Cryptocurrency User Security Tips for Air-Gapping Your Devices

2018-9-29 22:46

One of the biggest problems that budding cryptocurrency enthusiasts face is keeping their cryptos safe and secure. This has become increasingly important in the wake of cryptocurrency hacks attacks and stolen cryptos.

Between January and May 2018, over $1 billion in cryptocurrency was stolen by hackers. Many of these were stolen from exchanges that have decent security measures in place.

This begs the question: if the exchanges with all their security aren’t immune to hack attacks, how much more you? This is why you need to pay serious attention to your security.

While there are many security protocols, the one we’ll be addressing here is called the air-gap.

What Is The Air-Gap

This is the process of keeping the devices that have your wallets and cryptocurrencies disconnected from the internet. Otherwise called as cold storage, this is about the safest way to keep your cryptocurrency tokens safe and secure from security breaches.

Naturally, this means you would have to first move them out of all hot wallets, and transfer them to these cold wallets. Once done, you can then secure it keeping it away from the internet as well as deactivating its bluetooth, and Wi-Fi features too.

In case you’re wondering if having a private key isn’t enough security, we’re telling you it’s not. Hackers are getting more savvy and smart at logging into wallets and emptying them without needing the private keys.

These keys used to be the holy grail of security measures. Unfortunately, that’s no longer enough. You need more than that. Air-gapping can be an amazing addition to your security protocols, keeping your tokens safe and away from the prying eyes and long reach of hackers.

This is even more imperative for users with a large or high value cryptocurrency portfolio. While some folks recommend that air-gap only when your cryptos are valued at over $1 million, we recommend anything above $200,000. After all, that’s almost thrice the income you’ll need every year to reach something called the “happiness index”.

How To Air-Gap Your Cryptos And Computing Equipment Start by moving your tokens to a wallet Then get a thumb drive where you’ll need to move the wallet(s) to. You can also use hardware wallets like Ledger Nano S or Trezor. This is where you’ll move the wallet to Sign transactions sent to the thumb drive Inform the blockchain that the transaction involving the transfer of your cryptos to the USB dongle. Tips For Effectively Air-Gapping Your Devices Have a dedicated offline machine where your wallets are stored and one that you never connect to the internet. Any decent computing equipment should suffice. If you need any suggestions, try MacBook Air. They’re pretty decent. If not, any decent computer will do. Get a dedicated thumb drive and store your wallets on them. This should make it very easy to cold store your tokens as they can’t go online by themselves. You would have to plug them into a computer or mobile device to compromise them. Completely ensure that your device has no connections whatsoever to the internet. This means you’ll have to deactivate the computer’s wifi card too. Use a USB drive that’s solely for the purpose of air-gapping. This must not be used for anything else. Sometimes, flash drives come with autorun apps that can contain embedded malicious software. The best thing to do is either scan the flash drive before use with your antivirus or format the flash s it’s completely wiped of any app. Are Your Wallets And Tokens Completely Secure With Air-Gapping?

Truth is no matter your security protocols, chances are there will be some chink in your armor that could potentially leave you vulnerable.

Crypto security is as much about frustrating the malicious entity who is trying to steal from you. So, even if you put up all these measures, it might still be easy for a hacker to get access to your air-gapped system. How?

Human Intervention

One of the easiest ways to hack an air-gapped device is to have physical access to it. This means the hacker would have to find a way to access the computer or thumb drive. In both instances, the hacker can do this themselves or have someone else do it for them.

The mode of operation often involves either the installation of a keylogger or spyware on the computing device. This is even harder if the hacker is dealing with an individual who has a limit to the number of people who come and go in their private space.

The entities that need to be very concerned about this are companies and organizations with staff that come and go. All it takes is a little blackmailing or even switching thumb drives to get the hacker on the company’s intranet.

This is why smart security conscious companies keep their air-gapped devices in secure data centers or even offsite, and setup USB port blockers that only they can unblock. This way, even if an employee or member of staff is compromised, they still wouldn’t be able to access the machine.

Vulnerabilities In Computers

Of course, this would require the hacker to actively understand and know the where the computer is first. Still, hackers can hijack the computer’s speakers or microphones for the purpose of transmitting the necessary data to their home computer.

The only downside to this is the homing equipment that the data will be transferred to cannot be farther than 65 feet away from the computing equipment.

Conclusion

The reality is that while you can have a dedicated air-gapped computer, it’s often always better to use a USB stick instead. But if you’d rather use a computer, you can always take the security measures a step further by sandboxing the wallet on the air-gapped computer.

With a virtual machine installed on the computer, you can further insulate the wallets from any possible intrusions. This adds an extra layer of security to your air-gapped devices.

We know that this might seem a little extreme to beginners and people unfamiliar with crypto hacking events. But, if you’re trying to secure a lot of cryptos, we think these measures are smart and standard.

Similar to Notcoin - TapSwap on Solana Airdrops In 2024

origin »

Global Cryptocurrency (GCC) на Currencies.ru

$ 0 (+0.00%)
Объем 24H $0
Изменеия 24h: 0.00 %, 7d: 0.00 %
Cегодня L: $0 - H: $0
Капитализация $0 Rank 99999
Цена в час новости $ 0.0011838 (-100%)

cryptocurrency stolen cryptos exchanges between attacks wake

cryptocurrency stolen → Результатов: 114


Фото:

6 Reasons Why Bitcoin Price is Down — (And Some Positive News Too)

As the week comes to a close, let us reflect on and digest all the news — most of which was negative, that happened in the cryptocurrency arena affecting Bitcoin price. Oh Look, Another Exchange Hack Tuesday evening, popular South Korean cryptocurrency exchange Bithumb reported a system breach that resulted in approximately $31 million worth of cryptocurrencies being stolen.

2018-6-24 23:00


Фото:

Coinrail Hack See’s Markets Crash As $40 Million Stolen

The markets are down this morning in the wake of an alleged $40 Million hack of South Korean cryptocurrency exchange, Coinrail. Given current political activities within Singapore (the summit involving both the US President and the Leader of North Korea) we did expect the markets to be a little shaky this morning, the current view however is far worse than we expected.

2018-6-11 12:00