How to protect yourself from recent "encryption attacks"

How to protect yourself from recent “encryption attacks” – Mail Bonus

There have been a number of “crypto attacks” in London recently, with thieves threatening violent crypto hackers unless they transfer their digital currencies stored in mobile phone wallets or cryptocurrencies.

As reported by The Guardian UK, crime reports from the London police analyze how thousands of dollars worth of cryptography have been stolen by thieves in person. One victim said that their phone had been taken out of his pocket while he was drinking and they later realized that more than $ 12,000 worth of Ethereum (ETH) had been downloaded from their account. The victims believe that the thieves witnessed entering their account needle.

A group searched for another victim who offered to sell him cocaine, and after moving to another location to buy the drugs, the man was held up against a wall while the gang entered his phone and cryptocurrency using face verification and transferred Ripple in cash. over $ 7,000 (XRP) in your own wallet.

This is an increasingly common variant of the so-called “$ 5 wrench attack”.

Because blockchain transactions are irreversible and most methods of storing cryptocurrencies are responsible for the security of the assets of the individual who owns them, Cointelegraph spoke with the blockchain security company BlockSec, who shared the following tips on how to protect cryptocurrencies against attack:

“Do not put a large amount of cryptography in your wallet or swap program. Leave only a small part there. You can have a multi-sig wallet and with a policy that says only two signatories can carry the money in the wallet. By doing so, only a small amount of cryptography will be lost during the attack.

BlockSec also suggested a way to deceive thieves if a cryptocurrency user is hijacked, saying that some smartphones may have different logins that can hide certain applications such as Huawei’s “PrivateSpace” features:

“The applications in ‘PrivateSpace’ are different from the main ones actually used. So if users are hijacked, they can go into ‘PrivateSpace’ which shows that they do not have any cryptocurrencies installed on their phone, or vice versa, can hide cryptocurrencies in this space.

Samsung phones have a similar feature called “safe folder” which can be used to hide all your cryptocurrencies behind PINs or passwords and the folder itself can also be hidden on the home screen.

On the Apple iPhone, you can move apps to one page on the home screen and hide them all at once, and there are more options like removing a single app from appearing on the home screen just to get through a search.

Cointelegraph also spoke with the pseudonymous Twitter user and independent security investigator known as the “CIA Officer” popular for creating and sharing guidelines and tips on how cryptographic users can tighten the security of their assets.

The CIA chief shared an article they wrote in April with 13 tips on the principles of cryptocurrency storage, saying:

“I wrote the article because my sense of justice just pushes me forward because maybe the biggest threat is cryptocurrency where people are just disappointed and go away forever.

In the article, the CIA Officer reminds that mobile wallets like MetaMask are only interfaces and recommends storing all cryptography on cold wallets like Ledger or Trezor instead of having it on a stock exchange or in a mobile wallet.

Connected: Warning: Smartphone text prediction guesses crypto hodler premiere

A physical storage device will hold all encryption offline and assets can only be transferred if someone has access to the wallet as well as knowing the PIN number and in some cases passwords. It can even be created using an old smartphone rather than using a special device.

The cryptography stored in the cold wallet can be further tightened on security, and the CIA Officer echoes BlockSec’s advice on setting up a multi-signature wallet that uses two or even three separate devices to accept transactions.

The CIA officer also shared his rules for OpSec cryptography, which shortens the “operational security” risk management process with the goal of preventing the leakage of sensitive information.

“You should build your own stone wall from OpSec, so you know exactly what to do if something happens.”

In light of the attacks, such OpSec measures involve keeping all cryptocurrencies completely secret. Potential thieves in the public arena could hear discussions or even witness a person’s cryptographic possession, as in the above case where the victim was abducted.

“Being suspicious is always a good thing,” writes a CIA officer.

Mail Bonus – #protect #encryption #attacks

Leave a Comment

Your email address will not be published.