I recently heard many reports of people entering the world of cryptocurrencies and falling straight into theft cases, falling into ponzi schemes or losing their private keys in some way, I also remember that I had some issues related to this when I entered, so intending to To help you avoid the same problems, I am writing this article to help you with your digital security, some important tips before turning part of your assets into cryptocurrencies.
If you still use the traditional banking system, you know that you should take some precautions when logging in to internet banking or entering your details on the internet and in case of any problem you can go to an institution responsible for providing you with help. This does not happen with cryptocurrencies, you and only you are responsible for keeping your funds safe.
Importantly, I will not go into computational details in this article, such as which antivirus or firewall enable, but give you the direction of what steps you should take to avoid injury.
It is important that you have a notebook to write down all your access, private keys, logins, passwords and brokerages. The best thing to do is to keep this data annotated on devices that do not have internet access, as it is susceptible to attacks, as it may seem paranoid, you better think that there is always the possibility that someone is watching and keeping your data safely, all your activity can be monitored and used against you by hackers.
If you are afraid that someone might find your notes it may be a viable alternative to take the time to create a language that only you understand to keep your data even safer and if you lose those notes you can keep a copy somewhere as a safe that only you have access to.
It is recommended that you keep your operating system (whether Linux, Apple, Microsoft, Ubuntu, Mac or any other) always up to date with antivirus and firewall enabled, thus avoiding any viruses, malware or Trojan.
3. Get a unique email for cryptocurrency
To move your cryptocurrencies create a secure email that does not contain your names or personal data and especially: Do not use an email that many people know about or share with anyone.
There is a server called ProtonMail, it is focused on security and privacy through encryption, perfect for the purpose we are working on in this article.
4. Use all authentication processes
The authentication process is the act of identifying whether a user is authentic, ie, it is the guarantee that it is really the right person who is trying to access information. Nowadays all sites that deal with sensitive data use this type and authentication to prevent your users from losing their accounts.
Therefore, it is recommended that the user use all authentication processes available in their Bitcoin transactions, as this will ensure greater access control, providing maximum security for the user.
Never use numbers or letters in sequence and never, never even use the word password. Create unique passwords that do not include any personal information, such as your name or date of birth. If you are specifically targeted for a password hijacking, the hacker will try everything he knows about you in attempts to guess your password. The best passwords are resistant to brute force and dictionary attacks, but you can also make them easy to remember.
You can create a series of random words, names, historical figures, words in another language, locations, and special characters to form a solid password. If your grandfather's name is Franklin, for example, it would be very easy for the hacker to figure this out and use it, but if you combine this with all the previous items you could have something like:
Although you have used your grandfather's name, making it an easy attenuator to remember, it still has a complexity based on the other random characters. There are also some automatic password generators that can be easily found on the internet, but it is not recommended to use them since in item 1 of this list I recommended that when browsing, always keep in mind that someone may be viewing your computer screen. .
Here are some types of attacks you may suffer:
Brute force attack
This attack tries to guess each combination until it reaches yours. The attacker automates the software to try as many combinations as possible in the shortest possible time. Some brute force attacks use filters and masks to reduce the possible attack space, which helps them reach their unique password even faster. Anything less than 9-12 characters is vulnerable to intrusion. What we found with brute force attacks is that password length is very important. The bigger the better.
While the brute force attack experiences all combinations of symbols, numbers, and letters, a dictionary attack attempts an organized list of words, as in a dictionary. If your password is a common word, the only way to escape a dictionary attack would be if your word was very unusual or if you use multiple words together.
A phishing email may (falsely) tell you something is wrong with your exchange account. It will instruct you to click on a link that will take you to a fake site, much like your exchange. Scammers just wait for the plan to work and for you to enter your password. As soon as you enter, the password and its cryptocurrencies will be theirs.
6. virtual keyboard
Keylogger is a program designed to record everything a person types on a particular keyboard on a computer. It is a spyware program and is almost always used to capture passwords, bank details, credit card information and other types of personal data. Phishing attacks often use keyloggers, which are improperly installed on victims' computers, to gain access to personal data for fraudulent purposes.
To avoid being a victim of this type of attack, use the virtual keyboard to enter your passwords or download the Key Scrambler program which is software that encrypts everything you type on the internet to make it impossible for the keylogger to access your data.
7. check transfer address
When you paste your wallet address into a website, there is malware that can change your wallet to a hacker's one, so always when making this type of transaction check the first and last numbers to make sure you are not diverting your funds to The hacker's wallet.
A VPN allows remote access to resources on a local area network, even if you are not physically connected on that network. It also serves to provide protection while exchanging information over the internet on public networks. When you connect to a VPN, you usually run a client on your computer or click a special link on a site, log in with their credentials, and each machine at each end verifies the authenticity of the other. When confirmation occurs, your internet communication is encrypted and protected from interception. This is the main detail of a VPN: the security it provides for your internet browsing, preventing your data from being visible to unauthorized persons.
You can educate yourself about the TOR system, which is the best way to remain anonymous today. I will not go into detail about it here as it would make the article even longer.
It is extremely important that you have a sense of how to protect yourself in the virtual world. In addition to these tips in this article it is important that you know which portfolios to choose for storing your funds and how to do this, identify ponzi schemes (never believe them when they tell you that company promises fixed profits), where to buy and sell your cryptocurrencies, and some details like not being able to talk about the amount of cryptocurrencies you have on forums or social networks, as this may attract the attention of hackers.
Thank you for reading, study hard and succeed in your learning.