20 18 1 Coincheck, a Japanese cryptocurrency trading platform, was hacked and cryptocurrency worth 530 million dollars was stolen. This is the most famous cryptocurrency trading platform recently hacked. In addition:
1.2065438+In March, 2004, Mt.Gox was hacked and cryptocurrency worth 460 million dollars was stolen;
2.2065438+In August, 2006, Bitfinex was hacked and 72 million dollars worth of cryptocurrency was stolen;
3.2065438+In February, 2008, Bittgrail was hacked, and cryptocurrency worth $65438+70 million was stolen;
Storage selection
Many people will choose to leave all kinds of coins directly in the user's wallet provided by the platform after purchasing on the cryptocurrency trading platform. This is very convenient, because you can hand over the task of managing public and private keys to the trading platform, and you just need to remember your email account and login password. As the old saying goes, sometimes convenience is gained at the expense of safety. Although many trading platforms are trying to improve the security of their infrastructure, it is unwise to store encrypted currency in the platform wallet.
Therefore, we are here to provide you with some better choices. I hope that you will not leave encrypted currency in the user's wallet of the trading platform.
1. Hardware wallet:
This storage method requires offline physical devices to manage private keys, which is one of the forms of cold storage (no networking). Hot storage refers to those storage methods that need to be networked, such as storage on trading platforms or other online wallets. Hardware wallet is a relatively safe and novel storage method. At present, no theft of hardware wallet has been exposed. Therefore, we think that hardware wallet is the best choice to store encrypted currency at present. At present, the two most popular hardware wallets are Ledger Nano S and TREZOR.
2. Paper wallet:
Similar to hardware wallet, paper wallet is also a form of cold storage, that is, offline storage. Paper wallet refers to printing the public key and the private key on a piece of paper, and then putting them under your pillow (a place you feel safest), because protecting the security of the private key is the most important thing for you. But in this case, if someone else gets your paper wallet, it means that they will be able to completely control your cryptocurrency. At present, the most popular paper wallet in Ethereum and ERC20 is MyEtherWallet.
3. Desktop wallet:
As the name implies, a desktop wallet refers to a software client that is downloaded and run on a desktop computer. Compared with storing encrypted currency directly on the trading platform, desktop wallet is more secure. Because there is no need to access the network directly, the attacker still has the opportunity to steal the encrypted money from the desktop wallet by invading the target computer. This form corresponds to the cold storage, that is, the "hot storage", which is even more unsafe.
4. Mobile wallet:
Like the desktop wallet, the name "mobile wallet" is obvious. Mobile wallet refers to an application installed on a mobile device. But like the desktop wallet, the mobile wallet may also be attacked by hackers (this form corresponds to cold storage, that is, "hot storage", which is even more unsafe).
abstract
Everyone must be careful when managing cryptocurrency storage. Never put your "position" directly on the trading platform. Be sure to keep your private key. If possible, you can realize the cold storage of encrypted currency through hardware wallet or paper wallet. In addition, beware of phishing attacks or online fraud. Please be careful of every hyperlink and URL you encounter when surfing the Internet.
* reference source: hackernoon, compiled by FB Bian Xiao Alphah4ck, please indicate that it is from FreeBuf.COM.