Charles Hoskinson: Security Foundations: How to Secure Your Wallet Recovery Phrase for Cryptocurrency Wallets

  • Wednesday, 05 August 2020 05:53
CIA Triad https://www.f5.com/labs/articles/education/what-is-the-cia-triad Bruce Schneier https://www.schneier.com/books/ https://www.youtube.com/watch?v=NVGtfVj_9Y0 (hacking society) https://www.youtube.com/watch?v=eZNzMKS7zjo (Security Mindset) Steve Gibson https://twit.tv/people/steve-gibson BIP39 Standard https://github.com/bitcoin/bips/blob/master/bip-0039.mediawiki https://iancoleman.io/bip39/ PGP RFC and Tools https://tools.ietf.org/html/rfc4880 https://www.mailvelope.com/en https://www.gpg4win.org/ Secure Operating Environment https://rufus.ie/ https://www.youtube.com/watch?v=9GblKZO-smU (Reset BIOs) https://www.youtube.com/watch?v=yS4qZGb0-V4 (Create a Flashdrive) https://ubuntu.com/ https://www.qubes-os.org/ https://www.freebsd.org/ https://www.edx.org/course/introduction-to-linux (Linux Course) YubiKey Guide https://github.com/drduh/YubiKey-Guide https://www.yubico.com/products/services-software/download/yubikey-manager/ Stuff to Buy https://www.amazon.com/Samsung-MUF-256AB-AM-Plus-256GB/dp/B07D7Q41PM/ref=pd_bxgy_2/145-5431474-7185745?_encoding=UTF8&pd_rd_i=B07D7Q41PM&pd_rd_r=e3e80f17-dbfe-40db-81a3-cce23d79f9cf&pd_rd_w=WgEYB&pd_rd_wg=7cuJL&pf_rd_p=ce6c479b-ef53-49a6-845b-bbbf35c28dd3&pf_rd_r=DER82JX1SG7N5THBSZXG&psc=1&refRID=DER82JX1SG7N5THBSZXG https://www.amazon.com/Apricorn-256-bit-Encrypted-Validated-ASK3-NX-4GB/dp/B07GKZWB6N/ref=sr_1_5?dchild=1&keywords=aegis&qid=1596408425&sr=8-5&th=1 https://www.amazon.com/dp/B07WGJ1DNJ/ref=emc_b_5_t https://www.amazon.com/Trezor-T-Model/dp/B07B8Q2G3K/ref=sr_1_3?dchild=1&keywords=trezor+hardware+wallet&qid=1596408477&sr=8-3 https://www.amazon.com/Ledger-Nano-Cryptocurrency-Hardware-Bluetooth/dp/B07M6R4NK3/ref=sr_1_3?dchild=1&keywords=ledger+nano+x&qid=1596408463&sr=8-3 LastPass https://www.youtube.com/user/lpuser11 www.Lastpass.com www.peazip.org Memory System https://artofmemory.com/wiki/Number_Shape_System https://medium.com/@mikaileliyah/chapter-1-mnemonics-basics-number-shape-pegging-method-51f638b178d9 Books to Buy: https://www.amazon.com/Security-Engineering-Building-Dependable-Distributed/dp/1119642787/ref=sr_1_2? https://www.amazon.com/Introduction-Cryptography-Chapman-Network-Security/dp/1466570261/ref=sr_1_4?dchild=1&keywords=jon+katz+cryptography&qid=1596410170&sr=8-4dchild=1&keywords=anderson+information+security&qid=1596410090&sr=8-2 Courses to take on Security: https://www.coursera.org/specializations/cyber-security

Additional Info

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.

Disclaimer: As a news and information platform, also aggregate headlines from other sites, and republish small text snippets and images. We always link to original content on other sites, and thus follow a 'Fair Use' policy. For further content, we take great care to only publish original material, but since part of the content is user generated, we cannot guarantee this 100%. If you believe we violate this policy in any particular case, please contact us and we'll take appropriate action immediately.

Our main goal is to make crypto grow by making news and information more accessible for the masses.