Market research has shown for years that the trend keeps going away from PCs and laptops and towards the use of smartphones. The fact that most companies and service providers have their own apps has made it relatively convenient to use services on a much smaller screen.
Various applications in the environment of cryptocurrencies and blockchain technology are no exception here and are increasingly becoming the norm. However, the use of a mobile device is subject to other conditions that require special attention when working with cryptocurrency wallets.
In this article, we would like to show you what you should pay attention to when using a wallet on your smartphone. Some of the aspects also apply to laptops, as they are also mobile, although subject to a different type of use.
Lost, Damaged, or Stolen – Mobile Devices Are Insecure
Many of our readers will already be familiar with the situation: A minor mishap and the smartphone gets damaged. In the worst case, it can even be destroyed altogether; for example, devices that are not protected against water very quickly suffer a total loss when they come into contact with liquids.
This makes the backup strategy for smartphones particularly important in more ways than one, as a number of applications can be identified that are used with them and are specific to cryptocurrencies:
- Mobile wallets for cryptocurrencies
- Apps for 2-factor authentication
- Trading apps of various exchanges
- Portfolio tracking apps
It is not uncommon for all data or logins to be permanently stored on the device. Therefore, in many cases, you can access the apps directly and unfiltered after unlocking the smartphone.
Considering that a device can quickly be lost or stolen, you are therefore exposed to a much higher risk than when using your home PC so crypto recovery services can be more challenging.
As a general rule, you should always make backups of wallets as the risk of losing smartphones suggests strict adherence. If you don’t know how to make backups and what to keep in mind, you can read more about it in the first part of our article series.
ReWallet
Important Rules When Using Mobile Wallets and Crypto Apps
Besides backups, your own usage behavior is the most important tool in order to avoid the risk of suffering a financial loss. By adhering to simple rules, a higher level of security can be achieved. In particular, the following points should always be kept in mind:
- Only a fraction of one’s crypto assets should ever be stored on a mobile wallet.
- If the smartphone does not take appropriate precautions by default anyway, access to all applications should only be possible after entering the device password.
- In addition, it may be advisable to encrypt the smartphone. This is activated by default on iOS, but on Android it sometimes has to be activated manually in the settings.
- If possible, tracking apps should not give strangers any information about your assets.
- It should be ensured that the smartphone can be locked remotely in case of loss and that it can also be reset to factory settings remotely.
In principle, a mobile wallet is very similar to the wallet that’s in your pocket. If you have 100,000 euros in your bank account, you don’t carry it around, but only take the amount with you that you need on the road. Since the acceptance of cryptocurrencies for on-site payments is very limited, most users will probably only have the coins on their mobile wallet that they may want to quickly transfer to an exchange in order to be able to react to unforeseen events when trading.
Here, everyone has to do some soul-searching and individually weigh up the risks and benefits as to whether permanent storage on the smartphone makes sense for them.
Another option is to rely on a hardware wallet. For example, Ledger devices can be paired with the smartphone via Bluetooth. This provides a much higher level of security because the smartphone is only the interface and the wallet is on the other device. It is possible to lose the hardware wallet but these devices are much more secure in case a finder or thief tries to crack the password. For example, Ledger devices delete the seed on the hardware wallet after three incorrect entries of the device password, thus preventing any further attempts.