Blockchain Wallet(Types, Uses, Installation) - Steemit Crypto Academy Season 5 - Homework Post for Task 9.

in hive-108451 •  3 years ago 

Hello guys this is again me and today I am here to solve another question that is-

Q.How do you store/secure your keys? What are the different forms of Private Key(Examples/Screenshot)? Download & Install TronLink Wallet(Android/iOS/Extension)? How do you store the key(Hint- write it down on a notepad, demonstrate it with examples)? Which form of the key are you comfortable with to handle your TronLink Wallet? Include Screenshots & hide/blur the sensitive information.

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPKY2T1QyTsPjEGzw5FmP3WmqVvRcNKkKQshQEzTtpAN1VaNzbkgyKCjcvjDEjVwRpwT63F85LJ (1).png

1.)How do you store/secure your keys?

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPKY2T1QyTsPjEGzw5FmP3WmqVvRcNKkKQshQEzTtpAN1VaNzbkgyKCjcvjDEjVwRpwT63F85LJ (1).png

images (28).jpegsource

The key to every activity during the blockchain is a secret, they are sensitive and without the key user cannot manage anything within the blockchain, make transactions and perform every single optional activity related to the blockchain.

Thus it is important that one should keep his/her keys in a really safe place where he/she wishes to keep it.

Typically once the language is on a blockchain, a new user is given the key that is used to make a transaction and every alternate activity on the blockchain.

The keys square measure sometimes dedicates the size of f to individual keys so that public keys.

Private key: as personal key it suggests that they are unbreakable individual / wherever no one will have access to that personal key class measure e.g. PIN number, signature, then to be unique to 1 clear person on that class measure needed. In the course of a case a third party gains access to your Personal Key which causes your account to be compromised.

Public Key: The common public key continues to play a role as an AN account type for banks and alternative monetary organizations. The general public can suggest receiving or depositing cash, whereas someone with knowledge of your account diversity cannot send you cash, so the public key is publicly measured and trusted by you. Organized by any United Nations agency.

This is similar to Mobile Cash which gives you the variety to send cash to your account when you receive your signaling and PIN, however no one is there to decipher your PIN as it is personal so where can you keep it other than Keep All You can use it to withdraw your cash. Applies to persistent (personal) and public keys.

Knowing the value of the keys, I try to keep it out of reach. I've saved it on my phone's cloud storage wherever I'll be accessing it, I've also saved it on my gmail's draft so I'll be ready to access it anywhere with my phone number I'll open gmail and restart I'll get it from there. Then I also keep it in a hidden and encrypted folder on my PC for safe keeping.

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPKY2T1QyTsPjEGzw5FmP3WmqVvRcNKkKQshQEzTtpAN1VaNzbkgyKCjcvjDEjVwRpwT63F85LJ (1).png

2 .)Which field entity has different key types (example/screenshot)?

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPKY2T1QyTsPjEGzw5FmP3WmqVvRcNKkKQshQEzTtpAN1VaNzbkgyKCjcvjDEjVwRpwT63F85LJ (1).png

A private key also known as a secret key, is a form of cryptography that gives users access to a cryptocurrency.

When we refer to private keys, we are talking about the whole, which includes sub-types such as private keys, mnemonics keys, and key store files.

Each one mentioned above is well explained. The personal secret is a long key made of numbers and letters. The moment the AN account is created, this secret gets created mechanically.

The complexity and length of a non-public secret determine whether a non-public key will be guessed only by a hacker. Once a non-public secret is lengthened, the chances of it being guessed correctly decrease.
A private key will be either even or uneven.

It is used for one-time encoding and coding and disproportionately one-time for encoding and digital signature.

When a non-public secret is even, it serves the latter;

Used to generate a brand new personal key,
Used in the protection of personal keys,
It can also be used for key exchange and management etc.

images (29).jpegsource

When a mystery is asymmetric, it serves the latter used to generate the public and private keys in the try.

It can also be used in protecting private keys and may even be used in key exchange and management. The mnemonic key will usually be referred to as the seed phrase.

It is a set of unencrypted private keys that give users access to a cryptographic account.

Since this secret is not encrypted, it is highly advised that if someone gains access to it, it is different to claiming that you have lost your account and your assets.

This mnemonics secret is composed of twelve, 15, 18, 21 words, which can mechanically create instant AN account.

This 12, 15, 18, twenty one word field unit is derived from a hard and fast vocabulary and additionally has generation order, which is to mention that no one can just predict the words that will match your method key.

Since this secret is unencrypted, it can only be remembered for storage for those maintaining the memory, although I'm going to recommend that it be written and unbreakable safe.

images (5).pngsource

A keystore file, also called a Coordinated Universal Time file, is an encrypted form of a non-public key.

This secret is a byproduct of your personal key and your personal secret. Once your personal key and private secret are combined it becomes a keystore file that can be used to protect your dApp.

images (6).pngsource

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPKY2T1QyTsPjEGzw5FmP3WmqVvRcNKkKQshQEzTtpAN1VaNzbkgyKCjcvjDEjVwRpwT63F85LJ (1).png

3.)Download & Install TronLink Wallet(Android/iOS/Extension)?

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPKY2T1QyTsPjEGzw5FmP3WmqVvRcNKkKQshQEzTtpAN1VaNzbkgyKCjcvjDEjVwRpwT63F85LJ (1).png

Step 1- search on your mobile playstore tron link wallet

Screenshot_2021-11-12-10-07-03-26_b5a5c5cb02ca09c784c5d88160e2ec24.jpg
Then click on first option
Step 2- afterthat you see option so click on install.

Step 3- it's comleted then you see option open

Screenshot_2021-11-12-10-09-46-67_b5a5c5cb02ca09c784c5d88160e2ec24.jpg
Now click on open.

Step 4- afterthat you see this on screen

Screenshot_2021-11-12-10-10-37-46_c564fc6db12409a4b375ae7fc4428dbe.jpg

Click on create account and create account by your email or mobile number I also consider how to create account

Step5- after clicking on create account this tab open so click on accept

Screenshot_2021-11-12-10-15-25-86_c564fc6db12409a4b375ae7fc4428dbe.jpg

Step6- set your user name

Screenshot_2021-11-12-10-16-35-20_c564fc6db12409a4b375ae7fc4428dbe.jpg

Step 7- set password by following conditions

Screenshot_2021-11-12-10-17-39-81_c564fc6db12409a4b375ae7fc4428dbe.jpg

Then your wallet completely installed

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPKY2T1QyTsPjEGzw5FmP3WmqVvRcNKkKQshQEzTtpAN1VaNzbkgyKCjcvjDEjVwRpwT63F85LJ (1).png

4.)How do you store the key(Hint- write it down on a notepad, demonstrate it with examples)?

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPKY2T1QyTsPjEGzw5FmP3WmqVvRcNKkKQshQEzTtpAN1VaNzbkgyKCjcvjDEjVwRpwT63F85LJ (1).png

I store the key in a cold wallet that the associate in nursing does in an offline environment, or in an offline device that the colleague in nursing does, unlike joining a hot wallet that has higher security in case of viruses, cyber attacks or hacking threats, provides.

Internet and are liable for such threats. Cold Wallet Sample Hardware Wallet, Paper Wallet and in fact cold billfold can be a secure billfold that does not connect online.

Right now, I will only discuss the many security measures I personally take in storing keys, and what are they? In fact, I store the key in an offline storage device such as a flash drive, a piece of paper and keep it in a safe or secure place.

In fact, these offline storage devices are hardware wallets that are considered a secure technology to store keys, positive they are resistant to hot wallet-related threats such as viruses, cyberattacks or hacking threats.

The following screenshot may be an example of a method key folded over a pad of paper.

16366930914268035236201816226599.jpg

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPKY2T1QyTsPjEGzw5FmP3WmqVvRcNKkKQshQEzTtpAN1VaNzbkgyKCjcvjDEjVwRpwT63F85LJ (1).png

Conclusion:-

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPKY2T1QyTsPjEGzw5FmP3WmqVvRcNKkKQshQEzTtpAN1VaNzbkgyKCjcvjDEjVwRpwT63F85LJ (1).png

We should always jointly modify it to protect us from fraudsters by securing our keys because it is through those keys that we will be able to access our account.

Your keys are forget or lost, so that your account is vulnerable to mechanical attack as it does not understand who will pick up the key and use it to steal your funds in the account.

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order:  
Loading...

#club5050 😀