A record-keeping system for financial transactions. In crypto, it refers both to the blockchain itself and to Ledger brand hardware wallets.
Detailed Explanation
In blockchain technology, a ledger is the distributed database that records all transactions across the network. Unlike traditional ledgers maintained by a single institution, blockchain ledgers are replicated across thousands of nodes and are publicly verifiable. The term also commonly refers to Ledger, the French company that manufactures popular hardware wallets (Ledger Nano S, Ledger Nano X) for securely storing cryptocurrency private keys offline.
Why It Matters
The distributed ledger is what makes blockchain revolutionary. Every participant can verify every transaction, eliminating the need to trust a central authority. For self-custody, Ledger hardware wallets are among the most trusted solutions, protecting private keys in a secure chip that never exposes them to internet-connected devices. Understanding both meanings helps navigate crypto discussions about transparency, auditability, and security.
Key Considerations
When using a Ledger hardware wallet, always verify transaction details on the device screen before confirming. The computer screen can be manipulated by malware, but the Ledger screen shows the actual transaction being signed. Update firmware regularly for security patches and new feature support.
Example
You can view every Bitcoin transaction ever made on the public ledger using a block explorer like mempool.space. Meanwhile, a Ledger Nano X hardware wallet stores your private keys offline, requiring physical button confirmation to sign transactions.
Related Terms
Frequently Asked Questions
A record-keeping system for financial transactions. In crypto, it refers both to the blockchain itself and to Ledger brand hardware wallets.
The distributed ledger is what makes blockchain revolutionary.
Ledger addressed the Connect Kit vulnerability within hours and no user funds were lost from hardware wallets. The core security model, where private keys never leave the secure chip, was not compromised. The incident affected only the browser connection library, not the hardware itself.