ShieldGuard protection

Fortify Your Assets: ShieldGuard Learn’s Protection Toolkit

Welcome to ShieldGuard Protection, an integral part of ShieldGuard Learn, and your essential guide to navigating the cryptocurrency landscape with confidence and peace of mind. At ShieldGuard Protocol, our core mission is to empower you with the tools and knowledge needed for a secure crypto journey, ensuring the safety of your valuable digital assets.

SHIELDGUARD protection

We understand that security is paramount in the blockchain world. We’re proud to introduce a curated selection of leading third-party security products and services, forged through strategic partnerships. From robust hardware wallets to advanced online threat detection tools, we bring you trusted solutions designed to fortify your defenses.

Looking ahead, our commitment to your safety deepens. Once our ShieldGuard Incubator is fully operational, we plan to develop and launch our own suite of innovative, in-house security applications and products, further enhancing your protection within the crypto ecosystem.

Explore the resources below and take control of your digital security with ShieldGuard Protocol by your side.

🔐 ShieldGuard Security — Protect Every Step of Your Crypto Journey

Scams and hacks don’t just target your wallet — they exploit weak links across apps, social platforms, emails, and even devices.
Stay one step ahead. Learn how to secure your assets, accounts, and devices with ShieldGuard’s trusted guidelines.

View Security Guidelines

🔐ShieldGuard Security — Strengthen Your PC with Trusted Antivirus

Your PC is the gateway to your crypto and a top target for hackers.A weak or unprotected computer can expose Chrome wallets, emails, and messaging apps to malware and remote attacks.
A trusted antivirus adds a vital shield, blocking threats before they strike.

Buy Antivirus Software's

🔐 ShieldGuard Security — Protect Your Assets with Hardware Wallets

Your crypto is only as safe as the device that holds your keys.Hot wallets provide convenience but come with significantly weaker security.
With hardware wallets, you gain offline protection that keeps your assets safe from phishing, malware, and online hacks.

Buy Hardware Wallets

🔐 ShieldGuard Security — Safeguard Your Keys with a Seed Board

Paper backups can burn, tear, or fade  but your seed phrase deserves stronger protection. The Seed Board is built from durable stainless steel, keeping your recovery phrase safe from fire, water etc
Secure your keys for the long term with hardware built to last.

Buy Seed Boards

Hardware Wallets

The smartest choice when securing your crypto is using a hardware wallet that stores private keys offline, making them independent of third parties and resistant to online threats. Software wallets store private keys on systems that are connected to the internet, making them susceptible to all kinds of attacks.

A hardware wallet secures your crypto by storing your private key within a Secure Element. Hardware wallets prevent physical extraction of the private key and require physical transaction approval, minimizing crypto assets exposure from vulnerable online environments like smartphones or computers and minimizing exposure to malware and other threats.

Physically secure your transactions with Ledger crypto wallets

Buy Ledger Hardware Wallets now

The smartest choice when securing your crypto is using a hardware wallet that stores private keys offline, making them independent of third parties and resistant to online threats. Software wallets store private keys on systems that are connected to the internet, making them susceptible to all kinds of attacks.

Manage unlimited tokens, all in ONE device

Supporting 200+ blockchains and all their tokens, with constant additions
Unlimited storage amount for cryptocurrencies
Add and remove tokens as you like
On-board new tokens via firmware upgrade

100% air-gapped signing mechanism, fully offline cold-storage device

Buy SafePal Hardware Wallets now

Seed Boards

Why Use SafePal Seed Board?
SafePal Seed boards are metal backup tools designed to protect your wallet’s recovery phrase against damage and loss. Unlike paper, SafePal seed boards are fireproof, waterproof, and resistant to corrosion — giving you a permanent safeguard for your keys.

✅ Key Benefits

Fire & Water Resistant – Protects seed phrases from natural disasters.

Durable Stainless Steel – Long-lasting protection that won’t wear out.

Tamper-Proof – Keeps your backup safe from accidental loss or damage.

Universal Compatibility – Works with most wallets and recovery phrase formats.

👉 SafePal secure seed board ensures your crypto recovery keys stay safe for a lifetime.

Buy SafePal Seed Boards

Antivirus Software's

1.Malwarebytes

Powerful malware and ransomware protection with lightweight performance. Ideal for keeping your PC and crypto wallets secure.

AI-powered, superior security

Halt hackers by shielding your device from viruses, ransomware, Trojans, botnets, spyware, and more.

Robust scam protection

Shut down robocalls, scam texts, phishing attempts, and dangerous decoy websites.

Lightweight and intuitive

Secure your device without compromising speed. Boost browsing by up to 4x. All with our easy-to-use dashboard.

Here for you, always

Get expert guidance with tailored security assessments, 24/7 human support, 60-day money-back guarantee.

👉 Get Malwarebytes

Security Guidelines

 

🔐 ShieldGuard — Hot Wallet Security Checklist

⚠️ Warning:
Hot wallets (browser extensions, mobile wallets, web wallets) provide convenience but come with significantly weaker security compared to hardware wallets.
ShieldGuard does not recommend storing large amounts of assets in hot wallets.

However, if you must use a hot wallet for trading or daily transactions, follow these security tips to reduce risks:

✅ Best Practices for Hot Wallet Security

Use Strong Authentication

Always enable 2FA (Google Authenticator, Authy, or hardware-based 2FA).

Avoid SMS-based 2FA.

Keep Software Updated

Regularly update wallet apps, browser extensions, and operating system.

Outdated software is the #1 entry point for hacks.

Beware of Phishing Links

Only download wallets from official sites/app stores.

Double-check URLs before entering private keys or seed phrases.

Never Share Your Seed Phrase

Store your seed phrase securely offline (paper or encrypted cold storage).

Never save it in cloud storage, email, or screenshots.

Limit Wallet Exposure

Use hot wallets only for small, daily-use funds.

Keep your main holdings in a hardware wallet.

Secure Your Devices

Use antivirus, firewall, and strong device passwords.

Avoid public Wi-Fi when accessing wallets.


🛡️ At ShieldGuard, we believe in empowering users with secure practices.
🔒 For maximum safety, always prioritize cold storage solutions (hardware wallets).


 

🛡️ ShieldGuard — Hardware Wallet Security Checklist

1. Wallet Setup

Buy hardware wallets only from official vendors.

Generate your seed phrase offline on the device.

Write your seed on metal backup plates (avoid photos, screenshots, or storing on cloud).

Use a strong PIN and, if supported, add an extra passphrase (25th word).


2. Device & App Safety

Always confirm transaction details on the hardware device screen before approving.

Keep wallet firmware and apps updated via official channels only.

Never enter your seed phrase on websites, apps, or computers.


3. Safe Internet Practices

Bookmark official exchange/dApp URLs; never click unknown links.

Verify contract addresses on trusted explorers (Etherscan, BscScan).

Use a dedicated browser or phone for crypto activities.

Enable 2FA (Authenticator app, not SMS) on exchanges and wallets.


4. Approval & Interaction Hygiene

Avoid “unlimited approvals” when using DeFi dApps.

Regularly review and revoke old token approvals using trusted tools (e.g., revoke.cash).

Only interact with audited or well-reviewed projects.


5. Backup & Recovery

Store seed backups in two safe locations (fireproof safe, safety deposit box).

Test your recovery process with a spare device before holding large amounts.

Inform one trusted family member about how to recover funds in case of emergency.


6. Everyday Habits

Never share private keys, 2FA codes, or seed phrases — not even with “support teams.”

Double-check wallet addresses — use QR codes or verified address books.

Avoid public Wi-Fi when transacting; use VPN if needed.

Don’t keep large amounts on hot wallets or exchanges — use hardware wallet storage.


7. Incident Response (If You Suspect Compromise)

Disconnect immediately — stop all activity on the device.

Move remaining funds to a new hardware wallet with a fresh seed.

Revoke token approvals via reputable tools.

Change all related account passwords (email, exchange, 2FA).

Keep transaction hashes/screenshots for record-keeping.


8. Quick 7-Point User Checklist (for daily reminders)

✅ Use a hardware wallet for savings
✅ Seed phrase offline, never digital
✅ 2FA on all accounts
✅ Bookmark trusted URLs
✅ Revoke unused approvals
✅ Avoid public Wi-Fi for transactions
✅ Test recovery before trusting device


🛡️ ShieldGuard Security Guideline

Revoking Approvals Made Earlier in EVM Wallets


🔎 Why approvals matter

When you connect your wallet to a dApp, you often grant it permission (an approval) to spend or interact with your tokens. These approvals are stored permanently on-chain until you revoke them.

If left unchecked, scammers can exploit old or unlimited approvals by hacking or abusing the connected smart contracts — potentially draining your funds, even if you no longer use that dApp.

That’s why regularly reviewing and revoking unused approvals is a critical security practice.


🛠️ Types of approvals

There are generally two categories of approvals in EVM-based wallets:

  1. By Contracts – Approvals you granted to specific smart contracts (e.g., DEX, NFT marketplace, lending protocol).
  2. By Assets – Token-level approvals allowing dApps to spend a specific token (e.g., USDT, SHPRO, ETH).            Both types can be abused if left active.

🚨 The risks of unused approvals

  • Hacked dApps or contracts → If a protocol you once trusted is compromised, attackers can use your old approvals.
  • Rug pulls & exploits → Malicious developers may design contracts that exploit broad token approvals.
  • Forgotten connections → Even if you no longer use a dApp, its approvals may still be active forever.

👉 Revoking approvals reduces your attack surface and protects your wallet.


✅ How to revoke approvals

We recommend using Rabby Wallet for managing and revoking approvals. Rabby provides a clean, user-friendly interface to view all your past approvals across different tokens and contracts.

Steps:

  1. Open Rabby Wallet and go to the Approval Management section.
  2. Review the list of contract approvals and asset approvals.
  3. Identify those you no longer use or trust.
  4. Revoke them with one click.
  5. Confirm the transaction in your wallet.

⛽ Gas & cost considerations

  • Revoking costs gas on the chain (ETH gas on Ethereum; BNB gas on BSC; etc.).
  • Batching saves money → Most UI tools revoke one approval per transaction, but Rabby Wallet supports batch revokes, letting you revoke multiple approvals in a single transaction. This saves both time and fees.
  • Timing matters → If possible, revoke during off-peak hours to pay lower gas.

🛡️ ShieldGuard Recommendation

  • Audit your approvals at least once every 2–3 weeks, or after using new dApps.
  • Always revoke approvals for projects you no longer trust or use.
  • Use Rabby Wallet’s batch revoke to efficiently clean your wallet in one go.

By staying proactive, you minimize attack risks and ensure your funds remain safe.


🔗 Stay protected with ShieldGuard Protocol — because prevention is stronger than recovery.

🔒ShieldGuard Learn — Security Guideline

Protecting Yourself from Telegram-Based Hacks

Context
The THORChain founder’s $1.2M wallet hack started with a compromised Telegram account belonging to a trusted friend. A malicious Zoom link delivered through Telegram triggered the attack, leading to drained funds. Similarly, ShieldGuard’s Co-Founder and CEOAjayakumar K, faced a hacking attempt where a fraudster (posing as a VC) sent a fake Zoom link that attempted to install remote control software and keyloggers. Thankfully, he identified and reported the attempt in time.

These cases highlight a serious reality: Telegram has become a primary hunting ground for scammers, many of whom operate systematically, launching impersonation, malware, and social engineering attacks. Their goal is not just your crypto wallet, they target your entire wealth, including bank accounts and sensitive personal data.

If you are using Telegram for communication in crypto, you must assume you are a potential target.


🔒 ShieldGuard Telegram Security Guidelines

Follow these mandatory security practices to secure your account:

1. Account Privacy & Identity Protection

  • Hide your phone number from everyone (Settings → Privacy and Security → Phone Number).
  • Disable calls (both audio and video) unless from trusted contacts.
  • Prevent strangers from adding you to groups or channels.
  • Disable forwarded messages so your identity cannot be traced via forwarded content.

2. Authentication & Device Security

  • Set a strong password for your Telegram account in addition to your SMS login.
  • Enable Two-Factor Authentication (2FA) (Settings → Privacy and Security → Two-Step Verification).
  • Create a local passcode lock for your Telegram app to prevent device-level hijacking.
  • Regularly check active sessions (Settings → Devices) and immediately terminate all unknown sessions.
  • Always log out from public or shared devices.

3. Data & Information Protection

  • Clear payment and shipping info from your account to avoid leakage.
  • Never click on suspicious links (Zoom, Google Docs, airdrop forms, etc.) even if they appear to come from a trusted contact.
  • Do not connect third-party websites or bots to your Telegram unless they are verified and absolutely necessary.
  • Disable “Suggest Frequent Contacts” to reduce exposure to impersonation attempts.

4. Proactive Measures

  • Subscribe to Telegram Premium for added security features and advanced privacy options.
  • Regularly update the app from official app stores to patch vulnerabilities.
  • Report suspicious accounts and block them immediately.
  • Use multiple communication channels for sensitive discussions (do not rely on Telegram alone).

5. ShieldGuard Critical Recommendation

  • Treat any link shared via Telegram as potentially malicious. Verify directly with the sender through another channel before clicking.
  • Keep crypto wallets (especially mobile hot wallets) separate from your Telegram device. Avoid storing significant assets on the same phone you use for Telegram.
  • For funds over $1,000, always move assets to a hardware wallet (cold storage).

⚠️ Final Note

Telegram is a powerful tool for crypto communities but is also exploited by professional scam networks. Protecting yourself requires strict privacy settings, disciplined security hygiene, and the use of hardware wallets.

This guideline is prepared under ShieldGuard Learn:ShieldGuard Protection and Scam Prevention & Education.

🔐Save Your Crypto Assets from PC-Based Hacks

📌 Why PC Security Matters

Many investors use Chrome-based wallet extensions (like MetaMask, Trust Wallet, etc.) to store and manage their crypto assets. While convenient, these wallets can become highly vulnerable if your PC security is weak. A compromised PC can give hackers direct access to your private keys, seed phrases, and wallet connections — leading to irreversible asset theft.


⚠️ How Hackers Exploit a Weak PC

  1. Malware & Keyloggers – Malicious software records your keystrokes to steal seed phrases and passwords.
  2. Phishing via Email – Clicking on infected attachments or links can install backdoors for hackers.
  3. Telegram Desktop Risks – Malicious files or links received in Telegram can infect your PC.
  4. WhatsApp Connectivity – Fake files, cracked software, or phishing links shared via WhatsApp Web/Desktop can be exploited.
  5. Browser Exploits – Outdated Chrome or extensions may be hijacked, giving hackers control over wallet activity.

🔐 Safety Measures for a Secure PC

  • Use Updated Software – Keep your OS, Chrome browser, and wallet extensions always updated.
  • Install Trusted Antivirus/Anti-Malware – Regular scans can detect and remove hidden threats.
  • Email Hygiene – Never open suspicious attachments or click unknown links.
  • Secure Messaging Apps – Avoid downloading unknown files from Telegram Desktop or WhatsApp.
  • Dedicated Browser/User Profile – Use a separate Chrome profile or dedicated browser only for crypto wallets.
  • Disable Auto-Connect – Turn off auto-login and auto-connect features in wallet extensions.
  • Strong Authentication – Use hardware wallets wherever possible, and enable 2FA for exchange logins.
  • Regular Backups – Store encrypted backups of your seed phrases offline (never on your PC).

✅ Final Note from ShieldGuard

Your PC is the first line of defense for your crypto assets. Hackers often don’t need to attack blockchains directly, they target weak devices. By securing your computer, practicing safe browsing, and avoiding risky email or messaging app behavior, you can significantly reduce the chances of losing funds through Chrome-based wallet hacks.

🔗 Stay informed with ShieldGuard Learn → ShieldGuard Protection. Knowledge is your shield!

🛡️  Security Guidelines: Protect Your X (Twitter) Account

X (Twitter) is a prime target for hackers who use DM-based social engineering, phishing links, and impersonation to steal wallets and personal data.

Follow these steps to stay safe 👇


🔐 1. Enable Strong Authentication

  • Use 2FA with an authenticator app (avoid SMS).
  • Create a unique, strong password.

📥 2. Be Cautious with DMs

  • Don’t trust unsolicited DMs — hackers impersonate admins/influence
  • Never share seed phrases or wallet details.

🌐 3. Avoid Malicious Links

  • Double-check URLs & bookmark official sites.
  • Beware of fake domains like “shíeldguard.io”.

👤 4. Protect Your Personal Data

  • Don’t overshare details publicly.
  • Keep wallets & social accounts separate.

🚨 5. Stay Alert

  • Most hacks on X happen via social engineering in DMs.
  • If it looks too good to be true, it is.

✅ Stay safe with ShieldGuard.
💡 Education is your true defense.

🛡️ ShieldGuard Protection Guideline

Saving Yourself from Email Attacks

Email remains one of the most common entry points for cybercriminals. Phishing, malware attachments, spoofing, and credential theft are widely used tactics to steal money, data, or access. ShieldGuard Protection outlines the key steps every user must follow to stay safe.

1️ Understanding Email Threats

Phishing Emails → Fake emails that trick you into clicking malicious links or sharing credentials.
Spoofed Addresses → Attackers disguise their email to appear like it’s from a trusted source (e.g., your bank).
Malware Attachments → Infected files sent as invoices, reports, or PDFs that install keyloggers or ransomware.
Business Email Compromise (BEC) → Hackers impersonate company executives to request urgent money transfers.

2️ Best Practices to Avoid Phishing & Email Hacks
🔒 Verify the Sender
Always check the sender’s email domain carefully (e.g., @bank.com vs. @bánk.co).
Hover over links before clicking to reveal the actual URL.
🚫 Don’t Trust Urgent Calls-to-Action
Be skeptical of emails that say: “Your account will be suspended,” “Pay immediately,” or “Confirm your password now.”
Attackers create panic to force quick action.
📎 Beware of Attachments
Never download attachments from unknown senders.
If it’s from a colleague but looks unusual → call them to verify.
🔐 Enable Two-Factor Authentication (2FA)
Protect your email account with 2FA (Google Authenticator, Authy, YubiKey).
Even if your password is stolen, hackers can’t log in without the second factor.
🛡️ Use Email Security Tools
Activate spam filters and phishing detection in Gmail, Outlook, or your email provider.
Use anti-malware and anti-virus software with email scanning.
🔑 Strong Password Hygiene
Use unique, complex passwords for your email.
Never reuse your email password on multiple platforms.
Store credentials in a password manager (e.g., Bitwarden, 1Password).

3️ Advanced Protections
Email Encryption → Use PGP/GPG or end-to-end encrypted providers (ProtonMail, Tutanota).
Custom Domain Security → If you run a project, enable SPF, DKIM, and DMARC records to protect users from spoofing.
Security Awareness Training → Regularly train team members to spot phishing and verify suspicious messages.

4️⃣ What To Do If You Suspect an Email Hack
Immediately change your password and enable 2FA.
Log out of all devices from account settings.
Scan your system for malware.
Report phishing emails to your provider (e.g., Gmail → “Report phishing”).
Inform your network if hackers could impersonate you.

ShieldGuard Takeaway:
Your email is the front door to your digital life. By practicing vigilance, using strong authentication, and avoiding suspicious links or attachments, you can shield yourself from most email-based scams.

🛡️ ShieldGuard Learn — Security Guideline

Protecting Yourself from Malicious Token Scams & Dusting Attacks

Context

In the Web3 space, a new and dangerous scam involves attackers sending small, unwanted amounts of tokens (often called “dust”) to your wallet. These aren’t just annoying; they can be highly malicious. Simply interacting with such tokens, or worse, granting them an “approval” can give scammers access to your wallet, allowing them to drain your legitimate assets.1 They achieve this by embedding malicious code in the token contract or leveraging broad token allowances you might unknowingly grant.

This report outlines how to identify and prevent these insidious attacks, ensuring your wallet remains secure.


🔒 ShieldGuard Malicious Token Security Guidelines

Follow these mandatory security practices to protect your crypto assets:

1. Understand the Threat: What Are Malicious Tokens?

  • Dusting Attacks: Attackers send tiny amounts of tokens to thousands of wallets. The goal isn’t the dust itself, but to identify active wallets or create an opportunity for interaction.
  • Malicious Contracts: Some tokens are designed with backdoors or exploits. Interacting with them (e.g., trying to swap, sell, or even just approving them) can trigger the malicious code.
  • Broad Approvals: When you approve a token for spending by a dApp, you might unknowingly grant permission for an unlimited amount.2 If that token or the dApp becomes compromised, your funds are at risk.

2. Golden Rule: Do NOT Interact with Unknown Tokens!

  • Ignore the Dust: If you receive small amounts of unexpected tokens (especially unknown or meme coins) in your wallet, DO NOT INTERACT WITH THEM.3 Do not attempt to sell, swap, or move them.
  • Leave Them Alone: The safest action is to simply leave these tokens untouched. They are usually harmless as long as you don’t approve their contract or initiate a transaction with them.
  • Hide, Don’t Interact: Most wallets allow you to “hide” or “disable” display for unwanted tokens. Use this feature instead of trying to move or sell them.

3. Vigilance with Token Approvals

  • Understand Approvals: When you use a dApp (like a DEX or NFT marketplace), you often grant it permission to “spend” your tokens on your behalf.4 This is called a “token approval” or “allowance.”
  • Never Grant “Unlimited” Approvals: Always scrutinize approval requests. If possible, set a specific, limited amount for the dApp to spend rather than an “unlimited” approval.
  • Regularly Revoke Unused Approvals: This is paramount! Over time, you accumulate many token approvals. Regularly review and revoke any old, unused, or suspicious approvals.

    Recommended Tools: Use trusted tools like Revoke.cash or Rabby Wallet’s batch revoke feature to see and revoke your approvals.5 (As previously discussed in our “Revoking Approvals” guideline).

4. Wallet & Device Security

  • Hardware Wallets (Cold Storage): For your significant holdings, use a hardware wallet. Even if you accidentally interact with a malicious token on a hot wallet, your hardware wallet funds remain isolated.
  • Dedicated Wallet for dApps: Use a separate “burner” hot wallet for interacting with new or less-trusted dApps, keeping minimal funds on it.
  • Software Updates: Keep your wallet apps, browser extensions, and operating systems updated to patch known vulnerabilities.

5. Identify Suspicious Tokens

  • Research: If you see an unfamiliar token, research it thoroughly before any interaction. Check reputable sites like CoinGecko, CoinMarketCap, or Block Explorers (Etherscan, BscScan).
  • Red Flags: Be wary of tokens with:         
  • Extremely high returns promised.
  • No clear project website or whitepaper.
  • Spelling errors or unprofessional branding.
  • Unusually large, sudden price movements without news.

6. ShieldGuard Critical Recommendation

  • Assume Malicious Intent: Treat any unsolicited token in your wallet as potentially malicious until proven otherwise (and even then, avoid direct interaction).
  • Proactive Approval Management: Make reviewing and revoking token approvals a regular, non-negotiable part of your crypto security routine.
  • Isolate Funds: Never keep all your funds in one hot wallet, especially if you actively engage with new dApps or frequently receive dust.

⚠️ Final Note

The anonymity of blockchain allows scammers to deploy sophisticated traps. Your vigilance and disciplined security habits are the ultimate defense. Ignorance and interaction with malicious tokens can lead to irreversible loss.


🛡️ ShieldGuard Protection: CEX/DEX Investment & Storage Guidelines

The recent multi-billion dollar incident involving Bybit, where a supply chain compromise led to the theft of funds from a seemingly secure cold wallet, dramatically underscores the risk of relying on Centralized Exchanges (CEXs) for asset storage.

Your security is an active choice. Here are the ShieldGuard guidelines for interacting with exchanges:


🔑1. Mandatory Vetting: Why Proof of Reserves (PoR) Matters

When choosing a CEX for trading, the presence of Proof of Reserves (PoR) must be a minimum requirement.

  • What is Proof of Reserves (PoR)? PoR is a public audit that uses the transparency of public blockchains and cryptography (like Merkle Trees) to verify that a centralized exchange holds the assets it claims to hold for its clients. In simple terms, it proves the exchange has a 1:1 backing of customer deposits at a specific point in time.
  • Why It Matters: PoR addresses a fundamental question of trust: “Does this platform have the assets it claims to have?”. It makes it significantly harder for exchanges to operate with less than full reserves or engage in risky lending practices that led to major collapses in the past. While PoR is a powerful tool for transparency, it is not a full financial audit and does not guarantee against hacks, fraud, or mismanagement after the audit snapshot.
  • ShieldGuard Recommendation: Only select CEXs that provide verified PoR for key, foundational cryptocurrencies like Bitcoin (BTC) and Ethereum (ETH). These two assets represent the backbone of the industry, and their verifiable presence demonstrates robust financial practices by the exchange. Exchanges that offer PoR include established names like Kraken and Gemini.

🔒2. Golden Rule: Not Your Keys, Not Your Crypto

The fundamental risk of a CEX is that they hold your private keys, giving them custody of your funds.

  • CEX Risk vs. EVM Wallet Control: Centralized exchanges are attractive targets for sophisticated attackers, as demonstrated by the Bybit hack (which involved $1.5 billion worth of ETH). They also expose you to regulatory, operational, and bankruptcy risks. Non-custodial wallets (like EVM wallets) put you in full control of your private keys, making funds nearly impossible for external hackers to access unless your device is compromised.

🔒3. ShieldGuard Asset Storage Guidelines

Follow this tiered strategy for asset storage:

Tier 1: Cold Storage (Mandatory for Savings)

  • Hardware Wallets (Recommended): For all large holdings and long-term savings, always move your assets off the exchange and onto a hardware wallet (cold storage). These devices store your private keys completely offline, offering maximum security.

Tier 2: EVM/Hot Wallets (For Trading/DEX)

  • Post-POW Exchange Withdrawal: If you must keep funds accessible for immediate trading, immediately withdraw assets from the CEX wallet to your personal, non-custodial EVM (Ethereum Virtual Machine) wallet (e.g., MetaMask, Rabby). These wallets provide you with custody and control.
  • Why EVM Wallets Post-CEX? By moving to an EVM wallet, you transfer the custody risk from a single, large centralized target (the CEX) to your own isolated wallet, which is only vulnerable if you personally fall for a phishing or malware attack (risks you can mitigate with proper personal security hygiene).

Tier 3: POW Exchanges (If CEX Storage is Unavoidable)

  • Use POW Exchanges ONLY for Liquidity: If you absolutely need funds on a CEX for liquidity purposes (trading), select a CEX known for its security and verified PoR in BTC and ETH (both POW chains). While this doesn’t eliminate the risk, a CEX dedicated to robust security practices (often audited by third parties) is a better choice than a non-compliant one.

⚠️ Final Note

Your safety depends on who you trust with your crypto. CEXs may fail, DEXs may be exploited — but by following ShieldGuard guidelines, you minimize exposure:

✅ Only trade on PoR-backed exchanges.

✅ Never store assets on exchanges.

✅ Always secure funds in your own wallets.