[2/13] Browser extensions in and of themselves can easily be the source of #exploits.
So, rather than securing your #browser session, increasing your #privacy, or acting as a warning tool before signing transactions, it may turn out to be your worst enemy.
[3/13] β Attack Vectors β
π§ There are merely two malicious concepts that will be exploited by #hackers to harm you while using #browser extensions:
Supply-Chain attacks are a threat that targets software DEVs and providers.
The objective is to get access to source codes, build processes, or update mechanisms through infecting legitimate programs in order to distribute #malware
[5/13] β 2β£ Supply-Chain Attack β
In the case of #browser extensions, this means that the #hacker will tamper somewhere along the line of delivering updates or installing the extensions.
#MITM, which is used in combination with the supply chain attack, is the fact that the suspicious actor intercepts your #browser internet traffic.
In most situations, this is used to eavesdrop on or tamper with your network data.
[8/13] β 1β£ Solutions β
In general, #browser providers have safeguards in place to protect users from these kind of browser #extension attacks, so don't worry, they're not as widespread as you may assume.
Nonetheless, I would never suggest using any browser extension.
[9/13] β 2β£ Solutions β
In general, when actively using a #wallet, you must be aware that a single incorrectly signed TX will probably drain your whole wallet.
Hence, my 1st advice is:
πΈ For heavy activity, use hot #wallets
πΈ For #EVM-based NFTs, use burner wallets
[10/13] β 3β£ Solutions β
Transferring low-value TXs initially is always suggested before moving larger amounts.
But please don't let this distract you from the reality that #vulnerabilities can be engineered to trigger only when specific parameters (values) are satisfied. π
[11/13] β 4β£ Solutions β
If you don't want to abandon #browser extensions, use them only to "check" the TX intent within a constrained environment known as a virtual machine.
To learn more, keep on reading and complete the steps. (π Warning: paranoia ahead.) π§΅π
[2/20] β What is the primary goal? β
The basic purpose of an executor address is to claim rewards on your behalf in order to save time, max. compound interest, & reduce unwanted exposure of a cold wallet.
Executors will then use auto. claiming to route rewards to your acc. π
[3/20] β 1β£ Is it safe to assign the task to an executor? β
The executor cannot claim to any address other than the one provided by the user, therefore automatic claiming is secure. πͺ
. . .
Let's look through the website and conduct some research before leaping to conclusions. π§
πΈ Did the #IMF make any comments regarding #DCMA?
πΈ Will this be the end of #XRP?
Let's find out in this π§΅π
[2/16] The Digital Currency Monetary Authority is making moves and expanding its reach through Twitter with its Unicoin network and #UMU, the native Unicoin.
βΉοΈ Who are they and what do they offer?
[3/16] β βΉοΈ β 1β£ #DCMA & #Unicoin β
πΈ Founder working on Unicoin since 2013, yet LinkedIn says 2018
πΈ Just 2 employees
πΈ They refer to themselves as a business, yet there is no registered corporate structure
2/ Assume I develop a #decentralized gaming app (L2-Smart Contract) with 10 nodes hosted all over the world to be redundant and reliable while processing #smartcontract data in the #network.
β‘οΈ The purpose of this #game is to walk from the starting point to the finish line.
3/ On the players route to the finish line, there are rocks to leap over.
After successfully leaping over a rock, a #transaction on the #dApp gets crafted, granting the player 1 issued #Token labeled "JUMP".
[1/π§΅] A short synopsis of Joachim Nagel's most recent speech on the future of #economic and #monetary union, presented and released by @OMFIF (@OMFIFDMI). π