Phantom, Magic Eden, or everything you use in the blockchain you are using is called soft wallet. This means that all approval for the wallet exists in a digital way. Like a safer way of physical storage of seed phrases, there is a physical wallet called a hardware wallet that provides additional protection layers to these software wallets. Wallet maintenance is more important and slightly more detailed than I want to go here, but my advice is to keep a separate hardware wallet for long -term assets and more tokens/NFTS and to stay away from those who want to take you online (eg, you!). You may not need a hardware wallet when you just start, and if you feel comfortable in trading on the centralized exchange, using tokens, and raising assets, you do not need to perform this additional step. But if you want to explore, you need a distributed wallet to get safety in your hands.
Okay, so you are worried that you are installed but safe. I’m not a security expert, but I’ve spent a lot of time meeting and talking with Web3 security managers for the past few years. Some of the best recommendations I can share from them are what I use myself. For example, start by evaluating Web2 security. Is it set as a viral vaccine software? Is there an ad breaker on the device? How freely are you providing user data online? These basic stages are important for those who explore anything on the Internet, but are more important in the world of Web3.
We want to use some tools created to help security in addition to the hardware wallet until the Web3-specific stage. My tools include Harpie, Wallet Guard, Pocket University, Webach and Revoke.cash. Many of these sites can provide an account with email and wallet addresses and provide free use of services as if they are simulating transactions before processing them in the blockchain, and wallet trading update through e -mail, backup wallet service, backup wallet service Remove permissions such as Wallet (reboke.cash). After connecting to an external site, you should always enter the wallet and remove the permissions of the site. If the site is not eliminated and the site is malicious or hacked, you can lose your assets. This is an exemplary example of a Web2 site like social media. Also, do not provide a phone number to the site as much as possible. Personally, Brave likes Brave as a browser option because it has a built -in ad breaker and built -in wallet with a browser option.