<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <title>Hodler&apos;s Handbook</title>
  <subtitle>Crypto custody, exchange risk, wallet recovery, practical security</subtitle>
  <link href="https://wechibi.com/en/atom.xml" rel="self" type="application/atom+xml"/>
  <link href="https://wechibi.com/en/" rel="alternate" type="text/html"/>
  <id>https://wechibi.com/en/</id>
  <updated>2026-05-22T00:00:00Z</updated>
  <author>
    <name>Frost Kim</name>
    <email>privacy@wechibi.com</email>
  </author>
  <rights>© 2026 Frost Kim · Hodler&apos;s Handbook</rights>
  <generator>wechibi.com static feed</generator>
  <entry>
    <title>Private Keys and Seed Phrases: A Practical Custody Guide</title>
    <link href="https://wechibi.com/en/articles/private-key-mnemonic.html" rel="alternate" type="text/html"/>
    <id>https://wechibi.com/en/articles/private-key-mnemonic.html</id>
    <updated>2026-05-22T00:00:00Z</updated>
    <summary type="text">Private keys vs. BIP-39 seed phrases — how the two relate, why one is the file and the other is the recovery instruction, and what that means for backup.</summary>
    <author><name>Frost Kim</name></author>
  </entry>
  <entry>
    <title>Self-Custody Wallets: From Browser Apps to Hardware Signers</title>
    <link href="https://wechibi.com/en/articles/wallet-complete-guide.html" rel="alternate" type="text/html"/>
    <id>https://wechibi.com/en/articles/wallet-complete-guide.html</id>
    <updated>2026-05-22T00:00:00Z</updated>
    <summary type="text">The five-rung custody ladder: from exchange custody to air-gapped multisig. Working allocation by holding value, calibrated for US holders in 2026.</summary>
    <author><name>Frost Kim</name></author>
  </entry>
  <entry>
    <title>How to Evaluate a Crypto Exchange Before You Deposit</title>
    <link href="https://wechibi.com/en/articles/exchange-evaluation-handbook.html" rel="alternate" type="text/html"/>
    <id>https://wechibi.com/en/articles/exchange-evaluation-handbook.html</id>
    <updated>2026-05-22T00:00:00Z</updated>
    <summary type="text">Four questions before depositing anywhere: regulator, proof of reserves, insolvency protections, withdrawal speed under stress. With FTX-era examples.</summary>
    <author><name>Frost Kim</name></author>
  </entry>
  <entry>
    <title>Crypto Phishing Scam Atlas 2026</title>
    <link href="https://wechibi.com/en/articles/phishing-scam-atlas-2026.html" rel="alternate" type="text/html"/>
    <id>https://wechibi.com/en/articles/phishing-scam-atlas-2026.html</id>
    <updated>2026-05-22T00:00:00Z</updated>
    <summary type="text">An updated taxonomy of 2026 crypto phishing — Permit2 batches, fake recovery services, deepfake giveaways, supply-chain hardware traps. With recovery steps.</summary>
    <author><name>Frost Kim</name></author>
  </entry>
  <entry>
    <title>Hardware Wallet Comparison After the Unboxing</title>
    <link href="https://wechibi.com/en/articles/hardware-wallet-comparison.html" rel="alternate" type="text/html"/>
    <id>https://wechibi.com/en/articles/hardware-wallet-comparison.html</id>
    <updated>2026-05-22T00:00:00Z</updated>
    <summary type="text">The five hardware wallets worth considering in 2026 — Ledger Nano S Plus, Trezor Safe 3, Keystone 3 Pro, Coldcard Mk4, Ledger Stax. Picked by user profile.</summary>
    <author><name>Frost Kim</name></author>
  </entry>
  <entry>
    <title>Cold Wallet vs Hot Wallet: A Holder&apos;s Working Split</title>
    <link href="https://wechibi.com/en/articles/cold-vs-hot-wallet.html" rel="alternate" type="text/html"/>
    <id>https://wechibi.com/en/articles/cold-vs-hot-wallet.html</id>
    <updated>2026-05-22T00:00:00Z</updated>
    <summary type="text">What </summary>
    <author><name>Frost Kim</name></author>
  </entry>
  <entry>
    <title>Five Seed Storage Methods That Survive Real Life</title>
    <link href="https://wechibi.com/en/articles/mnemonic-storage-five-methods.html" rel="alternate" type="text/html"/>
    <id>https://wechibi.com/en/articles/mnemonic-storage-five-methods.html</id>
    <updated>2026-05-22T00:00:00Z</updated>
    <summary type="text">Five places to actually store a seed phrase, ranked by survivability — metal plates, paper in two locations, Shamir splits, multisig, encrypted digital.</summary>
    <author><name>Frost Kim</name></author>
  </entry>
  <entry>
    <title>MetaMask Security Settings for Daily Use</title>
    <link href="https://wechibi.com/en/articles/metamask-security.html" rel="alternate" type="text/html"/>
    <id>https://wechibi.com/en/articles/metamask-security.html</id>
    <updated>2026-05-22T00:00:00Z</updated>
    <summary type="text">Seven MetaMask settings worth changing on day one — hardware pairing, Blockaid alerts, auto-lock, dedicated profile rule. And the monthly approval audit.</summary>
    <author><name>Frost Kim</name></author>
  </entry>
  <entry>
    <title>The Truth About 2FA, Passkeys, and Recovery Codes</title>
    <link href="https://wechibi.com/en/articles/2fa-truth-passkey.html" rel="alternate" type="text/html"/>
    <id>https://wechibi.com/en/articles/2fa-truth-passkey.html</id>
    <updated>2026-05-22T00:00:00Z</updated>
    <summary type="text">The hierarchy of 2FA in 2026: SMS, email, TOTP, push, hardware key. Ranked by defensive strength, with the carrier-level port-out PIN that closes the SIM-swap gap.</summary>
    <author><name>Frost Kim</name></author>
  </entry>
  <entry>
    <title>Passkeys in 90 Seconds for Crypto Accounts</title>
    <link href="https://wechibi.com/en/articles/passkey-90-seconds.html" rel="alternate" type="text/html"/>
    <id>https://wechibi.com/en/articles/passkey-90-seconds.html</id>
    <updated>2026-05-22T00:00:00Z</updated>
    <summary type="text">A 90-second explanation of passkeys: how they replace passwords, why they defeat phishing, where they work in 2026, and what they don&apos;t protect against.</summary>
    <author><name>Frost Kim</name></author>
  </entry>
  <entry>
    <title>Can You Photograph a Seed Phrase?</title>
    <link href="https://wechibi.com/en/articles/photo-mnemonic.html" rel="alternate" type="text/html"/>
    <id>https://wechibi.com/en/articles/photo-mnemonic.html</id>
    <updated>2026-05-22T00:00:00Z</updated>
    <summary type="text">Why a photo of your seed phrase is the worst storage method ever invented — and where to store it instead. Five failure modes observed in the wild.</summary>
    <author><name>Frost Kim</name></author>
  </entry>
  <entry>
    <title>Private Key Leak Response: The First 24 Hours</title>
    <link href="https://wechibi.com/en/articles/private-key-leak-recovery.html" rel="alternate" type="text/html"/>
    <id>https://wechibi.com/en/articles/private-key-leak-recovery.html</id>
    <updated>2026-05-22T00:00:00Z</updated>
    <summary type="text">The 30-minute recovery protocol if your private key or seed has been compromised — what to move first, what to skip, and what filing IC3 actually does.</summary>
    <author><name>Frost Kim</name></author>
  </entry>
  <entry>
    <title>What If Your Hardware Wallet Brand Disappears?</title>
    <link href="https://wechibi.com/en/articles/hardware-wallet-eol.html" rel="alternate" type="text/html"/>
    <id>https://wechibi.com/en/articles/hardware-wallet-eol.html</id>
    <updated>2026-05-22T00:00:00Z</updated>
    <summary type="text">When a hardware wallet stops being safe — not when the manufacturer says so, but when firmware updates stop. A four-question test and migration playbook.</summary>
    <author><name>Frost Kim</name></author>
  </entry>
  <entry>
    <title>USDT on the Wrong Network: What Can Still Be Fixed</title>
    <link href="https://wechibi.com/en/articles/usdt-wrong-chain.html" rel="alternate" type="text/html"/>
    <id>https://wechibi.com/en/articles/usdt-wrong-chain.html</id>
    <updated>2026-05-22T00:00:00Z</updated>
    <summary type="text">The most common $5,000 mistake in crypto: sending USDT on the wrong chain. How the same address works on multiple networks, and the three checks before every withdrawal.</summary>
    <author><name>Frost Kim</name></author>
  </entry>
  <entry>
    <title>Hardware Wallet Decision Matrix</title>
    <link href="https://wechibi.com/en/hardware-wallet-matrix.html" rel="alternate" type="text/html"/>
    <id>https://wechibi.com/en/hardware-wallet-matrix.html</id>
    <updated>2026-05-22T00:00:00Z</updated>
    <summary type="text">Eight hardware wallets, nine dimensions. The decision matrix that turns the wallet purchase from marketing copy into a spec sheet — with recommendations by user profile.</summary>
    <author><name>Frost Kim</name></author>
  </entry>
  <entry>
    <title>The 30-Point Holder Self-Audit · What&apos;s your custody score?</title>
    <link href="https://wechibi.com/en/checklist.html" rel="alternate" type="text/html"/>
    <id>https://wechibi.com/en/checklist.html</id>
    <updated>2026-05-22T00:00:00Z</updated>
    <summary type="text">Check off 30 questions and see where your crypto custody actually stands. Six dimensions: keys, wallet architecture, exchanges, anti-phishing, incident response, legacy. Five minutes, instant score.</summary>
    <author><name>Frost Kim</name></author>
  </entry>
  <entry>
    <title>Custody and Scam Timeline</title>
    <link href="https://wechibi.com/en/timeline.html" rel="alternate" type="text/html"/>
    <id>https://wechibi.com/en/timeline.html</id>
    <updated>2026-05-22T00:00:00Z</updated>
    <summary type="text">Crypto custody timeline 2009-2026: key events, exchange collapses, regulatory milestones, and what each one means for the US holder today.</summary>
    <author><name>Frost Kim</name></author>
  </entry>
</feed>
