The need for thieves to steal money protected by private keys stored by wallets
- Accessing or copying wallet data files.
- Knowledge of the passphrases (or pins, etc.) used to encrypt the keys of these files.
However, if someone is tricked by a scammer, it is certainly possible that the victim has been tricked into allowing the scammer to access the computer by installing the software they suggested, perhaps by giving screen sharing access to someone they thought was a helper. Their computers may have backdoor access and/or keyloggers installed.
It would be wise to assume the worst case scenario. Create a new wallet with a new key with a new key from an existing computer. I create an on-chain transaction to move money into that clean environment.
Discover more from Earlybirds Invest
Subscribe to get the latest posts sent to your email.

