• 11/09/2024

Phishing scams are malicious attempts to steal personal information, passwords, or remote access by deceiving users. These attacks often target cryptocurrency investors, as well as traditional banking and corporate networks. Advanced security systems can still be compromised through social engineering. Clash Node emphasizes the importance of user security and provides guidelines to protect against phishing attacks.

What is Phishing?

Phishing is a fraudulent activity designed to obtain sensitive information from victims, such as passwords, financial data, or credit card numbers. The term “phishing” is derived from “fishing,” symbolizing the attempt to lure and catch victims’ personal information.

How Phishing Works:

Phishing involves tricking users into providing sensitive information by masquerading as a trustworthy entity. Attackers create fake websites, emails, or social media profiles to impersonate legitimate organizations.

Types of Phishing:

  1. Social Media Phishing:
    • Fake accounts offer products/services or pose as company representatives.
    • Attackers engage users, gaining their trust before tricking them into providing personal information or clicking malicious links.
  2. Email Phishing:
    • Blind Phishing: Mass emails with malicious links or attachments.
    • Spear Phishing: Targeted emails using personalized information to deceive victims.
  3. Vishing (Voice Phishing):
    • Fake calls from attackers posing as bank representatives, claiming suspicious activity to extract personal information.
  4. Cryptocurrency Phishing:
    • Fake Telegram or Twitter accounts posing as support staff from exchanges.
    • Emails or social media posts with fake promotions or giveaways.

Risks of Phishing:

The main risk of phishing is the immediate financial loss. Additionally, if hackers gain access to personal documents, they can use this information to create accounts, obtain loans, or commit identity theft.

How to Protect Yourself:

  1. Never Share Passwords or Tokens:
    • Be cautious with QR codes and avoid sharing access credentials.
  2. Verify and Distrust:
    • Always confirm the authenticity of communication channels.
    • Contact companies directly through official channels if in doubt.
  3. Be Cautious with Links:
    • Avoid clicking on unsolicited links from emails, search engines, or social media.

Clash Node’s Commitment:

Clash Node is dedicated to ensuring user safety and advises constant vigilance against phishing attempts. By following these security practices, users can significantly reduce their risk of falling victim to phishing scams.

PERIODIC BURNING

A percentage of transaction fees from manual arbitration operations, in addition to the full amounts from License purchases for operations in the automatic arbitration system, will be used to burn Clash Hub Coin tokens. This will accelerate burning, decrease supply, and increase scarcity of the token.

100% of tokens converted to USDT during withdrawals from the staking system, arbitrage system and flash loans will be burned, promoting a continuous decrease in the total supply.

OBJECTIVE OF BURNING

Reduce 90% of the total supply over 1 year through periodic burning and conversions of staking rewards and token affiliate system into USDT. 90% of the supply will be burned, equivalent to 900 million tokens at a price of $0.01, corresponding to 9 million dollars in transaction volume. Then the current model of the affiliate system will conclude and the token will be launched in the public sale phase after the full burning of 90% of the supply.

Total supply of tokens will be burned and released on DEX`s for public sale at a price of $0.02, doubling the capital of Clash Hub Coin Token holders.