Steemit Crypto Academy Assignment [@sapwood Chapter 3] | Wallet Security and Restoration

in #sapwood-week34 years ago

Hello friends ,Myself swetatiwari

Bitcoin-security.jpg

Have you ever used a Hardware/software wallet? Which one is having a better security advantage?

what is hardware and software wallet?

Hardware wallets :

Hardware wallets are a type of cold wallet that can come in portable devices like flash drives, external drive wallets, and so on. The major reason for using a hardware wallet is to prevent instant and immediate access to the funds in it as the wallet isn't connected to the internet, thereby making it very difficult for the funds to be accessed by cybercriminals as they are kept securely offline.

Software wallets :

Software wallets are a type of Wallet that is connected to the Internet. This type of wallet is very common in the crypto space with a lot of companies creating different types. Software wallets are also known as hot wallets. The various types of software wallets are- Web wallet, Desktop client, Mobile Client, Extension, etc.


answer

I haven’t used a hardware wallet such as Trezor and so on so I cannot really speak for it but I am conversant with software wallets a d I can say that so many of them are secured. An example of a software wallet that is very secured is the Blockchain wallet which is a software wallet. It has both a mobile application wallet and a web wallet. When the wallet is created, a unique ID is created which is different from other users, you are requested to set a strong password, use a 2FA, and then still have the opportunity to back up your keys to the wallet. With this type of security, it can be very difficult for hackers to hack through the wallet and move funds.


bitcoin-img.svg

What are the important points to consider when you deal with an Exchange(centralized) Wallet & Decentralized wallet. How do you secure/restore both types?

These two wallets are completely different with the exchange being responsible for its wallet safety and the individual responsible for the safety of their funds on a decentralized wallet but then when using both, there are certain precautions to be taken to secure as well as restore wallets. First, I will look at securing the wallets

Securing Your Wallet on Exchange

On-exchange wallets that are Centralised, you can experience a bridge that could lead to a loss of part or all of your funds. Exchanges usually advise that to keep your funds safe, you should use a very strong password which should be a string of Capital letters, small letters, numbers, and symbols. The password is expected to be an 8 digit alphanumeric combination. For better security, it is advised that an offline authenticator be used to authenticate every activity on the exchange such as login, P2P buy and sell, Withdrawal, and so on.

You should note that you are not completely in control of your funds. If your security is perfect and the exchange gets hacked, you might lose your funds.

Securing Your Decentralized Wallet

DEX wallet is most preferable because you are the custodian of both the funds and the keys to the wallet. For security purposes, it is often advised that Mnemonics, Private Keys and Back up phrases for Dex wallet shouldn't be screenshotted or kept in picture form. The backup phrases and keys are to be written in an offline notepad and or paper and should be kept securely. Also, a long string of passwords should be used for security purposes as Dex wallet can be accessed from your device if the person accessing it knows your wallet password. Also, if you are planning to keep the funds for a very long time, it is often advised to use multi-signature wallets.

Restoring centralized exchange wallets

When login details to centralized exchanges are lost, it is often recovered through the forgot details (password, id, username, and so on) page or via contacting the customer service representative. In most cases, a KYC or proof to show ownership of the wallet is often requested.

Restoring a decentralized wallet

If the wallet is on a mobile device or any other device and the device gets missing or damaged, the wallet can be restored using the private key, mnemonic, and passphrase for the wallet. If the private keys, passphrases, or mnemonic are lost, then there is no way the wallet can be recovered as the company in charge of the wallet does not store details of private keys and mnemonics.


Give an example of a Web 3.0 wallet and what are the distinct uses of a web 3.0 wallet?

image.png
src
A very good example of a Web 3.0 wallet that I am familiar with is Metamask ;
Metmask extension you can access the dApps of Etherum family, interact with DeFi applications, you can also trade in DEX, Lending dApps, you can contribute to liquidity pool and many other sophisticates transaction can be performed with a web 3.0 wallet like Metamask.


@sapwood
@steemcurator01
@steemcurator02

Referenvce src

Thank you

Sort:  

Thank you for attending the lecture in Steemit-Crypto-Academy & doing the homework task-3.

Unfortunately, this is entirely a plagiarized content and copied from @swetatiwari

Original source- https://steemit.com/hive-108451/@swetatiwari/steemit-crypto-academy-assignment-sapwood-chapter-3-or-wallet-security-and-restoration

It is an egregious violation of the Crypto Academy Rules. The very objective of this academy is to proliferate crypto literacy. So you should gain sufficient user experience with a wallet/dApp on your own and then you should submit your assignment.

We would encourage you to publish original content, purely based on your own experience with a wallet/dApp(or as the task demands). Any act of spam/plagiarism diminishes the very idea of Proof-of-Brain, hence disregarded/discouraged by the community.

If you need any further help/clarification related to the task, please feel free to ask.

Thank you.


Homework Task -3
[0]