Charts
DataOn-chain
VIP
Market Cap
API
Rankings
CoinOSNew
CoinClaw🦞
Language
  • 简体中文
  • 繁体中文
  • English
Leader in global market data applications, committed to providing valuable information more efficiently.

Features

  • Real-time Data
  • Special Features
  • AI Grid

Services

  • News
  • Open Data(API)
  • Institutional Services

Downloads

  • Desktop
  • Android
  • iOS

Contact Us

  • Chat Room
  • Business Email
  • Official Email
  • Official Verification

Join Community

  • Telegram
  • Twitter
  • Discord

© Copyright 2013-2026. All rights reserved.

简体繁體English
|Legacy
BTCBTC
💲71351.03
-
4.51%
ETHETH
💲2191.62
-
6.11%
SOLSOL
💲89.91
-
5.78%
WLDWLD
💲0.3639
-
7.94%
USDCUSDC
💲0.9998
+
0.01%
HYPEHYPE
💲42.69
+
3.97%

Cos(余弦)😶‍🌫️
Cos(余弦)😶‍🌫️|Mar 18, 2025 04:03
This kind of fishing with similar addresses and poisoning is not close to extinction, and the security infrastructure of this industry will never pass There are several techniques for poisoning and contaminating wallet transaction history, such as two used in this example: The contract code of 1 fake token emits a fake event log, which not only deceives the naked eye but also causes block browsers and many wallets to output the event log as intended Zero amount transfer event log, many tokens support the transferFrom operation with token 0. In scenarios where the amount is 0, from/to can be defined arbitrarily Both of these methods will make users think that it is their own operation, after all, it appears that the tx is indeed sent from their own address to the target wallet address. Unfortunately, the "target wallet address" here only has the first and last few characters that are the same as the real one. Other techniques include using the same starting and ending characters in the source address and sending real small amounts of funds to the user's address. This has always been common in the gaming world, where whenever you transfer some funds, you will soon receive various small amounts, all of which are clearly used to poison wallet history records. There are also some advanced techniques, such as combining clipboard hijacking, pasting past addresses, and seeing the same beginning and end characters as previously used addresses. For example, if someone impersonates a well-known DEX and outputs fake event logs, it will make you think that you have actually operated it before In fact, this defense is very simple, such as being good at using wallet whitelist mechanism, reading more characters in the address (important ones can be read in full), combining well-known hardware wallets for double checks, and so on. However, simple defense is still not easy for many users, who may find it troublesome, especially when it comes to FOMO. This is also a difficult part for wallets. Users are often tricked by various security traps, but they always take the wallet first
+4
Mentioned
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Timeline

Apr 17, 01:12【Large pig trotter rice activity is simple and easy to participate in】
Apr 16, 23:38【CommonDotxyz integrates a wallet】
Apr 16, 19:49【Using Veridian to Control Digital Identity】
Apr 16, 17:51【Using a new smart wallet to reduce turnover during the onboarding process】
Apr 16, 15:55【Liar AI's new gameplay connects with Twitter to generate emotional memes of hot events】
Apr 16, 15:36【Get rid of centralized custody with the new wallet application】
Apr 16, 15:28【Try the most powerful self storage wallet】
Apr 16, 11:56【Welcome to try the new wallet application】
Apr 16, 11:25【Introduce new wallet applications】
Apr 16, 10:52【ESP32 chip has critical vulnerabilities】

HotFlash

|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

APP
Windows
Mac

X

Telegram

Facebook

Reddit

CopyLink

Hot Reads