RE: LeoThread 2025-09-9 17:20

You are viewing a single comment's thread:

Most crypto vulnerabilities can be significantly reduced with the use of multi-factor wallets. Requiring two devices on different platforms to sign transactions greatly diminishes long tail risk.



0
0
0.000
8 comments
avatar

Furthermore, for larger transactions, involving two people (or an agent) to approve and verify transactions eliminates rushed decisions.

0
0
0.000
avatar

The newly released extension now enables open-source multi-factor authentication in browsers, allowing co-signing with a mobile device.

0
0
0.000
avatar

Work is also underway on an SDK to integrate multi-factor solutions into development environments, avoiding the need for private keys in .env files or reliance on hardware devices.

0
0
0.000
avatar

There is a firm belief that the right solution is being developed. Moving forward with determination.

0
0
0.000
avatar

Security review:

  1. Avoid using private keys.
  2. Do not allow iCloud to sync documents and desktop folders.
  3. Avoid syncing with iCloud/GDrive/Proton/Onedrive on your device; choose one and use the browser for others.
0
0
0.000
avatar
  1. Memorize important passwords without syncing to Keychain or 1Password.
  2. Use two-factor authentication, but not on a primary device; a spare phone should fulfill this role.
0
0
0.000
avatar

Now relying solely on a solution that splits key shares across devices and storage options, minimizing attacks. This approach emphasizes that private keys are hazardous over time.

0
0
0.000
avatar

As threats grow more complex with advancing tools, upgrading wallets is essential.

0
0
0.000