"KEEP" HOLDING This is a Crypto Currency TA. The Crypto we are talking about is KEEP. KEEP Network "
The Keep Network is a protocol that allows public blockchain users and apps to privately transfer and store data in off-chain containers called “Keeps.” Users can stake KEEP tokens to be randomly selected to earn fees by performing services on the network such as encryption or data storage. - Google"
More Information on their website by reading their white Paper.
Keep Network was listed on Coinbase platform and recently release in Binance. Usually, this means the crypto has an ability to pump.
KEEP network has a Max supply of 1 billion coins which means, this crypto is a deflationary coin. This coin has a similar supply as ChainLink.
There are about 57% of the supply circulating means there are still supply being distributed to the market.
Keep Network Came around March of 2020 so this is a fairly new coin. In the future, if this coin succeed, I believe this coin can reach more than 2 dollar plus.
Base on TA, we are currently in a Accumulation Phase, the Moved happened so patience is indeed. Another thing is that Bitcoin must remain bullish or consolidate.
This is not a Financial Advice but more so on the TA and the FA of the coin.
Thank you!
Holding
The FULL Security Guide to keep your money SAFEEmail:
- Email Providers
- Any reputable email provider with 2FA will do
- If you want to get more into privacy and encrypting emails there is Protonmail or Preveil
- You can alternatively also hook up your current email with the Thunderbird email client (use to be managed by Mozilla Firefox) it is overseen by a volunteer board of contributors.
- 2FA - This is important, activating 2FA on your email is just as important as having it on exchanges.
- Create an email specifically for Crypto, but also avoid using crypto keywords / personal information in the email, treat your email address like its public information.
- Be on the lookout for Phishing emails, I made a post on how to identify phishing emails along with some useful tools here | How to spot a phishing email |
- Quick tips for emails:
- Don't trust email links
- Double check the address bar of login pages
- Know the levels of a domain
- Check to see if your crypto sites allow a anti-phish banner that displays a code with their emails that you set.
- Tracking pixels are also a thing, there not malicious in themselves, but they can potentially let attackers know if you have open an email / let them know the email exist and is active.
Passwords / PINs:
- Don't reuse them EVER
- Use strong secure passwords, passwords managers make these easy to manage and generate passwords.
- This includes your phone and 2FA app, if you have a weak pin (1234) for your phone and someone takes it, remember your 2FA app is then available (if same pin, or no pin/pass set), your email is automatically signed in (same for other accounts auto signed-in), and they can access your text messages.
- Don't use words relating to crypto or personal information in your passwords (or email), if they are compromised in a breach, assume they will search for these terms to target crypto users and try the same combo against crypto sites or figure who you based on the information (email & password) and pivot to finding public information that could lead to them answering challenge questions for password resets. (Your first pet, is it posted on Facebook? How about your car? Your first girlfriend/boyfriend?)
- Password Managers: These work wonders when managing passwords securely. They generate random strong passwords which can be adjusted, and its all kept in an encrypted database file, so even if a attacker gets access to it, they won't be able to access it without the password.
- KeePass
- BitWarden
- LastPass
- 1Password
- Don't save passwords in your browser
- Does it require verification for you to use the password? Also I tend to find extensions being more buggy as they have to interact with more 'moving' parts and changing configurations, and generally more people try to target and exploit browsers.
2 Factor Authentications (2FA):
- Enable on everything possible
- Use 2FA Apps instead of SMS whenever possible, SIM Swap attacks are real, and more common than you think.
- 2FA Apps
- Authy (Linux | Windows | macOS | Iphone | Android)
- Google Authenticator (iOS | Android)
- Microsoft Authenticator ( iOS | Android)
- LastPass Authenticator (Browser Extension | iOS | Android | Windows Phone)
-Hardware Keys
- These are physical 2FA device
- Backup codes:
- When you activate 2FA on any account you should have the ability to generate backup codes, these are used incase you lose access to your authenticator, TREAT these like your seed phrases. Use them by logging in with your user and pass, and use these backup codes in place of the 2FA code you usually enter.
- DO NOT take pictures of your QR codes, if you screenshot it, might end up syncing somewhere you don't want it to and if it ever gets compromised they have the ability to continually receive your 2FA code.
- Also, DO NOT sign up for your 2FA app or any crypto service for that matter using your work or school email address. You lose access to that email, then consider all accounts gone as you won't be able to access the codes if you switch devices.
Wallets
- Learn the difference between the different wallets
- Cold wallets will always be more secure than any hot wallets as they aren't connected to the internet
- Top trusted hardware wallets:
- Ledger
- Trezor
- Verify the details you are confirming on your hardware wallet device. the wallet app interacting with your cold wallet device could be compromised, but you would still be safe using it, as long as you verify each action on the cold wallet device, and reject the transaction if anything seems off.
Seed Phrases : Treat these as they are the keys to the kingdom (Keep offline and out of your notes app)
- Less Secure:
- Write down on paper and either break up the phrase and place in separate secure locations or hide them like the the FBI is going to come search your house
- Secure on USB
- Get a file shredder (securely deletes data, and overwrites it)
- Download password manager (optional)
- Disconnect device from internet
- Enter seed phrase into password manager / create encrypted file
- Put on a freshly reformatted USB / datalocker (Worms like to spread by USB)
- Save to USB, and shred the original using the file shredder software
- Hide USB
- Another device / old phone
- Factory reset
- Set Pin / Pass
- Download 2FA app and password manager / file encryption tool
- Disconnect from internet FOR GOOD (Treat this like a cold wallet)
- Back up 2FA and seed phrases
- Hide device
VPNs / TOR:
- Privacy vs Anonymity
- Privacy is the ability to keep your data and information about yourself exclusive to you (They know who you are, but not what you do).
- Anonymity is about hiding and concealing your identity, but not your actions. (They know what you do, but not who you are)
- Think about what your goal is, I commonly associate privacy with VPN and anonymity with TOR
- Both encrypt your data before leaving your device, then routes it through proxy servers to mask your IP/Location. VPNs you have to trust the provider (ensure they state there is a no log policy) while TOR runs through servers ran by volunteers (don't think governments don't run their own) and lets you access the dark web. Here is a more in-depth comparison on VPN vs TOR.
- Personally Its worth paying the few bucks a month for a paid tier of the VPN service.
- VPN Providers - Zero log VPN services:
- ProtonVPN
- Nord
- Mullvad
- TOR
- Brave offers TOR, but I would treat this more like a VPN
- If being anonymous is your goal the only real way to achieve this is running Tails off a USB.
Browsers (Excluding TOR):
- Top 3 Browsers built for privacy
- Firefox
- Epic
- Brave (I know Brave draws criticism but I made a technical post showing how the trackers didn't show up within the metamask extension through brave compared to Google Chrome.)
- Search Engine for privacy: DuckDuckGo
- Extensions
- One of the most dangerous threats I think that aren't taken seriously are extensions. These can start out legitimate, then through an update turn malicious. These will then be removed from the webstore, but not your browser.
- Some will be removed the store due to not being supported anymore which = no more updates, and no more updates = vulnerabilities that won't be fixed
- If you have Google Sync activated, these extensions will also sync to all those devices
- Remove any extensions you don't need, check to see there still available on the store, and even search them to see if some security article like this pops up about it.
- Check the privacy practice tab of the extension to see what data it collects.
Other General Safety Tips for PC and Phone:
- Harden your PC (Guide is for Windows 10, but can translate to other OS)
- Update OS and any software // turn on automatic updates - Everything you download is an attack vector
- Set firewall rules - Default deny, open only p855orts you need, disable rules you don't need
- disable remote access
- Install AV // Malwarebytes for removing malware
- Turn on encryption
- Setup user accounts // privileges'
- Strong password
- Whitelist addresses if possible (Some exchanges allow you to designate a address as 'safe' any other transactions besides those won't go through)
- If you use a encrypted messaging service, I highly recommend Signal, if you haven't seen their reply regarding a subpoena you should
- Lock down your social media accounts (go to security settings, turn off being able to be found via search engine, ad related settings, change who can view your posts, etc)
- Don't disclose your holdings and earnings
- Don't access your crypto on your work computer
- Don't answer PMs about winning some contest or some amazing opportunity
Phone:
- Unique pin / password for the phone
- download a password manager
- email account purely for crypto
- pin / password (different than getting into your phone) for your 2FA app.
- Don't lend phone out
- Avoid apps you don't need, read the 3 star reviews as they are the most honest)
- Download VPN / be aware of the wifi your connecting to
- Be aware of phishing
- Call your service provider and see if they can lock your SIM card and prevent SIM swapping.
ETHUSADETH/USD
ETH is been running up and down to make and test to another bullish.
It's advisable to set a stop loss when trading on this market.
Another test position will be considered soon.
Good luck.
1INCH DEEP IN YOUR... [RISKY]1INCH has been trending sideways in this channel for a while now.
With the news yesterday that they released their 1INCH DeFi wallet and C.Z. (CEO of Binance) tweeting an hour ago (at the time of writing this) announcing that Binance is an investor in the 1inch Network then I believe that this might be the next coin to pump.
Do I believe in it? I don't really know much about it. But I believe with the recent news this can go up in by a good amount in the next upcoming days.
In regards to the Technical Analysis of it, the MACD is showing crossing upwards and showing bullish movement.
Suggested buy-in: $5.5 and under.
Suggested stop-loss: You could set a stop loss under the trending channel. But this is a RISKY HOLD. As of right now I won't be setting any stop loss but I would recommend that you decide this for yourself. I will update this step if I end up feeling cold feet about it.
THETA is a very excellent cryptographic. Walking in the FIBOTechnical analysis regarding the price of THETA NETWORK in relation of dollar Tether for the next scenarios, based on daily movement.
disclaimer
*** In accordance with CVM Instruction No. 598, of May 3, 2018, Art. 21, I declare that the recommendations of this analysis reflect solely and exclusively my personal opinions and perceptions and that they were prepared independently and autonomously. Not being considered a purchase and/or sale recommendation. ***
Any questions do not hesitate to contact me. I'm happy to be able to help you in the best way I can. 🙏
HEDERA heading for the ascent. Very interesting project!Technical analysis regarding the price of HEDERA HASHGRAPH in relation of dollar Tether for the next scenarios, based on daily movement.
disclaimer
*** In accordance with CVM Instruction No. 598, of May 3, 2018, Art. 21, I declare that the recommendations of this analysis reflect solely and exclusively my personal opinions and perceptions and that they were prepared independently and autonomously. Not being considered a purchase and/or sale recommendation. ***
Any questions do not hesitate to contact me. I'm happy to be able to help you in the best way I can. 🙏
ATOM is walking very promisingly in the dailyTechnical analysis regarding the price of COSMOS in relation of dollar Tether for the next scenarios, based on daily movement.
disclaimer
*** In accordance with CVM Instruction No. 598, of May 3, 2018, Art. 21, I declare that the recommendations of this analysis reflect solely and exclusively my personal opinions and perceptions and that they were prepared independently and autonomously. Not being considered a purchase and/or sale recommendation. ***
Any questions do not hesitate to contact me. I'm happy to be able to help you in the best way I can. 🙏
BAND gaining momentum after Google announcementTechnical analysis regarding the price of BAND PROTOCOL in relation of dollar Tether for the next scenarios, based on daily movement.
disclaimer
*** In accordance with CVM Instruction No. 598, of May 3, 2018, Art. 21, I declare that the recommendations of this analysis reflect solely and exclusively my personal opinions and perceptions and that they were prepared independently and autonomously. Not being considered a purchase and/or sale recommendation. ***
Any questions do not hesitate to contact me. I'm happy to be able to help you in the best way I can. 🙏
Price projection for next daily SOL/USDT scenariosTechnical analysis regarding the price of SOLANA in relation of dollar Tether for the next scenarios, based on daily movement.
disclaimer
*** In accordance with CVM Instruction No. 598, of May 3, 2018, Art. 21, I declare that the recommendations of this analysis reflect solely and exclusively my personal opinions and perceptions and that they were prepared independently and autonomously. Not being considered a purchase and/or sale recommendation. ***
Any questions do not hesitate to contact me. I'm happy to be able to help you in the best way I can. 🙏
LINKUSDT 4h can seek such price projections.Technical analysis regarding the price of CHAINLINK in relation of dollar Tether for the next scenarios, based on 4 hour movement.
disclaimer
*** In accordance with CVM Instruction No. 598, of May 3, 2018, Art. 21, I declare that the recommendations of this analysis reflect solely and exclusively my personal opinions and perceptions and that they were prepared independently and autonomously. Not being considered a purchase and/or sale recommendation. ***
Any questions do not hesitate to contact me. I'm happy to be able to help you in the best way I can. 🙏
QUANT with incredible recovery potential! What do you think!?Technical analysis regarding the price of QUANT in relation of dollar Tether for the next scenarios, based on daily movement.
disclaimer
*** In accordance with CVM Instruction No. 598, of May 3, 2018, Art. 21, I declare that the recommendations of this analysis reflect solely and exclusively my personal opinions and perceptions and that they were prepared independently and autonomously. Not being considered a purchase and/or sale recommendation. ***
Any questions do not hesitate to contact me. I'm happy to be able to help you in the best way I can. 🙏
BITCOIN in the diary will be able to reach that level!? Will be?Technical analysis regarding the price of BITCOIN in relation of dollar Tether for the next scenarios, based on daily movement.
BITCOIN's price is moving in a strong upward trend, forming ascending tops/funds, respecting this LTA ~yellow upward trend line~ and, it is consolidated in these last days, close to this very interesting region of resistance that, by the way, is holding the price and keeping it in the $ 56~58K range.
I believe that by breaking this region, the price will be able to reach the projected levels there at $ 64~65K, which is projected through Fibonacci.
34-period EMA driving the price and taking a parallel distance from the 89-period EMA.
In the project graph, the levels (green lines) that the price may look for in the next scenarios. (Fibo channels that respect a lot)
disclaimer
*** In accordance with CVM Instruction No. 598, of May 3, 2018, Art. 21, I declare that the recommendations of this analysis reflect solely and exclusively my personal opinions and perceptions and that they were prepared independently and autonomously. Not being considered a purchase and/or sale recommendation. ***
Any questions do not hesitate to contact me. I'm happy to be able to help you in the best way I can. 🙏
BITCOIN making your corrections! Can we go up again!?Technical analysis regarding the price of BITCOIN in relation of dollar Tether for the next scenarios, based on daily movement.
The price is with rising top / bottom formations as its main/macro trend. It has been gaining strength and is in an organic way, with a notable financial volume. In my perception, the price is correcting and may stop at the location marked on the chart. We also noticed the presence of the Elliott Waves being realized. Next, can we have stronger corrections like A, B and C to end your cycle? Who knows!?
RSI> 50 gaining strength, but falling.
MACD with buying mass driving the price a little.
Exponential Moving Averages in an upward fashion and taking parallel spacing between both, of 34 and 89 periods.
disclaimer
*** In accordance with CVM Instruction No. 598, of May 3, 2018, Art. 21, I declare that the recommendations of this analysis reflect solely and exclusively my personal opinions and perceptions and that they were prepared independently and autonomously. Not being considered a purchase and/or sale recommendation. ***
Any questions do not hesitate to contact me. I'm happy to be able to help you in the best way I can. 🙏