Wallet Security Dos and Don'ts (Windows): Difference between revisions
Jump to navigation
Jump to search
Add disclaimer at the top. |
m Refactored in transcluded files |
||
(One intermediate revision by one other user not shown) | |||
Line 1: | Line 1: | ||
{{:Wallet Security Dos and Don'ts (intro)}} | |||
== In general == | |||
{{:Wallet Security Dos and Don'ts (general)}} | |||
== When using Windows specifically == | |||
*'''Do''' use [http://www.truecrypt.org/docs/?s=keyfiles keyfiles] to encrypt your wallets | |||
*'''Do''' use [http://www.truecrypt.org/docs/?s=keyfiles keyfiles] to encrypt your wallets | |||
*'''Do''' use a good antivirus and firewall, and keep them up to date (but understand their limitations). | *'''Do''' use a good antivirus and firewall, and keep them up to date (but understand their limitations). | ||
*'''Do''' | *'''Do''' keep your installed programs updated to the latest version. | ||
*'''Do''' uninstall all programs that you don't use regularly. | *'''Do''' uninstall all programs that you don't use regularly. | ||
*'''Do''' run programs from questionable sources inside a virtual machine, such as [http://www.virtualbox.org/ VirtualBox]. | *'''Do''' run programs from questionable sources inside a virtual machine, such as [http://www.virtualbox.org/ VirtualBox]. | ||
Line 66: | Line 20: | ||
*'''Do''' connect the bitcoin client and IRC via [[Tor]]. | *'''Do''' connect the bitcoin client and IRC via [[Tor]]. | ||
[[Category:Instructional]] | [[Category:Instructional]] | ||
[[Category:Security]] | [[Category:Security]] | ||
[[es:Qué se debe y qué no se debe hacer respecto a la seguridad del monedero (Windows)]] |
Latest revision as of 19:18, 2 December 2013
[Note - There are varying levels of security appropriate for the level of risk. The following might be general recommendations for consumer-level risks. Service providers and large investors requiring enterprise level security might have a very specific list of Dos and Dont's that varies from this list.]
In general
- Don't keep all your bitcoins in one wallet.
- Don't develop a carefree attitude towards wallet security. Handle bitcoins with the same amount of diligence as you handle physical cash.
- Don't use a password for wallet encryption that you use elsewhere on the web.
- Don't use weak passwords. If a password is easy to remember without rehearsal, it is probably weak.
- Don't forget your passwords. If you write them down on a piece of paper, keep that piece of paper in safe storage (safety box, etc.).
- Don't run bitcoin wallet software on an untrusted or badly maintained machine.
- Don't run software that has been copied illegally (eg, "warez")
- Don't send bitcoins to a wallet that hasn't been backed up beforehand.
- Don't send unencrypted copies of your wallets over the Internet.
- Don't store unencrypted copies of your wallets on online backup/storage services.
- Don't run or install programs from questionable sources on the system where you are running bitcoin wallet software.
- Don't insert any devices of doubtful origin.
- Don't store unencrypted copies of your wallets on a device that you insert into machines of friends, at work, or while traveling.
- Do wipe your HD and perform a clean OS install if you believe your computer has been compromised.
- Do keep at least one offline savings wallet.
- Do backup your spending wallet regularly.
- Do keep dated versions of each backed up wallet.
- Do encrypt all wallets as soon as they leave your system.
- Do keep encrypted backups of all your wallets in at least 3 physically separate locations.
- Do use strong, unique passwords to encrypt your wallets.
- Do update your operating system with the latest security patches.
- Do invest time and money in order to secure any large number of bitcoins you may have, just like you would with other valuables. If you lack the technical expertise, ask or pay somebody else to do it for you.
When using Windows specifically
- Do use keyfiles to encrypt your wallets
- Do use a good antivirus and firewall, and keep them up to date (but understand their limitations).
- Do keep your installed programs updated to the latest version.
- Do uninstall all programs that you don't use regularly.
- Do run programs from questionable sources inside a virtual machine, such as VirtualBox.
- Do browse questionable websites from inside a virtual machine.
- Do connect the bitcoin client and IRC via Tor.