The Seal of Approval: Know What You’re Consenting To With Permissions and Approvals in MetaMaskOne of the hallmarks of Web3 is providing users with full control over privacy and how they interact with its platforms. Learn how to manage approvals and permissions in MetaMask.
Spoofing, Sweepers, and Clipboard Hacks: How To Stay Safe From ScamsHere are the key principles for protecting your crypto.
What’s In A Self-Custody (Non-Custodial) Wallet, Anyway?This is the first installment in a series of posts designed to explain the world of Web3 and orient users as to how to use Web3 dapps — safely. We’ll be covering topics ranging from the technical to the humorous. Follow along and you’ll be a savvy, safe MetaMask power user in no time.
The Importance of a Multi-Layered Smart Contract Security StrategyAs a smart contract developer, you want to minimize risk and maximize productivity. Using these layers will minimize your risk of being hacked from the beginning of your smart contract development by identifying and solving issues as soon as they are detected.
To Be Your Own Bank With MetaMask, You Need To Master These Password Best PracticesThe first step to using MetaMask is to secure your secret seed phrase. Never share your secret seed phrase, and become a security ninja.
Security Challenges for Enterprise Blockchain SolutionsTips to easily build secure and reliable applications on the Ethereum blockchain.
How to Avoid Uploading Your Private Key to GitHub: Approaches to Prevent Making Your Secrets PublicKeep your private keys and API secrets safe while developing smart contracts