green frog on wood

Easy ways to predator-proof your crypto

To me, the North American Wood Frog is one of the great marvels of the world! When Winter comes and the frog first touches any ice, it sets off signals inside of its body to pull water away from the rest of its body and center it in a puddle around all its vital organs. That water is then turned into solid ice and freezes all its vital organs.

At this stage, there is no breathing. Its kidneys cease to function, and get this, its heart stops beating! There is literally no pulse! Somehow, it is able to flood itself with a type of glucose that works like an anti-freeze and keeps it still alive through the Winter. The frog comes to as close to death as you could ever get.

When the Spring begins to appear something miraculous happens. It begins to thaw out. Its pulse returns, and within about 10 hours it is back on its “frog legs” again. It jumps around as if winter didn’t even exist. This is truly remarkable!

Nature’s little marvels have so many built in ways to protect and secure themselves from the forces outside that could harm them. We mortals, many times do not have these “built in” mechanisms. Most of the time we have to work hard at protecting ourselves.

This is true if you want to keep your cryptocurrency secure. There is no computer, no online security system, no device that is totally 100 % full-proof. There are, however, many practical measures that a person can easily take to truly up the odds of never having your cryptocurrency stolen.

Consider these few simple and easily measures:

A Virtual Private Network(VPN) creates a secure computer connection to a separate network over the internet. A VPN will shield your browsing activity from hackers and onlookers spying in on you. In the viewing of hackers and spies it will appear as if you are logging in from a different city than you actually are—or even a different country. This makes it much more difficult for them to find you and hack you. You can subscribe to a VPN for as little as 10 cents per day.

Anti- Key Logger Software

An anti-keylogger (or anti–keystroke logger) is a type of software specifically designed for the detection of keystroke logger software. Often such software will also incorporate the ability to delete or at least immobilize hidden keystroke logger software on a computer.(Google)

Brave Browser

Brave Browser comes with a private window with TOR. TOR hides your IP address from the sites you visit, by routing your browsing through several TOR servers before it reaches your destination. The connections are encrypted, so your ISP or employer can’t see which sites you are visiting either. I

2FA 2 factor authentication. “Two-factor authentication (2FA) is a second layer of security to protect an account or system. Users must go through two layers of security before being granted access to an account or system” (Google). When trying to login to a website, the website will send a message to your email or phone with a one-time code. You will need that code to login. Some 2AF systems have an app using random codes that change every ten minutes.

Always look for the “https:” in front of the URL on the site you are visiting, especially when dealing with anything financial or crypto. Make sure you see the lock icon present somewhere on the website bar.

Keep passwords offline as much as possible. Do not store them anywhere in or on your computer. Copy them onto a piece of paper or a USB stick that you can quickly plug in and plug out. Change your passwords often. Always use long passwords with random phrases, numbers, and symbols.

Always be looking out for phishing emails. Don’t open or click on anything suspicious.

Don’t open an any email attachments from any source you don’t know and don’t click any unusual links in messages.

Never ever share your crypto private keys with anyone!

Use Cold Storage until you have to spend it or send your cryptos. Cold Storage consists of either Hardware Wallets or Paper Wallets. For your cold storage wallets, make up a PIN number a pin that is impossible to guess.

Do not leave any large amounts of crypto stored in an Exchange or mobile phone app. Use them like a transfer hub to buy or sell crypto, and then get your funds out of there as soon as possible.

Statistics show that somewhere in the world a hacker attacks a computer every 39 seconds. With a little forethought, and a few simple steps, most likely you will not have to fall prey to any of these cunning predators.

Like the frog who secures itself before the freezing hits, you can protect your cryptos, and you will enjoy the confidence knowing they are secure!

About the author

Jeff is a Compumatrix member and contributor who truly enjoys researching and learning about all things crypto. He believes that digital assets are the future of money.

Comments

  1. Good article Jeff. Nowadays digital security is of utmost importance, primarily when dealing with the crypto world. All of those tips should be followed carefully by people trying to sail those waters. And as computers become more and more powerful, we should also improve security like passwords. Passwords become more fragile over time because faster computers can break them much more easily and in less time. So to keep a password safe always remember to use a mix of letters (uppercase and lowercase), numbers, and symbols. And keep them stored in a safe place.

    1. Got two out of four suggestions in place! Love your nature facts as lead in to your main story….extra learning that is fascinating! I am going to print this out as a reminder to go through these check points. One suggestion to set up a long password is to create a story or theme that is pertinent to you and easy to remember…this has worked like a charm for me.

  2. Great article Jeff and important information we all need to take heed of and apply to keep our business info and our assets safe from over-reach and hacking. We must always be proactive in security and safety. It is to our benefit to know and apply as much as humanly possible all the ways there are to layer our protection.

  3. what a great read with so much great info — thank you Jeff P — it does fascinate me when i read and re-read so much info here — that we as a group need to make sure we as Individuals are keeping security and safety on each of our accounts a priority and we as a business group need to keep each other covered with good and true business practices — just great info and true and good thought process — imho

  4. Wow! That was an amazing story about the North American Wood Frog. Nature is amazing and that story was no exception. I went through your post, Jeff, and I checked off everything you have suggested to protect my crypto except the VPN. I still have not wrapped my head around using one. I guess I will have to learn at some stage. Other than that I am sorted and ready for any would-be hacker or thief!

  5. What a wonderful introduction to your article about safe crypto. Never knew this about the frog, amazing. I use at least two of the suggestions you mentioned and an extremely long computer-generated password. I never store anything on my computer. I want to look into Cold Storage/Wallets too! I also remember an article, or perhaps someone else told me to never brag, or tell others about your accounts other than immediate family, it can so easily slip to the wrong people in conversation. Thanks again Jeff for the information and the idea of a good introduction for one of my blogs.

  6. Some great suggestions. Security is up to the wallet holder. I find a great way to store crypto is via a paper wallet. Print out the QR and the key, Laminate it and then store it in a safe place. No one can access it without physically holding the paper. One thing I don’t like about USB type of hard wallets is they can fail. Living on a sailboat, A USB drive lasts about a year.

    Thanks for the article.

  7. What a great review on the protective mechanisms we all should heed and implement. The growing cryptocurrency theft and exchanges that periodically go down and heaven forbid, that someone runs off with the funds. You don’t think it will happen but it has. We have put a few of these mechanisms in place personally and professionally. But this is a good reminder that we may need to implement a few more. Thanks again for the review this was wonderful.

  8. Jeff thanks for the useful information. I never knew about the frog and that’s fascinating. These blogs and the discord have taught me many pearls in the past year. Just last week I downloaded Brave on my computer, based on a suggestion on discord. Thanks to you have a little more insight to the benefits of doing so.

  9. Thanks for the tips Jeffrey. Security has always been a priority for me. So I use a antivirus software, malwarebytes software, a vpn when I need one, 2Fa of course and for my cryptos a hardware wallet. I see no need for a Brave or Tor browser. Microsoft’s Edge Chromium performs well in the tests. With this package that I mentioned above I think I am good.

  10. Fantastic blog! There is never too much when it comes to safety in this crypto world. I hope everyone who is not ready will take the time and check the security they have already in place. Printing this blog out as Janis is doing as a reminder is a fantastic idea. With all the hackers waiting to pounce upon their prey at any time precautions need to be taken as quickly as possible.

  11. An excellent article. This information is useful to beginners as well as long time users of computers.It is surprising how many users do not learn anything regarding security of their hard earned crypto’s. As for changing passwords often,I would like to see that the DEX password could be changed regularly. To change the password in DEX is quite a complicated process and is a deterrent for many not to change it. Maybe some thing our DEV’s can work on in the future.

  12. An excellent article. This information is useful to beginners as well as long time users of computers.It is surprising how many users do not learn anything regarding security of their hard earned crypto’s. To change the password in DEX is quite a complicated process and is a deterrent for many not to change it. Maybe some thing our DEV’s can work on in the future.

  13. Bravo Jeff! I’m pleased to see a post on the subject of security here on this blog. You have provided an excellent overview of what everyone online should be doing to increase their security to protect themselves. Hackers are plentiful and their numbers are growing, along with their ill-gotten gains.

    They are very smart too, so we all need to do our best to decrease the availability of our information in as many ways as we can to avoid becoming victims. Thank you for posting this extremely important information for the benefit of all!

  14. I love your information but my mind operates in different cycles. If I understood computers as well as I could imagine different scenarios, I could really come up with some secure ideas. However, I don’t! My biggest concern is related to hardware wallets. I don’t know what the situation would be if something would happen to the company that produces them.

  15. I read this blog again and the security factors are just that simple but truly helps in the overall security of any of our features here — and I work diligently more so now than ever before on keeping cookies gone when i am on the net and try never to leave a trail as best as I can — also another factor is if act like you don’t have anything most will leave you alone — maybe not all but most — just 20+ years of being online — safe and secure is the way to go —

  16. Always do your own research, never stop learning, and always be worried about your online security. There are great resources to learn how to be your advocate. Never trust anything unsolicited, etc. We have to be personally responsible for ourselves in this world of cryptocurrency. There are no do overs and noone you can trust more than yourself.

  17. This article was very helpful is educating me on the new ways to protect my crypto. I feel like we always hear stories of people getting hacked and loosing their belongings and no one wants that to happen to them. It is good to hold ourselves accountable and learn as much as we can about different ways of protection. Although I knew and have been using some of these strategies, many of them were ones that I have never heard of and will definitely look into.

  18. Great over all, simple explanation of what one MUST do to keep their “business” as private as possible, Jeff. Once one starts the process, then we have to keep up. Everything changes so fast. Your top points are perfect for a beginner in crypto. And that frog story is pretty cool, too!

  19. Thank you very much for this blog Jeffrey. I know that security is important and also to protect my compter from being hacked. I know about some of the recommendations you do in your blog but some are new to me. I’ll take a closer look at the Brave browser. Maybe it is a browser that I also can start using.

  20. Very interesting about the frog never knew those facts,love the comparison to security of our cryptocurrency which is extremely important. Also I have never had a USB drive fail on me but that is why I keep several hidden, I guess living on the water would have that effect. Also deleting history is very important that is why the brave browser is very good to use it deletes automatically. It is a shame these hackers do not use there smarts for honest work I guess they just don’t realize they can. That is why everything should be de-centralized hacking is not possible unless you are very careless with your keys.

  21. Excellent article. Jeff has covered the most essential protective elements , to ensure our safety against hackers, who dont spare any opportunity to steal from everyone. Its so hard to earn crypto and so easy to lose it. So nice to find all these precautionary measures in one place, and at easy reach. We only require to apply them daily and keep ourselves secure from the enemy lurking on the outside.

  22. How easy is to lose something and how hard is to accept it.
    From a simple misplace or a forgetful password to a sophisticated planned hack.
    In Compumatrix we constantly remind our members to keep safeguard their username and password.
    Another form of security and privacy is to keep a low profile. You’re not bond to be targeted if the ones who attack don’t know you’re there or what you have.
    So follow Jeff suggested measure of security and protect your business

  23. Good tips on keeping our computers and cryptocurrencies safe and secure. I feel the ones who fail to see the need to put up strong walls with layers of protection woven in, will be crying the blues before they realize what happened. I like the frog reference too! Frogs are smart little creatures, they are small compared to other of God’s creation but have adapted very well in how to use their smallness to their advantage.

  24. As important as it is to use strong unique passwords, many are still using easy to remember passwords. Worse than that, they tend to use the same password for multiple accounts. Popular weak passwords include “123456”, “654321”, birthdays or anniversary dates, the word “password”, “password123”, “abc123”, and names of family members or pets. That outdated practice is dangerous and is practically an invitation to hackers to disrupt their lives!

    Using a good Password Manager is the easiest way to solve this problem. You can find them easily by doing a secure DuckDuckGo search (or an un-secure Google search) for “best-paid password managers” or search for “best free password managers”.

    IMHO using a paid password manager is the best approach. However, if you decide to use a free version, it will still increase your security much better than using a password manager provided by Chrome or Firefox or from any browser.

  25. I just keep learning and learning some more — it is just a great receiver of wisdom when you take time to read and and then put some of the practices or information into play — i know cookies are not a great way on a computer — but gotta admit my cookies I make they are pretty darn good — but anyways I am sincerely thankful for all who put in their knowledge and wisdom for some of us to grasp and learn — thank you rj

  26. Wow! Great info on the tree frog and how you applied it to our business and security. There is so much we do not know and so much to learn. My friend has schooled me on these security measures you mention,and I have them installed on my computer. With all the cyber attacks, it is critiial for us to have these in place. Your article is well written and on time. Thank you for explaining the need for security and for pointing them out in a concise manner.

  27. Great advice Jeff! Your informative facts about the frog was interesting too. Personally I never stopped to think how the frogs made it through the winter months…. Very much aware of having long and strong passwords, keeping them off the computer and the 2FA, but I will definately need to take note of the rest of the suggested security precausions.

  28. i recall coming across cold storage, namely paper wallets several years ago and thinking how hard it was to implement. I practised creating them, but could not get past what to do next. So now, several years down the track it does not seem that daunting any more, so the time must be right to take the next step in the learning process.

  29. Thanks Jeff! I appreciate your advice in this blog. I still have a lot to learn, but your blog gives me a starting point on the steps I should take. Reading about the security of your PC makes it easier to understand what needs to be done, especially with regard to cold storage and VPNs..

  30. the VPNs are a great informative part and cold storage and offline password storage are simple and very effective ways to secure your computer experience and I also find watching where you travel online is a part of the battle for secure voyages into the crypto world and cyber world — and I am now finding learning from experienced puter people on simple and trustworthy methods also put a level of peace in my online ventures–

  31. I’m focusing my comment on this critically important quote:
    “Keep passwords offline as much as possible. Do not store them anywhere in or on your computer. Copy them onto a piece of paper or a USB stick that you can quickly plug in and plug out…”

    Keeping your crypto wallet passwords offline is like putting your Bitcoin in cold storage, which is very smart! It is equally important to create multiple Backup Copies of your thumb drives!!! If you don’t have them, and something happens to your Only One, you could lose your passwords and control of your accounts forever.

    Don’t trust your DEX wallet password to ONE inexpensive plastic device. Use 3 or more, with identical info on them stored in different locations. I keep one on my keychain with my house and car keys, so it is always with me when I go out.

  32. This blog is crucial! Cryptocurrency members must understand that cryptocurrency is real money that needs to be protected! When I go to the mall I do not leave my purse on a food court table and walk to a store to go shopping – I protect my purse and carry it with me wherever I go. By making sure one’s cryptocurrency is secure and in “good hands”, they will thank themselves later because many people get hacked!

  33. I use a VPN for all things work-related and I also use a 2 factor authentication when logging in to do my emails, but I was not aware that I could be using these securities in relation to my crypto currencies. Thank you for the helpful advice – I will have to use it when doing stuff with my crypto currencies from now on. I typically let a trusted team handle my money, but I will try to get more involved as I learn more about crypto currencies (I just figure leave it up to the professionals – lol).

  34. I keep reading and reading and the information is so useful and I would not leave my wallet on a food court — sorry i do not use a purse lol but point is well taken offline security with all your cyber activity is just that Smart of a move and if you are fortunate enough to have crypto or online business affairs the more you keep high priority parts offline and secure place offline the better your chances are — success is success —

  35. Yes Kami. I also have a VPN software on my phone. I use it whenever I am using a cell phone app wallet or something like that. It would also protect your emails that are on your phone. There are little precautions that we all can take that I think will really help. With the vast network of knowledge we have through all the members here at Compumatrix, I think we will do well if we pay attention to other’s suggestions and findings. I love it when people post the scam alerts. Someone is looking out for us.

  36. Great advice Kevin. Passwords are super important to me, and I too do not just want to trust them to some device or piece of plastic as you say. Even if I have to have a big long password stored on something, I only try and leave it online for just a few seconds, enough to let it do what it needs to do and then get it off of there. The less exposure in my opinion is the safest.

  37. so much truth in the security factors — i do not have a great understanding of all that is available but am learning and VPN s and long secured offline passwords and with each week as it passes it just makes that much more sense to be as offline with all the pertinents each of us have in our businesses or computers or ?? just amazes me how great the writings are here —

Leave a Reply

Your email address will not be published. Required fields are marked *