LearnMar 23Security Blind Spots of Hardware Wallets: Analyzing the Covert Threat of Supply Chain Attacks