If you are involved in the blockchain or cryptocurrency space, you might own wallets containing valuable assets. It is important to protect your keys with robust security protocols (hardware wallet or air gapped computer). Even if you are careful, you may still fall victim to an attack. Here is a demonstration of how such an exploit works.Step 1: initial contactAfter a conversation on LinkedIn, an individual (the attacker) sent me this message:LinkedIn message, reported. But that was not very...