Category: 4. Security best practice

  • SMS Hijacking

    Having just encouraged the use of 2FA as standard for custodial services, we now have to warn that choosing SMS as the 2FA can create a serious vulnerability via SMS hijacking. If attackers know your mobile number and provider, and have harvested personal information from OSINT, they can impersonate you with your Mobile Service Provider…

  • Brute Force Attack

    It’s one of the oldest and most obvious techniques for trying to steal someone’s password, running a software that churns through password options. This can be used in conjunction with information known about the user from OSINT – Open Source Intelligence. The best way to mitigate this kind of threat is to use two-factor authentication…

  • Loss of data/access details

    If you decide to let an exchange or mobile wallet custody your crypto, the most obvious point of failure is forgetting the details that enable you to access that service. In the first instance this means your Username and Password, which you should take appropriate action to be strong/unique and saved securely. If you save…

  • Returning To The Concept of Custody

    If you read the first article in this section you’ll be familiar with the concept of custody, which is central to cryptocurrency ownership. Custody refers to how you manage responsibility for the one critical piece of information that enables control of your crypto – a Private Key or Seed. As cryptocurrency works without a central authority like a bank,…

  • Security best practice

    What you’ll learn You are ultimately responsible for your crypto Things to protect against; accidental loss & theft Best practice & sleeping soundly at night If you’ve reached this stage in our series of articles on how to use cryptocurrency, you’ll have invested considerable time and hopefully some of your money; putting into practice what…