You are ahead of 99.8% of all Crypto users by following these steps

Share:

Wallets

The most secure way to access your cryptocurrencies will always be a hardware wallet. It should be a common practice to have control over your own private keys and not leaving funds on an exchange. — The most used and trusted hardware wallets are:

Ledger (for all cryptocurrencies)

Trezor (for all cryptocurrencies)

BitBox02 (for Bitcoin only)

Coldcard (for Bitcoin only)

Seed Backup

The 24 words that are the password to your funds should always be backed up somewhere. Don’t rely on hardware completely it can and will fail at some point. Make sure to keep the backup completely offline. — The most common seed backup methods are:

A simple piece of paper (Don’t print, use a pencil)

A metal plate (It’s the safer method since it’s resistent to fire, water and earthquakes. Engrave the words yourself manually.)

Data Leaks

Database breaches will always happen and it’s not even your fault. The best you can do is protect yourself against it by using the most secure tools on all ends.

2FA, avoid using your phone number, use Authenticator apps instead. Sim swap attacks more common than you think. — There are countless authenticator apps out there: Google Authenticator, Microsoft Authenticator, OTP Auth etc.

Mobile Provider, you can request to set up additional security steps to prevent sim swaps. You shouldn’t rely on it, social engineering can still exploit the extra steps.

Password Manager, unique and strong passwords for all accounts are essential. — The safest and recommended providers are: Bitwarden, KeePass and LessPass

Request Data Deletion, request the deletion of your data from crypto companies. Especially from the hardware wallet companies. Leaks of personal information, addresses and phone numbers happened in the past before.

submitted by /u/sikeig
[link] [comments]

;