Compare commits

...

2 Commits

Author SHA1 Message Date
Officer | officercia 912eb69311
Update README.md
Added: https://thecharlatan.ch/List-Of-Hardware-Wallet-Hacks
2023-05-25 23:05:48 +03:00
Officer | officercia 17dcc2ea90
Update README.md
Added: https://github.com/amnesica/KryptEY
2023-05-25 22:57:39 +03:00
1 changed files with 10 additions and 0 deletions

View File

@ -295,6 +295,11 @@ Hardware-based 2FA options are regarded as more secure than phone-based OTP opti
Cold storage, and separate “hot” wallet. Use multisig ([gnosis-safe.io](https://gnosis-safe.io) as example) or at least a hardware wallet. Never store your seed phrase digitally. Seed phrases are intended to be stored on the paper card included with hardware wallets! That means never type it up, store it online, or take a photo of the card. Store your key on hard device.
- [List of Hardware Wallet Hacks](https://thecharlatan.ch/List-Of-Hardware-Wallet-Hacks/)
- [Another List](https://docs.google.com/spreadsheets/d/13d5xnVa2PlhzNLAxvvufRCT1fpDbnByI3UOf276zYZ0/edit?pli=1#gid=1518841983)
- [walletcompare.xyz/](https://walletcompare.xyz/)
- [walletscrutiny.com](https://walletscrutiny.com/)
<details>
<summary>Expand</summary>
<br />
@ -516,6 +521,7 @@ Avoid installing any third-party software, including single-player and multiplay
Be careful about using your real home address online for delivery purposes. Data breaches are now a daily occurrence, and many breaches include customer names and addresses. Your physical address is not as easily changeable as a phone number or email address, so be especially mindful about where you use it on the Internet.
- [DefaultCreds CheatSheet](https://github.com/ihebski/DefaultCreds-cheat-sheet/)
- [Physical crypto attacks](https://github.com/jlopp/physical-bitcoin-attacks/blob/master/README.md)
- [About If you want know, who use your computer when you are not nearby - PC Mouse Tracker](https://github.com/iterweb/watcher)
@ -619,6 +625,10 @@ Be smarter. Most likely in the future we will all have to face [AI](https://shar
Whatever you do, do it with some element of randomness. If you find it hard to comprehend, then put it in the hands of playing cards or [random.org](https://random.org). Do you transfer an amount? Send not an even (1000, 100, 50, etc.) or similar value, and so on. I think you get my point. Once again, be smarter, for example: there is a tool like [Ethereum alarm clock](https://blog.chronologic.network/tutorial-using-the-ethereum-alarm-clock-cli-63cd1e6416be) ([2](https://www.ethereum-alarm-clock.com/)), but you have to remember to use it [with caution](https://www.theblock.co/amp/post/178418/ethereum-alarm-clocks-smart-contract-is-being-targeted-by-exploiters).
- [The Wiretap: How The FBI Digs Up Deleted WhatsApp Messages](https://www.forbes.com/sites/thomasbrewster/2023/05/23/the-wiretap-fbi-digs-up-deleted-whatsapp-messages/)
- [anonymousplanet.org](https://anonymousplanet.org/)
- [Android keyboard for secure E2EE communication through the signal protocol in any messenger](https://github.com/amnesica/KryptEY)
Maybe you can come up with your own solution based on [logic bomb](https://github.com/starius/logic-bomb/blob/master/logic_bomb.c) and [canarytokens.org](https://canarytokens.org) with [tenderly.co](https://tenderly.co)! The tool previously described [has been hacked](https://www.theblock.co/amp/post/178418/ethereum-alarm-clocks-smart-contract-is-being-targeted-by-exploiters), use with caution and only if you know what you are doing. You can use [Escrow](https://github.com/JackBekket/escrow-eth/blob/master/contracts/EscrowAdvansed.sol) and [Multisig](https://gnosis-safe.io) as a substitute for this.
> [Steganography](https://officercia.mirror.xyz/8ecJG-s_5E6J1t-h8gUNGqV3hbX8If-E5NnrFrOJHUA) and Cryptography can also be combined for this purpose. After all, cryptography hides information, whereas steganography masks the fact that it was transmitted. For example, if you stenographically double-encrypt your passwords and store them in a cloud-based password manager, hackers (even if the vault is decoded or hacked) will be unable to use them as they will need your [stega-key](https://www.edureka.co/blog/steganography-tutorial) for this. You would, however, have to decrypt each password each time you are using it, with a special note.