Service Manual

๐Ÿ›ก๏ธ

The Habituation of Security


ย 
notion image
ย 
notion image
ย 
notion image
ย 
notion image
ย 
notion image
ย 
notion image
ย 
notion image
ย 
See more
ย 
๐Ÿ›ก๏ธ
โ€œSecurity rules I keep for myselfโ€
ย 
As previously mentioned, crypto assets based on blockchain technology are difficult to tamper with, so hackers do not target the assets themselves.
As Kevin Mitnik, a famous hacker-turned-security consultant, said, the weakest link in security is โ€œpeopleโ€ and hackers use devices that can exploit human errors to launch attacks.
By setting security rules that you need to follow for yourself and adhering to them, you can minimize the damage caused by my own actions.
We recommend following the minimum security rules introduced below and managing assets safely with Burrito.
โ˜‘๏ธ
Do not install remote programs
Eliminate remote programs that hackers can easily access to block attack routes in advance.
Eliminate remote programs that hackers can easily access to block attack routes in advance.
ย 
โ˜‘๏ธ
Do not open suspicious messages or emails
If you receive suspicious messages or emails that may contain malware or phishing sites, delete them immediately without opening them
If you receive suspicious messages or emails that may contain malware or phishing sites, delete them immediately without opening them
ย 
โ˜‘๏ธ
Increase password complexity
Strengthen security by setting a combination of at least 3 types of English capital and lowercase letters, numbers, and special characters, such as 8 or more letters, and at least 2 types of 10 or more letters.
Strengthen security by setting a combination of at least 3 types of English capital and lowercase letters, numbers, and special characters, such as 8 or more letters, and at least 2 types of 10 or more letters.
ย 
โ˜‘๏ธ
Stay up to date with operating systems
Be prepared for new attacks by staying updated to an operating system that reflects the latest security patches.
Be prepared for new attacks by staying updated to an operating system that reflects the latest security patches.
ย 
โ˜‘๏ธ
Install and update security programs such as anti-virus
To prevent phishing attacks through malware, install and update anti-virus programs.
To prevent phishing attacks through malware, install and update anti-virus programs.
ย 
โ˜‘๏ธ
Check the official service address
Check the official address of the exchange or Dapp service in advance, and confirm it again before accessing it to prevent access to phishing sites.
Check the official address of the exchange or Dapp service in advance, and confirm it again before accessing it to prevent access to phishing sites.
โ˜‘๏ธ
Store and memo personal wallet seed phrase offline
notion image
  • Storing a mnemonic photo on an online device or storing it in plain text in a memo app increases the likelihood of the entire seed phrase being stolen.
  • It is recommended to use traditional methods of storage such as paper memo and keeping it in a safe.
โ˜‘๏ธ
Checking the possibility of scams such as coin scams
notion image
  • Check the results of coin risk analysis on scam coin verification sites.
  • Check the completeness of the project by verifying the existence of a white paper and website.
  • Check if the source code is publicly available on platforms like GitHub and if it is, check the development status of the project.
  • If the project has an app service, check the update frequency and version history to analyze the project's activity level.
  • Be cautious if there are any promotions that guarantee high profits in a short period of time or requests for immediate investment, as these may indicate a scam.
โ˜‘๏ธ
Make sure to install official released applications
notion image
  • Installing an unverified APK file directly can expose you to hackers' malicious attacks through the root hidden in the APK file.
  • To prevent the risk of hacking, you should install and use the app through official distribution channels such as verified app markets.
ย 
ย 

ย 
ย 
ย