SlideShare a Scribd company logo
Storing Tokens Securely
Ways of storing tokens
Exchanges - QuadrigaCX, Binance, Bittrex
Hardware wallets - Trezor, Ledger
Software wallets - Jaxx, Exodus, MetaMask
Paper wallets - bitaddress.org
General advice
● Generally, seek to hold your own private key, or you don't technically own
the token
● Don't hold more than 15% of portfolio in any single location, unless maybe
a hardware wallet
● Be weary of holding too much USD tether (more than 20% of portfolio)
● Double check destination address / dont send ETH from exchange to
exchange or ICO
● Use VPN on public networks - NordVPN
● Use a firewall (especially on Windows) - LittleSnitch
Authentication
Multisig
● Baked into Bitcoin
● Ethereum uses Smart Contract
Exchange safety
Notable hacks: MtGox, BTC-E, Bitfinex, Bitstamp
Refer to Exchange Breakdown in Crypto Sheet:
https://docs.google.com/spreadsheets/d/1rahak4f3iRR8gdzGqLMOrKBs949m
OK1VwT3v0r46VX8/edit#gid=1531924450
Use 2-factor authentication (2FA) + IP whitelisting
Beware SMS auth - forgable
Beware backup email without 2FA
Software wallet
More secure than an exchange
iOS more secure than alternatives due to security constraints
Windows most compromisable
Android also compromisable without TEE chip (Trusted Execution
Environment) (Rivetz)
Hardware wallet (get one)
Uses a double chip system so that the chip signing your transactions cannot
expose your keys
There are a number of ways to check the authenticity of your device:
● Refer to manufacturer for up-to-date instructions
● Check packaging
● Check broken seal
● Use verification software
● Always change default seed
Paper wallets
Clone open source project
1. Disconnect internet
2. Restart computer
3. Generate keys
4. Restart computer
5. Connect internet
Brain wallet = memorizing a passphrase
Investing safety
Don't click on links you don't know - the link could be malicious (EtherDelta XSS
attack)
Use multiple addresses just incase one is compromised
Hardware wallets make this easy as you can use a different password to login
(ie the ICO name), giving you an entirely new wallet
Physical security
xkcd <3
Eric Muyser
Organizer @ Crypto Vancouver
Director @ Hyperbridge Technology
@ericmuyser

More Related Content

What's hot

talk-ta3m-crypto-tools-workshop
talk-ta3m-crypto-tools-workshoptalk-ta3m-crypto-tools-workshop
talk-ta3m-crypto-tools-workshopSteve Phillips
 
Video Conferencing over WebRTC
Video Conferencing over WebRTCVideo Conferencing over WebRTC
Video Conferencing over WebRTCYigit UNALLAR
 
7z password unlocker
7z password unlocker 7z password unlocker
7z password unlocker Sysinspireweb
 
[2010 CodeEngn Conference 04] window31 - Art of Keylogging 키보드보안과 관계없는 키로거들
[2010 CodeEngn Conference 04] window31 - Art of Keylogging 키보드보안과 관계없는 키로거들[2010 CodeEngn Conference 04] window31 - Art of Keylogging 키보드보안과 관계없는 키로거들
[2010 CodeEngn Conference 04] window31 - Art of Keylogging 키보드보안과 관계없는 키로거들GangSeok Lee
 
Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017
Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017
Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017ProQuest
 

What's hot (7)

talk-ta3m-crypto-tools-workshop
talk-ta3m-crypto-tools-workshoptalk-ta3m-crypto-tools-workshop
talk-ta3m-crypto-tools-workshop
 
Video Conferencing over WebRTC
Video Conferencing over WebRTCVideo Conferencing over WebRTC
Video Conferencing over WebRTC
 
7z password unlocker
7z password unlocker 7z password unlocker
7z password unlocker
 
Introducing Cloakcast
Introducing CloakcastIntroducing Cloakcast
Introducing Cloakcast
 
File Encryption
File EncryptionFile Encryption
File Encryption
 
[2010 CodeEngn Conference 04] window31 - Art of Keylogging 키보드보안과 관계없는 키로거들
[2010 CodeEngn Conference 04] window31 - Art of Keylogging 키보드보안과 관계없는 키로거들[2010 CodeEngn Conference 04] window31 - Art of Keylogging 키보드보안과 관계없는 키로거들
[2010 CodeEngn Conference 04] window31 - Art of Keylogging 키보드보안과 관계없는 키로거들
 
Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017
Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017
Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017
 

Similar to Secure Token Storage

gething started - ethereum & using the geth golang client
gething started - ethereum & using the geth golang clientgething started - ethereum & using the geth golang client
gething started - ethereum & using the geth golang clientSathish VJ
 
Getting Started in Web3 with MetaMask.pptx
Getting Started in Web3 with MetaMask.pptxGetting Started in Web3 with MetaMask.pptx
Getting Started in Web3 with MetaMask.pptxssuser455e28
 
Io t slides_iotvillage
Io t slides_iotvillageIo t slides_iotvillage
Io t slides_iotvillageagmoneyy
 
What is Multisig? - Meetup #7 - 2022-12-08
What is Multisig? - Meetup #7 - 2022-12-08What is Multisig? - Meetup #7 - 2022-12-08
What is Multisig? - Meetup #7 - 2022-12-08RoundRockBitcoiners
 
Tucson Blockchain Dev Meetup - Unchained Capital's Multisig Ethereum Contract
Tucson Blockchain Dev Meetup - Unchained Capital's Multisig Ethereum ContractTucson Blockchain Dev Meetup - Unchained Capital's Multisig Ethereum Contract
Tucson Blockchain Dev Meetup - Unchained Capital's Multisig Ethereum ContractDestry Saul
 
Top 10 tricks to keep your bitcoin wallet safe
Top 10 tricks to keep your bitcoin wallet safeTop 10 tricks to keep your bitcoin wallet safe
Top 10 tricks to keep your bitcoin wallet safeBlockchain Council
 
Cryptocurrencies Hardware Wallets - 33C3 Bitcoin Assembly
Cryptocurrencies Hardware Wallets - 33C3 Bitcoin AssemblyCryptocurrencies Hardware Wallets - 33C3 Bitcoin Assembly
Cryptocurrencies Hardware Wallets - 33C3 Bitcoin AssemblyEric Larcheveque
 
FIWARE Wednesday Webinars - How to Secure IoT Devices
FIWARE Wednesday Webinars - How to Secure IoT DevicesFIWARE Wednesday Webinars - How to Secure IoT Devices
FIWARE Wednesday Webinars - How to Secure IoT DevicesFIWARE
 
Identity and the quest for Self-Sovereign Identity - Daniel Hardman
Identity and the quest for Self-Sovereign Identity - Daniel HardmanIdentity and the quest for Self-Sovereign Identity - Daniel Hardman
Identity and the quest for Self-Sovereign Identity - Daniel HardmanSSIMeetup
 
Web3 Security: The Blockchain is Your SIEM
Web3 Security: The Blockchain is Your SIEMWeb3 Security: The Blockchain is Your SIEM
Web3 Security: The Blockchain is Your SIEMTal Be'ery
 
Shytikov on NTLM Authentication
Shytikov on NTLM AuthenticationShytikov on NTLM Authentication
Shytikov on NTLM Authenticationshytikov
 
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsA Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsBeau Bullock
 
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsA Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsBeau Bullock
 
How to Create a Crypto Wallet in 2023.pdf
How to Create a Crypto Wallet in 2023.pdfHow to Create a Crypto Wallet in 2023.pdf
How to Create a Crypto Wallet in 2023.pdfProlitus Technologies
 
Securing your Cloud Environment v2
Securing your Cloud Environment v2Securing your Cloud Environment v2
Securing your Cloud Environment v2ShapeBlue
 
BLOCKSAFE WHITEPAPER
BLOCKSAFE WHITEPAPERBLOCKSAFE WHITEPAPER
BLOCKSAFE WHITEPAPERLandmarkClub
 
Wallet from noob to pro
Wallet from noob to proWallet from noob to pro
Wallet from noob to proBrian Yap
 

Similar to Secure Token Storage (20)

5 ways
5 ways5 ways
5 ways
 
gething started - ethereum & using the geth golang client
gething started - ethereum & using the geth golang clientgething started - ethereum & using the geth golang client
gething started - ethereum & using the geth golang client
 
Getting Started in Web3 with MetaMask.pptx
Getting Started in Web3 with MetaMask.pptxGetting Started in Web3 with MetaMask.pptx
Getting Started in Web3 with MetaMask.pptx
 
Io t slides_iotvillage
Io t slides_iotvillageIo t slides_iotvillage
Io t slides_iotvillage
 
What is Multisig? - Meetup #7 - 2022-12-08
What is Multisig? - Meetup #7 - 2022-12-08What is Multisig? - Meetup #7 - 2022-12-08
What is Multisig? - Meetup #7 - 2022-12-08
 
Tucson Blockchain Dev Meetup - Unchained Capital's Multisig Ethereum Contract
Tucson Blockchain Dev Meetup - Unchained Capital's Multisig Ethereum ContractTucson Blockchain Dev Meetup - Unchained Capital's Multisig Ethereum Contract
Tucson Blockchain Dev Meetup - Unchained Capital's Multisig Ethereum Contract
 
Top 10 tricks to keep your bitcoin wallet safe
Top 10 tricks to keep your bitcoin wallet safeTop 10 tricks to keep your bitcoin wallet safe
Top 10 tricks to keep your bitcoin wallet safe
 
Cryptocurrencies Hardware Wallets - 33C3 Bitcoin Assembly
Cryptocurrencies Hardware Wallets - 33C3 Bitcoin AssemblyCryptocurrencies Hardware Wallets - 33C3 Bitcoin Assembly
Cryptocurrencies Hardware Wallets - 33C3 Bitcoin Assembly
 
FIWARE Wednesday Webinars - How to Secure IoT Devices
FIWARE Wednesday Webinars - How to Secure IoT DevicesFIWARE Wednesday Webinars - How to Secure IoT Devices
FIWARE Wednesday Webinars - How to Secure IoT Devices
 
Identity and the quest for Self-Sovereign Identity - Daniel Hardman
Identity and the quest for Self-Sovereign Identity - Daniel HardmanIdentity and the quest for Self-Sovereign Identity - Daniel Hardman
Identity and the quest for Self-Sovereign Identity - Daniel Hardman
 
Block chain
Block chainBlock chain
Block chain
 
Web3 Security: The Blockchain is Your SIEM
Web3 Security: The Blockchain is Your SIEMWeb3 Security: The Blockchain is Your SIEM
Web3 Security: The Blockchain is Your SIEM
 
Shytikov on NTLM Authentication
Shytikov on NTLM AuthenticationShytikov on NTLM Authentication
Shytikov on NTLM Authentication
 
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsA Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
 
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsA Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
 
How to Create a Crypto Wallet in 2023.pdf
How to Create a Crypto Wallet in 2023.pdfHow to Create a Crypto Wallet in 2023.pdf
How to Create a Crypto Wallet in 2023.pdf
 
Rapport ICO Rating
Rapport ICO RatingRapport ICO Rating
Rapport ICO Rating
 
Securing your Cloud Environment v2
Securing your Cloud Environment v2Securing your Cloud Environment v2
Securing your Cloud Environment v2
 
BLOCKSAFE WHITEPAPER
BLOCKSAFE WHITEPAPERBLOCKSAFE WHITEPAPER
BLOCKSAFE WHITEPAPER
 
Wallet from noob to pro
Wallet from noob to proWallet from noob to pro
Wallet from noob to pro
 

Recently uploaded

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesThousandEyes
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Product School
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...Product School
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekCzechDreamin
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationZilliz
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka DoktorováCzechDreamin
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 

Secure Token Storage

  • 2. Ways of storing tokens Exchanges - QuadrigaCX, Binance, Bittrex Hardware wallets - Trezor, Ledger Software wallets - Jaxx, Exodus, MetaMask Paper wallets - bitaddress.org
  • 3. General advice ● Generally, seek to hold your own private key, or you don't technically own the token ● Don't hold more than 15% of portfolio in any single location, unless maybe a hardware wallet ● Be weary of holding too much USD tether (more than 20% of portfolio) ● Double check destination address / dont send ETH from exchange to exchange or ICO ● Use VPN on public networks - NordVPN ● Use a firewall (especially on Windows) - LittleSnitch
  • 4. Authentication Multisig ● Baked into Bitcoin ● Ethereum uses Smart Contract
  • 5. Exchange safety Notable hacks: MtGox, BTC-E, Bitfinex, Bitstamp Refer to Exchange Breakdown in Crypto Sheet: https://docs.google.com/spreadsheets/d/1rahak4f3iRR8gdzGqLMOrKBs949m OK1VwT3v0r46VX8/edit#gid=1531924450 Use 2-factor authentication (2FA) + IP whitelisting Beware SMS auth - forgable Beware backup email without 2FA
  • 6. Software wallet More secure than an exchange iOS more secure than alternatives due to security constraints Windows most compromisable Android also compromisable without TEE chip (Trusted Execution Environment) (Rivetz)
  • 7. Hardware wallet (get one) Uses a double chip system so that the chip signing your transactions cannot expose your keys There are a number of ways to check the authenticity of your device: ● Refer to manufacturer for up-to-date instructions ● Check packaging ● Check broken seal ● Use verification software ● Always change default seed
  • 8. Paper wallets Clone open source project 1. Disconnect internet 2. Restart computer 3. Generate keys 4. Restart computer 5. Connect internet Brain wallet = memorizing a passphrase
  • 9. Investing safety Don't click on links you don't know - the link could be malicious (EtherDelta XSS attack) Use multiple addresses just incase one is compromised Hardware wallets make this easy as you can use a different password to login (ie the ICO name), giving you an entirely new wallet
  • 11. Eric Muyser Organizer @ Crypto Vancouver Director @ Hyperbridge Technology @ericmuyser