Wanna Go Phishing ?

The foremost threat in the online world, Phishing attacks. More than any other threat, this is the most common that you will encounter almost daily. So, do you wanna be the fish? The bait is very real and tempting.

Basic precautions for Crypto Security.

My intention on this blog post was to focus on the phishing epidemic and how it affects you everyday. As I started to write, my list of ideas quickly became a laundry list that needs repeating. So, here is the list again with updates as I learn and interview experts in this field.

Online Exposure. ( Smart phones ) The old/new portable computer that goes with you. This includes smart watches.

When I talk about exposure, I refer to the target you present to a potential hacker or phishing attack. Phishing scams represent the largest and most common way people lose their assets. Whether it be fiat or crypto. Learn how to recognize and avoid being caught in a phishing scam. Hackers are a very small threat compared to phishing scams where you voluntarily give up your passwords and seed phrases. Spend some time and goole phishing attacks. It will be a great investment.

The most common attack is thru Email. You volunteer your info when you open an email.

The more info you offer to online platforms and social media sites, the better picture you paint of who you are, who your friends are and what circles you travel in. The apps on your smart phone are the biggest leaks to the metaverse about who you are and where you go.

Even in airplane mode, the apps on your phone can constantly ping nearby phones and thereby the network and other nearby devices . Then they paint a picture of your daily life as each of them will check in on your network and add to the data base of your travels, your friends, and your interests. And what did you pay for these apps. Weather, maps, market prices, zoom, news, twitter, etc. Read the entire agreement and see how they collect your data.

This data on where you go and what you value ( apps for banking, stock market reports, crypto prices, facebook, twitter, etc) is very valuable information and marketing companies pay big money to target you. Guess what, the phishing actors pay money for the same lists as the advertisers ; and they tailor thier phishing campaigns to your interests.

So, can I now ask you "What is free? Are any of your "free" apps free, or is there a hidden cost?

The reality is; our data is harvested for profit by companies that will willingly pull our access at a moment’s notice. They will stalk you and also block you. The blockchain can solve the privacy issues, and also the access to platforms and censorship.

These attack vectors ( gathering private info and phishing scams ) are constant and unrelenting. So keep your profile as small as possible. I recommend a separate email for all your online financial transactions. Of course, this is just one item of many that will keep you safe. A former article can be found here. We will touch on these precautions again.

Gmail (free) offers the best filter for virus protection and malware. Still, you need to keep it safe. More on that later in the password and 2FA section. Oh, and Gmail also puts cookies on your devices. And, guess what? Google makes most of their money by selling your information. I use Gmail, but I also clear my cookies frequently.

One way to combat this loss of privacy is to use your desktop as much as possible, and use your browsers in a private mode. Never use your smart phone to buy or sell assets ( fiat or crypto ) unless you understand the risk , work to control it, and are willing to lose control of your money.

An Excellent article about phishing attempts can be found here.

Excerpts from David Veksler of the Bitcoin Consultancy. You can download a white paper

with excellent info on.

  • Phishing and Fake Wallet Validation

  • Exit Scam/Rug Pull

  • Scam Coins

  • Counterfeit Tokens

  • And more


Follow us at FNL Crypto. Soon I will publish a restricted paper on physical and online security. This will be available only to FNL Members and will have some of the most tried and true concepts and proven techniques to cover your foot print in this Brave new world of the Web 3.0. I'm reluctant to put this online as the more people find these simple techniques the more everyone else will realize how and where to look for your treasure.