pull down to refresh

Lodging and accommodations

Hotel safes are not to be trusted for keeping bitcoin and high-value items safe. These safes are easily accessible to hotel staff and cleaning services using bypass codes.
Some hotels and suites have a double door connecting rooms or bathrooms directly.
Consider using a portable, non-intrusive door brace or deadbolt strap for your hotel door.
Lodging through vacation rental websites can be great for cost but not as much for security.
When ordering delivery, food, or car rental services, use only a first or fake name if possible.
Before the event

Consider using the buddy system. Physical attackers are more likely to target individuals traveling alone to conferences and satellite events.
Update any computers, tablets, or mobile devices you may be bringing with you prior to the event.
reply
At the event

Turn off all unneeded network communications including Bluetooth, WiFi (in certain areas), and the MacOSX/iOS Airdrop file sharing utility.
Avoid giving out your phone number to strangers. If attackers have your number, they can target you in a SIM swap, port your number to their phone, and drain financial accounts that rely on that number for two-factor authentication.
Do not share any pictures of a location on social media while you are still in that location. It's better to post pictures after you have left the location, or sometime thereafter.
Be conscious of what you disclose about yourself at crypto events.
Be aware of those in attendance at afterparties, bars, and shared party locations.
reply
Final thoughts

While most attendees should feel safe and not be targeted, “An ounce of prevention is worth a pound of cure.”
reply
There's another post on SN with a corresponding Twitter Spaces:
Travel Security Q&A | Twitter Spaces from @CasaHodl #17162 https://twitter.com/i/spaces/1djGXPAwwqzGZ
reply
Here's an example of where better attention to physical security would have been helpful:
Shootings will continue until anonymity improves | @BowTiedKoala #17150
reply
deleted by author
deleted by author
deleted by author
deleted by author
deleted by author
deleted by author