Template:Prevention:Individuals:Always Verify Executables: Difference between revisions
Jump to navigation
Jump to search
m (Azoundria moved page Template:Prevention:Individual:Always verify executables to Template:Prevention:Individual:Always Verify Executables: Title casing.) |
m (Azoundria moved page Template:Prevention:Individual:Always Verify Executables to Template:Prevention:Individuals:Always Verify Executables: Easier to remember.) |
(No difference)
| |
Revision as of 13:37, 1 March 2023
Any time untrusted software is being run is an opportunity for abuse. It is recommended to always interact with cryptocurrency in a fully controlled environment, which is an environment where you have understanding of every piece of software running there. Using a hardware wallet, spare computer with all software wiped, and/or virtual machine with only the needed software greatly reduces your attack surface. Take the time to verify downloaded files come from the correct and expected source and match available hashes if provided.