MetaversityOnecryptosecurity.hashnode.dev·Mar 2, 2022Security in Crypto, Hardware Wallets and Pseudonymity - Part 4/7Part 4 discusses Software Wallets and how they are made vulnerable by poor device security and the user’s habits. We discuss how to harden devices using antivirus, anti-malware, VPN and Ad-Block; and the inevitable need to use Hardware Wallets to pro...1 like·67 readsSecurity in Crypto, Hardware Wallets and PseudonymityCryptocurrencyAdd a thoughtful commentNo comments yetBe the first to start the conversation.