Lokesh Jhalokeshjha.hashnode.dev·May 24, 2024Understanding the Decentralized Digital Ledger in the Web3 WorldIn the rapidly evolving landscape of Web3, one term that frequently comes up is "decentralized digital ledger." This fundamental concept underpins many of the innovations driving the new wave of internet technologies. But what exactly is a decentrali...lokeshjha
MetaversityOnecryptosecurity.hashnode.dev·Jul 23, 2022Crypto Security Best Practices ChecklistThis series of articles will help you operationalize all the ideas and suggestions from the 7 part crypto security series. Occasionally some new ideas are also incorporated and scored. N.B.: This can never be considered a complete list, since new th...1 like·586 readsCryptocurrency
MetaversityOnecryptosecurity.hashnode.dev·Mar 5, 2022Security in Crypto, Hardware Wallets and Pseudonymity - Part 7/7In Part 7 we will discuss the steps on how to properly setup and use a new hardware wallet. Receiving the hardware wallet shipment & initial sanity check When you receive the package, inspect it for any signs of tampering. The plastic wrap should be ...1 like·82 readsSecurity in Crypto, Hardware Wallets and PseudonymityCryptocurrency
MetaversityOnecryptosecurity.hashnode.dev·Mar 4, 2022Security in Crypto, Hardware Wallets and Pseudonymity - Part 6/7In Part 6 we will contrast and compare Ledger Nano X and Trezor Model T, and look at the security vulnerabilities that have been exploited in them in the past. The most popular top-of-the-line hardware wallets are Ledger Nano X and Trezor Model T [1]...1 like·61 readsSecurity in Crypto, Hardware Wallets and PseudonymityCryptocurrency