Conceal Wiki

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Last revisionBoth sides next revision
security [2020/02/10 18:57] boot2thrillsecurity [2020/02/10 19:15] boot2thrill
Line 6: Line 6:
  
 ===Safely store your private key and never share your private key=== ===Safely store your private key and never share your private key===
-When creating a new Conceal wallet, you will be provided with a **private key**. A private key allows access to your wallet and is the single most important  . Without your private key, you cannot access your crypto. Never, under any circumstances, should you ever share your Conceal wallet or private keys with any person or software that you do not intend to take control of all of your assets.+When creating a new Conceal wallet, you will be provided with a **private key**. A private key is the single most important method to access your wallet. Without your private key, you cannot access your crypto. Never keep your private key online, or as an email, or in the cloud. These methods are most susceptible to being hacked.  
 + 
 +Ideally this **private key** should be **written down on paper and stored in a safe place**. To make it more secure you can laminate it and store it in a vault. 
 + 
 +Another, less secure, alternative is to **copy the private key to the clipboard and store it electronically**. Be aware that some types of malware may have access to the clipboard which could lead to the private key being compromised.  
 + 
 +If stored on the same device as the wallet itself, the private key backup would be useless in the case of ransomware or hardware failure, which caused access to the wallet to be lost in the first place. So, **if an electronic copy is being used, storing the file on a USB drive would be a better approach**.  
 + 
 +Never, under any circumstance, should you ever share your Conceal wallet or private key with any person or software that you do not intend to take control of all of your assets.
  
 ===Safely store your recovery phrase and never share your recovery phrase=== ===Safely store your recovery phrase and never share your recovery phrase===
-When creating a new Conceal wallet, you will also be provided with a **recovery phrase**. This phrase allows you to recover the wallet if you lose access to it for any reason. Ideally this **recovery phrase** should be **written down on paper and stored in a safe place**. +When creating a new Conceal wallet, you will also be provided with a **recovery phrase**. This phrase allows you to recover the wallet if you lose access to it for any reason. Ideally this **recovery phrase** should be **written down on paper and stored in a safe place**. To make it more secure you can laminate it and store it in a vault.
  
 Another, less secure, alternative is to **copy the recovery phrase to the clipboard and store it electronically**. Be aware that some types of malware may have access to the clipboard which could lead to the seed being compromised.  Another, less secure, alternative is to **copy the recovery phrase to the clipboard and store it electronically**. Be aware that some types of malware may have access to the clipboard which could lead to the seed being compromised. 
  
 If stored on the same device as the wallet itself, the seed backup would be useless in the case of ransomware or hardware failure, which caused access to the wallet to be lost in the first place. So, **if an electronic copy is being used, storing the file on a USB drive would be a better approach**.  If stored on the same device as the wallet itself, the seed backup would be useless in the case of ransomware or hardware failure, which caused access to the wallet to be lost in the first place. So, **if an electronic copy is being used, storing the file on a USB drive would be a better approach**. 
 +
 +Never, under any circumstance, should you ever share your Conceal wallet or recovery phrase with any person or software that you do not intend to take control of all of your assets.
  
 ===Never reuse passwords and logins=== ===Never reuse passwords and logins===
Line 24: Line 34:
 By far, the riskiest method to store your cryptocurrency is on exchanges. The cryptocurrency golden rule is **NOT YOUR KEYS, NOT YOUR FUNDS**. Storing your crypto on exchanges keeps control of your funds in the hands of a third party. The exchange is holding your crypto in their wallets. They control the private keys, they control the recovery phrases. There are many examples of exchanges being hacked and clients losing their crypto.  By far, the riskiest method to store your cryptocurrency is on exchanges. The cryptocurrency golden rule is **NOT YOUR KEYS, NOT YOUR FUNDS**. Storing your crypto on exchanges keeps control of your funds in the hands of a third party. The exchange is holding your crypto in their wallets. They control the private keys, they control the recovery phrases. There are many examples of exchanges being hacked and clients losing their crypto. 
  
-Short-term storing of your crypto on exchanges for trading purposes is understandable. However, long-term storing of your crypto on exchanges should never be considered a secure option. Remember, **NOT YOUR KEYS, NOT YOUR FUNDS** +Short-term storing of your crypto on exchanges for trading purposes is understandable. However, long-term storing of your crypto on exchanges should never be considered a secure option. Remember, **NOT YOUR KEYS, NOT YOUR FUNDS**.
  
 ===Enable two-factor authentication (2FA)=== ===Enable two-factor authentication (2FA)===