SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
Storing Tokens Securely
Ways of storing tokens
Exchanges - QuadrigaCX, Binance, Bittrex
Hardware wallets - Trezor, Ledger
Software wallets - Jaxx, Exodus, MetaMask
Paper wallets - bitaddress.org
General advice
● Generally, seek to hold your own private key, or you don't technically own
the token
● Don't hold more than 15% of portfolio in any single location, unless maybe
a hardware wallet
● Be weary of holding too much USD tether (more than 20% of portfolio)
● Double check destination address / dont send ETH from exchange to
exchange or ICO
● Use VPN on public networks - NordVPN
● Use a firewall (especially on Windows) - LittleSnitch
Authentication
Multisig
● Baked into Bitcoin
● Ethereum uses Smart Contract
Exchange safety
Notable hacks: MtGox, BTC-E, Bitfinex, Bitstamp
Refer to Exchange Breakdown in Crypto Sheet:
https://docs.google.com/spreadsheets/d/1rahak4f3iRR8gdzGqLMOrKBs949m
OK1VwT3v0r46VX8/edit#gid=1531924450
Use 2-factor authentication (2FA) + IP whitelisting
Beware SMS auth - forgable
Beware backup email without 2FA
Software wallet
More secure than an exchange
iOS more secure than alternatives due to security constraints
Windows most compromisable
Android also compromisable without TEE chip (Trusted Execution
Environment) (Rivetz)
Hardware wallet (get one)
Uses a double chip system so that the chip signing your transactions cannot
expose your keys
There are a number of ways to check the authenticity of your device:
● Refer to manufacturer for up-to-date instructions
● Check packaging
● Check broken seal
● Use verification software
● Always change default seed
Paper wallets
Clone open source project
1. Disconnect internet
2. Restart computer
3. Generate keys
4. Restart computer
5. Connect internet
Brain wallet = memorizing a passphrase
Investing safety
Don't click on links you don't know - the link could be malicious (EtherDelta XSS
attack)
Use multiple addresses just incase one is compromised
Hardware wallets make this easy as you can use a different password to login
(ie the ICO name), giving you an entirely new wallet
Physical security
xkcd <3
Eric Muyser
Organizer @ Crypto Vancouver
Director @ Hyperbridge Technology
@ericmuyser

Contenu connexe

Tendances

talk-ta3m-crypto-tools-workshop
talk-ta3m-crypto-tools-workshoptalk-ta3m-crypto-tools-workshop
talk-ta3m-crypto-tools-workshop
Steve Phillips
 

Tendances (7)

talk-ta3m-crypto-tools-workshop
talk-ta3m-crypto-tools-workshoptalk-ta3m-crypto-tools-workshop
talk-ta3m-crypto-tools-workshop
 
Video Conferencing over WebRTC
Video Conferencing over WebRTCVideo Conferencing over WebRTC
Video Conferencing over WebRTC
 
7z password unlocker
7z password unlocker 7z password unlocker
7z password unlocker
 
Introducing Cloakcast
Introducing CloakcastIntroducing Cloakcast
Introducing Cloakcast
 
File Encryption
File EncryptionFile Encryption
File Encryption
 
[2010 CodeEngn Conference 04] window31 - Art of Keylogging 키보드보안과 관계없는 키로거들
[2010 CodeEngn Conference 04] window31 - Art of Keylogging 키보드보안과 관계없는 키로거들[2010 CodeEngn Conference 04] window31 - Art of Keylogging 키보드보안과 관계없는 키로거들
[2010 CodeEngn Conference 04] window31 - Art of Keylogging 키보드보안과 관계없는 키로거들
 
Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017
Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017
Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017
 

Similaire à Secure Token Storage

Io t slides_iotvillage
Io t slides_iotvillageIo t slides_iotvillage
Io t slides_iotvillage
agmoneyy
 
Web3 Security: The Blockchain is Your SIEM
Web3 Security: The Blockchain is Your SIEMWeb3 Security: The Blockchain is Your SIEM
Web3 Security: The Blockchain is Your SIEM
Tal Be'ery
 
Shytikov on NTLM Authentication
Shytikov on NTLM AuthenticationShytikov on NTLM Authentication
Shytikov on NTLM Authentication
shytikov
 

Similaire à Secure Token Storage (20)

5 ways
5 ways5 ways
5 ways
 
gething started - ethereum & using the geth golang client
gething started - ethereum & using the geth golang clientgething started - ethereum & using the geth golang client
gething started - ethereum & using the geth golang client
 
Getting Started in Web3 with MetaMask.pptx
Getting Started in Web3 with MetaMask.pptxGetting Started in Web3 with MetaMask.pptx
Getting Started in Web3 with MetaMask.pptx
 
Io t slides_iotvillage
Io t slides_iotvillageIo t slides_iotvillage
Io t slides_iotvillage
 
What is Multisig? - Meetup #7 - 2022-12-08
What is Multisig? - Meetup #7 - 2022-12-08What is Multisig? - Meetup #7 - 2022-12-08
What is Multisig? - Meetup #7 - 2022-12-08
 
Tucson Blockchain Dev Meetup - Unchained Capital's Multisig Ethereum Contract
Tucson Blockchain Dev Meetup - Unchained Capital's Multisig Ethereum ContractTucson Blockchain Dev Meetup - Unchained Capital's Multisig Ethereum Contract
Tucson Blockchain Dev Meetup - Unchained Capital's Multisig Ethereum Contract
 
Top 10 tricks to keep your bitcoin wallet safe
Top 10 tricks to keep your bitcoin wallet safeTop 10 tricks to keep your bitcoin wallet safe
Top 10 tricks to keep your bitcoin wallet safe
 
Cryptocurrencies Hardware Wallets - 33C3 Bitcoin Assembly
Cryptocurrencies Hardware Wallets - 33C3 Bitcoin AssemblyCryptocurrencies Hardware Wallets - 33C3 Bitcoin Assembly
Cryptocurrencies Hardware Wallets - 33C3 Bitcoin Assembly
 
FIWARE Wednesday Webinars - How to Secure IoT Devices
FIWARE Wednesday Webinars - How to Secure IoT DevicesFIWARE Wednesday Webinars - How to Secure IoT Devices
FIWARE Wednesday Webinars - How to Secure IoT Devices
 
Identity and the quest for Self-Sovereign Identity - Daniel Hardman
Identity and the quest for Self-Sovereign Identity - Daniel HardmanIdentity and the quest for Self-Sovereign Identity - Daniel Hardman
Identity and the quest for Self-Sovereign Identity - Daniel Hardman
 
Block chain
Block chainBlock chain
Block chain
 
Web3 Security: The Blockchain is Your SIEM
Web3 Security: The Blockchain is Your SIEMWeb3 Security: The Blockchain is Your SIEM
Web3 Security: The Blockchain is Your SIEM
 
Shytikov on NTLM Authentication
Shytikov on NTLM AuthenticationShytikov on NTLM Authentication
Shytikov on NTLM Authentication
 
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsA Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
 
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsA Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
 
How to Create a Crypto Wallet in 2023.pdf
How to Create a Crypto Wallet in 2023.pdfHow to Create a Crypto Wallet in 2023.pdf
How to Create a Crypto Wallet in 2023.pdf
 
Rapport ICO Rating
Rapport ICO RatingRapport ICO Rating
Rapport ICO Rating
 
Securing your Cloud Environment v2
Securing your Cloud Environment v2Securing your Cloud Environment v2
Securing your Cloud Environment v2
 
BLOCKSAFE WHITEPAPER
BLOCKSAFE WHITEPAPERBLOCKSAFE WHITEPAPER
BLOCKSAFE WHITEPAPER
 
Wallet from noob to pro
Wallet from noob to proWallet from noob to pro
Wallet from noob to pro
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Secure Token Storage

  • 2. Ways of storing tokens Exchanges - QuadrigaCX, Binance, Bittrex Hardware wallets - Trezor, Ledger Software wallets - Jaxx, Exodus, MetaMask Paper wallets - bitaddress.org
  • 3. General advice ● Generally, seek to hold your own private key, or you don't technically own the token ● Don't hold more than 15% of portfolio in any single location, unless maybe a hardware wallet ● Be weary of holding too much USD tether (more than 20% of portfolio) ● Double check destination address / dont send ETH from exchange to exchange or ICO ● Use VPN on public networks - NordVPN ● Use a firewall (especially on Windows) - LittleSnitch
  • 4. Authentication Multisig ● Baked into Bitcoin ● Ethereum uses Smart Contract
  • 5. Exchange safety Notable hacks: MtGox, BTC-E, Bitfinex, Bitstamp Refer to Exchange Breakdown in Crypto Sheet: https://docs.google.com/spreadsheets/d/1rahak4f3iRR8gdzGqLMOrKBs949m OK1VwT3v0r46VX8/edit#gid=1531924450 Use 2-factor authentication (2FA) + IP whitelisting Beware SMS auth - forgable Beware backup email without 2FA
  • 6. Software wallet More secure than an exchange iOS more secure than alternatives due to security constraints Windows most compromisable Android also compromisable without TEE chip (Trusted Execution Environment) (Rivetz)
  • 7. Hardware wallet (get one) Uses a double chip system so that the chip signing your transactions cannot expose your keys There are a number of ways to check the authenticity of your device: ● Refer to manufacturer for up-to-date instructions ● Check packaging ● Check broken seal ● Use verification software ● Always change default seed
  • 8. Paper wallets Clone open source project 1. Disconnect internet 2. Restart computer 3. Generate keys 4. Restart computer 5. Connect internet Brain wallet = memorizing a passphrase
  • 9. Investing safety Don't click on links you don't know - the link could be malicious (EtherDelta XSS attack) Use multiple addresses just incase one is compromised Hardware wallets make this easy as you can use a different password to login (ie the ICO name), giving you an entirely new wallet
  • 11. Eric Muyser Organizer @ Crypto Vancouver Director @ Hyperbridge Technology @ericmuyser