logo加载失败
Scan to download
Home
Article
Flash
Token Unlock
Hot Projects
Specials
Columns
ETF
Knowledge Base
Calendar
Activity
Tools
The system comes with an input method that leaks input content

Slow Fog Cosine: Using the system's built-in input method is a good habit to reduce the attack surface; mnemonic phrases/private keys should not be exposed online

ChainCatcher news, Slow Mist founder Yu Xian stated on social media that using the system's built-in input method is a good habit to reduce the attack surface (of course, if the system input method is found to have risks and is not resolved for a long time, that should also be noted). Additionally, ultra-sensitive information such as mnemonic phrases/private keys should not touch the internet.Previous report, Shen Yu stated on social media that cloud input methods with up to one billion users may have leaked input content. If users have entered mnemonic phrases or other sensitive information through input methods like Baidu, Honor, or Huawei, please take immediate measures to reduce risks.
2024-04-29
The system comes with an input method that leaks input content
reduces the attack surface
and provides a mnemonic.
Copyright © 2023
About Us
Media Kit
Apply for a column
Disclaimer
RSS LINK
Recruitment
Qiong ICP No. 2021009392
Qiong ICP No. 2021009392
ChainCatcher Building the Web3 world with innovators
Open the app