{"id":99213,"date":"2019-03-13T03:00:15","date_gmt":"2019-03-13T10:00:15","guid":{"rendered":"https:\/\/cryptoslate.com\/?p=99213"},"modified":"2020-03-24T06:58:33","modified_gmt":"2020-03-24T06:58:33","slug":"ledger-reveals-five-vulnerabilities-in-competitor-trezors-wallets","status":"publish","type":"post","link":"https:\/\/cryptoslate.com\/ledger-reveals-five-vulnerabilities-in-competitor-trezors-wallets\/","title":{"rendered":"Ledger Reveals Five Vulnerabilities in Competitor Trezor&#8217;s Wallets"},"content":{"rendered":"<p>Ledger, a major crypto hardware wallet manufacturer based in France, <a href=\"https:\/\/www.ledger.fr\/2019\/03\/11\/our-shared-security-responsibly-disclosing-competitor-vulnerabilities\/\">revealed<\/a> five security vulnerabilities found in the <a href=\"http:\/\/cryptoslate.com\/products\/trezor\">Trezor Model T<\/a> and <a href=\"https:\/\/cryptoslate.com\/products\/trezor-one-white\/\">Model One<\/a>, major competitors to the <a href=\"https:\/\/cryptoslate.com\/products\/ledger-nano-s\/\">Nano Ledger<\/a>.<\/p>\n<h2>Ledger's Attack Lab Discovered Vulnerabilities in Trezor's Hardware Wallets<\/h2>\n<p>The market for cryptocurrency hardware wallets is a rather competitive one due to the nature of cryptocurrencies. As a result, many companies are looking to create products that satisfy the strict security needs of the technology.<\/p>\n<p><a href=\"https:\/\/cryptoslate.com\/products\/ledger-nano-s\/\">Ledger<\/a>, a major hardware wallet manufacturer based in France, has been one of the few companies that put its research labs to good use. Apart from hacking into their own devices, the company uses its Attack Lab to expose security vulnerabilities in competitors' devices.<\/p>\n<figure id=\"attachment_99214\" aria-describedby=\"caption-attachment-99214\" style=\"width: 802px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-99214\" src=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2019\/03\/ledger-hack-trezor-vulnerabilities.png\" alt=\"\" width=\"802\" height=\"602\" srcset=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2019\/03\/ledger-hack-trezor-vulnerabilities.png 802w, https:\/\/cryptoslate.com\/wp-content\/uploads\/2019\/03\/ledger-hack-trezor-vulnerabilities-300x225.png 300w, https:\/\/cryptoslate.com\/wp-content\/uploads\/2019\/03\/ledger-hack-trezor-vulnerabilities-768x576.png 768w\" sizes=\"(max-width: 802px) 100vw, 802px\" \/><figcaption id=\"caption-attachment-99214\" class=\"wp-caption-text\">Source: <a href=\"https:\/\/www.ledger.fr\/2019\/03\/11\/our-shared-security-responsibly-disclosing-competitor-vulnerabilities\/\">Ledger<\/a><\/figcaption><\/figure>\n<p><a href=\"https:\/\/www.ledger.fr\/2019\/03\/11\/our-shared-security-responsibly-disclosing-competitor-vulnerabilities\/\">According to<\/a> the company's blog post, Ledger contacted <a href=\"https:\/\/cryptoslate.com\/products\/trezor-one-white\/\">Trezor<\/a> to share five vulnerabilities that were discovered by its Attack Lab. Ledger gave the company a &#8220;responsible&#8221; disclosure period to fix said vulnerabilities.<\/p>\n<p>After failing to address four of the five bugs found even after two extensions, Ledger went public with its findings in a Mar. 11th blog post. At the recently-held MIT Bitcoin Expo in Boston, Ledger's chief security officer also presented some of the ways in which Trezor's wallets could be hacked.<\/p>\n<h2>French Wallet Manufacturer Lists Five Different Ways Trezor Wallets Can be Hacked<\/h2>\n<p>Ledger's study found several weaknesses in the Trezor One and Trezor T wallet. The first problem the company identified was how easily the devices could be faked. The devices could be entirely imitated, as they are both made with generic, (relatively) accessible components.<\/p>\n<p>The device's tamper-proof sticker can be easily removed, allowing attackers to compromise original devices bought directly from Trezor and then return them, seemingly untouched.<\/p>\n<p>Then, Ledger's Attack Lab was also able to guess the PIN on both the Model T and Model One by using a \u201cside-channel attack,\u201d which is hacking using information (typically) gained from information revealed by the hardware as it processes information, such as timing information, power consumption, or even sound.<\/p>\n<p>By calculating how much power was used by the device as it verifies pins, the lab was able to correctly guess the pin in less than five attempts. This is the only issue the company managed to solve in its 1.8.0 firmware update.<\/p>\n<p>The third and fourth vulnerabilities Ledger found could both be solved by replacing the device's core component with a \u201cSecure Element chip,\u201d as opposed to the current computer chips used in the devices. Researchers also found that an attacker who has physical access to Trezor One and Trezor T can easily extract all the data stored within the flash memory of the device.<\/p>\n<p>Finally, Ledger <a href=\"https:\/\/www.ledger.fr\/2019\/03\/11\/our-shared-security-responsibly-disclosing-competitor-vulnerabilities\/\">found<\/a> that the crypto library does not contain proper countermeasures against software attacks aside for its \u201cScalar Multiplication function,\u201d a core cryptographic operation used in cryptocurrency, particularly for signing transactions.<\/p>\n<p>However, the function alone isn't enough to protect against physical side-channel attacks. While Trezor has previously claimed both the Model T and the Model One are resistant to such attacks, Ledger found that an attacker with physical access to the device can extract secret keys through these methods.<\/p>\n<p><strong><em>Update: Trezor has posted a <a href=\"https:\/\/blog.trezor.io\/our-response-to-ledgers-mitbitcoinexpo-findings-194f1b0a97d4\">response<\/a>\u00a0in the form of a blog post to the accusations from Ledger.<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ledger, a major crypto hardware wallet manufacturer based in France, revealed five security vulnerabilities found in the Trezor Model T and Model One, major competitors to the Nano Ledger. Ledger&#8217;s Attack Lab Discovered Vulnerabilities in Trezor&#8217;s Hardware Wallets The market for cryptocurrency hardware wallets is a rather competitive one due to the nature of cryptocurrencies. [&hellip;]<\/p>\n","protected":false},"author":106,"featured_media":99224,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16041,37,60206],"tags":[],"post_folder":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.9 (Yoast SEO v21.9.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ledger Reveals Five Vulnerabilities in Competitor Trezor&#039;s Wallets<\/title>\n<meta name=\"description\" content=\"Ledger revealed five security vulnerabilities found in the Trezor Model T and Model One, major competitors to the Nano Ledger.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cryptoslate.com\/ledger-reveals-five-vulnerabilities-in-competitor-trezors-wallets\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ledger Reveals Five Vulnerabilities in Competitor Trezor&#039;s Wallets\" \/>\n<meta property=\"og:description\" content=\"Ledger revealed five security vulnerabilities found in the Trezor Model T and Model One, major competitors to the Nano Ledger.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cryptoslate.com\/ledger-reveals-five-vulnerabilities-in-competitor-trezors-wallets\/\" \/>\n<meta property=\"og:site_name\" content=\"CryptoSlate\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-13T10:00:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-03-24T06:58:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2019\/03\/ledger-vulnerabilities-social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Priyeshu Garg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Ledger Reveals Five Vulnerabilities in Competitor Trezor&#039;s Wallets\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2019\/03\/ledger-vulnerabilities-social.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@cryptoslate\" \/>\n<meta name=\"twitter:site\" content=\"@cryptoslate\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Priyeshu Garg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/cryptoslate.com\/ledger-reveals-five-vulnerabilities-in-competitor-trezors-wallets\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cryptoslate.com\/ledger-reveals-five-vulnerabilities-in-competitor-trezors-wallets\/\"},\"author\":{\"name\":\"Priyeshu Garg\",\"@id\":\"https:\/\/cryptoslate.com\/#\/schema\/person\/65cc4f759accbe9de3080a5711e7cea1\"},\"headline\":\"Ledger Reveals Five Vulnerabilities in Competitor Trezor&#8217;s Wallets\",\"datePublished\":\"2019-03-13T10:00:15+00:00\",\"dateModified\":\"2020-03-24T06:58:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cryptoslate.com\/ledger-reveals-five-vulnerabilities-in-competitor-trezors-wallets\/\"},\"wordCount\":561,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/cryptoslate.com\/#organization\"},\"articleSection\":[\"Hacks\",\"Technology\",\"Wallets\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/cryptoslate.com\/ledger-reveals-five-vulnerabilities-in-competitor-trezors-wallets\/#respond\"]}],\"copyrightYear\":\"2019\",\"copyrightHolder\":{\"@id\":\"https:\/\/cryptoslate.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cryptoslate.com\/ledger-reveals-five-vulnerabilities-in-competitor-trezors-wallets\/\",\"url\":\"https:\/\/cryptoslate.com\/ledger-reveals-five-vulnerabilities-in-competitor-trezors-wallets\/\",\"name\":\"Ledger Reveals Five Vulnerabilities in Competitor Trezor's Wallets\",\"isPartOf\":{\"@id\":\"https:\/\/cryptoslate.com\/#website\"},\"datePublished\":\"2019-03-13T10:00:15+00:00\",\"dateModified\":\"2020-03-24T06:58:33+00:00\",\"description\":\"Ledger revealed five security vulnerabilities found in the Trezor Model T and Model One, major competitors to the Nano Ledger.\",\"breadcrumb\":{\"@id\":\"https:\/\/cryptoslate.com\/ledger-reveals-five-vulnerabilities-in-competitor-trezors-wallets\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cryptoslate.com\/ledger-reveals-five-vulnerabilities-in-competitor-trezors-wallets\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cryptoslate.com\/ledger-reveals-five-vulnerabilities-in-competitor-trezors-wallets\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cryptoslate.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ledger Reveals Five Vulnerabilities in Competitor Trezor&#8217;s Wallets\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cryptoslate.com\/#website\",\"url\":\"https:\/\/cryptoslate.com\/\",\"name\":\"CryptoSlate\",\"description\":\"Cryptocurrency News and Real-time Coin Data\",\"publisher\":{\"@id\":\"https:\/\/cryptoslate.com\/#organization\"},\"inLanguage\":\"en-US\"},{\"@type\":[\"Organization\",\"NewsMediaOrganization\"],\"@id\":\"https:\/\/cryptoslate.com\/#organization\",\"name\":\"CryptoSlate\",\"url\":\"https:\/\/cryptoslate.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cryptoslate.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2018\/05\/c-logo.jpg\",\"contentUrl\":\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2018\/05\/c-logo.jpg\",\"width\":1000,\"height\":1000,\"caption\":\"CryptoSlate\"},\"image\":{\"@id\":\"https:\/\/cryptoslate.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/twitter.com\/cryptoslate\",\"https:\/\/www.instagram.com\/cryptoslate\",\"https:\/\/www.linkedin.com\/company\/cryptoslate\",\"https:\/\/www.youtube.com\/c\/cryptoslate\",\"https:\/\/cryptoslate.substack.com\",\"https:\/\/t.me\/cryptoslatenews\",\"https:\/\/www.tiktok.com\/@cryptoslatenews\"],\"publishingPrinciples\":\"https:\/\/cryptoslate.com\/editorial-policy\/#editorial-principles\",\"ownershipFundingInfo\":\"https:\/\/cryptoslate.com\/disclaimers\/how-cryptoslate-makes-and-spends-money\/\",\"actionableFeedbackPolicy\":\"https:\/\/cryptoslate.com\/editorial-policy\/#corrections-feedback\",\"correctionsPolicy\":\"https:\/\/cryptoslate.com\/editorial-policy\/#corrections-feedback\",\"ethicsPolicy\":\"https:\/\/cryptoslate.com\/editorial-policy\/#editorial-principles\",\"foundingDate\":\"2017-08-04\",\"founder\":[{\"@type\":\"Person\",\"name\":\"Nate Whitehill\"},{\"@type\":\"Person\",\"name\":\"Matthew Blancarte\"}],\"contactPoint\":[{\"@type\":\"ContactPoint\",\"contactType\":\"customer support\",\"url\":\"https:\/\/cryptoslate.com\/contact\/\",\"availableLanguage\":\"en-US\"},{\"@type\":\"ContactPoint\",\"contactType\":\"sales\",\"url\":\"https:\/\/cryptoslate.com\/advertising\/\",\"availableLanguage\":\"en-US\"},{\"@type\":\"ContactPoint\",\"contactType\":\"newsroom\",\"url\":\"https:\/\/cryptoslate.com\/editorial-policy\/#corrections-feedback\",\"email\":\"tips@cryptoslate.com\",\"availableLanguage\":\"en-US\"}],\"masthead\":\"https:\/\/cryptoslate.com\/about\/#masthead\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/cryptoslate.com\/#\/schema\/person\/65cc4f759accbe9de3080a5711e7cea1\",\"name\":\"Priyeshu Garg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cryptoslate.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2020\/08\/author-priyeshu-garg-150x150.jpg\",\"contentUrl\":\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2020\/08\/author-priyeshu-garg-150x150.jpg\",\"caption\":\"Priyeshu Garg\"},\"description\":\"Priyeshu is a software engineer who is passionate about machine learning and blockchain technology. He holds an engineering degree in computer science engineering and is a passionate economist. He built his first digital marketing startup when he was a teenager, and worked with multiple Fortune 500 companies along with smaller firms. When he is not solving transportation problems at his company (Ola), he can be found writing about the blockchain or roller skating with his friends.\",\"url\":\"https:\/\/cryptoslate.com\/author\/priyeshu-garg\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ledger Reveals Five Vulnerabilities in Competitor Trezor's Wallets","description":"Ledger revealed five security vulnerabilities found in the Trezor Model T and Model One, major competitors to the Nano Ledger.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cryptoslate.com\/ledger-reveals-five-vulnerabilities-in-competitor-trezors-wallets\/","og_locale":"en_US","og_type":"article","og_title":"Ledger Reveals Five Vulnerabilities in Competitor Trezor's Wallets","og_description":"Ledger revealed five security vulnerabilities found in the Trezor Model T and Model One, major competitors to the Nano Ledger.","og_url":"https:\/\/cryptoslate.com\/ledger-reveals-five-vulnerabilities-in-competitor-trezors-wallets\/","og_site_name":"CryptoSlate","article_published_time":"2019-03-13T10:00:15+00:00","article_modified_time":"2020-03-24T06:58:33+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/cryptoslate.com\/wp-content\/uploads\/2019\/03\/ledger-vulnerabilities-social.jpg","type":"image\/jpeg"}],"author":"Priyeshu Garg","twitter_card":"summary_large_image","twitter_title":"Ledger Reveals Five Vulnerabilities in Competitor Trezor's Wallets","twitter_image":"https:\/\/cryptoslate.com\/wp-content\/uploads\/2019\/03\/ledger-vulnerabilities-social.jpg","twitter_creator":"@cryptoslate","twitter_site":"@cryptoslate","twitter_misc":{"Written by":"Priyeshu Garg","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/cryptoslate.com\/ledger-reveals-five-vulnerabilities-in-competitor-trezors-wallets\/#article","isPartOf":{"@id":"https:\/\/cryptoslate.com\/ledger-reveals-five-vulnerabilities-in-competitor-trezors-wallets\/"},"author":{"name":"Priyeshu Garg","@id":"https:\/\/cryptoslate.com\/#\/schema\/person\/65cc4f759accbe9de3080a5711e7cea1"},"headline":"Ledger Reveals Five Vulnerabilities in Competitor Trezor&#8217;s Wallets","datePublished":"2019-03-13T10:00:15+00:00","dateModified":"2020-03-24T06:58:33+00:00","mainEntityOfPage":{"@id":"https:\/\/cryptoslate.com\/ledger-reveals-five-vulnerabilities-in-competitor-trezors-wallets\/"},"wordCount":561,"commentCount":0,"publisher":{"@id":"https:\/\/cryptoslate.com\/#organization"},"articleSection":["Hacks","Technology","Wallets"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cryptoslate.com\/ledger-reveals-five-vulnerabilities-in-competitor-trezors-wallets\/#respond"]}],"copyrightYear":"2019","copyrightHolder":{"@id":"https:\/\/cryptoslate.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/cryptoslate.com\/ledger-reveals-five-vulnerabilities-in-competitor-trezors-wallets\/","url":"https:\/\/cryptoslate.com\/ledger-reveals-five-vulnerabilities-in-competitor-trezors-wallets\/","name":"Ledger Reveals Five Vulnerabilities in Competitor Trezor's Wallets","isPartOf":{"@id":"https:\/\/cryptoslate.com\/#website"},"datePublished":"2019-03-13T10:00:15+00:00","dateModified":"2020-03-24T06:58:33+00:00","description":"Ledger revealed five security vulnerabilities found in the Trezor Model T and Model One, major competitors to the Nano Ledger.","breadcrumb":{"@id":"https:\/\/cryptoslate.com\/ledger-reveals-five-vulnerabilities-in-competitor-trezors-wallets\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cryptoslate.com\/ledger-reveals-five-vulnerabilities-in-competitor-trezors-wallets\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cryptoslate.com\/ledger-reveals-five-vulnerabilities-in-competitor-trezors-wallets\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cryptoslate.com\/"},{"@type":"ListItem","position":2,"name":"Ledger Reveals Five Vulnerabilities in Competitor Trezor&#8217;s Wallets"}]},{"@type":"WebSite","@id":"https:\/\/cryptoslate.com\/#website","url":"https:\/\/cryptoslate.com\/","name":"CryptoSlate","description":"Cryptocurrency News and Real-time Coin Data","publisher":{"@id":"https:\/\/cryptoslate.com\/#organization"},"inLanguage":"en-US"},{"@type":["Organization","NewsMediaOrganization"],"@id":"https:\/\/cryptoslate.com\/#organization","name":"CryptoSlate","url":"https:\/\/cryptoslate.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cryptoslate.com\/#\/schema\/logo\/image\/","url":"https:\/\/cryptoslate.com\/wp-content\/uploads\/2018\/05\/c-logo.jpg","contentUrl":"https:\/\/cryptoslate.com\/wp-content\/uploads\/2018\/05\/c-logo.jpg","width":1000,"height":1000,"caption":"CryptoSlate"},"image":{"@id":"https:\/\/cryptoslate.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/twitter.com\/cryptoslate","https:\/\/www.instagram.com\/cryptoslate","https:\/\/www.linkedin.com\/company\/cryptoslate","https:\/\/www.youtube.com\/c\/cryptoslate","https:\/\/cryptoslate.substack.com","https:\/\/t.me\/cryptoslatenews","https:\/\/www.tiktok.com\/@cryptoslatenews"],"publishingPrinciples":"https:\/\/cryptoslate.com\/editorial-policy\/#editorial-principles","ownershipFundingInfo":"https:\/\/cryptoslate.com\/disclaimers\/how-cryptoslate-makes-and-spends-money\/","actionableFeedbackPolicy":"https:\/\/cryptoslate.com\/editorial-policy\/#corrections-feedback","correctionsPolicy":"https:\/\/cryptoslate.com\/editorial-policy\/#corrections-feedback","ethicsPolicy":"https:\/\/cryptoslate.com\/editorial-policy\/#editorial-principles","foundingDate":"2017-08-04","founder":[{"@type":"Person","name":"Nate Whitehill"},{"@type":"Person","name":"Matthew Blancarte"}],"contactPoint":[{"@type":"ContactPoint","contactType":"customer support","url":"https:\/\/cryptoslate.com\/contact\/","availableLanguage":"en-US"},{"@type":"ContactPoint","contactType":"sales","url":"https:\/\/cryptoslate.com\/advertising\/","availableLanguage":"en-US"},{"@type":"ContactPoint","contactType":"newsroom","url":"https:\/\/cryptoslate.com\/editorial-policy\/#corrections-feedback","email":"tips@cryptoslate.com","availableLanguage":"en-US"}],"masthead":"https:\/\/cryptoslate.com\/about\/#masthead"},{"@type":"Person","@id":"https:\/\/cryptoslate.com\/#\/schema\/person\/65cc4f759accbe9de3080a5711e7cea1","name":"Priyeshu Garg","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cryptoslate.com\/#\/schema\/person\/image\/","url":"https:\/\/cryptoslate.com\/wp-content\/uploads\/2020\/08\/author-priyeshu-garg-150x150.jpg","contentUrl":"https:\/\/cryptoslate.com\/wp-content\/uploads\/2020\/08\/author-priyeshu-garg-150x150.jpg","caption":"Priyeshu Garg"},"description":"Priyeshu is a software engineer who is passionate about machine learning and blockchain technology. He holds an engineering degree in computer science engineering and is a passionate economist. He built his first digital marketing startup when he was a teenager, and worked with multiple Fortune 500 companies along with smaller firms. When he is not solving transportation problems at his company (Ola), he can be found writing about the blockchain or roller skating with his friends.","url":"https:\/\/cryptoslate.com\/author\/priyeshu-garg\/"}]}},"_links":{"self":[{"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/posts\/99213"}],"collection":[{"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/users\/106"}],"replies":[{"embeddable":true,"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/comments?post=99213"}],"version-history":[{"count":5,"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/posts\/99213\/revisions"}],"predecessor-version":[{"id":99230,"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/posts\/99213\/revisions\/99230"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/media\/99224"}],"wp:attachment":[{"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/media?parent=99213"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/categories?post=99213"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/tags?post=99213"},{"taxonomy":"post_folder","embeddable":true,"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/post_folder?post=99213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}