Kine Docs Portal
IntroStakingGithubAnnouncement
English
English
  • Welcome
  • Whitepapers
    • Kine: The Liquidity Pool Protocol
    • KINE Token Model
    • Contract Address
  • Audits
    • PeckShield Audit Report
  • TUTORIALS(WIP)
    • Register Today To Unlock Free Trial of The AI-powered Trade Signal Feature
    • Introducing Our New Price Prediction Feature
    • AI Trading Assistant
    • Disclaimer
    • Kine Blind Box NFT Instructions
    • Kine Referral Program
    • Stake and Mint
      • Preparation
      • Stake and Mint
      • Lock KINE for xKINE
      • Burn and Unstake
      • Claim Rewards
    • Trade on kine.exchange
    • Quick Exchange
    • Claim Airdrop
    • Trading Mining
    • Condition TP/SL Order and Position TP/SL Order
    • Trader’s Code of Conduct
    • Copy Trading User Agreement
    • Tournament Rules
    • Explanation of Profit Leaderboard
    • Trailing Stop Tutorial
    • Official Verification Channel Usage Rules
    • General Security Principles
    • Common Scam Methods
  • FAQ(WIP)
    • FAQ - Connect Wallet
    • Condition Order FAQs
    • FAQ - Connect Wallet
    • Smart Deposit&Withdraw
    • About Deposits and Withdrawals
    • Testing FAQ
    • Staking FAQ
    • Trading FAQ
    • Blind Box + NFT FAQ
    • Contact Us
  • LIBRARY
    • Contract copying tutorial for beginners
    • Get Started with Kine Perpetual Copy Trading - Follower Guidance
    • Get Started with Kine Perpetual Copy Trading - Trader Guidance
    • About login / signup
    • Trader Agreement
    • User Agreement
    • Auto Deleveraging
    • The price setting for limit orders
    • Merge / Split Position
    • Calculation of Initial Margin and Maintenance Margin
    • Risk Limit
    • Instructions for Lightning Fast Opening
    • Product Introduction
    • Affiliate Program Services Agreement
    • Terms Of Use
    • Privacy Policy
    • Setting Stop-Loss and Take-Profit
    • Explanation of Contract Fee Rates
    • How to Use Futures Bonus
    • About Future Bonus
    • how to use the Fee Rebate coupon
    • About Spot Trading Fee Rates
    • Price Prediction Instructions
    • Team
  • ANNOUNCEMENT
    • KINE Locking & Staking
    • Kine Mainnet Launch On 24th March
    • Open Test Result
  • Product documentation
    • Basic Rules of trading
    • Risk Control Measures
    • Risk Limit
    • Funding Rate
    • Merge / Split Position
    • Take Profit and Stop Loss
    • Futures Calculator
  • Trading Fee Rate Level
    • $KINE Trading Fees Discount Rules
    • Perpetual Trading Fees Discount
    • How to upgrade your membership on KINE Exchange
  • K-SQUARE
    • Creator Application Agreement
    • Live Streamer Application Agreement
    • Application Agreement
    • How to Schedule a Live Stream on Kine?
  • Help Center
    • Help Center
    • How to download the KINE APP
    • How to Register and Log In on the Web
    • How to register and log in to the APP
    • Profit and loss calculation
    • How to Register
    • How to Deposit
    • How to Withdraw
    • Transfer Funds
    • TP Wallet Login Tutorial
    • How to Update Personal Information
    • Security Settings
    • How to Change Login Password
    • Adding Google Authenticator
  • Group 1
    • Special Thanksgiving Rules
  • Group 2
    • New Year Festival, Lucky all the way
  • Group 3
    • 【Weekly Super Blind Box】Activity Rules
  • Points Feast
    • Event Rules
  • Group 4
    • Kine Protocol Affiliate Materials
  • Hot Articles
    • Introducing Decentralized Trading Platform KINE in Three Minutes
    • Dialogue with the KINE Team: A Deep Dive into KINE Design Principles and Six Core Advantages
    • Kine Protocol Launches New Copy Trading Plaza 2.0, Sharing Trading Strategies with Top Traders World
Powered by GitBook
On this page
  1. TUTORIALS(WIP)

Common Scam Methods

Scammers use various tactics, and if you are not careful, you may fall into their traps. Let's take a look at some common scam methods:Online scams are typically categorized into many different types based on targets and attack vectors. Here are some common examples:

  • Impersonating officials from law enforcement agencies and threatening or intimidating victims by accusing them of illegal activities. They then ask victims to transfer funds to a "safe account" for fraudulent purposes. Remember, law enforcement officials will not issue arrest warrants or official documents through platforms like WeChat, QQ, or Telegram, nor will they ask you to transfer funds to a "safe account."

  • Impersonating customer service or official staff members and falsely claiming to have special offers or high rebates, requesting victims to click on links and provide transfer information to deceive them. Official customer service will not provide suspicious links, so avoid clicking on unfamiliar links when participating in activities on official websites.

  • Recently, there have been phishing scammers appearing on social platforms like Discord and Telegram, using chat deception, impersonation, U-commerce, and disguising legal services to launch phishing attacks.

  • Malicious actors redirect users to URLs different from the original website using advertisements, free gifts, or rewards. Attackers who exploit website vulnerabilities implant redirects and install malicious software on users' computers.

  • Malicious applications are also noteworthy phishing methods. Criminals use these applications as carriers for implanting malware to monitor your behavior or steal sensitive information. They may disguise the applications as price tracking software, wallets, or other cryptocurrency-related tools, targeting users who tend to trade and hold cryptocurrencies.

  • Phishing scams involving registering similar domain names are also common. Criminals redirect traffic to fake websites that use foreign languages, have common spelling errors, or slightly modified domain names. They mimic the interface of legitimate websites using domain names to deceive users who mistype or misread URLs.

How to Avoid Falling Victim to Scams?

  • Stay vigilant: The best way to prevent phishing scams is to exercise judgment and scrutiny over received emails, messages from strangers, and friend requests. Stay alert against temptations of high returns and be cautious about trusting "insider information" or promises of "stable high returns." When faced with unexpected transfer or remittance requests, exercise caution, verify thoroughly, and never transfer or remit funds without careful verification.

  • Check the content: You can search for partial content (or the sender's email address) on search engines to check if there are any records of phishing attacks using that method.

  • Check the URL: Hover your mouse over the link without clicking to see if it starts with HTTPS instead of HTTP. However, please note that merely checking the URL's beginning cannot guarantee the website's reliability. Examine the URL for spelling errors, special characters, and other unusual elements.

  • Do not share your private keys: Never share your wallet private keys with others, including withdrawal addresses, and be cautious in judging the legitimacy of any cryptocurrency products and sellers.

  • Protect your personal information daily to prevent fraudsters from obtaining it and executing targeted scams. If you receive messages involving acquaintances requesting transfers or remittances, be sure to verify the person's identity through other means, such as phone calls, to confirm that it is not a scam before taking further action.

Conclusion Cryptocurrencies have many advantages in terms of security, but there are still criminals trying to find potential vulnerabilities. For example, vulnerabilities in smart contract codes may be exploited, private keys may be stolen, and exchanges may be subjected to distributed denial-of-service (DDoS) attacks. Users need to remain vigilant during transactions, take appropriate security measures, and protect themselves and their assets from harm.

PreviousGeneral Security PrinciplesNextFAQ - Connect Wallet

Last updated 1 year ago