Moxie (@defi_moxie) 's Twitter Profile
Moxie

@defi_moxie

I believe in God and self | onchain Degen | Dont trust me! | Be consistent for a long ⏲️ time | NFA | DYOR

ID: 1036814369391366146

linkhttps://t.me/defimoxie calendar_today04-09-2018 03:13:03

1,1K Tweet

200 Followers

783 Following

De-Hunter (@de_hunter0) 's Twitter Profile Photo

This kind of pop up comes from google to selected individuals they know attackers chase their accounts and activities online on a daily basis. (Crypto billionaires, activists, politicians, etc) At the same time these can be used by another fake phishing site by mimicking the

This kind of pop up comes from google to selected individuals they know attackers chase their accounts and activities online on a daily basis. (Crypto billionaires, activists, politicians, etc) 

At the same time these can be used by another fake phishing site by mimicking the
De-Hunter (@de_hunter0) 's Twitter Profile Photo

The moment you hesitate, your crypto could vanish. If you notice vulnerabilities, move your funds immediately — whether to a new wallet or another exchange. When your wallet feels compromised, don’t wait for confirmation — act fast. If users start complaining about an

De-Hunter (@de_hunter0) 's Twitter Profile Photo

Avoid mixing up exchange accounts with self-hosted wallets; transfers between them can be exploited in social engineering scams. Better use them differently(a self hosted wallet like phantom or an exchange like Binance).

De-Hunter (@de_hunter0) 's Twitter Profile Photo

Bridge assets carefully—services like Bridgers can obscure fund paths, so only use trusted bridges and verify destinations.

De-Hunter (@de_hunter0) 's Twitter Profile Photo

Drainers don’t always break in — sometimes you open the door How ? -You forgot to check again before you sign -You are in haste to get a free airdrop -You forget to check address vividly before signing -you clicked links from unknown sources Etc…

De-Hunter (@de_hunter0) 's Twitter Profile Photo

When liquidity is scarce in crypto — crime becomes the only option. Beware of the DMs you trust — most are deceitful. Don’t chase free airdrops — especially with the wallet you have your funds in. Reconsider before you buy into anyone’s assurance — Token rugs becomes a

De-Hunter (@de_hunter0) 's Twitter Profile Photo

Greed overrides common sense. -Greed make you Fall for fake giveaways -Greed makes you Trust any link that promises insane APR -Greed makes you Rush mints without checking contracts -Greed blinds people to the fact that guarantees don’t exist in crypto Greed makes people

De-Hunter (@de_hunter0) 's Twitter Profile Photo

Social engineering in crypto isn’t about hacking your device. It’s about hacking you. Scammers don’t break your wallet. They break your trust, your emotions, your guard — and you hand them access yourself. They pretend to be: • Support staff • A friend you trust • A trader

De-Hunter (@de_hunter0) 's Twitter Profile Photo

Offline signing = your funds move, your keys don’t. Your cold wallet signs transactions offline — here’s how: You build the transaction on your phone. It sends the unsigned data to your cold wallet. The device signs it inside its secure chip. Your private keys never leave.

De-Hunter (@de_hunter0) 's Twitter Profile Photo

Your cold wallet doesn’t store your crypto. Your crypto stays on the blockchain. What the device keeps offline are your private keys — the only thing that can move your funds. The wallet signs transactions inside the device. The keys never leave. Only the signed transaction

De-Hunter (@de_hunter0) 's Twitter Profile Photo

Social engineering works because victims don’t feel hacked — they feel convinced. They study your behavior. They mirror your language. They create urgency. They make you feel safe. Then they get you to click the wrong link, sign the wrong transaction, or share the wrong

De-Hunter (@de_hunter0) 's Twitter Profile Photo

Majority of crypto holders care less about how they keep their funds — which make them prone to hack. Most people don’t lose crypto to hackers — they lose it to bad habits.

De-Hunter (@de_hunter0) 's Twitter Profile Photo

Poor wallet hygiene is the fastest path to becoming a victim. -Reusing wallets. -Signing blindly. -Storing seed phrases anywhere convenient. -Connecting to every shiny new site. -Skipping revokes. -Ignoring approvals. -No cold storage. -No backups. You don’t get hacked by

De-Hunter (@de_hunter0) 's Twitter Profile Photo

Bitcoin went from low of $5 to $1,200 ATH in 2013. 240x Bitcoin went from low of $167 to $19,000 ATH in 2018. 113x Bitcoin went from low of $3,200 to $68,000 ATH in 2021. 21x Bitcoin went from low of $15,700 to 126,000 ATH in 2025. 8x The fundamentals lined up well if we

De-Hunter (@de_hunter0) 's Twitter Profile Photo

“someone lost $838K worth of PT-LP tUSDe after signing a phishing "approve" transaction” Know what you are signing otherwise DO NOT SIGN IT.

“someone lost $838K worth of PT-LP tUSDe after signing a phishing "approve" transaction”

Know what you are signing otherwise DO NOT SIGN IT.
De-Hunter (@de_hunter0) 's Twitter Profile Photo

Flexing your crypto holdings in public doesn’t make you look successful — it makes you a target. -Scammers track bragging. -Hackers profile wallets. -Social engineers study your moves. The moment you reveal what you hold, you invite people to hunt for it. Security starts with

De-Hunter (@de_hunter0) 's Twitter Profile Photo

You don’t want someone to custody your entire crypto portfolio for you. Split portfolio into sections.. Asset you just want to HODL — cold wallet Asset you just want to trade — hot wallet or CEX. Learn this basic concept it saves lives.

De-Hunter (@de_hunter0) 's Twitter Profile Photo

Scammers don’t take Sundays off — your security shouldn’t either. Bad security practice = poor wallet hygiene Poor wallet hygiene = avoidable loss to hackers. There are no off-days in security. .