Behind the high returns of the blockchain? Expose various tactics and scams
Follow ZPD to learn more
Table of contents
No headings in the article.
Behind the high returns of the blockchain? Expose various tricks and scams, so that newcomers can participate more safely!
1. Ponziå Scheme:
Use the funds of new members to pay the rewards of early joiners.
2. ICO scams:
fake cryptocurrency projects or white papers to lure investors into buying tokens.
3. Fake exchange:
Pretend to be a legal exchange to defraud funds. The profit is extremely fast but the user cannot withdraw the profitable funds. Users will be required to remit in various names to create the illusion that withdrawals can be made.
4. Cloud mining fraud:
False cloud mining platforms attract investors to buy computing power.
5. Counterfeit currency:
counterfeit currency is manufactured and sold through exchanges, and cannot be sold after purchase, a loophole in the contract.
6. Defrauding the private key:
Pretend to send emails or private messages on social media to deceive users into revealing the private key.
7. Counterfeit projects:
Pretending to be well-known projects to defraud users of assets or personal information.
8. Social Engineering:
Pretending to be a legitimate organization or individual to defraud users of assets or personal information.
9. Wallet signature:
Various online wallets may require authorization or signature to control the wallet when the user logs in to the website.
10. Use KOL:
Find various well-known bloggers to promote, let them get the first stage profit, and then leave.(But not every well-known KOL will do this, users should pay more attention to judgment)
11. Push new currency:
Send new currency news, then add liquidity funds to the liquidity pool, withdraw liquidity funds and leave after the skyrocketing, users will have no exchange to sell funds.
12. Modify the tax rate:
Some tokens will control the permission to modify the tax rate in the code, resulting in 0% for buying and 15-100% for selling.
13. Fake account smashing:
When the tokens are about to be launched or in the stage of airdrop activities, the founders will distribute the tokens to the fake accounts created by themselves to make profits. There may be tens to hundreds of fake accounts, causing many people to The illusion of holding is then slowly sold.
14. Closing the website:
Closing the website entrance directly prevents users from logging in.
Some tools to detect tokens include: Etherscan, BscScan, PolygonScan, Solana Explorer, etc.
Detecting contracts usually requires a combination of static analysis tools and dynamic analysis tools. Static analysis tools include Mythril, Slither, Oyente, etc., which can perform code-level analysis on contracts to detect vulnerabilities and risks. Dynamic analysis tools include Truffle, Ganache, Remix, etc., which can run contracts in a simulated environment to detect whether the functions and behaviors of the contracts meet expectations. In addition, methods such as code review and test case design can also be used for contract detection.
Don't be dazzled by the high returns when you just enter, calm down, analyze, and check, and only then can you walk safely in this virtual world.
ZPD-Thanks for watching, if you like it, you can follow or subscribe me!