CryptoKeySafe CK bracket markCRYPTOKEYSAFE
Back to Blog
Wallet ReviewsMarch 202610 min read

Air Gapped Wallets Compared: Keystone vs NGrave vs Ellipal

All three use QR code communication with zero wireless interfaces. But their secure element specs, firmware transparency, and usability differ significantly. A side by side analysis.

Keystone 3 Pro, NGRAVE ZERO, and ELLIPAL Titan 2.0 all use QR code communication with zero wireless interfaces. In theory, they're solving the same problem: eliminate the USB attack surface by making the signing device physically isolated from the internet-connected computer it works with. In practice, they have significant differences in secure element certification, firmware transparency, and the specific QR workflow they use.

How Air-Gapped QR Signing Works

The QR signing workflow is the same across all three devices. You create an unsigned transaction in your wallet software (MetaMask, BlueWallet, or a companion app). The wallet software displays this as a QR code. You scan it with the hardware device's camera. The device decodes the transaction, displays the details on its screen, and you verify them. If correct, you confirm on the device. The device generates a signed transaction QR. You scan that QR back into the wallet software, which broadcasts it to the network.

The critical security property: the signing device never has a data connection to the computer or the internet. It receives only QR images and produces only QR images. A compromised computer cannot directly extract keys from the device, cannot silently alter transaction parameters after signing, and cannot install firmware through a data channel.

QR Signing Doesn't Eliminate All Risk

The device displays transaction details for you to verify before signing. If you confirm without reading those details, you have the same risk as any hardware wallet. The security advantage is on the attack side - the isolation eliminates specific attack vectors. The verification step still requires you to actually read the destination address and amount on the device screen.

Keystone 3 Pro

Keystone 3 Pro

View Device

Air-gapped (QR) | Open source firmware | Three MCU architecture | No SE

The Keystone 3 Pro uses three separate microcontrollers rather than a dedicated secure element chip: one handles the user interface and display, one handles cryptographic operations and key storage, and one verifies the integrity of the other two. This is a different architectural approach from the SE-based devices. The firmware is fully open source under an MIT license (github.com/KeystoneHQ).

The device does not have a CC EAL certification. The Keystone team argues that open source firmware auditable by the security community provides equivalent or greater assurance than a closed-chip certification - a position that is defensible but different from the industry standard.

Compatibility is a notable strength. Keystone 3 Pro integrates natively with MetaMask as an air-gapped hardware wallet option - the workflow is built into MetaMask's “Add hardware wallet” flow. It also supports BlueWallet for Bitcoin, Sparrow Wallet, and several others. This integration quality reduces friction significantly compared to devices that require custom companion apps.

The large 4-inch touchscreen makes transaction verification comfortable. Contract interaction data is decoded and displayed in human-readable format rather than raw hex.

NGRAVE ZERO

NGRAVE ZERO

View Device

Air-gapped (QR) | EAL7 certified SE | Closed source firmware | IMEC-designed chip

NGRAVE ZERO holds the EAL7 Common Criteria certification - the highest level in the CC framework. EAL7 requires formal mathematical verification of security properties, not just empirical testing. The secure element chip was developed in partnership with IMEC, the Belgian microelectronics research institute that also works on advanced semiconductor research for defense and intelligence applications.

The key generation process is distinctive. NGRAVE ZERO uses a combination of the device's internal true random number generator plus ambient light captured through its camera to generate entropy. This reduces reliance on a single source of randomness - a meaningful improvement over devices that rely entirely on a hardware RNG that could theoretically be manipulated at manufacture.

The trade-off is firmware transparency. NGRAVE's firmware is closed source. You cannot audit what the software does with the chip's certified hardware. The hardware certification is meaningful, but the complete security assurance requires trusting NGRAVE's internal security practices.

The NGRAVE LIQUID app handles the QR scanning and transaction construction on the phone side. The ecosystem is more self-contained than Keystone - you're primarily working within NGRAVE's own software. Supported coins are broad but integration with third-party wallet software is more limited than Keystone.

ELLIPAL Titan 2.0

ELLIPAL Titan 2.0

View Device

Air-gapped (QR) | Metal casing | Anti-tamper wipe | No CC cert | Closed firmware

ELLIPAL Titan 2.0 uses an Allwinner A40i processor - this is a general-purpose application processor, not a dedicated secure element chip. The device does not hold a CC EAL certification. The security architecture here is different from both Keystone and NGRAVE: rather than relying on a certified SE chip, ELLIPAL's security model centers on physical protection and anti-tamper mechanisms.

The metal casing includes a tamper-detection circuit. If the device is physically opened - screws removed, casing separated - the device detects this and wipes its stored data. This addresses a specific physical attack scenario: an attacker who steals the device and attempts to extract memory chips. The wipe makes this attack economically unattractive.

The firmware is closed source. The large 4-inch color touchscreen makes the device comfortable to use. The ELLIPAL companion app handles transaction construction and QR display. Coin support is extensive - over 10,000 coins and tokens. The primary concern from a security architecture standpoint is the lack of a dedicated secure element, which means private key operations run on a general-purpose processor with its associated attack surface.

Direct Comparison

FactorKeystone 3 ProNGRAVE ZEROELLIPAL Titan 2.0
Secure Element3x MCU (no SE)Custom EAL7 chipAllwinner A40i (no SE)
CC CertificationNoneEAL7 (highest)None
FirmwareOpen source (MIT)Closed sourceClosed source
Anti-tamperNoNoYes (wipe on open)
3rd party walletsMetaMask, BlueWallet, SparrowNGRAVE LIQUID primarilyELLIPAL app primarily
Price range (2026)~$169~$398~$139
BatteryYesYesYes

Which One to Choose

If third-party wallet compatibility matters - you want to use MetaMask, Sparrow, or BlueWallet with your device - Keystone 3 Pro is the clear choice. The open source firmware is auditable, the MetaMask integration is native and well-maintained, and the price is reasonable.

If the highest possible hardware certification is the priority and you're comfortable with a more contained ecosystem, NGRAVE ZERO is the only device in the market with EAL7. The closed firmware is a trade-off you accept in exchange for the chip-level assurance.

ELLIPAL Titan 2.0 is positioned below both on security architecture (general-purpose processor, no CC cert, closed firmware) but above both on physical anti-tamper protection. For users who are primarily concerned about physical device theft rather than sophisticated remote or supply chain attacks, the anti-tamper wipe mechanism is a meaningful differentiator.

All Three vs. USB-Connected Alternatives

All three air-gapped QR devices eliminate the USB attack surface completely. If you're choosing between an air-gapped QR device and a USB-connected hardware wallet with a higher SE certification, the air-gap is a more practical security improvement for most threat models. USB attacks are realistic. Certified SE chip extraction requires lab-grade equipment and physical device access. Know your threat model before optimizing for the less likely attack.