Changes

Jump to navigation Jump to search
866 bytes removed ,  21:02, 15 November 2018
no edit summary
You should do your own research in addition to anything described below and be aware of the pros and cons of all the options you consider.
== Miners and other apps ==
* Only run software from known reputable developers, preferably peer revived and audited code.
* Download only from the links provided by the developer, preferably from the developers own site.
* The inherent danger of a malicious miner app is that by design it has already all the tools needed to be very harmful, these include upload and download capabilities, there will not necessarily be anything we can detect immediately, as a malicious miner app can be triggered by something as simple as a specific network block number being reached or other delayed mechanisms.
* Any computer on our network(subnet) could be a potential treat towards our hot wallet.
* There is no way to know if our wallet.dat/private keys are compromised, unless we always keep them safe guarded.
* The above holds true for any software we download and use.
== Links, Guides and other helpful tips ==

Navigation menu