How to select a crypto currency wallet
After more than two years, Wanchain's full-node wallet is now available due to the increasing block height and time-consuming block sync experience. Successfully fulfilling its historical mission. As a result, the Wanchain team has announced that, as of April 2, 2020, Wanchain's full node wallet will no longer do any more version update, and no longer technical support for the wallet. At that time, we will permanently remove the Wanchain full-node wallet download from the official website. on Github. Wanchain full node wallet resources are reserved, but not recommended.
Interview with blockchain wallet - imToken has nearly 10 million downloads, new version 2.5.0 released
November 27, 2019 1:06 PM 342,000 ETH (approx.) ($50 million) transferred from the Upbit ethereum hot wallet to an unknown wallet
KeystoreKeystore is mainly common in ethereum wallet apps (bitcoin is similar to ethereum). The Keystore mechanism is BIP38), which encrypts the private key with the wallet password, as opposed to the mnemonic. The Keystore can be stored in text or JSON format. In other words, the Keystore needs to be decrypted with the wallet password before it is equivalent to a private key. Therefore, the Keystore needs to be used with the wallet password in order to be imported into the wallet. When a hacker steals the Keystore, without a password, it is possible to crack the Keystore by brute force. The password unlocks the Keystore, so users are advised to make the password a little more complex, e.g. with special characters, or at least 8+ bits and secure storage
The public key is used as the user's account, ensuring that each user runs the application differently each time, and can be made public and used to receive initiations from others The payment. The private key, which is also unique and a high-level secret known only to the user running the application, is a secret known only to the user and should not be disclosed to anyone. In the future, for every user-initiated payment, the transaction must be signed with this private key. Since the private key is known only to the user, if any transaction is signed with the private key, it must be signed with this key only. What the user does, cannot be denied. If the user reveals the private key, the user can only take the blame, no one else can take the blame for him!
You can then connect to a wallet, providing your browser with many new features to interact with blockchains such as Ethereum. This allows you to use Web 3 applications, such as Robert Leshner's Compound Finance or Cryptokitties by CryptoKitties
Advertise heavily on social networking sites, websites and all forms of communication that exist with the user, they should always be running the latest version, and Always install only from official sources (electrum.org), accessed via secure protocol (https), and Verify GPG signatures in advance
This stolen money from Upbit is currently still in the wallet, and the hacker's next move is impossible to guess. night of November 27. Coin Security announced that if the stolen ETH transfer is found to be immediately blocking addresses, other exchanges are bound to do the same . In many previous coin theft incidents, several exchanges have also worked together to launch blacklisting operations to prevent the inflow or laundering of hacked assets.