The Wolf Den
Searchโ€ฆ
๐Ÿ›ก
SAFETY & SECURITY
This is helpful information for both the novice and the seasoned crypto investor. There are many ways your security can be compromised if you do not take precautions. Yet, even with the best safety and security measures in place along with best practices, there is always the possibility that a determined hacker can somehow get your information, or your bad attitude and lack of understanding will cause you to make mistakes.
The steps below are the best way to protect yourself and your crypto assets from nefarious bad actors. DO NOT HESITATE to implement these things, they are important to keep you safe!

Key Takeaways

    • MAC/APPLE USERS NEED TO DO THIS TOO
    • NEVER SHARE YOUR PRIVATE KEYS OR SEED PHRASES WITH ANYONE, AND DO NOT STORE THEM ON YOUR COMPUTER OR PHONE, EVEN AS IMAGES
  • NOT YOUR KEYS, NOT YOUR CRYPTO
    • If your crypto is sitting on an exchange you technically do not own it
    • Hardware wallets can be used to actually retain custody of (own) your crypto
  • MAKE COPIES OF YOUR SEED PHRASES AND PRIVATE KEYS ON PAPER, STORE THEM IN TWO OR THREE DIFFERENT PLACES
  • โ€‹COLD WALLETS / HARDWARE WALLETS can be used for added security or for holding long-term assets you do not plan on trading or selling for a while.
  • ALWAYS DOUBLE-CHECK THE LAST 4 DIGITS OF ADDRESSES TO SEND OR RECEIVE CRYPTOโ€‹
  • CON ARTISTS ABOUND IN CRYPTO, IF YOU FIND YOURSELF RUSHING AND ACTING ON EMOTIONS
    • STOP, TAKE A BREATHER, REEXAMINE THE REASON AND LOGIC BEHIND WHAT YOU ARE DOING
  • NEVER TRY TO SELL RANDOM TOKENS/COINS YOU DID NOT BUY THAT SHOW UP IN YOUR WALLETS. SCAMMERS CAN USE THESE TO DRAIN YOUR OTHER FUNDS
  • USE 2FA (2 FACTOR AUTHENTICATION) FOR ACCESS TO YOUR EXCHANGES
  • PERFECT SECURITY IS IMPOSSIBLE, BUT MAKING YOURSELF A HARD TARGET TO HIT IS EASY TO DO
  • PREPARE FOR THE POSSIBILITY OF A COMPROMISED WALLET.
    • Setup a new wallet with all of the networks you use added to it
    • You would preferably set it up on a different device then the one you primarily you use in case the compromise is due to a hack and not a scam token or contract
Copy link