7 Ways to Protect Yourself From Violent Crypto Attacks (Without a Shotgun)
If you own a lot of crypto, here’s what you need to know about decoy wallets, panic buttons, and "duress protocol.
In brief
●Use multisig wallets or other techniques to create time delays.
●Practice a script you’d use under coercion (“The wallet is stored at my lawyer’s office and takes 72 hours to unlock.”)
●Keep a decoy wallet on your phone or hot wallet with a few thousand dollars.
●Cover your tracks. Never disclose your holdings or wallet structure in public or online.
1. Multisig Wallets.
2. Shamir's Secret Sharing.
3. Duress Wallets and Decoys.
4. Hiding your track.
5. Proximate and Remote Wipe.
6. Air-Gapped Hardware Wallets.
7. Wearable Panic Buttons with GPS Tracking.