Skip to content
Permalink
master
Switch branches/tags
Go to file
 
 
Cannot retrieve contributors at this time
7 lines (6 sloc) 287 Bytes

Introduction

In this chapter, we'll first provide some background information about personal security devices and hierarchical deterministic wallets. Then, we'll introduce the application isolation technology that helps make Ledger devices secure and open-source friendly.