|
Learning about cryptocurrency, its technology and others is not enough if the technical knowledge of how to stay safe is not well understood. People have had their entire life savings drained right in front of them while they remained powerless.
Practising safety precautions in the crypto ecosystem will enable you to enjoy what you have laboured for. In our context today, we will take a look at how to stay safe in your journey and interactions across wallets, dApps and other protocols.
|
The crypto ecosystem is designed to be decentralized as much as possible such that you are in total control of your assets and can determine what to do with them and where to use them at any point in time, without waiting for any approval from an outsider.
Your wallets unlike the conventional bank accounts may not require the interference of an intermediary that estimates your transaction and gives approval to pass them on or reject them, except in centralized exchanges (with a central body). It is important to know that if your entire wallet security lies in your hand and an attacker has access to it, that may be the end.
In essence, you are the sole owner and protector of your crypto assets and it is required to do the job to your very best. Beginners guide here on Steemit must have guided you on security on STEEM which walks you through numerous ways to practice safety throughout your interaction with the Steem ecosystem.
Steemit is a decentralized ecosystem and the creation of your wallet comes with the generation of private keys that are the main locks to your account and wallet. These keys are meant to be kept safe to yourself and not shared with anyone. Has your recruiter after your account creation ever asked you to share your keys with him/her before? If yes, it is worth reporting such acts. On your end, never ask your friends or recruits to share their keys with you.
Private keys to wallets in the crypto ecosystem are meant to be known by a person, the owner except in a few situations where an organization or group of friends are managing a multi-sig wallet for adequate consensus of what transaction originates from a wallet. This type, multi-sig can be operated by more than a person, 2 or 3 or even more cosigners. You can read this article for a practical example of how multi-sig works - Account Abstraction in Blockchain.
We have talked about a certain category of wallets in the crypto ecosystem to be centralized and decentralized wallets, each with a unique method of operation and security. We will look into this in the next section.
|
In the crypto ecosystem, there is an existence of central bodies to manage transactions on some protocols, even though cryptocurrency is built on a distributed ledger technology to keep users in control and ensure transparency across chains.
The most common central bodies in cryptocurrency are the crypto exchanges. These bodies manage your accounts with them and when you initiate a transaction, they decide on what permission to give at any point in time. Some of the popular ones are Binance, CoinBase, KuCoin, ByBit, Mexc, Roqqu, Bitmart, Bittrex, HTX and so on, depending on your region.
Some of the things to know about these central bodies are:
Decentralized ownerships are the privileges you enjoy when you own decentralized wallets and store your assets in them. We have highlighted certain decentralized wallets before, like Steemit Wallet, Metamask, Trust Wallet, TronLink, Near Wallet, Avocado Wallet, Phantom, Soflare and so on, each on its distinctive chain compatibility and some, exhibits cross-chain.
The creation of these wallets hands over the ownership to you at the point of account creation and you remain the sole ruler over it henceforth. There are a few things to know about these types of wallets and some are:
The two groups discussed above have their distinctive good and bad sides, it's the duty of a user to choose ohat suits him/her the most.
|
It is important to know some of the ways to enhance the security of one's wallet, especially the latter wallet type discussed in the last section. Regardless of what category of wallet, these are some of the ways to protect your wallet:
The list on how to stay safe remains endless and we can go on and on. In the subsequent series, we will be looking at some of the ways scammers utilize to lure asset owners.
|