
The Trezor hardware wallet provider corrected a security defect in two of its latest models after discovering LEDGER’s open research arm from the vulnerability competitors in its control.
Lidger Dongon admitted that Trezor has made many security developments recently, but encryption operations can be carried out on a Trezor Safe 3 and 5 models, which may make it “vulnerable to the most advanced attacks.”
Fortunately, Trezor has already taken the weakness that has been found. He said In the publication of March 12.
“We believe that making the ecological system safer helps everyone, which is very important and we are pushing towards the broader adoption of encryption and digital assets,” added Guillemet.
source: Charles Gillite
Trezor has already applied “safe elements” – chips designed to protect the user pin icon and encryption secrets – where some Trezor devices can be tampered with by adjusting the program that it works on, which may allow representatives of threat to steal the user’s money.
The safe elements are characterized by “thwarting any attack of the ineffective devices, especially the voltage,”, to Digger He said On March 12.
((This) gives users confidence that their money is safe, even if their devices are placed in its place or stolen. “
However, Ledger found another potential conveyor that stems from a controller, the other main part of Trezor design consisting of digital for its safe 3 and 5 models.
Trezor carried out a firmware integration examination to detect modified programs, but Ledger was able to prove that the attacker can still overcome this security check.
Since then this issue has been resolved by Trezor – although LEDGER or Trezor has shown how. Cointelegraph reached Trezor but did not receive an immediate response.

Trezor control in Trezor Safe 3. Source: Professor’s book
security certain In X user boxes remain safe and it is not necessary to perform.
Related to: “Dark SkipPy” can steal Bitcoin Portfolio keys
However, when to request Whether Trezor is able to correct this problem through fixed programs, the equipment provider answered: “Unfortunately, no.”
In cybersecurity, the golden rule is simple: nothing is completely not fractured. For this reason, we have already carried out a multi -layer defense against the supply chain attacks and we always advise our users to buy from official sources. “
The Professor’s book is not also immune to security weaknesses.
In December 2023, one of the infiltrators committed a security breach in the LEDGER connector library and the coding assets worth $ 484,000.
Another threat representative that violated the LEDger regulations published the postal titles of about 270,000 Ledger customers in June 2020.
magazine: Crypting fans are obsessed with longevity and vital length: this is the reason
The post Hardware wallet Ledger helps competitor Trezor resolve security vulnerability first appeared on Investorempires.com.