FB pixel

Ledger re-christens hardware wallet as ‘signer’ in pivot to identity and consent

Categories Biometric R&D  |  Biometrics News  |  Trade Notes
Ledger re-christens hardware wallet as ‘signer’ in pivot to identity and consent
 

Digital wallets are being asked to fulfill ever more functions, from storing payment credentials to sharing IDs. The term “wallet” is now at risk of losing meaning due to overuse as its definition is stretched in new directions and applied to new concepts.

France-based digital asset security provider Ledger’s “hardware wallet,” for example, is not a device that physically stores crypto, the company points out in a recent post to its website. The company is replacing the term “hardware wallet,” therefore, with “signer,” which more accurately reflects its core function.

Ledger signers deliver cryptographic “Proof of You,” as explained in the post, for “signing transactions, proving intent and identity, and allowing you to provide digital consent.”

The shift is intended more to support adoption by avoiding misconceptions than as a rebrand, the company says.

The previous language suggested wrongly that digital value is stored on the device, that the signer is “just a vault” and that digital ownership is complicated.

Ledger’s newest signer, the Nano Gen5, generates and protects private keys within a certified Secure Element, includes a touchscreen for easy use and supports multi-factor authentication. It works with the Ledger Wallet app, which is used for transactions.

As pointed out in the Identosphere newsletter by IdentityWoman, the change is part of a pivot by Ledger from digital asset storage to digital identity verification and consent confirmation.

FaceTec VP of Global Standards Andrew Hughes notes in a LinkedIn post that digital wallets were once referred to as “Personal Information Management Systems,” or alternatively, as Jamie Smith recalls, “Personal Information Management Services.” Hughes quotes an IAPP article from 2019 that PIMS as “systems that allow people to control their personal data and manage their online identity by enabling individuals to gather, store, update, and share personal data.”

Related Posts

Article Topics

 |   |   |   |   | 

Latest Biometrics News

 

Face biometrics use cases outnumbered only by important considerations

With face biometrics now used regularly in many different sectors and areas of life, stakeholders are asking questions about a…

 

Biometric Update Podcast explores identification at scale using browser fingerprinting

“Browser fingerprinting is this idea that modern browsers are so complex.” So says Valentin Vasilyev, Chief Technology Officer of Fingerprint,…

 

Passkeys now pervasive but passwords persist in enterprise authentication

Passkeys are here; now about those passwords. Specifically, passkeys are now prevalent in the enterprise, the FIDO Alliance says, with…

 

Pornhub returns to UK, but only for iOS users who verify age with Apple

In the UK, “wanker” is not typically a term of endearment. However, the case may be different for Pornhub, which…

 

Europol operated ‘shadow’ IT systems without data safeguards: Report

Europol has operated secret data analysis platforms containing large amounts of personal information, such as identity documents, without the security…

 

EU pushes AI Act deadlines for high-risk systems, including biometrics

The EU has reached a provisional agreement on changes to the AI Act that postpone rules on high-risk AI systems,…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events