Vincent BOUZON (@b0l0k_) 's Twitter Profile
Vincent BOUZON

@b0l0k_

🧑‍💼 Director @Ledger
🆓 nostr.fan/s/vincent
🕸️ github.com/b0l0k

ID: 53016798

linkhttps://b0l0k.github.io/papers/ calendar_today02-07-2009 09:16:32

1,1K Tweet

428 Followers

1,1K Following

Charles Guillemet (@p3b7_) 's Twitter Profile Photo

Introducing ERC-7730: A new Ethereum standard for clear signing, enhancing user security. Ledger proudly supports this step toward safer smart contract interactions. It's designed to be a public good Learn more: github.com/ethereum/ERCs/… #Ethereum #Security

Charles Guillemet (@p3b7_) 's Twitter Profile Photo

At Ledger, you might know that we have the Ledger Donjon, our dedicated team constantly conducting open security research. We recently worked with Trezor, revealing that their Trezor Safe 3 was susceptible to physical supply chain attacks. Here's a thread on our findings:🧵

At <a href="/Ledger/">Ledger</a>, you might know that we have the <a href="/DonjonLedger/">Ledger Donjon</a>, our dedicated team constantly conducting open security research. 

We recently worked with Trezor, revealing that their Trezor Safe 3 was susceptible to physical supply chain attacks. Here's a thread on our findings:🧵
Hylé (@hyle_org) 's Twitter Profile Photo

Real World Cryptography Paris number 4 already?! 🧩 Join us on April 29 at Ledger's offices in Paris for an evening of talks and networking (and cheese boards), co-organized by Hylé and Symbolic Software! Call for talks is open: submit a talk, and share your work! Links below 👀

Real World Cryptography Paris number 4 already?! 🧩

Join us on April 29 at <a href="/Ledger/">Ledger</a>'s offices in Paris for an evening of talks and networking (and cheese boards), co-organized by Hylé and <a href="/symbolicsoft/">Symbolic Software</a>!

Call for talks is open: submit a talk, and share your work! Links below 👀
Ledger Donjon (@donjonledger) 's Twitter Profile Photo

Donjon is at Black Hat Asia this week! Karim (Karim M. Abdellatif ) is presenting his research on using deep learning attribution methods for fault injection attacks. Don't miss his presentation: blackhat.com/asia-25/briefi…

Charles Guillemet (@p3b7_) 's Twitter Profile Photo

🚨At Ledger Donjon, we don’t just secure our own products, we help make the entire crypto ecosystem safer. As part of our ongoing security research and responsible disclosure efforts, we identified an important vulnerability in Tangem’s Android app. 👇🧵

Ledger Donjon (@donjonledger) 's Twitter Profile Photo

Security leaves no room for error, a single variable mishandled, and the entire security model can collapse. We're excited to share an illustration of this through our recent research on the Tangem card. Big thanks to the Tangem team for their responsiveness and collaboration!

Karolina (@karolinagorna_) 's Twitter Profile Photo

✅ Accepted Paper at the 23rd IEEE/ACIS International Conference on Software Engineering, Management and Applications (SERA 2025) & Presentation at the University of Nevada, Las Vegas 🔗 Link : arxiv.org/pdf/2505.20183

✅ Accepted Paper at the 23rd IEEE/ACIS International Conference on Software Engineering, Management and Applications (SERA 2025) &amp; Presentation at the University of Nevada, Las Vegas 

🔗 Link : arxiv.org/pdf/2505.20183
Carl Anderson (@crlndrsn) 's Twitter Profile Photo

I’ll be delivering a keynote on the main stage at Istanbul Blockchain Week 2025! Mark your calendars for June 26, 2025. I'll dive into the future of crypto and digital security. #IBW2025

I’ll be delivering a keynote on the main stage at Istanbul Blockchain Week 2025!
Mark your calendars for June 26, 2025. I'll dive into the future of crypto and digital security.
#IBW2025
Charles Guillemet (@p3b7_) 's Twitter Profile Photo

ETHCC in Cannes was a blast ✨. Great energy, tons of new projects, and strong momentum all around. I had the chance to present some of Ledger’s latest innovations: 1️⃣ Clear Signing Standard: Human-readable transaction details, directly on-device. 2️⃣ Transaction Checks on

ETHCC in Cannes was a blast ✨. Great energy, tons of new projects, and strong momentum all around.

I had the chance to present some of Ledger’s latest innovations:
1️⃣ Clear Signing Standard: Human-readable transaction details, directly on-device.
2️⃣ Transaction Checks on
Charles Guillemet (@p3b7_) 's Twitter Profile Photo

Shipping starts today! Ledger Recovery Key is now included with every new purchase of a Ledger Stax or Ledger Flex! Need more than one Recovery key, you can order additional keys  👉 shop.ledger.com/pages/recovery…

Charles Guillemet (@p3b7_) 's Twitter Profile Photo

Huge thanks to Trail of Bits for spotlighting blind signing risks 🙌 The $1.5B Bybit hack showed what we’ve known for years: asking users to sign unreadable hex data is unsafe & unsustainable. That’s why we proposed and implemented EIP-7730. It enables (hardware) wallets to

Ledger (@ledger) 's Twitter Profile Photo

The next era of digital ownership starts here. Ledger OP3N returns to Paris — a stage where security, culture, and creativity collide. This isn’t just a reveal. It’s a glimpse into what comes next: new ways to own, create, and trust in a world being rewritten. Paris. 106 rue

The next era of digital ownership starts here.

Ledger OP3N returns to Paris — a stage where security, culture, and creativity collide.

This isn’t just a reveal. It’s a glimpse into what comes next: new ways to own, create, and trust in a world being rewritten.

Paris. 106 rue
Pascal Gauthier @Ledger (@_pgauthier) 's Twitter Profile Photo

Ledger OP3N is where we show the world what's next. Not only for us, but for digital ownership itself. Paris is the stage, the next era of Ledger begins here.

Charles Guillemet (@p3b7_) 's Twitter Profile Photo

If you use a Ledger or hardware wallet with clear signing, you are not at risk. My tweet above is warning people who do not use a hardware wallet with clear signing of the risk. Always review every transaction before you sign.

Charles Guillemet (@p3b7_) 's Twitter Profile Photo

Update on the NPM attack: The attack fortunately failed, with almost no victims.🔒 It began with a phishing email from a fake npm support domain that stole credentials and gave attackers access to publish malicious package updates. The injected code targeted web crypto activity,

Update on the NPM attack: The attack fortunately failed, with almost no victims.🔒

It began with a phishing email from a fake npm support domain that stole credentials and gave attackers access to publish malicious package updates. The injected code targeted web crypto activity,
Charles Guillemet (@p3b7_) 's Twitter Profile Photo

The ongoing debate on quantum-safe Bitcoin address formats misses the point! A quantum computer capable of breaking modern cryptography could compute private keys from public keys. Some therefore argue that hiding public keys (by hashing them) would keep users safe. Technically,