際際滷

際際滷Share a Scribd company logo
Rebooting the Smartcard
Rebooting Web Of Trust Paris Meetup
November 2016
Nicolas Bacca
@btchip
A trust layer between the blockchain
and the physical world
For industrials, enterprises and consumers
Securing the first and last mile
LEDGER TECHNOLOGY
Without trust, data has no actionable value
node
node
node
node
nodeCloud servers
User on a PC or a
smartphone Industrial
sensor / IoT
node
node node
Connected
object
Blockchain/IT
trusted zone
Physical world
absence of trust
Is this really you?
Am I allowed to executethis transaction?
Critical temperature data
Did the driver got switched?
The ubiquitous Safe
Best technical solution for at scale (CHEAP) secure deployment
Best technical solution against physical attacks (theft, evil maid)
A configurable Safe
Lot of resources invested in secure remote management
Great portability of Java Card, at least on paper
But not YOUR manageable identity
The secrets are not YOUR secrets
Or are yours but you cant manage them (fingerprint match on card)
> >
Definitely not made for YOU
Not Plug & Play
Cannot be reliable in a regular (malware infected) computing environment
Rebooting the Smartcard
Plug and Play
Developer friendly
Malware resistant
Auditable
Plug and Play
Native browser / mobile access
No driver, no middleware
Reusing the FIDO standards
Malware resistant
Physical user consent can be required for all sensitive operations
Display the operation to be validated, in human readable format
Developer friendly
Native isolation whenever possible
Accelerated, low level cryptographic primitives to build on
Improving on isolation, using ARM capabilities
Native application 1
Native application 2
Native application 3
Microkernel
User
seed
MMU lock
User modeSupervisor mode
System call
UI application
Auditable
Isolate secure and non secure code
Build on top of a microkernel that can be gradually opened
Ledger platform architecture
Trusted / Secure component
(Secure Element or enclave)
with limited I/O options
Non trusted component
with more I/O options
Screen
Direct control from the Trusted component, proxied
Pairing at boot
time
User app 1
User app 2
Button
Sensor
USB
Our latest consumer devices
Ledger Nano S : available now
Ledger Blue : pre order,
Christmas delivery
(larger screen, BLE)
Hardware Oracle - for machines
Cryptographically attestable
anti-tampering sensors
鐃 Secure chip ST31G480 (CC EAL6+)
鐃 Sensor
鐃 3 axis anti-tampering MEMS
鐃 USB interface for blockchain computer
Getting started with development
Nano-S resources : compiler and SDK - https://github.com/ledgerhq/ledger-nano-s
Sample applications : https://github.com/LedgerHQ/blue-sample-apps
Documentation in progress : http://ledger.readthedocs.io/
Developer Slack : http://slack.ledger.co
Documentation is getting put together, so dont hesitate to ask on Slack
Thank you
@btchip

More Related Content

What's hot (20)

IoT Saturday PN 2019 - Eurotech
IoT Saturday PN 2019 - EurotechIoT Saturday PN 2019 - Eurotech
IoT Saturday PN 2019 - Eurotech
Luca Dazi
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
Arvind Tiwary
Azure IoT Hub
Azure IoT HubAzure IoT Hub
Azure IoT Hub
WinWire Technologies Inc
Application layer Security in IoT: A Survey
Application layer Security in IoT: A SurveyApplication layer Security in IoT: A Survey
Application layer Security in IoT: A Survey
Adeel Ahmed
Scaling IoT Deployments: DevOps for the Internet of Things
Scaling IoT Deployments: DevOps for the Internet of ThingsScaling IoT Deployments: DevOps for the Internet of Things
Scaling IoT Deployments: DevOps for the Internet of Things
Balena
Azure Sphere
Azure SphereAzure Sphere
Azure Sphere
Mirco Vanini
1 importance of light weight authentication in iot
1 importance of light weight authentication in iot1 importance of light weight authentication in iot
1 importance of light weight authentication in iot
Chintan Patel
Password Security System
Password Security System Password Security System
Password Security System
SyedAbdullah127
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
Leonardo De Moura Rocha Lima
Iot security and Authentication solution
Iot security and Authentication solutionIot security and Authentication solution
Iot security and Authentication solution
Pradeep Jeswani
DotNetToscana - Azure IoT Hub - Il Concentratore
DotNetToscana - Azure IoT Hub - Il ConcentratoreDotNetToscana - Azure IoT Hub - Il Concentratore
DotNetToscana - Azure IoT Hub - Il Concentratore
Riccardo Cappello
IoT on Azure
IoT on AzureIoT on Azure
IoT on Azure
Vinoth Rajagopalan
SecurEntry by PrehKeyTec
SecurEntry by PrehKeyTecSecurEntry by PrehKeyTec
SecurEntry by PrehKeyTec
cshergi
CIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open StandardsCIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open Standards
CloudIDSummit
Connecting Stuff to Azure (IoT)
Connecting Stuff to Azure (IoT)Connecting Stuff to Azure (IoT)
Connecting Stuff to Azure (IoT)
Mark Simms
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
Paul Fremantle
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Design World
iot hacking, smartlockpick
 iot hacking, smartlockpick iot hacking, smartlockpick
iot hacking, smartlockpick
idsecconf
IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015
Eurotech
Demystifying Internet of Things with Azure IoT Suite
Demystifying Internet of Things with Azure IoT SuiteDemystifying Internet of Things with Azure IoT Suite
Demystifying Internet of Things with Azure IoT Suite
WinWire Technologies Inc
IoT Saturday PN 2019 - Eurotech
IoT Saturday PN 2019 - EurotechIoT Saturday PN 2019 - Eurotech
IoT Saturday PN 2019 - Eurotech
Luca Dazi
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
Arvind Tiwary
Application layer Security in IoT: A Survey
Application layer Security in IoT: A SurveyApplication layer Security in IoT: A Survey
Application layer Security in IoT: A Survey
Adeel Ahmed
Scaling IoT Deployments: DevOps for the Internet of Things
Scaling IoT Deployments: DevOps for the Internet of ThingsScaling IoT Deployments: DevOps for the Internet of Things
Scaling IoT Deployments: DevOps for the Internet of Things
Balena
1 importance of light weight authentication in iot
1 importance of light weight authentication in iot1 importance of light weight authentication in iot
1 importance of light weight authentication in iot
Chintan Patel
Password Security System
Password Security System Password Security System
Password Security System
SyedAbdullah127
Iot security and Authentication solution
Iot security and Authentication solutionIot security and Authentication solution
Iot security and Authentication solution
Pradeep Jeswani
DotNetToscana - Azure IoT Hub - Il Concentratore
DotNetToscana - Azure IoT Hub - Il ConcentratoreDotNetToscana - Azure IoT Hub - Il Concentratore
DotNetToscana - Azure IoT Hub - Il Concentratore
Riccardo Cappello
SecurEntry by PrehKeyTec
SecurEntry by PrehKeyTecSecurEntry by PrehKeyTec
SecurEntry by PrehKeyTec
cshergi
CIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open StandardsCIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open Standards
CloudIDSummit
Connecting Stuff to Azure (IoT)
Connecting Stuff to Azure (IoT)Connecting Stuff to Azure (IoT)
Connecting Stuff to Azure (IoT)
Mark Simms
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
Paul Fremantle
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Design World
iot hacking, smartlockpick
 iot hacking, smartlockpick iot hacking, smartlockpick
iot hacking, smartlockpick
idsecconf
IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015
Eurotech
Demystifying Internet of Things with Azure IoT Suite
Demystifying Internet of Things with Azure IoT SuiteDemystifying Internet of Things with Azure IoT Suite
Demystifying Internet of Things with Azure IoT Suite
WinWire Technologies Inc

Similar to Rebooting the smartcard (20)

IoT on azure
IoT on azureIoT on azure
IoT on azure
Joanna Lamch
IRJET - Smart Door System
IRJET - Smart Door SystemIRJET - Smart Door System
IRJET - Smart Door System
IRJET Journal
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
Microsoft Tech Community
lamacchia-palladium
lamacchia-palladiumlamacchia-palladium
lamacchia-palladium
Ned Hayes
BluBX Intro
BluBX IntroBluBX Intro
BluBX Intro
Jesica Trejo
Iot vupico-damien-contreras-2018-05-17-light-v3
Iot vupico-damien-contreras-2018-05-17-light-v3Iot vupico-damien-contreras-2018-05-17-light-v3
Iot vupico-damien-contreras-2018-05-17-light-v3
Damien Contreras
[Codientu.org] design of a microcontroller based circuit for software protection
[Codientu.org] design of a microcontroller based circuit for software protection[Codientu.org] design of a microcontroller based circuit for software protection
[Codientu.org] design of a microcontroller based circuit for software protection
Hieu Le Dinh
From Bitcoin Hardware Wallets to Personal Privacy Devices
From Bitcoin Hardware Wallets to Personal Privacy DevicesFrom Bitcoin Hardware Wallets to Personal Privacy Devices
From Bitcoin Hardware Wallets to Personal Privacy Devices
MecklerMedia
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Product of Things
Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?
Mirco Vanini
IoT Sense
IoT Sense IoT Sense
IoT Sense
IOT Sense
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET Journal
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
IRJET Journal
Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security Analysis
Daksh Raj Chopra
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security system
praful borad
Iot Security
Iot SecurityIot Security
Iot Security
MAITREYA MISRA
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111
Jan Vekemans
usb-lock-rp-en
usb-lock-rp-enusb-lock-rp-en
usb-lock-rp-en
Javier Arrospide
Industrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine LearningIndustrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine Learning
VEDLIoT Project
IRJET - Smart Door System
IRJET - Smart Door SystemIRJET - Smart Door System
IRJET - Smart Door System
IRJET Journal
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
Microsoft Tech Community
lamacchia-palladium
lamacchia-palladiumlamacchia-palladium
lamacchia-palladium
Ned Hayes
Iot vupico-damien-contreras-2018-05-17-light-v3
Iot vupico-damien-contreras-2018-05-17-light-v3Iot vupico-damien-contreras-2018-05-17-light-v3
Iot vupico-damien-contreras-2018-05-17-light-v3
Damien Contreras
[Codientu.org] design of a microcontroller based circuit for software protection
[Codientu.org] design of a microcontroller based circuit for software protection[Codientu.org] design of a microcontroller based circuit for software protection
[Codientu.org] design of a microcontroller based circuit for software protection
Hieu Le Dinh
From Bitcoin Hardware Wallets to Personal Privacy Devices
From Bitcoin Hardware Wallets to Personal Privacy DevicesFrom Bitcoin Hardware Wallets to Personal Privacy Devices
From Bitcoin Hardware Wallets to Personal Privacy Devices
MecklerMedia
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Product of Things
Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?
Mirco Vanini
IoT Sense
IoT Sense IoT Sense
IoT Sense
IOT Sense
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET Journal
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
IRJET Journal
Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security Analysis
Daksh Raj Chopra
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security system
praful borad
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111
Jan Vekemans
Industrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine LearningIndustrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine Learning
VEDLIoT Project

Recently uploaded (11)

Instrucciones en manual de amplificador de audio k8060 en pdf
Instrucciones en manual de amplificador de audio k8060 en pdfInstrucciones en manual de amplificador de audio k8060 en pdf
Instrucciones en manual de amplificador de audio k8060 en pdf
MariaNievesPrez
International Discussion of Law Presentation CISG.pptx
International Discussion of Law Presentation CISG.pptxInternational Discussion of Law Presentation CISG.pptx
International Discussion of Law Presentation CISG.pptx
charleschukwuogor
Most Trusted Home Automation Company in India- Jasmine Smart Homes
Most Trusted Home Automation Company in India- Jasmine Smart HomesMost Trusted Home Automation Company in India- Jasmine Smart Homes
Most Trusted Home Automation Company in India- Jasmine Smart Homes
sanskar01021985
Lenskart final about comparing the analysis
Lenskart final about comparing the analysisLenskart final about comparing the analysis
Lenskart final about comparing the analysis
YugamKejriwal1
P N 11 @ FDSF SDF SFSF SDFSDFSDFSDFDFDDDDDDDDDDDDDDD
P N 11 @ FDSF SDF SFSF SDFSDFSDFSDFDFDDDDDDDDDDDDDDDP N 11 @ FDSF SDF SFSF SDFSDFSDFSDFDFDDDDDDDDDDDDDDD
P N 11 @ FDSF SDF SFSF SDFSDFSDFSDFDFDDDDDDDDDDDDDDD
LuthMnh54
Word Processing - Module 1.pptx to become
Word Processing - Module 1.pptx to becomeWord Processing - Module 1.pptx to become
Word Processing - Module 1.pptx to become
steveparker9990sp
Train _Accident _Safety using track .pptx
Train _Accident _Safety using track .pptxTrain _Accident _Safety using track .pptx
Train _Accident _Safety using track .pptx
RajaBabu290247
Materials, Sensors and Actuators in MEMS technology evolution.pptx
Materials, Sensors and Actuators in MEMS technology evolution.pptxMaterials, Sensors and Actuators in MEMS technology evolution.pptx
Materials, Sensors and Actuators in MEMS technology evolution.pptx
DhamodharanSrinivasa1
Computer Hardware and its classification .pptx
Computer Hardware and its classification .pptxComputer Hardware and its classification .pptx
Computer Hardware and its classification .pptx
leonsaifullah
Etendue of microLED: fundamental theory and applications
Etendue of microLED: fundamental theory and applicationsEtendue of microLED: fundamental theory and applications
Etendue of microLED: fundamental theory and applications
Brian Kim, PhD
Meffier_Infra.pdfssssssssssssssssssssssssss
Meffier_Infra.pdfssssssssssssssssssssssssssMeffier_Infra.pdfssssssssssssssssssssssssss
Meffier_Infra.pdfssssssssssssssssssssssssss
ashutoshpropertyinin
Instrucciones en manual de amplificador de audio k8060 en pdf
Instrucciones en manual de amplificador de audio k8060 en pdfInstrucciones en manual de amplificador de audio k8060 en pdf
Instrucciones en manual de amplificador de audio k8060 en pdf
MariaNievesPrez
International Discussion of Law Presentation CISG.pptx
International Discussion of Law Presentation CISG.pptxInternational Discussion of Law Presentation CISG.pptx
International Discussion of Law Presentation CISG.pptx
charleschukwuogor
Most Trusted Home Automation Company in India- Jasmine Smart Homes
Most Trusted Home Automation Company in India- Jasmine Smart HomesMost Trusted Home Automation Company in India- Jasmine Smart Homes
Most Trusted Home Automation Company in India- Jasmine Smart Homes
sanskar01021985
Lenskart final about comparing the analysis
Lenskart final about comparing the analysisLenskart final about comparing the analysis
Lenskart final about comparing the analysis
YugamKejriwal1
P N 11 @ FDSF SDF SFSF SDFSDFSDFSDFDFDDDDDDDDDDDDDDD
P N 11 @ FDSF SDF SFSF SDFSDFSDFSDFDFDDDDDDDDDDDDDDDP N 11 @ FDSF SDF SFSF SDFSDFSDFSDFDFDDDDDDDDDDDDDDD
P N 11 @ FDSF SDF SFSF SDFSDFSDFSDFDFDDDDDDDDDDDDDDD
LuthMnh54
Word Processing - Module 1.pptx to become
Word Processing - Module 1.pptx to becomeWord Processing - Module 1.pptx to become
Word Processing - Module 1.pptx to become
steveparker9990sp
Train _Accident _Safety using track .pptx
Train _Accident _Safety using track .pptxTrain _Accident _Safety using track .pptx
Train _Accident _Safety using track .pptx
RajaBabu290247
Materials, Sensors and Actuators in MEMS technology evolution.pptx
Materials, Sensors and Actuators in MEMS technology evolution.pptxMaterials, Sensors and Actuators in MEMS technology evolution.pptx
Materials, Sensors and Actuators in MEMS technology evolution.pptx
DhamodharanSrinivasa1
Computer Hardware and its classification .pptx
Computer Hardware and its classification .pptxComputer Hardware and its classification .pptx
Computer Hardware and its classification .pptx
leonsaifullah
Etendue of microLED: fundamental theory and applications
Etendue of microLED: fundamental theory and applicationsEtendue of microLED: fundamental theory and applications
Etendue of microLED: fundamental theory and applications
Brian Kim, PhD
Meffier_Infra.pdfssssssssssssssssssssssssss
Meffier_Infra.pdfssssssssssssssssssssssssssMeffier_Infra.pdfssssssssssssssssssssssssss
Meffier_Infra.pdfssssssssssssssssssssssssss
ashutoshpropertyinin

Rebooting the smartcard

  • 1. Rebooting the Smartcard Rebooting Web Of Trust Paris Meetup November 2016 Nicolas Bacca @btchip
  • 2. A trust layer between the blockchain and the physical world For industrials, enterprises and consumers Securing the first and last mile LEDGER TECHNOLOGY
  • 3. Without trust, data has no actionable value node node node node nodeCloud servers User on a PC or a smartphone Industrial sensor / IoT node node node Connected object Blockchain/IT trusted zone Physical world absence of trust Is this really you? Am I allowed to executethis transaction? Critical temperature data Did the driver got switched?
  • 4. The ubiquitous Safe Best technical solution for at scale (CHEAP) secure deployment Best technical solution against physical attacks (theft, evil maid)
  • 5. A configurable Safe Lot of resources invested in secure remote management Great portability of Java Card, at least on paper
  • 6. But not YOUR manageable identity The secrets are not YOUR secrets Or are yours but you cant manage them (fingerprint match on card) > >
  • 7. Definitely not made for YOU Not Plug & Play Cannot be reliable in a regular (malware infected) computing environment
  • 8. Rebooting the Smartcard Plug and Play Developer friendly Malware resistant Auditable
  • 9. Plug and Play Native browser / mobile access No driver, no middleware Reusing the FIDO standards
  • 10. Malware resistant Physical user consent can be required for all sensitive operations Display the operation to be validated, in human readable format
  • 11. Developer friendly Native isolation whenever possible Accelerated, low level cryptographic primitives to build on
  • 12. Improving on isolation, using ARM capabilities Native application 1 Native application 2 Native application 3 Microkernel User seed MMU lock User modeSupervisor mode System call UI application
  • 13. Auditable Isolate secure and non secure code Build on top of a microkernel that can be gradually opened
  • 14. Ledger platform architecture Trusted / Secure component (Secure Element or enclave) with limited I/O options Non trusted component with more I/O options Screen Direct control from the Trusted component, proxied Pairing at boot time User app 1 User app 2 Button Sensor USB
  • 15. Our latest consumer devices Ledger Nano S : available now Ledger Blue : pre order, Christmas delivery (larger screen, BLE)
  • 16. Hardware Oracle - for machines Cryptographically attestable anti-tampering sensors 鐃 Secure chip ST31G480 (CC EAL6+) 鐃 Sensor 鐃 3 axis anti-tampering MEMS 鐃 USB interface for blockchain computer
  • 17. Getting started with development Nano-S resources : compiler and SDK - https://github.com/ledgerhq/ledger-nano-s Sample applications : https://github.com/LedgerHQ/blue-sample-apps Documentation in progress : http://ledger.readthedocs.io/ Developer Slack : http://slack.ledger.co Documentation is getting put together, so dont hesitate to ask on Slack