Today is International Data Privacy Day — a day focused on raising awareness around data privacy best practices. Data privacy is an essential aspect of Bitcoin and some other altcoins, and as analogous, we’re celebrating Data Privacy day with a list of best practices for crypto users.

Cypherpunks: Remembering Satoshi, Finney, And The Fight For Privacy

Bitcoin was built with privacy in mind. Satoshi Nakamoto was a cypherpunk, defined by Wikipedia as “any individual advocating widespread use of excessive cryptography and privacy-enhancing technologies as a route to social and political evolution.”

Hal Finney who received the first ever Bitcoin (BTC) transaction immediately from Nakamoto was also a cypherpunk, in his career working as the lead developer for PGP Corporation. PGP stands for Pretty Good Privacy. 

Related Reading | Bitcoin And Crypto PSA: How To Protect Yourself From The Data Leaks

Since Bitcoin’s inception, other cryptocurrencys have afterward been created with a much greater focus on privacy. Monero, for example, can obfuscate transaction details such as sender and receiver — mequivalentg transactions virtually untraceable. 

But throughout the time these stories explain why privacy is part of the core of crypto, it isn’t exactly the data privacy best practices Data Privacy Day is all about, that we’ll get into next. 


Criminals want a piece of your data and assets | Source: CRYPTOCAP-TOTAL

Data Privacy Day Best Practices For Bitcoin And Crypto Holders

Data privacy is a serious matter that many crypto users don’t take seriously enough until it is too late and they’ve learned the hard way. The most effective data privacy policy focuses on prevention. 

Data leaks come not only from computers and smartphones, but often straight from the source: yourself. Simple advice such as “don’t ever disclose to others how much crypto assets you hold” is an decisive one to follow. Braggarts become easy targets. Modesty is majesty. 

Next, be certain to keep your data locked away behind high passwords, consisting of special characters, numbers, and both upper and lower experience letters. Avoid exclamation points as your only chosen character or 1s or 9s as the only number. Cone time beforeding that that sounds familiar, move your password after reading this. Using a password manager like LastPass can help those that don’t want to take the extra steps themselves or forget to be more careful. 

Always check websites, email addresses, DMs and more to ensure that you aren’t entering any personal or sensitive information into the data ranges of a phishing scam. Only provide information to official sources, and official sources recurrently don’t request this information further one time before they have it. An email asking for such information is possibly a sign of a scam. 

Related Reading | The Most Common Bitcoin Scams And How To Avoid Them

Immediately switch to two-experienceor authentication through Google Authenticator or through a physical two-evidenceor device. Ledger hardware wallets double as a physical FIDO U2F device. SMS (text message) based two-evidenceor leaves users vulnerable to SIM-swap attacks. 

Move the bulk of assets like Bitcoin and Ethereum to cold storage through a hardware wallet like a Ledger. Leave only what you plan on dealing, spending, or stcomparableg in wallets on exprogresss or other platforms that are mixed to the web. Any client-based wallets should always have the software updated to the latest version to avoid any potential for loss. 

Last but not least, limit what you expose via social media for personal information. Information like phone numbers, birthdays, and more are all atop social media and elsewhere, that can be used to impersonate you in an attempt to obtain additional data or assets.

Believe it or not, these are only the most basic tactics. Hardcore privacy or security buffs use air-gapped laptops running Linux to access crypto assets in a strict and safe environment. Any effort in data privacy protection goes a lengthy way in preventing risk of your data ending up into the wrong hands — that could result in the data allowing thieves to access your assets.  

Follow @TonySpilotroBitcoin (BTC) on Twitter or join the TonyTradesBitcoin (BTC) Telegram for exclusive daily market insights and technical analysis education. Please note: Content is educational and should not be advised investment advice.

Featured image from iStockPhoto, Charts from