{"id":7983,"date":"2020-01-29T23:23:25","date_gmt":"2020-01-29T21:23:25","guid":{"rendered":"https:\/\/forklog.media\/?p=7983"},"modified":"2020-01-30T23:47:58","modified_gmt":"2020-01-30T21:47:58","slug":"dont-trust-the-wallet-in-apartment-23-what-bitcoin-wallets-have-worst-reputation-and-why","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/dont-trust-the-wallet-in-apartment-23-what-bitcoin-wallets-have-worst-reputation-and-why\/","title":{"rendered":"Don\u2019t Trust the Wallet in Apartment 23: What Bitcoin Wallets Have Worst Reputation and Why"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Choosing a crypto-wallet is usually one of the first challenges that a rookie cryptocurrency user has to face. Of course, the internet is full of guides on how to make the choice. Those guides can be good or bad, reasonable or silly, free or sponsored, and so forth. Still, while such reviews are abundant, there are much fewer pieces speaking about what NOT to choose.\u00a0<\/span><\/p>\n<p><!--more--><\/p>\n<p><span style=\"font-weight: 400;\">We asked <\/span><span style=\"font-weight: 400;\">Jeff Fawkes, a cryptocurrency investigator, to take a look at the wallets that he believes people should avoid. In this piece, he speaks about the bad seeds and explains in great detail what is wrong with them and why rookies should keep away. Even though it\u2019s Mr. Fawkes\u2019 personal opinion that we not necessarily share, his investigation shows that at least part of the crypto-community does. And this fact alone makes it worth the attention.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Exodus<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Having funds stolen is sadly a typical complaint on Exodus. The story is usually the same: people say that they have lost the money from their Exodus wallet and they don&#8217;t know how it happened. Then, some very attentive support officer helps the user to conduct an &#8220;investigation.&#8221; But the result is usually the same: the user can kiss their money goodbye. But why does this happen?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When you have installed the wallet and launched it for the first time, it writes the seed phrase on the hard drive without encrypting it first.<\/span> <span style=\"font-weight: 400;\">The seed file is pretty important since it contains the key that allows spending your assets. Since the seed file is only encrypted with the user&#8217;s password, the wallet will remain largely unprotected for a while after the first launch. Exodus probably uses this as a psychological trick to make new users stay with the wallet. The app waits until the first deposit and only then gives the user a chance to encrypt the wallet&#8217;s seed file with a password and store the backup.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Since the wallet file remains unencrypted for some time while the user &#8220;considers&#8221; using the wallet, malware on your PC can read the seed phrase in it. This is a huge security hole in the wallet because a hacker can theoretically access your wallet long before you send money there.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another point of concern is the fact that Exodus uses closed-source code, which is generally not typical for the crypto-industry. Cypherpunks who love Bitcoin tend to check the code of the apps before storing coins in them. A closed-source app is a joke for the researcher. You cannot compile the binaries by yourself or study the code. The Exodus team\u2019s explanation is that making closed-source crypto wallets is a business model to them, and their code needs protection.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There is also a high chance that Exodus stores seed files of all users on its servers.<\/span> <span style=\"font-weight: 400;\">How else can it use the &#8220;E-mail Backup Feature&#8221; to restore the private keys from the Internet link pointing to Exodus servers?<\/span><\/p>\n<p><a href=\"https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/01\/Email_from_bbackup_link.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-7991 size-full\" src=\"https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/01\/Email_from_bbackup_link.jpg\" alt=\"Don\u2019t Trust the Wallet in Apartment 23: What Bitcoin Wallets Have Worst Reputation and Why\" width=\"793\" height=\"454\" srcset=\"https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/01\/Email_from_bbackup_link.jpg 793w, https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/01\/Email_from_bbackup_link-300x172.jpg 300w, https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/01\/Email_from_bbackup_link-768x440.jpg 768w, https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/01\/Email_from_bbackup_link-470x269.jpg 470w\" sizes=\"auto, (max-width: 793px) 100vw, 793px\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><span style=\"font-size: 10pt;\"><em>Exodus&#8217; e-mail backup setting<\/em><\/span><\/p>\n<p><span style=\"font-weight: 400;\">If so, the seed files again remain available for any hacker who manages to crack your wallet and e-mail. Since the wallet sends the recovery link to your mail, it looks convenient but is a fantastically large security hole. If a hacker obtains your wallet password, e-mail password, or both, they control your coins as well. Without taking the seed phrase off from the link itself or from the Exodus servers, the &#8220;backup feature&#8221; will not work.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So if you had a password like 54321 or terminathr999, it&#8217;s very easy to brute-force it, and take control over the coins. The official website, however, claims that the user should maintain password complexity. Meanwhile, the app itself gives no warnings that this exact password will be used to encrypt the wallet file containing private keys and then to send it over to some servers. Presumably, Microsoft AZURE ones.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We still don&#8217;t know the format in which Exodus servers store wallet files. Is it comfortable for hackers to brute-force them or not? What is the encryption method that the wallet itself uses? Some Reddit users <\/span><a href=\"https:\/\/www.reddit.com\/r\/ExodusWallet\/comments\/7katjs\/exodus_is_weak_a_hackers_dream\/\"><span style=\"font-weight: 400;\">are not happy<\/span><\/a><span style=\"font-weight: 400;\"> about it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Additionally, in 2018, Exodus twitted that they &#8220;generally do not recommend storing the seeds online.&#8221;<\/span><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Hi Andreas! You&#39;re not forced to save the email backup link, it&#39;s fine to skip that part of the backup process if you wish. We generally don&#39;t recommend storing seed phrases (especially unencrypted) online. Keeping multiple copies offline in secure areas should help with that -KC<\/p>\n<p>&mdash; Exodus (@exodus) <a href=\"https:\/\/twitter.com\/exodus\/status\/1044368001129164800?ref_src=twsrc%5Etfw\">September 24, 2018<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><span style=\"font-weight: 400;\">So, in fact, Exodus wallet creators advised not to do the exact thing that their wallet has been presumably doing for more than 3 years.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The <a href=\"https:\/\/www.exodus.io\/releases\/\">release v. 19.2.1<\/a> where e-mail backup feature was finally disabled doesn\u2019t even mention this fact.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Atomic Wallet<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The developers of the wallet seem to hide behind fake names, and their CEO, Konstantin Gladych, appears to have several different nicknames in the community.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So, what\u2019s wrong with it? Atomic doesn\u2019t seem to be affiliated with the Exodus wallet but has almost the same GUI as Exodus. The Atomic one didn&#8217;t even replace the logo situated in the upper left corner, just like in the Exodus. It looks like not only the graphic interface but also the layout of the buttons is at very least heavily inspired by Exodus.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The wallet is not open-source as well. It possibly <a href=\"https:\/\/www.reddit.com\/r\/atomicwallet\/comments\/dem8i9\/when_is_this_going_to_be_fully_opensource\/\">shares<\/a> the same mysterious <\/span><span style=\"font-weight: 400;\">closed-source business model<\/span><span style=\"font-weight: 400;\"> with Exodus. <\/span><span style=\"font-weight: 400;\">Atomic justifies the closed code by preventing bootleg versions of the wallet from appearing. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Meanwhile, the developers of classic open-source Bitcoin wallets usually consider developing their own GUI. Nobody really wants to do their &#8220;bootleg&#8221; versions. On the contrary, it\u2019s the closed-source Atomic that mysteriously resembles another closed-source wallet.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">They also lie about the Telegram&#8217;s TON support on their main page. They have a featured image convincing visitors that the wallet supports TON blockchain.<\/span><\/p>\n<p><a href=\"https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/01\/atomic_gram.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-7995 size-large\" src=\"https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/01\/atomic_gram-1024x423.png\" alt=\"Don\u2019t Trust the Wallet in Apartment 23: What Bitcoin Wallets Have Worst Reputation and Why\" width=\"1024\" height=\"423\" srcset=\"https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/01\/atomic_gram-1024x423.png 1024w, https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/01\/atomic_gram-300x124.png 300w, https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/01\/atomic_gram-768x317.png 768w, https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/01\/atomic_gram-470x194.png 470w, https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/01\/atomic_gram.png 1231w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><em><span style=\"font-size: 10pt;\"><a href=\"https:\/\/atomicwallet.io\/ton-wallet\">Atomicwallet.io<\/a> web page advertising Atomic TON Wallet<\/span><\/em><\/p>\n<p><span style=\"font-weight: 400;\">In fact, the wallet has no such support, which I have personally checked. You can check it too if you download it and run on a separate PC (since it\u2019s a closed-source). This fact alone makes the wallet quite dubious.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Ledger Wallet (Hardware)<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Leger uses its native app to operate, but it certainly has nothing to do with the Ledger Secure software and any other such app. Always check that you use proper apps when picking them from the Chrome app store or iOS\/Android marketplaces. They do not really check what is published in their software stores, as exemplified by the <\/span><a href=\"https:\/\/www.coindesk.com\/fake-metamask-app-on-google-play-store-hosted-crypto-malware\"><span style=\"font-weight: 400;\">MetaMask fake app<\/span><\/a><span style=\"font-weight: 400;\"> story from February 2019.<\/span><\/p>\n<p>https:\/\/twitter.com\/BTCSchellingPt\/status\/1212674431086034945<\/p>\n<p><span style=\"font-weight: 400;\">Also, there&#8217;s malware that can compromise the wallet into sending all the funds to the external address controlled by the hacker. There are three most interesting cases of the wallet&#8217;s breach.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The first trick uses a flaw in old firmware <\/span><a href=\"https:\/\/sergeylappo.github.io\/ledger-hack\/\"><span style=\"font-weight: 400;\">found<\/span><\/a><span style=\"font-weight: 400;\"> by Sergey Lappo and highlighted by Twitter user Ruben Somsen.<\/span><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">2\/4 <a href=\"https:\/\/twitter.com\/LappoSergey?ref_src=twsrc%5Etfw\">@LappoSergey<\/a> from <a href=\"https:\/\/twitter.com\/MyceliumCom?ref_src=twsrc%5Etfw\">@MyceliumCom<\/a> found the bug, with some help from <a href=\"https:\/\/twitter.com\/LeoWandersleb?ref_src=twsrc%5Etfw\">@LeoWandersleb<\/a>. He quietly released a blog post detailing the bug, and it&#39;s VERY serious.<\/p>\n<p>The Ledger can be fooled into sending away ALL funds from ALL your accounts, with NO warning from the device&#8230;\ud83e\udd10<\/p>\n<p>&mdash; Ruben Somsen (@SomsenRuben) <a href=\"https:\/\/twitter.com\/SomsenRuben\/status\/1100843126380363776?ref_src=twsrc%5Etfw\">February 27, 2019<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote><p><strong><i>&#8220;Change outputs would go into a different account depending on which address you pay to. As can be seen in <\/i><a href=\"https:\/\/github.com\/mycelium-com\/wallet-android\/issues\/483\"><i>this issue<\/i><\/a><i>, that was a real problem on Trezor, less a problem on KeepKey but no problem at all on Ledger Blue and Ledger Nano S. The Ledger would simply accept that change was sent to the hardware wallet and thus did not ask the user about confirmation thereof. We were a bit surprised and decided to check which derivation paths would be accepted without warning the user, assuming there was some protection to prevent what <\/i><a href=\"https:\/\/github.com\/LedgerHQ\/ledger-app-btc\/pull\/90\"><i>this pull request<\/i><\/a><i> claims to fix. But things went in much more interesting ways: The wallet did not care if the change went on a change address at all!&#8221;<\/i><\/strong><\/p><\/blockquote>\n<p><span style=\"font-weight: 400;\">DocDroid <a href=\"https:\/\/www.docdroid.net\/EWxd1hJ\/the-story-of-a-ledger-robbing.pdf\">found<\/a><\/span><span style=\"font-weight: 400;\"> a security hole in Ledger which allows the malware to force the wallet to display the hacker&#8217;s receiving address (on the Receiving tab) instead of your own.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Even worse, users have no way of knowing whether the wallet is giving the correct receiving address, so they&#8217;ll have to push an additional button to find out.<\/span><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">this cannot be solved in the absolute. A malware can always change what you see on your computer screen. The only solution is prevention and building an UX to make the user check on its device. On device verification feature has been added 6 month ago already<\/p>\n<p>&mdash; Ledger (@Ledger) <a href=\"https:\/\/twitter.com\/Ledger\/status\/959794051477331969?ref_src=twsrc%5Etfw\">February 3, 2018<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><span style=\"font-weight: 400;\">DocDroid informed the team about the bug a month before the general public. But the wallet\u2019s team has decided to fix the bug by throwing it off to the crowds. Replying to buyers on Twitter, Ledger <\/span><a href=\"https:\/\/twitter.com\/Ledger\/status\/959794051477331969\"><span style=\"font-weight: 400;\">said<\/span><\/a><span style=\"font-weight: 400;\"> that the issue \u201ccannot be solved in the absolute.\u201d<\/span><\/p>\n<blockquote><p><strong><i>\u201cMalware can always change what you see on your computer screen. The only solution is prevention and building a UX to make the user check on its device.\u201d<\/i><\/strong><\/p><\/blockquote>\n<p><span style=\"font-weight: 400;\">DocDroid\u2019s report additionally shows that Ledger software could be exploited and transformed by unprivileged malware. In other words, attackers can <\/span><a href=\"https:\/\/thenextweb.com\/hardfork\/2018\/02\/06\/cryptocurrency-wallet-ledget-hardware\/\"><span style=\"font-weight: 400;\">hack the system<\/span><\/a><span style=\"font-weight: 400;\"> without using administrative rights.<\/span><\/p>\n<blockquote><p><strong><i>\u201cLedger wallets generate the displayed receive address using JavaScript code running on the host machine. This means that malware can simply replace the code responsible for generating the receiving address with its address, causing all future deposits to be sent to the attacker.\u201d<\/i>\u00a0<\/strong><\/p><\/blockquote>\n<p><span style=\"font-weight: 400;\">The third case was shown by standalone researcher Saleem Rashid. He demonstrated the attack vector where hackers break the Ledger Nano S and steal the coins that you own, acting both locally and remotely. Saleem&#8217;s <\/span><a href=\"https:\/\/saleemrashid.com\/2018\/03\/20\/breaking-ledger-security-model\/\"><span style=\"font-weight: 400;\">blog post<\/span><\/a><span style=\"font-weight: 400;\"> reads:<\/span><\/p>\n<blockquote><p><strong><i>&#8220;The vulnerability arose due to Ledger\u2019s use of a custom architecture to work around many of the limitations of their Secure Element. An attacker can exploit this vulnerability to compromise the device before the user receives it, or to steal private keys from the device physically or, in some scenarios, remotely.\u201d<\/i><\/strong><\/p><\/blockquote>\n<p><span style=\"font-weight: 400;\">All in all, it looks like Ledger is not a good choice.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">KeepKey (Hardware)<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Kraken Security Labs <\/span><a href=\"https:\/\/blog.kraken.com\/post\/3245\/flaw-found-in-keepkey-crypto-hardware-wallet\/\"><span style=\"font-weight: 400;\">found<\/span><\/a><span style=\"font-weight: 400;\"> a way to extract seeds from a KeepKey cryptocurrency hardware wallet. All that is required is physical access to the wallet for about 15 minutes. Till the next big release, please refrain from buying the wallet. From the official post on the matter:<\/span><\/p>\n<blockquote><p><strong><em>\u201cThis attack relies on voltage glitching to extract your encrypted seed, which can require specialized hardware and knowledge. We estimate that a consumer-friendly glitching device could be created for about $75.<\/em><\/strong><\/p>\n<p><strong><em>&#8220;We then crack your encrypted seed, which is protected by your 1-9 digit PIN but is trivial to brute force. The attack takes advantage of inherent flaws within the microcontroller that is used in the KeepKey.<\/em><\/strong><\/p>\n<p><strong><em>&#8220;This, unfortunately, means that it is difficult for the KeepKey team to do anything about this vulnerability without a hardware redesign.\u201d<\/em><\/strong><\/p><\/blockquote>\n<p><span style=\"font-weight: 400;\">Even though the developers seem to be perfectly honest, you should postpone using the wallet until further announcement. Still, even if the wallet itself is faulty, its developers\u2019 reputation is much better than in the cases above.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Coinomi\u00a0<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Coinomi used Google to check the seed phrases entered by the users.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One user <a href=\"https:\/\/www.reddit.com\/r\/Bitcoin\/comments\/av987o\/security_vulnerability_coinomi_wallet_sends_your\/\">claimed<\/a><\/span><span style=\"font-weight: 400;\"> that the developers allowed the wallet to transfer his whole seed phrase plain text to Google servers. There, somebody from Google allegedly took the coins, and the user lost $70,000.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">After the victim\u2019s active posting on forums, Coinomi said they&#8217;ve fixed the &#8220;bug,&#8221; adding that the seeds were transferred in an encrypted way and weren&#8217;t used by Google. They did not provide any suggestions regarding the technical proofs presented by the user.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ironically, Exodus has a &#8220;spell-check&#8221; enabled for seeds too. One can only wonder how many seeds both wallets could have dumped into Google servers.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Online Wallets and Exchanges<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Holding assets on an exchange account is not recommended at all. An exchange may fail, it may be hacked, it may be seized by the government. But here\u2019s another reason why you should never use an exchange as your online wallet. And online wallets per se as well.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Suppose you hold an asset on an exchange together with other people. One day, the developers plan a hard fork. However, this time a group of rebel miners promise to create a new &#8220;hard forked&#8221; asset from this hard fork.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this case, you need to move that asset away from all exchanges or online wallets to a trusted PC wallet. If you won\u2019t do it, then anyone having the access to your online account or its seed phrase could restore the coins if you had not done that yourself back in the fork days. Even if the original coins on that addresses\/accounts were spent, the forked coins are still available on the corresponding blockchain via private keys.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The forked coins would appear not on exchange balances, but on the new blockchain with your old private keys attached to the new addresses and coins. And, as we all know, if you do not own the keys, you do not own the coins.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are notable examples of this situation. For instance, Bitstamp still <\/span><a href=\"https:\/\/www.reddit.com\/r\/Bitstamp\/comments\/dswv2n\/give_bitstamp_users_their_bitcoin_sv_tokens\/\"><span style=\"font-weight: 400;\">has not distributed<\/span><\/a><span style=\"font-weight: 400;\"> Bitcoin Gold and Bitcoin SV among its clients after both forks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There\u2019s also a user who <\/span><a href=\"https:\/\/www.change.org\/p\/bitstamp-give-bitstamp-users-their-bitcoin-sv-tokens\"><span style=\"font-weight: 400;\">claims<\/span><\/a><span style=\"font-weight: 400;\"> that Bitstamp stole his money with a 50% additional profit.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Interestingly, Bitstamp &#8220;took a snapshot&#8221; of all the user balances during both forks, but said they will decide where the coins will reside.\u00a0<\/span><span style=\"font-weight: 400;\">In any case, why would you take a snapshot of all the balances if you don\u2019t plan to support the coins?\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Bound by the User Agreement and the Terms of Use, the affected traders cannot go and complain to the law enforcement, because they &#8220;agreed&#8221; on any of the Bitstamp\u2019s moves.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So, once again: if you keep your coins at an exchange or online wallet, you don\u2019t own them. The exchange and the online wallet own them on your behalf.<\/span><\/p>\n<p><b>Follow us on<\/b> <a href=\"https:\/\/twitter.com\/forklogmedia\"><b>Twitter<\/b><\/a><b> and <\/b><a href=\"https:\/\/www.facebook.com\/forklogmedia\"><b>Facebook<\/b><\/a><b> and join our <\/b><a href=\"https:\/\/t.me\/forklogmedia\"><b>Telegram channel<\/b><\/a><b> to know what\u2019s up with crypto and why it\u2019s important.<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Choosing a crypto-wallet is usually one of the first challenges that a rookie cryptocurrency user has to face. Of course, the internet is full of guides on how to make the choice. Those guides can be good or bad, reasonable or silly, free or sponsored, and so forth. Still, while such reviews are abundant, there [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":7985,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"human_written","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[198],"tags":[30,148,57],"class_list":["post-7983","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-opinion","tag-cryptocurrency","tag-security","tag-wallets"],"aioseo_notices":[],"amp_enabled":true,"views":"684","promo_type":"1","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/7983","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=7983"}],"version-history":[{"count":7,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/7983\/revisions"}],"predecessor-version":[{"id":8001,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/7983\/revisions\/8001"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/7985"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=7983"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=7983"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=7983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}