- We recommend to use 2-factor authentication (2FA) on all your devices, miners and network. 2FA adds an extra layer to your login process. Especially when logging into your mining pool account this comes in handy. After you have filled in your login information, you will be asked to verify the login attempt through a secondary channel. This can be, for example, your smartphone. This way, a hacker can’t access your account with just your login credentials.
- Always update your mining rigs with the official firmware that the manufacturer, such as Bitmain, supplies. Using third-party firmware may give bad actors access to your miners. Don’t be deceived by promises of increased efficiency, always stick to the official firmware!
- Once you receive your new ASIC miner, always change the standard login credentials. The miner is pre-installed with simple login information so that you can log in and install the machine. However, after you have finalized the installation you should always change at least the password into something that is hard to guess and only you know. Also, change your password regularly and don’t use the same password on many different platforms.
Once you have installed your ASIC miner and connected it to the internet, it is time to start mining cryptocurrency. From here on out it is mostly waiting until you manage to mine some crypto, but a very important aspect to consider before commencing your operation is how you will store the mined cryptocurrency. In this article you will find out what the options are and what the best practices are when it comes to storing cryptocurrencies such as bitcoin (BTC).