Position: Home page » Virtual » What does the anti phishing code of virtual currency mean

What does the anti phishing code of virtual currency mean

Publish: 2021-03-30 01:15:13
1.

Digital cryptocurrency is a kind of currency that is not issued by legal tender institutions and controlled by the central bank. It is based on the open source code of a group of equations calculated by computers all over the world, and is generated by a large number of calculation processing of computer graphics card and CPU. It uses the design of cryptography to ensure the security of all aspects of currency circulation

development materials:

  1. definition of digital currency:

    digital currency is abbreviated as digiccy, which is the abbreviation of "digital currency" in English and the alternative currency in the form of electronic currency. Both digital gold coin and cryptocurrency belong to digiccy< br />

2. It's better to practice mining than before. Just go around the map. What kind of mine can you mine now? I know that the map of brush mining revolves around. No one grabs the mine. It's very fast to practice
3. 1 mobile phone binding
after logging in, jump to the mobile phone binding of security settings, requiring to fill in the real name and bind the mobile phone number. Each mobile phone number can only be bound to one account, and once enabled, the mobile phone number cannot be modified
2identity authentication
before real name authentication, C2C (over-the-counter transaction), cash withdrawal and other operations cannot be carried out, so it is recommended to give priority to identity authentication
according to the prompts, upload the photos of both sides of your ID card, hold your ID card and the white paper with your gate.io account ID. the ID will be registered in the first line of the user's real name on this page
on the white paper, it is required to write "I know that the investment risk of virtual currency is huge, and I will voluntarily participate in it at my own risk, so as to ensure that the identity information will not be provided to others, and I will not use the gate account to carry out illegal acts. If there is any violation, I am willing to bear the legal risk
after uploading photos, fill in your real identity information as follows and submit it for approval
3 advanced authentication
advanced authentication can only be carried out after identity authentication, so if the identity authentication has not passed, other operations can be carried out first
wait until the identity authentication is approved before advanced authentication. Advanced identity authentication requires making corresponding gestures according to image examples and uploading photos
4 Google verifier binding
Google verification brings secondary protection to your transaction password. After enabling this function, you must input the Google verification code displayed on the mobile app before each login or cash withdrawal operation
in some cases, it can also replace SMS verification code authentication. Click the red button to enable Google verification immediately
download and install the corresponding "Google authenticator" app according to your mobile phone version, and add your gate.io account in the mobile phone app Google authenticator. You can add it by scanning the code or manually entering the secret key
in the third step, enter the 6 digits of gate.io on the app (change every 30 seconds), and enter the capital password to open Google authentication. At the same time, an email will remind you that Google verification has been turned on
do not delete the Google captcha account in the Google verifier application, otherwise you will not be able to operate the account. Similarly, you can cancel or reset Google verification according to the corresponding prompts
5 two step login protection
two step login protection provides more secure user login protection. You need to follow the previous steps to turn on the phone captcha function or Google captcha. And fill in the space below
after enabling this function, you must input SMS verification code or Google verification code before each login to ensure your login security
6api keys, modify login password, fund password and email binding
you can use the set API keys to conct automatic query and transaction through computer program or mobile app
if you want to modify the login password or the fund password, you don't need to introce them one by one, just follow the instructions
the mailbox binding is also completed when the account is registered, which will not be repeated
7 anti phishing code
set your own anti phishing code and confirm the fund password. This code will be included at the end of the subsequent e-mail sent to you by gate.io to distinguish fraulent e-mail
8 payment settings
set payment and collection method, must be my account number, there are three ways of payment: bank card, Alipay, WeChat.
to bind a bank card, enter the relevant information of your own bank card according to the prompt information and bind it
bind Alipay, upload your payment code, fill in the Alipay account number, and enter your contact information in the notes information, so that you can easily trade the other party quickly to contact you. Wechat binding is the same, no more repeat
9 security log
your login log and security settings log are recorded in the security log, which can be viewed accordingly
10 notification settings
notification settings can be recommended by the platform or changed according to personal habits
4. I hope my answer can solve your worries

this means to prevent phishing sites

it's very simple, I know a very good way, you can use it

phishing sites are actually camouflaged sites, not the sites you really want to open

you use Tencent computer housekeeper, Then turn on

when you turn on the computer at ordinary times, so that the real-time protection of the computer housekeeper can help you detect whether the web page is a phishing website, which is very simple for intelligent automatic detection.
5. The anti phishing code can be set in the security center. After setting, the content of the email sent by okex to you will contain the anti phishing code you set.
6. What is phishing<

phishing is a combination of "phishing" and "phone". Since the ancestor of hackers first committed crimes by telephone, "phishing" was created by replacing "F" with "pH"<

"phishing" attacks use fraulent e-mail and forged web sites to carry out fraud activities, and the cheated often disclose their financial data, such as credit card number, account user name, password and social security number. Fraudsters usually disguise themselves as trusted brands such as well-known banks, online retailers and credit card companies. Up to 5% of all users who have access to fraud information will respond to these scams

anti fishing is naturally to prevent the above situations
7. A kind of Shanzhai currency is true only if it's not a money runner. It's just that there's no value to buy and there's no room for appreciation.
8. Should be open source, these three words, is open source code, no encryption
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750