GoPlus Security Team: When trading on the chain, users should try to avoid becoming the target of phishers. They can strengthen protection from the following aspects.
In order to avoid becoming a target of phishers when trading on the chain, there are mainly the following points:
1. Verify the source
•Official channels: Never click on links from unknown sources, especially those received in private chats via email, Twitter, or Discord. Make sure all transactions and logins are done through the official website or official dapp. You can bookmark or save frequently used websites and apps to avoid entering fake websites. You can also check whether it is official by looking at whether there are well-known users following it in Twitter Followers.
• Check the URL: Double-check the website's URL to make sure it is spelled correctly and contains a secure certificate (HTTPS). Phishing sites often use domain names that are similar to the real site, but with subtle differences.
2. Secure browser extensions
•Install browser extensions: Install some secure browser extensions with transaction simulation and phishing website identification functions. These extensions can monitor and block phishing websites in real time. The extensions usually check whether the visited website is in the database of known phishing websites and issue warnings when risks are found. At the same time, they can simulate transactions, inform the consequences of actions, and provide early warnings.
• Regular updates: Make sure browser extensions and other security software are always up to date to ensure they can identify and block the latest phishing attack methods.
3. Improve vigilance and identification skills
• Emails and messages: Be wary of any emails and messages that ask for personal information, passwords, mnemonics, and private keys. Legitimate services will not ask for this information via email or messages.
• Check the sender: Even if the message appears to be from a familiar source, double-check the sender's email address. Sometimes phishers will pretend to be legitimate senders through subtle spelling mistakes or fake domain names.
IV. Fund Management
•Multi-wallet management: Store assets in multiple wallets instead of concentrating them in one wallet. This way, even if one wallet is attacked, the assets in other wallets can be protected.
•Combination of hot and cold wallets: Store most of your assets in offline cold wallets, and keep only a small amount of assets in online hot wallets for daily transactions. Cold wallets are not connected to the Internet and are more secure.
•Regular checks: Regularly check the security status and transaction records of each wallet, cancel unnecessary and redundant authorizations, and promptly detect and handle abnormal situations.