After the Bybit hack — where $1.5 billion was stolen through a compromised multi-sig signing process — exchange security is back at the top of everyone's mind. Most security advice is either too basic or too paranoid. Here's the practical middle ground.
The Threat Model
Before solutions, understand what you're defending against:
Threats you can control:
- Phishing — fake login pages stealing credentials
- SIM swap — attacker takes over your phone number to bypass SMS 2FA
- Malware — keyloggers or clipboard hijackers
- Weak passwords — credential stuffing from breached sites
- Social engineering — convincing support to reset your account
Threats you can't control:
- Exchange hack (Bybit, Mt. Gox)
- Insider threat
- Regulatory seizure
- Smart contract exploit
Focus your security practices on what you control. Handle what you can't through asset allocation.
The Practical Security Stack
Layer 1: Authentication
Use a hardware security key (YubiKey) for 2FA. Not SMS, not even TOTP.
SMS can be SIM-swapped. TOTP codes can be phished — the attacker shows a fake login page, you type the code, they replay it. Hardware keys use FIDO2/WebAuthn, cryptographically bound to the real domain.
Security ranking:
1. Hardware key (YubiKey) — phishing-proof
2. Passkeys — nearly phishing-proof
3. TOTP app — phishable but better than SMS
4. SMS — easily bypassed via SIM swap
5. Email-only — worst option
Layer 2: Email Security
Your exchange email is the master key. If compromised, everything falls.
- Use a dedicated email for crypto exchanges (not your main)
- Enable 2FA on the email itself
- Don't use this email for anything else
- Consider ProtonMail or Tutanota
Layer 3: Withdrawal Whitelisting
Pre-approve withdrawal addresses. New addresses require 24-48 hour waiting period. Even if an attacker gets full account access, they can't withdraw immediately.
Enable this on every exchange. The minor planning inconvenience is worth the protection.
Layer 4: Asset Distribution
No single exchange should hold more than you're willing to lose:
- Exchange balance: < 10% of total (active trading only)
- Cold storage: > 70% (hardware wallet)
- DeFi positions: < 20% (active yield farming)
Layer 5: Operational Security
- Don't discuss holdings publicly
- Use VPN on public WiFi
- Keep OS and browser updated
- Don't click links in exchange emails — navigate directly
- Bookmark exchange URLs and only use bookmarks
Exchange Security Features Comparison
| Feature | Binance | Kraken | OKX | Bybit |
|---|---|---|---|---|
| Hardware key 2FA | Yes | Yes | Yes | Yes |
| Withdrawal whitelist | Yes | Yes | Yes | Yes |
| Anti-phishing code | Yes | No | Yes | Yes |
| Login notification | Yes | Yes | Yes | Yes |
| API IP restriction | Yes | Yes | Yes | Yes |
The anti-phishing code (Binance, OKX) is underrated: set a custom phrase that appears in every legitimate email. If an email doesn't have your code, it's phishing.
API Key Security
For developers building with exchange APIs:
- IP whitelist every API key
- Separate keys for different functions
- Never enable withdrawal permission unless required
- Environment variables, never hardcoded
- Rotate monthly
# Correct
import os
api_key = os.environ.get('EXCHANGE_API_KEY')
# Never do this
api_key = "your-actual-key-here"
Lessons from Bybit
The Bybit hack compromised the multi-signature signing UI itself. Signers thought they were approving legitimate transactions but were actually signing malicious ones.
Takeaways:
- Even multi-sig can fail through UI-layer attacks
- Cold storage doesn't help if the cold-to-hot process is compromised
- Proof of Reserves proves solvency at a point in time, not security
For users: diversification across exchanges is the only practical mitigation for exchange risk.
Minimum Viable Security Checklist
If you do nothing else:
- Hardware key 2FA on exchange + email
- Dedicated email for crypto
- Withdrawal whitelist enabled
- No more than 10% on any single exchange
- Anti-phishing code set (where available)
Takes 30 minutes and provides 95% of the security benefit. For exchange-specific setup guides covering security features, check our tutorials at KK Investing — covering registration and security configuration in 33 languages.
Security guides and exchange tutorials at https://kkinvesting.io
Top comments (0)