Sponsored 4. Document recovery phrase: Compose down your top secret recovery phrase. That is a demanded step before you are permitted to move on.Third-social gathering methods: Phantom acknowledges the worth of exterior sources and provides hyperlinks to educational resources on applicable 3rd-occasion internet sites.Hackers key target is your seed