Binance Square
LIVE
TP Wallet
@Square-Creator-460cc2169
揭秘常见的区块链骗局,分享安全知识,维护良好的区块链环境从我做起。
Following
Followers
Liked
Shared
All Content
LIVE
--
See original
SPACE ID airdrop token collection tutorialDisclaimer: This tutorial does not provide investment advice What is SPACE ID? SPACE ID is a decentralized domain name protocol based on the BNB chain and the Arbitrum One chain, providing users with a one-stop Web3 domain name and identity platform. Space ID issuance airdrop details On March 19, Space ID announced specific airdrop details, with a total of 294,000 addresses meeting the requirements. A total of 42 million Space IDs will be retroactively airdropped based on the wallet address rather than each domain name. Even if a wallet has multiple domain names, only the most loyal domain names will be included in the Space ID. The collection time is consistent with the currency listing time, and the amount received is based on Details below:

SPACE ID airdrop token collection tutorial

Disclaimer: This tutorial does not provide investment advice

What is SPACE ID?

SPACE ID is a decentralized domain name protocol based on the BNB chain and the Arbitrum One chain, providing users with a one-stop Web3 domain name and identity platform.

Space ID issuance airdrop details

On March 19, Space ID announced specific airdrop details, with a total of 294,000 addresses meeting the requirements. A total of 42 million Space IDs will be retroactively airdropped based on the wallet address rather than each domain name. Even if a wallet has multiple domain names, only the most loyal domain names will be included in the Space ID. The collection time is consistent with the currency listing time, and the amount received is based on Details below:
See original
Be wary of “new mutation” malicious authorization trapswords written in front Recently, there have been a high number of cases of malicious multi-signing in TRON wallets. Prior to this, we have issued warnings about this type of fraud and analyzed several scenarios that lead to multi-signing. For details, you can check out the two articles "Beware | Tron's malicious permission change scam" and "How far away are fake links and fake wallet scams from us". Mainly downloading fake wallets from fake official websites, causing the private key mnemonic to be leaked and multi-signed, and being multi-signed after accessing a link containing malicious code to execute a signature. Therefore, we once again remind users not to use search tools to find and use wallets, and not to execute third-party links from unknown sources at will, especially recharge links for verification codes, followers, card purchases and other platforms.

Be wary of “new mutation” malicious authorization traps

words written in front

Recently, there have been a high number of cases of malicious multi-signing in TRON wallets. Prior to this, we have issued warnings about this type of fraud and analyzed several scenarios that lead to multi-signing. For details, you can check out the two articles "Beware | Tron's malicious permission change scam" and "How far away are fake links and fake wallet scams from us". Mainly downloading fake wallets from fake official websites, causing the private key mnemonic to be leaked and multi-signed, and being multi-signed after accessing a link containing malicious code to execute a signature. Therefore, we once again remind users not to use search tools to find and use wallets, and not to execute third-party links from unknown sources at will, especially recharge links for verification codes, followers, card purchases and other platforms.
See original
TokenPocket takes you through the zkSync alpha test network in one articleAdd zkSync alpha test network to TokenPocket 1. Open TokenPocket, click [Add Wallet] in the upper right corner, and click [Add Custom Network] at the bottom of the network selection interface. 2. In the custom network editing interface, click [Convenient Entry] in the upper right corner, fill in the keyword zkSync at the top of the open interface, and select the first custom network. 3. After clicking on the zkSync alpha testnet public chain, you will see the following parameter prompt: Click [Confirm] in the lower right corner to complete the operation of adding a custom network. 4. Click on Add Network and you will see two options: [Create Wallet] and [Import Wallet]. You can create or import the zkSync alpha testnet public chain wallet according to your actual needs.

TokenPocket takes you through the zkSync alpha test network in one article

Add zkSync alpha test network to TokenPocket

1. Open TokenPocket, click [Add Wallet] in the upper right corner, and click [Add Custom Network] at the bottom of the network selection interface.

2. In the custom network editing interface, click [Convenient Entry] in the upper right corner, fill in the keyword zkSync at the top of the open interface, and select the first custom network.

3. After clicking on the zkSync alpha testnet public chain, you will see the following parameter prompt: Click [Confirm] in the lower right corner to complete the operation of adding a custom network.

4. Click on Add Network and you will see two options: [Create Wallet] and [Import Wallet]. You can create or import the zkSync alpha testnet public chain wallet according to your actual needs.
See original
ARB Token Eligibility Verification TutorialThe ARB Token airdrop that everyone has been waiting for is coming. The following will help you quickly check whether the addresses you have participated in are eligible to receive it. Airdrop rules: https://docs.arbitrum.foundation/airdrop-eligibility-distribution Air investment asset inspection tutorial: 1. Open http://gov.arbitrum.foundation/ 2. Click TokenPocket in the pop-up interface to call the TokenPocket plug-in wallet. 3. In the wallet address selection interface, find your address that may be eligible for air investment and click [Confirm] to connect. 4. After the connection is successful, click [CHECK ELIGIBILITY] to check whether it is eligible for air investment.

ARB Token Eligibility Verification Tutorial

The ARB Token airdrop that everyone has been waiting for is coming. The following will help you quickly check whether the addresses you have participated in are eligible to receive it.

Airdrop rules:

https://docs.arbitrum.foundation/airdrop-eligibility-distribution

Air investment asset inspection tutorial:

1. Open http://gov.arbitrum.foundation/

2. Click TokenPocket in the pop-up interface to call the TokenPocket plug-in wallet.

3. In the wallet address selection interface, find your address that may be eligible for air investment and click [Confirm] to connect.

4. After the connection is successful, click [CHECK ELIGIBILITY] to check whether it is eligible for air investment.
See original
Use TokenPocket to create a Filecoin (EVM) public chainDisclaimer: This tutorial does not provide investment advice How to add a custom network to TokenPocket 1. Open TokenPocket, click [Add Wallet] in the upper right corner, and click [Add Custom Network] at the bottom of the network selection interface. 2. In the custom network editing interface, click [Convenient Entry] in the upper right corner, fill in the keyword FIL at the top of the open interface, and select the correct public chain. 3. After clicking on the Filecoin public chain, you will see the parameter prompt in the picture below. Click [Confirm] in the lower right corner to complete the operation of adding a custom network; after the addition is completed, you can see the newly added one at the last place in the selection list Filecoin public chain.

Use TokenPocket to create a Filecoin (EVM) public chain

Disclaimer: This tutorial does not provide investment advice

How to add a custom network to TokenPocket 1. Open TokenPocket, click [Add Wallet] in the upper right corner, and click [Add Custom Network] at the bottom of the network selection interface.

2. In the custom network editing interface, click [Convenient Entry] in the upper right corner, fill in the keyword FIL at the top of the open interface, and select the correct public chain.

3. After clicking on the Filecoin public chain, you will see the parameter prompt in the picture below. Click [Confirm] in the lower right corner to complete the operation of adding a custom network; after the addition is completed, you can see the newly added one at the last place in the selection list Filecoin public chain.
See original
Recently, the problem of multi-signature in Tron wallet has begun to increase. Tron's multi-signature is a mechanism "inherited" from EOS. It distinguishes between owner and active permissions, and subdivides the threshold and weight. Many users have the need to use TRC20 recharges such as receiving codes, adding fans, buying cards, etc., so the scammers took advantage of this "window" to change from the original malicious authorization scam to the current malicious code to change permission settings. Malicious changes in permissions can have the management rights of all assets in your wallet, which is more harmful than malicious authorization, so you have to guard against it. In TokenPocket, before executing similar malicious code, a risk warning will pop up. You only need to carefully check the prompts of the ongoing operation, such as: changing permissions, then you should close it immediately.
Recently, the problem of multi-signature in Tron wallet has begun to increase. Tron's multi-signature is a mechanism "inherited" from EOS. It distinguishes between owner and active permissions, and subdivides the threshold and weight. Many users have the need to use TRC20 recharges such as receiving codes, adding fans, buying cards, etc., so the scammers took advantage of this "window" to change from the original malicious authorization scam to the current malicious code to change permission settings. Malicious changes in permissions can have the management rights of all assets in your wallet, which is more harmful than malicious authorization, so you have to guard against it. In TokenPocket, before executing similar malicious code, a risk warning will pop up. You only need to carefully check the prompts of the ongoing operation, such as: changing permissions, then you should close it immediately.
See original
Be wary of “zero amount” transfer scamsMalicious authorization is to authorize a certain Token with a certain number of callable permissions through the Approve operation, usually stealing all the balance of the authorized Token. So if an ordinary address has not performed the Approve operation, can it also be called? Recently, more and more users have reported that they will see records of 0USDT being transferred out in their USDT transfer list, as shown below: When you see your address being called to transfer 0 assets, your first reaction is to think that you may be at risk of being maliciously authorized, so you open a permission detection tool or browser to check your authorization record.

Be wary of “zero amount” transfer scams

Malicious authorization is to authorize a certain Token with a certain number of callable permissions through the Approve operation, usually stealing all the balance of the authorized Token. So if an ordinary address has not performed the Approve operation, can it also be called?

Recently, more and more users have reported that they will see records of 0USDT being transferred out in their USDT transfer list, as shown below:

When you see your address being called to transfer 0 assets, your first reaction is to think that you may be at risk of being maliciously authorized, so you open a permission detection tool or browser to check your authorization record.
See original
The role of passwords and private keys/mnemonics in decentralized wallets“I have my wallet password and wallet address, how do I log in to my wallet?” If you still have this question, it means you haven’t really understood the role that wallet passwords and private keys/mnemonic phrases play in decentralized wallets. Why can’t I import the wallet password to restore control of wallet assets? The wallet password is mainly used to encrypt the private key information. For example, you need to enter the password when transferring money or other on-chain operations; when importing the wallet with the private key/mnemonic phrase, you must set the wallet password. The password can be modified or reset in the wallet. If the original password is forgotten, you can use the private key or mnemonic phrase to import the wallet and set a new password.

The role of passwords and private keys/mnemonics in decentralized wallets

“I have my wallet password and wallet address, how do I log in to my wallet?”

If you still have this question, it means you haven’t really understood the role that wallet passwords and private keys/mnemonic phrases play in decentralized wallets.

Why can’t I import the wallet password to restore control of wallet assets?

The wallet password is mainly used to encrypt the private key information. For example, you need to enter the password when transferring money or other on-chain operations; when importing the wallet with the private key/mnemonic phrase, you must set the wallet password. The password can be modified or reset in the wallet. If the original password is forgotten, you can use the private key or mnemonic phrase to import the wallet and set a new password.
See original
A new choice for asset protection--multi-signature walletMulti-signature wallet concept Multi-Sig stands for multi-signature, which is a specific type of digital signature that allows more than two users to sign as a group. Therefore, multi-signatures are generated by combining multiple single signatures. For example, imagine a safe with two locks and two keys, one key held by A and the other by B. The only way to open this safe is for two people, A and B, to provide the keys to unlock the lock at the same time. If you only have one of the keys, you cannot open the safe.

A new choice for asset protection--multi-signature wallet

Multi-signature wallet concept

Multi-Sig stands for multi-signature, which is a specific type of digital signature that allows more than two users to sign as a group. Therefore, multi-signatures are generated by combining multiple single signatures.

For example, imagine a safe with two locks and two keys, one key held by A and the other by B. The only way to open this safe is for two people, A and B, to provide the keys to unlock the lock at the same time. If you only have one of the keys, you cannot open the safe.
See original
Multi-signature wallet knowledgeThe HD (identity) wallet or multi-chain wallet we use daily can usually only be stored through one public key. This means that whoever knows the private key that matches the public key can control the assets held on the public key chain. Therefore, in order to solve the key problem, multi-signature technology came into being. Today we will talk about the meaning, function and significance of the multi-signature mechanism. Multi-signature wallet concept Multi-Sig stands for multi-signature, which is a specific type of digital signature that allows more than two users to sign as a group. Therefore, multi-signatures are generated by combining multiple single signatures.

Multi-signature wallet knowledge

The HD (identity) wallet or multi-chain wallet we use daily can usually only be stored through one public key. This means that whoever knows the private key that matches the public key can control the assets held on the public key chain. Therefore, in order to solve the key problem, multi-signature technology came into being.

Today we will talk about the meaning, function and significance of the multi-signature mechanism.

Multi-signature wallet concept

Multi-Sig stands for multi-signature, which is a specific type of digital signature that allows more than two users to sign as a group. Therefore, multi-signatures are generated by combining multiple single signatures.
See original
Hide small amount records and stay away from phishing scams.Why do "zero amount" transfer records appear? The "zero amount" transfer operation is performed directly through the TransferFrom function in the USDT contract. Any on-chain address can be called and a record will be generated on the chain and synchronized in the wallet, and a blank record will be generated in the authorization record. The purpose of this operation is to simulate the transfer/transfer record from the user's address, and combine it with the method of transferring small amounts of assets into the disguised address to induce the user to mistakenly copy the address and make the transfer. In essence, this kind of call does not cause any risk to the assets, and the Gas consumed by the call will also be paid by the other party. When copying the address in the history record, complete address information verification is required to avoid misoperations such as using the wrong payment address and transferring money.

Hide small amount records and stay away from phishing scams.

Why do "zero amount" transfer records appear?

The "zero amount" transfer operation is performed directly through the TransferFrom function in the USDT contract. Any on-chain address can be called and a record will be generated on the chain and synchronized in the wallet, and a blank record will be generated in the authorization record.

The purpose of this operation is to simulate the transfer/transfer record from the user's address, and combine it with the method of transferring small amounts of assets into the disguised address to induce the user to mistakenly copy the address and make the transfer. In essence, this kind of call does not cause any risk to the assets, and the Gas consumed by the call will also be paid by the other party. When copying the address in the history record, complete address information verification is required to avoid misoperations such as using the wrong payment address and transferring money.
See original
A must see! TokenPocket Security Tips CollectionGenuine wallet download channel Recently, a large number of fake TokenPocket download links have appeared on search sites. If the fake wallet above is downloaded through these fake links, the fake wallet will intercept and steal when the user imports the private key mnemonic phrase. After obtaining permission, they The assets in the wallet may be stolen directly, or the wallet may be monitored and stolen immediately when a large amount of assets are transferred to the address. I would like to remind everyone: Do not access and download wallets at will, especially on search sites; do not use fake installation packages recommended by others, and stay away from fake TokenPocket wallets. Using a genuine wallet is the most basic first step for the security of your assets.

A must see! TokenPocket Security Tips Collection

Genuine wallet download channel

Recently, a large number of fake TokenPocket download links have appeared on search sites. If the fake wallet above is downloaded through these fake links, the fake wallet will intercept and steal when the user imports the private key mnemonic phrase. After obtaining permission, they The assets in the wallet may be stolen directly, or the wallet may be monitored and stolen immediately when a large amount of assets are transferred to the address.

I would like to remind everyone: Do not access and download wallets at will, especially on search sites; do not use fake installation packages recommended by others, and stay away from fake TokenPocket wallets. Using a genuine wallet is the most basic first step for the security of your assets.
See original
Beware | TRON malicious permission change scamRecently, some community users have reported that the TRON wallet has been inexplicably multi-signed, causing the Token to become inoperable. In response to this type of problem, we have compiled this popular science on TRON multi-signature, hoping to help users understand the principles of TRON multi-signature, recognize the dangers of maliciously changing permissions, and better protect asset security. Tron multi-sign scenario Based on communication with users and verification of relevant data, the following scenarios that may lead to multiple signatures have been obtained. 1. If you set up multi-signature by yourself, you need to manage the address yourself to execute the signature; 2. Using a fake wallet causes the private key mnemonic to be leaked, and the multi-signature is set up after being obtained by the other party;

Beware | TRON malicious permission change scam

Recently, some community users have reported that the TRON wallet has been inexplicably multi-signed, causing the Token to become inoperable. In response to this type of problem, we have compiled this popular science on TRON multi-signature, hoping to help users understand the principles of TRON multi-signature, recognize the dangers of maliciously changing permissions, and better protect asset security.

Tron multi-sign scenario

Based on communication with users and verification of relevant data, the following scenarios that may lead to multiple signatures have been obtained.

1. If you set up multi-signature by yourself, you need to manage the address yourself to execute the signature;

2. Using a fake wallet causes the private key mnemonic to be leaked, and the multi-signature is set up after being obtained by the other party;
See original
How far are fake official websites and fake wallet scams from us?The concept of blockchain is now understood by more people, and blockchain-based digital wallets have become the main way for people to understand and participate in the blockchain ecosystem. People have become accustomed to centralized data processing methods, and this kind of thinking and habits may bring huge risks to the security of their assets. For example, the most basic downloading and using of a genuine digital wallet may become a "stumbling block" for novices, because fake wallet websites and fake wallets have now appeared in large numbers on the Internet. The article in this issue will summarize the concept, user usage habits, and thinking mode analysis; the identification and prevention of fake websites and fake wallets.

How far are fake official websites and fake wallet scams from us?

The concept of blockchain is now understood by more people, and blockchain-based digital wallets have become the main way for people to understand and participate in the blockchain ecosystem. People have become accustomed to centralized data processing methods, and this kind of thinking and habits may bring huge risks to the security of their assets. For example, the most basic downloading and using of a genuine digital wallet may become a "stumbling block" for novices, because fake wallet websites and fake wallets have now appeared in large numbers on the Internet.

The article in this issue will summarize the concept, user usage habits, and thinking mode analysis; the identification and prevention of fake websites and fake wallets.
Explore the lastest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number

Latest News

--
View More

Trending Articles

View More
Sitemap
Cookie Preferences
Platform T&Cs