Chapter 6
Since the Web3 world is still in its infancy of course there are some security and safety risks in this space.
Understanding these risks helps you to identify scam attempts and prevent them from happening to you. In this chapter, we share some valuable tips to stay safe and secure!
The term Web3 was born in 2014 by Ethereum co-founder Gavin Wood
and became more popular around 2021. This upcoming version of the Internet includes cryptocurrencies and tokens, wallets,
decentralized networks, the blockchain and other technologies.
Now security is always a work in progress, but let’s have a look into some of the known risks that you can encounter.
51% attacks
A Blockchain, is essentially a database that stores transactions and information about them before encrypting the information. Through a validation procedure, the Blockchain's network comes to a consensus about transactions, and the blocks containing the data are then sealed.
By storing prior block information in each block, cryptographic techniques are used to link the blocks together. As a result, once the blocks are validated enough times, it becomes practically impossible to change them. A group that has more than 50% of the network's hashing power* (*the processing power used to solve the cryptographic puzzle) is said to be performing a 51% attack on the blockchain.
At a very specific point in the Blockchain, this group then introduces an altered Blockchain to the network, which is presumably approved by the network because the attackers would own most of it. The key to preventing 51% attacks is the community behind a network/project agreeing to uphold the value of immutability and to maintain decentralization.
Rug pulls or exit scams
These are attacks where the developer/creator attracts investors to a new cryptocurrency project. Most of the time they operate anonymously.
The creators will hype and pump the new token through social media and other platforms. They often copy an idea or a whitepaper from another project and build a simple website around it. After a while they’ll pull out and abandon the project with all the investors' funds, leaving those with a worthless token.
To identify these scammers you as a potential investor should research possible red flags such as team credibility, extravagant return projections, documentation standards, the level of transparency, a non-existing working model or heavily promoted offerings.
Third-party software libraries introduce a large attack surface
Teams that operate in Web3 must keep track of the progress and condition of the projects they rely on, check for vulnerabilities in the individual components of their software, and make sure updates are applied. This does not always happen and you as a user should always be aware of these kinds of risks when using third party applications like token bridges or other platforms that offer interoperability or cross chain interactions*
(*Normally a blockchain operates separately. Cross Chain/Multi Chain/Interoperability is an emerging technology that facilitates the transfer of value and data between two or more blockchain networks).
Some things you should (at all time)
avoid sharing online:
If things presented to you seem too good to be true, they probably are..
Do your own research (DYOR). You can use many tools that make doing research on projects simple. Check out our awesome Tool Box!
In basic terms, a VPN provides an encrypted server and hides your IP address from corporations, government agencies and would-be hackers. A VPN protects your identity even if you are using public or shared Wi-Fi, and your data will be kept private from any prying internet eyes.
More on this in the next chapter
--
--
--
--
When using dApss like Uniswap and OpenSea you need to grant them access to spend your tokens and NFTs when utilizing them. This is referred to as an allowance. The dApp can use your tokens for as long as you don't revoke these permissions.
Some scammers imitate well-known dApps to trick users into interacting with their own dApps, whereupon they may take funds from the token Smart Contracts in which you have interacted in their dapp. By revoking your Smart Contract allowances, you can Take Back control!
Finding out exactly how your funds have been stolen is never easy. To help you diagnose the cause and mitigations we recommend utilizing Revoke.Cash
They also have a nice infographic on their website to check how you probably got scammed and what you should do about it.
What People Say About Us
Helping people, entrepreneurs & businesses to bridge the gap between the internet of today towards the revolutionary Web4 movement.
#TakeItBack
Support us
Support the free and independent movement!
with 5 Euro / Dollar you already help us enormously!
Bitcoin wallet:
bc1qtl0yyayrdy2p74xf52ts75tw2tl0aleehhtfjl
Monero wallet:
44gKNgXYMEfFFBR4J1ySmj161zYpMZdGZPH1D2mDnYHTPXLmv83d58CbF6uNWpDq1Vdgw1NLwkJNkR1NEmqmC5xa6ZzRehG
Ethereum wallet:
takeitback.eth