Charts
DataOn-chain
VIP
Market Cap
API
Rankings
CoinOSNew
CoinClaw🦞
Language
  • 简体中文
  • 繁体中文
  • English
Leader in global market data applications, committed to providing valuable information more efficiently.

Features

  • Real-time Data
  • Special Features
  • AI Grid

Services

  • News
  • Open Data(API)
  • Institutional Services

Downloads

  • Desktop
  • Android
  • iOS

Contact Us

  • Chat Room
  • Business Email
  • Official Email
  • Official Verification

Join Community

  • Telegram
  • Twitter
  • Discord

© Copyright 2013-2026. All rights reserved.

简体繁體English
|Legacy
BTCBTC
💲70908.38
-
3.15%
ETHETH
💲2078.60
-
5%
SOLSOL
💲87.31
-
4.83%
TRUMPTRUMP
💲3.99
-
7.42%
USDCUSDC
💲0.9998
-
0%
XRPXRP
💲1.39
-
3.47%

EnHeng嗯哼🔸BNB
EnHeng嗯哼🔸BNB|8月 27, 2025 08:46
I discovered a major flaw in the OK Wallet. For example, if my A address is generated through a referral link, and then I use the B address on the same phone to click on A's referral link in the OK Wallet, the system can recognize that it's coming from the same device. What does this mean? It might suggest that OK can actually associate my different wallet addresses in the backend. A lot of people choose decentralized wallets because one of the most important reasons is to ensure complete independence between accounts, without any linkage. But OK's design here implies that the referral feature might come with device fingerprint tracking capabilities. I tested this as soon as the referral feature went live, but it also made me realize a potential concern: even completely unrelated wallets might already be identifiable by OK's backend as belonging to the same person.
+3
Mentioned
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Timeline

9月 25, 14:00All Core Devs – Execution (ACDE) 221 正在直播
9月 22, 14:00Discussion on Web2's Flaws and Web3's Risks
9月 22, 00:02Notion AI Agents Expose Prompt Injection Risks
9月 19, 11:52Completed the security review of the dual execution client implementation for @berachain
9月 18, 17:13Discovered tear attack vulnerability affecting Tangem cold wallet
9月 18, 16:55Vulnerability of brute force cracking in Tangem wallet
9月 17, 18:46Proof-of-Stake chains lack penalty mechanisms
9月 17, 05:52Unverified BSC contract attacked by flash loan
9月 15, 17:03Is launching Fusaka's bug bounty program reasonable?
9月 14, 05:30Base chain suffered a loss of approximately $90,000 due to the 'transferFrom' vulnerability

HotFlash

|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

APP
Windows
Mac

X

Telegram

Facebook

Reddit

CopyLink

Hot Reads