Common security steps

Always enable two-factor authentication (2FA) function.

Don't keep cryptocurrency in exchange for a prolonged period or longer

than necessary.

If you go for a hardware wallet, choose a pin code which is hard to

guess, and never put your 24-word recovery sheet online.

Always assume that your devices can get compromised anytime, so always

treat your computer or smartphone screen with caution.


Popular posts from this blog

Check MySQL query history from command line