tastycrypto Safety & Security Tips

Written by: Mike Martin   |  Updated January 31, 2023

Reviewed by: Ryan Grace

Fact checked by: Laurence Willows

blockchain security

In this article, we will guide you through 5 basic safety and security tips when using your tastycrypto wallet extension.

1. Have a clean web browser 

The tastycrypto wallet extension will be initially compatible with the Google Chrome web browser. Your Google Chrome browser may have Malicious software (Malware) installed on it without you even knowing. 

This malware has the potential to expose a browser wallet seed phrase. With access to this seed phrase, a bad actor could drain all crypto in your wallet. 

This malware is often installed before a user even has the tastycrypto wallet installed on their browser. The moment the account is funded, the malware sends this crypto to a different, unrecoverable address. 

It is therefore wise to make your initial deposit into your tastycrypto wallet very small. 

The below link from Google may help to eliminate any unwanted programs installed on your web browser.

Google: Remove unwanted ads, pop-ups & malware

2. Write down and store your seed phrase in a secure place.

The majority of crypto loss comes not through bad actors, but user negligence. 

Business Insider reports that in 2022 more than half a billion dollars worth of Bitcoin alone will be lost due to users losing their seed phrase or improperly recording it. 

When presented with your tastycrypto wallet seed phrase, write it down, and then double-check that you did indeed write all the proper words down in the right place. 

***For security reasons, tastycrypto does not have access to your seed phrase. If you lose it, we will be unable to recover it for you. 

3. Lock your device when you are not using it. 

If you are in a public place, it is always best practice to lock your device before you step away. A bad actor only needs a few seconds to access an unlocked device and send out all your crypto. 

When it comes to your crypto, the best advice is to trust no one. 

4. Disconnect from dApps when not using them.

When connected to decentralized applications (such as Uniswap and Lido), it is best practice to manually disconnect your wallet from these protocols following the termination of your business. A continued connection can only put your wallet at more risk. 

5. Only connect to your wallet through a secure internet connection.

Untrusted connections can open your device (and wallet) to vulnerabilities. 

It is therefore wise to only use your Google Chrome web browser when on a secure internet connection. 

Additional Reading

How To Secure A Windows Computer: Microsoft

How To Secure A Mac: Apple

Picture of Mike Martin

Mike Martin

Mike Martin serves as the Head of Content for tastycrypto. Before joining tastycrypto, Michael worked in the active trader divisions of thinkorswim, TD Ameritrade, and Charles Schwab. He also served as a writer and editor for projectfinance.

Michael has been active in the crypto community since 2017. He holds certifications from Duke University in decentralized finance (DeFi) and blockchain technology.

Contact: Mike@tastycrypto.com

Share the Post:

The Best Newsletter

You've Never Read

Data-driven crypto insights delivered every Saturday morning.