** Disclaimer.** These guidelines can be used as a starting point for your own research. However, we do not pretend or guarantee that the recommendations presented to you are exhaustive, error-free, or the best for you. You need to do your own research to determine what works best for your purposes.
In this subsection, we will give recommendations to help you secure your cryptocurrency assets - tokens and NFTs. Cryptocurrency is based on the principle of decentralization, and each user manages his own assets. Accordingly, the responsibility for the preservation of these assets lies with the user himself.
Important! Any transaction that has been made from your wallet is irreversible, and no technical support can return your funds if they have already been sent and the transaction is signed.
Security of a cryptocurrency wallet
Let's take a look at the basic security measures that can help you preserve and protect your cryptocurrency assets in your cryptocurrency wallet.
The secret phrase of recovery
When registering a wallet for cryptocurrency, you will be generated a special secret recovery phrase (mnemonic phrase or seed phrase), which consists of 12 or more words. This phrase serves to restore access to the wallet in case it is deleted from the device or transferred to another device. Without this phrase it is impossible to restore access to the wallet! This phrase should be stored in a secure place - for example, in a special password manager, which will be protected by a strong password or written on a piece of paper.
If you have lost access to your phrase or it somehow fell into the hands of third parties - immediately create a new wallet and transfer all the assets to it, and forget about the old wallet. The administration of the project "Golden Clone" will never, under no circumstances will not ask you a mnemonic phrase, and if you received a letter of this nature - it's cheaters!
Don't tell your secret recovery phrase to anyone, ever!
Every blockchain transaction is signed with a special private key. This key is generated when creating a wallet and is known only to its owner. The key for signing transactions must also not be disclosed to third parties under any pretext, otherwise your wallet can perform operations that you did not want to make.
If your private key got into the public domain - immediately create a new wallet and transfer all the assets to it, and forget about the old wallet. The administration of the project "Golden Clone" will never, under no circumstances will not ask you for your private key, and if you received a letter of this nature - it's cheaters!
Never give your private key to anyone!
Hardware wallets should only be purchased from the manufacturer's official website. Only download all apps from trusted official sources, such as Google Play or the Apple Store.
A strong password
For both hardware and software wallets, use a strong password. Preferably, it has nothing to do with your name and date of birth. It is also recommended that you periodically change this password to a new one.
Beware of scammers
Often they may try to present themselves as technical support or administration of cryptocurrency exchanges, wallets or our game. They can send letters by mail or on social networks in order to get hold of your confidential data. They can also send out notifications that you've won some money in an airdrop or some other promotion. These emails contain phishing links that can cause users to lose assets or sensitive data by clicking on them.
Secure storage of cryptocurrency
It is recommended to download the browser extension only from official browser stores.
Downloading to your cell phone should also only be from trusted marketplaces - Google Play (for android) and App Store (for Ios). Downloading installation files from other sources may result in future loss of your assets.
It is worth remembering that the most reliable way to store your cryptocurrency assets are cold (hardware) wallets. This is a physical storage device, where you can save your private keys to various wallets and without access to this medium - no one can take possession of your assets.
The second safest storage of assets are wallets installed on the phone. The probability of hacking such wallets tends to zero!
The most insecure method for storing assets is a wallet in a browser. Try not to store large sums in browser wallet extensions!