Security in Crypto, Hardware Wallets and Pseudonymity - Part 4/7
Part 4 discusses Software Wallets and how they are made vulnerable by poor device security and the user’s habits. We discuss how to harden devices using antivirus, anti-malware, VPN and Ad-Block; and the inevitable need to use Hardware Wallets to pro...
cryptosecurity.hashnode.dev6 min read