#空投防骗手册 Disable Sensitive Permissions
When participating in airdrops, refuse to authorize wallet private keys or mnemonic phrases. Legitimate airdrops usually only require a wallet address or signature verification, without the need for asset transfer.
Independent Network Environment
Use a dedicated IP address and high-quality proxies to avoid being deemed a 'witch account' due to shared IPs, which could result in disqualification, while also reducing the risk of phishing attacks.
3. Identify Common Scam Tactics
Fake Links and Contracts
Fake airdrop websites often disguise themselves as well-known projects, luring users to connect their wallets and steal assets afterward. Check the spelling of the domain name and whether the contract address matches the official website.
Impersonating Customer Service or Team
Requesting personal information or inducing transfers under the pretense of 'assisting in receiving airdrops' requires confirmation of the other party's identity through official communities or multiple identity verifications.