Instead of using a general-purpose computer (with its potential for hidden vulnerabilities), you could consider using a "hardware wallet" instead to securely manage your private keys.
In this chapter, you will learn:
What are "hardware wallets"
How to use and acquire them
What are the risk associated with using them
Some recommended tips when using hardware wallets