Blockchain Participation Safety Guide

#StartInvestingInCrypto

First

Choose a trustworthy cryptocurrency exchange. Without a doubt, binance is the best choice.

Second

On-chain security

Because the BTC ecosystem can only play EVM-compatible chains now, many friends who participate in the BTC ecosystem do not know much about the security of the EVM ecosystem. The security of the EVM chain is much more dangerous than that of BTC, so everyone must pay attention to security issues.

Regarding security-related content in the blockchain field, I recommend everyone to follow @evilcos. Mr. Yu Xian has made great contributions to the popularization of blockchain security. The blockchain dark forest self-help manual https://darkhandbook.io he wrote is really very comprehensive.

Of course, I also know that everyone likes to read summaries, so I will simply give you a summary (with picture 2). The summary is that I picked some situations that everyone will encounter in daily life, which is not comprehensive, so I still recommend reading the blockchain dark forest self-help manual. After all, safety is the most important thing.

🧙

Wallet security

☄️

Private key mnemonic security

1Any project that asks you to enter a private key or mnemonic is a scammer

2Safely store, try not to save it on a computer or cloud storage; try not to copy it

☄️

Cold wallet security

1Strictly check the transfer address

2No authorization

☄️

Project security

1Whether there is a security company audit

2The risk of the project party's front end being hacked

3Communication security: choose HTTPS URL, non-plaintext transmission

4The risk of the project party doing evil; compliance risk; financial security (whether the mechanism is easy to lose money)

☄️

Signature security

1Reject blind signature! Picture 1 is a blind signature

2Strictly control the amount of authorized tokens to spend, try not to choose the maximum

3Pay attention to these signatures! Authorization will be given: the signature contains hexadecimal DATA starting with 0xa22cb465; approve; permit; permit2; setApprovalForAll; increaseAllowance

🧙

Privacy and security

☄️

Computer security

1 Ensure security when downloading files

2 Do not click on strange links

3 Do not browse strange websites

☄️

Mobile phone security

1 Try not to jailbreak

2 Try to download apps through the app market

3 Do not use your phone to transfer or record mnemonics or private keys

🧙

Human safety

☄️

Be careful of the high-imitation account links behind the official Twitter tweets. High-imitation official tweets are a form of phishing that is common recently. Everyone must confirm again.

☄️

Be careful of official Twitter being hacked. Official Twitter is not necessarily 100% safe because it can be hacked

😂