Security Memo

Updated 4/11/2019

You ARE a target

If you are reading this memo, it’s probably either because you’ve asked for it, or someone has deliberately sent it to you.

This means you recognize you are a target. Don’t forget that. It’s super easy to become complacent and that leads to STUPID errors.

This is a memo to highlight best security practices. It’s a practice because it’s not a “one-and-done” thing you do - just like installing a lock on your door, it only works if you USE the lock and lock the door.

This is a living document, but it is only meant as guidance and may quickly become obsolete.

The goal here is to make it harder for attackers to gain access to your information and money and identity.

This is also written for the average user. If you think you are a high-risk target. Please seek expert advice! I can make some recommendations for you. Please feel free to reach out to me.

TOC

Physical Security

Never leave your devices unattended

Activate remote wiping

Who can see your devices?

External drives

Sharing your screen

Video streams

Paper security

Location

Digital Security

Keep your software up-to-date

Phone

SIM Safety

Computer

Passwords

2FA

Team drives

Attachments

Links

Browsers

Wifi

Messaging apps

Credit Cards

Financial Information

Cryptocurrency Security

Exchanges

Emails / usernames

2FA

Don’t keep funds on exchanges

Storage

Backing up your wallet

Backing up Seed phrases

Hot wallets

Mobile wallets

Desktop wallets

Cold wallets

Hardware wallet.

Cold Storage Computer

Paper wallet

Multi-sig

Conclusion

Security is a way of life.

The conclusion of life.

1. Physical Security

1.1. Never leave your devices unattended

Please ensure your devices are either LOCKED away or on your person. DO NOT leave laptops in a bag in the corner of a conference room / meetup / bar.

1.2. Activate remote wiping

Use FindMyiPhone or equivalent so that if you lose your device you can (a) see where it is and (b) remote wipe the data: Settings > Accounts & Passwords > iCloud > Find My iPhone.

1.3. Who can see your devices?

I once sat on a plane next to a competitor in an M&A deal. By the end of the flight I knew exactly what they were going to pay for the business we were competing to buy. I won the deal. 😂

Be careful when using your laptop or making phone calls in public places. Use a privacy screen for your laptop.

1.4. External drives

DO NOT plug external drives into your computer. If someone needs to share a document with you, ask them to do so through google drives. If there is no alternative, use YOUR USB stick which you should wipe each time you use it.

USB sticks make great giveaways at conferences. (NOT!). Never put a giveaway USB drive into your computer!!

1.5. Sharing your screen

If you are sharing your screen in a webinar / conference call or at a conference venue by plugging into a projector remember that whatever is on your screen is visible to others.

Close unnecessary applications / tabs / browsers and switch off alerts (I recently saw a tinder alert on the big screen from someone’s laptop at a conference! 😂)

1.6. Video streams

We all regularly use video streams to have conversations with friends and colleagues around the world. When you are not using your camera - use a camera cover. Also helpful incase an audio call unexpectedly becomes a video call!

When you are using your camera think about what is on display. Not just you but are there any papers, notes, other screens, whiteboards, background conversations which you don’t want to be streamed too!

1.7. Paper security

Avoid using paper to write down important information unless is secured. A lost notebook cannot be remotely wiped.

1.8. Location

Avoid posting on social media about your travel plans. Particularly if your house is empty when you’re away.

2. Digital Security

2.1. Keep your software up-to-date

Fully reboot your laptop at least twice a week and perform a check for software updates. The eternally “sleeping” Macbook is prone to miss updates and compromise security. Ensure full disk-encryption is switched ON.

2.2. Phone
2.3. SIM Safety
2.4. Computer

A mac is preferable to a windows computer which tend to be more susceptible to attacks.

2.5. Passwords
2.6. 2FA

2FA = something you know (password) *+ *something you have (codes)

It is a bad idea to write down your passwords and chain your 2FA device to your computer!!

2.7. Team drives

All company information should be stored in the Team Drives. Please avoid saving company information on your personal computer or personal drives.

2.8. Attachments

Attachments are one of the biggest risks you face. Even attachments coming from a trusted sender are a danger; if someone you know gets their email hacked, the attacker may send you a message that looks just like a typical message (for example, an email from your colleague with a Word doc).

Here is the hierarchy of attachment safety, from safest to most risky:

Don’t send attachments. Send google drive links wherever possible.

Shortened URL links can make you visit websites that are BAD news. If in doubt, copy the shortened url, and then open up terminal and type “curl URL -I” which will then show the URL that the link shortener goes to, without having to actually go there.

2.10. Browsers
2.11. Wifi

Where possible connect to wifi networks you trust. For unsecure networks, avoid carrying out sensitive tasks and sending and receiving sensitive information.

Unsecure wifi includes:

If in doubt, hotspot to your mobile phone.

2.12. Messaging apps
Good for secure conversations Okay for normal use NOT Okay
Sense Chat Whatsapp Facebook Messenger
Signal Slack Twitter DMs
Telegram private chat Skype Instagram DMs
Wikr WeCha SMS
2.13. Credit Cards

Do your best to protect the privacy of your credit card numbers. If you want to use virtual cards to give out to people who shop, work, or do errands for you, I recommend using Privacy.com - you can use this service to create custom cards for individual merchants or people, in addition, you can set limits on monthly spending or create a card for one-time use. I recommend using these for services online that require you to put your card down for a free trial, or for any subscription so you have a single place where you can turn off a subscription by just pausing your virtual credit card.

2.14. Financial Information

Try to avoid putting your credit cards or account numbers into an email or into unencrypted notes on your computer or cloud storage (this includes iCloud/Apple notes). Definitely avoid storing your pin number near your ATM or debit card. I recommend avoiding writing these sort of things down. As tempting as it is to put them in your wallet in little pieces of paper, it’s probably the least secure place and easiest to be stolen/lost since you carry it around.

3. Cryptocurrency Security

This is the best article I have found for keeping your crypto. It is also long and complex and isn’t for the everyday user. The steps you take should be proportionate to the amount of crypto you hold and your appetite for risk vs. security.

Below is a short guide to what I would consider to be reasonable steps.

3.1. Exchanges
3.1.1. Emails / usernames

When signing up for exchanges use an email address which is only used for this purpose and preferably one which is uncorrelated to you so that people can’t guess an email address for you. E.g. x84ha56fkes0983@gmail.com. Make sure there is 2FA on this email address.

Use a username that is also uncorrelated to you e.g. x84ha56fkes0983.

3.1.2. 2FA

Make sure there is 2FA on your exchange accounts wherever possible. As above, your phone is NOT a secure 2FA mechanism.

3.1.3. Don’t keep funds on exchanges

Do not use an exchange as a place for storing your cryptocurrency. If the exchange has a problem YOU will have a problem.

Try to minimize the amount of time that you have funds (both fiat and crypto) kept in an exchange.

3.2. Storage

If you don’t own your private keys, you don’t have control of your crypto!

Diversify. Holding everything you have in one wallet is NOT smart.

There are many types of wallet. And tonnes of online resources to help you choose. Divide in terms of when you will need to exchange or spend crypto. Keep a small amount of crypto on hot wallets incase you want to send some to someone or buy something. For currency you are HODLing, use cold wallets.

3.2.1. Backing up your wallet

You don’t need a lot of room to store backups of your wallets. Get a couple of memory sticks (16GB is fine). Memory sticks are not a high margin business - expect them to fail. Never back up to just one external disk and consider it done. Use encryption on your disks.

Again, make sure that you are keeping at least one backup FAR AWAY from the others. Having all your backups in your sock drawer isn’t helpful when your house burns down.

3.2.2. Backing up Seed phrases

Some wallets are created from 12-20 word seed phrases. Seed phrases are great because if you lose everything else you can restore your wallet! They can also be really bad - if someone gets hold of your seed phrase they can STEAL YOUR CRYPTO!

3.2.3. Hot wallets

Hot wallets are connected to the internet. These are easier to use but higher risk than cold storage. Use them for small amounts of crypto. (unless you’re day trading in which case you shouldn’t need this memo).

Tips for using hot wallets:

2.3.1. Mobile wallets

Mobile wallets are wallets that are stored on your mobile phone. They are a terrible idea for anything more than a few dollars worth of crypto. If you don’t already check your phone thirty times a day, you will when it also stores your money!

2.3.2. Desktop wallets

Desktop wallets are a great solution to a small amount of crypto that you want easy access to.

3.2.4. Cold wallets

Cold wallets never touch the internet. They are best for coins you want to HODL.

2.4.1. Hardware wallet.
2.4.2. Cold Storage Computer
2.4.3. Paper wallet
3.2.5. Multi-sig

4. Conclusion

4.1.1. Security is a way of life.
4.1.2. The conclusion of life.