Professional Documents
Culture Documents
There are many extra steps you can take to increase your security. If
you already have multiple laptops, virtual machines, 3 identities, your
own email servers, a nuclear bunker and a lifetime supply of ramen,
then you won’t need this guide.
Option 1 Built-in security software has come a long way and is a viable
option.
Option 3 We are also big fans of Hitmanpro.alert for people who want
serious real time protection. However this is very taxing on your
computer.
STEP 2 VPN
Another easy step, a VPN helps you do your online work through a
secure tunnel, so hackers can’t have access to your data.
Download, turn on and keep it on. Always use a VPN, it’s inexpensive
and improves your online security.
Option 1 NordVPN is fast and easy to use. Good enough for most
people.
Option 2 You can take your privacy even further and try Mullvad.
There are a few tiers of safety here, there is very little reason to not go
with Tier 1.
For set and forget cold storage we recommend NGRAVE ZERO. The
ZERO is completely offline, from secret key generation to transaction
signing, keeping your holdings away from any online attack vector. They
call it the coldest wallet.
For people actively engaging with DeFi protocols and using their wallet
more regularly we recommend a Trezor or a Ledger. They are both
solid choices for a hardware wallet. They have both been around a long
time so are time tested.
If you want a temporary solution you can create a paper wallet. They
take 10-30 minutes to make and everyone has access to pen and paper.
The downside is that paper is easily lost or damaged. And you really
need to invest in a good fireproof, waterproof safe with GPS, at this
point you may as well buy a hardware wallet. Not to mention trying to
move your funds around becomes difficult and the setup isn’t intuitive,
the smallest mistake you make can cost you dearly.
Desktop wallets are only as safe as the system they are on. Put them on
your high security device and wherever possible use 2FA. They are not
the same as cold storage but better than nothing. Exodus or Metamask.
Most people end up using their cell phones to get SMS two-factor
authentication. They receive a unique text code before accessing their
accounts. If you use this method or were planning on doing so DON’T!
Sim swaps, where hackers port your phone number are extremely
common, not to mention there are multiple other attack vectors here.
I’m going to present two options for acquiring a cold two factor
authentication device.
– Swap that phone to flight mode and never connect it to the internet
again
Level 1 Data
This makes your private keys Level 1 data. Other examples are things
like passwords for master emails that can bypass all other security
with the right information, your password manager
passwords, private keys or recovery phrases.
Storage (Tier 2)
-Use paper storage and keep that paper in a fireproof and waterproof
safe with GPS.
Stop what you’re doing right now, check your system. If you have any
level 1 data, on your computer move it now and ideally change it after
moving it!
Level 2 Data
Any data which on it’s own can not grant the hacker access to any of
your funds or important data is considered level 2. This means If a
hacker were to gain access to a level 2 password they would still be
unable to actually access anything vulnerable.
STEP 7 EMAILS
Old emails with lacklustre passwords are a common point of entry for
hackers. If you’ve had it for a while and used it for multiple websites,
chances are you want to get rid of it.
Master Emails
These are to be made using ProtonMail. These are for your exchanges,
bank accounts, investment platforms and any other platform that are
sensitive. These are also used to back up your secondary emails.
Secondary Emails
You can use other emails at your convenience for less sensitive
accounts.
STEP 8 EXCHANGES
When our funds are on exchanges we take on countless risks, as
traders/investors we must manage this like any other.
There is no 3rd party you should trust with your crypto. Exchange tips;