Device Verification Guarantee
With our simple Device Verification tool, you can double check and ensure your Keystone 3 Pro device or downloaded firmware isn't corrupted.
Protect yourself against any Supply Chain Attack
Ensure no Browser Hijacking or Tampering occurred when you downloaded your firmware update

1
Scan QR code
2
Input the
verification code
verification code
3
Get Result
Frequently Asked Questions
My device passed verification - does this mean I no longer need to worry about security?
Passing device verification confirms that your hardware and firmware are genuine and untampered, which is an important security foundation. However, security is multi-layered. You should also:
1) Store your seed phrase safely - a metal medium like Keystone Tablet Plus is recommended for permanent storage;
2) Set a strong PIN and never share it with anyone;
3) Regularly update firmware to get the latest security fixes;
4) Only download firmware and software from official channels.
1) Store your seed phrase safely - a metal medium like Keystone Tablet Plus is recommended for permanent storage;
2) Set a strong PIN and never share it with anyone;
3) Regularly update firmware to get the latest security fixes;
4) Only download firmware and software from official channels.
Will device verification expose my private key or seed phrase?
Absolutely not. Device verification is based on a cryptographic signature mechanism. The entire verification process only involves publicly available device identification information and does not expose your private key, seed phrase, or any sensitive data in any way. Keystone's design philosophy is zero data retention - private keys never leave the device.
What does a failed device verification mean? What should I do?
A failed verification may indicate that the device firmware has been tampered with, the device is counterfeit, or there is a supply chain attack risk. If this occurs, immediately stop using the device and do not perform any operations on it - especially do not enter your seed phrase. Save a screenshot or record of the failed verification result and immediately contact the official Keystone support team at support@keyst.one to report the issue.
When should I perform device verification? Does it only need to be done once?
Device verification is recommended at the following key moments:
1) Upon receiving a new device, before first boot;
2) After the device has been unused for a long time or kept by someone else;
3) Whenever you have any doubts about the device's origin.
While it is not mandatory to verify before every use, performing it regularly is a good security practice.
1) Upon receiving a new device, before first boot;
2) After the device has been unused for a long time or kept by someone else;
3) Whenever you have any doubts about the device's origin.
While it is not mandatory to verify before every use, performing it regularly is a good security practice.
What is the device verification process? How long does it take?
The verification process is very simple, with three steps:
1) Use your device to scan the QR code on the webpage;
2) Enter the verification code displayed on your device into the verification tool on this page;
3) Wait for the system to return the verification result. The entire process usually takes only 1-2 minutes. If the result shows 'Verification passed,' it means your device is genuine and has not been tampered with; if verification fails, please contact official customer support immediately (support@keyst.one).
1) Use your device to scan the QR code on the webpage;
2) Enter the verification code displayed on your device into the verification tool on this page;
3) Wait for the system to return the verification result. The entire process usually takes only 1-2 minutes. If the result shows 'Verification passed,' it means your device is genuine and has not been tampered with; if verification fails, please contact official customer support immediately (support@keyst.one).
What is Device Verification and why do I need it?
Device Verification is a security tool provided by Keystone to confirm that your device and firmware are genuine and have not been tampered with. It defends against Supply Chain Attacks, where the device may be maliciously modified between factory and delivery.


