Showing results for tags 'security'. - CryptoTalk.Org Jump to content

Search the Community

Showing results for tags 'security'.

The search index is currently processing. Current results may not be complete.


More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Crypto
    • About Forum
    • For Beginners
    • Chia Mining
    • Crypto World
    • Coins / Tokens Talk
    • NFTs & collections
    • Bounties
    • Exchanges
    • Defi
    • Trading
    • Marketplace
    • ICO/IEO's
    • Mobile Apps
    • Wallets
    • Tutorials
    • Mining
    • Services
    • Jobs
    • Artificial Intelligence (AI)
    • Referral Links
    • Gambling/HYIP's/FreeCoins
    • Off Topic
  • Russian
    • О Форуме
    • Новички
    • Chia Майнинг
    • Крипто Мир
    • Монеты / Токены
    • NFT & коллекции
    • Баунти кампании
    • Биржи криптовалют
    • Обменники
    • Defi
    • Трейдинг
    • ICO/IEO's
    • Мобильные Приложения
    • Кошельки
    • Инструкции
    • Майнинг
    • Услуги
    • Работа
    • Искусственный интеллект (ИИ)
    • Игры / Хайпы / Краны
    • Купить / Продать
    • Реферальный раздел
    • Оффтопик

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


BTC


ETH

Found 16 results

  1. Двухфакторная аутентификация (2 FA) - это дополнительные параметры безопасности для входа на тот или иной проект При регистрации в проекте, многие просят установить данную опцию безопасности Используется несколько вариантов: смс подтверждение, либо через приложение, которое генерирует рандомные шестизначные коды каждые 30 секунд Многие пользуются Google Authenticator, для установки двухфакторной аутентификации. При установке 2FA через данное приложение, проект предоставляет штрих код, который требуется отсканировать через Google Authenticator В дальнейшем при каждом входе на проект, потребуется вводить эти шесть цифр, которые будет генерировать приложение (не везде) И перед сканированием штрих-кода, проект дает секретный ключ, 16 значный (32 значный), его требуется сохранить в надежном месте, который поможет восстановить аккаунт в приложении аутентификации. При переносе на другое устройство, так же требовалось вводить данный ключ в приложении И вот появилась обнова, которая лично мне очень зашла, а именно это ПЕРЕНОС АККАУНТОВ на другое устройство 1. Обновляем приложение до последней версии; 2. Заходим в меню настроек и жмем Экспорт аккаунтов 3. На старом устройстве вам предоставят штрих-код, который необходимо отсканировать через это же приложение на новом устройстве. 4. Моментальный перенос до 10 аккаунтов за раз. После переноса выплывет окошко с удалением перенесенных аккаунтов, УДАЛЯЙТЕ ТОЛЬКО ПОСЛЕ ТЩАТЕЛЬНОЙ ПРОВЕРКИ 2 FA
  2. Anonymity and emergency data deletion for smartphones. Anonymity and emergency data deletion for smartphones. Privacy Extensions for Android (Compilation #1). 1. NetGuard (https://netguard.me/)-allows you to see which applications are sending data and where, and to block unwanted data sending. The application does not require root access and allows to block connections for both user and system applications. Source code. 2. Orbot (https://guardianproject.info/apps/orbot/) - allows you to use the Tor anonymous network on Android and redirect traffic from other applications, including the browser, mail, maps, etc. A great extension to improve your privacy on the web. Source code. 3. XPrivacyLua (https://lua.xprivacy.eu/) - an easy to use "privacy manager" XPrivacyLua solves the problem of excessive application permissions in an interesting way: instead of directly denying access (which often leads to application stopping), it sends fake data instead of the real data, providing user privacy. Source code. Emergency smartphone cleaning apps (Compilation #1). For some, the smartphone is life. The plastic box holds so much sensitive information that a blackmailer can "overdose". There's no need to feel sorry for him, but it's advisable to feel sorry for yourself! What's the point? Password as the only means of protection - it doesn't work. It should be so the phone is in the wrong hands - the files are deleted. 1. AutoWipe (https://4pda.to/forum/index.php?showtopic=230102&st=0) - full wipe is done, if unlock password is entered incorrectly several times. 2. SecAddon (https://github.com/zalexdev/securityaddon/releases/download/7.0-BETA/SecAddon+7+BETA.apk) - deletes or encrypts files, which user selected beforehand in unforeseen circumstances. 3. Ripple (http://github.com/guardianproject/ripple) - "panic button" to trigger a "ripple effect" in all applications that are configured to respond to panic events. Change MAC Address on Android (Link>>>>) This program on Android, allows you to change your device's MAC address to a random one, or one that you prescribe. Usage (as an option): 1. Scan your network with any network sniffer program 2. Copy a couple of MAC addresses 3. Change MAC address to another one in the program 4. Log onto the network only when the original is logged out. Or just hide your MAC address Root is required to use the software! Image metadata removal app for Android. Scrambled Exif (https://f-droid.org/en/packages/com.jarsilio.android.scrambledeggsif/)-App for removing metadata from photos before submitting them. For Android users A cleanup app for your smartphone with no data recovery option. Extirpater (https://f-droid.org/packages/us.spotco.extirpater/) is a cleaning app for your smartphone without the possibility of data recovery. This is usually needed before selling your smartphone. A standard factory reset does not guarantee complete deletion of your data, in particular photos. Extirpater cleans everything once and for all, as it uses an alternative way of deleting data: it fills the remaining space on your smartphone with random files and deletes everything at once without the possibility of recovery. https://www.advisor-bm.com/post/anonymity-and-emergency-data-deletion-for-smartphones
  3. 🛡Безопасно работать из дома - возможно!🛡 press-vpn.net Press-VPN создан на технологии OpenVPN. 📲- работает на всех известных операционных системах; 🌏- 16 доступных локаций; ⚡️- высокоскоростное и стабильное соединение; 🔐- полная конфиденциальность и анонимность; 💯- регулярные акции и скидки; ✅- возможность взять бесплатную пробную конфигурацию; 💸- Огромный выбор способов оплаты. Поспеши приобрести конфигурацию через сайт press-vpn.net
  4. Creating your account required you to enter a strong password. Why is it important? First, you use it in everyday life, for money transaction, interaction with your friends, and putting your information on that account is very risking and well-secured is needed. Second, as a member of this forum where we can earn money. We are prone from the hackers.To reach that, you must take the action first 𝗗𝗼𝗻𝘁 𝘂𝘀𝗲 𝘁𝗵𝗲𝘀𝗲 𝗸𝗶𝗻𝗱 𝗼𝗳 𝗽𝗮𝘀𝘀𝘄𝗼𝗿𝗱𝘀!!! 1. 𝐍𝐨 𝐜𝐨𝐦𝐛𝐢𝐧𝐚𝐭𝐢𝐨𝐧 𝐨𝐟 𝐥𝐞𝐭𝐭𝐞𝐫 𝐚𝐧𝐝 𝐧𝐮𝐦𝐛𝐞𝐫𝐬 Example. 1234567890 ASDFGHJKL abcdefgh Password 2. 𝐏𝐞𝐫𝐬𝐨𝐧𝐚𝐥 𝐈𝐧𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧: 𝐒𝐮𝐜𝐡 𝐚𝐬 𝐲𝐨𝐮𝐫 𝐛𝐢𝐫𝐭𝐡𝐝𝐚𝐲, 𝐧𝐚𝐦𝐞, 𝐟𝐚𝐯𝐨𝐫𝐢𝐭𝐞 𝐩𝐞𝐭 𝐨𝐫 𝐟𝐚𝐯𝐨𝐫𝐢𝐭𝐞 𝐛𝐚𝐧𝐝𝐬 𝐞𝐭𝐜 Example Kenciuu 11/11/1997 Dog 3. 𝐒𝐮𝐛𝐬𝐭𝐢𝐭𝐮𝐭𝐢𝐨𝐧 𝐟𝐫𝐨𝐦 𝐥𝐞𝐭𝐭𝐞𝐫𝐬 𝐭𝐨 𝐧𝐮𝐦𝐛𝐞𝐫𝐬 Example K3nCiUu D0g 4. 𝐂𝐨𝐦𝐦𝐨𝐧 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬 Example Password123 Admin123 123Kenciu abcd1234 These common passwords can help to attackers to hack your account specially when you included your personal information. They take it as an advantage to hack you. Be mindful on what we should use as a password. 𝗧𝗶𝗽𝘀 𝗼𝗻 𝗵𝗼𝘄 𝘁𝗼 𝗰𝗿𝗲𝗮𝘁𝗲 𝗮 𝘀𝘁𝗿𝗼𝗻𝗴 𝗽𝗮𝘀𝘀𝘄𝗼𝗿𝗱 1. Make sure your password is long. Combine small/big letters A-Z and numbers. If it's allowed to put a punctuation marks, then go. Example. Whatchadoing173. 2. Try to change your password once a week or a month. 3. In every social media platforms. You should not enter a same password like what you put on others. Like here in crypto. If you put a password of Whatchadoing173. And you also put it to another social media platforms. Then you should now start thinking of it. It is like a Domino Effect. I hope this post can help you to secured your account. As a member, we should start protect our account in this forum So that, we can avoid them entering our forum.
  5. I have an Apple iPhone (actually two, but one is my work phone, supplied by my employer) and an Android tablet. I only put my mobile wallet (BRD wallet) on my iPhone, and only trade from the iPhone or my laptop (runs Linux, btw). The reasons? - I believe that IOS is more secure than Android - there is stricter control on the Apple App Store Am I too cautious in not doing anything money related (also banking) from my Android device? Or do you agree with my preference for IOS (regarding safety)? Interested to hear your opinions!
  6. Z-Pay means 100% secure and confidential payments. We use advanced solutions to comprehensively counter complex threats and targeted attacks. Improved protection Z-Pay pays much attention to security. We are 2 years on the market and there has not been a single case when a client lost funds. That means a lot. We collaborate with several companies and highly qualified specialists who conduct Z-Pay security audits and assess the level of protection. Moreover, Z-Pay offers monetary rewards for looking for “holes and flaws” in the security system. No one has yet been able to find at least one bug that could lead to a system failure. Z-Pay recommendations In conclusion, we offer the following recommendations to ensure the safety of your funds: Save the Z-Pay() site in a browser bookmark and enter the personal account in such a way as not to run into a phishing site Check the website URL carefully before entering your login, password and 2FA When interacting with your personal account, try not to use third-party WiFi networks Do not install untested software (updates, etc.) Create complex passwords and do not use the same password on the same sites Keep passwords out of reach of other people Use paper media or separate flash drives with a password Create multiple copies of passwords in case you lose one of them Use 2FA If the password is saved electronically, we recommend using the encoding Read more: https://zpayio.medium.com/z-pay-reliability-and-security-2b5c4160085f Website : https://z-pay.io/
  7. When we talk about cybersecurity, we have to know that there are many types of security that we can use to protect the things we store online, including cryptocurrencies. There are so many wallets and exchanges that use different security for the safety of their customer's, here I will talk about the three most well-known security types, as well as their importance and difference. Security that I will talk about: 2FA - Two-Factor Authentication OTP- One Time Password Authenticator 1. 2FA - Two-Factor Authentication. This is the type of security that is known more than all other types of security, I can also say that this type of security is the most used by many cryptocurrency wallets and even regular wallets for fiat. This type of security will help to protect your coins in the wallet by sending you an additional password that you will need to fill in when logging in to your wallet after entering your email and password for your account. This security uses email, so after putting your email and password, you will not be able to access your wallet first but you will need to complete 2FA. You will be given special numbers that you will need to fill in and you will be allowed to enter your wallet. This is useful because no one will be able to access your account even if they have a password for your account, unless they know your email and password as well. 2. OTP- One Time Password. This is not that different from 2FA, but I can say it is better than 2FA. This type of security uses a phone number to send you a pin that allows you to sign in to your account. When you want to log in to your account OTP will send verification, when you want to send or withdraw the money you will be sent a verification number as well. This is great because it works well without having to rely on the internet, and those numbers that enable you to log in to your app are used directly sent to your mobile phone number. So using this security will be difficult for hackers to hack your account and steal money unless they steal your phone which has the number that has been connected to OTP. 3. Authenticator. This type is one of the most powerful security and is used with a lot of wallets and some other software as well. The function of this security is to verify that you are the user of a particular account, whenever you want to access a wallet that uses this security. This security uses a mobile app to display code that you will need to fill in the wallet you use after entering your email and password. All you have to do to use this security is to go to the settings of the wallet you are using "if it uses this security" and connect your account to the mobile authenticator app by downloading the app and entering the code that the wallet will give you as your identity. There are so many types of security in wallets, but I have defined these three as they are the most common and maybe someone wanted to know the differences. So we found out that: 2FA - Two-Factor - Aunthentication uses email to protect your wallet. OTP- One Time Password - uses a phone number to protect your wallet. Authenticator - uses a mobile app to protect your wallet. There are some wallets that use all three security at once, we can discuss those wallets in other articles.
  8. Lots of people consider mining to be not very profitable nowadays. But as the reality shows us, hacker attacks still not only happens, but even become wider and gain the momentum via hacking different major companies. During some last days there are lots of news about the hacking of the supercomputers for mining in the number of the European countries - the UK, Germany, Switzerland, and even Spain. At least it is said in lots of news resources. Here is the link to one of them- https://www.google.com.ua/amp/s/www.zdnet.com/google-amp/article/supercomputers-hacked-across-europe-to-mine-cryptocurrency/?espv=1 As we know supercomputers are such computers with a high level of performance compared to general-purpose computers. They are used by big companies and corporations. So why their security is not so strong? Or hackers became even more talented then before? How to be really protected?
  9. Using secondary mails is the best way to display all kinds of personal information that involves or endangers your cryptocurrencies, it will always be essential that if you register on a site of quality or not, use a secondary and new email that does not It involves nothing of your data or resembles or halfway through your mails of constant use. It usually happens a lot that whenever you use personal mails on Bountys pages or even in Icos, then you are the target of a lot of spam or junk mail that only incites you to get into scam projects or just try to throw you keyloggers or hijacks to steal private keys or information sensitive that puts at risk the integrity of your money. Be smart and always step forward, use a secondary email to avoid a bad afternoon.
  10. Recently, there have been lots of discussion about bitcoin security and safety in transaction. Some people are worried about bitcoin traceability and think bitcoin is not totally anonymous. As you know, bitcoin can only hide identities and transaction data and wallet balances are visible to public. This is a reason for the appearance of some privacy coins like Monero and Zcash. The ledger of these coins are invisible. You can make transactions without being traced by anyone. But what is important is that are privacy coins really safer than bitcoin? Do you think safety is more related to a coin's protocol resistance against hacking or to its visible or invisible ledger?
  11. I want to talk about bitcoin and blockchain security by mentioning a fact. I think it was easier for hackers to manipulate bitcoin transactions or blockchain network in the early days when bitcoin came into existence. Why? The security of blockchain is achieved by connecting all blocks together as chain. Any new block have a hash that is connected to the old hash of the previous block and this process continues for the next blocks. So, if a hacker wants to manipulate any block hash, he have to manipulate all blocks before and after it to achieve his goal and since the number of blocks are extremely high, the time and energy he should spend to hack one block will be huge. But 10 years ago, the number of blocks were not as high as today and it was easier for hackers to manipulate hashes. So, as time goes by, more blocks will be added to the network which will result in safer bitcoin transactions. What do you think?
  12. In case you own a Ledger hardware wallet, be extremely careful of potential phishing attempts from now on. I received an email from Ledger today that all the registered email addresses in their platform have been leaked after an unauthorized party gained access to their e-commerce database on July 14th. What was leaked: - Contact addresses: more than 1 million e-mail addresses - Shipping and private details: names, address, phone number, and ordered products of 9500 of Ledger's customers. The leak has no implications in the security of the Ledger products but is added on an alarming increase of similar incidents happening lately. We had the Etana Custody - Kraken data breach and leak of private data, the Coincheck breach, and many more similar services unable to protect the private data given by users. Ledger won't ask for your seed phrase. If you receive an email pretending to be from Ledger and asking you for details,keys and seeds do not reply.
  13. Japanese exchange Coincheck, famous for a major hack of around $500 million USD in cryptocurrencies (mostly XEM which Coincheck kept in a hot wallet!) which happened in January 2018, has once again suffered a security breach. This time no funds were stolen but it was private data of around 200 users that leaked, after these users used the exchange email service for various inquiries. It seems that some vulnerability allowed hackers to steal personal data such as emails, names, addresses, phone numbers and even selfies that the exchange was asking for KYC purposes. These 200 users had contacted through email Coincheck during May 31st and June 1st. This is the second major exploit happening to exchanges lately having as a target the personal data of exchange users. Last one I covered on this article and had to do with Kraken. Source: https://www.theblockcrypto.com/linked/67278/crypto-exchange-coincheck-says-it-suffered-a-data-breach-which-may-have-exposed-some-users-personal-information?utm_source=cryptopanic&utm_medium=rss
  14. Activate all the security tools provided by your exchange. Enable two-factor authentication whenever it's available! It is imperative that the site has an SSL certificate for a secure connection through the HTTPS protocol. If you use more than one exchange, use different passwords for each one. Do not install unknown software on your system. Some malware can steal personal information and eventually steal your funds. yobit exchange
  15. TrueVPN is one of the latest and most advanced VPNs in the market. The company offers an ultra-fast and ultra-secure VPN service. Whether you’re in the office or on the road. TrueVPN will protect you and make your browsing more secure. It does so by encrypting your data on both ends with military-grade and quantum-resistant AES-256 cipher. TrueVPN stands out from its competitors in many ways, and one of these is its welcome offer. Unlike other VPN providers, this VPN one week of free service. Yes, you read it right! And that’s not it – if you get your friend to subscribe to the service, then you get another week absolutely free, along with the welcome offer. I didn’t find such an offer in any other VPN service provider. Simply put, if you’re looking for an ultra-fast connection with industry-standard protocols and no history or logs, then TrueVPN is the best you can get! Visit us here -- https://truevpn.io/
×
×
  • Create New...