Ledger Recover: A New Security Feature Sparks Debate in the Crypto Community

Ledger, the renowned hardware wallet provider, has recently introduced a new feature called Ledger Recover. This feature is designed to provide an extra layer of security for users who might misplace their Secret Recovery Phrase (SRP).

But here’s the thing: not everyone is thrilled about it. In fact, the crypto community has been quite vocal in expressing their concerns and criticisms about this new feature.

Let’s break it down.

Ledger Recover is an optional subscription service. It’s designed to give users an additional safeguard for their private keys. The service works by encrypting a version of your private key and splitting it into three fragments using Shamir Secret Sharing. These fragments are then stored by three different parties on cryptographically-secure Hardware Security Modules.

a close up of a keyboard

The Concerns Raised

Sounds secure, right? Well, not everyone thinks so.

Mudit Gupta, the Chief Information Security Officer at Polygon Labs, has been particularly outspoken about his disapproval of the new feature. He’s described it as a “horrendous idea” and has urged users not to enable it.

Gupta’s main concern is that the encrypted parts of the keys are sent to three corporations. In his view, this poses a risk because these corporations could potentially reconstruct your keys.

And he’s not alone in his concerns.

Changpeng Zhao, the founder and CEO of Binance, has also chimed in. He’s questioned the new direction Ledger seems to be taking, which appears to contradict their previous stance of ‘your keys never leave the device.’

These criticisms highlight a fundamental tension in the crypto world. On one hand, there’s the desire for convenience and ease of use. On the other hand, there’s the need for security and privacy.

And this isn’t the first time Ledger has faced criticism over its security measures.

A few years back, Ledger experienced a data leak that exposed the names and home addresses of all their customers. This incident has left a lasting impression on the crypto community, and it’s been brought up again in light of the new Ledger Recover feature.

Crypto investor DCinvestor, for instance, has reminded users of this past data leak. He’s expressed concern about the idea of private keys being stored on Ledger’s servers.

Bitcoin investor and entrepreneur Alistair Milne has also weighed in. He’s suggested that Ledger’s new recovery service undermines the whole point of self-custody via a hardware wallet.

In his view, if you’re going to give Ledger your private keys and personal information, why bother with a hardware wallet in the first place?

The Bottom Line

Despite these criticisms, it’s important to remember that Ledger Recover is an optional service. Ledger has emphasized that users can continue managing their recovery phrase themselves if they prefer. The company has also assured users that the service is not automatically enabled by any firmware updates.

But here’s the bottom line: security in the crypto world is a complex issue. It’s a balancing act between convenience and privacy, between ease of use and security.

And while Ledger Recover might offer an additional layer of protection for some users, it’s also raised important questions about privacy and security.

As with any new feature or service, it’s crucial for users to do their own research and consider their own security needs before deciding whether to use it.

So, what’s your take? Is Ledger Recover a step forward in crypto security, or is it a step in the wrong direction? The conversation continues.


Get Help From Our Experts

Click the button below to get started.

Frequently Asked Questions

What is cyber security?

Cyber security is a term used to describe the protection of electronic and computer networks, programs and data against unauthorized access. Maintaining a high standard of security is essential to protect critical systems and data against cyber-attacks. The sophistication, persistence and continuous evolution of cyber threats means organizations are finding it increasingly challenging to defend against them. This makes it essential to approach cyber security as a continuous journey, involving regular assessments and appropriate investment in people, processes and technologies to mitigate the risk.

What are cyber security services?

Cyber security services are specialized engagements designed to enable organizations to manage and mitigate the risk and impact of cyberattacks. Kroll’s cyber security services are designed to help organizations protect, detect and respond. The right mix of cyber security services, including advisory services, proactive assessments, managed detection and response, incident response and breach notification, ensures that organizations are able to defend against threats on endpoints, across the surface web and throughout the deep and dark web.

What are the 3 pillars of information security?

Infosec, or information security, forms a critical part of cyber security because it helps to protect online data from authorized access or use. The three pillars of infosec, Confidentiality, Integrity and Availability, often referred to as the CIA triad, are foundational principles for maintaining a robust level of security. Confidentiality involves checking whether your systems are protected from external, authorized access. Integrity entails ensuring that data has not been tampered with and is correct and trustworthy, while availability involves checking that networks, systems and applications are operational and ready for use when required.

Where to start with cyber security?

An effective starting point for effective cyber security is to assess your current cyber security posture. Look at which of your systems, networks and data are secure and which are vulnerable. Consider using external providers to undertake assessments such as penetration testing to gain a complete picture. Uncovering potential vulnerabilities will then allow you to start developing an effective cyber security policy and strategy. Again, expert support with this will ensure that your cyber security approach is effective and robust.

What is asset recovery?

Asset recovery involves the confiscation of illicit assets, usually the proceeds of crime, and the return of these assets to the legitimate owner(s). Assets can take the form of money or other items of value, for example real estate, precious metals, investments such as shares, virtual assets such as cryptocurrencies, race horses, luxury goods, or an aeroplane. Asset recovery can be a purely domestic process when the funds have been hidden or invested in the jurisdiction where they were illegally obtained. It can also be international, when the funds have been sent to another jurisdiction. The process of asset recovery is complex but generally covers four basic phases: pre-investigation (verification of information), investigation (often including seizing/freezing assets and international cooperation to obtain intelligence or evidence), judicial proceedings (following which the court may issue a confiscation order for the assets), and disposal or return (where the assets are returned to the rightful owner).

Why is asset recovery important in preventing and combatting corruption?

First, for its deterrent effect. People are more likely to engage in corrupt behaviour if they are confident that – even if they are caught and convicted – they and their families will still be able to enjoy their illegally obtained wealth. Recovering illicit assets helps deter corruption by turning it into a higher-risk, lower-reward activity. Second, by convicting corrupt officials and recovering stolen assets, countries can also generate funds for development and strengthen their criminal justice system. The end results are stronger rule of law, integrity and trust in government.

What support do you offer in terms of actual cases?

Our asset recovery specialists work hand-in-hand with practitioners in our partner countries to tackle complex international financial crime cases. We are currently assisting with around 100 high-stakes cases across 20 countries.

Our assistance takes the form of advice in the following fields:

  • Intelligence gathering and analysis
  • Asset tracing
  • Financial profiling
  • Investigation and prosecution strategies
  • International cooperation and mutual legal assistance

Many of our experts are embedded in partner institutions, where they can provide closer support more efficiently and build the necessary relationships and trust.

Through our technical assistance and on-the-job coaching, we not only help to advance individual asset recovery cases but also develop skills and good practices among the practitioners we work with. That often leads to long-term reform processes to give practitioners the legal and institutional frameworks necessary to operate effectively.

While assisting with asset recovery cases, we help to identify and address gaps in national laws, policies and practices. Common challenges are:

  • Poorly developed processes for building and documenting cases
  • Lack of, inadequate, contradictory or unclear legal framework
  • Weak/inefficient international networks
  • Lack of domestic inter-agency cooperation
  • Infrastructure and technology deficits
  • Insufficient security of staff, documents and communications
  • Agencies lacking autonomy
What Our Customers Say About Us

Bettie Boyett

Excellent service, prompt responses, and the return of my password (in just two days!).

Scott W Hayes

"Keeping your information secure is their main focus..."

Marshall Weaver

They did a great job and had my funds recovered within a few days. Only downside is that it’s a little expensive.

Laura Stansberry

I would like to thank them. They worked so hard to recover my assets, over several months. I had nearly given up, but they persisted on my behalf, and they came through for me. I can't praise them enough, you can trust them with your crypto asset recovery.

Christina Douglas

They did a great job and had my account recovered within a few days. Only downside is that it’s a little expensive.

Michael

Overall excellent service They assist me in getting two of my wallets back. The team at Logan is really helpful, and I am really appreciative of their assistance. I have not used the wallets in more than four or five years, and when I returned, I essentially forgot and could not find everything. They were the only people who could have actually helped me! My life changed because of what they did; I lost everything, but now I have everything!

Get in Touch
Company

All Rights Reserved © 2011 – 2025 Aliance Consults Journalism.

This is a staging environment