Hey guys! I’m crypto Casey and I’m a crypto currency expert. Today I’m going to show you how to get started in investing in digital assets like Bitcoin, Ethereum, and Litecoin safely and securely step-by-step. I’m going to make this as easy as possible for you guys, but before we get started I want to share with you two important things you need to know before transforming some of your wealth into digital assets.
Number one: these types of investments are not like anything else you may be familiar with. Unlike banks, credit unions, and traditional stock exchanges there are virtually no fail safes in place to protect you if you make a mistake or if you don’t understand what you’re doing.
There’s no hotline you can call when you get stuck; there’s no corporate headquarters you can reach out to if you lose your funds; there are no FDIC insured banks behind these investments; and this all means at any time you could lose all of your investments from hackers or user error with no recourse at all. Cryptocurrency is cutting edge technology; it’s the modern-day Wild Wild West. So it requires some time and focused energy to wrap your head around. Luckily for you, I’ve done a lot of the legwork to compile this step-by-step guide to ensure you receive the knowledge and understanding you need to be successful in cryptocurrency investments.
The second thing you need to know before going any further is the golden rule of investing: NEVER invest more than you can afford to lose. High risk can lead to high reward, and we humans have a natural tendency to want to overreach, but you need to figure out an amount you’re comfortable with investing and, more importantly, an amount you can truly afford to invest. Then you need to stick with that amount and be patient in the process.
Cryptocurrency is a lot more volatile and unpredictable than the stock market. Unlike the nine-to-five in New York Stock Exchange, cryptocurrency is traded around the world 24/7. So if you want to get a good night’s sleep as a crypto investor, you need to budget the amount of money you’re going to invest and stick to it. I’ve broken down this process into 10 easy steps. So let’s get started. Step 1: this may come as a surprise to you because crypto stuff is pretty high-tech, but the first thing you need to do is get yourself some paper notebooks.
Yes, I realize some of you have never used such ancient recording techniques like a pen and paper before, but seriously buy a couple notebooks from Amazon. I personally love to use these moleskin notebooks from Amazon with grid paper. I’m a huge fan of grid paper because it helps organize information in a way that’s easy to read. You need at least two notebooks, but I suggest three.
Step number 2: use your paper notebooks to store all of your passwords, login credentials, and any other sensitive information regarding your crypto wallets, exchanges, and other accounts I’m going to walk you through setting up later on in this video. Never store your passwords or login data online with a password manager, on your phone, or any device connected to the Internet. You need to go old fashioned and store all of your essentials on the paper notebook with paper notebook backups.
This is why I recommend buying at least two paper notebooks. You should store all these notebooks in separate locations to be safe. You never know if fire may break out or with all of these crazy hurricanes and flooding, your house or your office could be affected and your paper notebook could be destroyed. Consider storing your notebook in a safe place at your house and storing the other one in a safety deposit box at a bank. Remember there are no pre-built fail safes in this technology and there are hackers everywhere trying to steal your funds.
It’s up to you to take the necessary steps to protect your investments. Also, if you decided to buy the moleskin notebook I suggested, take a moment to fill in the “in case of loss please return to” section and more importantly, the “as a reward” line. Think carefully and consider how much would you pay to incentivize somebody who found your notebook to return it safely where it belongs. Step number 3, let’s talk about passwords. Passwords related to everything crypto need to be very strong. I’m going to share with you some tips that will help you create strong passwords throughout the account setup process. Hackers are not just sitting on computers trying to guess your password.
They use programs that automatically run through massive databases of common passwords and random combinations of characters. So to combat this you need to make very long passwords containing random words and letters, capitalization and special characters.
Don’t use common phrases, famous movie lines, or a Bible verse. And NEVER use the same password for more than one account. We will be setting up a lot of different accounts later on in this video, so be prepared to create several long, strong passwords throughout the process. I don’t recommend ever storing passwords for crypto accounts on a password manager. Cloud-based password managers like LastPass and OnePassword are vulnerable to remote attacks. Even though those accounts are encrypted, if your master password is hacked then you’re completely exposed. So do not rely on one single password to protect your investments. Also never store passwords in your browser because those are vulnerable as well. That’s why I recommend only storing passwords in your paper notebooks.
Next, if any accounts require security questions, treat the answers like your passwords: create fake, long complex answers. People can easily find out what your mother’s maiden name was and where you went to high school on things like Facebook. So keep that in mind.
Also, just like your passwords, store the fake answers to security questions in your paper notebook. Step number 4: you need to ensure that your computer is secure and free of any malware before you start setting up any of the accounts and wallets I will walk you through later in this video.
There are ton of free tools and services available to scan and secure your computer. In this video I’m going to walk you through the scanning, cleaning, and securing process using Malwarebytes. Malwarebytes is a high-quality cybersecurity solution that will help you protect your computer from hackers. First, if you don’t already require a strong password to access your computer. So go ahead and make your first entry into your paper notebook: your brand-new super strong computer password. Next, let’s do a full and complete malware scan of your computer using Malwarebytes.
Open your internet browser and go to Malwarebytes.com. Scroll down to all products and under the “For Home” section, choose Malwarebytes for Mac or PC. In this video demonstration, we will install for Mac. Click “Learn More” and then click “Free Download.” Retrieve the downloaded file and open it to start the installation process. Click through the installation wizard until the installation is complete and then click “Close.” Next, open Malwarebytes on your computer and click “Scan Now.”
If you are clean, congratulations! If you have some threat files, Malwarebytes will quarantine them. Go to the quarantine section and click “Show Quarantine” to view the files that were quarantined. Then click the “Clear Quarantine” button to permanently delete all the threat files. Finally, you need to secure your freshly-cleaned computer.
I personally recommend using the paid version of Malwarebytes but there are other computer security providers like Trend Micro or similar that are just as great. Make sure you choose a reputable security solution to protect your computer. If you have a PC instead of a Mac and you want to go one step further to take your security to the max, I recommend downloading and installing a key scrambler.
Key scramblers are a great tool that prevent hidden keystroke logging malware from recording your passwords to hack into your accounts by encrypting everything you type in real-time. I recommend trying KeyScrambler by QFX, but again, there are other key scrambling tools out there you can check out as well. Or if you have an onscreen keyboard on your computer, you can elect to only type in your passwords using the on-screen keyboard. This also prevents keystroke loggers from recording your passwords. Step number 5: you will not be accessing crypto related accounts on your computer alone. Smartphones play a huge role in security and access as well.
So you need to take steps to secure your phone. First, if you don’t have one already, require a password to unlock your phone. That way if it’s ever lost or stolen, there is a barrier between a potential hacker and your investments. Make sure you log the password in your notebook for safekeeping. Next, you need to remove your phone number from any public website in social media and try to never publish your cell phone or cell phone provider publicly or to people you don’t know or trust. I know this is very difficult to do in our social media-driven world, but this is an imperative step you need to take to ensure the security of your investments.
Cellphone numbers are used to access a myriad of sensitive data including banking crypto and two-factor authentication applications we will be setting up later on in this video. Using your cell phone provider and cell phone number, there are hackers out there who conduct something called “sim theft.”
This is where hackers steal your phone’s identity by calling your cell phone provider and requesting a new SIM card. If they steal your cell phone SIM card, they can easily hack into your investment accounts and drain your funds. So the next thing you need to do to prevent this from happening is set up a passphrase with your cell phone provider that must be disclosed before activating a new SIM card. So get on the phone with T-mobile, Verizon, or whoever your cell phone provider is and set up a strong passphrase that must be disclosed before activating a new SIM card on your account. Step number 6: it’s time to create a brand new unique email address using a handle you’ve never used before anywhere else. This includes your name, nicknames, or user names you’ve used for accounts anywhere else online or offline in the past. This new email address should be used exclusively for crypto investments only.
Do not use an email address you use already and that people know about to open up crypto accounts. You need something completely random to use for the handle for your new email account, and do not use the new email address for shopping or signing up for newsletters. Only use your new email just for crypto and don’t tell anyone you don’t know or trust about it. I recommend setting up your new email account using ProtonMail or another similar email provider that prioritizes security and privacy.
I’m going to show you how to set up a brand new email account using ProtonMail. Go to ProtonMail.com and click “Sign Up.” Select the free plan and click, “Select Free Plan.” Next, choose your unique username you’ve never used anywhere else before. Next, generate a very strong password. Register a recovery email. Make sure the email address you use as a recovery has a strong password then click “Create Account.”
Verify that you are human, then click, “Complete Setup” and select, “Finish.”
Step number 7: using your newly secured cell phone, we are now going to download some two-factor authentication apps. Two-factor authentication is an extra layer of security that is absolutely crucial to setup before investing in crypto. This is how it works: when accessing an account, after entering your super secure password, you’ll be required to input a code that is generated on your two-factor authentication phone app.
These codes constantly change every twenty to thirty seconds, so no one will be able to access your accounts unless they have your cell phone at that particular moment in time. There are two different authentication apps we will be downloading: Google Authenticator and Authy. Some people prefer one over the other and some people use both. In this video, I will walk you through downloading and setting up both so you can get a feel for them. First, let’s download Authy. Go to the App Store on your phone and type in “Authy” and download the Authy app.
When it’s finished downloading, enter your cell phone number and click “OK.” Next, enter your e-mail address you created using ProtonMail and click “Next.” A window will pop up that says “Get Account Verification via Phone Call or SMS.” Make a selection and then enter the registration code in the space provided. Tap the add (+) icon on the accounts menu. You will be prompted to create a backups password.
Create a strong password, log it into your paper notebook, and enter it into the space provided. Click “enable backups” and confirm your password by entering it again. It’s important to set up a backup to ensure you can restore your accounts if you upgrade or lose your phone. The next screen provides instructions on how to set up Authenticator accounts. Once we start setting up accounts later on in this video, I will walk you through this process.
On the main screen, tap on “Settings” and then choose “Protection Pin.” Tap the “Protection Pin” button and enter a pin. This will require a pin to be entered before opening the application. Next, tap the “Protect Entire App” button and enter your PIN again. Your screen should now look like this.
Next, tap “Cancel” and then tap “Devices.” Turn the “Allow Multi-Device” setting to “Off.” Now no one else can access your Authy account on any other device except your specific cell phone. Now you’re Authy app is secure. Next, let’s download Google Authenticator. You will need a gmail account to complete this setup so if you don’t already have one, create one with a unique handle you’ve never used before and a strong password.
Go to the app store on your phone, type in “Google Authenticator,” and download the Google Authenticator app. Once it’s finished downloading, open the app and choose “Begin Setup.” You will see two options: “Scan Barcode” and “Manual Entry.” Go to your internet browser and open your Google account security page.
Next, scroll down to the 2-step verification section and click “Get Started.” Enter your gmail account password and then enter your cell phone number. Choose to receive a text or phone call to receive a verification code. Enter the code you receive in the space provided and click “Next.” Once the code is accepted, choose “Turn On,” then on the next page, scroll down and choose “Setup Google Authenticator.”
Choose the type of phone you have and click “Next.” Now go back to your cell phone and select “Scan Barcode.” Lift your phone to face the computer screen like this to scan the code. Once it’s successful, your phone will show a six digit code that changes every twenty seconds or so, along with your gmail address. Now go back to your computer and click “Next.” Enter the code currently displayed on your phone before the time expires and the code changes, and click “Verify.” Once the code is verified, click “Done.”
If you’ve been using your gmail account for a long time you’re not sure if it’s automatically logging into old devices you don’t use anymore, scroll down to the “Devices you trust section” and choose “Revoke all.” That way, no matter what device you are using to log into your Gmail, 2-step verification will be required. Now you have two different Authenticator apps. Most accounts work with the Authy app, however, some accounts only work with Google Authenticator. When setting up two-factor authentication with accounts, you must choose one Authenticator over the other. You cannot set up two-factor authentication for the same account using both Google and Authy.
Choose the one you would like to use to set up two-factor authentication for the ProtonMail address you created in the previous step. Log back into your ProtonMail account. Next, click on “Settings” and choose the “Security” tab and then click “Enable Two-Factor Authentication.” You can read their 2FA guide, and then click “Next.” Scan the QR code with your two-factor authentication device to set up your account. Then, click “Next.” Enter your password, and then enter the two-factor passcode that is displayed on your phone in authy or Google Authenticator. ProtonMail will also provide you with several one-time use recovery codes.
Save these codes in your paper notebooks. If you ever lose your phone and are unable to access your Authenticator app, these codes will be the only way you can log back into your account. You can enter these codes instead of the six digit authentication code. Note that each code can only be used once and they must be used in the listed order. So be sure to save all of the codes. Now, two-factor authentication should be required when logging into your ProtonMail account. Step number 8. Now for the moment you’ve all been waiting for, how to set up a wallet.
There are several different types of wallets out there and some wallets only support specific crypto currencies. Wallets are a big topic in crypto and warrent its own video altogether. So in this video I’m going to walk you through setting up a safe, easy-to-use, and insured wallet using Coinbase.
Coinbase has wallets that support Bitcoin, (Bitcoin Cash), Ethereum, and Litecoin. All digital currency that Coinbase holds online is fully insured. This means that if Coinbase were ever to suffer a breach of its online storage, the insurance policy would pay out to cover any customer funds lost as a result. The insurance policy covers any losses resulting from a breach of Coinbase’s physical security, cyber security, or by employee theft. Coinbase holds less than 2% of customer funds online. The rest is held offline in storage.
However, this insurance policy does not cover any losses resulting from the compromise of your individual Coinbase account or individual error. So it’s your responsibility to use a strong password and maintain control of all login credentials you use to access Coinbase. So let’s get started. A quick note once you start accessing wallets and exchanges online: it’s important to double and TRIPLE check the URL you’re accessing to make sure it’s the real one. Always ensure there is an HTTPS protocol in the URL, not just HTTP. HTTPS means that the site has an SSL or a Secure Sockets Layer protecting the information passing through the website by a user.
Always ensure that the actual URL is correct as well. There are a ton of phishing sites that pretend to be the real site in order to steal your user name and password to gain access to your account on the real web site. Once you’re a 100% sure that you’re accessing the right URL, bookmark the page and only access the site going forward using this bookmark. That way you never become a victim of a phishing site.
NEVER save any passwords on your browser or a password manager. Log the information in your paper notebooks. An email will be sent to the email address you entered. Log into your ProtonMail account and open the email from Coinbase, then click “Verify Email Address.” Next, you will be brought to a login screen to log in. An updated user agreement may display. Read over it and then click “Accept Terms.” Once logged in, you will be brought to a dashboard that shows some information about Bitcoin, (Bitcoin Cash), Ethereum, and Litecoin.
Scroll down to the “Complete Your Account” section and click “Add your Phone Number.” Choose your country, enter your cell phone number, and click “Send Code.” You’ll receive a code via a text message to your cell phone. Enter it into the field provided online and click “Submit.” Next, scroll up to the top of the page and click on “Settings.” Choose the security tab and scroll down, and choose “Enable Authenticator.”
Another code will be texted to your cell phone. Enter it into the space provided and click “Verify.” Using Authy or Google Authenticator, add the account by scanning the QR code with the Authenticator. As the instructions read on step 3 on the screen, write down the 16 digit secret code in your paper notebooks. If your phone gets lost or stolen or erased, you will need this code to link Coinbase to a new Authenticator app once it’s installed again. Do not ever share this code with anyone.
Keep it in your paper notebook and only use it to link Coinbase to a new Authenticator if your phone is lost, stolen, or erased. Once the QR code has been scanned, enter the six digit code provided by your authentication app, then click “Enable.” Now your two-factor authentication is set up for Coinbase.
In this next section, I recommend keeping the settings to require a verification code to send ANY amount of digital currency for an extra layer of protection. Next, click on “Accounts” and scroll down and click on “Vault.” A vault is a more secure type of wallet Coinbase offers. It’s ideal for large balances, but it also delays any withdrawals and requires multiple approvals before transferring money out of it. If you are planning to buy and hold Bitcoin, (Bitcoin Cash), Ether, or Litecoin for a long period of time and don’t mind waiting a few days for withdrawal approvals, this is a great type of wallet to set up.
Even if you’re looking to be more of an active trader, let’s go ahead and create a vault for you as it is a safe wallet to store Bitcoin, (Bitcoin Cash), Ether, and Litecoin for long- term investing. So click “Create Vault” and choose the currency you wish the wallet to support. In this video, I’m going to choose Bitcoin.
Choose a name for your Bitcoin vault and click “Next.” You’ll be brought back to a screen that allows you to choose whether you will approve your own withdrawals or if you would like to invite other people you trust to co-sign on the withdrawals. In this video, I’m going to select individual and click “Next.” Withdrawals from your Coinbase bitcoin vault wallet need to be approved using two email addresses.
I suggest using the Gmail account you created or freshly cleansed during this video, because if you followed the steps, a strong password protects it, as well as two-factor authentication. Next, enter the email address and click “Next.” Open the email, click “Use this email to approve withdrawals” and then you should be all set.
On the screen, you will see the two email addresses you will need to access to approve withdrawals, as well as the email addresses and a phone number that will be notified when withdrawals are requested, and you’ll see a 48-hour time delay is required before withdrawals will occur. Now click “Continue to vault.” Under the accounts menu, you will see your Bitcoin wallet your Bitcoin vault, an Ether wallet, and a Litecoin wallet.
If you plan on investing in Ether, (Bitcoin Cash), and Litecoin, I urge you to repeat the process and create vaults for those currencies as well. For long term investments, hold the Bitcoin, (Bitcoin Cash), Ether, or Litecoin in the corresponding vaults. For short-term and trading purposes, hold Bitcoin, (Bitcoin Cash), Ether, and Litecoin in the regular Coinbase wallets. Great! So now you have a Bitcoin, (Bitcoin Cash), Ether, and Litecoin wallet set up.
In another video, I will show you how to set up other types of wallets like cold storage for increased security, as well as wallets that support other cryptocurrencies like Iota, Stratis, and EOS. Step number 9: now it’s time to create accounts for cryptocurrency exchanges.
Coinbase is the simplest and most user-friendly exchange and since we set up your first wallets on Coinbase, let’s go ahead and finish setting up your account so you can use the exchange. A quick note about using Coinbase as an exchange: its ease and convenience comes at a price. Buying and selling Bitcoin, (Bitcoin Cash), Ether, and Litecoin on Coinbase is a little pricier than other exchanges.
In another video, I will show you how to set up an account with GDax, which is an exchange owned by Coinbase that allows you to buy and sell Bitcoin, Ether, and Litecoin with lower fees. I will also show you how to set up accounts with other exchanges that allow you to buy and sell other cryptocurrencies in addition to Bitcoin, Ether, and Litecoin. So let’s finish setting up your Coinbase account. Going back to Coinbase, go back to the dashboard and click “Add a payment method.”
You can choose to add a bank account, credit card, debit card, or set up a wire transfer to fund your account. Bank account transactions can take several days to hit your account, however, the moment you buy using a bank account, the price will be locked in at whatever it was in that moment. However, the trades can take up to four to five days to process and hit your Coinbase account. To add a bank account, select your bank and link your account by providing the login credentials to your bank, account number, routing number, and by confirming a small deposit and withdrawal by Coinbase. Credit and debit cards are good to make small investments.
You simply need to enter your credit or debit card details, however, only MasterCard and Visa are accepted at this time. After entering your credit card information, you will need to confirm the withdrawal amounts from Coinbase on your credit card statement to verify the card for use.
Setting up a wire transfer requires verifying your identity. Click “Verify ID.” You will need to enter your legal name, date of birth, physical address, the last four digits of your social security number, select from a multi-select list what you use Coinbase for – whether it be investing, trading, or trading on some other exchanges – disclose the source of your funds – whether it be from an occupation or other investments – and then choose your current occupation.
And once your identity has been verified, click “Continue” and you will be brought back to the dashboard. When selecting wire transfer, now you will see a reference number you can use to set up a wire transfer with your bank account. Once your payment methods have been verified, Congratulations! you’re ready to start investing in cryptocurrency… almost.
Step number 10: now that all of your accounts have been set up and you’re ready to invest, there’s one more step you need to take. Most of the things covered in this video are not easy to figure out on your own. A lot of people investing in crypto are young, single Millennials, and if something were to happen to you, I’m sure there’s someone out there you would want to benefit from your investments.
However, you know that your mom, grandma, boyfriend, or whoever you would want to benefit from your investments in the event of your death would probably have a hard time figuring it all out by themselves. Using your paper notebooks, record detailed instructions from this video on how to safely access, transfer, and cash in your funds if they ever needed to do so. Try to keep it simple, but also detailed enough so even your grandma could do it.
I also recommend that you go the extra mile and create a will, trust, or other documents that could be legally executed in the event of your death to carry out your wishes. So on that happy note, thank you for watching my video I hope you found this video helpful and easy to follow. Be safe out there!