Securing Your Cryptocurrency vs.1.0

Similar documents
CREDITS Web-version 2 Web-version specification CREDITS Desktop Client vs. Web-client What is the CREDITS Wallet? 2 1.

TOKENSALE PARTICIPATION GUIDE

Key Security Issues for implementation of Digital Currency, including ITU-T SG17 activities

I. How to Purchase Cryptfunder CFND Tokens

This short tutorial will explain how to use the GCC web wallet and how you can authenticate your wallet address using Sign Message option to connect

BaFin-Tech 2018 BlockChain & Security (from #developerview)

Prelude. The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency.

Vladimir Groshev. COO, Project Coordinator.

Personal Cybersecurity

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Safety and Security. April 2015

Staying Safe Online. My Best Internet Safety Tips. and the AgeWell Computer Education Center.

MYETHERWALLET GUIDE 1

As a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins.

How Cyber-Criminals Steal and Profit from your Data

Yada. A blockchain-based social graph

CYBER THREATS: REAL ESTATE FRAUD ADVISORY COUNCIL

Rethinking Authentication. Steven M. Bellovin

Token White Paper. Global marketplace based on Block chain for small-scale business I ver P a g e

Client-Server Architecture PlusUltra beyond the Blockchain

Welcome. Password Management & Public Wi-Fi Security. Hosted by: Content by:

Improving Password Management. Laura Raderman, Policy and Compliance Coordinator, ISO Ole Villadsen, Research Liaison, Cybersecurity, UL

BEYOND TRADITIONAL PASSWORD AUTHENTICATION: PKI & BLOCKCHAIN

Sigwo Technologies Waves wallet manual

Once the file is downloaded we need to extract it. To do that, right click and select > Extract To.

Most Common Security Threats (cont.)

Welcome. ScrogginsGrear clients. to Cybersecurity Education Series. Password Management & Public Wi-Fi Security

A practical guide to IT security

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

Deprecating the Password: A Progress Report. Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018

Restech. User Security AVOIDING LOSS GAINING CONFIDENCE IN THE FACE OF TODAY S THREATS

DEV. Deviant Coin, Innovative Anonymity. A PoS/Masternode cr yptocurrency developed with POS proof of stake.

Technical White Paper. Cube Engine Version 1.0

Cyber Security Basics. Presented by Darrel Karbginsky

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk

THE UNBREAKABLE CODE. NAVTECH WHITEPAPER 2016 BETA RELEASE v0.9

COMPUTING FUNDAMENTALS I

Overview of PBI-blockchain cooperation technology

Google Identity Services for work

10 FOCUS AREAS FOR BREACH PREVENTION

INTERNET SAFETY IS IMPORTANT

ON SCHEDULE TERMS AND CONDITIONS (September 23rd 2018)

Mobile devices boon or curse

Password Management. Eugene Davis UAH Information Security Club January 10, 2013

Virtual Product Fair. Protect your agency data protect your business

How to Buy TRVR Tokens

Upgrading Your Home Network Security

Duo Travel Guide. duo.com

Google Authenticator User Guide

How to use Fusioncoin Wallet

Getting Started with Duo Security Two-Factor Authentication (2FA)

THE UNBREAKABLE CODE. NAVTECH DECENTRALISATION WHITEPAPER BETA RELEASE v0.9

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Entrust PartnerLink Login Instructions

Staying Safe on the Internet. Mark Schulman

How to make GCN, bitcoin and other Altcoin Paper Wallet (Cold Storage, Offline Storage)

Authentication Technology for a Smart eid Infrastructure.

Table Of Contents. Introduction Blockchain and Cryptocurrency...1. Stellar (payment network)...2. Internet and its issues...3. LocalXpose...

Short review of the Coinmama.com. Registration on the Coinmama

a new cryptocurrency STK GLOBAL PAYMENTS USER GUIDE USER GUIDE: PARTICIPATING IN IN STK STK TOKEN TOKEN SALE USING SALE MYETHERWALLET

Programming YubiKeys for Okta Adaptive Multi-Factor Authentication

A Single-Sign-On Security Platform for Private and Decentralized Applications. William Swanson, Paul Puey

Why SaaS isn t Backup

How to Invest in the Gizer Token Sale. A guide for contributing to the Initial Offering of GZR Tokens

Stop sweating the password and learn to love public key cryptography. Chris Streeks Solutions Engineer, Yubico

The essential guide to creating a School Bring Your Own Device Policy. (BYOD)

Authentication Methods

Cryptocurrencies for Investigators

How NOT To Get Hacked

BEST PRACTICES FOR PERSONAL Security

Helping you to be GDPR compliant

LEOcoin Private Chat wallet FAQ V 1

Your security on click Jobs

Personal Internet Security Basics. Dan Ficker Twin Cities DrupalCamp 2018

Guide to credit card security

Security and Privacy

SECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA

Don t Lose your Notability Documents: Set up Notability Auto-backup to your Box account

LogMeIn Rescue Getting Started with Two-Step Verification. User Guide

2 Factor Authentication. By Ron Brown

10 Quick Tips to Mobile Security

User Guide Online Backup

The Cyber War on Small Business

CONVERT OPPORTUNITIES INTO SOLUTIONS WITH A CRYPTOCURRENCY BROKER YOU CAN TRUST USER GUIDE

Modern two-factor authentication: Easy. Affordable. Secure.

Accounts and Passwords

PCI DSS Addressing Cyber-Security Threats. ETCAA June Gabriel Leperlier

Integrated Access Management Solutions. Access Televentures

A New Internet for Decentralized Apps

CME Request Center NR/Cert User Manual. 07 Mar 2018

Office 365 Buyers Guide: Best Practices for Securing Office 365

The World s first Public Chain for Decentralized NaaS (Network-as-a-Service)

BIDMC Multi-Factor Authentication Enrollment Guide Table of Contents

CSCE 813 Internet Security Final Exam Preview

Brian S. Dennis Director Cyber Security Center for Small Business Kansas Small Business Development Center

Fujitsu World Tour 2018

How to Build a Culture of Security

FLIP Token (FLP) How to Participate in the FLIP Token (FLP) Sale Event. 1 Disclaimer 2. 2 What You Will Need 2

Detecting Insider Attacks on Databases using Blockchains

How to use a computer safely Tips and Tricks. Dr. Pierre Darmon

Transcription:

Securing Your Cryptocurrency vs.1.0 Ryan Wilday, Elliott Wave Trader Thanks to all the members that contributed over the last few months. This is an attempt to summarize the thoughts they shared in the room.

Intro

Disclaimer Cryptocurrencies are particularly volatile assets. Nothing in this document is meant to suggest that trading cryptos is a good decision for you personally. Cryptocurrency is a new, unregulated or less regulated market which contains risks unique to any other assets. Any mention of past results is wholly unrelated to future performance. Nothing in this document should be construed as an endorsement of a product, service, exchange, or any other entity mentioned here within.

There are no intermediaries between transactors on the blockchain. Blockchain transactions are unidirectional and immutable. They cannot be canceled. Only a mirror image transaction can return funds to a sender. Need For Security The benefit is decentralization and the borderless nature of cryptocurrencies. However, this also puts the weight of security on the user and on companies that hold cryptocurrency in custody (eg. exchanges). Whenever a user is the source of compromise in an attack they will most assuredly lose funds. This means cryptocurrency traders need to double down on security, so they are not the source of compromise.

Simplified View of a Blockchain Transaction Sender Receiver Public Key (address) BlockChain Public Key (address) Private Key (address)

Private Keys Private keys are what give the owner control of funds and therefore must be kept secret. Companies that hold private keys in custody, give the rights to their users through their user credentials and hold the private key. Sender Receiver Public Key (address) BlockChain Public Key (address) Private Key (address)

Common Vectors of User Attack 1. Phishing- Users credentials, including 2FA are stolen by a fake site, either on Google or sent via email. Credentials are entered into the real site after entered into a fake site by the user, and 2FA if used is taken down. 2. Key logging Viruses, track credentials when the user logs in and compromises the account. This includes 2FA which is taken down immediately 3. Copy and paste viruses hijack the paste function causing the user to enter an attacker s address when sending funds. 4. Be careful in participating in ICOs. Verify they are legitimate. Some ICO sites have bene hacked and the address replaced by an attackers.

1. Stay Clean and free of viruses. Use a reputable antivirus software, and avoid sites that may compromise your computer. 2. Always use Two factor Authentication for all accounts. For more information see slide 10 for links. Basic Level of Security 3. Once you ve established an account bookmark it so you are not Googling the site. 4. Don t get phished- Never click a link and login from an email. 5. Use unique emails for every cryptocurrency exchange 6. Don t mix your everyday email, particularly on your phone with crypto trading. 7. Double check each time you copy and paste an address, at least the first and last 4 numbers. 8. Backup all private keys and 2FA keys given at the time of setup to another location (eg. thumbdrive in a safe or paper copies)

1. Use a separate machine for trading that only visits crypto exchanges and install no software- Chromebook or Virtual Machines (Linux or Bootcamp for example) are useful. Airlocks your trading from the rest of your computing life. Advanced Level of Security 2. Split all private keys in two, encrypt and put on separate cloud storage services with separate passwords. 3. Take all coins off exchange that you don t plan to trade with in the short term. Wallets apps on your computer are a fine choice, but back up the private keys and double check reviews to make sure they do not contain viruses. 4. Use a physical authentication device for email like Yubikey. 5. Keep as many coins as possible in a hardware wallet. Backup the restoration phrase offsite. 6. Use Lastpass for generating passwords.

Hardware Wallets: Trezor: https://trezor.io/ Ledger:https://www.ledgerwallet.com/ Yubikey (physical authentication):https://www.yubico.com Helpful Links 2FA: Google Authenticator Authy Helpful Articles: https://goo.gl/qypsjt https://goo.gl/fppmoj

Helpful Posts on EWT https://www.elliottwavetrader.net/members/atchat/?thr eadid=4351314

Thank you! If questions, please post on Elliottwavetrader.net in the crypto room