557d
How do you keep your coins safe?
  557d
exchanges are okay, depending on quant stored
  557d
otherwise trezor, ledger, paper wallet / cold wallet made offline
  490d
Head's up there's been a biggish Jenkins vuln released (https://jenkins.io/security/advisory/2018-07-18/).
  485d
For discussion. https://goo.gl/7vt8Du " JUL 18 Google: Security Keys Neutralized Employee Phishing". Krebs.
  485d
I memorized the seed, I will take my crypto with me to the grave. Hardware wallet is the easiest. Offline Cold-Wallet generation and optional "view-only" wallet.
  485d
If you take your crypto to the grave, Technically the value will be shared amongst everyone equally, as the value will be locked into the system and make everyone else incrementally richer.
  485d
Ask not for whom the bells tolls, for it tolls for the increased purchasing power of all wallets.
  485d
😄technically true is the best true
  485d
Unless you are right in every way expect one small technical one, then it becomes the worst kind of right.
  485d
I have several backups of my private keys encrypted with EncFS, is it enough?
  485d
Seeds/Keys are best kept on devices that are not online, but if you have them in an encrypted container not accessed online then you are probably safe ish.
  485d
The challenge is that if there is some variant of input log at some time, whatever methods you use to encrypt the storage will also be logged, that is unlikely but possible.
  485d
https://goo.gl/FvZejB CVE-2018-10903 Update your python-cryptography packages.
  477d
https://goo.gl/3uejuD "NSA hasn’t closed security windows Snowden climbed through"
  474d
https://goo.gl/sxu2GU "Reddit Breach Highlights Limits of SMS-Based Authentication" Krebs : Summary stop using SMS 2FA
  469d
https://usn.ubuntu.com/3733-1/ GPG Vulnerability could leak private keys to a local attacker. Patch especially if you rely on gpg.
  442d
https://goo.gl/82qmMq "For 2nd Time in 3 Years, Mobile Spyware Maker mSpy Leaks Millions of Sensitive Records." Krebs
  15d
Just heard on the news that hackers can use laser pointers to take over your voice controlled devices.