12 common attack vectors that you probably didn't know (second part)
As we talk in our last post, there are common options that scammers use to attack us. They contact by different apps or websites that we utilize in our rutine, so it´s very important to know them. Let's keep completing the list to avoid scams.
7. Fake uniswap airdrop, V3, sync, etc
Fake uniswap stealing seed:
Fake Uniswap airdrop:
NEVER enter key or phrase! Especially in some dodgy site!
Uniswap clones about a node sync or version upgrade, scams.
Fake airdrop twitter uniswap
Remember on DISCORD:
8. Compromised device
Never mine crypto and use a wallet on the same device.
Always use 2FA, best bet is to have a separate Chromebook or Macbook or PC/laptop that is not used for every day use, but only for crypto.
This can be a scary one. Copy and paste the “correct” wallet, but actually it gets replaced by malware to scammers wallet!
Or hacked PC and signed transaction actually signs TWO transactions, one hidden in the background! OUCH!