Ultimate Guide to Keeping Crypto Safe: 20 tips everyone should follow!

InvestAnswers
7 Jul 202114:52

Summary

TLDRThe video script emphasizes the importance of safeguarding one's cryptocurrency against prevalent scams. It offers 20 practical tips, highlighting the need for self-awareness, recognizing too-good-to-be-true offers, and being vigilant against phishing attempts. The speaker warns against trusting unsolicited online interactions and stresses the significance of strong passwords, two-factor authentication, and secure email practices. The video also addresses the risks of remote access, crypto jacking, and the use of public networks, advocating for dedicated computers, hardware wallets, and careful management of seed phrases. It concludes with an admonition to remain calm yet paranoid, drawing attention to notable hacks in history to underscore the value of proactive security measures.

Takeaways

  • 🔒 Self-awareness is crucial in preventing scams; be vigilant about your actions and decisions.
  • 🕵️‍♂️ Scammers are omnipresent; always be skeptical of too-good-to-be-true offers and promises.
  • 🚫 Avoid engaging with suspicious advertisements or promotions, especially on social media platforms.
  • 🔑 Prioritize password security and enable two-factor authentication (2FA) for all sensitive accounts.
  • 📱 Use a separate, secure phone number (like Google Voice) to protect against SIM swapping attacks.
  • 🤐 Be discreet about your crypto holdings; avoid discussing them publicly online or offline.
  • 🚫 Do not share personal or financial information with unsolicited callers or emailers claiming to be from reputable companies.
  • 💻 Maintain strict control over your devices; never allow remote access to your PC and be cautious with repairs.
  • 🛡️ Check for signs of crypto jacking and malware that could be using your devices' resources without consent.
  • 📧 Use a dedicated email account for crypto exchanges and secure it with a hardware key or strong passphrases.
  • 💻 Keep a dedicated computer for trading and ensure it's updated, secure, and not used by others.
  • 🌐 Be cautious when using public Wi-Fi; opt for wired connections and use a VPN for additional security.

Q & A

  • What is the primary risk people should be aware of when dealing with cryptocurrencies?

    -The primary risk is being scammed, which can happen due to mistakes made by individuals or through the actions of scammers who are ubiquitous in the crypto space.

  • What is the significance of the phrase 'if it sounds too good to be true, it probably is' in the context of crypto scams?

    -This phrase serves as a warning to be skeptical of offers that seem excessively beneficial, as they are often scams, such as free giveaways that promise to return more crypto than deposited.

  • How can one protect themselves from potential scams involving YouTube advertisements and social media?

    -One should be cautious of ads within YouTube videos and not trust everything seen online. It's also important to never give personal information to unsolicited messages or engage with fake social media accounts pretending to be trusted figures.

  • Why is it important to use strong and unique passwords for crypto-related accounts?

    -Strong and unique passwords are crucial to prevent password cracking attempts that can happen at an extremely high rate. Using the same password for multiple accounts increases the risk of a breach.

  • What is two-factor authentication (2FA) and why is it essential for securing accounts?

    -Two-factor authentication is an additional layer of security that requires a second form of verification, such as a code sent to a mobile device, in addition to a password. It significantly reduces the risk of unauthorized access to accounts.

  • What is a SIM swap and how can it be prevented?

    -A SIM swap is a type of attack where a scammer tricks a mobile carrier into transferring a victim's phone number to a new SIM card. To prevent this, one can use a service like Google Voice for 2FA and be cautious of who has access to personal information.

  • Why should one avoid sharing their crypto holdings publicly?

    -Sharing information about one's crypto holdings can attract the attention of scammers and hackers, increasing the risk of targeted attacks and theft.

  • What is crypto jacking and how can it be detected?

    -Crypto jacking is a form of cyber attack where a hacker installs malware on a victim's device to mine cryptocurrency without their consent. It can be detected by signs such as high CPU usage, overheating, and unusual battery drain.

  • What are the advantages of using a dedicated computer for cryptocurrency trading?

    -A dedicated computer for trading reduces the risk of malware and other security threats. Keeping it offline when not in use and ensuring it has regular software updates further enhances security.

  • How can one secure their home network to protect against potential hacking?

    -One can secure their home network by using a strong password, preferring wired connections over Wi-Fi, ensuring the router's firmware is up to date, and possibly using a third-party DNS server or a VPN for added protection.

  • What is the importance of using hardware wallets for storing cryptocurrencies?

    -Hardware wallets provide cold storage, which is a safer way to store cryptocurrencies offline, reducing the risk of theft through hacking. They also generate secure seed phrases that are crucial for recovering the stored crypto.

Outlines

00:00

🔒 Introduction to Crypto Scams and Risk Management

The video begins by addressing the serious issue of cryptocurrency scams and introduces 20 quick tips for protecting oneself in the crypto space. The speaker emphasizes the importance of self-awareness and being vigilant against scammers who are ubiquitous. They also discuss the common adage 'if it sounds too good to be true, it probably is,' warning viewers about free giveaways and dubious advertisements on YouTube that promise unrealistic returns. The speaker shares their experience with suspicious advertisements and stresses the need for skepticism and careful research when encountering potential scams.

05:01

🛡️ Implementing Security Measures and Best Practices

This paragraph delves into specific security measures that viewers should adopt to safeguard their crypto assets. It starts with the importance of strong and unique passwords, followed by the necessity of two-factor authentication (2FA) for all accounts. The speaker advises using a separate phone number, such as a Google Voice number, to protect against SIM swapping. They also caution against sharing personal information with anyone, especially social engineers posing as representatives from companies like Apple, Google, or Coinbase. The paragraph emphasizes the need for paranoia and vigilance in protecting one's crypto assets.

10:02

💻 Protecting Your Devices and Network

The speaker continues with advice on securing one's devices and network to prevent crypto theft. They recommend not allowing remote access to your PC by anyone claiming to be customer support and being cautious when using devices in public spaces like coffee shops. The paragraph also covers checking for crypto jacking malware that uses processing power and causes overheating. It suggests having a dedicated email for exchanges and using security keys like YubiKey to lock down accounts. The speaker advises using a dedicated computer for trading, keeping it offline when not in use, and ensuring it's updated with the latest security patches. They also stress the importance of not using the computer as an administrator and being wary of open networks.

🌐 Safeguarding Your Crypto Transactions and Wallets

In the final paragraph, the focus shifts to securing crypto transactions and wallets. The speaker discusses the use of hardware wallets for cold storage and the importance of keeping the recovery phrase secure. They explain the process of transferring crypto, emphasizing the need for small tests and double-checking addresses. The paragraph also touches on the use of security keys for exchanges and emails, and the benefits of whitelisting withdrawal addresses. The speaker warns about the risks of sharing personal information and the dangers of fake social media accounts. They conclude with a reminder to store seed phrases with utmost care, considering various secure methods and the importance of being prepared for any eventuality.

Mindmap

Keywords

💡crypto

Crypto refers to cryptocurrency, a digital or virtual form of currency that uses cryptography for security. In the video, the term is central to the discussion of scams and security practices. The speaker warns viewers about the risks of losing their crypto assets due to scams or poor security measures, emphasizing the importance of protecting one's crypto investments.

💡scam

A scam is a fraudulent scheme or dishonest act designed to deceive people, typically by obtaining money or valuables from them. In the context of the video, scams are a significant threat to those dealing with cryptocurrencies. The speaker provides tips on how to avoid falling victim to such scams, including being wary of too-good-to-be-true offers and recognizing the tactics used by scammers.

💡risk management

Risk management is the process of identifying, assessing, and prioritizing risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability or impact of unfortunate events. In the video, the speaker emphasizes the importance of risk management in the context of cryptocurrency investments, urging viewers to be vigilant and proactive in protecting their assets.

💡self-awareness

Self-awareness refers to the ability of an individual to recognize and understand their own emotions, thoughts, and behaviors. In the video, the speaker encourages viewers to be self-aware to avoid making mistakes that could lead to loss of their crypto assets. This includes being cautious about sharing personal information and being skeptical of offers that seem too good to be true.

💡two-factor authentication (2FA)

Two-factor authentication, or 2FA, is a security measure that requires users to provide two different types of identification to access an account. This typically involves something the user knows, like a password, and something the user has, like a code sent to their mobile device. In the video, the speaker highlights the importance of enabling 2FA for all accounts, especially those related to cryptocurrency, to add an extra layer of security.

💡social engineering

Social engineering is a manipulative technique that tricks people into divulging confidential information or performing actions that compromise security protocols. In the context of the video, the speaker warns about social engineering attempts by scammers who might pretend to be from reputable companies or services, like Apple or Coinbase, to deceive users into revealing sensitive information or transferring funds.

💡crypto jacking

Crypto jacking is a form of cyber attack where a hacker secretly uses a victim's computer resources to mine cryptocurrency without their consent. The video script mentions checking for signs of crypto jacking, such as excessive use of processing power or overheating, as a way to protect one's crypto assets and computer systems from unauthorized use.

💡hardware wallets

Hardware wallets are physical devices that securely store private keys for cryptocurrency transactions. They are considered one of the safest ways to store crypto because they are less vulnerable to online hacking attempts. The speaker in the video advises viewers to use hardware wallets with strong PINs and to store them in secure locations, emphasizing the importance of cold storage for crypto assets.

💡seed phrases

Seed phrases, also known as recovery phrases, are a series of words that represent the private key to a cryptocurrency wallet. They are crucial for recovering access to a wallet if the device is lost or the data is compromised. In the video, the speaker stresses the importance of storing seed phrases securely, suggesting multiple copies in different locations, and considering durable storage options like metal plates.

💡phishing

Phishing is a type of cyber attack where attackers attempt to obtain sensitive information such as usernames, passwords, and credit card details by disguising themselves as a trustworthy entity in an electronic communication. The video discusses the risk of phishing in the context of cryptocurrency, advising viewers to be cautious of emails and messages that appear to be from legitimate sources but may be attempts to steal personal information.

💡VPN

A Virtual Private Network (VPN) is a technology that creates a secure and encrypted connection over a less secure network, such as the internet. VPNs are used to protect data and maintain privacy by preventing others from seeing the online activity. In the video, the speaker recommends using a VPN, especially when on public Wi-Fi networks, to protect against potential hackers and ensure the security of online transactions and communications related to cryptocurrency.

Highlights

The importance of self-awareness in preventing cryptocurrency scams is emphasized, highlighting that many losses occur due to individuals' mistakes.

Scammers are ubiquitous, and the video provides a cautionary example of a suspicious giveaway with over 130,000 views.

The presenter expresses skepticism towards certain advertisements, specifically mentioning a suspicious ad for a company called Bex Plus.

The age-old adage 'if it sounds too good to be true, it probably is' is reiterated as a key principle in risk management.

The presenter warns about fake social media accounts impersonating them, and emphasizes that they would never reach out to anyone for any reason.

Password strength and the use of two-factor authentication (2FA) are stressed as critical for securing accounts against password cracking and SIM swapping.

The importance of being cautious about what is posted online, especially regarding the possession of cryptocurrency, is highlighted to avoid attracting unwanted attention.

The presenter advises never to share personal information with anyone, even if they claim to represent reputable companies like Apple or Coinbase.

The risks associated with allowing remote control of one's PC, such as potential phishing or malware attacks, are discussed.

Crypto jacking and the signs to detect it, such as excessive use of processing power and overheating, are warned against.

The use of a dedicated email for exchanges and securing it with a hardware key like YubiKey is recommended to enhance account security.

A dedicated computer for exchange trading, kept offline when not in use, and regular software updates are suggested to minimize vulnerabilities.

The dangers of using public Wi-Fi networks for trading activities, and the importance of a secure and updated home network, are outlined.

The presenter advises using centralized exchanges that offer security measures like call confirmations before transfers and the use of 2FA.

The use of hardware wallets with secure seed phrases and PINs, and the importance of storing the hardware wallet in a safe place, are discussed.

Transferring cryptocurrency safely is detailed, with the suggestion to always start with a small test transaction and to double-check all addresses involved.

The presenter warns about the risk of phishing attacks and advises using a security key for exchanges and emails to enhance security.

The importance of whitelisting withdrawal addresses and enabling this feature for multiple periods is highlighted to prevent unauthorized transactions.

The presenter shares a real-life example of the Ledger case, where customer information was compromised, emphasizing the need for caution when purchasing hardware wallets.

The ultimate advice is to store seed phrases with utmost care, considering multiple copies and secure locations, and to be prepared for any eventuality.

The video concludes with a reminder to stay calm but vigilant, citing historical hacks like Mt. Gox and Bitfinex as reasons for a healthy paranoia in the crypto space.

Transcripts

play00:00

hey y'all thanks for joining a very

play00:01

serious issue today every day

play00:04

people are getting scammed out of crypto

play00:06

this is a very quick video on how to

play00:08

protect yourself with 20 quick tips

play00:11

and it's funny because some of them i

play00:13

even learned over the last few days so

play00:15

there's something here for everybody

play00:16

channels about math money and freedom we

play00:18

don't need a disclaimer today but this

play00:20

is all about risks and risk management

play00:23

the key

play00:24

key premise of this whole channel

play00:26

and the biggest risk first of all for

play00:28

people to be aware of is yourself

play00:30

so a lot of times people lose things

play00:32

because of mistakes that they make so be

play00:34

very very self-aware of that

play00:36

second of all uh the scammers are well

play00:39

and truly everywhere

play00:40

for more information on how they steal

play00:43

your crypto check out this video i did

play00:45

about a month or two ago

play00:47

and there's some good prevention tips in

play00:49

there as well

play00:50

so first of all let's talk about the

play00:52

usual adage age old adage if it sounds

play00:55

too good to be true it probably is every

play00:58

should be well aware of that by now now

play01:01

the stuff is still happening like these

play01:03

free giveaways

play01:04

uh this one this one video actually had

play01:07

over 130 000 views

play01:09

all you have to do is deposit some

play01:11

ethereum in the account with the details

play01:14

in the video below and they'll give you

play01:16

your ethback and a lot more and of

play01:18

course it's not going to happen it's

play01:20

complete bs

play01:21

but what's even more disturbing

play01:24

is there are some youtubers out there

play01:26

that have advertisements within their

play01:28

videos now i don't know if the wolf of

play01:30

wall street placed this ad in his video

play01:32

or if this

play01:34

company is legit but i tell you it seems

play01:37

very suspicious bex plus

play01:40

uh this was an interview he did with

play01:42

lynn alton i'm a big fan of lynn elton

play01:44

so that's why i watched this video and

play01:47

i

play01:47

found out about this guy the wolf of

play01:49

wall street which is really cool name

play01:51

but he advertised in the middle of his

play01:52

video a company called bex plus

play01:55

i tried to do some research research to

play01:56

find out if it's a scam or not i read

play01:58

some things on reddit read some things

play02:00

on exchange reviews and nothing was very

play02:03

savory at all but if you deposit between

play02:06

1 and 10 bitcoin they will match your

play02:08

deposit

play02:09

i guarantee you there is no exchange on

play02:12

earth that will give you a third of a

play02:14

million dollars in free crypto just for

play02:16

depositing some crypto that's not the

play02:18

way the world works

play02:20

so i am 99

play02:22

sure that this is some type of scam or

play02:24

they will swindle you out of your crypto

play02:26

through some complex terms and

play02:28

conditions so again be very very aware

play02:30

don't trust what you see on the internet

play02:32

or anywhere else

play02:33

so second of all

play02:35

ah there's a fake instagram and there's

play02:37

probably a fake facebook page and they

play02:39

will always reach out to people on my

play02:41

channel but they will not be me okay

play02:44

because i would never do that i don't

play02:45

have the time nor the interest and i

play02:47

don't want anything from anybody that's

play02:48

why i don't advertise either

play02:50

and

play02:52

but be careful so these people again are

play02:55

everywhere watch out

play02:57

don't ever give anything to anybody

play02:59

don't answer their questions i'm not

play03:00

interested

play03:02

in anything i will talk to people on

play03:03

discord and patreon that's it and i'll

play03:05

answer questions but that's as far as i

play03:07

go so uh be very careful uh next thing

play03:11

passwords we're going into the step one

play03:13

of 20 right now and moving very fast

play03:15

because we have a lot of ground to cover

play03:17

so fortunately the world is moving away

play03:19

from passwords

play03:20

that's good you'll see more biometrics

play03:22

and more secure keys and things like

play03:24

that because password crackers can rifle

play03:26

through 350 billion guesses per second

play03:29

does that make you feel good so

play03:32

basically password strength is

play03:34

absolutely critical i know sometimes

play03:36

people take shortcuts and use the same

play03:37

password for many things but don't ever

play03:39

do that second of all

play03:40

two-factor authentication is also very

play03:43

very important make sure you have it for

play03:44

your sign in whether it's to your email

play03:47

or to your brokerage accounts your

play03:48

mortgage accounts your banks turn it on

play03:50

for everything okay step number two step

play03:53

number three not only for 2fa

play03:56

make sure you use something like a

play03:58

google voice number because they can sim

play04:00

co sim swap your phone card and sim

play04:04

swaps are one of the easiest things to

play04:06

do

play04:06

because uh the

play04:09

mobile phone carrier representatives are

play04:11

extremely easy to socially engineer

play04:13

which means they can be manipulated say

play04:15

oh i lost my phone or i've got an

play04:18

emergency can you reset my password or

play04:21

whatever and they do that so be very

play04:22

very careful use something like google

play04:24

voice so the fourth thing very important

play04:28

be careful what you post online

play04:30

and especially do not say how much

play04:32

crypto you have online or even that you

play04:34

have crypto because people are watching

play04:36

people are listening so be very very

play04:37

paranoid

play04:39

uh

play04:40

step number five never share anything

play04:43

with anybody

play04:45

this goes back to that point about the

play04:47

social engineers people pretending to be

play04:49

apple or google or coinbase can you

play04:52

imagine you can't even reach coinbase

play04:53

customer service can you imagine

play04:54

coinbase calling you up and saying hey

play04:56

how you doing

play04:57

yeah we got a problem your councilman

play04:59

hack can you give us some personal

play05:00

information i mean it's all

play05:03

it's all very obvious and easy but these

play05:05

people are professional and highly

play05:07

manipulative so please be careful

play05:09

everybody don't give anything to

play05:10

everybody step number six

play05:13

never let anybody control your pc

play05:15

remotely

play05:16

some people might pretend to be

play05:18

customer support or itu service whatever

play05:21

be very careful be very paranoid also be

play05:24

careful dropping off your pc at a repair

play05:26

shop try to do everything yourself

play05:29

step number seven

play05:31

check for crypto jacking there is

play05:33

malware and software that can be

play05:35

installed on your phone or pc

play05:37

and that's a quick list of how to detect

play05:40

if

play05:40

somebody or something is running in the

play05:42

background on your machine you can tell

play05:44

by it running using a lot of processing

play05:46

power etc overheating all the usual

play05:49

stuff but check that out too it's a very

play05:51

common thing

play05:53

step number eight

play05:54

uh have a dedicated email for exchanges

play05:57

for example protonmail

play05:59

or run your gmail using a ub key make

play06:02

sure it's not hackable and lock down

play06:04

your email with the yubikey i can't

play06:05

stress that enough and have a second key

play06:07

or a set of passphrases

play06:10

for example with google in case you lose

play06:12

your ub key but that way you can lock

play06:14

that stuff down

play06:17

step number nine your computer

play06:20

so uh what i recommend is have a

play06:22

dedicated computer used for exchange

play06:24

trading and nothing else keep it offline

play06:27

when you're not using it and make sure

play06:29

you have updates turned on it's very

play06:31

important because sometimes software

play06:33

especially windows software has a lot of

play06:35

loopholes

play06:37

and places where it can be exploited

play06:40

don't let kids or others use your

play06:41

dedicated machine because they can go to

play06:43

a bad website and install some malware

play06:46

on your computer and watch what apps you

play06:49

download for example macs are much safer

play06:52

in this regard

play06:53

and but windows are not especially older

play06:56

versions of windows they're full of

play06:57

vulnerabilities and make sure you're not

play06:59

logged in as an administrator on your

play07:02

computer this is a safety step because

play07:05

if you are then anybody that gets in as

play07:08

you can actually do a lot of damage to

play07:10

your machine that's a little bit about

play07:11

your computer that's very important step

play07:14

number 10 be careful of open networks

play07:16

for example using your laptop that you

play07:18

use for trading and doing it within a

play07:20

coffee shop or a restaurant or a hotel

play07:22

lobby

play07:23

all of these places you could have

play07:25

hackers watching you and their networks

play07:26

most probably are not secure so be very

play07:28

very careful speaking of secure network

play07:31

step number 11

play07:33

use a strong password for your network

play07:35

router

play07:37

wi-fi is okay but wired is preferable i

play07:40

have a cat 6 here at my feet and use wpa

play07:43

or wpa2 on a router if wireless that

play07:46

makes it much harder to hack and make

play07:48

sure your firmware is up to date how

play07:50

many people check their router firmware

play07:51

to make sure it's up to date

play07:53

also if you can use a third-party dns

play07:55

server to avoid phishing sites

play07:57

and

play07:58

use a vpn if you're extra paranoid as

play08:01

well especially if you're on the road

play08:03

that is absolutely critical so

play08:05

let's talk a bit step 12 but centralized

play08:08

exchanges for example ameritrade e-trade

play08:10

fidelity etc make sure they call you

play08:13

before any transfer happens sometimes

play08:15

they do that if somebody does bypass

play08:16

your security a lot of these centralized

play08:19

exchanges do not have utf technology for

play08:21

example you can't use a iran

play08:24

ub key for example um because they do

play08:27

have insurance and they are very safe

play08:29

and i've never had a problem

play08:31

but uh also if not try use your google

play08:34

authenticator for some of the

play08:35

centralized exchanges as well and

play08:37

hopefully they'll be beef up the

play08:39

security but the crypto exchanges have a

play08:41

lot more features around security as

play08:43

well

play08:44

so let's go to step number 13 real quick

play08:47

lucky number 13 hardware wallets cold

play08:49

storage in other words for that make

play08:51

sure your secure seat phrase this is

play08:53

your crypto is secure

play08:55

set a strong pin for your wallet for

play08:57

example eight numbers that you can

play08:58

remember and store it safely

play09:01

and make sure you store your hardware

play09:03

wallet

play09:04

in a secure place for example your house

play09:06

in a safe

play09:07

and your wallet can have multiple

play09:09

addresses within the wallet so explore

play09:11

how you generate those addresses and

play09:14

some people lose crypto in different

play09:16

addresses on the same wallet and make

play09:19

sure you know which coins are in which

play09:21

addresses sounds simple but important to

play09:23

know

play09:24

so step number 14

play09:26

software wallets for example a hot

play09:28

wallet

play09:29

desktop wallet such as you know metamask

play09:33

best to never store anything on a hot

play09:35

wallet but use it it's fine to use for

play09:37

transfers but make sure you have

play09:39

everything tied down as well same thing

play09:40

two-factor authentication all that usual

play09:42

stuff

play09:43

now

play09:44

transferring crypto this is a very

play09:47

daunting task imagine

play09:49

sending a bitcoin that could be worth a

play09:51

million dollars in the future or 10 of

play09:52

them always do a small test first check

play09:55

the blockchain make sure it got through

play09:56

you can watch it live in many cases and

play09:59

whitelist your address book and we'll

play10:02

talk more about that in a future session

play10:04

and when you make a transfer check the

play10:07

end address is the address that you are

play10:09

sending it to

play10:10

i like to triple check that

play10:12

and for example if you're using a ledger

play10:14

or trezor it will show you the address

play10:15

on the device

play10:16

again it's a very daunting task one

play10:19

mistake

play10:21

everything's gone so just be careful

play10:23

okay step number 16

play10:26

use a security key for your exchanges so

play10:30

i use a ubi keys from yubico and they

play10:34

are the best but you can also use the

play10:35

titan security key from google

play10:38

a theater's fido utf key

play10:42

solo keys etc locked in your exchanges

play10:45

and emails and things like coinbase and

play10:48

ftx do have these features that you can

play10:50

set up

play10:51

very quickly and easily

play10:53

and it makes things impenetrable which

play10:56

is fantastic

play10:57

also make sure you enable your white

play10:59

listing step number 17 and you can put

play11:01

in a withdrawal to whitelist for

play11:04

multiple periods of days and you get

play11:06

warnings if something actually happens

play11:08

here you see the internal interface for

play11:10

coinbase on the left and ftx on the

play11:11

right

play11:12

and it's very easy and simple to do and

play11:15

make sure you all do it as well

play11:18

step number 18 this came up

play11:21

from the famous ledger case

play11:23

where ledger was hacked not the ledger

play11:26

device itself but the customer list and

play11:28

names addresses and contact information

play11:31

for all the people that own ledgers

play11:33

so now

play11:34

these ledger customers are getting fake

play11:37

ledgers in the mail saying this is an

play11:38

update free update etc so make sure if

play11:41

you are using a ledger make sure you buy

play11:44

it from a reputable source and have them

play11:46

mailed to a po box you don't want people

play11:47

knowing your true address if you're

play11:49

buying from a certain vendor now this is

play11:51

also very important because

play11:53

in the middle here you will see a fake

play11:55

instagram account of my account and you

play11:58

see somebody making small talk

play12:00

like hey

play12:02

good are you the real invest answers

play12:04

this is one of our clever patreon

play12:06

members that you of course wasn't yeah

play12:08

why are you asking oh just checking

play12:11

that my youtube on my page good english

play12:13

spot the english

play12:15

are you all investing in cryptocurrency

play12:17

maybe how has the market between you so

play12:20

far i haven't bought yet clever answer

play12:23

what platforms do you plan to make use

play12:25

of don't know yet have you been

play12:27

introduced to the blockchain software

play12:28

ledger s yet

play12:30

aha

play12:31

very interesting so you can see here

play12:34

they're going directly to find out

play12:36

exactly what you have and who you are

play12:38

and it's pretty easy

play12:40

like you'd want to be

play12:41

i don't know i don't want to say

play12:42

anything bad because i do know people

play12:44

who have been cleaned out by these types

play12:46

of fraudsters but just be ultra paranoid

play12:49

i will never ask you for anything and

play12:52

neither will other kind of youtubers out

play12:54

there so just remember they're out there

play12:55

they're trying to engage they're using

play12:57

social media to do it be careful of the

play12:59

fake wallets too so that's step number

play13:01

18. step number 19

play13:04

store your seed phrases with the utmost

play13:06

vigilance

play13:08

remember the sea phrases are your coins

play13:10

you know it's like not your keys not

play13:12

your crypto well

play13:14

the cc phrase is is kind of your key so

play13:17

store your seed phrases across different

play13:19

devices and locations if you can

play13:21

manage your seed with the utmost care do

play13:23

not lose it if you write it down on

play13:25

paper considering making two copies and

play13:27

storing them in separate locations and

play13:28

also remember paper can be burnt

play13:30

destroyed decay etc

play13:32

and beware of things like sd cards and

play13:35

other storage options

play13:36

sometimes they rarely last more than

play13:38

five years and they could be wiped by an

play13:40

emp device

play13:42

some people actually hammer their seed

play13:44

phrases onto copper or steel plates and

play13:46

bury them in different locations kind of

play13:47

like geocaching

play13:49

and remember meticulously record all

play13:52

your steps

play13:53

so your loved ones can recreate in the

play13:55

event anything happens you know people

play13:56

could be riding a bicycle or somebody

play13:58

who was skateboarding and got a head

play14:00

injury and that was it

play14:01

um

play14:02

life is tenuous be very very very

play14:05

careful

play14:06

out there so step number 20 most

play14:08

importantly be calm

play14:10

but be very paranoid remember

play14:13

things like the mount gox hack in 2014

play14:16

hackers made out with 740 000 bitcoin uh

play14:20

the bitfinex breach most recently

play14:22

drained 120 000 bitcoin from the

play14:24

exchange

play14:25

and again exchange hacks have become

play14:28

something of irregularity so again

play14:31

this should make everybody have a

play14:33

healthy paranoia

play14:35

for traders and hodlers alike and music

play14:37

exchanges etc

play14:39

everybody's out to get you so

play14:41

that's it be safe hope you enjoyed the

play14:43

20 steps if you like this type of

play14:44

content hit the like subscribe and the

play14:46

bell notification for new content i go

play14:49

live two or three times a week as well

play14:50

thanks everybody take care

Rate This

5.0 / 5 (0 votes)

Related Tags
CryptocurrencySafetyScamsPreventionRiskManagementSecureStoragePasswordProtectionTwoFactorAuthSocialEngineeringHardwareWalletsSecureCommunicationCyberSecurity