Wallet Security Dos and Don'ts: Difference between revisions
Jump to navigation
Jump to search
→Don't: generated => had access to |
→Don't: warning regarding untrustworthy devices |
||
Line 11: | Line 11: | ||
== Don't == | == Don't == | ||
* DO NOT trust an untrustworthy device or program to generate your wallet keys | |||
* DO NOT generate cold storage keys on Internet-connected machines. | * DO NOT generate cold storage keys on Internet-connected machines. | ||
* DO NOT reconnect to the Internet a machine that has had access to cold storage keys. | * DO NOT reconnect to the Internet a machine that has had access to cold storage keys. |
Revision as of 12:39, 22 January 2017
This article should not be considered as a replacement for the more in-depth articles on best practices, however key points in wallet security:
Do
- DO encrypt your wallet with a strong passphrase
- DO backup your wallet
- DO use recommended software from the list at https://bitcoin.org/en/choose-your-wallet
- DO keep your OS up to date and run a virus scanner
- DO store significant amounts in offline wallets (cold/paper/hardware)
Don't
- DO NOT trust an untrustworthy device or program to generate your wallet keys
- DO NOT generate cold storage keys on Internet-connected machines.
- DO NOT reconnect to the Internet a machine that has had access to cold storage keys.
- DO NOT reuse a wallet encryption passphrases with online services
- DO NOT store your wallet on cloud storage (Dropbox, etc.)
- DO NOT re-use addresses (this also applies to paper wallet addresses)