πŸ”
bloXsafe
  • πŸ•ΈοΈWelcome to bloXbook
  • πŸ“šKnowledge Base
    • 🌏Understanding Blockchain
      • What is a Blockchain?
      • What is a blockchain address?
    • πŸ—οΈUnderstanding Private & Public Keys
      • What is a private key
      • What is a public key?
      • How are Private and Public keys generated?
      • Seed Phrases
        • What is a Seed Phrase?
        • Why to use Seed Phrases
        • How a Seed Phrase works?
        • Types of Seed Phrases
        • The BIP39 Standard
        • Types of Backup
      • Can someone guess my keys?
      • What if I lose my Private Keys or Seed Phrase?
      • What if I lose my public key?
    • 🌱Understanding Send & Receive processes
      • Basic Concept
      • Detailed but Simplified
    • πŸ’°Understanding Wallets
      • What is a Crypto Wallet?
      • Cold vs Hot Wallets
      • Categories of Wallets
      • Why not to use a Hot Wallet?
      • What is a Hardware Wallet?
        • Why Trezor?
        • BitBox02
      • Multi-Sig(nature) Wallets
    • 🧾Understanding Decentralisation & Blockchains.
      • What is Decentralisation in the Blockchain era?
      • Decentralized Network
      • Censorship Resistance and Security
      • Consensus Mechanisms
      • Immutable Ledger
      • Decentralized Applications (dApps)
      • Pros and Cons of a decentralised Blockchain network
      • Pros and Cons of a centralised Blockchain network
      • Hybrid Blockchain Networks
        • Pros and Cons of a hybrid Blockchain network
    • 🧭Understanding Decentralized Autonomous Organizations (DAOs)
    • βš™οΈUnderstanding Decentralised Applications (DApps)?
    • πŸ“”Understanding Smart Contracts
      • Risk associated to Smart Contracts
    • πŸ”What is a Blockchain explorer?
  • πŸ’±Understanding Centralised Exchanges (CEX)
    • Why it's not the best place to be?
    • Mitigating the risk of CEXs
    • Why Proof of Reserves says nothing
    • Key ellement of CEXs
  • πŸ’±Understanding Decentralised Exchanges (DEX)
    • What is a DEX
    • Types of DEXs
    • Risk involved using DEXs
  • Understanding coins & tokens
    • Understanding ERC, BRC, TRC, etc
  • πŸ’²Understanding Stablecoins
    • What is a Stablecoin?
    • Main types of Stablecoins
    • What is the risk involved in stablecoins?
    • Mitigating the risk of stablecoins
  • Understanding DeFi
    • Understanding liquidity pools
    • Understanding lending & borrowing protocols
    • Understanding yield farming
    • Understanding oracles
    • Understanding slippage
    • Understanding how DEXs work
      • Understanding AMMs
      • Understanding order book
      • Understanding aggregators
    • Risk involved using DeFi DAPPs
  • πŸ„β€β™€οΈStaying Safe
    • Safety
    • Security
    • Privacy
  • Recommendations
    • Recommended Practises
      • First thing to do after you setup your wallet
      • Using VPN Kill Switch
      • Software Updates
    • Recommended Software
      • Wallet Clients
        • Frame Wallet
        • Trezor Suite
        • Metamask
      • Password Managers & 2FA clients
        • Bitwarden
        • KeePass2.x
      • OS
        • Arch Linux
        • Windows without the Bloatware
    • Recommended Services
      • DNS Services
        • Quad9 DNS
        • Mullvad DNS
      • VPN Services
        • Proton VPN
        • Mullvad VPN
      • Mail Sevices
        • Protonmail
        • Tutanota
    • Recommended Hardware
      • Trezor hardware wallet
      • VPN compatible routers
  • How to
    • Transfer funds
    • Trade on DEX
    • Check my balance
  • πŸ‘©β€πŸš€Common Misconceptions
    • Where my coins are stored?
    • Are all Blockchains decentralised?
    • Crypto is a scam
  • ⁉️Answering the most common questions
    • What is FIAT money?
    • What is a commodity?
    • What is blockchain and why is it important?
    • What is Bitcoin and how does it work?
    • How do I buy Bitcoin?
    • Is Bitcoin the only cryptocurrency?
    • What is a wallet and how do I get one?
    • How do I keep my cryptocurrency safe?
    • Can I make money with cryptocurrency?
    • How do I sell cryptocurrency and convert it back to cash?
    • Are there any risks associated with cryptocurrencies?
    • What are altcoins and how do they differ from Bitcoin?
    • How can I learn more about cryptocurrency and blockchain technology?
    • My wallet shows 0 balance! Are my funds lost?
    • What is the KISS concept?
      • Professional Context
Powered by GitBook
On this page

Was this helpful?

  1. Understanding Centralised Exchanges (CEX)

Mitigating the risk of CEXs

PreviousWhy it's not the best place to be?NextWhy Proof of Reserves says nothing

Last updated 11 months ago

Was this helpful?

Below you'll find strategies for mitigating the risks of CEXs and safeguarding your funds when using centralized exchanges.

  1. Utilize Two-Factor Authentication (2FA):

    One of the most basic yet effective security measures you can implement on centralized exchanges is two-factor authentication (2FA). By enabling 2FA, you add an extra layer of protection to your account, requiring not only a password but also a secondary form of verification, such as a code sent to your mobile device. This helps prevent unauthorized access to your account, even if your password is compromised.

  2. Choose Strong and Unique Passwords:

    Ensuring that you use strong, unique passwords for each exchange account is crucial for protecting your funds. Avoid using easily guessable passwords and consider using a reputable password manager to generate and store complex passwords securely. By using different passwords for each account, you reduce the risk of multiple accounts being compromised in the event of a security breach.

  3. Regularly Monitor Account Activity:

    Keep an eye out for unauthorized logins, unexpected withdrawals, or unfamiliar changes to your account settings. Most exchanges offer activity logs or notifications that can help you stay informed about account activity in real-time. Reporting any suspicious activity to the exchange immediately can help mitigate potential losses.

  4. Withdraw Funds to Personal Wallets:

    While it may be convenient to keep your funds on the exchange for trading purposes, it is strongly recommended to withdrawing them to a personal wallet when not actively trading. Personal wallets, especially or solutions, offer enhanced security by allowing you to control your offline. This reduces the risk of loss in the event of exchange hacks or insolvency.

  5. Diversify Across Exchanges:

    Avoid keeping all your funds on a single centralized exchange. Instead, consider diversifying your holdings across multiple platforms. This reduces your exposure to any single exchange's risks and mitigates the impact of potential disruptions or failures. Research and choose reputable exchanges with a strong track record of security and reliability.

  6. Stay Informed About Regulatory Developments:

    Keep abreast of regulatory developments and compliance requirements in the jurisdictions where your chosen exchanges operate. Understanding the regulatory landscape can help you assess the risks associated with using specific exchanges and make informed decisions about where to trade and store your funds. Be prepared to adapt to changing regulations to ensure compliance and protect your assets.

  7. Participate in Insurance Programs:

    Some centralized exchanges offer insurance programs to protect users' funds in the event of a security breach or loss. While these programs may come with certain limitations and conditions, they can provide an additional layer of protection and peace of mind for users. Consider opting into such programs where available to mitigate potential losses.

To minimize the risk of using CEXs, the best strategy is to only use a centralized exchange when you want to execute trades. That simply means:

  1. deposit funds right before you want to make a trade.

  2. execute your trade.

  3. withdraw your funds asap to your personal (preferably a ).

Remember that the security of your funds ultimately lies in your hands, so always prioritize diligence and caution when using centralized exchanges.

πŸ’±
hardware wallets
cold storage
private keys
wallet
hardware wallet