For cryptocurrency to achieve mass adoption, breaches that can be easily prevented — like the phishing attack that resulted in OpenSea losing $1.7 million — need to end.
In February 2022, OpenSea became a scapegoat for a major Internet man-in-the-middle attack, resulting in the theft of an irreplaceable dynamic password (NFT) of more than $1.7 million from users. This is not the only thing: blockchain users are reported to have lost $3.9 billion to fraudulent theme activities in 2022 alone.
When we enter 2023, everyone who is singing the service promises to improve the security of the login password indoor space. But so far, the situation has not changed significantly. Enterprises that make use of blockchain are still not good enough at preventing fraud.
If the blockchain technology is to be selected on a large scale, the enterprise will be forced to change his way from the bottom up. According to the commitment to culture and education and the implementation of stronger operational processes to identify deliberate theme activities, with the steady growth of the region, this platform can better serve customers.
The blockchain platform should learn how to identify intentional thematic activities.
In the OpenSea network hacking accident, the victim was asked to sign an imperfect contract, perhaps in response to the needs of the platform. Although OpenSea's critical infrastructure has not been hacked, these misrepresented accounts can take advantage of the Huaiwen agreement of the open source system. Hackers can then use the owner's signature to transfer it to an unauthentic agreement that grants them the right to use it without paying NFT fees.
OpenSea has recently influenced some of its current policies. It has been reported that NFT made with one click on this platform contains 80% embezzlement or spam messages. OpenSea also depends on trusting developers who use its API, which is not a foolproof way to identify risks. Such developers can use API intentionally to take advantage of users to sign contracts that they do not read articles.
Blockchain intelligent contract is an indispensable part of blockchain module, from NFT trading center to well-deserved decentralized application, we can often see it. It is particularly important to understand how this contract works to ensure the security of users. Companies can implement interface protocols to ensure that intelligent contracts are elastic and avoid the impact of deliberate thematic activities, rather than re-inventing the wheels. From there, the enterprise can take advantage of the agile nature of the blockchain to order his contract, such as setting multi-signature wallets and on-time unit test papers.
Beware of junk messages and airdrop materials.
If you find a popular Mutant Hound collection among OpenSea's top collections, there is no indication that which collection is reasonable. Lack of certification may lead to the establishment of counterfeit collections, artificially raising prices, which in turn seems reasonable and confusing to users. Imitation goods are generally distributed in the form of airdrop materials, and the purpose is to find imitation goods by the collection function of the NFT platform.
Spam messages can also be used to airdrop goods to users who do not have a standard NFT. Users will not be able to jump based on their collection platform (such as OpenSea), but will jump to another site that generates fraud.
This is a common risk that can be solved by monitoring such activity platforms, either according to the tracking fraud account crowdsourcing platform database system, or according to visual tools that know what to explore and continue to master new scams. In addition, the NFT platform has the right to require bidding to use the same loan currency as the sale to prevent confusion. Many users have been tricked into accepting a price lower than the intrinsic value they use when enumerating the sale of NFT. The blockchain platform can rely on data information to expose its outliers according to the abnormal theme activities among a very small number of holders.
Naturally, it is important to note that companies like OpenSea are in an exciting situation to control the fraudulent accounts that have been created on the platform. In most cases, this boils down to more verification of personal collections on the official website.
Staff training is an integral part of the business plan
Getting on the job should be a key part of the block chain experience for both outstanding and beginner users. As with smart contracts, creating a clear user manual and pointing out that potential risks should be called basically one of the best practices for ensuring user security. Such manuals should be checked on time, taking full account of risk assessment and appropriately adjusted with the development of the blockchain.
Among experienced users, the acronym "DYOR" is common among users in the block chain. As an acronym for "doing scientific research at home", this has become an insider for some people who interact with potential investment opportunities. But for newcomers, it can be exciting to know exactly where to start. The influential people in the interior space bring a series of discordant messages that usually drive the next big event and drive high-risk investments, causing users to become victims of fraud or asset loss. The educational materials of the manual should be available anytime and anywhere, and be regulated according to the values and unique risks of each platform.
Good practice should be the priority of all blockchain platforms.
With the blockchain community facing increasing pain at this stage, enterprises should learn from the blood lessons learned from OpenSea and other important system vulnerabilities, and improve his security agreement to ensure that such things do not easily happen again. Learning the small details of training basic skills, from smart contracts to how to protect your seed statements, should be the starting point. Learn how to implement and maintain good practices, such as identifying intentional and destructive activities. Perhaps all you need to avoid some recent large-scale hacking is to draw attention to something that seems to be abnormal.
Michael R. Pierce is the co-founder and CEO of NotCommon. He received both his BBA and MBA from The University of Texas at Austin.