<100 subscribers
Share Dialog
Share Dialog
Here is the Hyundai nft, NFC that he had there. if we look at the forehead of this transaction during which the user left NFC from the wallet, we will see that it was a safe transfer, that is, the user himself signed the transaction to transfer this NFC to another wallet. I think that the transaction is being signed.
So I say again, always look at what transactions you sign in your metamask. I’ll show you a little further in the video how to distinguish Let’s first see this site itself once the user asks us exactly how it was done. in order to analyze this site, I saved this page to my computer and opened this page, through which it actually performs all the actions. See how it looks like its code is confusing, because in the browser the user can see the entire Jess code and apparently these attackers are confused and so that users do not immediately What actions does this script perform?
omitted it from the Latin to obscure to obscure to confuse to make it not obvious, but fortunately modern browsers, they help us to untangle such a confusing code a little if we go over the Chrome debugger. Right here in this Main GS script we can click on 2 brackets and get it in a more digestible I already copied it to myself court we information. So I actually see here, I see what connects here, among other Here is such a library library for working with different tokens-chips for the convenience of working with them, But in fact, the NFC list from your ini wallet.
Transactions for their transfer can be performed on bare javascripti without using any libraries, but it was in this case that this library was used here, with which you can very easily get both a list of your other chips and initiate their transfer to another Here in our confusing code, it is most likely being executed. Here, or rather, it is initiated, because to sign. I still owe it myself. No one can lead your energy without either signing or transferring it. Directly as in this case, or for another person to take it from your wallet, because they are.
tokens of a certain format in this case tokens of both format and rc-721 and. And when we say that a given token belongs to a certain format. This means that he must implement a certain set of functions common to this format, that is, any NFC of this format will have a function, so attackers do not need to know when writing their site for phishing. What specific NFC can come across in your wallets, it simply receives their list and therefore generates transactions directly from the list for them, because the principle of working with all NFC
The JavaScript interface will be exactly the same, that is, no matter what kind of chip you have on the air network, by going to this You can lose her. Let’s actually, I’ll show you how they look in a metamask, transactions At the NFC rally and how Metamasks look like transactions at the NFC transfer in order for you to be able to distinguish between them. Here, let’s first see what a metamask transaction looks like for a Chrome save transfer initiating a transaction. And now, when a metamask pops up here, in addition to the fact that we see an estimate of gas costs here, if we go to the Data tab, we also see the name of the collection from which NFC is currently being transmitted And we see that the operation that we are now performing, what this operation is called.
to Chrome transfer When we are minding some kind of NFC, then in the meta mask this transaction looks completely different and here it is always written carefully.
Here is the Hyundai nft, NFC that he had there. if we look at the forehead of this transaction during which the user left NFC from the wallet, we will see that it was a safe transfer, that is, the user himself signed the transaction to transfer this NFC to another wallet. I think that the transaction is being signed.
So I say again, always look at what transactions you sign in your metamask. I’ll show you a little further in the video how to distinguish Let’s first see this site itself once the user asks us exactly how it was done. in order to analyze this site, I saved this page to my computer and opened this page, through which it actually performs all the actions. See how it looks like its code is confusing, because in the browser the user can see the entire Jess code and apparently these attackers are confused and so that users do not immediately What actions does this script perform?
omitted it from the Latin to obscure to obscure to confuse to make it not obvious, but fortunately modern browsers, they help us to untangle such a confusing code a little if we go over the Chrome debugger. Right here in this Main GS script we can click on 2 brackets and get it in a more digestible I already copied it to myself court we information. So I actually see here, I see what connects here, among other Here is such a library library for working with different tokens-chips for the convenience of working with them, But in fact, the NFC list from your ini wallet.
Transactions for their transfer can be performed on bare javascripti without using any libraries, but it was in this case that this library was used here, with which you can very easily get both a list of your other chips and initiate their transfer to another Here in our confusing code, it is most likely being executed. Here, or rather, it is initiated, because to sign. I still owe it myself. No one can lead your energy without either signing or transferring it. Directly as in this case, or for another person to take it from your wallet, because they are.
tokens of a certain format in this case tokens of both format and rc-721 and. And when we say that a given token belongs to a certain format. This means that he must implement a certain set of functions common to this format, that is, any NFC of this format will have a function, so attackers do not need to know when writing their site for phishing. What specific NFC can come across in your wallets, it simply receives their list and therefore generates transactions directly from the list for them, because the principle of working with all NFC
The JavaScript interface will be exactly the same, that is, no matter what kind of chip you have on the air network, by going to this You can lose her. Let’s actually, I’ll show you how they look in a metamask, transactions At the NFC rally and how Metamasks look like transactions at the NFC transfer in order for you to be able to distinguish between them. Here, let’s first see what a metamask transaction looks like for a Chrome save transfer initiating a transaction. And now, when a metamask pops up here, in addition to the fact that we see an estimate of gas costs here, if we go to the Data tab, we also see the name of the collection from which NFC is currently being transmitted And we see that the operation that we are now performing, what this operation is called.
to Chrome transfer When we are minding some kind of NFC, then in the meta mask this transaction looks completely different and here it is always written carefully.
No comments yet