Your cryptocurrency is only as secure as your wallet. This guide covers essential security practices to protect your ETC from theft, loss, and common attack vectors.
Understanding Your Seed Phrase
Your seed phrase (also called recovery phrase or mnemonic) is the master key to your wallet. It's typically 12 or 24 words that can regenerate all your private keys.
- Never share it with anyone—legitimate services will never ask for it
- Never store it digitally—not in photos, notes apps, cloud storage, or email
- Write it down on paper and store securely offline
- Consider metal backup for fire/water resistance
Secure Seed Phrase Storage
Paper Backup
The simplest approach is writing your seed phrase on paper:
- Use pen, not pencil (won't smear or fade as easily)
- Make 2-3 copies stored in different secure locations
- Consider a fireproof safe or safety deposit box
- Never label it as “crypto seed phrase” or similar
Metal Backup
For better durability, consider metal backup solutions:
- Steel plates that you stamp or engrave words onto
- Survives fire, flood, and physical damage
- Products like Cryptosteel, Billfodl, or Blockplate
What NOT to Do
- Don't take photos of your seed phrase
- Don't save it in a password manager
- Don't email it to yourself
- Don't store it in cloud services
- Don't keep only one copy
Protecting Against Phishing
Phishing is the most common way people lose crypto. Attackers create fake websites and messages to steal your seed phrase or trick you into signing malicious transactions.
Red Flags
- Any website asking for your seed phrase (legitimate wallets never ask)
- Unexpected DMs about airdrops, giveaways, or support
- URLs with typos or unusual domains
- Urgent messages pressuring immediate action
- “Sync your wallet” or “validate your wallet” prompts
Best Practices
- Bookmark legitimate sites and only use bookmarks
- Double-check URLs before connecting your wallet
- Be suspicious of any unsolicited contact
- Verify information through official channels
- If something seems too good to be true, it is
Transaction Security
Every transaction you sign is irreversible. Take precautions:
Before Signing
- Verify the recipient address (send small test amounts first)
- Check you're on the correct network (ETC Chain ID: 61)
- Review what you're approving—unlimited token approvals are risky
- Understand the transaction before confirming
Address Verification
- Always double-check the first and last characters
- Use address book features when available
- Copy addresses directly—never type manually
- Watch for clipboard-hijacking malware
Device Security
Your wallet is only as secure as the device running it:
Computer Security
- Keep operating system and software updated
- Use reputable antivirus software
- Avoid downloading software from untrusted sources
- Consider a dedicated device for crypto
Browser Security
- Only install wallet extensions from official sources
- Remove unused browser extensions
- Be cautious with sites requesting wallet connections
- Lock your wallet when not in use
Mobile Security
- Use device PIN/biometric lock
- Keep your phone's OS updated
- Download wallet apps only from official app stores
- Enable remote wipe capability
Using Hardware Wallets
Hardware wallets provide the strongest security for significant holdings:
- Keys never leave the device
- Transactions require physical confirmation
- Immune to computer malware
- Can be combined with software wallets for dApp access
Even with a hardware wallet, your seed phrase backup remains critical. The device can be replaced; the seed phrase cannot.
Token Approvals
When interacting with DeFi, you often need to approve tokens for spending. Be careful:
- Approve only what's needed for the transaction
- Revoke unused approvals periodically
- Unlimited approvals save gas but increase risk
- A compromised contract can drain approved tokens
Security Checklist
- Seed phrase written down and stored securely offline
- Multiple backup copies in different locations
- No digital copies of seed phrase anywhere
- Wallet password is strong and unique
- Device software is up to date
- Only using official wallet software
- Verified URLs before connecting wallet
- Hardware wallet for larger holdings
What to Do If Compromised
If you suspect your wallet is compromised:
- Stop using the compromised wallet immediately
- Create a new wallet with a new seed phrase on a clean device
- Transfer remaining assets to the new wallet
- Revoke all token approvals from the old wallet
- Investigate how the compromise occurred