Ledger Blue Description 2022
The Ledger Wallet Blue is the latest hardware wallet from Ledger and convinces with its even easier operation. This model now also has a touch screen and improved connectivity via Bluetooth.
Ledger Blue makes hardware wallets even more convenient
Ledger Blue is the most advanced hardware security equipment on the market. It has multi-application execution and combines enterprise-level crypto capabilities with a lightweight handheld device. Manufactured and developed in France, it meets the highest standards. It is built around a secure element, with a touch screen and USB & Bluetooth connectivity.
A powerful and flexible device
Ledger Blue is the latest product from Ledger, which has been developed over two years of research and development. This high-end device embeds a large touch screen to securely manage transactions and complex, intelligent contracts. Its smooth, yet rugged housing incorporates best-in-class technology built on the Blockchain Open Ledger (BOLOS) platform.
The hardware features
The Blue Ledger is based on a dual-chip architecture that integrates an ST31 SecureElement and an STM32 microcontroller. It has a touch screen with LED backlighting for easy navigation and transaction validation. It is powered by a Lipo battery and communicates with USB or Bluetooth devices.
Each app has its own security area
Thanks to its modular architecture, the Ledger Blue executes several dedicated companion apps in full isolation via the firmware. The strong security model allows you to add new cryptocurrencies or apps without endangering the master key. Transaction integrity is ensured by the WYSIWYS paradigm (What You See Is What You Sign). The flexibility of the device allows the user to use the device in the firmware that can support any type of block chain.
Source: Ledger Product Details
FAQ 7Ask your own question
That is not a problem. You can restore your accounts to a new hardware wallet using the recovery key you wrote down when you set it up.
Most wallets support more than just one cryptocurrency, but only generate one backup. Nevertheless, this one backup is sufficient to restore all cryptocurrencies as all private keys of the different wallets result from the seed that is backed up as a backup during setup.
Hardware Wallets such as the Ledger Nano X, TREZOR Model T, BitBox02 or KeepKey all work according to the same principle. They are a special form of a so-called wallet, which is used to manage cryptocurrencies. A hardware wallet is a physical device that securely and inisolationly generates the private keys to the cryptocurrencies. Due to the extra hardware, they have some advantages over software wallets:
- Private keys are often stored in a protected area of a microcontroller and cannot be transferred out of the device in clear text.
- Hardware wallets are immune to computer viruses that steal from software wallets.
- They can be used securely and interactively, private keys never need to come into contact with potentially vulnerable software.
- The software is in most cases open source, so that the user or professionals can validate the entire operation of the device.
However, it is important to understand that hardware wallets are an attractive target for attackers and depend on several assumptions to maintain security. They are not a miracle weapon, and there are several realistic ways to hack a hardware wallet Especially if someone has physical access to the device.
A new cryptocurrency is rarely supported directly by a hardware wallet at the beginning. However, most providers such as Ledger or TREZOR are constantly working to support new cryptocurrencies. Therefore, it is often worth waiting until the desired currency is supported by your hardware wallet.
I would like to give a hardware wallet as a birth gift. Do I need this every time I want to deposit coins or is there another way?
No, you don’t need the hardware wallet every time you want to make a deposit. It is only necessary to set up the hardware wallet and generate an address of the corresponding cryptocurrency.
Cryptocurrency can now be sent to this address on the desired cycle on a regular basis without the need for the hardware wallet. The address does not expire.
Are my cryptocurrencies stored in the hardware wallet, or where exactly are they? This is a very good question because the answer defines what your wallet actually needs to protect.
Cryptocurrencies are so named because they are secured by cryptography. For this you need a set of digital keys, for example your (very secret) private key. With this key you can encrypt and digitally sign things.
Let’s take Bitcoin as an example (other cryptocurrencies work in a similar way). The entire Bitcoin network is kept up to date by a common data structure called the blockchain. It contains records of all transactions ever made and is publicly accessible online, so anyone can read it. When you receive some bitcoins, say 0.1 BTC, you see them in your bitcoin wallet, listed under a bitcoin address.
At the same time, the bitcoins are not actually stored in the wallet, they are just an entry in the public blockchain. What the wallet stores is your secret private key that belongs to that address. Since you control that private key, you can spend those Bitcoins again: that’s how “Bitcoin ownership” is defined. Anyone can see these bitcoins, but only you can spend it, so they are yours. But that also means that *anyone* with the right private key can spend those bitcoins. Therefore, it is very important to keep this key secret.
What stops the manufacturer of your hardware from using a backdoor and simply stealing your cryptocurrencies? How much do you have to trust hardware wallet manufacturers?
While a completely “trustless” solution is probably not possible, manufacturers are doing everything they can to minimize the need to trust them.
Most of the software code of many hardware waller manufacturers is open source, i.e. publicly available. Anyone can check how the device works and how secrets are handled. Of course, not everyone has the ability to review code: that’s why independent researchers are often encouraged to analyze, and are often rewarded by bug bounty programs when they find something. This does not limit their ability to publish a full independent report without permission.
The essentials to go: A wallet manages your secret private keys and requires full access to them. You can and should demand full transparency about how a wallet works and ensure that independent public audits are encouraged.
Ask your question about the product. The question will be published here together with the answer after a few days. You will be notified by e-mail.
|Compatibility||Ledger Wallet Bitcoin, Ledger Wallet Ethereum, Mycelium, Copay, Electrum, MyEtherWallet, GreenBits, BitGo, FIDO/U2F|
|Cryptocurrencies||Bitcoin, Peercoin, ERC-20 Tokens, Stealth, Zcoin, Tron, Ontology, Hycon, Pirl, Akroma, NEO, Bitcoin Gold, Stellar, Hcash, DigiByte, Qtum, PivX, Vertcoin, Viacoin, Expanse, Ethereum, Litecoin, Dogecoin, Zcash, Dash, Stratis, Ripple, Komodo, Bitcoin Cash, Ethereum Classic, PoSW|
|Input Options||Touchscreen, Buttons|
|Platform||Windows, Linux, Mac, Android, Chrome OS|
|FIDO U2F Authenticator|
|Interfaces||USB, Bluetooth, NFC|
User Reviews 4