Tag: Safety & Security

Advanced: Creating a Secure Wallet by Tomshwom

Preface This is the updated version of the original post on Steemit here . By /u/AtLeastSignificant . Purpose In this guide, we are going…

Read More

How to Help Defeat the Phishers

These phishers will not stop until they stop getting money or get caught. We don't have the time or manpower to do it all. There are so…

Read More

Couldn't Everybody Type in Random Private Keys and Steal Funds?

Short Version Yes, but finding an account with a balance would take eons ... so ... no. Long Version Ethereum is based on Public Key…

Read More

Encrypting Your Windows PC with BitLocker

You must have Windows 10 Pro or Windows 10 Enterprise to access BitLocker. Back it Up! Before encrypting your machine, make a backup to an…

Read More

Ensuring MyCrypto Doesn't Give Different People the Same Private Key

"How does Ethereum ensure that two people aren't given the same key?" https://ethereum.stackexchange.com/questions/4299/account-uniqueness…

Read More

Hardware Wallet Recommendations

One of the safest and easiest ways to store your ETH, tokens, ETC, BTC, and many other coins is via a Ledger Nano S or Trezor . Both are…

Read More

How Can We Trust MyCrypto?

The quickest answer is: Luckily, you don't have to trust us! You can run us offline . You can use a hardware wallet . These both ensure that…

Read More

Securely Store & Guard Your Private Key by Drewshaver

Source: /u/drewshaver Preface This guide assumes that you just received a Trezor and Cryptosteel in the mail. Which hardware wallet you…

Read More

How to Stay Safe During ICOs and Other Periods

Domain verification The problem There are many website clones of ICOs with fake contribution addresses. Sometimes they use character…

Read More

How to Avoid Getting Scammed and Phished

Below are some tips to reduce the risk of losing your hard-earned coins Install either EtherAddressLookup or MetaMask if you use…

Read More

What to Do If Your Funds Are Stolen

Victim of a phishing attack? We are sorry this happened Unfortunately, we encounter these phishing scams / attacks on a daily basis. The…

Read More

Protecting Yourself and Your Funds

(Source: @Jennicide ) 1. Get yourself a hardware wallet. One of the safest and easiest ways to store your ETH, Tokens, ETC, BTC, and many…

Read More

Can I Turn on 2FA for MyCrypto?

No. And if you landed on a site telling you that you could, they are lying to you and trying to steal your private keys. 2FA / MFA is…

Read More

Verifying the Authenticity of the Desktop Application

After downloading the desktop application, it's highly recommended to verify the checksum of the application. This ensures that you are…

Read More

Why You Should Backup Your Hardware Wallet

Preface The following assumes you are using a Ledger Nano S or Trezor hardware wallet. Due to their ease of use and security, we recommend…

Read More

Ethereum Account Generation & How MyCrypto Gets Entropy

This is part of a series where Taylor pull's sweet comments she's made or found over the years in the hopes that they can be useful…

Read More

How Do (Encrypted) Mnemonic Phrases Work?

A mnemonic phrase or mnemonic seed is a set of typically either 12 or 24 words, which can be used to derive an infinite number of…

Read More

On Keypairs & Encryption

The Ledger (and other hardware wallets) are essentially USB sticks but with really really really really really really hardcore software…

Read More

Getting Through the Shit Times

Sometimes, crypto really, really, really sucks Believe it or not, most of us have been there. Whether you lose your private key, get phish'd…

Read More

How to Restore Access to Your Accounts if You Lose or Destroy Your Device with Google Authenticator (2FA)

This is part of a series where Taylor pulls sweet comments she's made in the hope that they can be useful, searchable, remembered…

Read More

Learn More About MyCrypto and How to Get Started

Please take some time to understand this for your own security. Your may run the risk of losing your funds if you do not fully understand…

Read More

Overview of Common Scams

This document set is intended to be a compendium of types of scams that can be found in Ethereum and in the wider cryptocurrency ecosystem…

Read More

Hardware Wallet Scams and Hacks

General Tips for Securing Hardware Wallets Update the firmware of your device. Don't leave your device plugged in. Make sure your device is…

Read More

Malicious Software

Malicious software is anything that changes the functionality of your computer for the purpose of making someone else profit in some way…

Read More

Phishing Scams and Hacks

Phishing is scamming via impersonating individuals, organizations, operations, websites, etc. Phishing is also the most common type of scam…

Read More

Privacy Concerns

Posting Your Public Keys on Social Media Why is this a problem? You should never do this, especially if you have a large amount of crypto…

Read More

How To Verify Your Recovery Phrase

When you first set up your Ledger device, you are asked to write down your recovery phrase. You can use this recovery phrase to get access…

Read More