cryptosecurity.hashnode.devSecurity in Crypto, Hardware Wallets and Pseudonymity - Part 7/7In Part 7 we will discuss the steps on how to properly setup and use a new hardware wallet. Receiving the hardware wallet shipment & initial sanity check When you receive the package, inspect it for any signs of tampering. The plastic wrap should be ...Mar 5, 2022·8 min read
cryptosecurity.hashnode.devSecurity in Crypto, Hardware Wallets and Pseudonymity - Part 6/7In Part 6 we will contrast and compare Ledger Nano X and Trezor Model T, and look at the security vulnerabilities that have been exploited in them in the past. The most popular top-of-the-line hardware wallets are Ledger Nano X and Trezor Model T [1]...Mar 4, 2022·7 min read
cryptosecurity.hashnode.devSecurity in Crypto, Hardware Wallets and Pseudonymity - Part 5/7In Part 5 we delve deeper into user habits affecting security using a jail-breaking example. We then define what Hardware wallets are. Jail-breaking devices/software can be dangerous: A person using a jail-breaking technique could risk having keylogg...Mar 3, 2022·6 min read
cryptosecurity.hashnode.devSecurity in Crypto, Hardware Wallets and Pseudonymity - Part 4/7Part 4 discusses Software Wallets and how they are made vulnerable by poor device security and the user’s habits. We discuss how to harden devices using antivirus, anti-malware, VPN and Ad-Block; and the inevitable need to use Hardware Wallets to pro...Mar 2, 2022·6 min read
cryptosecurity.hashnode.devSecurity in Crypto, Hardware Wallets and Pseudonymity - Part 2/7**Part 2 discusses Asymmetric encryption, its application to Bitcoin (and cryptocurrencies in general), Public Keys, Private Keys (spending password), seed phrase, and securing your seed phrase without digitizing it. ** Asymmetric Encryption: Before ...Feb 27, 2022·5 min read