Important conversations, however, loathe to discuss specific personal details:

Don't trust, verify is great advice because bitcoin is so verifiable

Lots of testing of combos of hardware and software can be employed and compared, prioritize testing of backups as nvk implores

Sadly, the IT/gov industrial complex has made computing/networks so insecure... So education, practice and vigilance are key

Reply to this note

Please Login to reply.

Discussion

By using different combos, you build understanding and the proficiency to not be locked into any hardware or software, if the need arises