Difference between revisions of "Wallet Security Dos and Don'ts"
(→Don't: generated => had access to) |
(→Don't: warning regarding untrustworthy devices) |
||
Line 11: | Line 11: | ||
== Don't == | == Don't == | ||
+ | * DO NOT trust an untrustworthy device or program to generate your wallet keys | ||
* DO NOT generate cold storage keys on Internet-connected machines. | * DO NOT generate cold storage keys on Internet-connected machines. | ||
* DO NOT reconnect to the Internet a machine that has had access to cold storage keys. | * DO NOT reconnect to the Internet a machine that has had access to cold storage keys. |
Revision as of 12:39, 22 January 2017
This article should not be considered as a replacement for the more in-depth articles on best practices, however key points in wallet security:
Do
- DO encrypt your wallet with a strong passphrase
- DO backup your wallet
- DO use recommended software from the list at https://bitcoin.org/en/choose-your-wallet
- DO keep your OS up to date and run a virus scanner
- DO store significant amounts in offline wallets (cold/paper/hardware)
Don't
- DO NOT trust an untrustworthy device or program to generate your wallet keys
- DO NOT generate cold storage keys on Internet-connected machines.
- DO NOT reconnect to the Internet a machine that has had access to cold storage keys.
- DO NOT reuse a wallet encryption passphrases with online services
- DO NOT store your wallet on cloud storage (Dropbox, etc.)
- DO NOT re-use addresses (this also applies to paper wallet addresses)