Binance Square
LIVE
Mr Eng
@Square-Creator-1steng
NFT Creater,Collector&Supporter.
Following
Followers
Liked
Shared
All Content
LIVE
--
Bullish
Have a long-term perspective: Cryptocurrency investments are often more fruitful with a long-term outlook. Don't panic sell during market downturns and have patience.
Have a long-term perspective: Cryptocurrency investments are often more fruitful with a long-term outlook. Don't panic sell during market downturns and have patience.
lol
lol
LIVE
Mr-Narcos
--
🚨💵 A gift of half an Ethereum pill to the last person to retweet and comment on this tweet..

AprilFools
Burning processSurely you have heard about burning  cryptocurrencies 🤔🤔Burning is the destruction of part of the coin. Its importance revolves around limiting the supply of that currency and thus raising its price - as we know -. All of these burning operations are recorded on the blockchain as a transaction, but how does the process take place?By sending the number to be burned ( on the platforms) to one of the burning or death wallets, the most famous one, the wallet (0x00000000000000000000000000000000000000dEaD).Of course, it contains millions of dollars ... The answer of the question that came to your mind👇👇These addresses are designed to receive only and cannot be sent through them, and the possibility of being hacked is very, very small But it's still possible.@Binancearabic #BinanceMenaSquare

Burning process

Surely you have heard about burning  cryptocurrencies 🤔🤔Burning is the destruction of part of the coin. Its importance revolves around limiting the supply of that currency and thus raising its price - as we know -. All of these burning operations are recorded on the blockchain as a transaction, but how does the process take place?By sending the number to be burned ( on the platforms) to one of the burning or death wallets, the most famous one, the wallet (0x00000000000000000000000000000000000000dEaD).Of course, it contains millions of dollars ... The answer of the question that came to your mind👇👇These addresses are designed to receive only and cannot be sent through them, and the possibility of being hacked is very, very small But it's still possible.@Binance MENA #BinanceMenaSquare
✅✅✅✅✅✅
✅✅✅✅✅✅
LIVE
Binance MENA
--
Get started now on Binance Square and stand a chance to win amazing prizes!
Want to get an iPhone 15 or win FDUSD vouchers as prizes? Get started on Binance Square between March 4 and March 11, 2024, and seize this golden opportunity!
Just start with these simple tasks and every step will bring you closer to great rewards:

Task 1 - Become part of Binance Square
Set up your Binance Square profile. Add your nickname, avatar and a short bio;
See original
How to hack wallets and steal the currencies in themThousands of users are exposed daily to many forms of fraud and piracy. According to the latest statistics for the year 2023, approximately 889 million dollars in encrypted assets were lost. This is due to many reasons and loopholes, including technical, software, and some resulting from coincidence, perhaps due to the user’s ignorance, lack of awareness, or complacency. Most of the thefts that occur It is directly related to or based on one of these methods: - Social engineering: - ● One of the primitive methods, based on phishing, in which the attacker studies the victim’s interest - usually targeting naive victims - and relies on electronic promotional messages in which he uses reverse engineering and collects information from them to penetrate ● This method has a low risk rate. ● This type of attack can be avoided by carefully dealing with all spam emails and making sure to activate two-factor authentication (2Factor). Authentication).Guessing passwords Brute-force-attack:- Most of us use wallets based on the BIP39 protocol, which is an algorithm standard that relies on only 2048 words. If, for example, you download TrustWallet and create a wallet that gives you a private key for recovery and passwords as well (recovery phrase), this The list was not chosen randomly, but was chosen carefully, so that there is no more than one word that begins with the same first four letters. The wallet words are generated randomly based on these complex mathematical algorithms. The wallet then uses the random wallet words to generate the wallet encryption keys. Specific and general, usually consisting of 12 or 24 words. Of course, all of these conditions make the guessing process difficult, but with the recent AI wave and the development of quantum computers, the risk rate has increased and spelling guessing is not as difficult as expected.● The threat rate is low to medium.● This type of attack can be avoided by using trusted wallets only, as most of the thefts that occurred were the result of To share spelling checks with a third party. Cloned websites and mined contracts: - The majority of wallets are targeted by these methods, in which one of the official websites is forged by changing the domain or a number of characters, and once the user falls into the trap, the hacker can obtain the signature and complete control over the assets of the wallet. Among the common reasons Also dealing with forged smart contracts, which are usually injected with codes and calling functions such as initWallet, which can pass the wallet address and seize it.● The threat rate of these attacks is high.● We can protect ourselves by not interacting with contracts unless we are sure of their nature and also verify the HTTPS protocol when linking. On any site, when any suspicious movement is detected, the window must be closed. Also, continuous updating of all programs is sufficient to give us the necessary protection. Thefts related to security vulnerabilities: - ● They are usually few, but one must be alerted because they are of high risk, examples of which include cold wallet vulnerabilities and block chain vulnerabilities ( Nodes vulnerabilities: For example, immediate cancellation of transactions was not allowed, but increasing the commission contributed to passing the transfer. This mechanism allows changing the recipient and sending the currencies back to the sender. This requires advanced technological knowledge and is usually linked to the developer of the currency itself, as well as attacks associated with decentralized platforms such as sandwiching attacks carried out by bots by manipulating slippage levels and other vulnerabilities that we can discuss in more detail and understanding. Its mechanism in upcoming topics....#Write2earn#WalidCommUNITY @Walid-Cryptopedia

How to hack wallets and steal the currencies in them

Thousands of users are exposed daily to many forms of fraud and piracy. According to the latest statistics for the year 2023, approximately 889 million dollars in encrypted assets were lost. This is due to many reasons and loopholes, including technical, software, and some resulting from coincidence, perhaps due to the user’s ignorance, lack of awareness, or complacency. Most of the thefts that occur It is directly related to or based on one of these methods: - Social engineering: - ● One of the primitive methods, based on phishing, in which the attacker studies the victim’s interest - usually targeting naive victims - and relies on electronic promotional messages in which he uses reverse engineering and collects information from them to penetrate ● This method has a low risk rate. ● This type of attack can be avoided by carefully dealing with all spam emails and making sure to activate two-factor authentication (2Factor). Authentication).Guessing passwords Brute-force-attack:- Most of us use wallets based on the BIP39 protocol, which is an algorithm standard that relies on only 2048 words. If, for example, you download TrustWallet and create a wallet that gives you a private key for recovery and passwords as well (recovery phrase), this The list was not chosen randomly, but was chosen carefully, so that there is no more than one word that begins with the same first four letters. The wallet words are generated randomly based on these complex mathematical algorithms. The wallet then uses the random wallet words to generate the wallet encryption keys. Specific and general, usually consisting of 12 or 24 words. Of course, all of these conditions make the guessing process difficult, but with the recent AI wave and the development of quantum computers, the risk rate has increased and spelling guessing is not as difficult as expected.● The threat rate is low to medium.● This type of attack can be avoided by using trusted wallets only, as most of the thefts that occurred were the result of To share spelling checks with a third party. Cloned websites and mined contracts: - The majority of wallets are targeted by these methods, in which one of the official websites is forged by changing the domain or a number of characters, and once the user falls into the trap, the hacker can obtain the signature and complete control over the assets of the wallet. Among the common reasons Also dealing with forged smart contracts, which are usually injected with codes and calling functions such as initWallet, which can pass the wallet address and seize it.● The threat rate of these attacks is high.● We can protect ourselves by not interacting with contracts unless we are sure of their nature and also verify the HTTPS protocol when linking. On any site, when any suspicious movement is detected, the window must be closed. Also, continuous updating of all programs is sufficient to give us the necessary protection. Thefts related to security vulnerabilities: - ● They are usually few, but one must be alerted because they are of high risk, examples of which include cold wallet vulnerabilities and block chain vulnerabilities ( Nodes vulnerabilities: For example, immediate cancellation of transactions was not allowed, but increasing the commission contributed to passing the transfer. This mechanism allows changing the recipient and sending the currencies back to the sender. This requires advanced technological knowledge and is usually linked to the developer of the currency itself, as well as attacks associated with decentralized platforms such as sandwiching attacks carried out by bots by manipulating slippage levels and other vulnerabilities that we can discuss in more detail and understanding. Its mechanism in upcoming topics....#Write2earn#WalidCommUNITY @Walid-Cryptopedia
🤔🤔🤔🤔
🤔🤔🤔🤔
LIVE
Mr-Narcos
--
Andrew Tate has announced plans to launch his own cryptocurrency token, claiming he will hold it indefinitely.
He said last year: “I have nothing to do with any cryptocurrencies... I don’t need to steal my fans.”

#Write2Earn #TrendingTopic #ftt
definitely!!!
definitely!!!
LIVE
Mr-Narcos
--
On the sidelines..

📍As long as there are a lot of people still able to buy every shiny new thing, there is money flowing in when the bull cycle begins.

📍Note:

📍The money never disappeared.

📍When inflation reached record highs and life became more expensive, it was because they printed 20% of the total money supply in one year.

📍While some people have become poorer, others have actually become richer depending on which side of the business you are in.

The large expenses you pay still go to a place that you and I know well.

📍✅(Mostly the rich are getting richer)

📍Yes, it is unfortunate for most of us not being able to save as much money as before and not being able to invest as much as a result.

📍🔨But for markets, it does not matter whether the capital comes from person A or person B.

📍🧨Money is still flowing and will continue to flow when the time is right.. to be continued later

#BNB | #البيتكوين‬⁩ | #عملات_رقمية‬⁩
Good luck نورت binance square
Good luck
نورت binance square
LIVE
Q8Three - غازي
--
Enjoying the Second day of #BinanceCampus in Seychelles 🇸🇨

#Q83CommUNITY
LIVE
--
Bullish
BTC to 48,000🚀🚀🚀🚀🚀🚀🚀
BTC to 48,000🚀🚀🚀🚀🚀🚀🚀
The company that reported that the SEC will reject applications for Bitcoin ETFs is Matrixport. The founder of this company is Jihan Wu, who is the same founder of Bitman, the largest company producing ASICs for Bitcoin mining! Coincidence 🤔.
The company that reported that the SEC will reject applications for Bitcoin ETFs is Matrixport.

The founder of this company is Jihan Wu, who is the same founder of Bitman, the largest company producing ASICs for Bitcoin mining!

Coincidence 🤔.
A memecoin developer on the #Solana network called #JEET stopped the project (RUG PULL) and went live on Twitch, where he accidentally leaked his face during the stream💀💀!! beware of scammers everywhere.
A memecoin developer on the #Solana network called #JEET stopped the project (RUG PULL) and went live on Twitch, where he accidentally leaked his face during the stream💀💀!!

beware of scammers everywhere.
BlackRock has announced JP Morgan as an approved partner in its Bitcoin ETFs. JPMorgan said at the beginning of this month: We will close all trading operations in cryptocurrencies. Today they are BlackRock partners. It is truly shameful for large companies to say that cryptocurrencies are “money laundering and fraud” while they trade, buy and participate behind closed doors.
BlackRock has announced JP Morgan as an approved partner in its Bitcoin ETFs.

JPMorgan said at the beginning of this month: We will close all trading operations in cryptocurrencies.

Today they are BlackRock partners.

It is truly shameful for large companies to say that cryptocurrencies are “money laundering and fraud” while they trade, buy and participate behind closed doors.
Crash?!🕕🕝
Crash?!🕕🕝
This person bought 290,750 #link coins at a price of $7.8 ($2.26 million) between 2022 and 2023, earning approximately $2.4 million. Unfortunately for him, he accidentally entered a phishing link and was tricked into signing a transaction and lost everything. I'm telling you this so you know how easy it is to deceive anyone 🚨⚠️Please do not access any link or verify any transaction without verifying it.
This person bought 290,750 #link coins at a price of $7.8 ($2.26 million) between 2022 and 2023, earning approximately $2.4 million. Unfortunately for him, he accidentally entered a phishing link and was tricked into signing a transaction and lost everything.

I'm telling you this so you know how easy it is to deceive anyone
🚨⚠️Please do not access any link or verify any transaction without verifying it.
The US government profit +8.5 billion dollars from the +194 thousand Bitcoins they succeeded in confiscating. Investment: $0. Profit: +8.5 billion dollars.
The US government profit +8.5 billion dollars from the +194 thousand Bitcoins they succeeded in confiscating.

Investment: $0.
Profit: +8.5 billion dollars.
Almost all second layer projects such as Arbitrum | Polygon | Optimisim uses a multi-signature wallet method to secure network assets. This means that billions of dollars on these networks are controlled (literally) by a small number of individuals. (3~5 mostly). Of course, there are risks: -Technically these people can steal all network assets. - The presence of a central authority that controls network assets = the possibility of it being subject to regulation and government orders. - Wallet keys can be stolen/leaked and entire network assets stolen. The last scenario is exactly what happened in the Ronin network hack, the largest theft in the industry, as hackers succeeded in stealing 5 of the 9 keys required to sign a theft worth $625 million.
Almost all second layer projects such as Arbitrum | Polygon | Optimisim uses a multi-signature wallet method to secure network assets.

This means that billions of dollars on these networks are controlled (literally) by a small number of individuals. (3~5 mostly).

Of course, there are risks:
-Technically these people can steal all network assets.
- The presence of a central authority that controls network assets = the possibility of it being subject to regulation and government orders.
- Wallet keys can be stolen/leaked and entire network assets stolen.

The last scenario is exactly what happened in the Ronin network hack, the largest theft in the industry, as hackers succeeded in stealing 5 of the 9 keys required to sign a theft worth $625 million.
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number

Latest News

--
View More

Trending Articles

avatar
Queen_Aliza
View More
Sitemap
Cookie Preferences
Platform T&Cs