top of page
Acerca de
About Us
SICURITY Digital Asset Consulting
Our mission is to help empower the understanding, adoption,
and safe use of digital assets and the technologies used to secure them.
Our vision is to be a trusted knowledge resource, and an empowerment inspiration.
100%
Our team is focused on helping all of our clients comfortably and confidently learn about, own and safely use digital assets in their personal lives, businesses, schools, charities and non-profits.
-
What can you do for me as an individual?We provide a range of content and service levels. Our website is built to be a knowledge hub. Much of the content and support that we provide for individuals is self-directed, self-paced content. Our information is formatted to be clear, and to the point. Very "how-to" like. White-Glove Crypto Concierge Services are also available and are quoted on an individual basis.
-
What does SICURITY Digital Asset Consulting provide?We assist individuals, educators, businesses, charities, and non-profit organizations, with understanding the implementation and safe use of digital assets. We produce educational content and provide coaching assistance for digital asset custody options, online safe practices, and technology adoption. If you want to learn about and use cryptocurrencies and digital assets, we can help.
-
What can you do for my non-profit?Your non-profit or charitable organization should strongly consider implementing crypto assets into your fundraising operations. The crypto community is very generous. If your organization is not "open" to crypto donations, you are MISSING out. We can help with team training, storage selection and wallet set up. We can provide guidance on setting up donation processing, and NFT applications for raising funds. Our SICURITY team makes "Making-A-Difference-With-Crypto!", as easy as possible.
-
How can I learn more?Please use the information submission form by clicking on CONTACT US. Fill in your information and our team will contact you.
-
What can you do for my business?We spend time with you to understand your business and what your objectives are for implementing crypto assets in your operations. We can help with: · Choosing crypto payment processors · Selecting crypto storage options · Deciding which cryptos to accept for payment · Business NFT use-case and applications · Customized employee and customer education materials
-
What is a blockchain?You can think of a blockchain as a type of database. A blockchain is a digital ledger of cryptographically secure transactions that are stored in blocks. The network processes transactions and packages the information into successive block. Each one is cryptographically connected to the previous block and to the next block. The updated blockchain information is distributed to all connected computer systems, validators and miners.
-
How secure are cryptocurrencies?The technology underlying cryptocurrencies is very secure. They leverage cryptographic techniques for transactions for validating and recording transactions and account balances. The distributed ledger, and cryptographic techniques used, make it extremely hard for hackers to manipulate the system or make fake transactions. Most security issues that arise with crypto currencies, involve user-error or poor wallet security on the user-end.
-
How are cryptocurrencies different than traditional currencies?Cryptocurrencies are entirely digital and operate independently of governments. Where traditional currencies are controlled by governments and central banks. Cryptocurrencies leverage cryptography for security, preventing counterfeiting and fraudulent transactions. While traditional cryptocurrencies employ anti-counterfeiting measure, they are still counterfeited in mass amounts.
-
What are blockchain tokens, and how are they different than cryptocurrencies?Blockchain tokens are a type of digital asset that exist on a blockchain. They represent value for their ecosystem. This value can represent access to services, payment for ecosystem fees, voting rights in a protocol, proof of ownership, or many other use-cases. Cryptocurrencies, primarily act as digital money, tokens often provide access to a product or service offered by the issuer blockchain ecosystem.
-
How is the value of a crypto asset determined?The value of a crypto asset is mainly determined by supply and demand dynamics within the market in which it trades. Many other factors such as perceived utility, media coverage/attention, regulatory news or events, and overall market sentiment can also significantly influence prices.
-
What risks are there with crypto assets?Crypto asset users may face several risks, including financial losses due to extreme price volatility, loss or theft of assets due to inadequate security measures, potential legal issues in regions with undefined regulations, and susceptibility to scams or fraudulent schemes.
-
What kind of regulations are currently in place for digital assets?Regulation of digital assets differs widely worldwide. In some countries, digital assets are fully legalized and regulated; in others, regulations may be non-existent or prohibitively strict. Regulatory areas include taxation, anti-money laundering (AML) measures, securities regulation, and more. As the crypto asset ecosystem continues to grow and evolve, so does the regulatory landscape. In the United States, there are many efforts underway to get Congress to pass legislation to define the road to growth for the industry in America.
-
Are crypto assets taxable?Yes, in many jurisdictions, crypto assets are subject to taxes. The exact tax treatment can depend on personal circumstances and local tax laws. It could be capital gains tax or income tax, depending on whether it's deemed as an investment or income. It is best to consult with a licensed tax professional in your area.
-
What is the role of blockchain technology in digital assets?Blockchain technology serves as the underlying infrastructure for most crypto digital assets. It creates a decentralized and transparent ecosystem where all transactions involving crypto digital assets are recorded and stored cryptographically. This makes the data verifiable and irreversible. This technology promotes trust and security, making it almost impossible for third parties to manipulate the data.
-
What are digital assets?Digital assets are any resources or properties that exist only in a digital form and includes a right to use. This includes digitally created and stored, documents, images, videos, music, etc. More recent, well-known examples include cryptocurrencies and non-fungible tokens (NFTs). They provide owners with value in a variety of ways, from access to services or exclusive content, to royalties, price appreciation, store of value, etc.
-
Which storage option is best suited for beginners?Online wallets, particularly mobile and web wallets, are typically more user-friendly, making them a good option for beginners. They are convenient for accessing blockchain networks and conducting transactions. Additionally, these wallets generally support thousands of crypto assets across dozens of blockchains. These wallets are generally available for free by simply downloading the application and creating a wallet.
-
What are important considerations when choosing a centralized crypto exchange?There are several important factors to consider. First, you will want to choose options that are registered and legal to use in your jurisdiction. Once you have the list narrowed down, you will want to consider the exchange's security history, fees, supported assets, trading volume, user experience, and customer support. Each individual's needs will vary, so it's essential to research and select an exchange that best suits your requirements.
-
What options are available for the storage of crypto assets?There are many storage options available for the storage of crypto assets, including software wallets (browser, mobile, desktop and smart contract wallets), physical wallets (hardware, paper), and custodial wallets provided by exchanges or other crypto services. (HSM, hot wallets)
-
Where can I buy cryptocurrencies or blockchain tokens?Today, there are many available ways to buy crypto assets. The point at which you convert cash to crypto is referred to as an on-off ramp. Access will depend on the provider and the jurisdiction where you live. The centralized crypto exchanges like Coinbase or Kraken have typically been the on-off ramps for most crypto owners. However over the last few years others have joined as on-off ramps. Companies like Robin Hood, Sofi, Paypal offer a list of crypto assets to their customers. Software wallets have also incorporated "purchase in wallet" features, by having you connect a credit card for payment.
-
What can I do with cryptocurrencies and blockchain tokens?Cryptocurrencies can be used for online transactions, held as an investment, or a store of value. Blockchain tokens, depending on their type, can represent various forms of value and rights within a blockchain ecosystem. They can be used to unlock specific features, represent a vote within a community, or denote ownership of an asset. The first use case that you will probably encounter will be the token's usage to pay gas fees on the platform you are using.
-
Where can I sell or trade cryptocurrencies or blockchain tokens?Just like buying, cryptocurrencies or blockchain tokens can be sold or traded on cryptocurrency exchanges. These platforms allow you to exchange your assets for other digital currencies or sell them to receive traditional currencies. You can also trade crypto assets on decentralized exchanges, however you cannot concert your crypto back to fiat currencies through decentralized platforms. Other centralized crypto financial companies like Cash App, PayPal, Robin Hood and SoFi will offer crypto to fiat exchanges.
-
What precautions should I take when storing crypto assets?The primary precautions would be keeping your wallet's private keys, passphrases, and backup phrases secure and private. The next level of precaution is to practice good online hygiene and data security measures. This include regularly updating the firmware and operating systems for all of your devices. modems, routers, computers, phones and wallets. Additionally, you should commit to staying current with online security best practices, crypto assets and wallet usage best-practices, and general information regarding hacks and scams, to stay on your toes. Lastly, you need to be careful about who you tell that you own crypto to avoid making yourself a target for scammers.
-
How can I transfer my crypto assets from an exchange wallet to a self-custody wallet?The first step will be to open the receiving wallet and the crypto that you want to receive. Once you are in that crypto's app, select "receive." The wallet will generate your receiving address. Once you verify that the address showing on your screen is accurate, press "copy." Finally, you will open the sending wallet, and go to the app for the crypto you want to send and click "send." You will be asked to enter the quantity and the receiving address. This is where you will paste the receiving address you copied in step two.
-
Is there insurance provided for any loss of crypto assets from wallets or exchanges?The short answer is generally no. However, some exchanges may offer a degree of insurance, but this varies widely and often doesn't cover all types of losses. It's therefore essential to implement security measures to protect your assets. The world of Decentralized Finance has introduced several platform that have created risk management solutions including decentralized insurances.
-
What is the difference between custodial and non-custodial storage?Custodial storage means an entity, usually an exchange or third-party service, holds your assets for you. This entity has control over your private keys. Custodial storage service vary in their security levels. Some of these service actually take your private keys off-line and store them, while most crypto exchanges provide their users with wallets that are always connected online. Even though this is convenient for the user, the security of the crypto online wallets are not as secure as storing the crypto in your own wallet. In contrast, non-custodial storage refers to wallets where you hold and control your keys. These wallets are also call self-custody wallets. Non-custodial wallets are available in many formats from software applications to dedicated hardware devices.
-
How do I backup or restore a self-custody wallet?Backing up and restoring a self-custody wallet involves the use of your seed phrase. Anytime you are doing anything with your seed phrase, you should follow Seed Phrase Best Practices. Backing up generally involves recording the recovery phrase, a string of words that can restore access to your wallet. It is critical to write down the words, on paper, in the exact order and spelling that the wallet interface gives them to you. It is also critical to keep this list private and secure. Anyone that has this list can create a wallet with it and take all of your assets. For restoration, you typically enter the recovery phrase into the same or compatible wallet software. Most interfaces will give you an option to "import existing wallet." This should be done carefully to avoid compromising your security and losing your assets. As a cardinal rule, you should NEVER enter a recovery phrase generated on your hardware wallet, into a software wallet interface. At this point, your hardware wallet is now only as secure as your software wallet. Even if your hardware wallet is offline.
-
How do custodial solutions for crypto assets work and who should use them?Custodial solutions vary in their degree of security, cost and features. Wallets that are provided to users of centralized crypto exchanges and financial services are all custodial wallets, however because they are always connected to the internet, they are not the most secure option for storage. Custodial solutions specifically provided as a service, tend to offer greater levels of security. These services use several levels of access control, as well as utilizing off-line hardware storage modules to keep user private keys offline. These solutions are ideal for people who prefer not to handle their own security or are still new to cryptocurrency and want a simplified experience. High net-worth individuals, corporations, and businesses that have large wealth to protect and store, will utilize custodial services.
-
Can I combine multiple storage options for my crypto assets?Absolutely, and it's a recommended best practice for spreading risk. To do this you want to consider the function you want the wallet to serve. - Mobile wallets for trading and accessing decentralized applications - A dedicated hardware wallet for only connecting to applications and interacting with smart contracts. - A dedicated hardware wallet for long-term cold storage. Beyond those basic functions, you may consider: - MPC, Multi-Sig and Smart Contract Wallets for additional self-custody security and access controls.
-
What is the difference between a digital wallet and a crypto wallet?The term digital wallet refers to a broad range of technologies to store not just crypto assets, but also credit card info, passwords, event tickets, digital identifications, and more. Examples would be applications like Apply Pay, Google Wallet, PayPal, Cash App, etc. A crypto wallet is a type of digital wallet that is specifically designed to store and manage crypto assets. These wallets have the ability of connect to and interact with blockchains for transactions.
-
What are the types of self-custody wallets that I can use to store crypto assets?The options for self-custody wallets are numerous. This is going to be an area of product growth for the next several years, so the available options will only continue to grow in numbers. The choice between the available options can be narrowed to a focused list, by your requirements on security, convenience and cost. Software based wallet options: Browser wallets, mobile phone wallets, smart contract wallets, desktop wallets. Hardware based wallet options: Crypto hardware wallets
-
Can I store multiple types of crypto assets in a single wallet?The short answer is Yes. Most wallets have the ability to communicate with multiple blockchains and crypto assets. Some smart contract software wallets are only compatible with Ethereum and Ethereum based tokens. While some hardware wallets are "bitcoin only", or offer a limited number of crypto assets compatibilities. Always verify that the wallet supports the specific crypto assets you intend to deposit.
-
Can I change my storage options, after using them for a while?You can switch between storage options whenever you wish. This involves transferring the assets and might require network fees. When sending crypto assets to a new wallet account, best practices are to start by sending a very small amount of crypto to verify that everything is set up and recorded correctly. Once that transaction confirms, you can feel comfortable transferring the remaining balance to the new wallet. Regardless of how much experience you have, you should always take your time, and pay attention to detail. Do not trust. Verify!
-
How do I set up a self-custody wallet to use?Setting up a self-custody wallet usually involves downloading an app to your phone, adding an extension to your browser, or downloading the relevant software interface for a hardware wallet. The steps for setting up a wallet will be basically the same for most types of self custody wallets. You will create a new wallet by initiating the set up sequence. You will be given a recovery phrase (series of words). Write these down, on paper, in the exact order and spelling that they are given to you by the wallet interface. Also use and write down any passphrase and PIN options offered. NOTE: Follow Seed Storage Best Practices. You will then need to set up the crypto asset accounts within the wallet, for the crypto assets you want to use. This is a simple process that is handled by your wallet software. You just need to select the assets you want to have it set up.
-
What features or precautions should I consider when choosing a crypto asset storage option?There are many options for crypto asset storage. From third-party custodial services to various self-custody wallet options. It's crucial to consider factors like company reputation, wallet security features, crypto assets compatibility, ease of use, and customer support when selecting a storage option. Precautions include understanding how to back up, restore and maintain your wallet, wallet security best practices, and ensuring you're using a secure internet connection and good online hygiene and data defense practices.
-
Can more than one person use a self-custody wallet?Yes. This can be done several ways. You can create clone wallets of the same seed. Each device will be a copy of the others and each will be able to spend and transfer any of the assets in the wallet. Another way to accomplish this is to create a Multi-Party Computational (MPC) wallet, or a Multi-Signature wallet. In this set up each account holder maintains their own wallet. The individual wallets are then used as signature authority for the MPC or Multi-Sig Wallet.
-
What basic steps should I take to secure my crypto assets online?To secure your crypto assets online, you need to use several steps simultaneously. - Online Account Security - Use strong passwords, two-factor authentication (2FA), and biometrics, when available. - Secure Your Devices - Regularly update your software, run Malware protection on your devices, and keep them physically secure. - Always use Online Hygiene and Data Defense Best Practices - Only connect to reputable sites, and verify before you click on links and addresses. Always double check URL's and Addresses.
-
Is it important to encrypt data related to my digital assets?Yes, encrypting data related to your digital assets helps protect sensitive information like wallet files, financial information and personal documentation from unauthorized access, thus reducing the risk of theft or loss. This can be accomplished by encrypting the files through your software platform, or storing the files on a dedicated external storage device that is encrypted and protected with a PIN or some other type of access control. Fortunately, a lot of this work is already done by the software and systems that we use for communications, however we have the ultimate responsibility of verifying security measures and increasing them where needed.
-
What steps should I take if I think my wallet has been compromised?If you think your wallet has been compromised, you should immediately set up a new wallet and transfer all of your remaining assets to the new, secure wallet. Now you should update all login credentials, strengthen your security measures. You can also reach out to the wallet provider to inform them of the security breach. They may or may not have assistance to offer.
-
What is “Blind Signing”?Blind signing is a technique that enables a digital signature to be created without revealing the content of the original message. The signer can verify the authenticity without knowing the message contents. This obviously is a high security risk. It commonly happens because most wallet user interfaces do not have the space or capacity to display the contract details and transaction messages that accompany many transactions that involve smart contract interactions. Wallet manufacturers and development are introducing new wallets and interfaces that will improve the visibility factor. You need to use this wallet option very carefully.
-
What are the basic steps to physically securing my self-custodied crypto assets?Physically securing your self-custodied crypto assets is about seed phrase and device protection. Your seed phrase is the least secure of the two. You need to protect it from anyone else getting access to it, you need to make sure it is recorded correctly, and then you need to make sure that you store it somewhere that is offline, locked, and fireproof. You also need to physically secure your devices. Self custody hardware wallets should be stored away securely unless you are using them. Software wallets should be protected from access through the use of complex passwords, PIN and Passphrase use, and biometrics, when available. Cell phones and computers should be updated regularly, and be running Malware protection. The most over-looked precaution with securing self-custodied crypto assets, is the lack of a continuity access plan for your loved ones, in the unfortunate situation where you become incapacitated or die.
-
Can crypto assets be insured for online theft or loss?Some custodial storage providers may offer insurance, but it varies widely, and it often doesn't cover all types of losses or theft. Self-Custody storage options do not provide any type of insurance, beyond the insurance of knowing you have control of your crypto private keys.
-
What kind of backup measures should I take to secure my digital assets?There are several ways and schemes that you can use to back up and secure your wallet's recovery seed phrase. The most important consideration is to not make the process you choose, too complicated. Your plan could be as simple as writing the words down on a piece of paper and storing that paper in a fireproof, locked box. You might choose to record your words using a metal seed back up solution to eliminate the fire/water frailty of the paper record. You might want to make multiple copies, or break your seed words into multiple groups and store them in separate secure locations. Finally, you might want to consider using a beneficiary wallet service, that upon your death, will assist your heirs with access.
-
What kind of scams are common in the crypto asset space, and how can I avoid them?There are many scams in the crypto asset space. Although some are unique to crypto assets, many are not different than the threats posed to any type of digital financial value. To keep yourself the most protected, you should continue to educate yourself about new threats that develop through time. Some of the most common types of scams include phishing attacks, malware, social engineering, smart contract exploits, protocol rug pulls, among others. To avoid falling for these scams, always practice good online hygiene and data defenses best practices, and stay informed about well-known scams and new threats, and be vigilant with wallet security best practices.
-
Is it safe to store crypto in my mobile wallet?Storing crypto in a mobile wallet can be safe as long as you use reputable wallets, implement strong security measures, and keep the amount of assets stored to a minimum, suitable for smaller transactions. In addition to the access security measures that your wallet app offers, you also get the security benefits from the features built into your cell phone.
-
Why would I want to use multiple crypto wallets?Using multiple wallets allows you to spread your risk. It is a good idea to consider how you want to use a wallet. Do you want to store crypto for long term, mint NFTs. participate in decentralized finance, explore web3. Each of these activities has their own wallet security demand. Multiple wallets will give you options for separating asset management objectives (i.e. trading, spending, long term storage), Diversifying risk by spreading your crypto assets into different wallets and accounts, prevents all of your funds from getting stolen by one security mis-step.
-
How can I ensure that the dApp or exchange I’m connecting my Web 3 wallet to is safe and secure?To ensure a dApp or exchange is safe and secure, research its background, verify the team's credibility, check for security audits and user reviews, monitor the smart contract code, and stay informed about security incidents or scams related to the platform. Some newer web 3.0 wallets now include smart contract scanning that will notify you if you are about to connect to a known malicious smart contract.
-
What are the primary security risks associated with using a Web 3 wallet?Primary security risks associated with using a Web 3 wallet include phishing attacks, malware, unauthorized access, weak security practices, and vulnerabilities in the dApps connected to the wallet. Fortunately wallet providers are starting to develop and include smart contract security scanners that will warn you if you are about to connect to a known malicious smart contract.
-
What is a Web 3 wallet, and how does it differ from a traditional crypto wallet?A Web 3 wallet is a software wallet that enables users to interact with blockchain-based decentralized applications (dApps) and manage their crypto assets. Traditional crypto wallets primarily focus on storing and managing cryptocurrencies, a Web 3 wallet extends the functionality to interact with the broader decentralized ecosystem and manage tokens with utility beyond just transactions.
-
What challenges need to be overcome before Web 3.0 becomes mainstream?Web 3.0's adoption challenges are mostly technology related. The user demand is there and growing. Web 3.0 sites require the user to use browsers that can display them. Browsers like Brave and Opera have that capability today. Mobile phone crypto wallets have software built into them to allow interaction with decentralized applications. Wallet technologies will also need to evolve for the user experience, especially in web 3.0 gaming, to improve to more satisfactory experiences. Because web 3.0 allows the user to own and control their own information and assets, users need to connect their wallets to participate and authorize these interactions. This can interrupt the normal flow of a game, video, or music file, for example.
-
What are dApps?dApps (decentralized applications) are applications built on top of blockchain technologies. These applications are purpose-built. Some are created as exchanges, decentralized autonomous organizations, energy distribution platforms, and more. Most dApps operate without centralized control, and adopt a community-driven governance.
-
How is blockchain technology used in Web 3.0 applications?Blockchain technology enables decentralization, providing secure, transparent, and trustless systems for data storage and validation. This decentralization is the main purpose for the evolution from Web 2.0 to Web 3.0. The possibility to evolve is being provided by blockchain technologies.
-
Can I use antivirus software or a VPN to enhance the security of my Web 3 wallet?Yes, antivirus software and VPNs can enhance the security of your Web 3 wallet by protecting against malware, securing your internet connection, and ensuring anonymity.
-
How is Web 3.0 different from Web 1.0 and Web 2.0?Web 3.0 refers to the third generation of the internet. Web 1.0 was the first generation of the internet, with static websites and basically just displayed information and images. The next generation, Web 2.0, allowed users to interact with websites, enabling social media, content creation, and sharing. This is the generation that most people are used to today. The first two generations of internet have been provided by centralized content and access control. Web 3.0 is built on a foundation of decentralization, openness, user independence, and enhanced control, privacy, and personalization. As systems and protocols are developed, use-cases will evolve as well. On-boarding the first billion users to Web 3.0 is already underway.
-
What is a Web 3.0 Domain and what can it be used for?A Web 3.0 domain, or blockchain domain, is a domain registered on a blockchain, instead of through a centralized domain registrar. These blockchain domains enable censorship-resistant websites, simplify cryptocurrency transactions, and secures data ownership. Because this is a relatively new technology, many commonly used web 2.0 browsers will not display web 3.0 site. Google Search does not display web 3.0 sites in its search results. This will eventually change as more users gravitate to web 3.0 use cases.
-
Can hardware wallets improve the security of using a Web 3.0 wallets?Hardware wallets can improve the security of Web 3.0 wallets by providing an extra layer of protection via offline storage of private keys, ensuring they are less prone to hacking, theft, and other malicious attacks. Some mobile Web 3.0 wallets offer this type of connectivity with a hardware wallet, while on the go. Most desktop browser base wallets include this option. This is actually a Wallet Security Best Practice.
bottom of page