Stay safeProtect yourselfWallet and hardwareWallet and hardwareHelpAddress poisoning scams Learn how to protect yourself from copy-and-paste attacks.Clipboard hacking What is clipboard hacking and how can you protect yourself.Signature phishing Attackers obtain an off-chain signature and then use it later to steal your assets.
Signature phishing Attackers obtain an off-chain signature and then use it later to steal your assets.