Checklist and Standard Procedures for On-Chain Operations
1. Must use a Mac computer and an iPhone
Every random thing you download could compromise your clipboard, read your data, and monitor your personal information.
2. Before completing any signatures and clicking links
Make sure you know what you are doing.
You can download GoPlusSecurity
as a plugin to assist yourself.
Strictly prohibited to Google search links.
Strictly prohibited to enter links from Twitter/TG.
Strictly prohibited to enter links in tweets.
Strictly prohibited to click on links sent by group friends unless confirmed.
Only trust the official account links of project parties on Twitter (and do not believe in any airdrop phishing).
3. Every transfer must be checked 5 times.
First check if the address is correct.
Second check if it’s in a safe environment.
Third check if you are being pressured by FOMO?
Fourth check if it’s the correct chain address.
Fifth check and remind yourself of social engineering courses.
4. Do not believe any information from strangers.
Greed is the first step to death.
There is no free lunch.
When you don't know who the fool is,
you should assume that you are the fool.
5. For acquaintances, judge their motives and sources of profit.
Most cases are committed by acquaintances.
In web3, when you need to send money, if you entrust the money to others,
you should assume that this money is already gone.
If you don’t know how they make money,
then the money they earn is your money.
6. Always remind yourself of the dark forest #币安上线KAITO .
Repeat steps 1-6.
Assume you will be scammed and attacked.