MetaversityOnecryptosecurity.hashnode.dev·Mar 3, 2022Security in Crypto, Hardware Wallets and Pseudonymity - Part 5/7In Part 5 we delve deeper into user habits affecting security using a jail-breaking example. We then define what Hardware wallets are. Jail-breaking devices/software can be dangerous: A person using a jail-breaking technique could risk having keylogg...1 like·54 readsSecurity in Crypto, Hardware Wallets and PseudonymityCryptocurrencyAdd a thoughtful commentNo comments yetBe the first to start the conversation.