In Part I – Introduction we covered the four risk categories you want to be aware of when using any Bitcoin or other cryptocurrency wallet. By using a hardware wallet you protect yourself against custodial risk (#1). By setting up your Trezor, Ledger, or other hardware wallet properly and keeping your backups safe, you protect against loss or corruption of the hardware device itself (#2). This article covers risk #3: Incorrect or malicious addresses and phishing in general. This risk applies to any type of crypto wallet, hardware or otherwise, so the best practices below are important for anyone to learn. Don’t worry, though, as these are pretty easy habits to establish!
Launched in the summer of 2017, Athena Investor Services was created to satisfy the high level of demand for a place where the everyday investor could go to invest in cryptocurrency in bulk amounts and be treated to a high-touch customer-first approach.
Since launching, we’ve facilitated millions of dollars worth of trades for many happy customers, and are continuing to acquire new clients each day. Would you like to be the next one? Continue reading to learn the top 5 reasons why you should use Athena Investor Services.
In Part I – Introduction we went over the four main risks you want to consider when storing your bitcoin or other cryptocurrency. By choosing the Ledger Nano S (or the Trezor) you are starting down the right path toward maximum security. Right out of the box these devices protect you against custodial risk: Only you will have access to your crypto assets. The Ledger Nano S also currently supports the most number of crypto assets of any hardware wallet, making it ideal for use with Athena Investor Services. Let’s proceed to set one up!
The Ledger Nano S (official website: https://www.ledgerwallet.com/ ) along with the Trezor (official website: https://trezor.io/ ) are the two hardware wallets we recommend most to our clients. Hardware wallets are physical devices that connect to a PC or Mac computer (in most cases) and provide the current optimum balance between security and ease of use. The important difference between hardware wallets and the software wallet apps you can download to your phone or PC is that the private keys inside a hardware wallet reside only on that separate, physical device; they are never exposed to an internet-connected computer. This is essential for preventing many types of attacks that a software wallet is potentially exposed to.
While there are attack vectors that can affect the addresses displayed or used on an infected client computer (where you connect and interact with a hardware wallet), this type of vulnerability has been around since the beginning of Bitcoin! In fact, this same class of vulnerability applies to all Bitcoin and other crypto wallets everywhere, whether software or hardware. It is not unique to Ledger devices.
Athena Blockchain webinar series presents: Strategies for Asset Backed Token Issuers from ERC-20 to BANKEX. This webinar provides an introduction to asset backed tokens, Athena Blockchain’s framework for issuance, and some of the important technologies that will shape this space in the future.
Featured Speaker: Neil Benedict-BANKEX, Product Manager for North America.
To watch the webinar, click the “Continue Reading” button below.
Bitcoin is a first-of-its-kind digital currency. While most money we deal with today is digital (rather than physical) in form, Bitcoin was the first successful attempt at a digital money which has no central issuer and whose rules of operation and balance of economic incentives are “baked” into the code. Unlike any other common currency, Bitcoin has a fixed supply limit of 21 million units (each unit is also called a “bitcoin”) and a fixed schedule of inflation that decreases over time until all units have been “mined”. Bitcoin miners do the serious computational work of securing the network against outside attack and assist in checking the validity of each Bitcoin transaction. Their reward is the newly generated bitcoin