Position: Home page » Bitcoin » Bitcoin protection

Bitcoin protection

Publish: 2021-04-24 06:43:25
1.

If bitcoin accounts are decentralized, so are hackers. Bitcoin, which uses blockchain technology, is not more secure than bank accounts. On the contrary, it is vulnerable to hackers. So, in the world of virtual currency, how to protect the security of account funds

Secret your private key address

the bitcoin address is the only information needed to define the distribution and transmission end of bitcoin. These addresses are generated anonymously by the user's wallet. Once the address is used, all the transaction history related to it will destroy the confidentiality of the address. Anyone can view the balance and all transactions at any address. Because users usually need to disclose their identity in order to receive services or goods, the bitcoin address cannot be completely anonymous. For these reasons, it is better to use bitcoin address only once, and users must be careful not to disclose the address

When replacing the computer, try to destroy the hard disk of the original computer. Don't save or publish the private key of bitcoin to the cloud, mailbox or collection. If a network administrator writes a regular expression to retrieve the text, he can find all the information and crack the user's account

2. Stored in bitcoin wallet

many bitcoin exchanges have been attacked by hackers. If you use the wallet of bitcoin exchange, please use Google's "double authentication" to ensure security. During the development of virtual currency, there have been many cases of bitcoin exchange running away. The exchange owns the private key of the user's wallet, which is not a safe way to save bitcoin

bitcoin wallet has a wide range of customers, which is more secure than the wallet service of bitcoin exchange. No matter what kind of wallet you choose, you should choose a strong password. Don't use the same password as the registered email. At the same time, do not put eggs in the same basket, choose multiple storage ways to improve the security of assets

using the genuine system of bitcoin wallet, regularly updating security vulnerabilities and fixing bugs can improve security. Some studies have pointed out that IOS system is more secure than Android system, because the existing security vulnerabilities of Android system may be relatively easy to be attacked by hackers

3. The most common way to identify phishing sites is phishing sites. Hackers will create a domain name similar to bitcoin website, which may be sent to users through e-mail and other channels. Once users try to log on the website, hackers will record their login information

so be careful before clicking any link. Many browsers have the service of "phishing check". If you carefully identify the domain name of the website, you can identify the phishing website

4. Guard against Keylogger

in addition to phishing sites, the common attack method of hackers is Keylogger. Keyboarding is the easiest way to capture passwords. The deception of key recording software is very high, even the technical house may believe it. In short, a keyboard recorder is actually a script code. Once it is installed on the operating system of the target computer, it will record all the keystrokes on the keyboard and send them to hackers, mostly through FTP

the successful method of introcing Keylogger depends on many factors, including the operating system, the lifetime of keylogger and the anti infection level of target computer. Keyboard recorder is usually injected through web browser. The security vulnerability of the target machine depends on the type of browser it uses; Whether the operating system installed on the target machine is genuine, and whether the operating system is updated with the latest security vulnerabilities and bug fixes

5. Watch out for USB theft program

the software will retrieve your password and login credentials stored in the browser. Once FUD, some stealing programs can be very powerful. In most cases, a steal program is a. Bat file, which can be injected into the target machine online or driven by USB

6. Using proxy and VPN

proxy server and VPN can increase the security of your bitcoin wallet, although most people mistakenly believe that VPN makes them anonymous online. But in fact, VPN only improves the privacy of users. VPN can rece the possibility of hackers accessing the router to open the port, which also means that they are less likely to succeed

7. Encryption and backup wallet

wallet backup is essential to prevent losses caused by computer failure or human error. If a computer or mobile phone is lost, a backup wallet can help retrieve the bitcoin. At the same time to encrypt the online backup, any backup that can be accessed through the Internet should be encrypted

how to back up your wallet? First, close the bitcoin client, then select the backup wallet of the menu file in the main interface, and the wallet.dat file to other hard disk partition, mobile hard disk or U disk

it should be noted that the entire wallet should be backed up, not just the private key. Bitcoin wallet has many private keys for receiving transaction change. If only the private keys of visible bitcoin addresses are backed up, most of the funds may not be restored from the backup. Also, back up your wallet regularly to make sure that all recent bitcoin change addresses and newly created bitcoin addresses are included in the backup

Cold storage

offline wallet is called "cold storage", which is the safest way to save digital currency

cold storage is an offline wallet that is not connected to the network, that is, it will not be attacked by black horse and Trojan horse. However, because the operation is relatively complex and the price is relatively expensive, the price of offline wallet is more than 1000 yuan, which is suitable for users who have a lot of bitcoin and are ready to hold it for a long time

although the operation of cold storage is relatively complex, it is the safest storage method. At present, only cold storage has truly realized the inviolability of personal assets and is not subject to the supervision of others

if you want to know more about bitcoin information, please send me a private message and avoid detours

2. Those who can connect to al power supply are DIY experts, which is not what ordinary people can do. How to synchronize power supply is the key
let me show you some information http://www.rowking.com/Html/? 814. HTML
considering the common sense server type of host, it is also one of the choices, many servers are al power supply
3.

Recently, some domestic college students reported that their computers were attacked by viruses and their documents were encrypted. The attacker claimed to pay bitcoin to unlock. It is reported that the virus is nationwide, suspected to spread through the campus network, very fast. At present, Hezhou University, Guilin University of Electronic Science and technology, Guilin Institute of aerospace instry and universities in Guangxi are affected. In addition, some netizens reported that Dalian Maritime University and Shandong University were also attacked by the virus

up to now, more than 6500 computers in China have been invaded by the virus. Bitcoin is a kind of network virtual currency, but its exchange rate with RMB is surprisingly high, 300 bitcoin is about 3 million RMB


Kevin, a hacker on Weibo, has taught five temporary solutions:

1. Don't give money. The ransom is expensive and may not be recovered after it is paid

2. The non poisoned computer quickly backed up the data for many times. If it has been poisoned, lower the hard disk before reloading the system, and then install the operating system

3. Install anti blackmail protection tools, but it only works before the virus invades, but it can't do anything for the computer that has been infected with the virus, so it is still necessary to do a good job in the backup of important documents. Do not visit the website, do not open suspicious mail and files

4, turn off the computer, including TCP and UDP protocol 135 and 445 ports

5, but also do not understand, the network pinch

4. The purpose of a wallet is to deposit your money. Bitcoin wallet is the same. You must protect your wallet. Using bitcoin can easily transfer funds around the world, and also let you control your own funds safely. Such a powerful function is accompanied by great security concerns. At the same time, if used correctly, bitcoin can provide high-level security, you must always keep in mind, You have a responsibility to take good practice to protect your property.
5. Try Tencent computer housekeeper, housekeeper 2 in 1, small occupation, full function
based on Tencent computer housekeeper's continuous investment in independent anti-virus engine research and development and proct performance optimization in recent years, combined with the multi engine architecture system, Tencent computer housekeeper's ability in security protection and virus detection and killing has reached the same level as the world-class anti-virus software; Especially in the processing of domestic popular samples, resource consumption and response speed,
6. It's best to use Tencent mobile phone housekeeper to check and kill. It can scan all garbage viruses and clean and kill viruses; Use Tencent mobile phone housekeeper to set up security protection and virus detection and killing
scan first, wait for the end of scanning, and then kill the virus according to the prompt. It adopts cloud detection and killing technology, which can thoroughly kill the virus through Intelligent Cloud Identification, so as to protect your mobile phone from now on; thank you
7. You can use Tencent computer housekeeper to check and kill
it can thoroughly check and kill the virus, which is strongly escorted by cloud host defense, TVA anti-virus engine and system repair engine
housekeeper introces the international leading local checking and killing engine, which greatly improves the ability of Trojan horse checking and killing
the ability of virus anti-virus protection is international leading, which can comprehensively protect the computer security
8. Give some suggestions]

1. It is necessary to install anti-virus software, update the virus library in time, install firewall (anti Trojan horse, hacker attack, etc.), kill virus regularly, and maintain the security of computer operation
it is recommended that the owner of the building can install Tencent computer manager, which is a free professional security software with two in one anti-virus Management (only need to download one ), small memory, good anti-virus, good protection, and no false alarm and killing. It has a world-class anti-virus software embedded anti-virus engine, such as cloud killing engine, anti-virus engine, Jinshan cloud killing engine, Avira killing engine, xiaohongsan and killing repair engine
software upgrade, vulnerability repair and garbage cleaning are automatically and regularly set, which is necessary for lazy people
2; Open Tencent computer manager toolbox vulnerability repair
3. Don't go to some unknown websites or download things casually
4. You should also be on guard against portable storage devices (such as USB flash disk, where viruses are rampant recently)
5. Don't go to unknown websites or receive strange e-mails. After downloading the compressed package file, scan the virus first
6. Close unnecessary ports
7. If you have time and energy, learn some common computer skills and knowledge

finally, I would like to say that if you are very careful but still poisoned, you can't help it It's a good choice to backup the system with ghost.)
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750