Cryptocurrency: What it is, how it works, and simple safety tips

Cryptocurrency

What it is

Cryptocurrency is internet-native money. People send it directly to each other - no bank in the middle - using a public ledger called a blockchain. Payments live as digital records, and your coins are controlled by your wallet (really: your private keys). Overview: see our  
cryptocurrency guide

How it works 

  • Addresses: like email for money; you share these to receive funds.

  • Keys: your private key proves you own the coins—lose it, lose access.

  • Blockchain: a shared database that confirms, time-stamps, and locks in every transaction.

  • Fees & speed: vary by network and congestion (some seconds, some minutes).

Wallet basics

  • Custodial wallets (exchanges): easy to start, but a company holds your keys.

  • Self-custody wallets: you hold the keys—more control, more responsibility.

  • Backups: write down the seed phrase and store it safely, offline.

Risks to know

  • Volatility: prices can swing fast.

  • Scams & phishing: fake sites, giveaway traps, support impersonators.

  • Theft: stealers and clipboard malware target wallets and seed phrases.

  • Irreversible: blockchain transfers can’t be “charged back.”

Stay safe 

  • Verify URLs; use bookmarks for exchanges/wallets.

  • Never type a seed phrase into a website or share it with “support.”

  • Prefer a hardware wallet for serious amounts.

  • Turn on MFA (app or security key) on exchanges; use unique passwords.

  • Keep your device and browser updated; avoid cracked software.

    Glossary (A–Z)

    All A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
      • Related Articles

      • Account Compromise

        What it means: Someone who isn’t you gets into your account and can act as you. They might read your messages, change settings, or try to steal money. How it usually happens: Phishing: you’re tricked into typing your password on a fake page. Malware: ...
      • Data Breach Prevention

        Why it matters Breaches drain money, trust, and time. Strong basics turn scary “what ifs” into non-events: a phish gets ignored, a stolen password is useless, a lost laptop holds only encrypted gibberish. The short, smart checklist MFA everywhere: ...
      • Data Execution Prevention

        What it is Data Execution Prevention (DEP) is a Windows safety net that stops code from running in places it shouldn’t—like the stack or heap. If malware tries to execute from those memory areas, Windows blocks it and shuts the app down instead of ...
      • Account Hijacking

        What it is (in plain words): Account hijacking is like someone slipping into your online life and wearing your name tag. They post as you, peek at your messages, even lock you out. It often starts small — a fake login page, a weak password — and ...
      • Digital Footprint

        What it is Your digital footprint is the trail you leave online—searches, posts, likes, app logins, purchases, even where your phone has been. Some of it you publish on purpose (profiles, comments). Some of it is collected quietly (cookies, ad ...