SAFETY & SECURITY
This is helpful information for both the novice and the seasoned crypto investor. There are many ways your security can be compromised if you do not take precautions. Yet, even with the best safety and security measures in place along with best practices, there is always the possibility that a determined hacker can somehow get your information, or your bad attitude and lack of understanding will cause you to make mistakes.
The steps below are the best way to protect yourself and your crypto assets from nefarious bad actors. DO NOT HESITATE to implement these things, they are important to keep you safe!
Key Takeaways
USE A QUALITY ANTI-VIRUS SOFTWARE
MAC/APPLE USERS NEED TO DO THIS TOO
DON'T GIVE PEOPLE EASY ACCESS TO YOUR ACCOUNTS
NEVER SHARE YOUR PRIVATE KEYS OR SEED PHRASES WITH ANYONE, AND DO NOT STORE THEM ON YOUR COMPUTER OR PHONE, EVEN AS IMAGES
NOT YOUR KEYS, NOT YOUR CRYPTO
If your crypto is sitting on an exchange you technically do not own it
Hardware wallets can be used to actually retain custody of (own) your crypto
MAKE COPIES OF YOUR SEED PHRASES AND PRIVATE KEYS ON PAPER, STORE THEM IN TWO OR THREE DIFFERENT PLACES
COLD WALLETS / HARDWARE WALLETS can be used for added security or for holding long-term assets you do not plan on trading or selling for a while.
ALWAYS DOUBLE-CHECK THE LAST 4 DIGITS OF ADDRESSES TO SEND OR RECEIVE CRYPTO
CON ARTISTS ABOUND IN CRYPTO, IF YOU FIND YOURSELF RUSHING AND ACTING ON EMOTIONS
STOP, TAKE A BREATHER, REEXAMINE THE REASON AND LOGIC BEHIND WHAT YOU ARE DOING
NEVER TRY TO SELL RANDOM TOKENS/COINS YOU DID NOT BUY THAT SHOW UP IN YOUR WALLETS. SCAMMERS CAN USE THESE TO DRAIN YOUR OTHER FUNDS
MORE OF THIS IS COVERED IN COMMON SCAMS
USE 2FA (2 FACTOR AUTHENTICATION) FOR ACCESS TO YOUR EXCHANGES
PERFECT SECURITY IS IMPOSSIBLE, BUT MAKING YOURSELF A HARD TARGET TO HIT IS EASY TO DO
PREPARE FOR THE POSSIBILITY OF A COMPROMISED WALLET.
Setup a new wallet with all of the networks you use added to it
You would preferably set it up on a different device then the one you primarily you use in case the compromise is due to a hack and not a scam token or contract
Last updated
Was this helpful?