My main concern is when you enter your seed phrase during the restore process, and most people will be connecting their nano ledger s plus to the laptop and using ledger live, many some others won't be connecting that usb a cable provided by ledger directly to their laptop and have to use one of those 4 or 7 or 10 port hubs that are usb a because their laptop might not even have 1 usb a port. Or say they use a thunderbolt dock to connect the usb a device.
So there is zero concern of this? So you telling me if let say someone knows you have a nano ledger and you going to buy a new one or restore an old one with the phrase, has access to your port hub or thunderbolt dock and let say they know you ordered a new nano ledger to restore your seed, there is no way someone compromise any of the usb a ports whether it's on your laptop, port hub, or even a thunderbolt hub and it read the seed after you manually enter each seed word each time? Or imagine you picked up a usb a port hub somewhere or friend gave it to you. Those are still safe? Heard about how back in the days, people would intentionally drop usb drives on the floor and anyone that connect it to their laptop would get malware on their computer. But this is much different? Certainly someone could compromise all or some usb a ports on a port hub or thunderbolt dock if they wanted to? But it won't affect anything with nano ledger? But if it's connecting a mouse or keyboard or regular flash drive, that's a different story?
Also you have to connect the nano ledger s plus to your laptop and use ledger live during the restore process right?
Has there been any case like what i described?
Delayed response, but since nobody gave it, I'll try to explain how the recovery works. I've had to do it before with a Nano S as these devices don't last past a couple of years with heavy usage...
When entering your seed, in case it wasn't clear, you do so on the device and the device only (not via Ledger Live directly). This is done by scrolling through letters in order to select the correct seeds words out of the potential 4K+ words available. Once complete, it's the public keys that are sent to Ledger Live (not your private keys). So it wouldn't
theoretically matter if there was malware on your computer etc. Or more relevantly, there is no additional risk of entering a new (recovered) seed phrase into the device and having the public keys sent to Ledger Live than the seed that device comes with.
Also you have to connect the nano ledger s plus to your laptop and use ledger live during the restore process right?
Worth pointing out that with Nano S you don't even need Ledger Live, or an online computer to recover your wallet, it is done on device only:
https://support.ledger.com/hc/en-us/articles/4404382560913-Restore-your-Ledger-accounts-with-your-recovery-phrase?This might well be the case with Nano S Plus / Nano X, as Ledger Live simply provides the instructions to perform the action.
In theory it should not matter how compromised anything is. It should not matter.
This response otherwise didn't age well, given the recent news:
https://bitcointalk.org/index.php?topic=5452900.01. Now if your laptop has malware or keylogger or anything like that, could the malware somehow read your seed when you enter it into the new nano ledger screen to restore?? Now what if you have malware in your bios? Always heard bios malware is the worst? Always heard because of the firmware of the nano ledger, it protects your seed phrase and when sending and worst case is they change the btc address you sending to but you are the one to confirm or deny the transaction. However, does the firmware protect you when you enter your seed phrase to restore in a new nano ledger device?
In summary, although there is no additional risk to recovering your seed phrase to a new ledger as far as I can tell, given how security conscious you are (OP), then probably best to move on from Ledger to another hardware wallet. Because now it is possible for the firmware to extract your seed phrase (and always was it seems), so things like firmware-based malware on a computer suddenly makes a huge difference.