AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
How Hardware Wallets Work
The key is split into three parts, but what if a government or police compels the three corporations to like put the keys together? What happens then? Right. So again, I'll point people to Charles's post on this because I don't want to pretend that I'm the CTO of ledger. But again, if you allow an approved and authorized application to access your privateKey, it can access your private key. That is fundamentally what ledger does.