-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
feat(getting started): Add page on avoiding scams
- Loading branch information
Showing
1 changed file
with
114 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,114 @@ | ||
--- | ||
layout: default | ||
title: Avoid Scams | ||
parent: Getting Started | ||
nav_order: 3 | ||
--- | ||
|
||
# Avoid Scams on Base | ||
|
||
Protect your Base assets by acquainting yourself with prevalent scams within the | ||
cryptocurrency space. | ||
|
||
## Types of Scams | ||
|
||
- [Blackmail](#blackmail) | ||
- [Fake DEXs](#fake-dexs) | ||
- [Free Token Giveaways](#free-token-giveaways) | ||
- [Impersonation](#impersonation) | ||
- [Malware](#malware) | ||
- [In-Person Transactions](#in-person-transactions) | ||
- [Money Transfer Fraud](#money-transfer-fraud) | ||
- [Phishing Emails](#phishing-emails) | ||
- [Phishing Websites](#phishing-websites) | ||
- [Ponzi Schemes](#ponzi-schemes) | ||
- [Pyramid Schemes](#pyramid-schemes) | ||
- [Prize Giveaways](#prize-giveaways) | ||
- [Pump and Dumps](#pump-and-dumps) | ||
- [Ransomware](#ransomware) | ||
- [Scam Tokens](#scam-tokens) | ||
|
||
### Blackmail | ||
|
||
Blackmail threats demanding Base tokens in exchange for not revealing personal | ||
or damaging information have been observed. These are often delivered via email | ||
or DMs claiming the hacker has sensitive data or footage. Typically, these | ||
emails are sent en masse in hopes that someone will pay. Always exercise caution | ||
and skepticism. | ||
|
||
### Fake DEXs | ||
|
||
With the growth of decentralized platforms, some fraudulent individuals create | ||
fake decentralized exchanges. They may offer extremely attractive rates to lure | ||
users. Always transact on reputable DEXs. | ||
|
||
### Free Token Giveaways | ||
|
||
Beware of offers or events that promise free tokens in return for a small | ||
deposit, upon completion of tasks, or in exchange for your personal details. | ||
Always double-check the authenticity of such promotions. | ||
|
||
### Impersonation | ||
|
||
Watch out for accounts on social platforms that impersonate well-known figures | ||
or organizations in the Base community. Always verify the authenticity of | ||
accounts and their claims before taking any action. | ||
|
||
### Malware | ||
|
||
Ensure that the software you use is from a legitimate source. Some malware can | ||
alter Base addresses you copy-paste, redirecting your assets to the hacker's | ||
address. | ||
|
||
### In-Person Transactions | ||
|
||
If you're considering buying or selling tokens in person, always meet in public | ||
places and be wary of offers that sound too good to be true. | ||
|
||
### Money Transfer Fraud | ||
|
||
Be skeptical of unsolicited communications asking for Base tokens, especially if | ||
they promise significant returns. | ||
|
||
### Phishing Emails | ||
|
||
Always be wary of emails asking you to reset passwords or provide any personal | ||
information. Verify the sender's authenticity before acting on any email | ||
instructions. | ||
|
||
### Phishing Websites | ||
|
||
Stay cautious of websites that impersonate legitimate Base or crypto-related | ||
platforms. Ensure you're visiting the genuine site, especially before entering | ||
sensitive information. | ||
|
||
### Ponzi Schemes | ||
|
||
Avoid "investment opportunities" that promise guaranteed returns. If it sounds | ||
too good to be true, it probably is. | ||
|
||
### Pyramid Schemes | ||
|
||
Stay away from schemes that generate returns based on the number of new | ||
participants rather than genuine investments. | ||
|
||
### Prize Giveaways | ||
|
||
Just as with free token giveaways, be skeptical of prize giveaways that ask for | ||
personal information or any form of deposit. | ||
|
||
### Pump and Dumps | ||
|
||
Be cautious of individuals or groups promoting a token's price only to sell it | ||
off after others have bought in. | ||
|
||
### Ransomware | ||
|
||
This malware type locks access to a user's system, demanding tokens as ransom. | ||
Always be careful about the software you install. | ||
|
||
### Scam Tokens | ||
|
||
Some tokens might be promoted heavily, only to be schemes designed to defraud | ||
people. [Always DYOR](https://basehub.org/docs/getting-started/dyor/). | ||
|