Ledger Wallet™ just got a major upgrade.

Take control today

A whole new level of choice, clarity and control

Trade different via Ledger 4.0

Download now Learn more

White Hat Hacking

Apr 8, 2026 | Updated Apr 8, 2026
White hat hacking is the practice of ethically testing computer systems, apps, or networks to identify security vulnerabilities.

What Is White Hat Hacking?

White hat hacking, also known as ethical hacking, uses many of the same techniques as criminal hacking, but with one key difference: white hat hackers act with the system owner’s permission. The goal is to find weaknesses such as software bugs, misconfigurations, and weak passwords, then report them so they can be fixed.

In the digital asset space, white hat hacking is essential. Due to the immutability of blockchain transactions, a single vulnerability in a smart contract or wallet interface can lead to the permanent loss of funds. White hat hackers work to prevent these exploits by stress-testing protocols, auditing code, and participating in bug bounty programs.

The “white hat” and “black hat” terms originate from classic Western movies, where heroes were often shown wearing white hats and villains black hats. Today, the terms help users understand the difference between permitted security research and malicious hacking. By that same logic, Grey hat hacking is a similar practice involving individuals who look for vulnerabilities without explicit permission (but without malicious intent), often reporting the bug to the owner after the fact.

How Does White Hat Hacking Work?

White hat hackers follow a structured process to ensure their work is legal, ethical, and effective.

The approach often begins with establishing permission and scope. Many system owners set the general scope via their own bounty programs; otherwise, the hacker may first ask to define exactly which systems can be tested and which remain off-limits. Once the boundaries are set, the hacker moves into vulnerability research, using automated tools and manual techniques to scan for entry points.

The process then moves into the exploitation or testing phase. Here, the hacker attempts to bypass security measures to prove a vulnerability exists.

A key step in the process is the responsible disclosure. The hacker provides a detailed report to the organization, explaining the bug and suggesting specific patches to secure the system before a malicious actor can find it.

The Donjon: Ledger’s Team of White Hat Hackers

Ledger employs its own elite unit of white hat hackers known as the Ledger Donjon. Founded on the principle that building secure hardware requires an attack-oriented mindset, the team ensures the security of Ledger’s products.

However, their mission extends far beyond internal testing; the Donjon also rigorously analyzes hardware and software from across the entire crypto ecosystem to help ensure industry-wide security. This team of security experts uses advanced techniques to identify vulnerabilities in both hardware and software across the landscape before malicious actors can.

The Donjon’s proactive approach, combined with an open security philosophy and a global Bug Bounty program, is why Ledger has sold over 8 million signers without a single hack.

Learn more about the Ledger Donjon’s Origin Story.

DEX-to-CEX Ratio

The DEX-to-CEX ratio measures the proportion of crypto trading volume occurring on decentralized exchanges compared to centralized exchanges.

Full definition

Shapella Fork

The Shapella fork is the combination of two major Ethereum network upgrades (Shanghai and Capella upgrades) that occurred simultaneously. Together, these upgrades allowed users to withdraw their staked ETH on the network.

Full definition

Sharpe Ratio

The Sharpe Ratio is a formula that helps investors understand how an investment could perform compared to its risks.

Full definition

Own your crypto future

Stay informed with security tips, updates, and exclusive offers from Ledger

Your email address will only be used to send you our newsletter, as well as updates and offers. You can unsubscribe at any time. Learn more

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.