Blockchain Participation Safety Guide
#StartInvestingInCrypto
First
Choose a trustworthy cryptocurrency exchange. Without a doubt, binance is the best choice.
Second
On-chain security
Because the BTC ecosystem can only play EVM-compatible chains now, many friends who participate in the BTC ecosystem do not know much about the security of the EVM ecosystem. The security of the EVM chain is much more dangerous than that of BTC, so everyone must pay attention to security issues.
Regarding security-related content in the blockchain field, I recommend everyone to follow @evilcos. Mr. Yu Xian has made great contributions to the popularization of blockchain security. The blockchain dark forest self-help manual https://darkhandbook.io he wrote is really very comprehensive.
Of course, I also know that everyone likes to read summaries, so I will simply give you a summary (with picture 2). The summary is that I picked some situations that everyone will encounter in daily life, which is not comprehensive, so I still recommend reading the blockchain dark forest self-help manual. After all, safety is the most important thing.
🧙
Wallet security
☄️
Private key mnemonic security
1Any project that asks you to enter a private key or mnemonic is a scammer
2Safely store, try not to save it on a computer or cloud storage; try not to copy it
☄️
Cold wallet security
1Strictly check the transfer address
2No authorization
☄️
Project security
1Whether there is a security company audit
2The risk of the project party's front end being hacked
3Communication security: choose HTTPS URL, non-plaintext transmission
4The risk of the project party doing evil; compliance risk; financial security (whether the mechanism is easy to lose money)
☄️
Signature security
1Reject blind signature! Picture 1 is a blind signature
2Strictly control the amount of authorized tokens to spend, try not to choose the maximum
3Pay attention to these signatures! Authorization will be given: the signature contains hexadecimal DATA starting with 0xa22cb465; approve; permit; permit2; setApprovalForAll; increaseAllowance
🧙
Privacy and security
☄️
Computer security
1 Ensure security when downloading files
2 Do not click on strange links
3 Do not browse strange websites
☄️
Mobile phone security
1 Try not to jailbreak
2 Try to download apps through the app market
3 Do not use your phone to transfer or record mnemonics or private keys
🧙
Human safety
☄️
Be careful of the high-imitation account links behind the official Twitter tweets. High-imitation official tweets are a form of phishing that is common recently. Everyone must confirm again.
☄️
Be careful of official Twitter being hacked. Official Twitter is not necessarily 100% safe because it can be hacked
😂