Оценить:
 Рейтинг: 0

The Book about Cryptocurrency №1. Second edition expanded

Автор
Год написания книги
2023
<< 1 ... 3 4 5 6 7 8 9 >>
На страницу:
7 из 9
Настройки чтения
Размер шрифта
Высота строк
Поля

First steps in the world of cryptocurrencies

1. Creating an email on Google

If you are young enough, used to communicate via social networks and messengers and consider email something archaic and old-school, you will still need it when mastering Blockchain.

The best way to create an e-mail account is to use Google. You should not use mail.ru, yandex.ru and other portals.

Mail with the domain gmail.com is the safest today. You’d better register a new box, separate from other tasks, only for working with crypto.

2. Create a strong password

To create a password, it is best to use a password generator.

For example, the service: http://www.onlinepasswordgenerator.ru/ (http://www.onlinepasswordgenerator.ru/).

Here you can set the password parameters: number of characters, lowercase, uppercase letters, etc.

Clicking the «Generate» button will give you a choice of 10 strong passwords that are difficult to crack.

More password generator options:

http://passgen.ru/ (http://passgen.ru/)

https://randstuff.ru/password/ (https://randstuff.ru/password/)

https://www.passwordist.com/ (https://www.passwordist.com/)

Choose any of them and remember security at all times.

Save the generated password in a safe place. Periodically change the password on your mailbox.

It is desirable to use different passwords for different services.

3. Installing Google Authenticator

This is a special application that you put on your phone – «Android» or iOS, it is tied directly to your account, it can be tied to the exchange, mail, other services related to cryptocurrency, and so on.

You should definitely use it! It will be an additional protection of your mail and further access to those passwords that you have.

Using it is very simple.

In the settings of your gmail.com mail in the section «Accounts and Import» – «Change Settings» – «Password Recovery» there will be a tab «Two-step authentication». You select the Google tab. Then you’ll have a QR code, you scan it with your phone and a pre-downloaded app.

The program generates a new code every 30 seconds, so you’ll have to enter your username, password, and this code when you log into your email. It’s somewhat similar to two-factor authentication via SMS passwords, only in this case you get a second password through the Google app.

You can have multiple passwords here: for different exchanges, email, different wallets, etc.

This is an extremely useful thing that you should definitely take advantage of.

Don’t neglect your own security, otherwise you will lose your own or, even worse, someone else’s assets in an instant.

Part 2.

Crypto wallets

When man invented money as an equivalent of goods and services, at first it was simply kept in pockets, then wallets, sacks, chests, kegs and other containers appeared.

But, as you can see for yourself, gold coins or bills can be in circulation by themselves. Digital money, which in reality cannot be touched or tasted, cannot exist without wallets.

Basically, what is a digital wallet? It is a program or an encrypted and secure record of your account.

The program can be installed on your computer’s hard drive or on your smartphone. To conduct transactions, the program on the Bloxxhain network confirms its legitimacy and enters the transaction data into a registry.

We have already on the pages of this book talked about security and all the precautions you need to take when working with cryptocurrency.

Remember that the principle «don’t put all your eggs in one basket» is more relevant here than ever. It is desirable to distribute all your digital assets in different wallets, as force majeure, hackers’ attacks, your inattention can significantly empty your cryptocurrency account if it exists only in one place and only bitcoins are stored on it.

Where is cryptocurrency stored? Or the main types of wallets

According to the method of communication with the Blockchain system, wallets are divided into hot wallets (hot storage) and cold wallets (cold storage).

A hot wallet is usually downloaded to a computer or mobile device. These programs maintain a constant connection with the system, which allows all transactions to be carried out quickly. When there is no heavy load on the network, then even at the basic tariff (minimum commission to miners), the money goes a few minutes.

This type of wallet is vulnerable to hackers. Therefore, do not forget about security techniques, which you have already familiarized yourself with in the previous chapter.

This is a complex password, two-factor authentication and a 12-word code that you should memorize and keep in a safe place.

Remember: if you forget the code, you will lose all your savings on this wallet irrevocably.

In contrast to the hot wallet – cold wallet (cold wallet), due to the lack of constant connection with the network is better protected from hackers. This type of wallet is more suitable for storing savings. It is necessary to keep the key for access to the wallet on a separate carrier, which helps to avoid hacking.

A cold wallet is usually a piece of paper with keys printed on it – public and private.

The public key is the address to which you can send money. It looks like a set of symbols or a QR code. But you also have a private key, which allows you to withdraw money from your wallet.

Just in case we repeat once again: wallet keys should be guarded like the apple of your eye, because it will be impossible to recover them later.

By the way, according to various estimates, about 20% of keys are lost in the world now. Thus, the currency stored in wallets with lost keys is blocked. There is no access to it. This situation creates some scarcity (and you and I remember that the number of bitcoins is finite) and the ability to keep bitcoin at a fairly high level in terms of price.

Hardware wallets

Hardware wallets are compact gadgets for storing cryptocurrencies. A high degree of security is achieved due to the fact that private access keys are stored encrypted on this device. Several levels of protection, including pin code, make it as reliable as a safe in a Swiss bank.

The most popular hardware wallets are Ledger Nano, Trezor.

Let’s dwell on them in detail.

Trezor is used to store bitcoin. When installing the wallet, it will offer you a unique 24-word security key. It must be written down. If you lose the key, it will be impossible to access your funds.
<< 1 ... 3 4 5 6 7 8 9 >>
На страницу:
7 из 9