Checklist and Standard Procedures for On-Chain Operations
1. Must use a Mac computer and an iPhone
Every strange thing you download could compromise your clipboard, read your data, and monitor your personal information.
2. Before completing any signature or clicking any link
Make sure you know what you are doing.
You can download GoPlusSecurity
as a plugin to assist and remind yourself.
Strictly prohibit searching for links on Google.
Strictly prohibit entering links from Twitter/TG.
Strictly prohibit entering tweet links.
Strictly prohibit clicking links sent by group friends without confirmation.
Only trust the official project party account links on Twitter (and do not believe in any airdrop phishing).
3. Check any transfer five times.
First check if the address is correct.
Second check if you are in a safe environment.
Third check if someone is pressuring you with FOMO?
Fourth check if it is the correct chain address.
Fifth check to remind yourself about social engineering courses.
4. Do not trust any information from strangers.
Greed is the first step to death.
There is no free lunch.
When you don’t know who the fool is,
assume you are the fool.
5. For acquaintances, assess their motives and sources of profit.
Most scams are committed by acquaintances.
In web3, if you need to send money and entrust it to others,
assume that this money is already lost.
If you don’t know how they make money,
then the money they make is your money.
6. Constantly remind yourself that you are in a dark forest.
Repeat steps 1-6 of this process.
Assume you will be scammed and attacked.