💙 Gate Square #Gate Blue Challenge# 💙
Show your limitless creativity with Gate Blue!
📅 Event Period
August 11 – 20, 2025
🎯 How to Participate
1. Post your original creation (image / video / hand-drawn art / digital work, etc.) on Gate Square, incorporating Gate’s brand blue or the Gate logo.
2. Include the hashtag #Gate Blue Challenge# in your post title or content.
3. Add a short blessing or message for Gate in your content (e.g., “Wishing Gate Exchange continued success — may the blue shine forever!”).
4. Submissions must be original and comply with community guidelines. Plagiarism or re
Recently, I started receiving feedback from my followers about the hacking of Phantom (Solana Wallet) wallets.
It is highly unlikely for a cautious person to lose their crypto wallet. Generally, such hacking incidents occur as a result of carelessness and some negligence.
1⃣ Careless storage of secret words or private keys:
➥ Such cases usually arise from the storage of secret words/private keys in environments like cloud services or email, which are easier to hack.
➥ Although with a lower probability, storing a physical copy in places accessible to 2nd or 3rd parties can also lead to such incidents.
2⃣ Permissions granted to malicious DApps:
➥ Some DApps request "unlimited access" permissions from the wallet owner. If you carelessly grant this permission, they can withdraw assets from your wallet without permission.
For example: An application that appears to be an NFT mint site based on Solana can gain full access to your wallet.
Contrary to popular belief, there is a system in the Solana ecosystem that allows you to revoke permissions:
🔻
Commonly used alternative for EVM networks:
🔻
These types of sites allow you to revoke the spending permissions you have previously granted.
3⃣ Browser extensions / Keyloggers / Malware:
Malware running in the browser where your wallet extension is located can seize your private keys or seed phrase.
Therefore, it is necessary to avoid unnecessary and unlicensed plugins as much as possible.
4⃣ Use of personal devices and connections:
Be careful to set up your wallet on your personal computer. Company computers (, especially devices that can be accessed by the IT department ), are not suitable for cryptocurrency wallet use.
I don't want to cast doubt on IT employees, but this situation creates a security vulnerability.
Also, try to stay away from public WiFi connections as much as possible, and make sure to use your own internet.
These are the things that come to my mind. If you have anything to add, let's meet in the comments.