Crypto Currency

Articles

(Note the dates on the articles)

5 Cryptocurrencies You Should Know About Besides Bitcoin

.

Here's How the 10 Largest Cryptocurrencies Have Performed Year to Date

.

A Guide to Trading Cryptocurrency Part 1: Candlesticks and the Fibonacci Sequence

.

Bitcoin Is a Delusion That Could Conquer the World

.

Guide to buying cryptocurrency

.

.Getting Your Feet Wet In Cryptos

.

The 11 biggest names in cryptocurrency right now

.

Rational Exuberance

.

Exclusive: Nearly 4 Million Bitcoins Lost Forever, New Study Says

.

top-5-ethereum-wallets-compatible-with-cryptocurrency-ico-tokens/

.https://www.cryptocoinsnews.com/analyst-bitcoin-price-reach-60000-mid-term

How To Decide If Bitcoin Is Safe For You To Trade

The Top 10 Initial Coin Offerings (ICOs) to Watch in 2018

My Cryptocurrency Trading Method Detailed

Identity Thieves Hijack Cellphone Accounts to Go After Virtual Currency

These are the most promising cryptocurrencies right now

Read About Bubbles

Bitcoin is already dwarfing some of the largest financial market bubbles of all time

Here’s one thing the bitcoin frenzy has in common with the dot-com bubble

Understanding the Blockchain Bubble

Bitcoin: Not Your Ordinary Bubble

Is Bitcoin the Most Obvious Bubble Ever?

Government-Run Digital Currencies Could Disrupt U.S. Dominance

<<<<<>>>>>

http://ico.newsbtc.com/

Ultimate List of ICO Resources

Token vs Coin — what’s the difference?

<<<<<>>>>>

Initial Coin Offerings

UrbanCrypto.com

CryptoRated.com

ICORating.com

ICOStats.com

ICOBench.com

ICOHotList.com

The Top 10 Initial Coin Offerings (ICOs) to Watch in 2018

.

.ICO TO CHECK OUT! Experty.io 

<<<<<>>>>>

BestBitCoinExchange.io

Top 40+ Exchanges - note funding options

.

CoinMarketCap.com

.Crypto Currency Coins and Tokens - Prices and Charts

.

.Bittrex.com

Next Generation Digital Currency Exchange

.

CoinBase.com

Buy and sell Bitcoin, Ethereum and Litecoin.

How to safely store digital currency with Coinbase

.

Changelly.com

Exchange Cypto Currencies at the best rate

.

MyEtherWallet.com

Create a wallet.  Send and receive coins and tokens

.

GetCrypto.info

Step by step guide to  buying  and storing the most popular crypto-currency

.

.CoinSchedule.com

.

CanCoin.co 

Decentralized P2P trading platform

.

BlockGeeks.com Guides

.

<<<<<>>>>> 

.

How to buy Ethereum

.

How to buy OmiseGo

.

How to Buy Ripple

.

<<<<<<>>>>>>

Physical Wallets

.

.Ledger Nano S

.

Trezor

.

.Ledger Nano S Review – Is this Bitcoin Wallet Better than TREZOR?

.

TREZOR vs. LEDGER – Hands On Hardware Wallets Review

<<<<<<>>>>>>

.

Crypto Currency News

.

.CoinTelegraph.com

.

.CoinDesk.com

.

Investing.com-crypto-currency-news

.

<<<<<<>>>>>>

.

More links coming!!

.

NOTES

Just starting out?  Be prepared with a good photo of the front of your DL or identity card, the back and a selfie.  Have bank account - credit card numbers if you intend to fund by these methods.

Some of the Cryto-Currency sites are bandwidth intensive.  I have a hotspot with 10G a month bandwidth.  I added several crypto sites to the start pages and in one morning, before 10:00, burned up 4G.  If you are bandwidth sensitive leave the crypto sites down until you need them.

Computer Security: Lock your computer/phone with a password.  Don't put off Windows updates, they contain vital defenses.  Use a secure connection.  Backup you crypto info.  Keep a hard copy in a very safe place.  Never let people use your trading device.

.

From Coinbase.com

Coinbase recommends using Google Authenticator or another offline authenticator app such as Duo or 1Password.

Since SMS and the Authy app are linked to a phone number, they can leave customers susceptible to phone number porting attacks. These types of attacks involve an attacker transferring or “porting” a victim's phone number to a device the attacker controls, effectively taking over the number and associated 2-factor authentication codes.

By using Google Authenticator or another authenticator app, the only way to access the codes is via physical access to the device running the app.

From:  2-Factor Authentication (2FA) FAQ  

Return to home page.

.

.