WalletsThe most secure way to access your cryptocurrencies will always be a hardware wallet. It should be a common practice to have control over your own private keys and not leaving funds on an exchange. — The most used and trusted hardware wallets are:Ledger (for all cryptocurrencies)Trezor (for all cryptocurrencies)BitBox02 (for Bitcoin only)Coldcard (for Bitcoin only)Seed BackupThe 24 words that are the password to your funds should always be backed up somewhere. Don’t rely on hardware completely it can and will fail at some point. Make sure to keep the backup completely offline. — The most common seed backup methods are:A simple piece of paper (Don’t print, use a pencil)A metal plate (It’s the safer method since it’s resistent to fire, water and earthquakes. Engrave the words yourself manually.)Data LeaksDatabase breaches will always happen and it’s not even your fault. The best you can do is protect yourself against it by using the most secure tools on all ends.2FA, avoid using your phone number, use Authenticator apps instead. Sim swap attacks are more common than you think. — There are countless authenticator apps out there: Google Authenticator, Microsoft Authenticator, OTP Auth etc.Mobile Provider, you can request to set up additional security steps to prevent sim swaps. You shouldn’t rely on it, social engineering can still exploit the extra steps.Password Manager, unique and strong passwords for all accounts are essential. — The safest and recommended providers are: Bitwarden, KeePass and LessPassRequest Data Deletion, request the deletion of your data from crypto companies. Especially from the hardware wallet companies. Leaks of personal information, addresses and phone numbers happened in the past before.
Submitted August 26, 2021 at 01:10AM
No comments:
Post a Comment