
Navigation: officercia.eth
In today’s article, I’d want to draw your attention to some of my most time-consuming articles (there are 120+ already!), which I feel to be my best! Enjoy!Art by: Regul LionOpSec & SecurityOpSec Going SmartOpSec Going SmarterOpSec Going Smarter: Secure SmartphonesUnfolding Ancient Wisdom: How Ancient Stories Teach Modern Humans about Security and OpSecAn Open Letter to the Manufacturers and Designers of Crypto WalletsWould Stay Extra Vigilant Over the Holidays…Interview With a KyberSwap Hack...

Essential Security Tactics to Implement After the Bybit Hack
Below, we outline key strategies, drawing from expert recommendations shared in the wake of the event.

The Worst OpSec Fails of 2025: Lessons from Darknet Busts and Whale Kidnappings
I'll break it down simple, like we're chatting over coffee, and throw in some real stories from the news.
>4.5K subscribers

Navigation: officercia.eth
In today’s article, I’d want to draw your attention to some of my most time-consuming articles (there are 120+ already!), which I feel to be my best! Enjoy!Art by: Regul LionOpSec & SecurityOpSec Going SmartOpSec Going SmarterOpSec Going Smarter: Secure SmartphonesUnfolding Ancient Wisdom: How Ancient Stories Teach Modern Humans about Security and OpSecAn Open Letter to the Manufacturers and Designers of Crypto WalletsWould Stay Extra Vigilant Over the Holidays…Interview With a KyberSwap Hack...

Essential Security Tactics to Implement After the Bybit Hack
Below, we outline key strategies, drawing from expert recommendations shared in the wake of the event.

The Worst OpSec Fails of 2025: Lessons from Darknet Busts and Whale Kidnappings
I'll break it down simple, like we're chatting over coffee, and throw in some real stories from the news.
Share Dialog
Share Dialog


Greetings, Crypto Community!
In this post, I’ll break down the potential risks you might face and the measures you can take right now to protect your digital assets.
First and foremost, as you venture into the crypto ecosystem or Web3 world, remember this crucial rule: never, under any circumstances, store your seed phrases and private keys as photos in your device’s gallery. This simple precaution can save you from a myriad of security breaches.
Recently, Kaspersky researchers uncovered a new group of Trojans targeting iOS and Android devices. The twist? Compromise occurs when you download certain apps and grant them permissions to access your photo gallery. For more details, check the full report here.


The takeaway is clear: avoid downloading third-party applications unless they are absolutely necessary for your crypto activities, such as wallet management or secure communication. Stick to trusted apps for these purposes.
While the Apple App Store and Google Play have already removed many of these malicious applications, some might still linger publicly. Being aware and cautious is key.
As an example… on a related note. The iOS version of the DeepSeek has turned out to be dangerous for all iPhone owners. The other day the security company NowSecure stated: they had conducted research and found a bunch of vulnerabilities in a DeepSeek IOS app.

To further enhance your security and stay informed, explore the following resources:
Stay proactive about your security—keeping informed is the best defense against emerging threats in the crypto world.
If you want to support my work, please, consider donating me:
0xB25C5E8fA1E53eEb9bE3421C59F6A66B786ED77A or officercia.eth — ETH;
4AhpUrDtfVSWZMJcRMJkZoPwDSdVG6puYBE3ajQABQo6T533cVvx5vJRc5fX7sktJe67mXu1CcDmr7orn1CrGrqsT3ptfds — Monero XMR;
More addresses: github.com/OffcierCia/support.
Greetings, Crypto Community!
In this post, I’ll break down the potential risks you might face and the measures you can take right now to protect your digital assets.
First and foremost, as you venture into the crypto ecosystem or Web3 world, remember this crucial rule: never, under any circumstances, store your seed phrases and private keys as photos in your device’s gallery. This simple precaution can save you from a myriad of security breaches.
Recently, Kaspersky researchers uncovered a new group of Trojans targeting iOS and Android devices. The twist? Compromise occurs when you download certain apps and grant them permissions to access your photo gallery. For more details, check the full report here.


The takeaway is clear: avoid downloading third-party applications unless they are absolutely necessary for your crypto activities, such as wallet management or secure communication. Stick to trusted apps for these purposes.
While the Apple App Store and Google Play have already removed many of these malicious applications, some might still linger publicly. Being aware and cautious is key.
As an example… on a related note. The iOS version of the DeepSeek has turned out to be dangerous for all iPhone owners. The other day the security company NowSecure stated: they had conducted research and found a bunch of vulnerabilities in a DeepSeek IOS app.

To further enhance your security and stay informed, explore the following resources:
Stay proactive about your security—keeping informed is the best defense against emerging threats in the crypto world.
If you want to support my work, please, consider donating me:
0xB25C5E8fA1E53eEb9bE3421C59F6A66B786ED77A or officercia.eth — ETH;
4AhpUrDtfVSWZMJcRMJkZoPwDSdVG6puYBE3ajQABQo6T533cVvx5vJRc5fX7sktJe67mXu1CcDmr7orn1CrGrqsT3ptfds — Monero XMR;
More addresses: github.com/OffcierCia/support.
No comments yet