NFT & Crypto Security Tips

Hi all, Happy New Year! Another year rolls over and the bear market continues. From a macro standpoint 2023 may be a tough year overall for a lot of people. I’m going to write a quick article on keeping your assets safe in the new year. This may not be all encompassing as new ways to phish and hack someone are constantly coming out. However, if this prevents one person from being drained I’ll be happy.

Guide on avoiding being hacked or phished for your crypto / NFTS

  1. Use a hardware wallet: A hardware wallet is a physical device that stores your private keys offline and signs transactions when you connect it to a computer. This makes it much harder for hackers to steal your private keys, as they would need to physically steal the hardware wallet in order to do so.
    • A few examples of hardware wallets are Trezor or Ledger. Each have their pros and cons and come with different models. Some models have greater support for certain tokens, some have less.
    • Other items to consider when buying a hardware wallet is to buy straight from the vendor. Do not buy it from 3rd party websites as they may be tampered with. Always double check to ensure that your wallet is not tampered with at all.
    • Also, make sure you don’t store your seedphrase online in plain text. Big no no!
  2. Enable two-factor authentication: Two-factor authentication (2FA) adds an extra layer of security to your account by requiring you to enter a code that is sent to your phone or email in addition to your password. This makes it much harder for hackers to gain access to your account, even if they manage to guess your password.
    • A quick tip on 2FA. Ensure you have app authentication rather than SMS. SMS is prone to being sim swapped and you can lose your assets that way. Sim swapping generally happens when a thief / hacker knows a bit about you and contacts your mobile carrier. They could say things such as “i lost my sim, my sim doesn’t work etc”
    • For an in depth guide on sim swapping check out Mozilla explains Sim Swapping
  3. Use strong and unique passwords: Make sure to use strong and unique passwords for all of your accounts, including your cryptocurrency accounts. Avoid using the same password for multiple accounts, and consider using a password manager to help generate and store strong passwords for you. Strong passwords generally consist of upper case, lower case, numbers and special characters of a certain length.
  4. Keep your software up to date: Make sure to keep your software (including your operating system and any cryptocurrency-related software) up to date with the latest security patches. This helps to protect you against known vulnerabilities that hackers might try to exploit. An example of this could be an out of date chrome browser
  5. Be cautious when clicking links: Be careful when clicking on links, especially if you receive them via email or online. Hackers may try to trick you into giving them access to your account by sending you a link that looks legitimate but actually takes you to a fake website. This is notorious in discord where if you do not turn off private messages in public channels you will get bombarded with fake phishing attempts that want to drain your wallet. Always be careful as the messages declare some sort of urgency always with a link that looks very close to the original
  6. Avoid public WiFi: Avoid conducting sensitive transactions (such as logging into your cryptocurrency accounts or making trades) while connected to public WiFi. These networks are often unsecured and can be easily monitored by hackers.
  7. Enable recovery options: Enable recovery options such as phone number or email recovery in case you lose access to your account. This will allow you to regain access to your account if you lose your password or if your account is compromised.
  8. Be aware of social social engineering. Social engineering is when the attacker manipulates someone into letting their guard down or giving information they normally wouldn’t. This is very common on discord / crypto twitter. If it’s too good to be true, avoid it!
  9. If you still want to mint something and you’re unsure about it. Use a burner wallet. A burner wallet is easily created via metamask or your favourite wallet. Don’t have anything in the wallet and don’t give any permissions more than necessary. Don’t keep using it at all afterwards.

I hope these security tips help someone in the future. It’s always good to refresh each year as the need for higher security is going to get higher and higher as we onboard more individuals into web3 / crypto.

Related Articles

  • Understanding Throughput Meaning: A Comprehensive Guide

    Understanding Throughput Meaning: A Comprehensive Guide

    1. Introduction In the realm of agile software delivery, “throughput” is a critical metric that denotes the rate at which work is successfully completed over a given period. It serves as a vital indicator of team performance, process efficiency, and delivery responsiveness. As organizations increasingly adopt agile methodologies, understanding and optimizing throughput has become more…

    Read more


  • What is an Agile Coach and What Do They Do? An In-Depth Guide

    What is an Agile Coach and What Do They Do? An In-Depth Guide

    The Role and Impact of Agile Coaches in Modern Organizations: A Comprehensive Guide 1. Introduction In the dynamic landscape of software development and project management, Agile methodologies have emerged as a cornerstone for organizations seeking to enhance their responsiveness and adaptability. Agile is not merely a framework; it represents a cultural shift that prioritizes collaboration,…

    Read more


  • Why Does Adding More Developers Slow Down Development?

    Why Does Adding More Developers Slow Down Development?

    Executive Summary For senior technical leaders, the paradox of adding more developers to accelerate project timelines is a well-known phenomenon that often leads to the opposite effect. This comprehensive article delves into the intricacies of this issue, providing an in-depth analysis of the factors contributing to the slowdown in development as team sizes increase, and…

    Read more


Leave a Comment