In Part 5 we delve deeper into user habits affecting security using a jail-breaking example. We then define what Hardware wallets are.
Jail-breaking devices/software can be dangerous: A person using a jail-breaking technique could risk having keylogg...