-
Notifications
You must be signed in to change notification settings - Fork 31
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Security Advice for Creating a Wallet #695
Merged
darwintree
merged 7 commits into
Conflux-Chain:main
from
ConfluxDAO:issue#684createWallet
Aug 19, 2024
Merged
Changes from all commits
Commits
Show all changes
7 commits
Select commit
Hold shift + click to select a range
1897ccb
add create-wallet.md
jackleeio c7a7f22
update the advice for creating a wallet
jackleeio 6e6df69
update content
jackleeio 755d059
remove the files related to witnet
jackleeio 4febf19
Update docs/general/blockchain-security/create-wallet.md
jackleeio f5bca06
revised based on feedback
jackleeio 0e735bd
updated content
jackleeio File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,2 @@ | ||
label: Blockchain Security | ||
collapsed: false |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,150 @@ | ||
--- | ||
displayed_sidebar: generalSidebar | ||
--- | ||
# Security Advice for Creating a Wallet | ||
|
||
The first step into the blockchain world is creating a secure wallet. This guide provides crucial security advice for creating your wallet. | ||
|
||
## 1. Understanding the Essence of Wallets | ||
|
||
Before diving into wallet creation, it's crucial to understand what a blockchain wallet is and how it works. | ||
|
||
### What is a Blockchain Wallet? | ||
|
||
A blockchain wallet is a digital tool that allows you to interact with blockchain networks. It's similar to a bank account in the traditional financial world, but with some key differences: | ||
|
||
1. It stores your digital assets (cryptocurrencies) | ||
2. It allows you to send and receive these assets | ||
3. Most importantly, it manages your access to these assets through cryptographic keys | ||
|
||
### Key Components of a Wallet | ||
|
||
A wallet doesn't actually store your cryptocurrencies. Instead, it manages the keys that prove your ownership of these assets on the blockchain. Here are the key components: | ||
|
||
1. **Mnemonic Phrase**: Also known as a seed phrase or recovery phrase, this is a sequence of 12-24 common words that serves as the foundation of your wallet. For example: | ||
"apple banana cherry dog elephant frog golf hotel igloo jelly kite lemon" | ||
|
||
2. **Private Key**: This is a long string of numbers and letters derived from your mnemonic phrase. It's used to sign transactions and prove ownership of your assets. | ||
|
||
3. **Public Key**: Derived from your private key, this is used to generate your wallet address where you can receive funds. | ||
|
||
4. **Wallet Address**: This is like your account number in traditional banking. You can share this with others to receive funds. | ||
|
||
### The Importance of Securing Your Wallet | ||
|
||
In the blockchain world, control of your assets is tied directly to control of your private key or mnemonic phrase. This means: | ||
|
||
- Anyone with your private key or mnemonic phrase can access and transfer your assets | ||
- If you lose your private key or mnemonic phrase, you lose access to your assets | ||
- There's no "forgot password" option or customer support to help you recover lost keys | ||
|
||
This is why the security of your wallet is paramount. In the following sections, we'll discuss how to create and secure your wallet properly. | ||
|
||
## 2. Choosing the Right Wallet Type for Your Needs | ||
|
||
There are various wallet types, including: | ||
|
||
- PC wallets: Software applications installed on personal computers, suitable for frequent traders offering comprehensive features and control. | ||
|
||
- Browser extension wallets: Plugins integrated directly into web browsers. These are designed for convenient interaction with decentralized applications (DApps). | ||
|
||
- Mobile wallets: Applications installed on smartphones. They are utilized for accessing funds anywhere and are ideal for frequent small transactions. | ||
|
||
- Hardware wallets: Dedicated physical devices for offline storage of cryptocurrencies. These serve as the most secure option for storing large amounts of assets. | ||
|
||
- Web wallets: Online wallet services accessed through web browsers. They are employed for situations requiring no installation, but offer lower security and are suitable for small amounts and temporary use. | ||
|
||
Consider the following factors when choosing: | ||
|
||
- Frequency of use: Frequent use requires more convenient wallets | ||
- Amount to be stored: Large amounts need more secure wallets | ||
- Security requirements: Different users have different security needs | ||
- Convenience: Consider your usage habits and scenarios | ||
|
||
Recommendation: Consider using a hardware wallet for storing large amounts and software wallets for daily small transactions. This strategy balances security and convenience, reducing the risk of losing all assets if a single wallet is compromised. | ||
|
||
## 3. Key Steps for Securely Obtaining a Wallet | ||
|
||
1. Always download from official sources: Avoid downloading malicious software | ||
2. Verify the authenticity of the download source (e.g., website SSL certificate): Prevent being deceived by phishing websites | ||
3. Verify software integrity after download (e.g., hash verification): Ensure the downloaded software hasn't been tampered with | ||
4. Be wary of phishing websites and fake advertisements: These are common tactics used by hackers | ||
|
||
Tip: Cross-verify download sources through official websites, reputable industry sites, and trusted community recommendations. This multi-layered verification greatly reduces the risk of downloading malicious software. | ||
|
||
## 4. Security Measures When Creating a Wallet | ||
|
||
- Choose a secure physical environment, avoid being monitored or overlooked: Prevent others from recording your mnemonic phrase | ||
- Use a secure device, preferably new or dedicated: Reduce the risk of device infection by malware | ||
- Consider creating important wallets in an offline environment: Completely isolate from network threats | ||
- Verify the randomness of the generated mnemonic phrase (avoid patterns in word combinations): Ensure the security and uniqueness of your mnemonic phrase | ||
|
||
The purpose of these measures is to ensure that your private keys and mnemonic phrase are not leaked or recorded during the generation process. Remember, if this information falls into the wrong hands, your assets are at risk of theft. Taking these precautions can significantly enhance the security of your wallet. | ||
|
||
## 5. Adopt a Multi-Wallet Strategy to Spread Risk | ||
|
||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Add details illustrating why this strategy is required |
||
Implementing a multi-wallet strategy is crucial for enhancing security and managing your digital assets effectively. Here's a detailed breakdown: | ||
|
||
### Diversify Wallets Based on Purpose | ||
|
||
- **Trading Wallet**: Use a separate wallet for frequent trading activities. Keep only the amount you need for active trading here. | ||
|
||
Example: A mobile or browser extension wallet for quick access during market movements. | ||
|
||
- **Storage Wallet (Cold Storage)**: Use a highly secure wallet for long-term asset storage. | ||
|
||
Example: A hardware wallet kept in a safe place, disconnected from the internet. | ||
|
||
- **Spending Wallet**: For daily transactions and small purchases. | ||
|
||
Example: A mobile wallet with a limited amount for everyday use. | ||
|
||
- **Experimentation Wallet**: Dedicated for testing new projects, DApps, or unfamiliar platforms. | ||
|
||
Example: A separate browser extension wallet with minimal funds. | ||
|
||
### Risk Mitigation Strategies | ||
|
||
1. **Asset Distribution**: Don't keep all your assets in one wallet. Distribute them across multiple wallets to reduce the impact of a potential security breach. | ||
- Guideline: Consider keeping no more than 5-10% of your total assets in any single hot wallet. | ||
|
||
2. **Regular Rebalancing**: Periodically review and adjust the balance across your wallets based on your current needs and risk assessment. | ||
|
||
3. **Security Tiering**: Implement different levels of security for different wallets. | ||
- Highest security (e.g., hardware wallet) for long-term storage | ||
- Medium security for trading wallets | ||
- Lower security but high convenience for small, everyday transactions | ||
|
||
### Testing New Projects Safely | ||
|
||
- Always use a dedicated "experimentation" wallet when interacting with new or untrusted DApps, smart contracts, or blockchain projects. | ||
- Fund this wallet with only a small amount that you can afford to lose. | ||
- This approach isolates potential risks, protecting your main assets from scams, bugs, or malicious smart contracts. | ||
|
||
### Benefits of Multi-Wallet Strategy | ||
|
||
1. **Improved Security**: Reduces the risk of losing all assets in case of a single wallet compromise. | ||
2. **Better Organization**: Helps in managing different cryptocurrencies and investment strategies. | ||
3. **Privacy Enhancement**: Using different wallets for different purposes makes it harder to track all your activities. | ||
4. **Flexible Access**: Balances security and convenience for different usage scenarios. | ||
|
||
Remember, while using multiple wallets enhances security, it also increases the complexity of managing your assets. Keep detailed, secure records of all your wallets and their recovery phrases. | ||
|
||
## 6. Understanding Emerging Keyless Wallet Technology | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. More details are needed here |
||
|
||
Keyless wallets offer a new security paradigm: | ||
|
||
- Custodial: Private keys managed by trusted third parties (e.g., exchanges) | ||
- Non-custodial: Uses advanced technology (like MPC) to manage private keys, eliminating single points of failure | ||
|
||
Advantages: Good user experience, high security | ||
Disadvantages: Relatively new technology, potential unknown risks | ||
|
||
## Core Security Principles | ||
|
||
1. **Never Share**: Never disclose your private keys or mnemonic phrases | ||
2. **Safeguard**: Use secure methods to backup and store private key information | ||
3. **Stay Vigilant**: The blockchain world is full of risks and opportunities; always remain alert | ||
4. **Continuous Learning**: Security knowledge needs constant updating; keep learning new security practices | ||
|
||
Remember, in the blockchain world, you are your own bank. The security responsibility is significant, but by following the right practices, you can safely explore this exciting new realm. |
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I suppose more introduction or relating articles should be added to this section. I would suppose the reader be a beginner of blockchain world and current version would make it hard for reader to understand
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should add "what this is" as well as "what it is used for"