Charles Hoskinson: Security Foundations: How to Secure Your Wallet Recovery Phrase for Cryptocurrency Wallets
CIA Triad
https://www.f5.com/labs/articles/education/what-is-the-cia-triad
Bruce Schneier
https://www.schneier.com/books/
https://www.youtube.com/watch?v=NVGtfVj_9Y0 (hacking society)
https://www.youtube.com/watch?v=eZNzMKS7zjo (Security Mindset)
Steve Gibson
https://twit.tv/people/steve-gibson
BIP39 Standard
https://github.com/bitcoin/bips/blob/master/bip-0039.mediawiki
https://iancoleman.io/bip39/
PGP RFC and Tools
https://tools.ietf.org/html/rfc4880
https://www.mailvelope.com/en
https://www.gpg4win.org/
Secure Operating Environment
https://rufus.ie/
https://www.youtube.com/watch?v=9GblKZO-smU (Reset BIOs)
https://www.youtube.com/watch?v=yS4qZGb0-V4 (Create a Flashdrive)
https://ubuntu.com/
https://www.qubes-os.org/
https://www.freebsd.org/
https://www.edx.org/course/introduction-to-linux (Linux Course)
YubiKey Guide
https://github.com/drduh/YubiKey-Guide
https://www.yubico.com/products/services-software/download/yubikey-manager/
Stuff to Buy
https://www.amazon.com/Samsung-MUF-256AB-AM-Plus-256GB/dp/B07D7Q41PM/ref=pd_bxgy_2/145-5431474-7185745?_encoding=UTF8&pd_rd_i=B07D7Q41PM&pd_rd_r=e3e80f17-dbfe-40db-81a3-cce23d79f9cf&pd_rd_w=WgEYB&pd_rd_wg=7cuJL&pf_rd_p=ce6c479b-ef53-49a6-845b-bbbf35c28dd3&pf_rd_r=DER82JX1SG7N5THBSZXG&psc=1&refRID=DER82JX1SG7N5THBSZXG
https://www.amazon.com/Apricorn-256-bit-Encrypted-Validated-ASK3-NX-4GB/dp/B07GKZWB6N/ref=sr_1_5?dchild=1&keywords=aegis&qid=1596408425&sr=8-5&th=1
https://www.amazon.com/dp/B07WGJ1DNJ/ref=emc_b_5_t
https://www.amazon.com/Trezor-T-Model/dp/B07B8Q2G3K/ref=sr_1_3?dchild=1&keywords=trezor+hardware+wallet&qid=1596408477&sr=8-3
https://www.amazon.com/Ledger-Nano-Cryptocurrency-Hardware-Bluetooth/dp/B07M6R4NK3/ref=sr_1_3?dchild=1&keywords=ledger+nano+x&qid=1596408463&sr=8-3
LastPass
https://www.youtube.com/user/lpuser11
www.Lastpass.com
www.peazip.org
Memory System
https://artofmemory.com/wiki/Number_Shape_System
https://medium.com/@mikaileliyah/chapter-1-mnemonics-basics-number-shape-pegging-method-51f638b178d9
Books to Buy:
https://www.amazon.com/Security-Engineering-Building-Dependable-Distributed/dp/1119642787/ref=sr_1_2?
https://www.amazon.com/Introduction-Cryptography-Chapman-Network-Security/dp/1466570261/ref=sr_1_4?dchild=1&keywords=jon+katz+cryptography&qid=1596410170&sr=8-4dchild=1&keywords=anderson+information+security&qid=1596410090&sr=8-2
Courses to take on Security:
https://www.coursera.org/specializations/cyber-security
Additional Info
- Read full article on: Charles Hoskinson
Leave a comment
Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.
Disclaimer: As a news and information platform, also aggregate headlines from other sites, and republish small text snippets and images. We always link to original content on other sites, and thus follow a 'Fair Use' policy. For further content, we take great care to only publish original material, but since part of the content is user generated, we cannot guarantee this 100%. If you believe we violate this policy in any particular case, please contact us and we'll take appropriate action immediately.
Our main goal is to make crypto grow by making news and information more accessible for the masses.
Our main goal is to make crypto grow by making news and information more accessible for the masses.