🌟 Photo Sharing Tips: How to Stand Out and Win?
1.Highlight Gate Elements: Include Gate logo, app screens, merchandise or event collab products.
2.Keep it Clear: Use bright, focused photos with simple backgrounds. Show Gate moments in daily life, travel, sports, etc.
3.Add Creative Flair: Creative shots, vlogs, hand-drawn art, or DIY works will stand out! Try a special [You and Gate] pose.
4.Share Your Story: Sincere captions about your memories, growth, or wishes with Gate add an extra touch and impress the judges.
5.Share on Multiple Platforms: Posting on Twitter (X) boosts your exposure an
Recently, a Bitcoin theft case involving an amount as high as $230 million has been successfully cracked under the investigation of the U.S. Department of Justice. Surprisingly, the masterminds behind this major case are two young individuals born after 2000: 20-year-old Singaporean Lin Malong and 21-year-old Los Angeles resident Jandyel Serrano. The exposure of this case immediately attracted widespread attention globally.
These two young individuals have exhibited jaw-dropping criminal techniques. Among them, Lin Malong, although still young, has years of research experience in the dark web and cryptocurrency fields, possessing an in-depth understanding of blockchain technology and exchange vulnerabilities. Their criminal process can be described as interlinked and strategically planned:
First, they sent a forged email notification about unusual access to a Google account to the target victim, serving as the beginning of a phishing attack. Although the experienced victim initially sensed something was wrong, this was just the prelude to the entire scam.
Subsequently, Lin Malong cleverly disguised himself as an employee of Google, gradually gaining the victim's trust through multiple phone communications and carefully designed dialogue content. In the end, he successfully obtained private information from the victim's Google Drive, which included details of the victim's cryptocurrency account on the Gemini platform.
Immediately afterwards, Serrano took on the role of a Gemini platform staff member, contacting the victim and enticing them to download a so-called software that could "protect crypto assets." However, this software was actually a carefully crafted stealing tool, specifically designed to steal private key information.
In the end, the two successfully transferred the victim's cryptocurrency, completing this astonishing theft.
This case not only demonstrates the technical prowess of young hackers but also exposes the vulnerabilities present in the current cryptocurrency security field. It serves as a reminder that in the digital age, the importance of personal information security and asset protection cannot be overlooked. At the same time, it also rings alarm bells for regulatory agencies and cryptocurrency platforms, urging them to strengthen security measures and enhance user security awareness education.
Although the technical talents of these two young individuals are impressive, it is indeed regrettable that they choose to use them for illegal purposes. This case also serves as a warning to us that talent and ethics are equally important. How to guide young people to properly utilize their talents is a challenge that the whole society needs to face together.