Cryptocurrency

Ledger Introduces Security Enhancements For Wallet Nano

Bitcoin wallet security remains a persistent headache for the cryptocurrency market. Hardware-based wallets offer better protection than software alternatives, but many manufacturers cut corners on th

By James Gray··1 min read
Ledger Introduces Security Enhancements For Wallet Nano

Key Points

  • Bitcoin wallet security remains a persistent headache for the cryptocurrency market.
  • Hardware-based wallets offer better protection than software alternatives, but many manufacturers cut corners on th

Bitcoin wallet security remains a persistent headache for the cryptocurrency market. Hardware-based wallets offer better protection than software alternatives, but many manufacturers cut corners on the software side. Ledger, one of the leading names in hardware wallet security, has announced improvements to its Nano device to address some of these shortcomings.

Advertisement

728×90

The Nano contains a security card housed in the device. When you approve a transaction, you enter codes from this card into your computer. This creates a vulnerability. Malware running on your system can capture and record these codes as you type them. After observing enough transactions, an attacker collects sufficient codes to fabricate their own unauthorized transactions. Using these stolen codes, they can sign transfers to their own addresses and steal your bitcoin.

To fix this problem, Ledger developed a mobile application that works with the Nano. You verify transaction details on your phone through the app before the wallet processes any transfer. This adds a second authentication layer. An attacker would need malware running on both your computer and your phone to breach this protection. Compromising two devices at once puts an attacker in a much tougher position than hitting a single machine.

Ledger CTO Nicolas Bacca contends this approach beats 2-of-2 multisignature implementations. Attacking both devices creates far more challenges for criminals. But perfect security doesn't exist. Humans are the weak point. Weak passwords, phishing attacks, misplaced recovery seeds, and theft can breach any system, no matter the engineering behind it.

MiningPool content is intended for information and educational purposes only and does not constitute financial, investment, or legal advice.

Advertisement

728×90

Related Stories

Stay informed

Verifiable crypto journalism, delivered to your inbox.

Weekday mornings. No hype. No financial advice. Just what happened and why it matters.

No spam. Unsubscribe anytime. Read our privacy policy.