Best Twitter threads of the day – December 19th by BitlyFool | Posted on December 19, 2022 Binance.US selected as the highest bidder for Voyager 1/ Today, @BinanceUS was selected highest and best bid in Voyager’s reopened bankruptcy asset auction. Once the deal is completed, Voyager users will finally be able to access their digital assets on the https://t.co/Wc26vMosC4 platform.Read: https://t.co/gBK5m3kcYn— Brian Shroder (@BrianShroder) December 19, 2022 2/ We hope our selection brings to an end a painful bankruptcy process which saw customers unfairly dragged into it at no fault of their own. Our goal is simple: return users their cryptocurrency on the fastest timeline possible— Brian Shroder (@BrianShroder) December 19, 2022 3/ Our bid reflects our deeply held belief that customers should come first. Rather than having their assets liquidated for cash, our bid permits users to retain their cryptocurrencies and empowers them to make future decisions on what they want do with THEIR assets.— Brian Shroder (@BrianShroder) December 19, 2022 4/ New to https://t.co/Wc26vM6jnW customers will have access to our suite of products & services, such as ~150 different cryptocurrencies, 300 trading pairs, 5,000+ convert pairs, industry-leading low fees, incl. 0 fee BTC & ETH trading & the largest US on-chain staking platform— Brian Shroder (@BrianShroder) December 19, 2022 5/ At https://t.co/Wc26vM6jnW, we take a customer & compliance first approach to every business decision we make. We're one of the most licensed digital asset exchanges in the country – operating in 46 states & 3 territories – & we NEVER trade or lend our customers’ funds.— Brian Shroder (@BrianShroder) December 19, 2022 6/ We always maintain 1:1 reserves, and are subject to regular audits and regulatory reporting by government entities. We do not offer margin products, undertake proprietary trading, or take on any corporate debt.— Brian Shroder (@BrianShroder) December 19, 2022 7/ https://t.co/Wc26vM6jnW is well capitalized: our assets exceed our liabilities. All of our customers could withdraw their assets tomorrow, which is their right & we would still have hundreds of millions of current assets.— Brian Shroder (@BrianShroder) December 19, 2022 8/ Additionally, we maintain an industry-leading security program to keep customers’ funds protected.Next steps: the asset purchase agreement will be presented to the Bankruptcy Court for approval, then voted upon by Creditors.— Brian Shroder (@BrianShroder) December 19, 2022 9/ We will do everything in our power to speed up the legal and court approval process. Current target, pending court approvals, is to provide users access to their assets in March, 2023.— Brian Shroder (@BrianShroder) December 19, 2022 10/ We remain committed to supporting the growth of the digital asset ecosystem, while building the most customer-centric and compliance-first organization in the industry. We look forward to welcoming Voyager users to the https://t.co/Wc26vM6jnW family soon!— Brian Shroder (@BrianShroder) December 19, 2022 9 security practices to avoid getting your crypto hacked Crypto hackers have stolen $3+ billion in 2022.If you are not careful, you'll be next.This thread shares 9 security practices that everyone should know.— Koroush AK (@KoroushAK) December 19, 2022 There are extra steps you can take beyond this guide.If you already have multisig, virtual machines, 3 identities, your own email servers, a nuclear bunker and a lifetime supply of ramen, then you won’t need this guideFor everyone else let's begin.— Koroush AK (@KoroushAK) December 19, 2022 STEP 1 DEFENCE SOFTWARE1 Built-in security software has come a long way and is a viable option.2 Bitdefender is my preferred choice.3 Hitmanpro.alert has been recommended to me by multiple experts for serious real time protection. (warning very taxing on computer)— Koroush AK (@KoroushAK) December 19, 2022 STEP 2 VPNMost main providers are good enough (nord / express). You can take your privacy even further and try something like Mullvad.— Koroush AK (@KoroushAK) December 19, 2022 STEP 3 CRYPTO STORAGEHardware Wallets (Tier 1) – Ledger, NGRAVE, TrezorPaper Wallet (Tier 2) – Easily lost and damaged. But costs only time.Desktop wallet (Tier 3) – Only as safe as the system they are on. Not Ideal.— Koroush AK (@KoroushAK) December 19, 2022 STEP 4 2FA2FA everything.Cold 2fa Device (Tier 1) – Yubikey or Google TitanCustom 2fa Device (Tier 2) – Cheaper option is to buy a $30 phone, download 2fa, swap it to flight mode foreverNote: 2FA can be circumvented, it is not an absolute defence.— Koroush AK (@KoroushAK) December 19, 2022 STEP 5 SEPARATE COMPUTERSHaving two separate computers is an expensive option so decide if it’s worth the investment relative to the value of your online security and assets.1. High Security Computer2. Low Security Computer— Koroush AK (@KoroushAK) December 19, 2022 High Security ComputerUsed only for handling crypto, banking, trading and other sensitive activities. Do not get windows, it is too vulnerable.Your high security device is never to deviate from essential websites, never to click on any unknown links and never to download.— Koroush AK (@KoroushAK) December 19, 2022 Bookmarking your essential pages and never type in your web addresses you reduce temptation and possibility to click on a link you shouldn’t. All it takes is one mistake to compromise your security.— Koroush AK (@KoroushAK) December 19, 2022 Low Security ComputerFor all other activities, you can use your low security device. There should never be crossover between these two devices.— Koroush AK (@KoroushAK) December 19, 2022 STEP 6 DATA STORAGEThis is where we disproportionately limit the damage a successful hack can do to us. I’m going to share a multilevel system I’ve built for myself.There are two tiers of dataLevel 1 DataLevel 2 Data— Koroush AK (@KoroushAK) December 19, 2022 Level 1 DataTo determine if your data is level 1 ask yourself this. If a hacker had access to this information would they be able to attack me? For example, if a hacker gained access to your private keys they could directly access your cryptocurrency.— Koroush AK (@KoroushAK) December 19, 2022 Other examples are things like passwords for master emails (explained later) that can bypass all other security with the right information, your password manager passwords, private keys or recovery phrases.— Koroush AK (@KoroushAK) December 19, 2022 Rules for level 1 data– Keep offline– Never be stored on your laptop– When entering these passwords you will alternate between using your actual keyboard and an on-screen keyboard– These passwords will be a minimum of 15 keys long and as complex as possible— Koroush AK (@KoroushAK) December 19, 2022 Level 2 DataAny data which on it’s own can not grant the hacker access to any of your funds or important data is considered level 2. This means If a hacker were to gain access to a level 2 password they would still be unable to actually access anything vulnerable.— Koroush AK (@KoroushAK) December 19, 2022 Level 2 DataAny data which on it’s own can not grant the hacker access to any of your funds or important data is considered level 2. This means If a hacker were to gain access to a level 2 password they would still be unable to actually access anything vulnerable.— Koroush AK (@KoroushAK) December 19, 2022 For Level 2 data You can randomly generate by your password manager and should never be typed, always copy and paste from your manager without revealing the password in case you are being watched or key logged.— Koroush AK (@KoroushAK) December 19, 2022 STEP 7 EMAILSOld emails with lacklustre passwords are a common point of entry for hackers. If you’ve had it for a while and used it for multiple websites, chances are you want to get rid of it.You can see if your email is compromised here: https://t.co/aRsNHHPYQN— Koroush AK (@KoroushAK) December 19, 2022 STEP 8 EXCHANGESThere is no 3rd party you should trust with your crypto.Use exchanges to – On ramp and off ramp your crypto– Deposit only what you need to buy/sell then take it off the exchange– Only use reputable exchanges– Only use them on your high security device— Koroush AK (@KoroushAK) December 19, 2022 – Use 2FA– Set a global lock that requires a minimum wait time before settings are changed– Use leverage to reduce counterparty risk– Whitelist your addresses and set a lock on adding new addresses— Koroush AK (@KoroushAK) December 19, 2022 – Use 2FA– Set a global lock that requires a minimum wait time before settings are changed– Use leverage to reduce counterparty risk– Whitelist your addresses and set a lock on adding new addresses— Koroush AK (@KoroushAK) December 19, 2022 How Twitter can become the best social media/news app ? Here’s what needs to happen at Twitter to make it the best social media / news app. Profitable for users and the company (win/win) ?1. Move the company to a jurisdiction that offers solid Internet freedom laws and crypto regulations that are good for users. Not the US.— Kim Dotcom (@KimDotcom) December 19, 2022 2. Uncompromising free speech. If users are not breaking the law they should not be censored / suspended or free speech alternatives will eventually take over and put Twitter out of business. It doesn’t matter what censorship regime government wants, the people will reject it.— Kim Dotcom (@KimDotcom) December 19, 2022 3. Fire everyone who has ever worked in the intelligence community (FBI/NSA/CIA etc.) They are spies for life. They are trained to lie, steal and manipulate. Spies can never be trusted unless they become whistleblowers and expose deep state and Govt crimes / corruption.— Kim Dotcom (@KimDotcom) December 19, 2022 4. Become independent of gatekeepers like Apple and Google. Develop your own open source phone / OS / app store or create a browser app. With developer tools available today you can do everything in browser apps. Or create your own browser (can’t be banned) with Twitter default.— Kim Dotcom (@KimDotcom) December 19, 2022 5. To make money Twitter needs to allow users to create income, crypto integration, decentralized and encrypted hosting for content, live streaming with live chat, communities with real-time crypto gifting for promotions and ads (pay users for their eyeballs). So much potential.— Kim Dotcom (@KimDotcom) December 19, 2022 6. Don’t become a gatekeeper. Let users integrate and share whatever they want. Beat the competition with the best innovations and user experience. You don’t need to build walls if you are the best. To be the best be fast in adopting new ideas. Work with the developer community.— Kim Dotcom (@KimDotcom) December 19, 2022 7. Privacy will become a huge asset for Twitter in the future. Users are becoming more aware of privacy abuses and will pick options that protect them. Don’t sell user data. Encrypt and protect everything so that not even Twitter can access private data like DMs, etc.— Kim Dotcom (@KimDotcom) December 19, 2022 8. Twitter needs a team that understands the threats to Internet freedom and that will act in the best interest of users. They need to be fearless and courageous to stand up against constant demands to silence critical voices. Sorry, but that’s not a job for @lexfridman ?— Kim Dotcom (@KimDotcom) December 19, 2022 9. I recommend that Twitter talks with @snowden and the guys at the Chaos Computer Club in Germany about cleaning up the backdoored Twitter code and to improve security. Elon Musk should remain CEO and do the poll again in a year. When users see results they will get behind him.— Kim Dotcom (@KimDotcom) December 19, 2022 Lastly, I love Twitter. It’s a great source of joy and knowledge. To be frank it’s our best hope to restore the rights that were stolen from us. I think it’s a mistake to lose the guy who risks his business to help us. Elon cares. But he has entered a new domain. Give him time ??— Kim Dotcom (@KimDotcom) December 19, 2022