Professional always recommends using a second authentication factor in all applications.
It also advises how to get a different phone number and password for each app.
In the middle of the second day of the ETHLatam event bringing together the Ethereum community in Buenos Aires, a conference was held that filled viewers with tips. The conference, presented by Pablo Sabatella, founder and CEO of the Defy Education Academy, focused on the risks and security that must be taken into account in the cryptocurrency ecosystem to avoid hacking and theft.
The specialist started by saying that It is recommended in all applications to always configure the second factor of authentication, which is not by SMS or call. Otherwise, you may fall victim to some type of cryptocurrency scam, such as Sim swap attack.
As explained by CriptoNoticias, the . file Sim swap attack It consists in the appearance of the attacker at the branch of the telephone company or calling on the phone, pretending to be the victim and saying that the line was stolen, for which he obtained his cancellation and a new chip connected to this line. In this way, it achieves full control and resets access.
Therefore, it is estimated that Convenient to use TOTP applications (Time-based one-time password) to do this, like Authy or Google Authenticator. Likewise, it is advisable to keep backup codes printed or, failing this, on devices.
We recommend using different phone numbers and passwords for each app
Continuing with the recommendations, he mentioned that it is best to contact your phone company to disable voicemail. He suggested that it is recommended as a precaution Using email and phone number as authentication, which is exclusive to cryptocurrency platforms. That is, it is not shared with anyone.
He pointed out that it is possible to obtain a private cell phone line via Skype or Google FI or other platforms that can be used for this. “You have to think that the person who is attacking you should start gathering information and you have to complicate (that),” he said.
Trying to think of how the attackers can act to prevent their victimsalleged: “Attack someone is a matter of incentives: it’s how much I’m going to steal from them and how much it costs me to do it. If it’s too expensive and too complicated, I won’t. So you have to complicate it.”
Given this idea, also highlight The importance of creating complex passwords through a Password managerAnd the A platform that does this automatically. “We think we know how to create complex passwords and we don’t know how to do it,” he said. So it is better to trustPassword manager«, such as 1Password, Lastpass, or Bittwarden.
Also, highlight it For these passwords it is necessary to make a second factor of authentication. Otherwise, they remain insecure. And assured that you will never have to repeat passwords, it is better to use different password for each app. This way, if an attacker detects any of them, he won’t be able to access all of them.
Cracked software may make you lose your bitcoins
Sabatella commented that it is necessary to have a screen lock on the cell phone, updated apps, and a pin on the sim card. The first also applies to other devices, such as laptops. This way, hacks can be avoided in case of hardware theft.
Another recommendation he made is to never install cracked software, i.e. unofficial software as it may be unsafe. He remembered that two months ago, A man stole 16 Bitcoin (BTC) because he downloaded a cracked program. This amount was equivalent to about $400,000 at the time.
With this example, demonstrate the importance of implementing the best possible security processes to avoid becoming a victim of an intruder. something Cryptocurrencies, money from bank accounts or personal information can end up being stolen.