A new memecoin have been making quite some serious waves. I will be looking at why I might stack some.
$DOG a memecoin on Bitcoin have garnering attention for quite a while, it caught my attention when I was researching into Ordinals, and I found Runestone NFT, the NFT was distributed to early supporters of ordinals and $DOG wad share to Runestone hodlers.
Why do I want to buy $DOG
Considering it's expontial growth in recent weeks and the way the community pushes the $DOG memecoin and also looking at the total supply, circulating supply, max supply all at 100B.
name as DOG Go To The Moon on coinmarketcap and $DOG on coingecko
These token are sleeping gems and if you DYOR, you will be surprised that their prices are still very undervalued .
1. $SFUND - Seedify is a Web3 gaming focused incubator and launchpad, they also launched their NFT based token $SNFTs this will also crazy like pumps 2. $ARB 3. $HBAR
Keeping Your Crypto Assets Safe — Crypto Security As A lifestyle (Day 30-Finale) #KryptoSecure
Keeping Your Crypto Assets Safe — Crypto Security As A lifestyle (Day 30-Finale) Crypto security is not merely a set of practices; it’s a lifestyle. As the digital world becomes increasingly intertwined with our daily lives, safeguarding our crypto assets takes on a new level of importance. Merely following #KryptoSecure thread for the past 30days dosen’t amount to naught, if you don’t apply what you have been learning, and not just once but continuously. Here’s why crypto security should be co
Keeping Your Crypto Assets Safe —AI-Powered Threats And Defenses (Day 29) #KryptoSecure
Day 29 of #KryptoSecure, I would have said the topic ‘AI-powered threats and defenses’ I will be discussing today is a topic of the future, but no, that future is already here. The emergence of AI technology have disrupted and affected virtually every industry from its development, application to the way business model are been built on and around it. And crypto security is not left out. AI-powered threats and defenses will soon be a popularized topic in this space erelong, so what does that mea
Day 28 of #KryptoSecure, we will be looking at a very importance aspect of DEFI ecosystem “Cross Chain Bridging”, since interoperabilty has become the order of the day in the crypto space, it’s crucial for bridge users to know how the technology works and understands how it might affects it users incase of a risk or vulnerability explotation. Cross-chain security is a critical concern for users of blockchain bridges, which are pr
Keeping Your Crypto Assets Safe — Airdrops (Day 27) #KryptoSecure
Keeping Your Crypto Assets Safe — Airdrops (Day 27) #KryptoSecure
A crypto airdrop is a marketing strategy used by blockchain-based projects that involves divvying out free tokens en masse as part of a broader promotional initiative. This is usually done as a direct deposit into a user’s crypto wallet or by asking the participants to claim the token/coin using a website, which will require them connecting their wallet to the claim website. Airdrops, which involve the distribution of free token
Crypto trading, while potentially lucrative, comes with several risks that traders should be aware of before participating in the market. Understanding these risks is essential for responsible and informed trading. Here Are Some Of The Key Risks Associated With Crypto Trading
1. Volatility: Cryptocurrencies are highly volatile assets. Prices can experience rapid and significant fluctuations, leading to potential gain
Keeping Your Crypto Assets Safe — Crypto Security In DEFI (Day 25) #KryptoSecure
Crypto security in decentralized finance (DeFi) is of paramount importance, given the highly experimental and decentralized nature of DeFi platforms. DeFi has revolutionized the traditional financial system by providing open, permissionless, and decentralized financial services using blockchain technology. However, it also introduces unique security challenges. Here Are Key Aspects Of Crypto Scurity In DEFI 1. Smart Contract Auditing: Smart contracts are at the core of DeFi applications. Auditin
Keeping Your Crypto Assets Safe — Identifying And Avoiding Crypto Scams (Day 24) #KryptoSecure
There are various forms of crypto scams, the list is so long as new types keeps sprouting up everyday on the space. I have initially discussed some prominent ones like Staking and Farming Scams and ICO Scams, I will do justice to the rest of them, knowing the varities of crypto scam there is, knowing how to identify them. So that you do not fall victim of these cheap scams. I will still take time in discussing some of them extensively, but if you are able to identify them, then it would be easie
What will happen to your crypto assets when you die?
Dead Man's Switch
Isaac King
--
Keeping Your Crypto Assets Safe — Dead Man’s Switch (DMS) (Day 23) #KryptoSecure
Keeping Your Crypto Assets Safe — Dead Man’s Switch (DMS)(Day 23) #KryptoSecure
Today, on day 23 of #KryptoSecure, I will be discussing a very critical topic “Dead Man’s Switch”. What is dead man’s switch? Pros and cons of DMS. How can you implement DMS,my personal opinions on Dead Man’s Switch. What is Dead Man’s Switch? A dead man’s switch is a mechanism that triggers when the user fails to perform an action. It was originally used with train drivers to stop the vehicle in case of somnolence (a pedal is playing the role of a switch in this case). DMS is a tool that can be used everywhere, from machinery control to strategic setups, military, inheritance, emergency information distribution, e.t.c. A dead man’s switch can also be digital, automating the transmission of information in case of incapacity (incarceration, loss of consciousness, death). This type of application might needs to be decentralized to avoid third party failures (hacks, misbehaviour, censorship). In the event of death, what would happen to your crypto assets? Would it be lost forever? Or would it be passed to your relative, wife, child(ren), or even friend? If you have no relative nor wife. Dead Man’s Switch Pros 1. Asset Protection: A dead man’s switch ensures that your crypto assets are not left inaccessible in the event of an accident, illness, or other unforeseen circumstances. 2. Preventing Loss: It helps prevent potential loss or abandonment of assets due to long-term inactivity or forgotten private keys. 3. Estate Planning: It simplifies estate planning by allowing you to designate heirs or beneficiaries who can access your assets in a secure and controlled manner. Many use this method to leave behind their wealth for loved ones. Instead of trusting a third party, using a tool like this is essentially a trustless form of security that doesn’t have any risks as long as it has been configured correctly. Some crypto wallets also have a similar feature so that the user can transfer their assets to the rightful owners when it’s time. 4. Erase Sensitive or Confidential Information: You could potentially configure it to automatically wipe all of your confidential data from various places, as pre-programmed. So, in the event of your death, your interests are protected. This also sounds useful for undercover agents. 5. Peace of Mind: Knowing that your assets are protected and can be managed according to your wishes in emergencies provides peace of mind. Dead Man’s Switch Cons You could fail to verify your presence due to issues other than death, such as illness or a lack of internet connection.Nominating someone to receive your crypto access information might not necessarily mean you intend for them to take benefit of those assets or that the law will permit this form of asset transfer in your jurisdiction.In the case of a DMS technique, where all assets are sent to trustee(s) or heir(s) wallet, in the event that the receiver(s) wallet private keys have been compromised, the purpose of DMS might not be fulfiled as the crypto assets might be hijacked or stolen by malicious actors. If you decide to implement a dead man’s switch in your end-of-life plan, be sure to consult an expert on how to do this safely to ensure that the assets are transferred to your beneficiaries. How It Can Be Set Up 1. Timer-Based Switch: You can set a predetermined time frame (e.g., six months) during which you need to interact with your account, such as logging in or making a transaction. If you fail to do so within that time frame, the switch is triggered, and your assets are automatically transferred to a designated address or beneficiary. 2. Emergency Contact Verification: Another approach involves designating one or more trusted individuals as emergency contacts. They periodically receive a request for verification or authentication. If you fail to respond to these requests over a certain period, your emergency contacts can trigger the switch to access your assets. Personal Opinion Dead Man’s Switch is a needed necessity to ensure the secure passed down of crypto assets from owner/holder to heir(s), it is importance that everything is planned well, from the picking of DMS tool to how the receiver will receive and probably used the assets should be stated and specified. And also certain elements such as the DMS company shutting down or hacked should also be put into considerations. Some DMS Tools : SarcophagusDeadmansswitch Disclaimer: Note that the above tools has not been throughly used or tested, usage of any of the above tools is totally at user(s) risk, I will do due diligence in testing out the tools and reporting on them. I might also add to the tool list in my report.
Keeping Your Crypto Assets Safe — Dead Man’s Switch (DMS) (Day 23) #KryptoSecure
Keeping Your Crypto Assets Safe — Dead Man’s Switch (DMS)(Day 23) #KryptoSecure
Today, on day 23 of #KryptoSecure, I will be discussing a very critical topic “Dead Man’s Switch”. What is dead man’s switch? Pros and cons of DMS. How can you implement DMS,my personal opinions on Dead Man’s Switch. What is Dead Man’s Switch? A dead man’s switch is a mechanism that triggers when the user fails to perform an action. It was originally used with train drivers to stop the vehicle in case of somnolence
Whitelisting addresses is a security practice in the cryptocurrency space that helps protect your assets by allowing transactions only to and from approved addresses. I will use Binance as CEX and Metamask for external wallet for my examples. How To Whitelist Addresses On Metamask Step 1: Click on three dot on the top right, click on settings
Step 2: Click on Contact, add the address or ENS and name the address and click save.
Today, on day 21 of #KryptoSecure, you will be learning about reviewing and revoking transaction approvals in your wallet. Reviewing simply means to inspect something in order to make changes to it or to make a decision about it. Revoking means revoking an approval/allowance so that a dapp can no longer access the contents of your wallet and move them around. By regularly revoking active approvals you reduce the chances of becoming the victim of approval exploits. But unfortunately this cannot b
On today’s episode (day 20)of #KryptoSecure, I will be talking about something most people doesn’t have the proclivity for and is usually viewed like only some certain people should do it and therefore enjoy the benefits of it. I am talking about Online Reputation Management, we usually think ORM is only meant for crypto brands, projects, crypto influencers, but it’s not really like that and you would see that as you read along. Your online reputation comprises search results, images, videos, so
Secure file sharing plays a role in keeping your crypto assets safe by ensuring that sensitive information related to your assets, such as private keys, passwords, and backup phrases, is protected from unauthorized access or exposure. While it is advised not to store your private keys online, there could be a case where you need to share private keys with another person, maybe a partner or during collaboration, whatever files you need to share that might have a financial or legal implication, it
Keeping Your Crypto Assets Safe — Be Wary Of ICOs (Day 18) #KryptoSecure
Being wary of Initial Coin Offerings (ICOs) is a critical step in keeping your crypto assets safe. ICOs are fundraising mechanisms used by blockchain projects to raise capital, often by selling tokens to investors. However, not all ICOs are trustworthy, and they can pose risks to your crypto investments. Here’s how being cautious about ICOs can help protect your investments: 1. Avoiding Scams: Many fraudulent ICOs have emerged, promising high returns but disappearing with investors’ funds. By be
On day 17 of #KryptoSecure, I will take you on an expository tour on privacy coins, understanding the technology behind privacy coins, the myth or near-truths about privacy coins. Privacy coins use a variety of cryptography-enhancing technologies to ensure anonymity in cryptocurrency transactions. These technologies are designed to obfuscate transaction details, making it challenging for outside observers to trace the sender, recipient, and transaction amount. Privacy coins are a category of cry
Keeping Your Crypto Assets Safe - Using Reputable Exchanges (Day 16) #KryptoSecure
Using reputable centralized exchanges is a critical element in keeping your crypto assets safe. Reputable exchanges provide a secure and trustworthy environment for buying, selling, and trading cryptocurrencies. Before we proceed, there is this common phrase in the crypto space, “not your keys, not your crypto” it simply means CEXs are not where you store your crypto assets, CEX are for buying, selling and trading, if you are not doing any of those, withdraw your crypto from CEX. FTX was a reput
Geotagging, or GeoTagging, is the process of adding geographical identification metadata to various media such as a geotagged photograph or video, websites, SMS messages, QR Codes or RSS feeds and is a form of geospatial metadata. Geotagging awareness is essential for keeping your crypto assets safe because inadvertently revealing your physical location can pose significant security risks. I cited a similar example o
Keeping Your Crypto Assets Safe - Beware Of Social Engineering(Day 14) #KryptoSecure
Social engineering is a manipulative technique that malicious actors use to deceive individuals into revealing sensitive information or taking actions that compromise their security. In the context of cryptocurrency, social engineering attacks can pose a significant threat to the safety of your assets. I have seen different versions of social engineering on x.com in the context of cryptocurrency, though I find so many of them very dumb and only someone that is completely ignorant of crypto funda