Three hardware experts took to the stage at 35C3 to demonstrate their methods for breaking into popular cryptocurrency hardware wallets. The methods range from simple to advanced, but they prove that it can be done using a number of methods, and targeting a number of different system vulnerabilities.