Gate Square “Creator Certification Incentive Program” — Recruiting Outstanding Creators!
Join now, share quality content, and compete for over $10,000 in monthly rewards.
How to Apply:
1️⃣ Open the App → Tap [Square] at the bottom → Click your [avatar] in the top right.
2️⃣ Tap [Get Certified], submit your application, and wait for approval.
Apply Now: https://www.gate.com/questionnaire/7159
Token rewards, exclusive Gate merch, and traffic exposure await you!
Details: https://www.gate.com/announcements/article/47889
Trust Wallet has opened a claim channel, with over 2,600 people applying in a short period of time.
Trust Wallet was subjected to a supply chain attack this week, with losses amounting to at least $7 million. The official has now officially initiated the compensation process.
(Background: CZ: Trust Wallet will compensate users for asset losses, with stolen funds reaching $7 million)
(Additional background: SlowMist: Trust Wallet’s code repository suspected to be compromised, users are advised to disconnect from the internet and transfer assets)
The self-custody crypto wallet Trust Wallet has officially opened the official claim form for full compensation. Applicants must prepare: 1) contact Email and residence; 2) stolen wallet address; 3) attacker’s receiving address; 4) related transaction hash (TXID); 5) a brand new, uncontaminated receiving wallet address.
The official once again reminds users that they only need to submit information through the official form. Beware of phishing accounts “do not interact with any messages from non-official channels,” and any “customer service” requesting seed phrases is a scam.
Trust Wallet CEO recently posted:
Security upgrade recommendations
Security experts advise that even if assets are not affected, anyone who has installed v2.68 should immediately upgrade to v2.69 and consider regenerating a new wallet to prevent future issues. Large assets should be transferred to cold wallets or multi-signature addresses to reduce single point risks.
Finally, diversifying assets, regularly checking authorization records and plugin sources remain the best strategies to prevent supply chain attacks.