MetaversityOnecryptosecurity.hashnode.dev·Jul 23, 2022Crypto Security Best Practices ChecklistThis series of articles will help you operationalize all the ideas and suggestions from the 7 part crypto security series. Occasionally some new ideas are also incorporated and scored. N.B.: This can never be considered a complete list, since new th...Discuss·1 like·534 readsCryptocurrency
MetaversityOnecryptosecurity.hashnode.dev·Mar 5, 2022Security in Crypto, Hardware Wallets and Pseudonymity - Part 7/7In Part 7 we will discuss the steps on how to properly setup and use a new hardware wallet. Receiving the hardware wallet shipment & initial sanity check When you receive the package, inspect it for any signs of tampering. The plastic wrap should be ...Discuss·1 like·128 readsSecurity in Crypto, Hardware Wallets and PseudonymityCryptocurrency
MetaversityOnecryptosecurity.hashnode.dev·Mar 4, 2022Security in Crypto, Hardware Wallets and Pseudonymity - Part 6/7In Part 6 we will contrast and compare Ledger Nano X and Trezor Model T, and look at the security vulnerabilities that have been exploited in them in the past. The most popular top-of-the-line hardware wallets are Ledger Nano X and Trezor Model T [1]...Discuss·1 like·108 readsSecurity in Crypto, Hardware Wallets and PseudonymityCryptocurrency