Don't be deceived! 11 Simple Safety Rules
Last updated
Last updated
Blockchain technology has a high degree of security, but there are still human factors. Plus, scammers are always coming up with new ways to trick unsuspecting users.
So it's time for all of us to think about how to keep our money safe. Blockchain transactions are anonymous and irreversible, which is both an advantage and a disadvantage.
If funds in your wallet are withdrawn to someone else's wallet, you will not be able to undo the transaction.
This is why you must be extra careful and remember the rules of cybersecurity. Only awareness and constant vigilance can help you protect your funds from intruders.
Additionally, we'll introduce you to the basic concepts of cybersecurity, the most common threats, and ways to protect yourself.
1.Seed Phrase
A mnemonic phrase, aka seed phrase, or "12 words", is a generated set of words given out when creating a wallet. The phrase is generated once and it cannot be changed or recovered.
Seed phrase allows you to get 100% access to your wallet and assets, so it is important to keep your 12 words safe and not to share them with third parties.
Examples of threats
⚠️An attacker obtains the seed phrase and withdraws all crypto assets, gains access to products with a signature (Web3), and it becomes impossible to restrict access for the attacker.
Precaution
🔘Do not share your 12 words with anyone.
🔘Do not take pictures or screenshots of your seed phrase.
🔘Do not enter your 12 words into third-party forms, websites, apps, or anywhere else.
🔘Keep your phrase on paper or in a personal notebook in the safest place you can find, such as at home with your papers.
2. Private key
A private key is a combination of letters and numbers that allows you to manage your wallet and assets. Only the owner of the address can know the private key, it cannot be changed or deactivated.
A private key is similar to a seed phrase, but has direct relevance to the functioning of blockchain technology.
Examples of threats
⚠️An attacker who obtains a private key gains access to the assets and control of the wallet forever.
Precaution
Do not copy or request your private key from the blockchain unnecessarily. If you need it, store the key with caution, especially if it is an electronic device. It is strictly forbidden to transfer, insert, or publish your private key!
3. Wallet Address
A wallet address (a public key) is a combination of numbers and letters for transferring and receiving cryptocurrency.
Examples of threats
⚠️The address is not something secret, but it is worth remembering that once you know the address, you can find out exactly which assets are stored on it, and how many.
Precaution
Anyone can see all incoming and outgoing transactions, this is public information. Sometimes it makes sense to secure the address with the owner's anonymity.
4. Phishing Web Pages
More and more often you can see phishing websites (clones of the original ones) that are confusing and can do damage.
Examples of threats
⚠️A phishing website may attempt to obtain logins, passwords, seed phrases, and other information. On top of that, some websites may steal assets when interacting via Web3.
Precaution
You should always check the spelling of the domain name — it is sometimes replaced with a similar one. Check for an SSL certificate (the lock icon near the input line).
Do not click on links from strangers.
5. Cryptocurrency exchanges
More and more false crypto exchanges are appearing on the Internet, offering to store assets with them on very favorable terms.
Examples of threats
⚠️“Single-day” exchanges attract users to their websites to acquire deposits and then shut down.
Precaution
Before using any crypto exchange, research comments and reviews.
6. Telegram bots
A popular type of phishing has emerged on Telegram — fake bots using well-known platform and project names. Please note: Yunus Loop DeFi does not have a Telegram bot with passive income.
Examples of threats
⚠️A Telegram bot offers to make a deposit and generate super profits in a matter of hours. Some Telegram bots try to gain access to users' seed phrases or private keys via a survey.
Precaution
Only use Telegram bots that are referenced in the official resources of the platforms and projects.
7. Telegram chats/groups
Some users find out that they are invited to a Telegram chat about cryptocurrency. Moreover, there are many participants in such a chat (several thousand), and there is also some activity.
Examples of threats
⚠️Fraudulent Telegram chats are aimed at profiting by stealing data, assets, as well as advertising obviously risky financial products.
In addition, such chats are designed so that a person will ask a question and start a dialogue, during which he or she is likely to be deceived.
Precaution
Immediately exit unknown Telegram chats. Do not click on links that are distributed in such chats. In Telegram settings, disable the ability to add you to groups.
8. Fake accounts of famous people or project admins
An intruder using a name and photo of a famous person or a representative of a well-known project can contact you on any social network.
Examples of threats
⚠️Abusers post in social media and messengers presenting themselves as the owner or administrator of some project.
Using someone else's identity and photo, attackers usually ask you to make a transaction or grant them access to your assets.
Precaution
Don't trust imposters, no matter who they pretend to be. Do not attempt to engage in dialogue, just ignore their messages.
Do not trust screenshots and photos from scammers, as all of these are easy to fake. It is necessary to keep in mind that offers of easy earnings are scams almost 100% of the time.
9. Tokens credited to a personal wallet
Attackers use special software to track active wallet transactions and charge tokens to the wallet, which may even have a dollar value.
Examples of threats
⚠️The tokens credited to the wallet have a website address in their name. This is designed for a person to visit that website and try to sell those tokens to make money.
But after you start exchanging such tokens, all crypto-assets are deducted from your wallet. In addition, the software can gain access to the wallet and continue to strip all incoming assets.
Precaution
Don't react to incoming tokens that you weren't expecting. The safest thing to do in such a situation is not to try to transfer or sell them. By simply remaining at your address, these tokens won't do any harm.
10. Websites with clipboard malware
Scam websites can contain malicious software. By downloading files or interacting with such a website, there is a risk of getting malware that will control your computer.
Examples of threats
⚠️Malware most often connects to Windows operating systems and sometimes to Mac computers. Once connected to your computer, the malware substitutes your copied cryptocurrency address for its own.
Without noticing the address spoofing, users can transfer funds to the fraudulent address while not suspecting anything.
Precaution
Do not visit unknown and suspicious websites. If you find out that a cryptocurrency address is being spoofed when copying and pasting, you should remove any malware on your device, or contact a professional.
11. Tests, Forms and Surveys
There are specific surveys on the Internet and in messengers that are misleading and trying to gain access to your crypto wallet.
Examples of threats
⚠️A survey or quiz is offered in which questions are gradually asked, some of these questions imply that users will leave their 12 words or private key, for example, under the pretext of receiving a cash prize.
After you disclose 12 words or a private key, your wallet is no longer owned only by you, and the scammers instantly seize all the assets.
Precaution
Be careful with any kind of surveys and tests on cryptocurrency topics. Never and under no circumstances disclose your personal data, passwords, and wallet accesses.
So, if you know the basic rules of cybersecurity for cryptocurrency transactions and always adhere to them, you have nothing to fear.
Stay vigilant and don't forget to share helpful information with others.