This article will help you operationalize all the ideas and suggestions from the 7 part crypto security series. · This series of articles will help you...
In Part 7 we will discuss the steps on how to properly setup and use a new hardware wallet. · In Part 7 we will discuss the steps on how to properly...
In Part 6 we will contrast and compare Ledger Nano X and Trezor Model T, and look at the security vulnerabilities that have been exploited in them. · In...
In Part 5 we delve deeper into user habits affecting security using a jail-breaking example. We then define what Hardware wallets are. · In Part 5 we...
Part 4 discusses Software Wallets, their vulnerability to poor device security/user habits; harden devices with antivirus, anti-malware, VPN, Ad-Block ·...
Part 3 discusses self-custody of crypto assets, along with all the rights and responsibilities self-custody imposes on the user. · Part 3 discusses...