When you use a crypto exchange, it is important to make sure that you take all necessary precautions to avoid being hacked.
Many trading platforms claim API keys are safe because they do not have withdrawal rights. While it's true that a potential hacker cannot directly withdraw funds to another wallet using your API keys, there is still a risk that they can be used for a technique called “contra trading.” Contra trading is a market manipulation tactic by which a hacker generates enough trading volume to move the market in their desired direction and profit from that move. Generally, it involves lower cap tokens, as they require less volume to produce price movements.
By following the steps below, you can dramatically lower the chances of your account potentially being controlled by a malicious actor.
Activating 2FA on the exchange and Gainium is the first step to safeguard access to your API keys. This is a standard security practice; however, hackers can sometimes find security holes in the platforms and access the database directly. That's why it's important to take additional security measures so that in the event that a hacker manages to obtain your API keys, they would be rendered useless anyway.
Exchanges usually allow extra security measures to ensure your API keys are safe. One of such measure is IP whitelisting. By allowing only certain IPs to use the API key, you can ensure that they will not work even if they were leaked. Remember that the IP to whitelist is not your computer IP, but the IP of Gainium's server, which connects to the exchange. During API creation, enable IP whitelisting and add Gainium's server IP:
78.128.60.89
78.128.43.82
78.128.8.36
78.128.43.168
217.174.152.25
If you only trade specific token pairs, activating the token symbol whitelist can enhance the security of your API keys even further. Remember that contra trading usually involves obscure tokens with lower market caps, as they are easier to produce price movements.
By taking the above steps, you will ensure that your account stays protected from hackers.
Features
Use Cases
Resources
Help & Support
All rights reserved. Copyright © 2024.