MetaversityOnecryptosecurity.hashnode.dev·Feb 26, 2022Security in Crypto, Hardware Wallets and Pseudonymity - Part 1/7**Part 1 discusses a series of introductory topics such as passwords, 2 Factor Authentication (2-FA) methods, their comparison and best practices. ** The first rule of crypto is: since cryptocurrencies and NFTs are digital assets, and they can be sto...Discuss·3 likes·178 readsSecurity in Crypto, Hardware Wallets and Pseudonymitycrypto