Good day, Bitcointalkers,Too often I see bounty hunters request to change their Ethereum address even before the start of a campaign, then I began to wonder what the problems are, or is it just a lack of knowledge on how to secure their wallet? Cryptocurrency is still in its infancy and I do think lots of education still need to be done as cryptocurrency gradually moves to the mainstream.
As a crypto enthusiast, you are responsible for the security of your fund and you need to secure it as much as you can. Here I want to educate you on how well to secure your wallets private key. If your wallet is not properly secured you stand a chance to lose your funds, hackers are everywhere looking for careless individuals.
Method One: Never Submit you Private Key In Any Form.This is most common among newbie in airdrops falling for fake airdrop forms. I had a situation where an airdrop google form requested me to input my private key, I immediately knew they were fake, I looked for an escape route.
Method Two: Never Store Yor Private Key On Google Drive/Email.As the name implies private, anything online isn't private. I have been tempted to store my private key in my email draft thinking its secured, but then as someone who understands the value of a private key and the damage it could cause, I didn't give that a second thought. However, if you must store your private key online you can choose to divide the private keys into parts and store in different storage space online.
like save a part in Dropbox, save another part in Google drive, save a part in your Email, just like that . . .
Method Three: Write Down Your Private Keys:As someone who loves to think on paper, my private keys are written down on paper and stored in a location accessible by me alone. You can also adopt this by writing down your private keys eligibly into different Notes and store it safely. probably hand one over to your granny and the other to you mum or so.
Method Four: Always Bookmark Wallet Vendors:A lot of phishing site for ICOs and wallet providers are moving around on daily basis and for you to stay safer bookmark your wallet provider so you wouldn't have to google their website when you are trying to login to your wallet to participate in an ICO. A lot of phishing sites fly around during the public sale of any huge project.
Method Five: You Don't Need to Login to your wallet every time to check if you received a coin from airdrop or bounty.This is mostly the reason people log in to their wallet frequently to check if they have received a coin from an airdrop or bounty. There are some third-party explorers that enable you to check coins/Token you received in your wallet, without you needing to log in to your wallet all the time. example of such explorer is etherscan.io ethexplore.io. I personally prefer to use etherscan.io
Method Six: Use Metamask if you can:Metamask is the most secured ethereum wallet/plugin. Always use metamask, it protects you from phishing websites and blocks unauthorized access.
Method Seven: Use Cold WalletCold wallet are a bit expensive, as your crypto assets grow the need to keep your fund well secure offline becomes necessary. A cold wallet which is also known as a hardware wallet is an offline wallet that is not connected to the internet. it is like a flash drive that you can store your crypto assets on. Popular examples are Ledger Nano and Trezor Wallet
Method Eight: Method number eight :
I would like to suggest if this fits.
Do not leave your computer without deleting history, cookies, and the browsing data.
Better use a private window or incognitno mode window tab if opening a third wallet party.
-
Thanks to @Jetcash, i learn this very important information as a local user.
Yes, I added this as I found myself using one browser for my everyday task and another when I want to sign in to my wallet or any crypto sensitive website. I also, use incognito mode when I access a third party website I don't trust.
Method Nine: Add your own.Do you find this helpful? Upvote
Update 1 - 24th June : Method 8