OKX Web3 & OneKey: Add a little "Buff" to Device Security

OKX
2024-05-31 15:30:00
Collection
This issue is the 04th edition of the security special, featuring the security teams from the hardware wallet provider OneKey and the OKX Web3 wallet security team. They will provide practical guidelines on how to enhance the security of your devices.

Author: OKX Web3

Introduction

The OKX Web3 wallet has specially curated the "Security Special Edition" column to address various types of on-chain security issues. Through the most real cases that occur around users, in collaboration with experts or institutions in the security field, we provide dual sharing and answers from different perspectives, thereby systematically sorting out and summarizing security trading rules. The aim is to enhance user security education while helping users learn to protect their private keys and wallet assets from the ground up.

Surfing in the Web3 world, you can't save on two things:

One is paying Gas on-chain; the other is buying equipment off-chain.

But whether on-chain or off-chain, security is equally important~

This issue is the 04th edition of the Security Special, featuring the security teams from the crypto hardware wallet provider OneKey and the OKX Web3 wallet. From the perspective of practical guidelines, we will teach you how to add a "Buff" to your device's security.

OneKey Security Team: OneKey was established in 2019 and is a company focused on security with open-source hardware and software wallets. It has a security attack and defense laboratory and has received support from leading institutions such as Coinbase, Ribbit Capital, and Dragonfly. Currently, OneKey hardware wallets are becoming one of the best-selling hardware wallet brands in Asia.

OKX Web3 Wallet Security Team: Hello everyone, we are very happy to share today. The OKX Web3 wallet security team is mainly responsible for building various security capabilities for OKX in the Web3 field, such as wallet security capability construction, smart contract security audits, and on-chain project security monitoring, providing users with multiple protective services for product security, fund security, and transaction security, contributing to the maintenance of the entire blockchain security ecosystem.

Q1: Can you share some real device risk cases from users?

OneKey Security Team: The device risk cases involving Web3 users are diverse. Here are a few common examples.

Case 1: User Alice left her device unattended and was physically invaded by someone nearby without her knowledge, resulting in asset theft. This is often referred to as an "Evil Maid Attack" in the field of computer security and is one of the most common types of device risk users encounter.

From colleagues at "毛工作室", to cleaning staff, or even close partners, anyone could be a potential attacker motivated by financial gain. We have previously assisted users in investigating cases of asset theft from hardware wallets, and after reporting to the police, the user obtained the KYC of the exchange account used by the attacker, ultimately discovering it was someone close to them—proving that "no matter how many defenses you have, a thief at home is hard to guard against."

Case 2: User Bob was physically coerced and had to hand over his device that had asset control permissions. This has a rather amusing name in the crypto circle—"$5 Wrench Attack."

In recent years, with the wealth effect of crypto spilling over, cases of kidnapping and extortion targeting high-net-worth individuals seem to be increasing, especially in countries with higher crime rates. In early 2023, media reported a case of robbery during an offline cryptocurrency transaction. The victim was attending an offline digital currency investor gathering and was controlled in their car after dinner. The criminals forcibly used the victim's facial recognition to unlock their phone and wallet software, converting the cryptocurrency in the wallet into 4.1 million USDT before quickly transferring the funds and leaving. Recently, a well-known crypto mining OG on Twitter shared that he was robbed by an international crime group and extorted for most of his accumulated crypto assets.

OKX Web3 Wallet Security Team: Today's topic is excellent. Previously, we discussed private key security, MEME trading security, and various on-chain security topics. In fact, device security is also very important, and we will share some classic cases.

Case 1: Tampered Hardware Wallet

User A purchased a hardware wallet from an unauthorized platform and began using it without verification. In reality, the wallet's firmware had been tampered with, and multiple sets of mnemonic phrases had been pre-generated. Ultimately, the encrypted assets stored in that hardware wallet were completely controlled by hackers, resulting in significant losses.

Preventive Measures: 1) Users should try to purchase hardware wallets from official or trusted channels. 2) Before using the wallet, conduct the official complete verification process to ensure firmware security.

Case 2: Phishing Attack

User B received an email from the "Wallet Security Center" stating that there was a security issue with their wallet and requested the user to input their wallet recovery phrase for a security update. In reality, this was a carefully designed phishing attack, and the user ultimately lost all their assets.

Preventive Measures: 1) Users should never enter their private keys or recovery phrases on any unverified websites. 2) Use the hardware wallet's screen to verify all transaction and operation information.

Case 3: Software Security

User C downloaded malicious software from an unverified source. When the user performed wallet operations, the malicious logic in the software led to asset loss.

Preventive Measures: 1) Users should download software from official channels and regularly update related software and firmware. 2) Use antivirus software and firewalls to protect your devices.

Q2: What physical devices and facilities do users commonly use, and what types of risks do they face?

OneKey Security Team: The devices related to user asset security typically include users' smartphones, computers, hardware wallets, USB storage devices, and network communication devices (such as Wi-Fi).

In addition to the "Evil Maid Attack" and "$5 Wrench Attack" we mentioned earlier, there are several other aspects that require special attention.

  1. Social Engineering and Phishing Attacks

Social engineering and phishing attacks are currently very common and effective attack methods. Attackers exploit human weaknesses to trick users into performing dangerous operations. For example, malicious phishing links and attachments. Attackers may send emails, text messages, or social media messages containing malicious links, disguised as trusted sources, such as bank notifications or reminders from social media platforms. Once users click these links or download attachments, malware can be implanted in their devices, leading to remote invasions.

For instance, impersonating technical support personnel, attackers may pretend to be technical support staff and contact users via phone or email, claiming that their devices have issues that need immediate action. They may induce users to provide remote access to their devices or disclose sensitive information. Currently, on Twitter, as soon as you mention cryptocurrency-related terms, a swarm of bots will quickly come to impersonate technical support to "assist" you.

  1. Supply Chain Attacks

Supply chain attacks refer to attackers implanting malicious software during the production or transportation of devices. This can manifest in three ways.

The first is hardware tampering. Attackers may implant malware during the manufacturing process of hardware wallets or USB storage devices. For example, if users purchase hardware devices from unreliable sources, they may receive tampered devices that have pre-installed malware capable of stealing information or allowing remote access.

The second is software tampering. Attackers may attack the software supply chain of devices, tampering with software or firmware update packages. When users download and install these updates, backdoor programs or other types of malicious code may be implanted in the devices.

The third is logistics attacks: during the transportation of devices, attackers may intercept and tamper with the devices. For example, during delivery, hardware devices may be replaced or tampered with to facilitate subsequent attacks by the attackers.

  1. Man-in-the-Middle Attacks

Man-in-the-Middle (MITM) attacks refer to attackers intercepting and tampering with data transmission between two parties.

For instance, when users use unencrypted network communications, attackers can easily intercept and modify the data being transmitted. This means that when using unencrypted HTTP websites, attackers can intercept and modify the data users send and receive.

Another example is public Wi-Fi. When using public Wi-Fi, users' data transmissions are more susceptible to interception by attackers. Attackers can even set up malicious public Wi-Fi hotspots; once users connect, attackers can monitor and steal sensitive information such as login credentials and bank transaction records. In extreme cases, even a home Wi-Fi network can be compromised and have malware installed.

  1. Internal Attacks and Software Vulnerabilities

Internal attacks and software vulnerabilities from third parties are risks that users find difficult to control, but they significantly impact physical device security.

The most common are software and hardware security vulnerabilities. These vulnerabilities can be exploited by attackers for remote attacks or physical bypass attacks. For example, certain plugins or applications may have undiscovered vulnerabilities that attackers can exploit to gain control of the device. Keeping security updates can usually resolve this. Additionally, hardware should consider using the latest encryption chips.

As for the activities of internal personnel from software providers: internal personnel such as software developers or service providers may abuse their access rights to engage in malicious activities, steal user data, or implant malicious code in the software. Alternatively, external factors may lead to malicious activities.

For example, there was a case where "毛工作室" suffered asset theft due to using a certain multi-instance fingerprint browser, which may have been caused by internal malfeasance in the software or plugin. This indicates that even legitimate software can pose a threat to user asset security if internal controls are lax.

Another example is the panic-inducing attack that Ledger experienced—many dApps using the Connect Kit encountered issues. The attack was caused by a former employee who became a victim of a phishing attack, and the attacker inserted malicious code into the Connect Kit's GitHub repository. Fortunately, Ledger's security team deployed a fix within 40 minutes of being informed of the issue, and Tether promptly froze the attacker's USDT funds.

OKX Web3 Wallet Security Team: We summarize some commonly used physical devices by users and elaborate on their potential risks.

Currently, the physical devices commonly used by users mainly include: 1) Computers (desktops and laptops) for accessing decentralized applications (dApps), managing cryptocurrency wallets, and participating in blockchain networks. 2) Smartphones and tablets for mobile access to dApps, managing crypto wallets, and conducting transactions. 3) Hardware wallets, dedicated devices (such as Ledger, Trezor) for securely storing cryptocurrency private keys to prevent hacking. 4) Network infrastructure, routers, switches, firewalls, etc., to ensure stable and secure network connections. 5) Node devices, software devices running blockchain node software (which can be personal computers or dedicated servers), participating in network consensus and data validation. 6) Cold storage devices for offline storage of private keys, such as USB drives, paper wallets, etc., to prevent online attacks.

The potential risks associated with current physical devices mainly include the following:

1) Physical Device Risks

  • Device loss or damage: If hardware wallets or computers are lost or damaged, it may lead to the loss of private keys, making it impossible to access crypto assets.
  • Physical intrusion: Criminals may physically invade devices to directly obtain private keys or sensitive information.

2) Network Security Risks

  • Malware and viruses: Attacks on user devices through malware to steal private keys or sensitive information.
  • Phishing attacks: Disguising as legitimate services to trick users into providing private keys or login credentials.
  • Man-in-the-Middle (MITM) attacks: Attackers intercepting and tampering with communications between users and the blockchain network.

3) User Behavior Risks

  • Social engineering attacks: Attackers using social engineering techniques to trick users into disclosing private keys or other sensitive information.
  • Operational errors: Users making mistakes while trading or managing assets, potentially leading to asset loss.

4) Technical Risks

  • Software vulnerabilities: Vulnerabilities in dApps, crypto wallets, or blockchain protocols that hackers may exploit.
  • Smart contract vulnerabilities: Vulnerabilities in smart contract code that may lead to fund theft.

5) Regulatory and Legal Risks

  • Legal compliance: Different countries and regions have varying regulatory policies regarding cryptocurrencies and blockchain technology, which may affect users' asset security and trading freedom.
  • Regulatory changes: Sudden policy changes may lead to asset freezes or trading restrictions.

Q3: Is a hardware wallet a must for private key security? What types of private key security measures are there?

OneKey Security Team: Of course, while hardware wallets are not the only option for private key security, they are indeed a very effective method for enhancing private key security. Their greatest advantage is that they can keep private keys isolated from the internet during generation, recording, and daily storage, and require users to directly verify and confirm transaction details on the physical device when executing any transactions. This feature effectively blocks the risk of private keys being stolen by malware or hackers.

Let's first discuss the advantages of hardware wallets:

1) Physical Isolation: Hardware wallets store private keys in dedicated devices, completely isolating them from connected computers and mobile devices. This means that even if a user's computer or phone is infected with malware, the private keys remain secure because they have never been exposed to the internet.

2) Transaction Verification: When using a hardware wallet for transactions, users must directly confirm and verify transaction details on the device. This process ensures that even if attackers obtain the user's online account information, they cannot transfer assets without authorization.

3) Secure Chips: Many hardware wallets use dedicated secure chips to store private keys. These chips undergo strict security certifications, such as CC EAL6+ (for example, the standards used by new hardware wallets like OneKey Pro and Ledger Stax), effectively protecting against physical bypass attacks. Secure chips not only prevent unauthorized access but also resist various advanced attack methods, such as electromagnetic analysis and power analysis attacks.

In addition to hardware wallets, there are various methods to enhance private key security, and users can choose suitable solutions based on their needs:

1) Paper Wallets: A paper wallet is an offline storage method that prints private and public keys on paper. While this method is simple and completely offline, it requires attention to physical security issues such as fire, moisture, and loss. It is best to purchase a metal engraving plate for physical recording (many options are available on the market, such as OneKey's KeyTag).

2) Mobile Cold Wallets: Cold wallets refer to private keys or crypto assets stored completely offline, such as an offline phone or computer. Similar to hardware wallets, cold wallets can effectively avoid online attacks, but users need to configure and manage these devices themselves.

3) Sharded Encrypted Storage: Sharded encrypted storage is a method of splitting private keys into multiple parts and storing them in different locations. Even if attackers obtain one part of the private key, they cannot fully recover it. This method increases security by making attacks more difficult, but users need to manage each key shard carefully to avoid being unable to recover the private key due to the loss of some shards.

4) Multisig: Multisignature technology requires multiple private keys to jointly sign a transaction before it can be executed. This method enhances security by increasing the number of signers, preventing asset transfers due to the theft of a single private key. For example, a three-party multisig account can be set up, where a transaction can only be executed if at least two private keys agree. This not only improves security but also allows for more flexible management and control.

5) Cryptographic Innovations: With the advancement of technology, some emerging cryptographic techniques are also being applied to private key protection. For example, Threshold Signature Scheme (TSS) and Multi-Party Computation (MPC) techniques further enhance the security and reliability of private key management through distributed computing and collaboration. These are generally more commonly used by enterprises and rarely by individuals.

OKX Web3 Wallet Security Team: Hardware wallets prevent private keys from being stolen by network attacks, malware, or other online threats by storing them on an independent, offline device. Compared to software wallets and other forms of storage, hardware wallets provide higher security guarantees, especially suitable for users who need to protect large amounts of crypto assets. The private key security measures can be approached from the following angles:

1) Use secure storage devices: Choose trusted hardware wallets or other cold storage devices to reduce the risk of private keys being stolen by network attacks.

2) Establish comprehensive security awareness education: Strengthen the emphasis on and awareness of private key security, remain vigilant about any webpage or program that requires inputting private keys, and when it is necessary to copy and paste private keys, consider only copying part of it and manually entering a few characters to prevent clipboard attacks.

3) Secure storage of mnemonic phrases and private keys: Avoid taking photos, screenshots, or recording mnemonic phrases online. It is best to write them down on paper and store them in a secure place.

4) Separate storage of private keys: Split private keys into multiple parts and store them in different locations to reduce the risk of single points of failure.

Q4: What vulnerabilities currently exist in identity verification and access control?

OneKey Security Team: Unlike Web2, which requires identifying and storing our identity information, blockchain achieves asset self-custody and access through cryptography. This means that the private key is everything. The greatest risk to user access control over crypto assets generally comes from improper storage of private keys—after all, the user's private key is the only credential to access cryptocurrency assets. If the private key is lost, stolen, exposed, or even subjected to natural disasters, it may lead to permanent loss of assets.

This is also the significance of brands like OneKey, providing users with secure private key self-custody solutions. Many users often lack security awareness when managing private keys, using insecure storage methods (such as keeping private keys in online documents or screenshots). The best approach is to use offline generation and storage methods. In addition to manually rolling dice and writing by hand, users can also consider using previously mentioned hardware wallets in conjunction with metal mnemonic plates for engraving.

Of course, many users store assets directly in exchange accounts, making identity verification and access control more similar to Web2.

This relates to users' password security awareness. The use of weak passwords and repeated passwords is a common issue. Users tend to use simple, easily guessable passwords or reuse the same password across multiple platforms (such as verification emails), increasing the risk of being attacked after brute-force cracking or data breaches.

Although multi-factor authentication (such as SMS codes, Google Authenticator) can enhance security, if implemented improperly or if vulnerabilities exist (such as SMS hijacking), it can also become a target for attacks. For example, SMS hijacking SIM swap attacks—attackers deceive or bribe mobile carrier employees to transfer the victim's phone number to a SIM card controlled by the attacker, allowing them to receive all SMS verification codes sent to the victim's phone. Previously, Vitalik experienced a "SIM SWAP" attack, where attackers used his Twitter account to send phishing messages that resulted in asset losses for multiple individuals. Additionally, improper storage of backup codes for multi-factor authenticators like "Google Authenticator" may also be obtained by attackers and used to compromise accounts.

OKX Web3 Wallet Security Team: This is a very important area to pay attention to. Currently, the following issues need to be noted:

1) Weak passwords and password reuse: Users often use simple, easily guessable passwords or reuse the same password across multiple services, increasing the risk of passwords being brute-forced or obtained through other leak channels.

2) Insufficient multi-factor authentication (MFA): While multi-factor authentication in Web2 can significantly enhance security, once a private key is leaked in Web3 wallets, it means that attackers have full operational control over the account, making it difficult to establish effective MFA mechanisms.

3) Phishing attacks and social engineering: Attackers use phishing emails, fake websites, and other means to trick users into disclosing sensitive information. Currently, phishing websites targeting Web3 exhibit characteristics of being organized and service-oriented, making it easy for users to fall victim without sufficient security awareness.

4) Improper API key management: Developers may hard-code API keys in client applications or fail to implement appropriate permission controls and expiration management, leading to keys being leaked and potentially abused.

Q5: How should users prevent risks posed by emerging virtual technologies such as AI face-swapping?

OneKey Security Team: At the 2015 BlackHat conference, hackers worldwide unanimously agreed that facial recognition technology is the least reliable method of identity authentication. Nearly a decade later, with advancements in AI technology, we now have near-perfect "magic" for face-swapping, and ordinary visual facial recognition can no longer provide secure guarantees. Therefore, it is more about the recognition side needing to upgrade algorithmic technology to identify and prevent deepfake content.

For risks associated with AI face-swapping, users can do little beyond protecting their privacy biometric data. Here are some small suggestions:

1) Be cautious when using facial recognition applications.

When choosing to use facial recognition applications, users should select those with good security records and privacy policies. Avoid using applications from unknown sources or those with questionable security, and regularly update software to ensure the latest security patches are in use. Previously, many small loan company apps in China illegally used users' facial data for resale, leaking users' facial data.

2) Understand multi-factor authentication (MFA).

Single biometric authentication carries significant risks; therefore, combining multiple authentication methods can significantly enhance security. Multi-factor authentication (MFA) combines various verification methods, such as fingerprint, iris scanning, voice recognition, and even DNA data. For the recognition side, this combination of authentication methods can provide an additional layer of security when one method is compromised. For users, protecting their privacy data in this regard is equally important.

3) Stay skeptical and guard against scams.

Clearly, with AI being able to mimic faces and voices, impersonating someone over the internet has become much easier. Users should be particularly cautious about requests involving sensitive information or fund transfers, employing dual verification methods to confirm the identity of the other party via phone or in person. Stay vigilant and do not easily trust urgent requests, recognizing common scam tactics involving impersonation of executives, acquaintances, or customer service representatives. Nowadays, there are also many impersonators of celebrities, so caution is warranted when participating in projects to avoid "fake endorsements."

OKX Web3 Wallet Security Team: Generally speaking, emerging virtual technologies bring new risks, and these new risks indeed lead to the research of new defensive techniques, which in turn lead to new risk control products.

  1. AI Forgery Risks

In the realm of AI face-swapping, many AI face-swapping detection products have emerged. The industry has proposed several methods to automatically detect fake character videos, focusing on identifying unique elements (fingerprints) generated by deepfake technology in digital content. Users can also identify AI face-swapping through careful observation of facial features, edge processing, and audio-visual synchronization issues. Additionally, Microsoft has launched a series of tools to educate users on recognizing deepfakes, allowing users to learn and enhance their recognition abilities.

  1. Data and Privacy Risks

The application of large models in various fields has also brought risks to user data and privacy. When using chatbots, users should pay attention to protecting their personal privacy information, avoiding direct input of critical information such as private keys, keys, and passwords. Instead, they should try to hide their key information through alternatives and obfuscation. For developers, GitHub provides a series of friendly detection mechanisms; if submitted code contains OpenAI API keys or other risky privacy leaks, the corresponding push will return an error.

  1. Content Generation Abuse Risks

In users' daily work, they may encounter many results generated by large models. While these contents may be effective, the abuse of content generation has also led to issues of misinformation and knowledge copyright. Some products have emerged to detect whether text content is generated by large models, which can reduce some corresponding risks. Additionally, developers should pay attention to the correctness and security of the generated code when using large models for code generation. For sensitive or open-source code, thorough review and auditing are essential.

  1. Daily Awareness and Learning

Users should consciously judge and recognize potential AI forgery or AI-generated content while browsing short videos, long videos, and various articles. They should be aware of common signs of AI forgery, such as typical voiceovers, mispronunciations, and common face-swapping videos, and consciously assess and identify these risks in critical scenarios.

Q6: From a professional perspective, share some physical device security advice.

OneKey Security Team: Based on the various risks mentioned earlier, we summarize the protective measures simply.

  1. Beware of the invasion risks of connected devices.

In our daily lives, connected devices are ubiquitous, but this also brings potential invasion risks. To protect our high-risk data (such as private keys, passwords, MFA backup codes), we should use strong encryption methods and choose storage methods that minimize network exposure, avoiding storing sensitive information in plaintext on devices. Additionally, we need to maintain a vigilant mindset against phishing and Trojan attacks. Consider using dedicated devices for cryptocurrency operations separate from other general-purpose devices to reduce the risk of being attacked. For example, we can separate our daily-use laptops from hardware wallets used for managing crypto assets, ensuring that even if one device is attacked, the other remains secure.

  1. Maintain physical monitoring and protection.

To further ensure the security of our high-risk devices (such as hardware wallets), we need to implement strict physical monitoring and protection measures. These devices at home should be stored in high-standard anti-theft safes and equipped with comprehensive smart security systems, including video surveillance and automatic alarm functions. If we need to travel, it is especially important to choose hotels with secure storage facilities. Many high-end hotels offer dedicated security storage services, providing an additional layer of protection for our devices. Additionally, we can consider carrying portable safes to ensure that our important devices are protected in any situation.

  1. Reduce risk exposure and prevent single points of failure.

Distributing devices and assets is one of the key strategies to reduce risk. We should not store all high-privilege devices and crypto assets in one place or wallet but consider distributing them in secure locations across different geographical areas. For example, we can store some devices and assets at home, in the office, and with trusted friends or family. Additionally, using multiple hot wallets and hardware cold wallets is also an effective method, with each wallet storing a portion of the assets to reduce the risk of single points of failure. To enhance security, we can also use multisignature wallets, which require multiple authorized signatures to execute transactions, significantly improving our asset security level.

  1. Prepare emergency measures for worst-case scenarios.

When facing potential security threats, it is crucial to develop emergency measures for worst-case scenarios. For high-net-worth individuals, maintaining a low profile is an effective strategy to avoid becoming a target. We should avoid flaunting our crypto assets in public and keep our financial information discreet. Additionally, it is necessary to establish an emergency plan in case devices are lost or stolen. We can set up decoy crypto wallets to temporarily deal with potential robbers while ensuring that important device data can be remotely locked or wiped (if backed up). When traveling in high-risk areas, hiring a private security team can provide additional security and using special VIP security channels and high-security hotels can ensure our safety and privacy.

OKX Web3 Wallet Security Team: We will introduce this from two levels: one is the OKX Web3 APP level, and the other is the user level.

  1. OKX Web3 APP Level

The OKX Web3 wallet employs various means to strengthen the app, including but not limited to algorithm obfuscation, logic obfuscation, code integrity checks, system library integrity checks, application anti-tampering, and environmental security checks, minimizing the probability of users being attacked by hackers while using the app. It also maximally avoids the risk of black market actors repackaging our app, reducing the likelihood of downloading fake apps.

Additionally, in terms of data security for the Web3 wallet, we use the most advanced hardware security technology, employing chip-level encryption methods to encrypt sensitive data in the wallet. This encrypted data is bound to the device chip, and if the encrypted data is stolen, no one can decrypt it.

  1. User Level

For users involving physical devices such as hardware wallets, commonly used computers, and smartphones, we recommend that users strengthen their security awareness in the following areas:

1) Hardware Wallets: Use well-known brand hardware wallets, purchase from official channels, and generate and store private keys in isolated environments. The medium for storing private keys should be fireproof, waterproof, and theft-proof. It is recommended to use fireproof and waterproof safes, and private keys or mnemonic phrases should be stored in different secure locations to enhance security.

2) Electronic Devices: It is advisable to choose brands with good security and privacy for mobile phones and computers that install software wallets (such as Apple), while reducing the installation of unnecessary applications to maintain a clean system environment. Use Apple's ID management system for multi-device backups to avoid single-device failures.

3) Daily Use: Avoid performing sensitive operations on wallet devices in public to prevent camera recordings from leaking information; regularly use reliable antivirus software to scan the device environment; and periodically check the reliability of the physical device storage location.

Finally, thank you all for reading the 04th edition of the OKX Web3 wallet "Security Special Edition." We are currently busy preparing the content for the 05th edition, which will include real cases, risk identification, and practical security operations. Stay tuned!

Disclaimer:

This article is for reference only and is not intended to provide (i) investment advice or recommendations; (ii) offers or solicitations to buy, sell, or hold digital assets; or (iii) financial, accounting, legal, or tax advice. Holding digital assets (including stablecoins and NFTs) involves high risks and may fluctuate significantly or even become worthless. You should carefully consider whether trading or holding digital assets is suitable for you based on your financial situation. You are responsible for understanding and complying with applicable local laws and regulations.

ChainCatcher reminds readers to view blockchain rationally, enhance risk awareness, and be cautious of various virtual token issuances and speculations. All content on this site is solely market information or related party opinions, and does not constitute any form of investment advice. If you find sensitive information in the content, please click "Report", and we will handle it promptly.
ChainCatcher Building the Web3 world with innovators