{"id":9913,"date":"2024-01-18T14:00:00","date_gmt":"2024-01-18T12:00:00","guid":{"rendered":"https:\/\/forklog.com\/en\/web3-phishing-how-to-protect-yourself-and-your-assets\/"},"modified":"2024-01-18T14:00:00","modified_gmt":"2024-01-18T12:00:00","slug":"web3-phishing-how-to-protect-yourself-and-your-assets","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/web3-phishing-how-to-protect-yourself-and-your-assets\/","title":{"rendered":"Web3 phishing: how to protect yourself and your assets"},"content":{"rendered":"<p><em>Spam and phishing are two perennial scourges of the internet at every stage of its evolution. Web3 is no exception. Vladimir Menaskop explains how to fend off phishing attacks on your crypto-assets for ForkLog readers: <a href=\"https:\/\/hub.forklog.com\/companies\/menaskop\/\" target=\"_blank\" rel=\"noopener\" title=\"\">Vladimir Menaskop<\/a>.<\/em><\/p>\n<h2 class=\"wp-block-heading\"><strong>Three pillars: security, diversification, customisation<\/strong><\/h2>\n<p>If that reads like a mere string of words, it is time to reflect: without these three steps, your crypto-world will never be in good order. Let us start with security.<\/p>\n<p>I have covered it <a href=\"https:\/\/hub.forklog.com\/bezopasnost-amp-web-3-0-chast-i-azy\/\" target=\"_blank\" rel=\"noopener\" title=\"\">here<\/a> and <a href=\"https:\/\/hub.forklog.com\/bezopasnost-amp-web-3-0-chast-ii-primery-tsifrovyh-sledov\/\" target=\"_blank\" rel=\"noopener\" title=\"\">here<\/a>, so I will emphasise only the points I did not write about earlier:<\/p>\n<ol class=\"wp-block-list\">\n<li>If you devote time to security only once a year, you are already potentially compromised. It does not matter whether that is your email ending up in a spam database or a password leaked from some site (say, an exchanger).<\/li>\n<li>If you use only convenient but closed software, you are already potentially compromised. The <span data-descr=\"Open source\" class=\"old_tooltip\">OS<\/span> community tends to work both faster and more collegially\u2014and, crucially, continuously rather than sporadically.<\/li>\n<li>If you have not tried working with complex extensions, wallets and other official <span data-descr=\"Decentralised applications\" class=\"old_tooltip\">dapps<\/span> such as Bitcoin Core or Polkadot JS, you probably have not fully \u201cfelt\u201d the process and are, potentially\u2014yes\u2014already compromised.<\/li>\n<\/ol>\n<p>All three theses may sound like bedtime scare stories, but the following examples suggest otherwise.<\/p>\n<h3 class=\"wp-block-heading\"><strong>Example No. 1. Our arch-enemy is not stairs, but advertising<\/strong><\/h3>\n<p>One late evening I needed to exchange a small sum in ETH. Where would most of us go? So I went to BestChange. But I broke my own rule: \u201cType the address by hand, not via search\u201d.<\/p>\n<p>I typed it into Google (a fatal mistake, but errors tend to come in chains) and clicked the first link.<\/p>\n<p>Predictably, it was phishing. The \u201ccompany of good\u201d filtered crypto projects from its search results\u2014but only the honest ones. Phishing sites mimicking the largest aggregator slipped through. And the replica was excellently done: no bugs, no typos, even an SSL certificate. The difference\u2014one letter. A classic, well staged and well drawn.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-eu.googleusercontent.com\/woDi20herdFTmNP85EQ2inuKA4DQAQbnWYOmrecp07O9I1zO8XgHqwaqD0zwvRmmCzfSBsiAWbn6b11uAs63R80hF_BfhHKLfjVDoWHw1EAsDZ5qXOPS3_Lce6DirjC2jG0_s-4RpPRu5ZU6jd17TAQ\" alt=\"Phishing in Web3: how to protect yourself and your assets\"\/><figcaption class=\"wp-element-caption\">Data: Google.<\/figcaption><\/figure>\n<p>In the end I found the route I needed and followed a link to a site that, of course, was also fake. What is more, it looked exactly like the one I had used before. Then I made a third unforgivable mistake: I did not log in, because the amount seemed small and it was already late.<\/p>\n<p>That was it. My ether settled permanently in the scammers\u2019 pockets.<\/p>\n<p>How could this have been avoided?<\/p>\n<p>Here are a few simple rules:<\/p>\n<ol class=\"wp-block-list\">\n<li>Memorise and type manually the addresses of sites you use (<span data-descr=\"Decentralised exchanges\" class=\"old_tooltip\">DEX<\/span>, wallets, aggregators), and add them to bookmarks: that gives you at least two sources for cross\u2011checking. Only then use search engines as a third, independent source; preferably not Google, Yandex or Baidu but something without ads or other spam. Several working options can be found <a href=\"https:\/\/t.me\/web3news\/3492\" target=\"_blank\" rel=\"noopener\" title=\"\">here<\/a>.<\/li>\n<li>Wherever you can customise, do so: Gmail wallpapers, partner authorisation on BestChange, a personal account at an exchanger, and much else. Welcome messages and internal account names work especially well: even <span data-descr=\"Centralised exchanges\" class=\"old_tooltip\">CEX<\/span> now do this; in the decentralised world neglecting it is a sin.<\/li>\n<li>And, of course, always verify wallet addresses (numbers): exchanges often index them.<\/li>\n<\/ol>\n<p>Individually these points are weak; together they work. Phishing ads still show up on Facebook, so my example will remain relevant for a long time yet.<\/p>\n<h3 class=\"wp-block-heading\"><strong>Example No. 2. Approvals: the bane of crypto<\/strong><\/h3>\n<p>This case, unlike the previous one, did not happen to me\u2014and quite recently. I will try to reconstruct the chronology.<\/p>\n<p>Initially, a crypto-enthusiast (let us call him E.) had the seed from a <a href=\"https:\/\/hub.forklog.com\/trezor-amp-metamask-zachem\/\" target=\"_blank\" rel=\"noopener\" title=\"\">Trezor<\/a> hardware wallet, on which BTC was stored under a <a href=\"https:\/\/trezor.io\/learn\/a\/passphrases-and-hidden-wallets\" target=\"_blank\" rel=\"noopener\" title=\"\">passphrase<\/a>\u2014an excellent setup in itself.<\/p>\n<p>Then came a series of errors. I quote: \u201cI imported this seed into a [mobile wallet]. Apparently to check how import works and to make sure that the presence of bitcoin is not visible in the mobile wallet. That is how it was; I made sure.\u201d<\/p>\n<p>Importing a seed phrase from a hardware wallet into a mobile one is a serious mistake: it defeats the very purpose of keeping keys on the device. I quote further:<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cIn autumn 2022 I switched from a PC to a Mac and installed MetaMask as a Chrome extension, because it is inconvenient to live without it. [But for a long time I did not] use it. Deciding to use this same seed for BEP-20 token operations, I topped up [the wallet] on 1 December 2022 with a small portion of BNB from someone and, apparently, started to connect somewhere via Wallet Connect (where and why, I do not remember).\u201d<\/p>\n<\/blockquote>\n<p>Here the difference is clear: the Wallet Connect library has been attacked more than once, including through phishing, and in fact the funds were no longer offline but online (after importing the seed phrase). That at least doubled the risk compared with standard storage on a Trezor.<\/p>\n<p>We move on in the victim\u2019s account: \u201cIn the process of connecting and [testing] I made an approval for the scammer to operate with BUSD (why, I do not remember), and since it was Wallet Connect and the interface there is not great, [plus] lagging, [I] did not understand this or did not attach importance to it. It is important that the approval was made by me in the [mobile wallet] via Wallet Connect. I clarified [this] with [the mobile wallet\u2019s developers], the <span data-descr=\"I am not attaching a screenshot, as permission to publish was obtained from the victim but not from the mobile wallet\u2019s developers, who clearly were not involved in this story\" class=\"old_tooltip\">screenshot<\/span> shows this exactly. That is, MetaMask has nothing to do with it.\u201d<\/p>\n<p>The key takeaway from this part is that everything in crypto changes constantly. When we do something unthinkingly, it is then hard to reconstruct the full picture and determine the level of security under control. The rest of the story proves it. I quote:<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201c[Later in the mobile wallet] Wallet Connect did not work, and I needed to make an SBT, so I moved to MetaMask and [started] doing operations in the BSC network from it, connecting to a dapps site\u2026 Everything was ok, and since the BUSD BEP-20 token was not involved here, there was nothing for the scammer, who had access, to steal; the approval was waiting for its hour.\u201d<\/p>\n<\/blockquote>\n<p>Exactly. An approval granted to a compromised address or smart contract can hang around almost indefinitely. So the first thing to do when reconstructing activity on an account (wallet) is to check approvals. Where and how? I will set it out below.<\/p>\n<p>We continue with the story: \u201cLast week information appeared that Binance would delist the original BUSD from Paxos by 15 December [2023], and on that occasion I decided to get rid of all centralised stablecoins. I swapped a large amount of USDT TRC-20 for bitcoin (successfully, it went up), BUSD BEP-20 remained on another wallet ($2640\u2014the entire amount). Then a colleague in [the city] needed [fiat currency] to a [bank] card, so I [faffed with] MetaMask and left the matter for later, deciding that, perhaps, I would exchange part of the BUSD BEP-20 for roubles at an [exchanger] and send it to the person. In general, in my mind BUSD I decided to spend on current business, since one must fundamentally get rid of CEX stablecoins. The motive is \u2018BUSD to go in full\u2026\u2019\u201d<\/p>\n<p>Thus the funds lay in the wallet for some time, and the account was not actively used. And here is how it ended:<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cToday <strong>at night before going to sleep<\/strong> I think, should I swap in the [mobile wallet] BUSD for bitcoin so as not to shuttle it back and forth (I should have swapped). I refuse, I decide to transfer BUSD BEP-20 in full ($2640) to the seed in MetaMask to test [the exchanger]\u2026 and in general to get rid of it by spending. I perform the operation in the [mobile wallet] from one seed, make sure that to the second seed (which is in [the mobile wallet] and MetaMask) the tokens arrived in full, and fall asleep. And in the morning I see notifications in the mail from BscScan that the tokens were debited to a rogue address immediately after arrival by this <a href=\"https:\/\/bscscan.com\/tx\/0xeb8849a0eefecf2776d2114d5267df05e61650fe14b8dee874d9eb791f348453\">transaction<\/a>\u2026 I wrote to you, and you found out that an approval a year old was lying in wait for its hour. It got it.\u201d<\/p>\n<\/blockquote>\n<p>A sad story with a miserable outcome. But let us try to extract something positive.<\/p>\n<p><strong>1. A cold wallet and a hot one cannot live under a single MetaMask setup.<\/strong> Nor does it make sense to integrate a hardware wallet via a seed (except in emergency recovery). Integration between Trezor and MetaMask, however, is fine.<\/p>\n<p><strong>2. If you have not used a wallet for a long time, check approvals.<\/strong> Where? Via the links below (broadly, you can handle approvals via scanners or via <a href=\"https:\/\/t.me\/web3news\/4501\">specialised<\/a> services; here is a consolidated list):<\/p>\n<ul class=\"wp-block-list\">\n<li>Ethereum \u2014 <a href=\"https:\/\/etherscan.io\/tokenapprovalchecker\">etherscan.io\/tokenapprovalchecker<\/a>;<\/li>\n<li>Polygon \u2014 <a href=\"https:\/\/polygonscan.com\/tokenapprovalchecker\">polygonscan.com\/tokenapprovalchecker<\/a>;<\/li>\n<li>BSC \u2014 <a href=\"https:\/\/bscscan.com\/tokenapprovalchecker\">bscscan.com\/tokenapprovalchecker<\/a>;<\/li>\n<li>Optimism \u2014 <a href=\"https:\/\/optimistic.etherscan.io\/tokenapprovalchecker\">optimistic.etherscan.io\/tokenapprovalchecker<\/a>;<\/li>\n<li>Arbitrum \u2014 <a href=\"https:\/\/arbiscan.io\/tokenapprovalchecker\">arbiscan.io\/tokenapprovalchecker<\/a>;<\/li>\n<li><a href=\"https:\/\/approvals.xyz\/\">approvals.xyz<\/a>;<\/li>\n<li><a href=\"https:\/\/cointool.app\/approve\/eth\">cointool.app\/approve<\/a>;<\/li>\n<li><a href=\"https:\/\/approved.zone\/\">approved.zone<\/a>;<\/li>\n<li><a href=\"https:\/\/revoke.cash\/ru\/\">revoke.cash<\/a>.<\/li>\n<\/ul>\n<p><strong>3. And, of course, do not rely only on yourself<\/strong>, but on a security system that is structured and verifiable (importantly: by anyone, not just once and by you). There are countless counter\u2011examples: here is one of the <a href=\"https:\/\/forklog.com\/en\/news\/certiks-x-account-compromised-by-unknown-hackers\">latest<\/a>, and here is another one. Everyone gets hacked: if you have not yet been targeted by vector attacks, that is only because you are like the Uncatchable Joe\u2014not yet on the list.<\/p>\n<p>My zero rule of security therefore reads: \u201cAny system can be hacked.\u201d The questions are always price and time. If it is too long or too expensive, they will not bother (destructive attacks aside, which are another matter).<\/p>\n<h3 class=\"wp-block-heading\"><strong>Example No. 3. Diversification works, but it requires habit<\/strong><\/h3>\n<p>Suppose you are hunting <a href=\"https:\/\/hub.forklog.com\/7-sposobov-zarabotat-na-testnetah\/\" target=\"_blank\" rel=\"noopener\" title=\"\">bounties<\/a>, airdrops and the like. What do you actually do? Test new services and systems. A little at first, then more, then several at once\u2014until you become adept at working with all sorts of start-ups, from niche to sectoral.<\/p>\n<p>But at that moment your base wallet becomes literally stuffed with approvals for contracts and permissions for services, and your browser\u2014with bookmarks and other trappings of deep digital immersion.<\/p>\n<p>At that point attacks will inevitably come:<\/p>\n<ol class=\"wp-block-list\">\n<li><strong>Through fake accounts on X<\/strong>. Even if you withstand the \u201cspot the ten differences\u201d game, nobody is insured against an official account being hacked and phishing links being sent from it. That seems to happen even with the <a href=\"https:\/\/forklog.com\/en\/news\/secs-x-account-hacked-to-announce-fake-bitcoin-etf-approval\">SEC<\/a> or Vitalik Buterin.<\/li>\n<li><strong>Through email<\/strong>. The spam will be copious and well targeted, both via special services and standard mailing tools, and via subscriptions. Hence I keep a public Gmail address for everything, and private addresses for important services\u2014especially since in Web3 there has long been no shortage of the necessary <a href=\"https:\/\/web3.name\/web3-emails-messengers\">tools<\/a>.<\/li>\n<li><strong>Through Telegram, Discord and other messengers<\/strong>. Living with this is hard. If you are active in the crypto community, you will have noticed spam races through groups lightning\u2011fast and in parallel.<\/li>\n<\/ol>\n<p>I list all this so you draw one conclusion: <strong>anyone can be hacked<\/strong>. The antidote is diversification.<\/p>\n<p>Say you received a retrodrop to a wallet, having first done all the above (checked approvals and so on). What next? Transfer everything to another wallet that either does not interact with the internet at all, or does so very rarely. That way you leave on a hot wallet only what you are prepared to lose\u2014and no more.<\/p>\n<p>Here are some other important tips:<\/p>\n<ol class=\"wp-block-list\">\n<li><strong>Stay up to date<\/strong>. Read ForkLog and other outlets\u2014say, via an <a href=\"https:\/\/cryptonews.net\/ru\/\">aggregator<\/a>. It may sound banal, but it lets you spot up to two\u2011thirds of attacks. How? Someone\u2019s site or protocol is hacked, DNS is spoofed\u2014and you already know and do not visit that resource today. When they restore it\u2014by all means, but not today. The life of phishing sites is mercifully short.<\/li>\n<\/ol>\n<ul class=\"wp-block-list\">\n<li>Xakep.ru\u2014my regular weekend read for some 15 years;<\/li>\n<li><a href=\"https:\/\/auditdb.io\/\">AuditDB<\/a>, <a href=\"https:\/\/www.dynamic.xyz\/talk-to-us\">Dynamic<\/a> and other specialist resources;<\/li>\n<li>closed forums such as Exploit.in.<\/li>\n<\/ul>\n<ol class=\"wp-block-list\" start=\"3\">\n<li><strong>Always validate any airdrops<\/strong> and the like via several resources. Recall the <a href=\"https:\/\/help.galxe.com\/en\/articles\/8452958-october-6th-dns-security-incident-statement-guide\">Galxe hack<\/a>\u2014if only to prevent a repeat. The standard set: a) the official site; b) social networks; c) the media.<\/li>\n<\/ol>\n<p>Again, each item on its own is weak; together they give you an edge. To the above I add three empirical rules (read: laws):<\/p>\n<ol class=\"wp-block-list\">\n<li><strong>If you can wait\u2014wait<\/strong>. But not too long: not so long ago I managed to miss a retrodrop simply because I mixed up the dates.<\/li>\n<li><strong>If someone you know has been hacked<\/strong>\u2014from an open community to friends, relatives and other close contacts\u2014be on your guard.<\/li>\n<li><strong>If you think you know it all, remember<\/strong> the hack via a <a href=\"https:\/\/incrypted.com\/skam-na-revoke-razbiraem-shemu-i-kak-ot-nee-zashititsya\/\">reverse approval<\/a> in BSC and forget, once and for all, any sense that such knowledge is complete or universal.<\/li>\n<\/ol>\n<h2 class=\"wp-block-heading\"><strong>Your keys\u2014your money<\/strong><\/h2>\n<p>Many believe that everything described above, and similar cases, proves that account abstraction and all manner of revocable (reversible) transactions will solve the problem.<\/p>\n<p>I am convinced of the opposite. If you walk down a dark street at night, even in placid Switzerland, without any self\u2011defence skills, you risk running into a lone thug who will hit you over the head with \u201ca heavy blunt object\u201d and take your wallet, smartphone and wedding ring.<\/p>\n<p>Digital hygiene must therefore become as necessary as brushing your teeth in the morning or washing your hands before eating. There is no other way, as breaches of every scale attest. One more example.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Example No. 4. KYA, or know what and whom you work with<\/strong><\/h2>\n<p>This happened recently. A person was trading via a CEX and decided to withdraw funds. He copied an address and pasted it into the withdrawal field. He pressed confirm and went to have tea.<\/p>\n<p>On returning he saw the funds had gone elsewhere. A standard clipboard\u2011substitution trick had fired. It comes in many guises:<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>\u201c<\/strong><a href=\"https:\/\/cryptonews.net\/ru\/19151775\/\" target=\"_blank\" rel=\"noopener\" title=\"\"><strong>poisoned<\/strong><\/a><strong>\u201d transactions<\/strong> and addresses, which now both wallets and scanners must fight;<\/li>\n<li><strong>standard <\/strong><a href=\"https:\/\/bits.media\/istoriya-vzloma-ot-sergey-simanovsky\/\" target=\"_blank\" rel=\"noopener\" title=\"\"><strong>keyloggers<\/strong><\/a>, trojans and other malware, which abound on the dark net and, worst of all, can be wielded by <a href=\"https:\/\/ru.wikipedia.org\/wiki\/%D0%A1%D0%BA%D1%80%D0%B8%D0%BF%D1%82-%D0%BA%D0%B8%D0%B4%D0%B4%D0%B8\" target=\"_blank\" rel=\"noopener\" title=\"\">script kiddies<\/a>;<\/li>\n<li><strong>wallet substitution<\/strong>: mobile, desktop or extension\u2014no matter. Download the wrong binary\u2014and that is that. Even downloading from the official site may not help\u2014remember the Atomic Wallet case.<\/li>\n<\/ul>\n<p>But you can fight this. Simple mechanics:<\/p>\n<ul class=\"wp-block-list\">\n<li>update after reading the news, not before;<\/li>\n<li>if an update is not critical, wait a few days and watch the feed: it will not save you from <a href=\"https:\/\/en.wikipedia.org\/wiki\/Zero-day_(computing)\" target=\"_blank\" rel=\"noopener\" title=\"\">zero\u2011day<\/a> vulnerabilities, but it will from many lesser woes;<\/li>\n<li>try to study the documentation of the software you use: read the git, get to know the developers (in the OS world this is not so hard), browse forums and, above all, try to become at least an advanced user of the software;<\/li>\n<li>where possible\u2014and it almost always is\u2014verify hash sums, SSL certificates, PGN, and so on.<\/li>\n<\/ul>\n<p>Never forget that in technology the weakest link is the human. Fatigue, working without breaks and without a strict financial schedule ultimately lead to losses, not extra profit. Bear it in mind.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Conclusion. The perfect armour against phishing<\/strong><\/h2>\n<p>It does not exist. Why? Because \u201cperfect\u201d here means \u201cindividual\u201d. Of course, some points should not be ignored, but otherwise imagination is your best ally.<\/p>\n<p>Here is a checklist of basic self\u2011defence mechanisms.<\/p>\n<ol class=\"wp-block-list\">\n<li><strong>Limit your working hours<\/strong>. 09:00 to 21:00 on weekdays is plenty to solve 99% of tasks. But personalise even this: for instance, handle assets above a certain amount only at weekends.<\/li>\n<li><strong>Customise everything you can<\/strong>: from email and messengers to wallets and DEX accounts. The more details known only to you, the harder it is to trip you up.<\/li>\n<li><strong>Do not shun notifications<\/strong> and additional safeguards. Separate cold and hot wallets, set alerts in scanners and special services (<a href=\"https:\/\/app.hal.xyz\/auth\/signin\" target=\"_blank\" rel=\"noopener\" title=\"\">HAL.xyz<\/a>, <a href=\"https:\/\/app.cielo.finance\/feed\" target=\"_blank\" rel=\"noopener\" title=\"\">Cielo<\/a>). In short, learn to build an <a href=\"https:\/\/en.wikipedia.org\/wiki\/IFTTT\" target=\"_blank\" rel=\"noopener\" title=\"\">IFTTT<\/a>\u2011style setup for yourself.<\/li>\n<li><strong>Diversify assets<\/strong> into at least three buckets: core investments, working tools, stabilisation fund. And remember that <a href=\"https:\/\/t.me\/web3news\/5002\" target=\"_blank\" rel=\"noopener\" title=\"\">diversification<\/a>, like decentralisation, is a case of \u201cthe more, the merrier\u201d.<\/li>\n<li><strong>Stay informed<\/strong>. Read the news before you move a large sum from a compromised service, not after. Remember that video and voice deepfakes already exist, and devise your own verification methods for OTC\/P2P trades.<\/li>\n<li><strong>Do not forget we operate in an untrusted environment<\/strong>. Gmail spam filters are imperfect; wallets on CEX are not wallets; your ERC\u201120 with an approval on any protocol is not really yours. If you are attacked, help others: report phishing to <a href=\"https:\/\/safebrowsing.google.com\/safebrowsing\/report_phish\/?hl=ru\" target=\"_blank\" rel=\"noopener\" title=\"\">Google<\/a>, <a href=\"https:\/\/yandex.ru\/support\/search\/troubleshooting\/delspam.html\" target=\"_blank\" rel=\"noopener\" title=\"\">Yandex<\/a> and specialised resources such as AMLBot and Chainabuse.<\/li>\n<li><strong>Do not overlook new wallet features<\/strong>. A recent MetaMask feature, for example, saved me.<\/li>\n<li><strong>Raise the level at which you work with services.<\/strong> For example, phishing tokens in Ethereum are <a href=\"https:\/\/etherscan.io\/address\/0x34278f6f40079eae344cbac61a764bcf85afc949#tokentxns\" target=\"_blank\" rel=\"noopener\" title=\"\">plenty<\/a>, but in nine out of ten cases a scanner flags them promptly and accurately\u2014let alone advanced tools.<\/li>\n<li><strong>The main rule of security: any system can be hacked<\/strong>. Work from that premise and the rest of the checklist falls into place.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Spam and phishing are two perennial scourges of the internet at every stage of its evolution. Web3 is no exception. Vladimir Menaskop explains how to fend off phishing attacks on your crypto-assets for ForkLog readers: Vladimir Menaskop. Three pillars: security, diversification, customisation If that reads like a mere string of words, it is time to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":9912,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[1144],"tags":[1284,1111,1110],"class_list":["post-9913","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-longreads","tag-crypto-assets","tag-cybersecurity","tag-web-3-0"],"aioseo_notices":[],"amp_enabled":true,"views":"50","promo_type":"","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/9913","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=9913"}],"version-history":[{"count":0,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/9913\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/9912"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=9913"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=9913"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=9913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}