Selected by Chain News|A Essential Guide to Encrypted Aboriginal Security and Privacy (www.blockcast.cc)

Bitcoin’s social experiment brings the possibility of asset ownership returning to individuals, and it also brings a new challenge to asset security. Recently, Hugh Karp, the founder of DeFi insurance protocol Nexus Mutual, was hacked to lose 370,000 NXM tokens. In the face of the security of encrypted assets, this is true for experienced practitioners, not to mention ordinary users.
Fortunately, security and privacy issues have gradually attracted the attention of the industry, and builders have begun to think about and start to build more secure and private infrastructure. But as ordinary users, there are some encryption asset security skills we must master. This issue of Chain News summarizes the necessary security and privacy guidelines for residents of the encrypted world.
Overview of crypto asset security and privacy
“I Collection: A Collection of Tips and Cheats for Encrypted Asset Security Protection “
Nine encrypted asset security protection kits are given to Lianwen readers.
” Nakamoto Village has no clothes! It’s time to comprehensively evaluate blockchain privacy protection
“It took us 20 years to understand how serious the privacy problem of the Internet is. Now we should seriously consider privacy protection for the crypto world.”
” Cryptocurrency ≠ Anonymity, a detailed explanation of the basics of cryptocurrency privacy protection “
Privacy protection will be an important direction for the development of blockchain technology, and understand the most basic knowledge in one article.
” Three minutes to understand the working principle of the privacy trading tool mixer “
With the help of the data on the chain and the data analysis of the exchange, you can easily obtain your currency holding information and transaction information, and understand how the currency mixer can help you achieve private transfers.
Bitcoin
” Bitcoin is also evolving! Understand the main plans and development potential of Bitcoin privacy protection “
Dandelion, Schnorr, and Taproot starting from the underlying network, as well as the Liquid and Lightning networks explored on the second-layer network, are the main forces in building Bitcoin’s privacy protection function.
Ethereum and DeFi
” Ethereum Network Privacy Protection Practical Guide “
We have selected some simple and easy-to-use tools for you, which can immediately provide your Ethereum account with more difficult to track privacy protection capabilities.
” Teach you to master the practical skills of DeFi privacy protection “
The core one: decouple the transaction address from the identity link. This is essential.
” Using common cryptographic tools to decrypt the challenge of expanding privacy protection from ordinary transactions to smart contracts “
When it comes to expressive power, trust and efficiency, the exploration on the privacy protection of smart contracts raises many interesting theoretical and practical challenges.
IPFS
” IPFS lacks a privacy mechanism, how should users protect data privacy? 》
Users can prevent information leakage by using private IPFS networks, content encryption, and gateways.
Use wallet safely
” Hardcore丨Nine Ways to Teach You How to Use Hardware Wallets Safely “
From the two dimensions of technical security and human error, we will discuss 9 improvement points of hardware wallet security: full disconnection, multi-signature, security chip, etc.
” What is a software cold wallet? A brief analysis of the principle and security differences of software and hardware cold wallets “
Hardware cold wallets are the mainstream in the current market, but software cold wallets are more economical and flexible, and have a higher degree of trustlessness.
” These precautions for ensuring the security of encrypted assets through wallets, you need to know “
If something happens when your wallet is stolen, lost, or forgotten your password, there will never be another place for you to seek help, which is why it is important to take all necessary measures to ensure security.
Comments
Post a Comment