Post about security aspects on usage crypto wallets and exchanges
π»Windows vs Linux vulnerabilities
##windows
- keylogger
- file stealer
- cookies, logs, app data stealer
- screenshot maker
ways to get vulnerability::
- direct download and autolaunch
- telegram autodownload and autolaunch
- manual launch (may be masked as a picture, etc.)
measures to prevent:
- clear cookies, cache and browser files anytime after finishing work
- switch off autodownload option in Telegram
- double check website url where you download something
- don't download anything from suspicious websites
##linux
- keylogger
- file stealer
- cookies, logs, app data stealer
- screenshot maker
way to get vulnerability:
- manual download and manual install only
##CONCLUSION
Minimize Windows usage at all, only for test purposes or urgent necessity. Do not run unknown commands on Linux and do not install applications from unknown sources.
Better of all, use clear Linux OS where you just have your wallets and nothing more, i. e. no installations, no updates etc.
For
#hardware wallets, use two ones: the first one is for spendings (less than amount that is not critical to lose on balance), the second one is for holding of more large amounts.
#security