Home > web3.0 > How Newbies Can Protect Cryptocurrency Assets

How Newbies Can Protect Cryptocurrency Assets

Jennifer Aniston
Release: 2024-09-27 17:12:02
Original
544 people have browsed it

Methods to protect cryptocurrency assets: 1. Do not import private keys into unknown third-party websites; 2. Do not download and use wallet applications from unknown sources provided by third parties; 3. When the wallet is authorized by the site, Be sure to check whether it is a legitimate web page; 4. Please regularly check whether the wallet has authorized unfamiliar sites and cancel the authorization in time.

How Newbies Can Protect Cryptocurrency Assets

Recently, criminals have released investment inducement information on Twitter, Telegram, WeChat, IM and other channels to guide users to authorize on phishing sites wallet, causing loss of user assets. This article will introduce this fraud model.

1. Attack process

  1. Criminal gangs build high imitation phishing platforms.
  2. Through various community group chats such as Telegram/Discord, we promote high rebates to induce users.
  3. Write/record a complete access process, set a lower understanding/participation threshold, and guide users on how to create wallets and access pages/projects.
  4. Package items to increase credibility. There are many specific methods, such as relying on the Ouyi platform to allow its phishing projects to be accessed through the Ouyi platform (such as DAPP browser) to increase user trust.
  5. Induces users to access the phishing platform. When users connect their wallets and authorize, their wallet private keys, signatures, mnemonic phrases and other information will be uploaded by the phishing platform. Criminal gangs can obtain user-related information in the background. It is equivalent to controlling the ownership of the user's wallet.
  6. Criminal gangs use the obtained wallet information to steal coins and other operations, causing users to lose funds.

Another situation is that criminals trick target users into connecting to their wallets on a phishing platform and completing signatures, but users actually don’t know what the content of their signature is, and hackers obtain the signed content. , organize the application data, and complete the application.

2. Example

As shown in the picture below, the scammer creates a group or private chat on Telegram and guides users to authorize wallets on unknown platforms. When encountering this situation, do not believe it easily, do not enter the platform recommended by the other party, and do not connect or authorize the wallet!

How Newbies Can Protect Cryptocurrency Assets

3. Security Tips

1. Do not import private keys to unknown third-party websites.

2. Do not download and use wallet applications from unknown sources provided by third parties.

3. When authorizing the website, the wallet must check whether it is a formal webpage.

4. Please regularly check whether the wallet has authorized unfamiliar sites and cancel the authorization in time.

Q: How to check Dapp authorization status?

A: Open the Ouyi official App, switch to [Web3 Wallet], click [Authorization], view the Dapp authorization history, or click to cancel authorization.

How Newbies Can Protect Cryptocurrency Assets

5. Your use of third-party DApps will be governed by the DApp's "User Agreement" and "Privacy Policy", and the DApp will be directly and solely responsible to you. Responsibility has nothing to do with Ouyi Web3 Wallet. Please ensure that the DApp is safe and reliable, pay attention to risks when using it, and avoid asset losses!

Due to the anonymity and decentralization of digital assets, stolen assets in wallets are often difficult to recover. Users are advised to be vigilant and guard against being deceived.

The above is the detailed content of How Newbies Can Protect Cryptocurrency Assets. For more information, please follow other related articles on the PHP Chinese website!

source:php.cn
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Latest Articles by Author
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template