Popular Articles

  1. What's the difference between a hot and cold wallet?

    A hot wallet is a type of self-custodial wallet whereby the private keys are stored in some form (usually encrypted) on an internet-connected device. Desktop wallet clients and mobile wallet applications are generally both examples of hot wallets ...
  2. Is it worth filing a lawsuit to try to recovery cryptocurrency losses

    While a lawsuit can be filed against a 'John Doe' with the hopes they can be identified later on, it is important for there to be assets that one can go after if needed
  3. Is it best to store crypto on a hardware wallet?

    Storing cryptocurrency on a hardware wallet is generally regarded as one of the safest and most secure ways to self-custody cryptocurrency so long as the user stores the backup seed phrase in a safe and prudent location
  4. Distinguishing phishing messages warning of technical problems from legitimate technical issues

    A common tactic used by phishing attackers is warn users of an urgent technical issue with their wallet or exchange account that purportedly requires the users' quick action to avoid a loss of funds. In almost all cases, this warning is bogus and...
  5. Do you know any good crypto attorneys that you can recommend?

    Yes, we do. Sometimes it can indeed be helpful to have an attorney that has some basic knowledge of cryptocurrency. We've worked with many attorneys we can recommend. If you are looking for a recommendation or referral to an attorney shoot us an ...
  6. What are the most prevalent crypto scams to be aware of?

    The most common crypto scams we encounter on a day-to-day basis include: 1. Pig Butchering Scams -- Pig butchering scams specifically target users that have little to no knowledge of cryptocurrency. The scammer takes a while to build up rapport a...
  7. Do mixers or privacy coins like Monero reduce recovery prospects

    while it's generally not great news when mixers or privacy coins are utilized by a malicious actor, it's not necessarily a dead end, as such obfuscation efforts can sometimes be defeated.