Mo

6.6K posts

Mo banner
Mo

Mo

@Mo_RELS

Head of Brand Development // Curator @Ledger | My views are my own. Banner by @agoriamusic

Web3 Katılım Kasım 2018
2.3K Takip Edilen6.8K Takipçiler
Mo retweetledi
Pascal Gauthier @Ledger
Today marks an important step forward for @Ledger. We’re welcoming John Andrews as Ledger’s CFO and officially opening our New York office, a major milestone as we continue to scale in the U.S., our largest market. John Andrews brings the institutional rigor and financial leadership needed to scale Ledger’s global vision. His deep experience at the intersection of traditional finance and digital assets is exactly what we need as we deepen our presence in the United States and globally. With the opening of our New York office, we’re also placing @ledger_business at the heart of the financial world to meet growing demand for secure digital asset infrastructure. Institutions today require the cryptographic certainty that only Ledger can provide. With Ledger Enterprise Multisig and Ledger Enterprise Tradelink, we’re equipping banks and asset managers with the tools to govern and trade digital assets with total control. As adoption continues to accelerate, so does our responsibility, not only to secure assets, but to help secure the foundations of the next financial system and agentic era. Exciting times ahead. businesswire.com/news/home/2026…
English
8
17
90
12.3K
Mo retweetledi
Adelina
Adelina@Adelina_Galoyan·
GM fam🤍 Trade smarter with OKX DEX in the @Ledger wallet app! Deep multi-chain liquidity + Ledger security 🔐 Showing how fast and easy it is 🤗
English
158
46
234
15.8K
Mo retweetledi
Ledger
Ledger@Ledger·
2018. Ledger assembles a team of world-class hackers and gives them one instruction: Stress-testing everything we make. Here’s how the @DonjonLedger was born 🧵
Ledger tweet media
English
128
62
200
11.3K
Mo retweetledi
Pascal Gauthier @Ledger
Our phones were never designed to be secure vaults. The @DonjonLedger proves that every single day. For years, we’ve trusted our phones to protect everything: our data, our identity, our money. But smartphones are inherently fragile. They’re multipurpose, always-connected devices built for convenience first — not hardened security. That model may have been enough for the early internet of information. It doesn’t work for the internet of value. When a single vulnerability can put hundreds of millions of devices at risk, it’s a reminder of a simple truth: the device you use every day should not be the final line of defense for your digital value. 875 million Android devices can be compromised in under 60 seconds. That’s exactly why your phone should never be where your value ultimately lives. Pair it with a @Ledger signer and use the Ledger Wallet app. shop.ledger.com/?srsltid=AfmBO… forbes.com/sites/daveywin…
English
123
45
164
4.5K
Mo retweetledi
Ledger
Ledger@Ledger·
digital threats move fast but the @DonjonLedger moves faster 🫡
English
96
60
167
8.4K
Mo retweetledi
Ledger
Ledger@Ledger·
Transaction Check acts like an anti-virus for your Ledger, simulating EVM transactions to flag malicious contracts and risky addresses before they touch your wallet. ✅ Clear Signing: shows you the facts. ✅ Transaction Check: shows you the risks. Don’t just hope it’s safe. Know it is. 🔒
English
119
57
227
10.7K
Mo retweetledi
Pascal Gauthier @Ledger
In a world where AI accelerates threats to software security, hardware roots like @Ledger's Secure Elements provide a "Physics of Trust" that code alone can't match. This is the core of the thesis I laid out in my latest piece, "Revenge of the Atoms" ledger.com/blog-revenge-a…
English
152
56
198
9.1K
Mo retweetledi
ian c rogers
ian c rogers@iancr·
If I had a time machine, I’d go back and tell 1992 me, “The Command Line will be sexy in 2026.” 1992 me would never believe it, yet here we are. I was on stage at @sxsw in Austin yesterday with @CoinDesk’s @Liqquidity for a discussion about AI and security. Here’s the Reader’s Digest version of our talk:
ian c rogers tweet media
English
73
47
146
14.7K
Mo retweetledi
Pascal Gauthier @Ledger
Pascal Gauthier @Ledger@_pgauthier·
Software is no longer "eating the world." AI is eating software. The old moats are collapsing overnight. We are entering the Economy of Action, where the primary actors aren’t humans clicking buttons, but autonomous AI agents transacting in milliseconds. But there is a massive problem: Software cannot secure an AI-driven world. Software security is probabilistic. In a war of code vs. code, the attacker only needs to be right once. AI has turned "good enough" into "extinct." At @Ledger, we’ve spent 12 years preparing for this collision of Blockchain and AI. We are moving the "root of trust" out of the reach of code and into the Physics of Trust. By anchoring identity and governance in immutable silicon—Secure Elements logically isolated from the OS—we create a physical barrier that AI simply cannot cross. Ledger is the weapon for the Agentic Economy.
Pascal Gauthier @Ledger@_pgauthier

x.com/i/article/2032…

English
147
113
434
119.7K
Mo retweetledi
Ledger
Ledger@Ledger·
Ledger Artist Spotlight lands today at 5pm CET on Discord. 🎙️ @cemhah joins us to break down the digital art series ‘Space Wanderer,’ his collaboration with Matthew Seremet. Learn about the process, the story, the inspiration and what’s next.
Ledger tweet media
English
4
11
52
6.8K
Mo retweetledi
Ledger
Ledger@Ledger·
Ledger's got big news for you 👀 New colors. A new chapter for the Ledger Wallet™ ecosystem. Watch the trailer for this first episode 🎬
English
155
93
371
83.8K
Mo retweetledi
Charles Guillemet
Charles Guillemet@P3b7_·
🚨 @DonjonLedger has struck again discovering a MediaTek vulnerability potentially impacting millions of Android phones. Another reminder that smartphones aren’t built for security. Even when powered off, user data - including pins & seeds - can be extracted in under a minute.
English
106
123
442
151.9K
Mo retweetledi
Ledger
Ledger@Ledger·
Ledger is now available at @challeng_sg in Singapore! 🇸🇬 Available online, and in store at Challenger Bugis and Challenger VivoCity. Walk in, pick up a Ledger signer, and start securing your digital assets: no shipping, no waiting. Pair it with the Ledger Wallet™ app and you're set up in minutes, with your keys staying offline from the start. True digital ownership. Free from compromise 🔐
English
21
16
122
11.3K
Mo retweetledi
Ledger
Ledger@Ledger·
Here’s a question most security companies won’t answer. What happens if someone gets physical access to your device? We built an entire team to answer it. Every day. Since 2018.
Ledger tweet media
English
14
17
93
7.6K
Mo retweetledi
Ledger
Ledger@Ledger·
If you’re trading without a physical signer, you’re playing all offense and zero defense. See how @Ledger x @Spurs are redefining the game. Software smooth. Keys offline. 🛡️
English
9
12
52
8.5K
Mo retweetledi
Charles Guillemet
Charles Guillemet@P3b7_·
🚨 All it takes is one website and your crypto disappears: Coruna may be the EternalBlue moment for iOS exploits. For years, large-scale exploitation of iPhones was considered impractical. Coruna proves otherwise. Recently exposed by the Google Threat Intelligence Group, Coruna is a modular, state-grade iOS exploit kit that shows how sophisticated cyber capabilities developed by governments or surveillance actors can eventually leak into criminal ecosystems. The framework contains five complete exploit chains built from 23 vulnerabilities targeting Apple devices. These chains combine: - WebKit remote code execution - Privilege escalation - PAC (Pointer Authentication) bypass (!!) - Sandbox escape - Page Protection Layer bypass Together, they enable full compromise of an iPhone from a simple website visit. The implications are immediate. Coruna has already been used primarily for cryptocurrency theft. The attack path is brutally simple: your keys sit in a software wallet on your iPhone, you visit a compromised website, and your crypto is gone. Once inside the device, the malware can: - Steal assets from software wallets - Extract seed phrases stored in Apple Notes or in your photos - Harvest photos, emails, and other sensitive data Researchers observed the toolkit targeting 18 cryptocurrency apps, including MetaMask, Trust Wallet, and Exodus Wallet. Coruna works out of the box against devices running iOS 13 through iOS 17.2.1, covering releases from 2019 to 2023. That represents hundreds of millions of potentially vulnerable devices worldwide. So far, researchers estimate that tens of thousands of iPhones have actually been infected. More recent iOS versions are also actively targeted by nation-state actors, though not exploited yet at this scale. But the trajectory is clear: as exploit development accelerates, particularly with the assistance of AI, these capabilities will become cheaper and more widely available. Large-scale mobile compromise will become more common. The lesson is straightforward: Storing valuable secrets on general-purpose devices is fundamentally risky. When a single browser visit can compromise the entire mobile phone, relying on software wallets to protect high-value assets is no longer a defensible security model. For those interested by the technical details, I recommend this excellent report from Google Threat Intelligence group. cloud.google.com/blog/topics/th…
English
11
26
134
46.4K
Mo retweetledi
Ledger
Ledger@Ledger·
If you can’t read it, don’t sign it. Clear Signing shows transaction details in human-readable form on your Ledger signer, so you know exactly what you’re approving. 🔐
English
19
20
128
11.5K
Mo retweetledi
Ledger
Ledger@Ledger·
Security that never changes isn't security. It's a countdown. That's why Ledger has the Donjon: an in-house team of elite security researchers who stress-test our technology 24/7 to find the gaps before anyone else can. Threats evolve every day. Your Ledger signer should too. The Ledger Wallet™ app paired with a Donjon-approved Ledger signer: security that evolves with every threat. Free from compromise 🔐
English
72
38
145
12.7K
Mo retweetledi
Charles Guillemet
Charles Guillemet@P3b7_·
What does post-quantum computing actually mean in daily life? Kicking off a series on PQC in hardware signers. @DonjonLedger explores what matters in practice: implementing PQ signatures inside Secure Elements under real embedded constraints and threat models. 🧵
Charles Guillemet tweet media
English
90
50
143
11K