Translations: |
Portuguese-Brazilian | 1,476 | 4 months ago | |
French | 1,476 | 4 months ago | |
OpSec SelfGuard RoadMap |
AnonPlanet | | | |
My Blog on Mirror | | | |
My Blog on Medium | | | |
OpSec SelfGuard RoadMap / Why do I need OpSec? |
my blog! | | | Study |
Follow AnonPlanet! | | | |
Security Tips & Devices for Digital Nomads | | | |
OpSec SelfGuard RoadMap / What do I need for a perfect OpSec? |
The Only Safe Way to Store Crypto | | | |
An ultimate list of rules any on-chain survivor should follow to stay safe! | | | |
Trail of Bits Minimum Viable Plans (MVPs) for Security | | | |
On Operational Security in Web3 | | | |
AnonPlanet | | | |
opsecprofessionals.org | | | |
Crypto Security Best Practices Checklist | | | |
Check out this tool! | | | |
Wholeaked Tool | 1,034 | almost 3 years ago | |
Symbiote Tool | 830 | 12 days ago | |
Problem 1 |
Watch More | | | |
Read More on Email Encryption with Proton | | | |
Meta Secret Tool | | | |
Croc Tool | 28,127 | 8 days ago | |
Richard Stallman: How I Do My Computing | | | |
Choosing a Reliable VPN Provider for Life & Work | | | |
The Only Safe Way to Store Crypto | | | |
An ultimate list of rules any on-chain survivor should follow to stay safe! | | | |
Trail of Bits Minimum Viable Plans (MVPs) for Security | | | |
Check out this awesome Privacy-focused toolkit! | | | |
Create your own vpn server | | | |
Create your own vpn server No.2 | | | |
Setup OpenVPN server on Ubuntu | | | |
Watch more | | | |
Wireguard VS OpenVPN | | | |
Brave Browser Privacy Issues | | | |
How to Disappear from the Internet! | | | |
How to hide your email | | | |
Anti-detection system | | | |
Problem 2 |
Taming a Wildhorse CEX App | | | |
«Back office» and «front office» | | | |
Steganography tool | | | |
The State of Crypto Security | | | |
Blockchain dark forest selfguard handbook | 5,454 | 4 months ago | |
Store SSH keys in the Secure Enclave! | 7,234 | 3 months ago | |
Blockchain dark forest selfguard handbook | 5,332 | 14 days ago | |
A tool that allows user to create time bound backups for various cryptocurrencies | 9 | over 1 year ago | |
Wi-Fi Security A-Z | | | |
Fing App | | | |
How to detect if someone is attempting to crack your wi-fi | | | |
Use a Raspberry Pi To Catch Hackers with OpenCanary | | | |
canarytokens.org | | | |
Someone overheard me! Why it's important to think about all attack vectors, even if they seem unlikely to happen? | | | |
MacOS + IOS + Crypto + OpSec = ? | | | |
Awesome wifi security | 160 | over 5 years ago | |
bbox.rocks | | | |
IT security lecture | 372 | over 1 year ago | |
Unredacter Tool | 7,792 | 8 months ago | |
forensicdots.de | | | |
meta-secret App | | | |
Portable-secret App | | | |
This article tells that when using BitWarden one have to audit server side cryptography primitives by himself and monitor for changes! | | | |
Secant | | | |
Awesome csirt | 466 | about 2 months ago | |
teachingprivacy.org | | | |
securityinabox.org | | | |
SecureYourselfNow | | | |
ssd.eff.org | | | |
Wasted | | | |
bbox.rocks | | | |
Read More | | | |
NIST 800-63b Password Guidelines and Best Practices | | | |
OpSec tips | | | |
How to Defend Your Castle | Innovative Trio in Smart Contract Security: Monitoring, Prevention, Defense | | | |
Web3 Cybersecurity Academy | | | |
Enhancing user asset security | | | |
Rare Web2 phreaker style attacks: Note | | | |
Problem 3 |
OpSec Going Smart | | | |
OpSec Going Smarter | | | |
OpSec Going Smarter: Secure Smartphones | | | |
Choosing a Reliable VPN Provider for Life & Work | | | |
How to use an ipad as a secure calling and messaging device | | | |
Read More | | | |
Intro to Web3 Security | | | |
Privacy and Scaling Explorations | | | |
A collection of practical security-focused guides and checklists for smart contract development | 1,065 | about 1 year ago | |
Problem 4 |
Tips from TrailOfBits | | | |
Read More | | | |
CryptoCustody Blog | | | |
A DIY Guide to High-Security Cryptography | | | |
Securing OT Systems: A Practical Guide | | | |
ECDSA: Handle with Care | | | |
solidity-security | 126 | 5 months ago | |
A Basic iPhone Feature Helps Criminals Steal Your Entire Digital Life | | | |
Checklist for Developers for securing APIs | | | |
Problem 5 |
List of Hardware Wallet Hacks | | | |
Another List | | | |
walletcompare.xyz/ | | | |
walletscrutiny.com | | | |
Security Tips & Devices for Digital Nomads | | | |
The Only Safe Way to Store Crypto | | | |
An ultimate list of rules any on-chain survivor should follow to stay safe! | | | |
Read More | | | |
Read More | | | |
ShiftCrypto | | | |
Rogue Key Attack in BLS Signature and Harmony Security | | | |
Opinion on Trezor | | | |
airgapcomputer.com | | | |
Coldcardwallet | | | |
Cypherockwallet | | | |
Sparrowwallet.com | | | |
BitBox | | | |
Bitlox | | | |
Alphawallet | | | |
Airgap_it | | | |
rainbow.me | | | |
Frame.sh | | | |
Walletscrutiny.com | | | |
Grid-lattice1 | | | |
Atomicwallet.io | | | |
Alternatives to Metamask | | | |
myetherwallet.com | | | |
Forked MetaMask | | | |
Multichain crypto wallet | | | |
Problem 6 |
Audio Steganography : The art of hiding secrets | | | |
Audio Steganography Technique for Communication Security | | | |
Learn OpSec basics in 15 mins | | | |
OpSec Going Smart | | | |
OpSec Going Smarter | | | |
Portable Secret | | | Check out: & |
Read More | | | |
How to Store Seed Phrase Backups | | | |
Awesome Security Hardening Guides | 5,502 | about 2 months ago | |
Authenticator app for storing your 2FA secrets | 16,119 | 4 days ago | |
iOS Forensics References | 204 | 12 months ago | |
Android Forensics References | 287 | over 1 year ago | |
Problem 7 |
Digital Communications Protocols | | | |
OTR versus OMEMO | | | |
ChatSecure | | | |
Encrypted Instant Messaging on Mac OS X with Adium and Off The Record | | | |
axolotl, OMEMO vs OpenPGP | | | |
The most significant milestones in the development of communications | | | |
Telegram & Discord Security Best Practices | | | |
Jolly Roger’s Security Thread for Beginners | | | |
A curated list of privacy & security-focused software and services | 6,953 | 1 day ago | |
Complete Expert Opsec Setup | | | |
Pidgin | | | |
The Hitchhiker’s Guide to Online Anonymity | | | |
element.io - Matrix client | | | |
jitsi.org - for video calls | | | |
Open source virtual / remote desktop infrastructure for everyone! | | | |
The Invisible Internet Project | | | |
Get Bridges for Tor | | | |
YouTubeDrive | 1,912 | over 6 years ago | & |
youbit | 673 | about 2 years ago | |
aperisolve.com | | | |
An ultimate list of rules any on-chain survivor should follow to stay safe! | | | |
openvpn-install | 19,245 | 2 months ago | |
Juice jacking: Why you should avoid public phone charging stations | | | |
Throwingstar... | | | |
How I turned a mini-PC into an Ethereum node to run at home | | | |
Spin up your own Ethereum node | | | |
Check out this resource! | | | |
Improve Fast Reaction: Techniques to Enhance Your Reflexes | | | |
Guide to securing and improving privacy on macOS | 21,308 | 18 days ago | |
Set of utilities to manage BIP44-compatible Ethereum HD wallet | | | |
The Last Laptop You'll Ever Need For Crypto | | | |
Nano-Painting: Encryption With Colours | | | |
Hacking a Windows Machine by Hiding a RAT Inside an Image | | | |
The Importance of Self-Custody Password Managers: A Deep Dive | | | |
Read this article! | | | |
MacOS Secure Profiles | 8 | about 1 year ago | |
MacOS Security | 1,792 | 8 days ago | |
Free, open-source tools to protect your Mac | | | |
Mac Monitor | 941 | 5 months ago | |
Security checklist app for your Mac | | | |
Manual | | | QubesOS; |
Manual | | | TailsOS; |
Manual | | | WhonixOS; |
Forum | | | GrapheneOS; |
Manual | | | LineageOS; |
Manual | | | DivestOS; |
Read | | | |
Comparing VeraCrypt and TrueCrypt with an unexpected result | | | |
Awesome Security Hardening Guides | 5,502 | about 2 months ago | |
Endian | | | |
sandboxie-plus.com | | | |
Digital Communications Protocols | | | |
spideroak.com | | | |
rsync.net | | | |
nextdns.io | | | |
app.any.run | | | |
Malware - File Analysis | | | |
Island | | | |
Vanilla OS | | | |
safing.io | | | |
shadowsocks | | | |
mac.getutm.app | | | |
souin | 715 | 6 days ago | |
geti2p.net | | | |
anon-service | 14 | 4 months ago | |
privacy.sexy | | | |
Learn Cryptography! | | | |
Catch the Man-in-the-Middle | | | |
CamWings | | | |
ScreenWings | | | |
rethink-app | 3,005 | 6 days ago | |
kleopatra | | | |
DPI tunnel | | | |
Teletun | 331 | almost 5 years ago | |
GoodbyeDPI | 25,511 | 16 days ago | |
algoVPN | 28,977 | 3 months ago | |
usbraptor | | | |
Network Bandwidth Analyzer - Bandwidth Monitor | | | |
Network and IT infrastructure monitoring for small & medium environments | | | |
Dota 2 Under Attack: How a V8 Bug Was Exploited in the Game | | | |
Dangerous RCE Vulnerability in GTA Online Fixed | | | |
What We Know About the Vulnerabilities Keeping ‘Dark Souls’ Offline | | | |
Details about the ‘Dark Souls’ hacking exploit have been published | | | |
SiM Swap Attacks Rising in Web3 | | | |
Steganography and You: When What You See Isn’t All You Get | | | |
Discord Security | 42 | about 1 year ago | |
Stop Auto-Download on Telegram: Working Methods for Desktop, iPhone, Android! | | | |
Death Note Anonymity | | | |
Instant Workstation: Virtual Machines | | | |
Problem 8 |
DefaultCreds CheatSheet | 5,699 | 2 months ago | |
Physical crypto attacks | 577 | 10 days ago | |
About If you want know, who use your computer when you are not nearby - PC Mouse Tracker | 48 | about 3 years ago | |
Read More | | | |
Torn | | | |
Anon Swaps | | | |
sideshift.ai | | | |
agoradesk.com | | | |
Aztecnetwork | | | |
Aztec-2 Dune Privacy Dashboard | | | |
RailGun | | | |
Monero | | | |
Problem 9 |
Physical Security: Escapology | | | |
Threat modeling for smart contracts step-by-step guide | | | |
How to Defend Your Castle | Innovative Trio in Smart Contract Security: Monitoring, Prevention, Defense | | | |
Read More | | | |
Read More | | | |
Drive NFC Hack | | | |
Web3.0 API Security for TestNet and MainNet Environment for Authorization Attack Prevention Implementation Using Python | | | |
Ethereum nodes security | | | |
How To Secure Your Crypto Wallet On A Virtual Machine And Stop Front-Running | | | |
The Evolving Landscape of Privacy in Web3 | | | |
Problem 10 |
Wi-Fi Security when holding Crypto assets! | | | |
Read More | | | |
Read More | | | |
SS7 Attacks | | | |
More SS7 Attacks | | | |
How to detect IMSI catchers | | | |
Check out | | | |
Wardriving | 155 | over 1 year ago | |
CreepDetector | 198 | over 3 years ago | |
AntiCensorship Messaging | | | |
Discord e2e encryption | 87 | over 5 years ago | |
Problem 11 |
On Operational Security in Web3 | | | |
Network Security Myths Busted | | | |
5 Ways to Find Hidden Cameras Using Your Mobile Phone | | | |
9 Places Where Secret Cameras Are Most Likely to Be Hidden | | | |
Discussion about how to find hidden cameras. | | | |
Perform a Self-doxxing! | | | |
Watch More | | | |
Awesome InfoSec | 5,207 | 9 months ago | |
Dear Security, be a part of the solution | | | |
Staying Safe in Web3: OTC Scams | | | |
HoneyPots against Hackers | | | |
Randomness Concept | | | |
CIA Triad | | | |
Detect Personal Information Leakage With OSINT Attack Surface Management | | | |
Leveraging Open-Source Intelligence (OSINT) for Enhancing Efficiency in Business Administration: A Comprehensive Examination | | | |
Problem 12 |
The Wiretap: How The FBI Digs Up Deleted WhatsApp Messages | | | |
anonymousplanet.org | | | |
Android keyboard for secure E2EE communication through the signal protocol in any messenger | 668 | 7 months ago | |
Steganography | | | |
this tool | 1,034 | almost 3 years ago | Check out ! |
Check out this awesome Privacy-focused toolkit! | | | |
Watch More | | | |
stylesuxx.github.io | | | |
stegonline.georgeom.net | | | |
Problem 13 |
Read More | | | |
AnonPlanet | | | |
censorship.no | | | |
detect.expert | | | |
WhatBreach | 1,179 | about 1 month ago | |
Building a Transaction By Hand | | | |
Generating a Seed Phrase using a Calculator | | | |
Instruments on the radio waves🛠 | | | |
No Internet, No Problem: How to Send Bitcoin by Amateur Radio | | | |
The Cypherpunks Tapping Bitcoin via Ham Radio | | | |
The Only Safe Way to Store Crypto: Ultimate OpSec | | | |
Better privacy without special software | | | |
Problem 14 |
Can forensic science still recover data from a hard drive after a seven-pass wipe? | | | |
Gentoo | | | |
TailsOS | | | |
Awesome Memory Forensics | 347 | about 1 year ago | |
WhonixOS | | | |
ParrotOS | | | |
LUKS! | | | You may also try using |
File carving | | | |
Read More | | | |
Choose Veracrypt (better) or FileVault! | | | |
Citation from this resource: | | | |
Problem 15 |
Read More | | | |
Tips from TrailOfBits | | | |
CryptoCustody Blog | | | |
6 Reasons to Avoid Cloud Services and Keep Your Feet on the Ground | | | |
How Crypto Stealth Addresses Keep Your Transactions Private | | | |
How to Hide Your MAC Address and Why You Should | | | |
5 Ways to Hide Apps on Your iPhone | | | |
Problem 16 |
Create a ‘Panic’ Alarm With Aqara Hub & Siri Shortcuts | | | |
How to use the 'In Case of Emergency' iPhone shortcut to get quick help from rescue services or a contact | | | |
Automated Panic Button: Details in Comments | | | |
Event Triggers - Siri | | | |
Using Siri Shortcuts as a Panic Button on Apple Watch - Discussion | | | |
Panic Button App example | | | |
Read More | | | |
Ultimate Guide to Safely Self Custody your Crypto | | | |
Setting up a VM for crypto operations | | | |
Problem 17 |
Read More | | | |
SIEM | | | |
DLP | | | |
IDS | | | |
How to Generate Your Own GnuPG Key | | | |
5 Reasons Installing Fewer Apps Helps You Stay Safe | | | |
Problem 18 |
Telegram & Discord Security Best Practices | | | |
Read More | | | |
Read More | | | |
Check out: Littlesnitch tool | | | |
Problem 19 |
Read More on Incident Response Plans | | | |
Read More | | | |
Problem 20 |
Violent Attack Vectors in Web3: A Detailed Review | | | |
Here's a List of 29 Different Types of USB Attacks | | | |
Bluetooth Attacks and Security Tips – Awareness Results in Better Protection | | | |
Bluetooth Security: 5 Ways to prevent Bluetooth attacks with Build38 | | | |
This is a macOS hardening to read or set security configuration | 124 | 7 days ago | |
A collection of awesome security hardening guides, tools and other resources | 5,502 | about 2 months ago | |
Guide to securing and improving privacy on macOS | 21,308 | 18 days ago | |
Watch More | | | |
Read More | | | |
scan.tylabs.com | | | |
any.run | | | |
dangerzone.rocks | | | |
Malwoverview | 2,967 | 9 days ago | |
urlscan.io | | | |
Problem 21 |
Watch More | | | |
Watch More | | | |
Read more | | | |
cameras detector at Amazon | | | Video could be easily find. Just buy any . You should be able to detect infrared radiation coming from the objective or (and) wireless connection! Any front camera on old phone does not have infrared filter so also can be used for it! |
pin-pointer | | | Sweep with a metal detector or a |
use a hardware VPN | | | Never use a local Wi-Fi network without VPN (mullvad.net or ) |
How To Detect Hidden Cameras | | | |
How to find hidden cameras - 2.0 | | | |
4 Ways of Detecting Hidden Cameras in Your Airbnb | | | |
Cybersecurity expert explains how to find hidden cameras in an Airbnb or hotel room | | | |
How to Find Hidden Spy Cameras in your Airbnb with Wireshark | | | |
Lumos System Can Find Hidden Cameras and IoT Devices in Your Airbnb or Hotel Room | | | |
Lumos: IoT device detection system | | | |
Researchers reveal how hotel key cards can be hacked - what you need to know | | | |
How Does a Drive-By NFC Hack Work? | | | |
Key Card Entry System Security: What is the Difference Between NFC and RFID? | | | |
Your hotel card may be copied through this item | | | |
logic bomb | 38 | about 9 years ago | |
Duress - Emergency Password | | | |
Contracts for a wallet that is recoverable via backup keys | 51 | over 1 year ago | |
Better privacy, without special software | | | |
digi cloak | 62 | 20 days ago | |
hackna | | | |
html vault | 150 | 29 days ago | |
Great PC for work | | | |
Another great PC for work | | | |
More Info | | | |
Trail of Bits Minimum Viable Plans (MVPs) for Security | | | |
OpSec101 | | | |
Problem 22 |
OpSec Going Smarter: Secure Smartphones | | | |
Read More | | | |
Telegram & Discord Security Best Practices | | | |
darknetdiaries: Encrypted Phones | | | Check out: |
A nice OpSec feature | | | |
iPhones Vulnerable to Attack Even When Turned Off | | | |
Malicious profiles – one of the most serious threats to iPhones | | | |
Why Configuration Profiles Can Be As Dangerous As Malware on iPhones and iPads | | | |
Kyocera phones | | | |
iCloud | | | Latest iPhone (watch out & ) or Android |
BlackBerry Device | | | Let's the true in this industry! |
ThinkPhone | | | |
What is Island in Android? | | | |
Read more | | | |
Problem 23 |
walletcompare.xyz | | | |
walletscrutiny.com | | | |
TryEthernal.com | | | |
Defillama.com | | | |
Rotki | | | |
Find wallet | | | |
Read More | 1,902 | 8 months ago | |
Read More | | | |
Someone overheard me! Why it's important to think about all attack vectors, even if they seem unlikely to happen? | | | |
On Operational Security in Web3 | | | |
Violent Attack Vectors in Web3: A Detailed Review | | | |
Do not confuse it with allowance approve scam! | | | |
How to protect your assets | | | |
SideShift | | | or |
How to fund an undoxxed Ethereum wallet off-chain | | | |
changenow.io | | | |
tradeogre | | | |
atomic swap | 344 | 11 months ago | ETH-XMR - this one released via a bridge! |
Aztecnetwork | | | Maybe also check out: but always keep in mind |
Spook | 55 | over 1 year ago | |
RPC-proxy | 23 | almost 2 years ago | |
Zmok | | | |
Helios | 1,868 | 20 days ago | |
Problem 24 |
The Only Safe Way to Store Crypto | | | |
Read More | 9,891 | 14 days ago | |
Read More | | | |
How to protect your assets | | | |
On Operational Security in Web3 | | | |
Problem 25 |
Physical Attacks | 577 | 10 days ago | |
Physical Security Tips | | | |
3FA | | | |
Counter-OSINT Techniques | 414 | over 1 year ago | |
Read More | 577 | 10 days ago | |
Read More | | | |
| | | |
OpSec Going Smart | | | |
OpSec Going Smarter | | | |
OpSec Going Smarter: Secure Smartphones | | | |
Choosing a Reliable VPN Provider for Life & Work | | | |
Innovative Trio in Smart Contract Security: Monitoring, Prevention, Defense | | | |
The Only Safe Way to Store Crypto | | | |
How Cross-Chain Bridges are Hacked? | | | |
What you should do if you think someone has stolen your crypto-assets | | | |
What to do when your Web3 project Discord server is hacked & how security audit may prevent it from happening | | | |
Violent Attack Vectors in Web3: A Detailed Review | | | |
What is ARP spoofing and how to protect against it? | | | |
An ultimate list of rules any on-chain survivor should follow to stay safe! | | | |
QR Code: An Underestimated Danger | | | |
The most significant milestones in the development of communications | | | |
Someone overheard me! Why it's important to think about all attack vectors, even if they seem unlikely to happen? | | | |
Laplace's Demon Speaks: Is there a life in blockchain? | | | |
MacOS + IOS + Crypto + OpSec = ? | | | |
How to win the war, trick the KGB and protect your crypto-assets from theft by Steganography | | | |
Master of OpSec Masters: A View Through the Prism of Time | | | |
OpSec in Crypto: Thoughts | | | |
Attacks via a Representative Sample : Myths and Reality | | | |
How can you become a one-man-army OSINT specialist? | | | |
Key principles of storing cryptocurrency securely | | | |
On Operational Security in Web3 | | | |
Taming a Wildhorse CEX App | | | |
Telegram & Discord Security Best Practices | | | |
AnonPlanet | | | |
Anon Guide | | | or via |
anonymousplanet.org | | | |
My Works | | | |
How to use an ipad as a secure calling and messaging device | | | |
Stylometric fingerprinting redux | | | |
privacyguides.org | | | |
OpSec | | | |
DeepWeb OpSec | | | |
privacytools.io | | | |
Start.me RabbitHole | | | |
Trail of Bits Minimum Viable Plans (MVPs) for Security | | | |
OpSec101 | | | |
Awesome Security Hardening Guides | 5,502 | about 2 months ago | |
How to protect your crypto assets | | | |
Crypto OpSec | | | |
Security best practices | | | |
MyCrypto’s Security Guide For Dummies And Smart People Too | | | |
Check out this awesome Privacy-focused toolkit! | | | |
The Ten Commandments of crypto security | | | |
Privacytests.org | | | |
Privacy.sexy Repo | 4,165 | 11 days ago | |
Privacy.sexy Website | | | |
Intro to Web3 Security | | | |
Privacy and Scaling Explorations | | | |
A collection of practical security-focused guides and checklists for smart contract development | 1,065 | about 1 year ago | |
opsecprofessionals.org | | | |
Additional Resources |
https://www.youtube.com/watch?v=hxHqE2W8scQy | | | |
https://www.youtube.com/watch?v=0aSQMeoz9ow | | | |
https://www.youtube.com/watch?v=pGcerfVqYyU | | | |
https://www.youtube.com/watch?v=9XaYdCdwiWU | | | |
https://www.youtube.com/watch?v=ixLuRvYlrlw | | | |
https://blog.keys.casa/7-ways-to-level-up-your-bitcoin-opsec | | | |
https://medium.com/the-business-of-crypto/fundamentals-of-opsec-in-crypto-7844ba701b1d | | | |
https://www.threatstack.com/blog/five-opsec-best-practices-to-live-by | | | |
https://digitalguardian.com/blog/what-operational-security-five-step-process-best-practices-and-more | | | |
https://www.gocivilairpatrol.com/programs/emergency-services/operations-support/operational-security-opsec | | | |
https://joelgsamuel.medium.com/how-to-keep-your-smartphone-safe-from-spying-d7d50fbed817 | | | |
https://www.cnbc.com/2017/11/02/heres-how-to-protect-your-bitcoin-and-ethereum-from-hacking.html | | | |
https://www.cnbc.com/2021/06/11/tips-to-help-keep-your-crypto-wallet-secure.html | | | |
https://www.ledger.com/academy/security/hack-wifi | | | |
https://datatracker.ietf.org/wg/opsec/documents/ | | | |
https://www.lopp.net/bitcoin-information/security.html | | | |
https://www.reddit.com/r/opsec/ | | | |
https://arxiv.org/abs/2106.10740 | | | |
https://web.mit.edu/smadnick/www/wp/2019-05.pdf | | | |
https://airgapcomputer.com | | | |
https://joelgsamuel.medium.com/how-to-keep-your-smartphone-safe-from-spying-d7d50fbed817 | | | |
https://assets.website-files.com/5ffef4c69be53b44bd10b438/6012f54022181b0d0a3a948c_CryptoCurrency%20Security%20Standards%20Checklist.pdf | | | |
https://blog.eduonix.com/cryptocurrency/cryptocurrency-security-checklist-investors-adopt/ | | | |
https://github.com/jlopp/physical-bitcoin-attacks/blob/master/README.md | 577 | 10 days ago | |
https://cryptosec.info/checklist/ | | | |
| | | |
My Blog on Mirror | | | |
My Blog on Medium | | | |