Advertisement
Guest User

Untitled

a guest
Feb 5th, 2018
8,469
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.39 KB | None | 0 0
  1. Dear Reader,
  2.  
  3. We wanted to make you aware of a potential vulnerability in the Ledger hardware wallet. If you use a Ledger wallet, here’s what you need to know to protect yourself.
  4.  
  5. The Ledger hardware wallet is a cold storage device where you can store your cryptocurrencies offline.
  6.  
  7. While cold storage is the generally the most secure place to keep your cryptos, you are responsible for making sure your information to access them is kept secure.
  8.  
  9. When you send coins to your Ledger wallet, your device creates a new address to receive the coins.
  10.  
  11. A hacker could infect your computer with malware that changes your receive address. That means your cryptocurrency would be sent to the hacker and not yourself.
  12.  
  13. Fortunately, the solution is easy. Here’s the process you need to follow every time you get ready to send coins to your Ledger wallet.
  14.  
  15. Open your Ledger wallet app.
  16.  
  17. Each time you generate a new address, you will notice a small “monitor” icon. See the picture below.
  18.  
  19. image
  20.  
  21. Click the monitor button. It will display the receive address on your hardware device.
  22.  
  23. Verify that it’s the same address as on your screen.
  24.  
  25. To be safe, make sure to go through the address validation process each time you send cryptocurrency to your Ledger wallet.
  26.  
  27. Remember, it is your responsibility to keep your keys and passwords secure and to check the addresses to which you send your tokens.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement