
What We Should Learn From the Ledger Exploit
The Breakdown
00:00
The Ledger Exploit and Security Failures
This chapter discusses the Ledger exploit, a phishing attack that occurred through the ConnectKit software, highlighting the security failures of Ledger and the importance of removing permissions for ex-employees. It also explores the broader issues in the crypto industry, such as the difference between hardware wallets and software tools and the need for better awareness and protection against phishing attacks.
Play episode from 02:20
Transcript


