I've always said it's safer to be a fish in the ocean than a shark in a tank.
Do yourself a favor and learn how to securely use an air-gapped PC. It takes about an hour for a total beginner to understand, and it's knowledge that will last a lifetime without needing to trust hardware wallet companies.
For small amounts, you can use your phone and Cake Wallet or whatever you prefer.
Phishing attacks are not the fault of hardware wallets, and if you're vulnerable to such threats, you'll get hacked anyway.
Just saying, having an old dedicated laptop is still safer than dealing with these companies.
...The database that leaked from Ledger is used constantly, and the fact that someone emphasized this news is nothing specific, because everything always boils down to the same thing.
The company said they would never store your information, yet they did.
They lied, and people still trust them and their closed-source firmware. 😮
I may need to remind you: The whole cryptocurrency revolution is about being trustless, about not having to trust anyone, because trust is
always abused.
Any software that is not open-source and not audited should not be trusted, not only in cryptocurrency but in general.
With hardware wallets (or any closed source projects), you're not the owner of the coins; you're the user, and the company behind it is the owner, controlling what happens inside that black box.