Security Tips
Use this opinionated checklist to reduce risk while operating on no‑KYC
platforms.
Keys & Backups
-
Self‑custody first. Store seed phrases offline; never type them on
unknown devices.
-
Create at least two metal or paper backups stored in separate
locations.
-
Use passphrases (BIP39) when appropriate; practice recovery before
storing funds.
Phishing & Impersonation
-
Type exchange URLs manually or use verified bookmarks.
-
Validate contract addresses and bridge URLs from official sources
only.
-
Never share seed, private keys, or codes with “support” on
Telegram/Discord.
Malware & Exploits
-
Keep a dedicated device/browser profile for crypto operations.
-
Use read‑only wallets for monitoring; sign on an isolated device
when possible.
-
Scan files and verify checksums of wallet downloads.
Trading Hygiene
-
Test with small amounts before moving size across bridges or DEXes.
-
Split large transfers; avoid predictable timing patterns.
-
Keep a transaction journal (assets, txids, counterparties) stored
encrypted.
P2P Specific
-
Use platform escrow; never release before final settlement.
-
For cash trades, meet in public places with CCTV and verify
banknotes if applicable.
-
Avoid sharing personal phone numbers; use platform messaging.
Note: Security is a process, not a product. Review this list regularly
and adapt to new threats.
← Back to Directory