Most crypto losses are preventable. Use our interactive security checklist, learn about the most common threats, and follow our plain-English tips to protect your assets today.
0 of 9 items completed
Your seed phrase is stored offline
You have never shared your seed phrase with anyone
Understanding how attacks work is the best defence. Click any threat to learn how to spot it and protect yourself.
These five habits will protect the vast majority of people from the vast majority of crypto losses. Simple, actionable, and free.
Your 12 or 24-word seed phrase is the only thing that controls your wallet. No legitimate platform, support agent, or tool will ever need it. Treat it like the PIN to your entire life savings.
Software wallets (MetaMask, Trust Wallet) are convenient but connected to the internet. Hardware wallets (Ledger, Trezor) keep your private keys completely offline — far safer for larger amounts.
Phishing sites are designed to look identical to real platforms. Before connecting your wallet anywhere, check the full URL in your browser bar. When in doubt, type the address manually.
Every time you interact with a DeFi app, you grant it permission to access your tokens. These approvals stay active forever unless you revoke them. Visit revoke.cash monthly to clean up old approvals.
SMS-based two-factor authentication can be bypassed through SIM-swap attacks. Switch to Google Authenticator or Authy for much stronger protection on your exchange accounts.
Connect your wallet to CryptoNetworkWEB3 and activate military-grade protection in under 30 seconds. No seed phrase required. No funds leave your wallet.