7 Use An Email Alias

Emails can link your identity across the web and are a major target for hackers. Once your email is on a list on the internet, it’s compromised forever. In this video, we learn how to use fake emails to protect your real email from spammers, hackers and anyone trying to build a digital identity of you based on your email.

Chapters

  • What is an email alias
  • Why you need an email alias
  • Services I recommend

Resources & Links

Additional Info

Email Phishing is one of the most common ways to target people for cryptocurrency. If a hacker gets a hold of your email, they can send you targeted emails made to fool you into downloading malware, or entering you passwords into the hackers command and control. If you’re aware of the tactics used here be sure to check out some of the articles below in order to familiarise yourself with the types of threats to watch out for.

A couple general rules of rules of thumb to keep in mind:

  1. Never click on any links directly through your mail. Always manually navigate to the site in question.
  2. Be very careful downloading attachments, even from trusted sources. Avoid .exe and .dmg and sometimes even .docx
  3. Stop and think when you feel pressured to act quickly.

Beware of phishing attempts! – Ledger Support Article

Recognize and Avoid Phishing – Trezor Support Article

Post a comment

Leave a Comment

Your email address will not be published.