Saturday, November 22, 2025
DIGESTWIRE
Contribute
CONTACT US
  • Home
  • World
  • UK
  • US
  • Breaking News
  • Technology
  • Entertainment
  • Health Care
  • Business
  • Sports
    • Sports
    • Cricket
    • Football
  • Defense
  • Crypto
    • Crypto News
    • Crypto Calculator
    • Coins Marketcap
    • Top Gainers and Loser of the day
    • Crypto Exchanges
  • Politics
  • Opinion
  • Blog
  • Founders
No Result
View All Result
  • Home
  • World
  • UK
  • US
  • Breaking News
  • Technology
  • Entertainment
  • Health Care
  • Business
  • Sports
    • Sports
    • Cricket
    • Football
  • Defense
  • Crypto
    • Crypto News
    • Crypto Calculator
    • Coins Marketcap
    • Top Gainers and Loser of the day
    • Crypto Exchanges
  • Politics
  • Opinion
  • Blog
  • Founders
No Result
View All Result
DIGESTWIRE
No Result
View All Result
Home Blockchain

Ledger points to zero-day phone exploits as evolving risk for crypto security

by DigestWire member
June 17, 2024
in Blockchain, Crypto Market, Cryptocurrency
0
Ledger points to zero-day phone exploits as evolving risk for crypto security
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

CryptoSlate caught up with Ledger’s CTO Charles Guillemet at BTC Prague on a range of topics, from what really happened during the Ledget ConnectKit exploit to the intricate challenges of securing such a high percentage of the world’s digital assets. Guillemet’s background, deeply rooted in cryptography and hardware security, provides a strong foundation for his role at Ledger. He began his career designing secure integrated circuits, which later translated into his approach to creating secure elements for Ledger devices.

Security Challenges in Blockchain and Bitcoin

During the interview, Charles Guillemet delved into the distinct security challenges posed by blockchain and Bitcoin technology. His insights were shaped by his extensive background in secure integrated circuits and cryptography.

Guillemet explained that, in traditional banking cards and passports, the security keys are managed by the bank or the state. However, in blockchain technology, individuals manage their own keys. This fundamental shift introduces significant security challenges, as users must ensure that their value is protected from unauthorized access and loss. He highlighted:

“In ledger devices, you are managing your keys while in your banking cards and your passport, this is your bank’s or state’s secret. This is the big difference.”

Since users own their value, it becomes imperative to secure it, ensuring it is neither lost nor accessed by unauthorized parties. This requires robust measures to prevent software malware from gaining access and to protect against physical attacks.

“Having a dedicated device is the best way to do that. And also you must prevent an attacker with physical access from getting access to your secrets.”

The CTO also pointed out that blockchain’s immutability makes the security challenge even more significant. Ledger technology secures over 20 percent of the market cap, equating to approximately $500 billion. This immense responsibility is managed by leveraging the best available technology to ensure security. Guillemet confidently stated that, so far, their approach has been successful, allowing him to sleep well at night despite the high stakes involved.

Ledger’s Response to Security Breaches and Supply Chain Security

Charles Guillemet addressed Ledger’s approach to handling security breaches, particularly the incident involving the Ledger ConnectKit. He described the challenge posed by supply chain attacks on software, emphasizing the difficulty in preventing such attacks entirely.

When discussing the breach, Guillemet recounted how a developer’s account was compromised through a phishing link, leading to an attacker obtaining the API key. This allowed the attacker to inject malicious code into the NPM repository used by websites integrating Ledger devices. He highlighted the swift response from Ledger to mitigate the impact:

“We noticed the attack very quickly and we were able to kill it very, very quickly. From the time where he compromised the access and we stopped the attack, only five hours passed.”

Despite the breach, the damage was limited due to Ledger’s prompt action and the inherent security features of their devices, which require users to manually sign transactions, ensuring they verify the transaction details.

Guillemet furthermore discussed the broader issue of supply chain security, emphasizing the complexity of managing software vulnerabilities. He pointed out that while due diligence and best practices can help, completely preventing supply chain attacks remains a significant challenge. He cited an example of a sophisticated supply chain attack:

“LG recently had a package on UNIX distribution that was backdoored by someone committing to the open source repository, exploiting SSH servers. It spread to every single server in the world before it was noticed.”

This example illustrated the pervasive nature of supply chain attacks and the difficulty in detecting and mitigating them. Perhaps unsurprisingly, he advocated for the use of hardware wallets for crypto security. However, he adeptly explained why, clarifying that they offer a limited attack surface and can be thoroughly audited.

Human and Technical Threats to Security

Charles Guillemet provided a comprehensive overview of the multifaceted nature of security threats in the blockchain space, encompassing both human and technical elements. He emphasized that attackers are highly result-oriented, constantly evolving their strategies based on the cost and potential reward of their attacks. Initially, simple phishing attacks that tricked users into entering their 24-word recovery phrases were prevalent. However, as users became more aware, attackers shifted their tactics towards more sophisticated methods.

Guillemet explained:

“Now attackers are tricking users into signing complex transactions that they don’t understand, which leads to their wallets being drained.”

He noted the rise of organized crypto-draining operations, where different parties collaborate to create and exploit crypto drainers, sharing the proceeds at the smart contract level. Guillemet predicted that future attacks might focus on software wallets on phones, exploiting zero-day vulnerabilities that can provide full access to a device without user interaction.

Given the inherent vulnerabilities of mobile and desktop devices, Guillemet stressed the importance of recognizing that these devices are not secure by default. He recommended:

“If you think that your data is secured on your desktop or laptop, think again. If there is an attacker determined to extract the data, nothing will prevent them from doing so.”

He advised users to avoid storing sensitive information such as seeds or wallet files on their computers, as they are prime targets for attackers.

Balancing security with usability is a significant challenge in the crypto wallet industry. Ledger’s approach prioritizes security as the North Star while continuously striving to improve user experience. Guillemet acknowledged that features like Ledger Recover, which aim to simplify the user experience, have sparked debate. He explained that while such features are designed to help newcomers manage their 24-word recovery phrases more easily, they are entirely optional:

“We are providing options, giving the choice. It’s an open platform. If you don’t like a feature, you don’t have to use it.”

The goal is to cater to a broad range of users, from those who prefer full control over their security to those who need more user-friendly solutions. Guillemet recognized that mass adoption of digital assets requires addressing usability issues without compromising on security. Ledger aims to strike this balance by offering flexible options while maintaining the highest security standards.

The post Ledger points to zero-day phone exploits as evolving risk for crypto security appeared first on CryptoSlate.

Read Entire Article
Tags: BlockchainCoin SurgesCryptoslate
Share30Tweet19
Next Post
Here’s What Every Celeb Wore To The 2024 Tony Awards

Here's What Every Celeb Wore To The 2024 Tony Awards

Cumberland Earns Bitlicense, Bolstering Institutional and OTC Crypto Services

Cumberland Earns Bitlicense, Bolstering Institutional and OTC Crypto Services

Sabrina Carpenter Reacted To Speculation That Taylor Swift Had A Problem With Her Skims Campaign

Sabrina Carpenter Reacted To Speculation That Taylor Swift Had A Problem With Her Skims Campaign

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

No Result
View All Result
Coins MarketCap Live Updates Coins MarketCap Live Updates Coins MarketCap Live Updates
ADVERTISEMENT

Highlights

Selma Blair Shares Health Update Amid Her Multiple Sclerosis Battle

Indian Institute of Creative Technologies, Australia’s Deakin University Sign Partnership at WAVES Film Bazaar

Radiohead Returns to London: The Best Moments From the Band’s First U.K. Show in 8 Years

Starmer addresses G20 summit – but Trump boycotts talks

Woman charged with fraud over ‘sale of Oasis tickets’

Spot Bitcoin ETFs pull $238M as Ether funds snap 8-day outflow streak

Trending

Geyer shines on debut as Renshaw gets pink-ball test
Cricket

Geyer shines on debut as Renshaw gets pink-ball test

by DigestWire member
November 22, 2025
0

The 22-year-old quick took four wickets on debut for Queensland in the day-night game at the Gabba

Smith stalls talk on Head’s permanent role as Ashes opener

Smith stalls talk on Head’s permanent role as Ashes opener

November 22, 2025
Brittany Mahomes Shares Snap of Daughter Sterling, 4, Using $4000 Bag

Brittany Mahomes Shares Snap of Daughter Sterling, 4, Using $4000 Bag

November 22, 2025
Selma Blair Shares Health Update Amid Her Multiple Sclerosis Battle

Selma Blair Shares Health Update Amid Her Multiple Sclerosis Battle

November 22, 2025
Indian Institute of Creative Technologies, Australia’s Deakin University Sign Partnership at WAVES Film Bazaar

Indian Institute of Creative Technologies, Australia’s Deakin University Sign Partnership at WAVES Film Bazaar

November 22, 2025
DIGEST WIRE

DigestWire is an automated news feed that utilizes AI technology to gather information from sources with varying perspectives. This allows users to gain a comprehensive understanding of different arguments and make informed decisions. DigestWire is dedicated to serving the public interest and upholding democratic values.

Privacy Policy     Terms and Conditions

Recent News

  • Geyer shines on debut as Renshaw gets pink-ball test November 22, 2025
  • Smith stalls talk on Head’s permanent role as Ashes opener November 22, 2025
  • Brittany Mahomes Shares Snap of Daughter Sterling, 4, Using $4000 Bag November 22, 2025

Categories

  • Blockchain
  • Blog
  • Breaking News
  • Business
  • Cricket
  • Crypto Market
  • Cryptocurrency
  • Defense
  • Entertainment
  • Football
  • Founders
  • Health Care
  • Opinion
  • Politics
  • Sports
  • Strange
  • Technology
  • UK News
  • Uncategorized
  • US News
  • World

© 2020-23 Digest Wire. All rights belong to their respective owners.

No Result
View All Result
  • Home
  • World
  • UK
  • US
  • Breaking News
  • Technology
  • Entertainment
  • Health Care
  • Business
  • Sports
    • Sports
    • Cricket
    • Football
  • Defense
  • Crypto
    • Crypto News
    • Crypto Calculator
    • Blockchain
    • Coins Marketcap
    • Top Gainers and Loser of the day
    • Crypto Exchanges
  • Politics
  • Opinion
  • Strange
  • Blog
  • Founders
  • Contribute!

© 2024 Digest Wire - All right reserved.

Privacy Policy   Terms and Conditions

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.