Permalink
Switch branches/tags
Nothing to show
Find file Copy path
Fetching contributors…
Cannot retrieve contributors at this time
8 lines (6 sloc) 287 Bytes

Introduction

In this chapter, we'll first provide some background information about personal security devices and hierarchical deterministic wallets. Then, we'll introduce the application isolation technology that helps make Ledger devices secure and open-source friendly.