Crypto Security Guide
France Cryptos
View the map
CRYPTO SECURITY GUIDE

Protect your crypto, your identity, your home.

42 concrete measures, an emergency protocol curated by industry pros, and the trusted contacts you need when speed matters. Free, tailored for the crypto community.

Prevention — 42 measures

Measures are grouped by area of action. Tick off the ones you've already put in place — your progress is stored locally in your browser.

Your score
0/ 100
🔴Risque élevé
0/47 mesures appliquées
ESSENTIALRECOMMENDEDTECHNICAL

Discretion is your first line of defense. The less visible you are, the less of a target you become.

Never talk about your crypto holdingsESSENTIALFREE
Brief your inner circleESSENTIALFREE
Dedicated anonymous email for cryptoESSENTIALFREE
Use a pseudonym on social mediaESSENTIALFREE
Do not post your travel in real timeESSENTIALFREE
Check if your email leaked with HaveIBeenPwnedESSENTIALFREE
Shield your home address in public registries (Kbis)ESSENTIALFREE
Non-identifying profile pictureRECOMMENDEDFREE
Burner number on formsRECOMMENDEDFREE
Compartmentalize work and personal identitiesRECOMMENDEDFREE
Cut down apps with location accessRECOMMENDEDFREE
Stay low-profile at crypto eventsRECOMMENDEDFREE
Google Alerts on your nameRECOMMENDEDFREE
Audit your old postsRECOMMENDEDFREE
Professional digital-footprint audit1 K€ – 5 K€
Continuous monitoring & real-time alertsCustom quote

An attacker cannot steal what they cannot access, and cannot force you to unlock what is technically unavailable at that moment.

Hardware wallet for primary storageESSENTIALFrom €50
Offline seed phrase on durable mediaESSENTIALFREE
Never share your seed phraseESSENTIALFREE
BIP39 passphrase on top of the seedTECHNICALFREE
Address whitelist on centralized exchanges to secure your withdrawalsESSENTIALFREE
Timelock to secure your withdrawalsESSENTIALFREE
Hardware security key for 2FA (never SMS)ESSENTIALFREE
Password managerESSENTIALFREE
Verify every transaction before signingESSENTIALFREE
Revoke unnecessary token approvalsESSENTIALFREE
Separate your wallets by use caseRECOMMENDEDFREE
Dedicated device for crypto activityRECOMMENDEDFREE
Beware of unverified DAppsESSENTIALFREE
Transaction alertsRECOMMENDEDFREE
Ready-to-use decoy walletRECOMMENDEDFREE
Contingency / inheritance planRECOMMENDEDFREE
Geographically split multisigTECHNICALFREE

A physical attack starts with reconnaissance. Make that reconnaissance as hard as possible, and prepare your home to resist an intrusion.

Do not open the door to strangersESSENTIALFREE
Do not pick up unknown callsESSENTIALFREE
Stay aware in the streetRECOMMENDEDFREE
Break your routine at the first red flagRECOMMENDEDFREE
Don't get dropped off right at your home by VTC or taxiRECOMMENDEDFREE
Operational security self-assessmentESSENTIALFREE
File a "Professions Menacées" declaration (France)ESSENTIALFREE
Home security systems€500 + subscription
Security audit, close protection / escortCustom quote

The mechanisms that will let you call for help during an attack must be configured BEFORE the incident. Under duress you won't think clearly — you will only execute what is already armed and rehearsed. Test each mechanism at least once per quarter.

iPhone — Emergency SOSESSENTIALFREE
Android — SOS / Personal SafetyESSENTIALFREE
Panic-button appRECOMMENDEDFREE
Code phrase agreed with your inner circle and multisig co-signerESSENTIALFREE
Duress code on your alarmRECOMMENDEDFREE

For highly exposed profiles — high-profile founders, large holdings, periods of intense visibility — individual measures reach their limits. Security then has to be designed as a full system: a threat audit (beyond just the digital footprint), modular physical protection, training on how to behave under duress, and a documented and rehearsed crisis protocol.

This kind of setup is not something you build alone. If your profile justifies this level of protection and you have the means, reach out to domain experts who will assess your real exposure and calibrate the right setup:

G1
RAID SquareCustom quote
G2
GEOSCustom quote
G3
Lima ProtectionCustom quote
G4
BlackeyesCustom quote
G5
HeraclesCustom quote
Your score
0/ 100
🔴Risque élevé
0/47 mesures appliquées

If you're attacked

A 5-step emergency protocol. Under duress you won't have time to think — execute what is already armed and rehearsed.

⚠️
Your life comes before your funds
Never resist. Cooperate. Crypto is recoverable — your life is not.

Immediate reflexes

❤️

Cooperate calmly. Obey without resisting if a weapon is present. Funds can be replaced — your life cannot.

Buy time by any means — confirmation delays, plausible technical complications (delayed withdrawal, platform maintenance, 2FA on a device you don't have on you, active timelock). The more time passes, the higher the chance of intervention.

🧠

Commit every detail to memory: tattoos, accents, vehicles (plate, model, color), words spoken, clothing, jewelry, timing. These details are critical evidence for the investigation.

Procedure — 5 steps

1
📞Alert law enforcement

By any means available: dial 17 or 112 (EU emergency), panic button, remote monitoring service, or a trusted contact via your code phrase.

  • Exact location (address, landmark, floor)
  • Direction the attackers fled
  • Number and physical description of the attackers
  • Vehicles (model, color, plate if possible)
  • Visible weapons
  • Injured people, bystanders, possible hostages
  • Words spoken, accents, distinctive details
2
🎭Use the decoy wallet

If set up in advance (see item 31). Hand over access immediately — that alone is often enough to make attackers leave.

  • The balance must be credible against their estimate of your wealth
  • Stay natural — don't overplay your cooperation
  • Useless if your wealth is already visible on-chain or through your public habits
3
🔗Contact SEAL 911

After law enforcement, contact SEAL 911 — a free service run by the Security Alliance. Their specialist team traces stolen funds and coordinates with exchanges to freeze them. Send every involved address as soon as possible.

4
🔔Automatic monitoring of your addresses

Instant notification when funds move on your addresses. If configured before the incident, you get alerted the moment attackers move the funds.

5
📝File a police report

Keep the official receipt of your police report. If you suspect foreign interference or organized crime, also notify the DGSI (French counter-intelligence service) at securiteeconomique@interieur.gouv.fr.

Contacts & hotlines

The emergency numbers to remember and the recommended services for each aspect of the guide.

Emergency numbers

17
Police / Gendarmerie (France)
15
SAMU — medical emergency (France)
112
EU-wide emergency number
116 006
Victim support hotline (France)

Recommended services

Self-assessment questionnaire
RAID Square — Footprint audit + crypto tracing
GEOS — Close protection + training
Lima Protection — Physical protection + Lima Shield
Blackeyes — Mobile security kit + audit
Heracles — Close protection
SEAL 911 — Post-incident fund tracing
Wallert.app — Wallet address monitoring
HaveIBeenPwned — Leak check
Revoke.cash — Approval revocation
Ledger / Trezor / Tangem — Hardware wallets
YubiKey / Nitrokey / Onlykey — Hardware 2FA keys
Bitwarden / 1Password / Proton Pass — Password managers
Safe / Squads / Sparrow — Multisig
Liana — Bitcoin timelock
Ajax Systems — Alarm + remote monitoring
My SOS Family / bSafe — Panic-button apps

Frequently asked questions

Etch it on a fire- and water-resistant metal plate (or write it on fireproof paper). Never in the cloud, never as a photo, never on a connected device. Keep at least two copies in physically separate secure locations. Never share it, even with technical support — no legitimate party will ever ask for it.

Sources & references

Help spread this guide

The more this guide circulates, the more the crypto community benefits. Share it on your networks or copy the message in one click.

XTelegram
Your score
0/ 100
🔴Risque élevé
0/47 mesures appliquées