The company Ledger a new competitor in the environment of hardware wallets cold storage Trezor. From the very beginning of its activity, I managed to release 2 not very recognized products, but after the last one got wide popularity, namely the flagship model Ledger Nano S. In case of losing a purse, you can always restore your assets, no attacker can not without your hardware confirmation of stealing from you savings.
In general, the appearance of hardware purses of cold storage is associated with a number of reasons:
Since the creation of the crypto currency, the role of security in its preservation has begun to grow. Large companies began to invent means for its implementation, sms-confirmation, 2-factor identification, the issuance of unique keys, tips for storing important data on separate media and much more.
After the sharp increase in the liquidity of the crypto currency, taking into account its semi-anonymity, the shadow market was overexcited with this fact, which became in the eyes of every attacker "commodity No. 1", which must be withdrawn from the hands of full-fledged owners. The first thefts began, deceptions were naive, then more and more serious and large-scale leaks of capital into shady pockets. It continues to this day.
The role for protecting the savings of crypto-loans was taken over by Ledger. She produced hardware cold storage wallets at first unsuccessful, then better, then even better and finally presented the option.
The most unpleasant thing with which every miner, trader is facing, just a speculator is this:
Phishing theft
Phishing attacks (substitution of a true site for a false one) is quite common in our time. The intruder, knowing the psychology of the victim, acts adversely, first the access to the Wi-Fi point is hacked, then the site is replaced after a while, then there comes a waiting when there will be the largest amount of money on the balance, then theft is made. (Theft is used to steal: access to mail, to online sites where money is stored on crypto-coils)Snooping thefts
The method of theft is more complicated than phishing, but very effective. This is as follows: access to the Wi-Fi point is hacked, all received and sent data packets are analyzed to servers (sites), then the decryption of packages, in which absolutely all the information we need. Having determined the decryption key to the packages, you are now as in the palm of an attacker.Viral thefts
The most interesting and productive theft. The intruder will find out your e-mail (in advance of making inquiries), write to you from the post of the mother (father, employer, colleague, ie makes a substitution). In the letter, only a text or pdf file that seems to be harmless, you open it, read it. The attacker prepared in advance and wrote an article on the case so that you did not notice anything. Since the moment of opening the cracker has all the carte blanche. Leave drinking tea, and he is sitting somewhere in Taganrog, drives your mouse around the screen and transfers all the money that is, transfers administrator rights from all the most interesting accounts to himself.Hardware theft
There are people who believe that sms-confirmation is not complete and after the sensational stories about receiving sim cards on a false proxy, they ran to write statements that in addition to the owner no one can get a new SIM card. It is a pity that this does not help, our attackers order from abroad details, from which they then collect a device that creates a femto-cell, i.e. approach your home and special manipulations intercept your sms-confirmation and again get access to your assets.
Great article, maybe you are interested in the one in these links related to money,crypto:
Creating Liquidity for Physical Assets (new ICO) by hatu
Платформа DCC – долой кредитную монополию! by fightnight
Il this comment you think is useful please consider vote it