210 похожих чатов

Ledger may be centralized, but there is no proof of

legder being breached, unlike trezor:
https://www.youtube.com/watch?v=50eiA-75NMY

8 ответов

27 просмотров
Prytaneis- Автор вопроса
Hel
screenshot

Source?

Prytaneis
Source?

Chat Gpt 😂

Hel
screenshot

Bro draining . Even just 1 wallet is enought . My all money is on crypto rn . So if they do this just to me 1 wallet my life is finished lmao

Prytaneis
Source?

https://www.ledger.com/blog/security-incident-report

Prytaneis- Автор вопроса
Hel
https://www.ledger.com/blog/security-incident-repo...

Don't wanna defend ledger here, but "ledger connect kit" is a Javascript library that implements a button allowing users to connect their Ledger device to third party DApps (wallet-connected Web sites). Whereas the video I showed above shows someone who breaches into Trezor's hardware

Prytaneis
Don't wanna defend ledger here, but "ledger connec...

In the CVSS scoring scheme, Network attack is way way way more critical than Physical attacks (where you need a physical access of the device/machine) Thus, being a library allowing an attacker to drain funds remotely is indeed critical more critical than drain funds while having physical access on the machine Also what matters when it comes to security is, how many vulnerability were detected (the more does NOT mean its worst, and a lack of found vulnerability in a product is concerning) but more importantly how many were mitigated. Trezor being Open-Source means more eyes looking at the code for vulnerability, and generally researchers do that to mitigate them. You have to trust ledger, but you can verify trezor and in crypto, don't trust, verify, hence why we have blockchain tech

Prytaneis- Автор вопроса

Похожие вопросы

Обсуждают сегодня

Карта сайта