diff --git a/bounty.md b/bounty.md index 5e9255e..40e84f6 100644 --- a/bounty.md +++ b/bounty.md @@ -16,7 +16,7 @@ We are mainly interested in vulnerabilities that would eventually allow attacker #### Scopes -- Hardware attacks on the Ledger devices +- Hardware attacks on the Ledger devices (i.e. hardware products) - Software attacks on the firmware running on the devices - Vulnerabilities in apps available through Ledger Live (vulnerabilities in apps developed by 3rd parties should also be reported to Ledger) diff --git a/threat-model.md b/threat-model.md index ebfb970..185c095 100644 --- a/threat-model.md +++ b/threat-model.md @@ -4,7 +4,7 @@ title: Threat Model permalink: /threat-model/ --- -This page is intended to describe the threat model of Ledger devices. It first lists the main security objectives the devices intend to fulfill. Then it describes the security mechanisms implemented in order to actually reach these objectives. The associated threats to these security mechanisms are also mentioned. +This page is intended to describe the threat model of Ledger devices (i.e. hardware products). It first lists the main security objectives the devices intend to fulfill. Then it describes the security mechanisms implemented in order to actually reach these objectives. The associated threats to these security mechanisms are also mentioned. ## Security Objectives