A user
plugs in the hardware wallet to a desktop / pc, creates public key and private key and then the wallet gets created.
And luckily even if
you plug in your hardware wallet device into a computer that is affected by malicious software or viruses your private keys will not be compromised or be in any danger.
Not exact matches
But to send funds or issue a receiving address, a
hardware wallet has to be
plugged in to an internet - enabled device, and researchers have discovered a vulnerability that affects Ledger devices at this stage.
Hardware wallets are tiny devices or smart cards that you
plug -
in to your computer / phone over USB.
It is also similar to many other
hardware wallets in the space, where you access the
wallet via a Chrome browser
plug -
in.