

Many users know that the recovery phrase should not be entered on anything else than the Ledger device. A fake wallet application might ask the details of your 24-word recovery phrase. But this compromised software can trick you in many ways.ġ. Now just by installing a malicious app hackers cannot steel your funds from your hardware wallet. You may not know that its a fake wallet application that is tampered by a malicious 3 rd party until you verify the software. But still you are highly susceptible to phishing attacks.įor example let’s say you downloaded Ledger Live from the email link which you recently received. The whole point of hardware wallet is that they keep your coins safe even though when operated on a compromised environment. Some might argue that verifying the authenticity of Ledger Live doesn’t matter because the private keys are securely stored on the device. Here in this beginners guide let’s see how to check hash (checksum) / verify PGP signature of Ledger Live. You can do so by checking the hash / verifying signature of Ledger Live. Here is how you can check if your Ledger device is genuine:Īside from verifying the authenticity of your device you also need to ensure that you are running a genuine Ledger Live application. You should only enter the recovery phrase on a legitimate hardware wallet. You’ll only need this information in future to recover your funds in case if your device is lost or broken. You should only write them in a piece of paper or on a metal plate. Do not enter this information on your computer or smart phone or on the web. Never ever share your backup recovery phrase with anyone. Make sure to keep your 24 word recover phrase safe, private and completely offline. Most of the phishing techniques are focused on obtaining your recovery phrase. Remember that the hackers main target is your recovery seed phrase. There are many reports of users falling victim to these phishing attacks. The very first step that you need to take in protecting your crypto is to stay away from phishing scams.Īfter the recent data breach on the Ledger website there are regular phishing campaigns going on over Twitter / YouTube, SMS and Email. Particularly newbies and its mainly because of their negligence. Hardware wallets, despite providing the most secure storage solution many users still lose their coins.
