Carl Anderson (@crlndrsn) 's Twitter Profile
Carl Anderson

@crlndrsn

VP Eng @ Ledger | Blockchain via self-custody & security | Ex-Trainline, Deezer | Scaling tech with simple, secure UX.

ID: 194943719

linkhttps://www.linkedin.com/in/carlanderson calendar_today25-09-2010 11:37:41

663 Tweet

1,1K Followers

227 Following

Carl Anderson (@crlndrsn) 's Twitter Profile Photo

I’ll be delivering a keynote on the main stage at Istanbul Blockchain Week 2025! Mark your calendars for June 26, 2025. I'll dive into the future of crypto and digital security. #IBW2025

I’ll be delivering a keynote on the main stage at Istanbul Blockchain Week 2025!
Mark your calendars for June 26, 2025. I'll dive into the future of crypto and digital security.
#IBW2025
Ledger (@ledger) 's Twitter Profile Photo

That's right, folks, they're called The Ledgers, and they're more than just a band. They're a collective of cutting-edge devices designed to keep your crypto safe and sound. Get ready to tap your toes and learn a vital lesson with their viral hit, "Don't Get Rekt"! Rumor has

Carl Anderson (@crlndrsn) 's Twitter Profile Photo

Gm Casper community! You’ll be delighted to hear the latest versions of Ledger Live now support the Casper 2.0 network update (aka Condor) Enjoy 🥐 ledger.com/ledger-live-do…

Carl Anderson (@crlndrsn) 's Twitter Profile Photo

NEW PRODUCT: Ledger Recovery Key is a private, encrypted, PIN-protected spare key to access your assets. It uses a Secure Element & secure NFC communication with a Ledger Flex or Ledger Stax to backup/restore your 24-words in just a few taps

Carl Anderson (@crlndrsn) 's Twitter Profile Photo

If you're at EthCC - Ethereum Community Conference next week and a security enthusiast, I strongly suggest attending Karolina 's talk! Pitch is simple: Go is widely used in the ecosystem, important it's secure, yet there's no symbolic execution tooling available to catch bugs and potential vulns -

Charles Guillemet (@p3b7_) 's Twitter Profile Photo

ETHCC in Cannes was a blast ✨. Great energy, tons of new projects, and strong momentum all around. I had the chance to present some of Ledger’s latest innovations: 1️⃣ Clear Signing Standard: Human-readable transaction details, directly on-device. 2️⃣ Transaction Checks on

ETHCC in Cannes was a blast ✨. Great energy, tons of new projects, and strong momentum all around.

I had the chance to present some of Ledger’s latest innovations:
1️⃣ Clear Signing Standard: Human-readable transaction details, directly on-device.
2️⃣ Transaction Checks on
GaetanSemp.eth (@gaetansemp) 's Twitter Profile Photo

Last week at EthCC - Ethereum Community Conference, I had the opportunity to try the Ledger Recovery Key introduced by its CTO Charles Guillemet few days ago ! And honestly I am sold ! Here is why 👇 Reminder : The idea of the recovery key is to be able to store your private key on a pin-protected (very) small local

Last week at <a href="/EthCC/">EthCC - Ethereum Community Conference</a>, I had the opportunity to try the <a href="/Ledger/">Ledger</a> Recovery Key introduced by its CTO <a href="/P3b7_/">Charles Guillemet</a> few days ago !

And honestly I am sold ! Here is why 👇

Reminder : The idea of the recovery key is to be able to store your private key on a pin-protected (very) small local
Carl Anderson (@crlndrsn) 's Twitter Profile Photo

Crypto UX shouldn’t suck. Excited to join the WalletConnect Council and work on the real stuff that makes crypto usable for real people. Meet the Council 👇

Istanbul Blockchain Week (@istanbulblockwk) 's Twitter Profile Photo

“Don’t let your wallet blind sign your downfall.” Carl Anderson (Carl Anderson) from Ledger explains why bad UX still causes billion-dollar hacks. He breaks down how clear signing and transaction checks are changing the game. Plus, a sneak peek at Ledger’s upcoming Recovery Key

“Don’t let your wallet blind sign your downfall.”

Carl Anderson (<a href="/CRLNDRSN/">Carl Anderson</a>) from <a href="/Ledger/">Ledger</a> explains why bad UX still causes billion-dollar hacks. He breaks down how clear signing and transaction checks are changing the game.

Plus, a sneak peek at Ledger’s upcoming Recovery Key
Ledger (@ledger) 's Twitter Profile Photo

🔔 July Recap: What’s New in Ledger Live? Here’s everything we shipped in July to level up your self-custody game. 🧵⬇️

Charles Guillemet (@p3b7_) 's Twitter Profile Photo

🚨 There’s a large-scale supply chain attack in progress: the NPM account of a reputable developer has been compromised. The affected packages have already been downloaded over 1 billion times, meaning the entire JavaScript ecosystem may be at risk. The malicious payload works

Charles Guillemet (@p3b7_) 's Twitter Profile Photo

Update on the NPM attack: The attack fortunately failed, with almost no victims.🔒 It began with a phishing email from a fake npm support domain that stole credentials and gave attackers access to publish malicious package updates. The injected code targeted web crypto activity,

Update on the NPM attack: The attack fortunately failed, with almost no victims.🔒

It began with a phishing email from a fake npm support domain that stole credentials and gave attackers access to publish malicious package updates. The injected code targeted web crypto activity,
Kiln 🧱🔥 (@kiln_finance) 's Twitter Profile Photo

1/10 🧵 Following our announcement yesterday regarding the Solana incident involving SwissBorg, Kiln is taking additional precautionary measures to safeguard client assets across all the networks. kiln.fi/post/kiln-resp…

Ledger (@ledger) 's Twitter Profile Photo

Shift into gear with Ledger x BWT Alpine Formula One Team! We teamed up with the Alpine Formula One Team to bring you a limited-edition, custom-engraved Ledger Stax, plus a custom case and packaging. High-performance speed meets uncompromising security. Get yours: shop.ledger.com/products/ledge…

Charles Guillemet (@p3b7_) 's Twitter Profile Photo

Zak was the target of a sophisticated phishing attack. The attacker invited him to join a podcast and tried to trick him into installing "podcast software", which was actually malware designed to drain crypto from his computer. In the end, Zak casually chatted with the