You should probably read this and other warnings in their thread before installing software from untrusted sources:
Being "Controled by Linux OS" provides no security. Please go into the more technical details of your security process (assuming you have one)
My bet: This is going to be some Android phone (Linux) with as many Wallet apps from Google Play installed as possible.
Their whitepaper is full of marketing bs, or they are just very uninformed.Let's begin:
The current market of hardware wallets, generally considered the safest format of all available, is dominated by Ledger Nano S and Trezor. Unfortunately, they both require connecting to a computer, which is often inconvenient and can compromise security, as the computer is the security weak link.
Both the Ledger and Trezor are safe with infected computers, due to their design. Provide some info about why the computer is the weak link, and tell me why no viruses have been written to steal coins from my Trezor so far (minus phishing). Why are the only vulnerabilities (now patched) require physical address to the device, doing things such as
freezing it, or
opening it up? Why are people bothering with hacking the hardware using somewhat extreme cases instead of just making a program?
A user has fallen prey to phishing and installed spyware
on the device.
This is not possible with HODLER. The device cannot install third party
applications, thanks to a specially designed operating system.
With time, and a Wifi accessible device, surely a bypass could be found? Nintendo Switch was designed to not allow 3rd party applications,
yet people have had success getting Linux working on it.Private keys have been stolen from the backup in the cloud. Again, not possible with HODLER
something something Bitfinex hack something something shapeshift hack something something coincheck hack something something etc
Claiming something in the cloud isn't hackable is wrong.
Private keys have been stolen during the execution of a backup from unsecured public WIFI network.
Impossible. The channel used to transfer the backup is point-to-point encrypted.
Point to point encryption has been cracked in the past. What future knowledge do you have to know that your encryption is safe from everything, even quantum computing and space aliens?
Breaking into a device through the network.
Unrealistic, due to a dedicated operating system with its own very
restrictive security features and automatic ‘switch offline’ mode between
payments.
Surprised you didn't call this one impossible. Care to elaborate on the security measures used?
(archive of thread, as I left negative trust feedback)I consider this extremely shady, or intentionally misleading investors and customers at the very least.