download Resources
contact Stay tuned

Let’s Play The Security Gamebook


The exchange of trust for individual and institutional traders and investors.

Today the common use of internet encourages the spread of our data: checking your mails, sending messages, downloading files, shopping online etc.
Most of the services you access to, require to unveil, register and store your data online. A significant portion of that data is sensitive information, for which unwanted access could have serious consequences. Particularly in crypto.
Cyber security is therefore one of the most important matters you have to deal with.

Paymium gives you the first steps to follow through the security gamebook: a short security oriented decision-making game.

Take a deep breath and find out if you master the basics of cyber security!

👉Imagine that you are walking down the street.
You have some cryptos stored on a wallet so we can say that I am now next to you, carrying your bag of coins and tokens.

1. A stranger stops in front of us, and suggests to take your bag because he's an expert. He promises to give it back to you with interests. What would you do ?
- You follow him: Go to 0.
- You don't follow him: Well done. Beware of "phishing". Always check the URL (https + domain name) of the website you are connected to.

2. You can't remember your secret code to open your wallet full of cryptos so you share it with your family. You realize now that your brother-in law has always been a bit weird...
- You eliminate all your family and friends. Go to 0.
- You pick a password that you can remember. Well done. You also set up a 2FA to confirm with your phone each time you log on the platform and secure your mailbox. (Want to know more about 2FA and how to implement it?)

3. While we're walking together, a group of junkies try to steal your bag (that I am still carrying, remember?). Fortunately, I'm used to it and master martial arts like Jacky Chan in a kung-fu movie.
- You trust in my abilities to protect the bag. Go to 0.
- You anticipate risks and move your cryptos into a hardware wallet when you don't need to make trades. Well done!

4. In the street, we meet Cristiano Ronaldo coming the other way, you ask me to take a picture. As your phone was turned off…
- We have to be fast! You give me the PIN number. Go to 0
- You don’t. Good choice ! During SIM swapping attacks, an adversary only needs few information (PIN number, recent numbers called, street address, date of birth,…) to take control of your phone and then your accounts.

0. ☠️ Game over! You put your cryptos at risk (or yourself).

To sum up:

• Always check the domain name and url on the websites you visit

• Pick a strong password and set up a 2FA (how to implement a 2FA)

• Always look for the most secure solutions, like an hardwallet.

• Keep a strong control on who has access to your information, even the least important ones!


The exchange of trust for individual and institutional traders and investors.

React to the article

Leave a Reply

Your email address will not be published. Required fields are marked *


Our site saves small pieces of text information (cookies) on your device in order to deliver better content and for statistical purposes. You can disable the usage of cookies by changing the settings of your browser. By browsing our website without changing the browser settings you grant us permission to store that information on your device.