+

All types of wallet/token/NFT hacks fall into two categories:

  1. Abuse of previously owned token approval.
  2. Private key/seed compromise.

Token Approvals:

Token approvals are essentially a permission for smart contract to access and move specific type or amount of a token from your wallet. Like giving permission to OpenSea or Uniswap to move your NFTs so you can see them.

In detail, on Ethereum network, everything except ETH is ERC-20 token. NFTs are are mostly ERC-721 and 1155 tokens respectively. Their approval mechanics work similar to ERC-20s but for NFT marketplaces.

If you are not careful about that, you might just give grant tokens permission to a malicious smart contract to get your assets stolen.

Many DeFi apps will prompt for unlimited approval of ETC20 token by default. This is to improve user experience, and it is more convenient as it does not require potential future approvals thus saving on time and gas fees.

So limiting this for max amount of tokens will fix the problem.

NFT Approvals:

NFT marketplaces will ask for that kind of approval, thus when you sell and NFT to a buyer, that marketplace’s smart contract can move the NFT automatically to the buyer. This sounds cool, but can also be used by malicious websites/contracts to steal your NFTs.

Example: When you are about to mint an NFT, from a website which looks totally legitimate, in the background their contract searches for your wallet and chooses the highest value NFT and asks for permission to take it, and when you think you are minting, you are giving away your NFT.

Limit your risk to approvals:

Hardware Wallets:

Hot wallets are connected to the internet thtough your computer or phone so the keys stored online.

Cold wallets are hardware devices where the key is generated and stored offline.

So it is a lot safer to use hardware wallet, I would suggest Coldcard mk4 for #btc, and trezor for #eth

There are some stuff to look for:

How People Got Hacked?

Takeaways:

Misc Stuff:

The point is assume that everything you have in a how wallet is already compromised or can be at any point, so act accordingly.

#Technology #Crypto #Security