Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
security [2020/02/09 15:55] – boot2thrill | security [2022/12/21 17:21] (current) – lolitalollipop | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | {{ :security.png |}} | + | {{ :security.jpg? |
It is very important that you **secure your funds and take every single measure possible to ensure the safety of your currency**. This guide will go through some of the basic security measures every user should take. | It is very important that you **secure your funds and take every single measure possible to ensure the safety of your currency**. This guide will go through some of the basic security measures every user should take. | ||
- | As Conceal is a cryptocurrency, | + | As Conceal is a cryptocurrency, |
- | When creating a new Conceal wallet, you will be provided with a **recovery phrase**. This phrase allows you to recover the wallet if you lose access to it for any reason. Ideally this **recovery phrase** should be **written down on paper and stored in a safe place**. Another, less secure, alternative | + | ===Safely store your private key and never share your private key=== |
+ | When creating a new Conceal wallet, you will be provided with a **private key**. A private key is the single most important method | ||
- | Keeping your investments secure | + | Ideally this **private key** should be **written down on paper and stored in a safe place**. To make it more secure |
- | ===Never share your keys=== | + | Another, less secure, alternative is to **copy the private key to the clipboard and store it electronically**. Be aware that some types of malware may have access to the clipboard which could lead to the private key being compromised. |
- | Never, under any circumstances, should you ever share your Conceal wallet or private keys with any person or software that you do not intend to take control of all of your assets. | + | |
+ | If stored on the same device as the wallet itself, the private key backup would be useless in the case of ransomware or hardware failure, which caused access to the wallet to be lost in the first place. So, **if an electronic copy is being used, storing the file on a USB drive would be a better approach**. | ||
+ | |||
+ | Never, under any circumstance, | ||
+ | |||
+ | ===Safely store your recovery phrase and never share your recovery phrase=== | ||
+ | When creating a new Conceal wallet, you will also be provided with a **recovery phrase**. This phrase allows you to recover the wallet if you lose access to it for any reason. Ideally this **recovery phrase** should be **written down on paper and stored in a safe place**. To make it more secure you can laminate it and store it in a vault. | ||
+ | |||
+ | Another, less secure, alternative is to **copy the recovery phrase to the clipboard and store it electronically**. Be aware that some types of malware may have access to the clipboard which could lead to the seed being compromised. | ||
+ | |||
+ | If stored on the same device as the wallet itself, the seed backup would be useless in the case of ransomware or hardware failure, which caused access to the wallet to be lost in the first place. So, **if an electronic copy is being used, storing the file on a USB drive would be a better approach**. | ||
+ | |||
+ | Never, under any circumstance, should you ever share your Conceal wallet or recovery phrase | ||
===Never reuse passwords and logins=== | ===Never reuse passwords and logins=== | ||
Line 17: | Line 30: | ||
===Use long, secure passwords=== | ===Use long, secure passwords=== | ||
It might be a bit of a hassle to dig it up every time you want to login to trade or check your balances, but that process is much more seamless if you take advantage of secure, password managers that help you generate and remember every login/ | It might be a bit of a hassle to dig it up every time you want to login to trade or check your balances, but that process is much more seamless if you take advantage of secure, password managers that help you generate and remember every login/ | ||
+ | |||
+ | ===Exchanges=== | ||
+ | By far, the riskiest method to store your cryptocurrency is on exchanges. The cryptocurrency golden rule is **NOT YOUR KEYS, NOT YOUR FUNDS**. Storing your crypto on exchanges keeps control of your funds in the hands of a third party. The exchange is holding your crypto in their wallets. They control the private keys, they control the recovery phrases. There are many examples of exchanges being hacked and clients losing their crypto. | ||
+ | |||
+ | Short-term storing of your crypto on exchanges for trading purposes is understandable. However, long-term storing of your crypto on exchanges should never be considered a secure option. Remember, **NOT YOUR KEYS, NOT YOUR FUNDS**. | ||
===Enable two-factor authentication (2FA)=== | ===Enable two-factor authentication (2FA)=== |