<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="fr">
		<id>https://apds.ircam.fr/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=HellenMcClean</id>
		<title>apds - Contributions de l’utilisateur [fr]</title>
		<link rel="self" type="application/atom+xml" href="https://apds.ircam.fr/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=HellenMcClean"/>
		<link rel="alternate" type="text/html" href="https://apds.ircam.fr/index.php/Sp%C3%A9cial:Contributions/HellenMcClean"/>
		<updated>2026-05-24T08:18:10Z</updated>
		<subtitle>Contributions de l’utilisateur</subtitle>
		<generator>MediaWiki 1.30.0</generator>

	<entry>
		<id>https://apds.ircam.fr/index.php?title=Utilisateur:HellenMcClean&amp;diff=4882</id>
		<title>Utilisateur:HellenMcClean</title>
		<link rel="alternate" type="text/html" href="https://apds.ircam.fr/index.php?title=Utilisateur:HellenMcClean&amp;diff=4882"/>
				<updated>2026-05-09T01:12:53Z</updated>
		
		<summary type="html">&lt;p&gt;HellenMcClean : Page créée avec « &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;img  width: 750px;  iframe.movie  width: 750px; height: 450px; &amp;lt;br&amp;gt;Setup razor wallet safely a crypto security guide&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Setup razor wallet safely a... »&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;img  width: 750px;  iframe.movie  width: 750px; height: 450px; &amp;lt;br&amp;gt;Setup razor wallet safely a crypto security guide&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Setup razor wallet safely a crypto security guide&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Your private keys must never exist in a file, a photo, a note app, or any software that can be accessed by a network. A dedicated microcontroller like a Ledger or Trezor generates keys offline and signs transactions without exposing the seed to your main operating system. This single action eliminates remote extraction by malware, keyloggers, or clipboard hijackers.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Create your seed phrase using the device’s own entropy source, not a random generator on your phone or laptop. Write the 24 words with a pen on acid-free paper, store two copies in separate fireproof safes, and never type them into any keyboard. A password manager or cloud backup for this phrase voids all hardware protections if that service gets breached.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Verify every receive address on the device’s screen before confirming a transfer. Some malware swaps your clipboard address with an attacker’s address after you paste it. Cross-checking the physical display with the transaction details on your monitor forces an adversarial mismatch to be visible. For any transfer above your daily threshold, run a test transaction with a minimal amount first.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Implement a passphrase (BIP39) on top of your seed words. This added word, stored separately from the seed, creates a completely different set of addresses. If an attacker obtains your written seed but not the passphrase, your funds remain inaccessible. Keep the passphrase in a bank safety deposit box, not with the seed itself.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Update the device firmware only through direct download from the manufacturer’s official domain, verified by checking the cryptographic signature against a published hash. Fake update sites and phishing emails are the primary vector for compromise on hardware that was otherwise secure. After each update, reset the device and restore from your seed to confirm the backup works.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Setup Razor Wallet Safely: A Crypto Security Guide&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Download the official binary exclusively from the project’s signed GitHub releases page, cross-referencing the SHA-256 checksum against the maintainer’s PGP-signed list. A mismatch of even one character indicates tampered code, often injected with clipboard hijackers that replace your copied addresses during transactions. Execute the file in a dedicated, offline VirtualBox machine with network access disabled to isolate the application from your host operating system’s potential keyloggers or screen scrapers.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Upon first launch, generate your mnemonic seed phrase only while physically disconnected from the internet–pull the Ethernet cable or disable Wi-Fi in the BIOS menu, not just the OS’s software toggle. Write the 24-word sequence onto a fireproof steel plate using a center punch, never on a digital note or a paper vulnerable to water damage. The seed is the master key; reveal it only once during initialization, then immediately verify your recovery by entering a random three-word subset the program demands before allowing any balance display.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Layer&amp;lt;br&amp;gt;Action&amp;lt;br&amp;gt;Specific Standard&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Hardware&amp;lt;br&amp;gt;Encrypt the disk where the application files reside&amp;lt;br&amp;gt;LUKS2 with a 512-bit key stretching to Argon2id parameters (memory cost 64 MB, iterations 3)&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Network&amp;lt;br&amp;gt;Route all traffic through a Tor proxy (SOCKS5) with stream isolation enabled per address&amp;lt;br&amp;gt;Deny UDP leaks via iptables rules unless using a forced-onion-only configuration&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Protocol&amp;lt;br&amp;gt;Set minimum acceptable transaction fee to 5 sat/vB to avoid time-bounded replace-by-fee exploits&amp;lt;br&amp;gt;Enable coin control for manual UTXO selection, preventing accidental dust output consolidation&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;After funding the address, disable the “automatically fetch and apply updates” toggle in the preferences menu; an attacker who compromises the update server could push a counterfeit binary that steals your private keys during the patch cycle. Instead, monitor the project’s official mailing list or a trusted relay (like a specific Mastodon account with a verified domain) for new releases, then manually audit the diff of any code changes if you build from source. For significant holdings exceeding 1 BTC equivalent, maintain a separate watch-only instance on a Raspberry Pi that reads the public descriptor file, leaving the hot signing key stored on an air-gapped laptop that never touches a live cable.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Downloading the Official Razor Wallet Client and Verifying Signatures&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Only obtain the client binary directly from the project’s official GitHub repository or its authenticated domain listed on the project’s verified Twitter/X account. Any search engine result or third-party download portal is a high-risk vector for trojanized copies.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;After downloading the file, immediately retrieve the corresponding SHA-256 checksum from the signed hashes file (usually named `SHA256SUMS.asc` or similar) hosted on the same official repository. Do not trust checksums displayed on a website; you must cross-reference the hashes against the developer team’s published PGP-signed digest.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Import the developers' GPG public key from a reliable key server like `keys.openpgp.org` or `keyserver.ubuntu.com` using the full 40-character fingerprint published on the project’s official GitHub README and its independently verified social media posts. Verify this fingerprint matches across at least three separate official sources before importing it into your keyring.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Execute the verification command: `gpg --verify SHA256SUMS.asc`. The output must show a &amp;quot;Good signature&amp;quot; line and confirm the key belongs to a known developer (the user ID must match the name of a primary maintainer). If the output displays &amp;quot;BAD signature&amp;quot; or any warning about an untrusted key lacking a trusted trust path, discard the download immediately.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;After confirming the signature validity, compute the local binary’s hash using `sha256sum your-downloaded-file`, then compare this output to the checksum listed inside the verified `SHA256SUMS` file. The strings must match exactly; a single differing character means the binary has been tampered with and must be deleted.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Perform this entire sequence on an air-gapped machine or at minimum on a system booted from a trusted live USB operating system to eliminate the risk of keyloggers or memory scrapers compromising the verification process. Store the binary only after all checks pass without error.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Generating Your Seed Phrase Offline and Choosing a Secure Storage Method&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Generate the mnemonic phrase using a dedicated, open-source tool like Ian Coleman’s BIP39 generator or the ColdCard Mk4, but crucially, perform this on a machine that has never been connected to the internet. For maximum isolation, boot a temporary Linux distribution (such as Tails OS) from a USB drive directly into the computer’s RAM, physically disconnect the ethernet cable, and disable the Wi-Fi card via a hardware switch or BIOS setting. Print the generated entropy and checksum parameters directly instead of copying them manually; a point-of-sale thermal printer with no Bluetooth or memory capability (like a Star SP700) is ideal. After printing, immediately power down the system, remove the bootable media, and physically wipe the RAM by removing the computer’s battery and holding the power button for 30 seconds. Never photograph, scan, or type the phrase into a phone or any device with an active network interface, as keyloggers and cloud synchronization services present irreversible exposure risks.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Multilayer metal backup (cryptosteel capsule or ColdTi plate): Letter-punch the full 24 words into two separate stainless steel plates. Store one in a fireproof home safe rated for 2 hours at 1700°F (e.g., a SentrySafe model with a UL 72 classification) and the other at a geographically distinct location, such as a bank safety deposit box or a trusted relative’s residence 500 miles away. Avoid titanium plates for sheer cost; 304 stainless steel resists corrosion and melting equally well at half the price.&amp;lt;br&amp;gt;Decoy and passphrase layers: Write a fake seed phrase (generated from the same tool but never funded) on a paper document stored in a home office drawer. The real phrase should never be written in full anywhere; instead, store 23 words on the steel plates and memorize the 24th word, which acts as a &amp;quot;tripwire&amp;quot; confirmation that the storage has been tampered with. Append a BIP39 passphrase (a separate 15–20 character string) that you record in a password manager with offline-only access, such as KeePassXC on a dedicated Raspberry Pi that never connects to Wi-Fi.&amp;lt;br&amp;gt;Sharding via SSS (Shamir’s Secret Sharing): Slip39, the standard for Shamir-based seed backup, generates five shares with a threshold of three. Distribute each share on multiple steel plates at separate banks, attorney offices, and self-storage units. Ensure that no single location holds more than two shares, and test recovery every 12 months by physically retrieving three shares and reconstructing the seed in a cold environment, confirming the resulting master key matches your unspent output snapshot.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;For immediate physical access control, place the primary steel backup inside a welded steel container that requires an angle grinder to open, and store that container within a anchored, fire-rated gun safe weighing over 350 pounds. Cover the safe’s combination dial with a tamper-evident seal (like a 3M security tape with a unique serial number), and photograph the seal weekly from a fixed angle to detect any visible disturbance. For the secondary location, use a heavy-duty plastic document envelope with a laminated barcode and place it inside an existing bank vault box; pay the annual rental fee in cash to avoid linking your identity to the box. Never disclose the existence of the seed phrase to any third party, including insurance agents, attorneys, or family members, unless explicit legal documentation for inheritance is notarized and stored separately from the shares.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Q&amp;amp;A:  &amp;lt;br&amp;gt;I just bought a new Razor phone. Should I use the default crypto wallet app that came pre-installed, or is that a bad idea for security?&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;That is a good question, and the short answer is: treat the pre-installed wallet like a demo, not a vault. Manufacturers sometimes bundle apps that are not updated as frequently as standalone, audited wallets. For a phone like the Razor, which isn't specifically designed for crypto (unlike some hardware-focused devices), the pre-installed app might lack advanced security features like key splitting or multi-signature support. My advice is to not use it for storing significant amounts. Instead, download a reputable, open-source wallet (like Trust Wallet or MetaMask) directly from the official app store. Then, most importantly, go into your phone's settings and disable the pre-installed app entirely. This removes an attack vector that you didn't ask for. Store your recovery seed phrase on paper or metal, never as a screenshot on that same phone.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;I keep hearing about &amp;quot;hot wallets&amp;quot; and &amp;quot;cold wallets.&amp;quot; How do I actually set up a cold wallet using my Razor phone, or is that impossible?&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;You cannot turn your Razor phone into a true &amp;quot;cold wallet&amp;quot; because a cold wallet is defined as a device that has never been connected to the internet. Your phone is constantly online. However, you can create a &amp;quot;warm wallet&amp;quot; that is significantly safer than a standard hot wallet by using the phone in airplane mode during setup. First, install a wallet app on your Razor. Then, turn on Airplane Mode and turn off Wi-Fi and Bluetooth. While offline, create a new wallet. Write down the 12 or 24-word recovery phrase on paper only. Now, **erase the wallet app from your phone** before turning the network back on. Your funds are now &amp;quot;cold&amp;quot; as the keys have never touched a connected device. To spend money, you would need to temporarily restore that wallet onto a clean, online device, but this method is better suited for long-term holding than daily spending.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Is setting up biometrics (fingerprint or face unlock) on my Razor wallet actually safer than a PIN, or does it create a new risk?&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Biometrics offer convenience, but they create a specific legal and technical risk. Technically, your fingerprint or face data is stored in a dedicated secure enclave on the Razor, which is generally safe from software hacks. The real danger is that someone can physically force you to unlock the wallet with your finger or by pointing the phone at your face. A court can compel you to provide a fingerprint (since it is not considered &amp;quot;testimony&amp;quot;), but you cannot be legally forced to reveal a number or password. For a wallet with small spending amounts, biometrics are fine for speed. For a wallet holding significant value, use a strong alphanumeric PIN. A good setup uses a strong PIN for the main vault and biometrics only for a small &amp;quot;spending&amp;quot; wallet within the same app.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;I saw a pop-up on my Razor saying my &amp;quot;wallet needs to be verified&amp;quot; and asking for my seed phrase. Is this a real security warning from the phone or wallet developer?&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;That pop-up is 100% a phishing scam. No legitimate wallet developer or phone manufacturer (Razor or otherwise) will ever ask for your 12 or 24-word seed phrase. The seed phrase is the master key to your crypto. Never type it into a website, app pop-up, or SMS reply. The scam works because the pop-up looks like a system error or network warning. Do not click on it. Instead, force-close the browser or wallet app and restart your phone. If the pop-up keeps appearing, you may have installed a malicious look-alike app. Check your phone's app list and uninstall any wallet apps you don't recognize. The only safe location for your seed phrase is on paper or metal, stored away from any electronic device.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;What happens to my crypto in my Razor wallet if I lose my phone? Is the money gone forever, or is there a way to get it back using the phone's serial number?&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Your crypto is not stored &amp;quot;on&amp;quot; the phone. It is stored on the blockchain. Your phone only holds the private keys (the password). If you lose your Razor, the crypto is safe—but only if you have your recovery seed phrase. The serial number of the phone is useless for recovering crypto. The only way to get your funds back is to buy a new phone (or use a computer), download the same wallet app you were using, and select &amp;quot;Restore Wallet&amp;quot; or &amp;quot;Import Wallet.&amp;quot; Then, type in your 12 or 24-word seed phrase exactly as you wrote it down. The wallet will then control your original blockchain addresses, and your funds will be accessible again. Without that seed phrase, the crypto is gone. This is why you should store that phrase in a fireproof safe, not just in your phone case.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;I just downloaded the Razor Wallet extension. What is the single most important step I need to take before I even think about sending any cryptocurrency to it?&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;The first thing you need to do is secure your 12 or 24-word seed phrase. This is the master key to your wallet. Do not save it on your computer, take a screenshot, or store it in the cloud. Write it down on paper using a pen, and store that paper in a safe place, like a fireproof safe or a safety deposit box. Think of it this way: if someone gets your seed phrase, they get your money, and there is no customer support to call to get it back. Once you have that written down and stored away correctly, you can move on to setting a strong password for the wallet itself. But the seed phrase comes first, always.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;I keep seeing warnings about &amp;quot;approving&amp;quot; random tokens in Razor Wallet. I accidentally clicked &amp;quot;Approve&amp;quot; on a website that wanted to connect to my wallet. How much damage have I done, and what should I do next?&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;That depends on what you approved. If you only approved a &amp;quot;Connect&amp;quot; request, the website can see your public address, but they cannot move your funds. That's annoying but mostly harmless. The real danger is when you approve a &amp;quot;spending&amp;quot; or &amp;quot;transaction&amp;quot; request. This usually happens when a dodgy site asks you to sign a contract that gives them permission to take a specific token from your wallet. If you did that, you have given them a green light to drain that specific token. Here is what you do: go to a &amp;quot;Token Approval&amp;quot; checker website (like Revoke.cash). Connect your [https://extension-start.io/razor-extension-guide.php Recover Razor Wallet using recovery phrase] Wallet to that site. It will show you a list of every contract you have approved. Find the suspicious one and click &amp;quot;Revoke.&amp;quot; This will cancel their permission. This action costs a small gas fee, but it stops the bad guys from taking your coins. If you are unsure, it is safer to use a &amp;quot;burner&amp;quot; wallet—a separate wallet with only the minimum funds you need for that one transaction—whenever you try a new DeFi site.&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>HellenMcClean</name></author>	</entry>

	</feed>