# Security Guide

<mark style="color:$info;">As crypto adoption grows,</mark> <mark style="color:$info;"></mark><mark style="color:$info;">**cybercriminals**</mark> <mark style="color:$info;"></mark><mark style="color:$info;">become more active — using phishing, malware, and impersonation to steal your assets.</mark>

<figure><img src="/files/UIlCriQ9bRDSwRLUAv9u" alt=""><figcaption></figcaption></figure>

<mark style="color:$info;">To secure your crypto, you must consider</mark> <mark style="color:$info;"></mark><mark style="color:$info;">**multiple attack vectors**</mark> <mark style="color:$info;"></mark><mark style="color:$info;">and implement strong practices across three layers of security:</mark>

## 🔐 <mark style="color:$info;">Three layers of security</mark>

### 🧱 1. Network Layer

* Are your **private keys cryptographically secure**?
* Is the **blockchain safe** from attacks (e.g. 51%)?

***

### 🧩 2. Application Layer

* Do you use **trusted apps or exchanges**?
* How are your funds stored?
* Is your **account login secured** with strong passwords and 2FA?

***

### 🌐 3. Real-World Layer

* Are your devices **encrypted and secure**?
* Is your 2FA setup safe?
* Have you set up **inheritance or recovery** instructions in case of death?

{% hint style="info" %}
Your **#1 job** as a crypto holder: **Protect your funds.** Self-custody and cold storage are key.
{% endhint %}

***

## 🚨 Common Mistakes That Lead to Loss

* <mark style="color:$info;">Reusing weak passwords</mark>
* <mark style="color:$info;">Skipping 2FA</mark>
* <mark style="color:$info;">Sharing or exposing</mark> <mark style="color:$info;"></mark><mark style="color:$info;">**private keys**</mark>
* <mark style="color:$info;">Saving keys or passwords online</mark>

***

## 📧 Email Security for Crypto

#### 🔑 Why Email Is Important

<mark style="color:$info;">Your email is the</mark> <mark style="color:$info;"></mark><mark style="color:$info;">**gateway**</mark> <mark style="color:$info;"></mark><mark style="color:$info;">to all your crypto accounts. It must be locked down.</mark>

#### ✅ Best Practices:

* <mark style="color:$info;">Use trusted providers: Gmail, Outlook, Protonmail</mark>
* <mark style="color:$info;">**Always enable 2FA**</mark> <mark style="color:$info;"></mark><mark style="color:$info;">on your email</mark>
* <mark style="color:$info;">Create a</mark> <mark style="color:$info;"></mark><mark style="color:$info;">**separate crypto-only email**</mark>
* <mark style="color:$info;">Be wary of</mark> <mark style="color:$info;"></mark><mark style="color:$info;">**phishing emails**</mark> <mark style="color:$info;"></mark><mark style="color:$info;">that try to scare or trick you</mark>

#### ⚡ Quick Tips:

* <mark style="color:$info;">Never trust email links</mark>
* <mark style="color:$info;">Double-check the domain of login pages</mark>
* <mark style="color:$info;">Use anti-phishing banners if your exchange offers one</mark>
* <mark style="color:$info;">Visit</mark> [<mark style="color:$info;">haveibeenpwned.com</mark>](https://haveibeenpwned.com) <mark style="color:$info;">to check for data breaches</mark>

***

## 🔐 Two-Factor Authentication (2FA)

#### 📲 What You Need to Know:

* <mark style="color:$info;">Enable 2FA</mark> <mark style="color:$info;"></mark><mark style="color:$info;">**everywhere**</mark> <mark style="color:$info;"></mark><mark style="color:$info;">(email, exchange, wallet, social media)</mark>
* <mark style="color:$info;">Use</mark> <mark style="color:$info;"></mark><mark style="color:$info;">**authentication apps**</mark><mark style="color:$info;">, NOT SMS (SMS is vulnerable to SIM swaps)</mark>

#### 🛡️ Backup Codes:

* <mark style="color:$info;">Store them</mark> <mark style="color:$info;"></mark><mark style="color:$info;">**offline and securely**</mark> <mark style="color:$info;"></mark><mark style="color:$info;">- like your recovery phrase</mark>
* <mark style="color:$info;">NEVER screenshot QR codes or save them online</mark>

***

## 💼 Crypto Wallet Safety

#### ✅ Best Practices:

* <mark style="color:$info;">**Don’t store large amounts**</mark> <mark style="color:$info;"></mark><mark style="color:$info;">on exchanges</mark>
* <mark style="color:$info;">Use</mark> <mark style="color:$info;"></mark><mark style="color:$info;">**hardware wallets**</mark> <mark style="color:$info;"></mark><mark style="color:$info;">(cold wallets) for long-term storage</mark>
* <mark style="color:$info;">**Verify all details**</mark> <mark style="color:$info;"></mark><mark style="color:$info;">on your wallet screen before confirming</mark>
* <mark style="color:$info;">Be cautious of malware that swaps addresses —</mark> <mark style="color:$info;"></mark><mark style="color:$info;">**double check recipient address**</mark>

***

## 🔑 Private Keys: The Most Important Thing

* <mark style="color:$info;">Write down your keys on</mark> <mark style="color:$info;"></mark><mark style="color:$info;">**paper or metal backups**</mark> <mark style="color:$info;"></mark><mark style="color:$info;">(fire/waterproof)</mark>
* <mark style="color:$info;">NEVER save private keys:</mark>
  * <mark style="color:$info;">Online</mark>
  * <mark style="color:$info;">In your phone</mark>
  * <mark style="color:$info;">On cloud services</mark>
* <mark style="color:$info;">Don’t share keys with</mark> <mark style="color:$info;"></mark><mark style="color:$info;">**anyone**</mark>
* <mark style="color:$info;">Beware of</mark> <mark style="color:$info;"></mark><mark style="color:$info;">**giveaway scams**</mark> <mark style="color:$info;"></mark><mark style="color:$info;">asking for keys</mark>

{% hint style="warning" %}
&#x20;<mark style="color:$warning;">If someone asks for your private key — it's a scam. No exceptions.</mark>
{% endhint %}

***

## 🧠 Final Thoughts

> Hacks are **rare** — most losses are due to **user error**, phishing, or negligence.

Remember:

* Cold wallets are **unhackable** unless **you give away** your private keys
* Security is not a chore — it's your opportunity to have peace of mind

{% hint style="success" %}
&#x20;Think critically. Stay informed. Protect your future.
{% endhint %}

***


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.anodos.finance/education/security-guide.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
