Web3 Wallet Security: 15 Tips to Protect Your Crypto From Theft
In DeFi, you are your own bank. That is incredibly powerful — and incredibly dangerous if you do not take security seriously.
Crypto theft is almost always preventable. The vast majority of losses come from a handful of attack vectors that you can defend against with the right habits and tools. This guide covers 15 essential practices that every DeFi user should follow.
Understanding the Threat Landscape
Before the tips, it helps to understand how crypto gets stolen:
- Phishing (most common): Fake websites, emails, or messages that trick you into signing malicious transactions or revealing your seed phrase
- Malicious approvals: Signing a token approval that grants unlimited access to a malicious contract
- Social engineering: Scammers posing as support agents, team members, or friends
- Malware: Keyloggers, clipboard hijackers, and browser extensions that steal private keys
- Physical theft: Someone gaining access to your seed phrase or hardware wallet
Notice what is not on this list: sophisticated blockchain hacking. Most crypto theft targets the human, not the technology. Your behavior is your best defense.
The 15 Essential Security Tips
1. Never Share Your Seed Phrase — With Anyone, Ever
This is rule number one and it is absolute. Your seed phrase (the 12 or 24 words you received when creating your wallet) is the master key to your funds. Anyone who has it controls your wallet completely.
No legitimate service, protocol, team member, or support agent will ever ask for your seed phrase. If someone does, they are trying to rob you. Full stop.
This includes:
- "Support agents" in Discord or Telegram
- "Wallet verification" websites
- "Synchronization" tools
- "Recovery services" that ask for your phrase
2. Store Your Seed Phrase Offline
Never store your seed phrase digitally — not in a notes app, not in a screenshot, not in cloud storage, not in an email to yourself.
Recommended storage:
- Write it on paper and store in a fireproof safe
- Stamp it on a metal plate (survives fire and water)
- Split it across multiple secure locations using a scheme like Shamir's Secret Sharing
Multiple copies in separate locations protect against physical loss (fire, flood, theft of one location).
3. Use a Hardware Wallet for Significant Holdings
If you hold more than you would be comfortable losing, a hardware wallet is non-negotiable. Devices like Ledger and Trezor store your private keys offline, meaning they cannot be extracted even if your computer is compromised.
Use your hardware wallet as your "vault" and keep only working capital in your hot wallet for daily DeFi activity.
4. Use a Dedicated Browser Profile for DeFi
Create a separate browser profile exclusively for crypto. Install only your wallet extension in that profile. No other extensions, no casual browsing, no email.
This isolates your wallet from:
- Malicious browser extensions that can read page content
- Phishing sites you might visit while browsing normally
- Cross-site tracking and targeting
5. Bookmark Every DeFi Site You Use
Phishing sites look identical to real ones. The URL might differ by a single character — uniswap.org vs uniiswap.org or use a different TLD.
Always navigate to DeFi sites from your bookmarks. Never click links in:
- Discord messages
- Telegram groups
- Twitter/X ads or replies
- Emails
- Google search ads (scammers regularly purchase ads for fake DeFi sites)
6. Verify Before You Sign
Your wallet shows you what you are signing. Read it. Every time.
Safe signatures:
- Token swaps with expected amounts
- Token approvals for specific amounts to known contracts
- Network-specific actions you initiated
Dangerous signatures:
eth_sign— this is a blank check. Modern wallets warn you about this. Never approve it.- Approvals for unlimited token amounts to unknown contracts
- Permit signatures you did not expect
- Any signature request from a site you did not intentionally visit
When in doubt, reject the signature and research before proceeding.
7. Manage Token Approvals Actively
Every time you use a DEX or DeFi protocol, you grant it permission (an "approval") to spend your tokens. These approvals often persist indefinitely.
The risk: If the approved contract is compromised or was malicious, it can drain the approved tokens from your wallet at any time.
The fix:
- Use tools like Revoke.cash to review and revoke active approvals
- When possible, approve only the exact amount you need (not unlimited)
- Schedule monthly approval reviews — think of it as digital hygiene
- After interacting with a new or untested protocol, revoke the approval immediately
8. Use the Burner Wallet Strategy
Maintain separate wallets for different risk levels:
- Vault wallet (hardware): Long-term holdings. Rarely connects to any dApp.
- Primary wallet: Your main DeFi wallet for established protocols like Otomate on Ink Chain.
- Burner wallet: For interacting with new protocols, claiming airdrops, minting NFTs, and anything unverified.
If your burner wallet gets compromised, you lose a small amount instead of everything. Transfer profits from your burner to your primary or vault wallets regularly.
9. Enable All Available Security Features
For hot wallets:
- Use a strong, unique password
- Enable biometric authentication on mobile wallets
- Keep the wallet software updated
For hardware wallets:
- Set a strong PIN
- Consider using a passphrase (25th word) for additional security
- Keep firmware updated
For exchange accounts (on/off ramp):
- Enable 2FA with an authenticator app (not SMS — SIM swaps are common)
- Use a hardware security key (YubiKey) if supported
- Set up withdrawal address whitelists
- Enable withdrawal delay features
10. Be Skeptical of DMs — Always
In crypto, unsolicited DMs are malicious until proven otherwise. This applies to:
- Discord: "Support" bots, team member impersonators
- Telegram: "Admin" accounts, trading signal scammers
- Twitter/X: Reply scammers, giveaway bots
- Email: Fake security alerts, phishing links
Real teams virtually never DM you first. If someone claiming to be from a project contacts you, verify through official channels before engaging.
11. Secure Your Email and Phone
Your email and phone number are often the weak links in your security chain. A compromised email can lead to:
- Reset of exchange passwords
- Access to cloud storage containing sensitive information
- Social engineering attacks on other accounts
Protect them:
- Use a unique, strong password for your crypto-related email
- Enable 2FA on your email account
- Consider a dedicated email for crypto (not your personal email)
- Be aware of SIM swap attacks — consider using an eSIM or a Google Voice number for 2FA
12. Keep Your Software Updated
Outdated software has known vulnerabilities. Keep everything updated:
- Operating system
- Browser
- Wallet extensions and apps
- Hardware wallet firmware
- Antivirus/security software
Set automatic updates where possible. Delays in updating have led to many preventable compromises.
13. Verify Contract Addresses Independently
Before interacting with any token or contract:
- Find the contract address from the project's official website or documentation
- Verify it on a block explorer
- Check that the contract is verified (source code published)
- Cross-reference on aggregators like CoinGecko or CoinMarketCap
Scammers create tokens with identical names and symbols to legitimate projects. The contract address is the only reliable identifier.
14. Be Careful With Airdropped Tokens
If tokens appear in your wallet that you did not buy or earn, they might be bait. Common tactics:
- Dust attacks: Small amounts of tokens sent to your wallet to track your activity
- Honeypot tokens: Tokens you can receive but not sell, designed to get you to interact with a malicious contract
- Fake airdrop claims: Websites that ask you to "claim" airdropped tokens by connecting your wallet and signing a malicious transaction
Rule: If you did not expect it, do not interact with it. Do not try to sell mystery tokens. Do not visit websites linked in token names or transaction data.
15. Have an Incident Response Plan
Despite all precautions, incidents can happen. Have a plan ready:
If you suspect your wallet is compromised:
- Immediately transfer remaining assets to a different, secure wallet
- Revoke all token approvals on the compromised wallet
- Do not reuse the compromised seed phrase — create a fresh wallet
- Investigate how the compromise happened to prevent a repeat
If you signed a suspicious transaction:
- Check what approvals were granted using Revoke.cash
- Revoke any approvals you did not intend to grant
- Move assets to a fresh wallet if significant approvals were granted
Keep a "go bag" ready: A hardware wallet with a fresh seed phrase, ready to receive emergency transfers. When time matters, you do not want to be setting up a new wallet.
Security and Non-Custodial Platforms
One of the core advantages of non-custodial platforms is that security is largely in your hands. When you use Otomate on Ink Chain, your assets remain in your wallet — interacting with Nado Protocol's smart contracts for perpetual futures or 0x for spot swaps, but never held by a centralized entity.
This means:
- No exchange hack can drain your funds
- No company insolvency puts your assets at risk
- Your security practices directly determine your safety
The tradeoff is responsibility. Non-custodial means you are in control — and that means the practices in this guide are not optional.
The Security Mindset
Crypto security is not a one-time setup. It is an ongoing practice. The threat landscape evolves — new phishing techniques, new social engineering tactics, new malware variants appear constantly.
Stay paranoid. Verify everything. Trust no one who contacts you unsolicited. And remember: the few minutes you spend being careful with each transaction could save you from a loss that is irreversible.
Your crypto is only as safe as your habits.
Otomate is non-custodial by design — your keys, your control. Don't trade. Automate. Secure your future on Ink Chain