recovery phrase.
See bitcoin backups for more details.
Hardware wallets #
You may already be familiar with physical security keys from your bank or work. They are small devices with built-in authentication that control and secure access to a device or service. Security keys are not connected to the Internet (air-gapped) or any other network, so they are difficult to tamper with.
Bitcoin hardware wallets, also called signers, act like bitcoin-centric security keys. They isolate the recovery phrase, private keys, and other sensitive data like output descriptors from the internet and other devices.
Hardware wallets only exchange non-sensitive information with external devices. Sensitive processes happen on the device, such as signing a transaction to open a lightning network payment channel. Most interactions with hardware wallets happen via desktop software, like wallets.
Nodes #
A node is a device that participates in a network. There are two types of nodes to understand: A bitcoin node that participates in the bitcoin network and a lightning node that participates in the lightning network. For a deeper dive into what purpose these nodes serve check out the technology primer.
It is quite common to have dedicated hardware to run bitcoin node software. This ensures your node stays in sync with the network and is regularly verifying the network rules, increasing bitcoin’s security. Some node software also comes packaged with other third-party applications, which may benefit from dedicated hardware and more regular uptime.
Lightning node software can be run on a smartphone. Though, this often comes with trusting a third-party for certain node functions such as payment path construction. For this reason, dedicated hardware lightning nodes may be a better option for those who do not want a trust-minimized setup.
Heavy users of the lightning network, such as routing node operators, often run lightning nodes on dedicated hardware. Lightning nodes require 24/7 uptime, which is much easier to achieve with dedicated hardware. Lightning nodes also require the private keys to be stored on the same device. Dedicated hardware reduces the attack surface and makes it easier to secure private keys.
Plug-and-play hardware nodes exist and make it simple to set up a dedicated hardware node. The most common way people run dedicated hardware nodes is installing a node OS, like Umbrel or MyNode, on a hardware device.
See our nodes page for more details on how they work.
Mining hardware #
Miners are the backbone of bitcoin generating new blocks, which creates new bitcoin. Dedicated mining hardware, which runs dedicated mining software, exists for mining bitcoin. Various billion-dollar industries have developed around the manufacture and deployment of such hardware.
When bitcoin was first launched back in 2009, mining hardware was mostly conducted by CPUs and GPUs. As the network grew in size, and the market around mining grew, more specialized and powerful hardware known as application-specific integrated circuits (ASICs) became the standard mining hardware.
Today, most bitcoin miners use SHA-256 Application-Specific Integrated Circuit (ASICs). These are optimized to continuously execute the SHA-256 hashing algorithm, which bitcoin uses to find new blocks, with the goal of finding a suitable hash and thus mining a new bitcoin block. Modern miners (2021) are capable of producing 100 trillion hashes per second.
ATMs #
Bitcoin Automated Teller Machines (ATM) are a convenient way to buy or sell bitcoin using cash or card.
Much like traditional ATMs, bitcoin ATMs allow the deposit and withdrawal of money. Bitcoin ATMs, however allow someone to deposit fiat currencies in exchange for bitcoin.
Modern bitcoin ATMs take advantage of the bitcoin lightning network. This enables almost instant withdrawals and cheaper fees, making the purchase experience more friendly and cost-effective.
Bitcoin ATMs are usually bound to local money transmission laws and regulations, such as Know Your Customer (KYC) and Anti-Money Laundering (AML) regulations. More on Wikipedia.
You can find local ATMs using services like coinatmradar.
Point of sale #
People looking to accept bitcoin payments, especially when using the lightning network, sometimes use dedicated point of sale (POS) hardware terminals when selling goods and services.
Dedicated bitcoin POS hardware is used to request and receive bitcoin payments in-person. These act very similar to traditional POS systems but present to payees a bitcoin payment request. Payment requests can also be shared and paid over NFC if it’s supported.
When accepting lightning payments, these POS terminals often connect to a remote, always-on lightning node. For example, a merchant may use a dedicated iPad to connect to a BTCPay Server instance.
Accepting lightning payments with POS hardware can also be fully offline, using a standard like LNURL to easily receive payments. An example of this is LNURLPoS.
Ready to learn more about designing bitcoin products?