Kine Docs Portal
IntroStakingGithubAnnouncement
English
English
  • Welcome
  • Whitepapers
    • Kine: The Liquidity Pool Protocol
    • KINE Token Model
    • Contract Address
  • Audits
    • PeckShield Audit Report
  • TUTORIALS(WIP)
    • Register Today To Unlock Free Trial of The AI-powered Trade Signal Feature
    • Introducing Our New Price Prediction Feature
    • AI Trading Assistant
    • Disclaimer
    • Kine Blind Box NFT Instructions
    • Kine Referral Program
    • Stake and Mint
      • Preparation
      • Stake and Mint
      • Lock KINE for xKINE
      • Burn and Unstake
      • Claim Rewards
    • Trade on kine.exchange
    • Quick Exchange
    • Claim Airdrop
    • Trading Mining
    • Condition TP/SL Order and Position TP/SL Order
    • Trader’s Code of Conduct
    • Copy Trading User Agreement
    • Tournament Rules
    • Explanation of Profit Leaderboard
    • Trailing Stop Tutorial
    • Official Verification Channel Usage Rules
    • General Security Principles
    • Common Scam Methods
  • FAQ(WIP)
    • FAQ - Connect Wallet
    • Condition Order FAQs
    • FAQ - Connect Wallet
    • Smart Deposit&Withdraw
    • About Deposits and Withdrawals
    • Testing FAQ
    • Staking FAQ
    • Trading FAQ
    • Blind Box + NFT FAQ
    • Contact Us
  • LIBRARY
    • Contract copying tutorial for beginners
    • Get Started with Kine Perpetual Copy Trading - Follower Guidance
    • Get Started with Kine Perpetual Copy Trading - Trader Guidance
    • About login / signup
    • Trader Agreement
    • User Agreement
    • Auto Deleveraging
    • The price setting for limit orders
    • Merge / Split Position
    • Calculation of Initial Margin and Maintenance Margin
    • Risk Limit
    • Instructions for Lightning Fast Opening
    • Product Introduction
    • Affiliate Program Services Agreement
    • Terms Of Use
    • Privacy Policy
    • Setting Stop-Loss and Take-Profit
    • Explanation of Contract Fee Rates
    • How to Use Futures Bonus
    • About Future Bonus
    • how to use the Fee Rebate coupon
    • About Spot Trading Fee Rates
    • Price Prediction Instructions
    • Team
  • ANNOUNCEMENT
    • KINE Locking & Staking
    • Kine Mainnet Launch On 24th March
    • Open Test Result
  • Product documentation
    • Basic Rules of trading
    • Risk Control Measures
    • Risk Limit
    • Funding Rate
    • Merge / Split Position
    • Take Profit and Stop Loss
    • Futures Calculator
  • Trading Fee Rate Level
    • $KINE Trading Fees Discount Rules
    • Perpetual Trading Fees Discount
    • How to upgrade your membership on KINE Exchange
  • K-SQUARE
    • Creator Application Agreement
    • Live Streamer Application Agreement
    • Application Agreement
    • How to Schedule a Live Stream on Kine?
  • Help Center
    • Help Center
    • How to download the KINE APP
    • How to Register and Log In on the Web
    • How to register and log in to the APP
    • Profit and loss calculation
    • How to Register
    • How to Deposit
    • How to Withdraw
    • Transfer Funds
    • TP Wallet Login Tutorial
    • How to Update Personal Information
    • Security Settings
    • How to Change Login Password
    • Adding Google Authenticator
  • Group 1
    • Special Thanksgiving Rules
  • Group 2
    • New Year Festival, Lucky all the way
  • Group 3
    • 【Weekly Super Blind Box】Activity Rules
  • Points Feast
    • Event Rules
  • Group 4
    • Kine Protocol Affiliate Materials
  • Hot Articles
    • Introducing Decentralized Trading Platform KINE in Three Minutes
    • Dialogue with the KINE Team: A Deep Dive into KINE Design Principles and Six Core Advantages
    • Kine Protocol Launches New Copy Trading Plaza 2.0, Sharing Trading Strategies with Top Traders World
Powered by GitBook
On this page
  1. TUTORIALS(WIP)

General Security Principles

The emergence of cryptocurrencies has brought about more possibilities for people, but it also comes with various risks. By following these three main security principles, you can mitigate the risks associated with holding, using, and trading cryptocurrencies to some extent.

  • Protect Your Privacy With the rapid development of the internet era and information technology, personal information is becoming easier to obtain and exploit. Cybercrime is becoming increasingly common, making privacy protection even more important. Many unscrupulous individuals in the trading market impersonate official identities and set up phishing traps to steal your account passwords, identity, and cause financial losses. Personal information security, property security, and privacy protection are closely related. Only by protecting your security and privacy can you effectively prevent these risks.

Therefore, we recommend the following:

  1. Keep your account balance confidential.

  2. Keep the information associated with your account confidential.

  3. Use encrypted communication channels.

  4. Avoid sharing information that is connected to your offline identity.

  5. Never disclose addresses you have used in any circumstances.

  • Stay Vigilant In decentralized exchanges, users have their own private keys, which means they have full control over their funds. Once a transaction is broadcasted to the network and confirmed, it becomes irreversible. The nature of cryptocurrencies places the responsibility of protecting asset security directly on the end users. It is important to remain vigilant and be aware of common phishing strategies. Familiarizing yourself with these potential dangers will help you better protect the security of your tokens.

  1. Be cautious when interacting with strangers online. Before sharing personal information or engaging in any financial transactions, verify their identity and do not blindly transfer funds to avoid falling victim to scams. Always confirm the other party's identity and reliability before involving money.

  2. Beware of scammers pretending to be authorized representatives, official business/customer service personnel, etc. If you encounter such individuals or situations, contact our online customer service or verify identities and information on the official website.

  3. Strengthen your security awareness, stay vigilant at all times, and promptly report any suspicious activities or fraudulent behaviors to our official customer service.

  • Establish Your Own Security Protection System There are security tools available to help you deal with these dangers. Measures to ensure the security of cryptocurrency assets include hardware wallets. Hardware wallets strike a balance between usability and security. These portable devices protect private keys from malicious software and hackers through offline storage, and most operations require physical confirmation. We recommend staying updated with cryptocurrency news and taking necessary security precautions before potential crises arise.

PreviousOfficial Verification Channel Usage RulesNextCommon Scam Methods

Last updated 1 year ago