The easiest way to protect yourself would be using web applications that are coded securely. Now I'm not sure if btct.co uses an anti csrf token (I don't think it does?), but their PIN / 2 FA system makes this attack less useful (an attacker can just use JS to submit ~100 most common PINs)
Close, but not entirely correct. Lockout gets triggered after ~5 bad PIN attempts.
Any btct.co users reading this, turn on 2FA if you can. The PINs help but are really only placeholders for the 2FA form fields in the interfaces.
Websites are not safe for this application. Learn GPG. That is all.
I detect many suppressed lels in this statement.
GPG used incorrectly (key on your pc) is about as useful as the PINs. It's better than nothing but a virus can grab your key easy as it can log your PIN. Using GPG correctly via 2nd non-networked PC and sneakernet storage device is a PITA compared to gAuth or Yubikey.