pull down to refresh
0 sats \ 13 replies \ @cryptocoin OP 31 Mar 2022 \ on: Bitcoin Security Tips to Help You While Traveling | Casa bitcoin
Travel hubs
Lodging and accommodations
Hotel safes are not to be trusted for keeping bitcoin and high-value items safe. These safes are easily accessible to hotel staff and cleaning services using bypass codes.
Some hotels and suites have a double door connecting rooms or bathrooms directly.
Consider using a portable, non-intrusive door brace or deadbolt strap for your hotel door.
Lodging through vacation rental websites can be great for cost but not as much for security.
When ordering delivery, food, or car rental services, use only a first or fake name if possible.
reply
Before the event
Consider using the buddy system. Physical attackers are more likely to target individuals traveling alone to conferences and satellite events.
Update any computers, tablets, or mobile devices you may be bringing with you prior to the event.
reply
At the event
Turn off all unneeded network communications including Bluetooth, WiFi (in certain areas), and the MacOSX/iOS Airdrop file sharing utility.
Avoid giving out your phone number to strangers. If attackers have your number, they can target you in a SIM swap, port your number to their phone, and drain financial accounts that rely on that number for two-factor authentication.
Do not share any pictures of a location on social media while you are still in that location. It's better to post pictures after you have left the location, or sometime thereafter.
Be conscious of what you disclose about yourself at crypto events.
Be aware of those in attendance at afterparties, bars, and shared party locations.
reply
Final thoughts
While most attendees should feel safe and not be targeted, “An ounce of prevention is worth a pound of cure.”
reply
There's another post on SN with a corresponding Twitter Spaces:
Travel Security Q&A | Twitter Spaces from @CasaHodl
#17162
https://twitter.com/i/spaces/1djGXPAwwqzGZ
reply
Here's an example of where better attention to physical security would have been helpful:
reply
deleted by author
deleted by author
deleted by author
deleted by author
deleted by author
deleted by author
deleted by author