Stolen asset collection address
Equipment and software used:
Lenovo's savior, a win system, has been dedicated to interaction since I bought it last year.
There are very few software to install, WeChat QQ Thunder (almost not used)
Clash+ subscription, basically nothing else. I have not installed any unofficial software, and I have not used any remote assistance software.
The browser plug-in is also downloaded from the Chrome plug-in market and does not come with ads.
Comparing with other stolen addresses, it should be possible to preliminarily rule out plug-in issues.
The computer version of WeChat is rarely used, and the automatic download function is disabled.
Address stolen:
The 6 main addresses (opened on Google) and the remaining 70 wallets were not stolen.
The 30 stolen addresses were run on adspower,
The remaining 70 addresses that were not stolen are also running on adspower.
The theft of funds involves the entire chain Arb zks op matic
A dozen of the addresses added stargate's liquidity and were also transferred away.
Address key mnemonic management:
The mnemonics for hundreds of addresses are all managed in an encrypted excel table.
Put it in a separate and dedicated USB flash drive, so it won't be plugged into the computer when not in use.
More than 30 of the stolen addresses were created last year.
It is also very careful to run and operate on the old computers of the time.
Has there been any copying behavior? Yes, there are other addresses that have not been stolen.
The current situation is generally like this