It’s hard to survive the bear market, but don’t make these mistakes in the bull market
库神钱包
2020-11-26 05:19
本文约1507字,阅读全文需要约6分钟
Remember this, it can save lives at critical times.

Recently, Kuku heard a story from a friend who beat his feet and chest. He received a phishing email claiming to be from a large exchange, and all 3 bitcoins were stolen by accident! The most painful thing in the world is this. I finally survived the bear market, but I didn't expect that in the bull market, my assets were stolen by hackers.

Due to the anonymous and difficult-to-trace characteristics of cryptocurrencies, online fraud against encrypted assets occurs frequently, especially in the current bull market. Bitcoin is about to break through 20,000 US dollars, and other currencies are also rising particularly sharply. Presumably the hackers are already staring at the rising market, ready to move.

Encrypted asset security cannot be ignored! In the bull market, it is serious to prevent the money in your pocket from being stolen by hackers. So how should we identify and prevent crypto asset cyber fraud?

We may encounter the following situations:

1. Email scams

What do you do if you receive an email telling you that there is an issue with your account and that you need to click on a link in the email to verify it? If you clicked on this link, I regret to inform you that your cryptocurrency is at risk of being stolen.

Many scammers choose emails for fraud. The message embeds a redirect to a fake website (similar to the original) that prompts you to log in. In this way, scammers can obtain the information of the log-in, thereby stealing cryptocurrency.

2. Social media scams

In recent years, there have been more and more gift interactions on Twitter, and many scammers have set their sights on Twitter. So if you see a very popular tweet, the content shows that your favorite exchange or KOL is giving gifts, as long as you send them 1BTC/ETH/KCS, the other party will return double or N times. Don't doubt it, it's a scam. And the high probability of replying that the gift has been received in the hot comment is a tool person.

3. Telegram group scam

The common telegram group fraud is generally that scammers pretend to be managers or users, and privately chat with members to commit fraud. This type of scam has a long cycle, and scammers will lurk in the official communities of exchanges or wallets. When users share the problems encountered in the group, scammers will contact the users privately, pretending to be managers to defraud users of personal information or posing as users with the same experience to defraud users of trust.

Remember, do not disclose your private key and password under any circumstances.

4. Telephone Scams

Telephone fraud is the most common form of fraud, and many people have encountered it. If you receive this kind of call, the other party claims to be the customer service of xx exchange, claiming that the platform is doing activities, and has set up free "cryptocurrency exchange group", "coin speculation group", and "investment group", with professional analysts Bring orders to communicate in the group, add a WeChat/Telegram group to pull you into the group for free. Remember, this is a liar. When you enter the group, you will find that the people inside either let you register for the pheasant exchange to deposit coins, or let you buy altcoins. In short, they use various methods to induce you to be deceived.

Of course, in addition to guarding against fraud, we must also pay attention to depositing coins safely. Recently, many friends just want to make more money in the market because of the rising market, but ignore the most important issue of asset safety.

In this way, the mistake of putting the cart before the horse is committed. Only when the assets are safe, the income obtained is the effective income. Otherwise, if you only care about making money, and the coins are gone in the end, wouldn’t it be a waste of time to fetch water from the bamboo basket and make wedding dresses for others in vain.

Over the years, most assets have been stolen from hot wallets. Why? To give you an easy-to-understand example, on October 15, the People's Court of Yuecheng District, Shaoxing City, Zhejiang Province tried the case of Sun and others using a Trojan virus to illegally control a computer information system, and made the verdict public on October 19. The verdict shows that 5.59 million well-known APP users' mobile phones have been implanted with Trojan horses, and automatically click advertisements secretly when the screen is locked. Just imagine, if the Trojan horse does not operate point advertisements but performs more sensitive operations...

In fact, most of the theft of encrypted asset hot wallets is actually the same as the theft of funds in Alipay, WeChat wallets, and bank apps that we often hear in the news. Our mobile devices are connected to the Internet 7X24 hours a day. The environment in which hot wallets operate is very complicated. There are a large number of apps installed in our daily life, and any problem with one of these apps may monitor our devices at any time. In front of hackers, the "encrypted assets" in these hacked devices are almost equivalent to "streaking"!

Therefore, I suggest that you don’t forget about your asset security during the bull market, choose a reliable cold wallet to store coins, and don’t let your assets "streaker". The main function of the cold wallet is to synthesize the private key, only the private key is in the When it is in your hands, it means that the highest control over the assets is in your hands.

库神钱包
作者文库