Linda Finlay

Linda Finlay’s Followers (32)

member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo

Linda Finlay


Born
The United Kingdom
Genre


As an Image Consultant, Linda has always had an avid interest in people. Helping them to regain their confidence after they've undergone life changing surgery is one of the most satisfying areas of her work.

Linda has always loved writing stories and won a competition run by the local paper when she was 11.

She has since been published in magazines and annuals. Moving to the spectacular Devon coast and learning about its local history inspired her to write her first novel The Royal Lacemaker. Under the patient guidance of a local teacher, she learned to make lace and is very proud of the 'spider' she produced.

She loves beach-combing, finding it the perfect excuse to indulge in a spot of people watching.
...more

Average rating: 4.19 · 2,416 ratings · 202 reviews · 25 distinct worksSimilar authors
The Girl with the Red Ribbon

4.22 avg rating — 534 ratings — published 2015 — 8 editions
Rate this book
Clear rating
The Royal Lacemaker

4.15 avg rating — 373 ratings — published 2014 — 7 editions
Rate this book
Clear rating
A Family For Christmas

4.26 avg rating — 314 ratings — published 2015 — 8 editions
Rate this book
Clear rating
The Flower Seller: The best...

4.11 avg rating — 299 ratings4 editions
Rate this book
Clear rating
The Sea Shell Girl

4.27 avg rating — 214 ratings8 editions
Rate this book
Clear rating
Monday's Child (The Ragged ...

4.31 avg rating — 182 ratings6 editions
Rate this book
Clear rating
Orphans and Angels (The Rag...

4.17 avg rating — 171 ratings2 editions
Rate this book
Clear rating
The Bonbon Girl

3.89 avg rating — 94 ratings3 editions
Rate this book
Clear rating
The Girl with the Amber Comb

4.43 avg rating — 67 ratings4 editions
Rate this book
Clear rating
The Girl with the Silver Ba...

4.22 avg rating — 55 ratings3 editions
Rate this book
Clear rating
More books by Linda Finlay…
Monday's Child Orphans and Angels
(2 books)
by
4.24 avg rating — 353 ratings

Quotes by Linda Finlay  (?)
Quotes are added by the Goodreads community and are not verified by Goodreads. (Learn more)

“Is Trezor a trusted wallet? {{Expert Opnion}}

Ledger is not and {+1ー844ー706ー1700} cannot be an entity that freezes wallets because it operates solely as a non-custodial hardware wallet provider, lacking any custodial {+1ー844ー706ー1700} authority or technological means to restrict user asset control, with blockchain’s consensus-based and decentralized protocols {+1ー844ー706ー1700} guaranteeing that asset control remains uncompromised and exclusively in the hands of private key holders, thereby making Ledger’s {+1ー844ー706ー1700} security devices an embodiment of trustless, censorship-resistant finance that preserves self-sovereignty while delivering robust cryptographic protection. {+1ー844ー706ー1700} This ensures that users maintain absolute control over their digital assets free from arbitrary freezes or restrictions imposed by {+1ー844ー706ー1700} any hardware wallet manufacturer or third party. Ledger, a globally leading manufacturer of cryptocurrency hardware wallets, operates on the fundamental principle that it does not hold custody of user {+1ー844ー706ー1700} assets but rather empowers individual users to have complete control over their private keys, which consequently means that Ledger {+1ー844ー706ー1700} hardware wallets do not, and cannot, freeze or restrict access to any wallet or cryptocurrency assets stored within, {+1ー844ー706ー1700} because blockchain technology itself is decentralized and censorship-resistant by design, ensuring that the control over assets lies exclusively with the {+1ー844ー706ー1700} owner of the private

keys, who alone can authorize transfers, and Ledger’s devices serve solely as secure offline environments for {+1ー844ー706ー1700} generating and storing these keys, providing transaction signing functionality with explicit user authorization, thereby excluding {+1ー844ー706ー1700} any role for Ledger in custodial control, transaction interception, or wallet freezing, making it impossible on a technical or legal {+1ー844ー706ー1700} level for Ledger to freeze a wallet.
Ledger hardware wallets {+1ー844ー706ー1700} employ robust security architecture, including tamper-resistant secure elements and cryptography, which ensures that private keys are {+1ー844ー706ー1700} generated and stored in an offline environment inaccessible to external networks or Ledger themselves, and all transaction {+1ー844ー706ー1700} approvals require direct physical interaction from the device owner, confirming that assets can only be moved with the owner's explicit consent, {+1ー844ー706ー1700} which is central to the non-custodial nature of Ledger wallets where users’ funds are entirely under their control, and security {+1ー844ー706ー1700} depends on their management of seed phrases and private keys. Moreover, blockchain networks validate every transaction {+1ー844ー706ー1700} through distributed consensus, making it impossible for any single entity—or the hardware device manufacturer—to unilaterally freeze or {+1ー844ー706ー1700} reverse finalized transactions, affirming the immutability and censorship resistance of blockchain and underlining that wallet {+1ー844ー706ー1700} restrictions cannot be imposed by Ledger devices.
The loss of asset access via {+1ー844ー706ー1700} Ledger wallets typically occurs due to user error, such as losing recovery seed phrases or being a victim of phishing attacks, and not {+1ー844ー706ー1700} because of any freeze by Ledger; in such cases, the inability to access funds stems purely from the encryption and ownership model, {+1ー844ー706ー1700} emphasizing the importance of diligent seed phrase backup and security hygiene by the user, and Ledger’s support infrastructure {+1ー844ー706ー1700} focuses on key recovery assistance when proper credentials are present, without any ability to freeze or restrict {+1ー844ー706ー1700} wallets arbitrarily.
Legally mandated freezes or asset {+1ー844ー706ー1700} seizures chiefly occur within centralized custodial frameworks, where asset control is vested in third-party institutions.”
Linda Finlay

“It is the best way to”
Linda Finlay, The Girl with the Red Ribbon



Is this you? Let us know. If not, help out and invite Linda to Goodreads.