Citizen Guide to Being Safe in Web3: Difference between revisions

From Neo Tokyo Citizen Wiki
(Created page with "# Operating Safely in Web3: A Guide for Intermediate Crypto Users **Table of Contents** 1. Introduction 2. Understanding Hot and Cold Wallets 1. Hot Wallets 2. Cold Wallets 3. Best Practices 3. Managing Smart Contract Permissions 1. Importance of Revoking Permissions 2. How to Revoke Permissions 4. Secure Transactions and Interactions 1. Verifying Smart Contracts 2. Being Cautious with DApps 5. Avoiding Scams and Phishing 1. Common Scams in Web3...")
 
No edit summary
Line 1: Line 1:
# Operating Safely in Web3: A Guide for Intermediate Crypto Users
Any [[Citizen]] joining [[Neo Tokyo will commit]] to securing their assets and looking out for their fellow Citizens.


**Table of Contents**
Web3, the decentralized web, presents unique opportunities and challenges for crypto users. As the value of your portfolio and the Neo Tokyo ecosystem grows, our Citizens will be targeted frequently. Ensuring security and privacy becomes paramount. This article aims to guide intermediate crypto users on how to operate safely in Web3, focusing on wallet management, smart contract permissions, and general security practices.


1. Introduction
== Setup Notifications and Alerts ==
2. Understanding Hot and Cold Wallets
Before going any further, make sure to enable notifications for [[MintDefense]] via their X account and their discord server. MintDefense is the premiere Web3 security company created by Neo Tokyo Citizens.
  1. Hot Wallets
* MintDefense on X: https://twitter.com/MintDefense
  2. Cold Wallets
* MintDefense discord server: https://discord.gg/mintdefense
  3. Best Practices
* MintDefense website: https://mintdefense.com/
3. Managing Smart Contract Permissions
  1. Importance of Revoking Permissions
  2. How to Revoke Permissions
4. Secure Transactions and Interactions
  1. Verifying Smart Contracts
  2. Being Cautious with DApps
5. Avoiding Scams and Phishing
  1. Common Scams in Web3
  2. Preventing Phishing Attacks
6. Regular Security Audits
7. Conclusion


## 1. Introduction
== Understanding Hot and Cold Wallets ==


Web3, the decentralized web, presents unique opportunities and challenges for crypto users. As the ecosystem grows, ensuring security and privacy becomes paramount. This article aims to guide intermediate crypto users on how to operate safely in Web3, focusing on wallet management, smart contract permissions, and general security practices.
=== Hot Wallets ===
 
## 2. Understanding Hot and Cold Wallets
 
### 2.1. Hot Wallets


Hot wallets are connected to the internet and provide ease of access for day-to-day transactions. Examples include MetaMask, Trust Wallet, and other browser or mobile wallets.
Hot wallets are connected to the internet and provide ease of access for day-to-day transactions. Examples include MetaMask, Trust Wallet, and other browser or mobile wallets.


**Pros**: Easy access, user-friendly interfaces, and quick transactions.
'''Pros:''' Easy access, user-friendly interfaces, and quick transactions.
**Cons**: Higher risk of online attacks and vulnerabilities.
'''Cons:''' Higher risk of online attacks and vulnerabilities.


### 2.2. Cold Wallets
=== Cold Wallets ===


Cold wallets are offline storage solutions like hardware wallets (e.g., Ledger, Trezor) or paper wallets.
Cold wallets are offline storage solutions like hardware wallets (e.g., Ledger, Trezor) or paper wallets.


**Pros**: Enhanced security, reduced risk of online hacks.
'''Pros:''' Enhanced security, reduced risk of online hacks.
**Cons**: Less convenient for frequent transactions.
'''Cons:''' Less convenient for frequent transactions.
 
### 2.3. Best Practices


- Use hot wallets for small, daily transactions and cold wallets for the bulk of your assets.
=== Best Practices ===
- Regularly backup your wallet information securely.
* Use hot wallets for small, daily transactions and cold wallets for the bulk of your assets.
 
* Regularly backup your wallet information securely.
## 3. Managing Smart Contract Permissions
 
### 3.1. Importance of Revoking Permissions


== Managing Smart Contract Permissions ==
=== Importance of Revoking Permissions ===
Over time, your wallet may accumulate numerous permissions granted to various DApps and smart contracts, increasing vulnerability.
Over time, your wallet may accumulate numerous permissions granted to various DApps and smart contracts, increasing vulnerability.


### 3.2. How to Revoke Permissions
=== How to Revoke Permissions ===
 
Use tools like Etherscan or BscScan to view and revoke permissions:
Use tools like Etherscan or BscScan to view and revoke permissions:
- Connect your wallet.
* Connect your wallet.
- Navigate to the “Token Approvals” section.
* Navigate to the “Token Approvals” section.
- Review and revoke unnecessary permissions.
* Review and revoke unnecessary permissions.


## 4. Secure Transactions and Interactions
Alternatively, use https://revoke.cash
 
### 4.1. Verifying Smart Contracts


== Secure Transactions and Interactions ==
=== Verifying Smart Contracts ===
Always verify the authenticity of smart contracts:
Always verify the authenticity of smart contracts:
- Check contract addresses against official sources.
* Check contract addresses against official sources.
- Use blockchain explorers to review contract code and audit reports.
* Use blockchain explorers to review contract code and audit reports.
=== Being Cautious with DApps ===
* Research DApps before use.
* Be wary of granting high-level permissions.


### 4.2. Being Cautious with DApps
== Avoiding Scams and Phishing ==
=== Common Scams in Web3 ===
* Fake ICOs, airdrops, and giveaways.
* Pump-and-dump schemes.
* Impersonation scams.
* In Neo Tokyo, Citizens are often targeted to install early game demos.


- Research DApps before use.
=== Preventing Phishing Attacks ===
- Be wary of granting high-level permissions.
* Never share private keys or recovery phrases.
* Double-check URLs and email addresses.
* Use hardware wallets for an additional layer of security.


## 5. Avoiding Scams and Phishing
== Regular Security Audits ==
 
### 5.1. Common Scams in Web3
 
- Fake ICOs, airdrops, and giveaways.
- Pump-and-dump schemes.
- Impersonation scams.
 
### 5.2. Preventing Phishing Attacks
 
- Never share private keys or recovery phrases.
- Double-check URLs and email addresses.
- Use hardware wallets for an additional layer of security.
 
## 6. Regular Security Audits


Perform regular audits of your wallet and transactions. Keep track of permissions granted and assets held. Utilize security services and tools available in the crypto ecosystem for ongoing monitoring.
Perform regular audits of your wallet and transactions. Keep track of permissions granted and assets held. Utilize security services and tools available in the crypto ecosystem for ongoing monitoring.


## 7. Conclusion
== In Conclusion ==


Navigating Web3 safely requires vigilance, knowledge, and the right tools. By understanding the intricacies of hot and cold wallets, managing smart contract permissions, conducting secure transactions, and staying alert to scams, you can significantly reduce risks and enhance your Web3 experience. Remember, the crypto world is constantly evolving, and staying informed is key to operating safely in this dynamic environment.
Navigating Web3 safely requires vigilance, knowledge, and the right tools. By understanding the intricacies of hot and cold wallets, managing smart contract permissions, conducting secure transactions, and staying alert to scams, you can significantly reduce risks and enhance your Web3 experience. Remember, the crypto world is constantly evolving, and staying informed is key to operating safely in this dynamic environment.
''Note: Links on a publicly-editable Web3 wiki are a possible attack vector. This is not a comprehensive guide. It is intended to provide a general understanding of Web3 security. Do your own research.''

Revision as of 21:20, 16 December 2023

Any Citizen joining Neo Tokyo will commit to securing their assets and looking out for their fellow Citizens.

Web3, the decentralized web, presents unique opportunities and challenges for crypto users. As the value of your portfolio and the Neo Tokyo ecosystem grows, our Citizens will be targeted frequently. Ensuring security and privacy becomes paramount. This article aims to guide intermediate crypto users on how to operate safely in Web3, focusing on wallet management, smart contract permissions, and general security practices.

Setup Notifications and Alerts

Before going any further, make sure to enable notifications for MintDefense via their X account and their discord server. MintDefense is the premiere Web3 security company created by Neo Tokyo Citizens.

Understanding Hot and Cold Wallets

Hot Wallets

Hot wallets are connected to the internet and provide ease of access for day-to-day transactions. Examples include MetaMask, Trust Wallet, and other browser or mobile wallets.

Pros: Easy access, user-friendly interfaces, and quick transactions. Cons: Higher risk of online attacks and vulnerabilities.

Cold Wallets

Cold wallets are offline storage solutions like hardware wallets (e.g., Ledger, Trezor) or paper wallets.

Pros: Enhanced security, reduced risk of online hacks. Cons: Less convenient for frequent transactions.

Best Practices

  • Use hot wallets for small, daily transactions and cold wallets for the bulk of your assets.
  • Regularly backup your wallet information securely.

Managing Smart Contract Permissions

Importance of Revoking Permissions

Over time, your wallet may accumulate numerous permissions granted to various DApps and smart contracts, increasing vulnerability.

How to Revoke Permissions

Use tools like Etherscan or BscScan to view and revoke permissions:

  • Connect your wallet.
  • Navigate to the “Token Approvals” section.
  • Review and revoke unnecessary permissions.

Alternatively, use https://revoke.cash

Secure Transactions and Interactions

Verifying Smart Contracts

Always verify the authenticity of smart contracts:

  • Check contract addresses against official sources.
  • Use blockchain explorers to review contract code and audit reports.

Being Cautious with DApps

  • Research DApps before use.
  • Be wary of granting high-level permissions.

Avoiding Scams and Phishing

Common Scams in Web3

  • Fake ICOs, airdrops, and giveaways.
  • Pump-and-dump schemes.
  • Impersonation scams.
  • In Neo Tokyo, Citizens are often targeted to install early game demos.

Preventing Phishing Attacks

  • Never share private keys or recovery phrases.
  • Double-check URLs and email addresses.
  • Use hardware wallets for an additional layer of security.

Regular Security Audits

Perform regular audits of your wallet and transactions. Keep track of permissions granted and assets held. Utilize security services and tools available in the crypto ecosystem for ongoing monitoring.

In Conclusion

Navigating Web3 safely requires vigilance, knowledge, and the right tools. By understanding the intricacies of hot and cold wallets, managing smart contract permissions, conducting secure transactions, and staying alert to scams, you can significantly reduce risks and enhance your Web3 experience. Remember, the crypto world is constantly evolving, and staying informed is key to operating safely in this dynamic environment.

Note: Links on a publicly-editable Web3 wiki are a possible attack vector. This is not a comprehensive guide. It is intended to provide a general understanding of Web3 security. Do your own research.