pull down to refresh

Travel hubs

If you need to transact in bitcoin at the conference, it is better to use the mobile single key wallet with a limited amount of funds. Having a majority of keys in your possession makes YOU the single point of failure and puts your funds at risk.
Power down your electronic devices fully before going through the security checkpoint.
As we often say, there are no vacations in security. Bitcoin travel requires a little extra precaution. Conference season is heating up again, and so are criminals, attackers, and malicious actors. Here is a helpful travel security guide for attending cryptocurrency-related events.
The first layer of security is privacy, and privacy is about flying under the radar. Every time I am in a travel hub, I take note of who is wearing a cryptocurrency shirt or who has a Bitcoin sticker on the lid of their laptop. Criminals and thieves take note of this as well. Don’t broadcast to everyone you’re traveling with bitcoin.
Always use a VPN when on a shared network, including hotels, airports, and individual rental locations. Public networks are often unencrypted, which can put your transmitted data at risk.
Only use your own device power chargers and cables.
reply
Lodging and accommodations

Hotel safes are not to be trusted for keeping bitcoin and high-value items safe. These safes are easily accessible to hotel staff and cleaning services using bypass codes.
Some hotels and suites have a double door connecting rooms or bathrooms directly.
Consider using a portable, non-intrusive door brace or deadbolt strap for your hotel door.
Lodging through vacation rental websites can be great for cost but not as much for security.
When ordering delivery, food, or car rental services, use only a first or fake name if possible.
reply
Before the event

Consider using the buddy system. Physical attackers are more likely to target individuals traveling alone to conferences and satellite events.
Update any computers, tablets, or mobile devices you may be bringing with you prior to the event.
reply
At the event

Turn off all unneeded network communications including Bluetooth, WiFi (in certain areas), and the MacOSX/iOS Airdrop file sharing utility.
Avoid giving out your phone number to strangers. If attackers have your number, they can target you in a SIM swap, port your number to their phone, and drain financial accounts that rely on that number for two-factor authentication.
Do not share any pictures of a location on social media while you are still in that location. It's better to post pictures after you have left the location, or sometime thereafter.
Be conscious of what you disclose about yourself at crypto events.
Be aware of those in attendance at afterparties, bars, and shared party locations.
reply
Final thoughts

While most attendees should feel safe and not be targeted, “An ounce of prevention is worth a pound of cure.”
reply
There's another post on SN with a corresponding Twitter Spaces:
Travel Security Q&A | Twitter Spaces from @CasaHodl #17162 https://twitter.com/i/spaces/1djGXPAwwqzGZ
reply
Here's an example of where better attention to physical security would have been helpful:
Shootings will continue until anonymity improves | @BowTiedKoala #17150
reply
deleted by author
deleted by author
deleted by author
deleted by author
deleted by author
deleted by author
deleted by author
deleted by author